18180579. SECURE PROCESS FOR DEVICE REGISTRATION WITH A SERVICE simplified abstract (T-MOBILE INNOVATIONS LLC)
Contents
- 1 SECURE PROCESS FOR DEVICE REGISTRATION WITH A SERVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SECURE PROCESS FOR DEVICE REGISTRATION WITH A SERVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Technology
- 1.13 Original Abstract Submitted
SECURE PROCESS FOR DEVICE REGISTRATION WITH A SERVICE
Organization Name
Inventor(s)
Cheng Chang Liu of Overland Park KS (US)
Jason Bart Marshall of Olathe KS (US)
WeiQun Yan of Overland Park KS (US)
Hongkun Jin of Overland Park KS (US)
Abdul Khaliq Shaik of Overland Park KS (US)
SECURE PROCESS FOR DEVICE REGISTRATION WITH A SERVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 18180579 titled 'SECURE PROCESS FOR DEVICE REGISTRATION WITH A SERVICE
Simplified Explanation
This technology allows a user device to register with a service using an asymmetric key pair. The service authenticates the user device based on the digital signature created with the private key of the key pair.
Key Features and Innovation
- Registration process for user devices with a service
- Use of asymmetric key pair for authentication
- Storage of public key with session identifier
- Authentication of digital signature for registration
Potential Applications
This technology can be used in various industries such as:
- Cybersecurity
- IoT devices
- Online banking
- Secure communication platforms
Problems Solved
- Secure registration process for user devices
- Prevent unauthorized access to services
- Protect user data during registration
Benefits
- Enhanced security for user device registration
- Efficient and reliable authentication process
- Protection against cyber threats and unauthorized access
Commercial Applications
- Secure login systems for online platforms
- IoT device registration and management services
- Financial institutions for secure transactions
Prior Art
Readers can explore prior art related to asymmetric key authentication and secure registration processes in the field of cybersecurity and data protection.
Frequently Updated Research
Stay updated on the latest advancements in asymmetric key authentication and secure registration processes to enhance cybersecurity measures.
Questions about Technology
How does this technology improve user device registration security?
This technology enhances security by using an asymmetric key pair for authentication, ensuring only authorized devices can register with the service.
What are the potential applications of this technology beyond user device registration?
This technology can be applied in various industries such as cybersecurity, IoT devices, online banking, and secure communication platforms for enhanced security measures.
Original Abstract Submitted
Technology is disclosed herein for registering a user device with a service. In an implementation, a service receives a request from a user device to begin a registration process. The request includes registration data and the public key of an asymmetric key pair. The service stores the public key in association with a session identifier and sends the session identifier to the user device. The service receives a later request from the user device to continue the registration process. The later request includes the session identifier and a digital signature created using the private key of the key pair. The service authenticates the digital signature based on the public key which is retrieved based on the session identifier. In response to authenticating the digital signature, the service sends the registration data associated with the request to the user device and registers the user device based on the registration data.