18550986. METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE simplified abstract (HUAWEI TECHNOLOGIES CO., LTD.)
Contents
- 1 METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE
Organization Name
Inventor(s)
METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 18550986 titled 'METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE
Simplified Explanation
The method described in the patent application involves scanning and storing wireless signals generated by devices in a surrounding environment, determining the occurrence probability of each wireless signal based on data obtained during multiple scanning instances, calculating the confidence level of a wireless signal obtained during a subsequent scanning instance, and deciding whether the electronic device needs to be re-authenticated based on the confidence level.
- Scanning and storing wireless signals in the environment
- Determining occurrence probability of each signal based on data from multiple scanning instances
- Calculating confidence level of a signal in a subsequent scanning instance
- Deciding on re-authentication of the electronic device based on confidence level
Potential Applications
This technology could be applied in:
- Wireless security systems
- IoT devices
- Location tracking systems
Problems Solved
This technology helps in:
- Enhancing security measures
- Improving authentication processes
- Preventing unauthorized access
Benefits
The benefits of this technology include:
- Increased security
- Efficient authentication
- Enhanced user privacy
Potential Commercial Applications
This technology can be utilized in:
- Home security systems
- Access control systems
- Data encryption software
Possible Prior Art
One possible prior art could be the use of signal strength for device authentication in wireless networks.
Unanswered Questions
How does this technology impact battery life of devices?
The patent application does not mention the potential impact of this technology on the battery life of electronic devices. It would be important to understand if the scanning and storing of wireless signals have any significant effect on the power consumption of devices.
What are the potential privacy concerns associated with this technology?
The patent application does not address the privacy implications of scanning and storing wireless signals in the surrounding environment. It would be crucial to investigate how this technology may impact user privacy and data security.
Original Abstract Submitted
The method includes: scanning and storing a wireless signal generated by a device in a surrounding environment; determining, based on a wireless signal obtained during first n times of scanning, an occurrence probability of each wireless signal during the first n times of scanning, where n is an integer greater than 1; determining, based on a wireless signal obtained during an (n+1)time of scanning and the occurrence probability of each wireless signal during the first n times of scanning, a confidence level of the wireless signal obtained during the (n+1)time of scanning; and determining, based on the confidence level of the wireless signal obtained during the (n+1)time of scanning, whether the electronic device needs to be re-authenticated.