Huawei technologies co., ltd. (20240179522). METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE simplified abstract
Contents
- 1 METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE
Organization Name
Inventor(s)
METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240179522 titled 'METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE
Simplified Explanation
The method described in the abstract involves scanning and storing wireless signals generated by a device in a surrounding environment, determining occurrence probabilities of each signal based on previous scans, calculating confidence levels of new signals, and deciding whether the device needs to be re-authenticated.
- Scanning and storing wireless signals from a device in the environment
- Determining occurrence probabilities of signals based on previous scans
- Calculating confidence levels of new signals
- Deciding on re-authentication based on confidence levels
Potential Applications
This technology could be applied in:
- Wireless security systems
- Smart home devices
- Location-based services
Problems Solved
This technology helps in:
- Preventing unauthorized access
- Enhancing security measures
- Improving user authentication processes
Benefits
The benefits of this technology include:
- Increased security
- Efficient authentication processes
- Enhanced user privacy
Potential Commercial Applications
The potential commercial applications of this technology could be in:
- Home security systems
- IoT devices
- Access control systems
Possible Prior Art
One possible prior art for this technology could be:
- Existing wireless authentication methods
- Signal processing algorithms
Unanswered Questions
How does this technology impact battery life of devices?
This article does not address the potential impact of this technology on the battery life of devices. Implementing continuous scanning and authentication processes may drain the battery faster, so it would be important to consider the energy efficiency of the system.
What are the potential privacy concerns associated with storing wireless signals?
The article does not discuss the privacy implications of storing wireless signals. It would be essential to address how the data is stored, secured, and used to ensure user privacy and data protection.
Original Abstract Submitted
the method includes: scanning and storing a wireless signal generated by a device in a surrounding environment; determining, based on a wireless signal obtained during first n times of scanning, an occurrence probability of each wireless signal during the first n times of scanning, where n is an integer greater than 1; determining, based on a wireless signal obtained during an (n+1)time of scanning and the occurrence probability of each wireless signal during the first n times of scanning, a confidence level of the wireless signal obtained during the (n+1)time of scanning; and determining, based on the confidence level of the wireless signal obtained during the (n+1)time of scanning, whether the electronic device needs to be re-authenticated.