18536703. PRINTING DEVICE CONVERTING RECEIVED COMMAND TO POST-CONVERSION COMMAND ACCORDING TO CONVERSION RULE simplified abstract (BROTHER KOGYO KABUSHIKI KAISHA)

From WikiPatents
Revision as of 07:34, 28 June 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

PRINTING DEVICE CONVERTING RECEIVED COMMAND TO POST-CONVERSION COMMAND ACCORDING TO CONVERSION RULE

Organization Name

BROTHER KOGYO KABUSHIKI KAISHA

Inventor(s)

Yoshihiro Itogawa of Mizuho (JP)

PRINTING DEVICE CONVERTING RECEIVED COMMAND TO POST-CONVERSION COMMAND ACCORDING TO CONVERSION RULE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18536703 titled 'PRINTING DEVICE CONVERTING RECEIVED COMMAND TO POST-CONVERSION COMMAND ACCORDING TO CONVERSION RULE

Simplified Explanation: The patent application describes a system in a printing device where a controller converts received PJL commands based on stored conversion rules, but prohibits the execution of certain processes based on security concerns.

Key Features and Innovation:

  • Memory stores conversion rules for PJL commands.
  • Controller converts received PJL commands according to conversion rules.
  • Prohibits execution of processes based on security concerns.
  • Allows execution of processes based on received commands from different interfaces.

Potential Applications: This technology can be applied in various printing devices to enhance security and ensure proper execution of processes based on received commands.

Problems Solved: This technology addresses security concerns related to executing processes based on received commands, especially when received through interfaces with varying levels of security.

Benefits:

  • Enhanced security in printing devices.
  • Proper execution of processes based on received commands.
  • Flexibility in handling commands from different interfaces.

Commercial Applications: The technology can be utilized in commercial printing devices to ensure secure and accurate processing of commands, catering to businesses that prioritize data security in their printing operations.

Prior Art: Prior research in the field of printing device security and command execution processes may provide insights into similar technologies or approaches.

Frequently Updated Research: Researchers may be exploring advancements in secure printing device technologies or improved methods for handling command execution processes in similar systems.

Questions about Printing Device Security: 1. How does this technology improve security in printing devices? 2. What are the potential risks associated with executing processes based on received commands in printing devices?

By optimizing the content for SEO and providing valuable information on the technology, this article aims to educate readers on the innovative features and potential applications of the described patent application.


Original Abstract Submitted

In a printing device, when: a memory stores a conversion rule for converting a pre-conversion PJL command to a post-conversion PJL command; and a PJL command corresponding to the pre-conversion PJL command is received, a controller performs a PJL command execution process to convert the received PJL command to the post-conversion PJL command according to the conversion rule and execute a process based on the post-conversion PJL command. On a condition that a rule-targeting command to execute a rule-targeting process targeting the conversion rule is received via a LAN interface according to a first protocol not ensuring a prescribed level of security, the controller prohibits execution of the rule-targeting process based on the rule-targeting command. On a condition that the rule-targeting command is received via an interface different from the LAN interface, the controller performs the rule-targeting process based on the rule-targeting command.