18053651. INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS simplified abstract (CANON KABUSHIKI KAISHA)

From WikiPatents
Jump to navigation Jump to search

INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS

Organization Name

CANON KABUSHIKI KAISHA

Inventor(s)

Takahiro Yamashita of Chiba (JP)

INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18053651 titled 'INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS

Simplified Explanation

The abstract describes an information processing apparatus that verifies the validity of signatures based on supported encryption schemes. It checks if a first signature corresponding to a supported encryption scheme is valid and if a second signature corresponding to an unsupported encryption scheme is valid. If either signature is verified to be valid, the apparatus executes a program.

  • The apparatus verifies the validity of signatures based on supported and unsupported encryption schemes.
  • It checks if a first signature corresponding to a supported encryption scheme is valid.
  • It checks if a second signature corresponding to an unsupported encryption scheme is valid.
  • If either signature is verified to be valid, the apparatus executes a program.

Potential Applications

  • Secure communication systems
  • Digital signatures and authentication processes
  • Encryption and decryption systems

Problems Solved

  • Verifying the validity of signatures based on supported and unsupported encryption schemes
  • Ensuring the execution of a program only when valid signatures are verified

Benefits

  • Improved security in information processing
  • Efficient verification of signatures
  • Flexibility in supporting different encryption schemes


Original Abstract Submitted

An information processing apparatus verifies, by using a fact that a first encryption scheme is supported and a second encryption scheme is not supported, whether or not a first signature corresponding to the first encryption scheme is valid, verifies, by using a fact that the first encryption scheme is not supported and the second encryption scheme is supported, whether or not a second signature corresponding to the second encryption scheme is valid, and executes, when the first signature or the second signature is verified to be valid, a program.