Security Evaluation Method for Electronic Devices with Decryption and Signing
Summary
VIVO Mobile Communication Co., Ltd. filed US Patent Application US20260095321A1 for a security evaluation method enabling electronic devices to assess REE security status, decrypt ciphertext using root keys, and sign evaluation results using private keys. The application covers methods for secure information transmission between electronic devices and application servers.
What changed
This patent application describes a security evaluation method where an electronic device receives a security evaluation request from an application server, determines a target security evaluation result based on REE (Rich Execution Environment) security status information, decrypts a first ciphertext using the device's root key to obtain a private key, and signs the evaluation result with that private key before sending second security information back to the server.
Patent applications do not create compliance obligations for third parties. Technology companies and manufacturers developing mobile devices with security evaluation capabilities may benefit from reviewing this filing to understand VIVO's claimed technical approach to device-level security authentication and signed attestation methods.
Archived snapshot
Apr 3, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
SECURITY EVALUATION METHOD, SERVICE PROCESSING METHOD, SECURITY INFORMATION TRANSMISSION METHOD, AND RELATED DEVICE
Application US20260095321A1 Kind: A1 Apr 02, 2026
Assignee
VIVO MOBILE COMMUNICATION CO., LTD.
Inventors
Zhiyuan HU, Wendeng He
Abstract
This application provides a security evaluation method, a service processing method, a security information transmission method, and a related device. The method includes: determining a target security evaluation result based on first security information in a case that a security evaluation request sent by an application server is received, where the first security information includes security status information of an REE of an electronic device or a security evaluation result of the REE; decrypting a first ciphertext by using a root key of the electronic device, to obtain a private key of the electronic device; signing the target security evaluation result by using the private key of the electronic device, to obtain a signature of the target security evaluation result; and sending second security information to the application server.
CPC Classifications
H04L 9/14 H04L 9/3247 H04L 9/3263
Filing Date
2025-12-09
Application No.
19413120
Named provisions
Related changes
Get daily alerts for USPTO Patent Applications - Networking (H04L)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from USPTO.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when USPTO Patent Applications - Networking (H04L) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.