18053651. INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS simplified abstract (CANON KABUSHIKI KAISHA)
INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS
Organization Name
Inventor(s)
Takahiro Yamashita of Chiba (JP)
INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18053651 titled 'INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS
Simplified Explanation
The abstract describes an information processing apparatus that verifies the validity of signatures based on supported encryption schemes. It checks if a first signature corresponding to a supported encryption scheme is valid and if a second signature corresponding to an unsupported encryption scheme is valid. If either signature is verified to be valid, the apparatus executes a program.
- The apparatus verifies the validity of signatures based on supported and unsupported encryption schemes.
- It checks if a first signature corresponding to a supported encryption scheme is valid.
- It checks if a second signature corresponding to an unsupported encryption scheme is valid.
- If either signature is verified to be valid, the apparatus executes a program.
Potential Applications
- Secure communication systems
- Digital signatures and authentication processes
- Encryption and decryption systems
Problems Solved
- Verifying the validity of signatures based on supported and unsupported encryption schemes
- Ensuring the execution of a program only when valid signatures are verified
Benefits
- Improved security in information processing
- Efficient verification of signatures
- Flexibility in supporting different encryption schemes
Original Abstract Submitted
An information processing apparatus verifies, by using a fact that a first encryption scheme is supported and a second encryption scheme is not supported, whether or not a first signature corresponding to the first encryption scheme is valid, verifies, by using a fact that the first encryption scheme is not supported and the second encryption scheme is supported, whether or not a second signature corresponding to the second encryption scheme is valid, and executes, when the first signature or the second signature is verified to be valid, a program.