Huawei technologies co., ltd. (20240233933). CONTACT TRACING METHOD AND RELATED DEVICE simplified abstract
CONTACT TRACING METHOD AND RELATED DEVICE
Organization Name
Inventor(s)
CONTACT TRACING METHOD AND RELATED DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240233933 titled 'CONTACT TRACING METHOD AND RELATED DEVICE
Simplified Explanation:
The patent application describes a method where a second electronic device receives a working key from a first electronic device and a working key set from a server after determining the user of the first device is a target user. If the working key matches, the second device determines if its user is a suspected target user.
Key Features and Innovation:
- Method for secure communication between electronic devices
- Verification process based on working keys
- Identification of suspected target users for enhanced security
Potential Applications: This technology can be applied in:
- Secure messaging applications
- Access control systems
- User authentication processes
Problems Solved:
- Ensures secure communication between devices
- Enhances user verification processes
- Improves overall system security
Benefits:
- Enhanced data protection
- Improved user authentication
- Increased security measures for electronic devices
Commercial Applications: Title: Secure Communication Technology for Electronic Devices This technology can be utilized in various industries such as:
- Cybersecurity firms
- Mobile device manufacturers
- Data encryption companies
Prior Art: Readers can explore prior art related to secure communication methods, working key verification, and user authentication processes in the field of electronic device security.
Frequently Updated Research: Stay updated on the latest advancements in secure communication technologies, user authentication methods, and data encryption protocols relevant to electronic device security.
Questions about Secure Communication Technology for Electronic Devices: 1. How does this technology improve user authentication processes? 2. What are the potential risks associated with working key verification in electronic devices?
Original Abstract Submitted
a method includes receiving, by a second electronic device, a first working key sent by a first electronic device, and a first working key set sent by a first server to the second electronic device after the first server determines that a user of the first electronic device is a target user. in response to the second electronic device determining that the first working key set comprises the first working key, determining, by the second electronic device, that a user of the second electronic device is a suspected target user.