TECHNIQUES FOR SECURE DATA TRANSMISSION USING A SECONDARY DEVICE

    公开(公告)号:EP4425410A3

    公开(公告)日:2024-09-25

    申请号:EP24189756.0

    申请日:2022-09-23

    申请人: Apple Inc.

    摘要: A method, comprising: identifying, by an electronic device, one or more computing devices in a vicinity of the electronic device; selecting, by the electronic device, one of the one or more computing devices to conduct a secure reception of user information; receiving, by the selected computing device, from the electronic device and via a wireless connection, a request to securely transmit user information using a secure data exchange module of the selected computing device; configuring, by the selected computing device, the secure data exchange module for conducting a secure transmission of the user information; transmitting, by the selected computing device, a notification to the electronic device, the notification indicating that the secure data exchange module is ready to collect the user information; providing, by the selected computing device, a user interface for conducting the secure transmission of the user information; receiving, by the selected computing device, via the secure data exchange module, the user information; transmitting, by the selected computing device, via a wireless connection, the user information to the electronic device; receiving, by the electronic device, the user information; sending, by the electronic device, information for processing the user information; receiving, at the electronic device, confirmation that the user information has been processed; and sending, by the electronic device and via wireless connection, confirmation that the user information has been processed.

    USER PRIVACY PROTECTION METHOD, APPARATUS AND SYSTEM

    公开(公告)号:EP4391616A1

    公开(公告)日:2024-06-26

    申请号:EP22894412.0

    申请日:2022-09-09

    发明人: PANG, Gaokun

    IPC分类号: H04W12/06 H04W12/03 H04W12/30

    CPC分类号: H04W12/30 H04W12/03 H04W12/06

    摘要: This application provides a user privacy protection method, an apparatus, and a system, and relates to the field of communication technologies, to solve a problem that identification information used for interaction is easily leaked during access to a wireless network. The method includes: obtaining a first random number; determining a first identifier according to the first random number; sending a first message carrying the first identifier to a second device, where the first message indicates the second device to perform authentication with a first device according to a cached result corresponding to the first identifier; establishing a connection to the second device in a case that the authentication succeeds; obtaining a second random number; updating the first identifier according to the second random number to obtain the updated first identifier; and sending a second message carrying the updated first identifier to the second device, where the second message indicates the second device to perform authentication with the first device according to a cached result corresponding to the updated first identifier.