Huawei technologies co., ltd. (20240095382). DATA PROTECTION METHOD AND VEHICLE simplified abstract

From WikiPatents
Jump to navigation Jump to search

DATA PROTECTION METHOD AND VEHICLE

Organization Name

huawei technologies co., ltd.

Inventor(s)

Yu Shang of Shanghai (CN)

Jiangqi Li of Shenzhen (CN)

Zhaohua He of Shenzhen (CN)

Shijing Jin of Shenzhen (CN)

Feng Geng of Suzhou (CN)

Jianlong Cao of Shanghai (CN)

DATA PROTECTION METHOD AND VEHICLE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240095382 titled 'DATA PROTECTION METHOD AND VEHICLE

Simplified Explanation

The present disclosure relates to data protection methods and vehicles. In an example method, a target vehicle may receive a first configuration file, and determine a first configuration policy based on the first configuration file. The first configuration policy may be used to configure a protection manner of user data associated with a first application. The target vehicle may perform a first operation according to the first configuration policy.

  • Explanation of the patent/innovation:

- Target vehicle receives a configuration file to determine a configuration policy for protecting user data. - Configuration policy is used to configure protection settings for user data associated with a specific application. - Target vehicle executes operations based on the configuration policy.

Potential applications of this technology: - Data protection in vehicles - Secure configuration management for user data in applications

Problems solved by this technology: - Ensuring data protection and privacy in vehicles - Efficient management of configuration policies for user data

Benefits of this technology: - Enhanced security and privacy for user data - Customized protection settings for different applications

Potential commercial applications of this technology: - Automotive industry for data protection in vehicles - Software development companies for secure configuration management

Possible prior art: - Existing data protection methods in vehicles - Configuration management systems for user data protection

Unanswered questions: 1. How does the target vehicle determine the appropriate configuration policy for different applications? - The abstract does not provide details on the specific algorithm or method used for determining configuration policies based on the configuration file. 2. What types of user data are considered for protection in this innovation? - The abstract mentions user data associated with a first application, but it does not specify the nature or sensitivity of the data being protected.


Original Abstract Submitted

the present disclosure relates to data protection methods and vehicles. in an example method, a target vehicle may receive a first configuration file, and determine a first configuration policy based on the first configuration file. the first configuration policy may be used to configure a protection manner of user data associated with a first application. the target vehicle may perform a first operation according to the first configuration policy.