Dell products l.p. (20240205673). METHOD FOR WIRELESS COMMUNICATION, WIRELESS PORT CONNECTION DEVICE, AND COMPUTER PROGRAM PRODUCT simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD FOR WIRELESS COMMUNICATION, WIRELESS PORT CONNECTION DEVICE, AND COMPUTER PROGRAM PRODUCT

Organization Name

dell products l.p.

Inventor(s)

Chenxi Hu of Beijing (CN)

Sanping Li of Beijing (CN)

Zhen Jia of Shanghai (CN)

METHOD FOR WIRELESS COMMUNICATION, WIRELESS PORT CONNECTION DEVICE, AND COMPUTER PROGRAM PRODUCT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240205673 titled 'METHOD FOR WIRELESS COMMUNICATION, WIRELESS PORT CONNECTION DEVICE, AND COMPUTER PROGRAM PRODUCT

The abstract of this patent application describes a method for wireless communication involving the exchange of public keys and certificates between devices to establish secure connections.

  • Sending a first public key to an authentication server
  • Receiving signed certificates from the authentication server and a second wireless port connection device
  • Acquiring a second public key from the second device's certificate using the server's public key
  • Generating a symmetric key for encryption
  • Encrypting data with the symmetric key and sending it to the second device

Potential Applications: - Secure wireless communication between devices - Data encryption for sensitive information transfer - Authentication and verification processes in wireless networks

Problems Solved: - Ensuring secure communication between wireless devices - Preventing unauthorized access to data during transmission - Establishing trust between devices in a wireless network

Benefits: - Enhanced security for wireless communication - Protection of sensitive data during transfer - Efficient and reliable authentication processes

Commercial Applications: Title: Secure Wireless Communication Technology for Data Encryption This technology can be applied in industries such as: - Telecommunications - Internet of Things (IoT) - Cybersecurity firms

Questions about Secure Wireless Communication Technology for Data Encryption:

1. How does this method ensure the security of data during wireless communication? - The method uses public key exchange and encryption techniques to establish secure connections between devices, preventing unauthorized access to data.

2. What are the potential risks associated with using wireless communication without encryption? - Without encryption, data transmitted wirelessly can be intercepted and accessed by unauthorized parties, leading to privacy breaches and data theft.


Original Abstract Submitted

embodiments of the present disclosure relate to a method for wireless communication, a wireless port connection device, and a computer program product. the method in one embodiment is illustratively performed by a first wireless port device. the method includes: sending a first public key of the first wireless port device to an authentication server; receiving a signed first certificate from the authentication server, the first certificate comprising a server public key of the authentication server; receiving a signed second certificate from a second wireless port connection device; acquiring a second public key of the second wireless port connection device in the second certificate using the server public key; generating a symmetric key using the second public key; encrypting data using the symmetric key; and sending the encrypted data to the second wireless port connection device.