US Patent Application 18341985. IDENTITY AUTHENTICATION METHOD, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM simplified abstract

From WikiPatents
Jump to navigation Jump to search

IDENTITY AUTHENTICATION METHOD, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.


Inventor(s)

Rui Shi of Shenzhen (CN)


Lu Gan of Shenzhen (CN)


Chao He of Beijing (CN)


IDENTITY AUTHENTICATION METHOD, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM - A simplified explanation of the abstract

  • This abstract for appeared for US patent application number 18341985 Titled 'IDENTITY AUTHENTICATION METHOD, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM'

Simplified Explanation

This abstract describes a method for verifying the identity of a user on a mobile device. The mobile device receives a message from another electronic device within a certain distance. The message contains a randomly generated session key. The mobile device then generates an action based on this message and encrypts it using the session key. The encrypted action is sent back to the electronic device. The mobile device displays confirmation information to the user to verify if the electronic device performs the indicated action. The user provides input for confirmation, and if successful, the identity authentication is considered successful. The distance between the devices must be within a predetermined secure distance for this method to work.


Original Abstract Submitted

An identity authentication method and a mobile device. The mobile device performs receiving a first message of an electronic device within a second distance from the electronic device, where the first message includes a randomly generated session key, randomly generating first action information in response to the first message, and obtaining a second message by encrypting the first action information using the session key, sending the second message to the electronic device. displaying first confirmation information to determine whether the electronic device performs a first action indicated by the first action information, receiving first input used for confirmation, and prompting that identity authentication on the electronic device succeeds, where the second distance is less than or equal to a preset secure distance.