20240022902.Receiver Verification of Shared Credentials simplified abstract (apple inc.)
Organization Name
Inventor(s)
Matthias Lerch of San Francisco CA (US)
Benjamin D. Chester of San Jose CA (US)
Matthew C. Byington of San Jose CA (US)
This abstract first appeared for US patent application 20240022902 titled 'Receiver Verification of Shared Credentials
Simplified Explanation
The abstract describes a method for verifying an electronic device and securely transferring contact information using a hash function.
- Verification of electronic device based on identifier and stored device information
- Joint verification process with a verification computer
- Generation of hashed contact information for security
- Provisioning data transfer to partner computer and electronic device
Potential Applications
This technology could be applied in secure data transfer systems, electronic device verification processes, and contact information sharing platforms.
Problems Solved
This technology solves the problems of unauthorized access to contact information, insecure data transfer, and lack of efficient electronic device verification methods.
Benefits
The benefits of this technology include enhanced security in data transfer, improved verification processes for electronic devices, and secure sharing of contact information.
Potential Commercial Applications
The potential commercial applications of this technology include secure communication platforms, electronic device security solutions, and contact information sharing services.
Possible Prior Art
One possible prior art could be existing methods of secure data transfer using hash functions and electronic device verification processes.
Unanswered Questions
How does the joint verification process with a verification computer enhance security in the system?
The joint verification process adds an extra layer of security by involving a separate entity in the verification process, reducing the risk of unauthorized access.
What are the specific types of provisioning data that can be transferred using this technology?
The provisioning data could include software updates, security patches, configuration settings, or any other data necessary for the electronic device to function properly.
Original Abstract Submitted
during operation, a host computer may receive, associated with an electronic device, contact information of a user of the electronic device and input data for a hash function. then, the host computer may verify the electronic device based at least in part on an identifier of the electronic device and stored device information. alternatively, the host computer may jointly perform a verification process with a verification computer to verify the electronic device. next, the host computer may generate a hashed version of the contact information based at least in part on the input data and the hash function. moreover, the host computer may provide, addressed to a partner computer, the hashed contact information and a request for the provisioning data. furthermore, the host computer may selectively receive, associated with the partner computer, the provisioning data, and the host computer may selectively provide, addressed to the electronic device, the provisioning data.