18416938. DEVICE MANAGEMENT METHOD, SYSTEM, AND APPARATUS simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)

From WikiPatents
Revision as of 03:21, 24 May 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

DEVICE MANAGEMENT METHOD, SYSTEM, AND APPARATUS

Organization Name

HUAWEI TECHNOLOGIES CO., LTD.

Inventor(s)

Haiguang Wang of Singapore (SG)

Xin Kang of Singapore (SG)

Tieyan Li of Singapore (SG)

Cheng Kang Chu of Singapore (SG)

Zhongding Lei of Singapore (SG)

DEVICE MANAGEMENT METHOD, SYSTEM, AND APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18416938 titled 'DEVICE MANAGEMENT METHOD, SYSTEM, AND APPARATUS

Simplified Explanation

The patent application abstract describes a method, system, and apparatus for device management. The method involves sending an identity file from a second device to a first access control node, storing the file in a file system, and performing verification on the second device based on information in the file.

  • Second device sends identity file to first access control node
  • Identity file includes identity information of first device and public key of second device
  • Second device receives first identifier from first access control node
  • Verification is performed on second device based on information in identity file
  • Association information is stored in a database node and a blockchain

Potential Applications

The technology described in this patent application could be applied in various industries and scenarios, including:

  • Secure access control systems
  • Device authentication processes
  • Data security and encryption protocols

Problems Solved

This technology addresses several key issues in device management and security, such as:

  • Ensuring secure communication between devices
  • Preventing unauthorized access to sensitive information
  • Establishing trust relationships between devices

Benefits

The use of this technology offers several benefits, including:

  • Enhanced data security and privacy protection
  • Streamlined device management processes
  • Improved authentication and verification mechanisms

Potential Commercial Applications

The technology described in this patent application has potential commercial applications in:

  • IoT (Internet of Things) devices and networks
  • Cybersecurity solutions and services
  • Access control and identity management systems

Possible Prior Art

One possible prior art related to this technology could be existing device management systems that use similar methods for authentication and verification processes.

Unanswered Questions

How does this technology compare to existing device management systems?

This article does not provide a direct comparison between this technology and existing device management systems. It would be helpful to understand the specific advantages and differences between this innovation and current solutions.

What are the potential limitations or vulnerabilities of this device management method?

The article does not address any potential limitations or vulnerabilities of this device management method. It would be important to explore any weaknesses or risks associated with implementing this technology in real-world scenarios.


Original Abstract Submitted

This disclosure discloses a device management method, system, and apparatus. The method includes: A second device sends an identity file to a first access control node, to indicate the first access control node to store the identity file in a file system, where the identity file includes identity information of a first device and a public key of the second device. The second device receives a first identifier sent by the first access control node. The first identifier is used to read the identity file from the file system. After verification is performed on the second device and information about a device associated with the first device in association information and succeeds, the first access control node sends the identity file to the file system. The association information is stored in a database node and a blockchain.