18475394. ELECTRONIC DEVICE PERFORMING PRESCRIBED OPERATION WHILE CONSUMING CONSUMABLE MOUNTED THEREIN simplified abstract (BROTHER KOGYO KABUSHIKI KAISHA)

From WikiPatents
Jump to navigation Jump to search

ELECTRONIC DEVICE PERFORMING PRESCRIBED OPERATION WHILE CONSUMING CONSUMABLE MOUNTED THEREIN

Organization Name

BROTHER KOGYO KABUSHIKI KAISHA

Inventor(s)

Yuka Hattori of Mizuho (JP)

Tetsunori Mori of Kariya (JP)

ELECTRONIC DEVICE PERFORMING PRESCRIBED OPERATION WHILE CONSUMING CONSUMABLE MOUNTED THEREIN - A simplified explanation of the abstract

This abstract first appeared for US patent application 18475394 titled 'ELECTRONIC DEVICE PERFORMING PRESCRIBED OPERATION WHILE CONSUMING CONSUMABLE MOUNTED THEREIN

Simplified Explanation

The abstract describes a patent application for an electronic device controller that acquires identification information from a consumable when it is mounted, stores this information, and permits consumption of the consumable under certain conditions. It also stores identification information from consumables mounted in other devices and allows consumption if the stored information matches.

  • The controller acquires identification information from a mounted consumable and stores it for future use.
  • It permits consumption of the consumable if certain conditions are met.
  • It can store identification information from consumables mounted in other devices and allow consumption if the stored information matches.

Potential Applications

The technology described in this patent application could be applied in various industries such as:

  • Inventory management systems
  • Smart home devices
  • Retail and point of sale systems

Problems Solved

This technology helps in:

  • Preventing unauthorized consumption of consumables
  • Streamlining the process of identifying and tracking consumables
  • Enhancing security measures in electronic devices

Benefits

The benefits of this technology include:

  • Improved efficiency in managing consumables
  • Enhanced security and control over consumable usage
  • Simplified identification and tracking processes

Potential Commercial Applications

The technology could be commercially applied in:

  • Smart appliances
  • Vending machines
  • Industrial machinery

Possible Prior Art

One possible prior art for this technology could be RFID technology used in inventory management systems to track and manage consumables.

Unanswered Questions

How does this technology impact user privacy?

This article does not address the potential privacy concerns that may arise from storing and using identification information from consumables. It would be important to consider how this technology protects user data and privacy.

What are the potential limitations of this technology in terms of scalability?

The article does not discuss the scalability of this technology, particularly in scenarios where a large number of consumables need to be tracked and managed. It would be essential to understand how this technology can handle scalability challenges.


Original Abstract Submitted

In an electronic device, a controller performs: in response to a consumable being mounted, an acquisition process to acquire identification information from the mounted consumable; and when an agreement has been concluded for the electronic device and the mounted consumable satisfies a prescribed condition: a first storage process to store the acquired identification information as first identification information; and a permission process to permit a consumption process to consume the mounted consumable. The controller further performs: a reception process to receive identification information of a consumable mounted in another electronic device; and a second storage process to store the received identification information as second identification information. When an agreement has been concluded for the electronic device, the mounted consumable does not satisfy the prescribed condition, and the acquired identification information matches one of the first identification information and the second identification information, the controller performs the permission process.