Huawei technologies co., ltd. (20240179522). METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE

Organization Name

huawei technologies co., ltd.

Inventor(s)

Yu Tao of Shenzhen (CN)

METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240179522 titled 'METHOD FOR DETERMINING WHETHER ELECTRONIC DEVICE NEEDS TO BE RE-AUTHENTICATED, AND ELECTRONIC DEVICE

Simplified Explanation

The method described in the abstract involves scanning and storing wireless signals generated by a device in a surrounding environment, determining occurrence probabilities of each signal based on previous scans, calculating confidence levels of new signals, and deciding whether the device needs to be re-authenticated.

  • Scanning and storing wireless signals from a device in the environment
  • Determining occurrence probabilities of signals based on previous scans
  • Calculating confidence levels of new signals
  • Deciding on re-authentication based on confidence levels

Potential Applications

This technology could be applied in:

  • Wireless security systems
  • Smart home devices
  • Location-based services

Problems Solved

This technology helps in:

  • Preventing unauthorized access
  • Enhancing security measures
  • Improving user authentication processes

Benefits

The benefits of this technology include:

  • Increased security
  • Efficient authentication processes
  • Enhanced user privacy

Potential Commercial Applications

The potential commercial applications of this technology could be in:

  • Home security systems
  • IoT devices
  • Access control systems

Possible Prior Art

One possible prior art for this technology could be:

  • Existing wireless authentication methods
  • Signal processing algorithms

Unanswered Questions

How does this technology impact battery life of devices?

This article does not address the potential impact of this technology on the battery life of devices. Implementing continuous scanning and authentication processes may drain the battery faster, so it would be important to consider the energy efficiency of the system.

What are the potential privacy concerns associated with storing wireless signals?

The article does not discuss the privacy implications of storing wireless signals. It would be essential to address how the data is stored, secured, and used to ensure user privacy and data protection.


Original Abstract Submitted

the method includes: scanning and storing a wireless signal generated by a device in a surrounding environment; determining, based on a wireless signal obtained during first n times of scanning, an occurrence probability of each wireless signal during the first n times of scanning, where n is an integer greater than 1; determining, based on a wireless signal obtained during an (n+1)time of scanning and the occurrence probability of each wireless signal during the first n times of scanning, a confidence level of the wireless signal obtained during the (n+1)time of scanning; and determining, based on the confidence level of the wireless signal obtained during the (n+1)time of scanning, whether the electronic device needs to be re-authenticated.