18677215. Method for Verifying an Identity of an Electronic Device and Related Device simplified abstract (Huawei Technologies Co., Ltd.)

From WikiPatents
Revision as of 10:15, 19 September 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Method for Verifying an Identity of an Electronic Device and Related Device

Organization Name

Huawei Technologies Co., Ltd.

Inventor(s)

Girish Shivalingappa Revadigar of Singapore (SG)

Zhuo Wei of Singapore (SG)

Qinyong Jia of Shanghai (CN)

Method for Verifying an Identity of an Electronic Device and Related Device - A simplified explanation of the abstract

This abstract first appeared for US patent application 18677215 titled 'Method for Verifying an Identity of an Electronic Device and Related Device

Simplified Explanation: The patent application describes a method for verifying the identity of an electronic device by exchanging challenge and response packets between two devices and analyzing the received signal strength information.

  • Key Features and Innovation:
   - Transmission of challenge packets from one device to another.
   - Receipt of response packets in correspondence to the challenge packets.
   - Analysis of received signal strength information for verification.
   - Exchange of verification information between the devices.
   - Identity verification based on signal strength data.
  • Potential Applications:
   - Secure authentication processes for electronic devices.
   - Access control systems for buildings or networks.
   - Data encryption and decryption protocols.
   - Secure communication channels for IoT devices.
   - Anti-counterfeiting measures for electronic products.
  • Problems Solved:
   - Ensuring the authenticity of electronic devices.
   - Preventing unauthorized access to sensitive information.
   - Enhancing security in wireless communication.
   - Mitigating the risk of identity theft in digital systems.
  • Benefits:
   - Improved security measures for electronic devices.
   - Enhanced protection of sensitive data.
   - Streamlined authentication processes.
   - Reduced risk of unauthorized access.
   - Enhanced trust in digital interactions.
  • Commercial Applications:
   - Cybersecurity companies offering identity verification solutions.
   - Manufacturers of electronic devices implementing secure authentication methods.
   - Companies developing IoT devices with enhanced security features.
   - Government agencies utilizing secure communication protocols.
   - Financial institutions ensuring secure transactions.
  • Prior Art:
   - Prior research on signal strength-based authentication methods.
   - Studies on secure communication protocols for electronic devices.
   - Patents related to identity verification in digital systems.
  • Frequently Updated Research:
   - Ongoing studies on improving signal strength analysis for identity verification.
   - Research on the integration of biometric data with signal strength analysis for enhanced security measures.

Questions about Electronic Device Identity Verification:

1. How does signal strength information contribute to verifying the identity of electronic devices?

   - Signal strength information helps in determining the authenticity of the response packets received from the device, enhancing the verification process.

2. What are the potential risks associated with identity verification based on signal strength analysis?

   - Potential risks include signal interference, signal manipulation, and signal spoofing, which could compromise the accuracy of the verification process.


Original Abstract Submitted

A method for verifying an identity of an electronic device includes: transmitting, by a first electronic device, N challenge packet(s) to a second electronic device; receiving, by the first electronic device, N response packet(s) from the second electronic device, where the N response packet(s) are in one-to-one correspondence with the N challenge packet(s); determining, by the first electronic device, a first verification information, according to the N response packet(s), where the first verification information indicates received signal strength (RSS) information of the N response packet(s); obtaining, by the first electronic device, a second verification information from the second electronic device, where the second verification information indicates RSS information of the N challenge packet(s); and verifying, according to the first verification information and the second verification information, an identity of the second electronic device.