Jump to content

Huawei technologies co., ltd. (20240233933). CONTACT TRACING METHOD AND RELATED DEVICE simplified abstract

From WikiPatents

CONTACT TRACING METHOD AND RELATED DEVICE

Organization Name

huawei technologies co., ltd.

Inventor(s)

Peng Qin of Nanjing (CN)

Tao Zou of Shenzhen (CN)

Tong Li of Shenzhen (CN)

Lu Yan of Shenzhen (CN)

CONTACT TRACING METHOD AND RELATED DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240233933 titled 'CONTACT TRACING METHOD AND RELATED DEVICE

Simplified Explanation:

The patent application describes a method where a second electronic device receives a working key from a first electronic device and a working key set from a server after determining the user of the first device is a target user. If the working key matches, the second device determines if its user is a suspected target user.

Key Features and Innovation:

  • Method for secure communication between electronic devices
  • Verification process based on working keys
  • Identification of suspected target users for enhanced security

Potential Applications: This technology can be applied in:

  • Secure messaging applications
  • Access control systems
  • User authentication processes

Problems Solved:

  • Ensures secure communication between devices
  • Enhances user verification processes
  • Improves overall system security

Benefits:

  • Enhanced data protection
  • Improved user authentication
  • Increased security measures for electronic devices

Commercial Applications: Title: Secure Communication Technology for Electronic Devices This technology can be utilized in various industries such as:

  • Cybersecurity firms
  • Mobile device manufacturers
  • Data encryption companies

Prior Art: Readers can explore prior art related to secure communication methods, working key verification, and user authentication processes in the field of electronic device security.

Frequently Updated Research: Stay updated on the latest advancements in secure communication technologies, user authentication methods, and data encryption protocols relevant to electronic device security.

Questions about Secure Communication Technology for Electronic Devices: 1. How does this technology improve user authentication processes? 2. What are the potential risks associated with working key verification in electronic devices?


Original Abstract Submitted

a method includes receiving, by a second electronic device, a first working key sent by a first electronic device, and a first working key set sent by a first server to the second electronic device after the first server determines that a user of the first electronic device is a target user. in response to the second electronic device determining that the first working key set comprises the first working key, determining, by the second electronic device, that a user of the second electronic device is a suspected target user.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.