18511997. COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE simplified abstract (BROTHER KOGYO KABUSHIKI KAISHA)

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE

Organization Name

BROTHER KOGYO KABUSHIKI KAISHA

Inventor(s)

Hiroyuki Sasaki of Chita (JP)

COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18511997 titled 'COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE

Simplified Explanation

The abstract describes a patent application related to encrypted communication protocols and encryption schemes. The first communication device receives a setting request with second version information for the encrypted communication protocol and sends setting information with the second version information and a more secure second encryption scheme.

  • The patent application involves a system for managing encrypted communication protocols.
  • The first communication device upgrades the encryption scheme to a more secure option based on the received setting request.

Potential Applications

This technology could be applied in secure messaging applications, online banking platforms, and data transfer systems.

Problems Solved

This technology addresses the issue of using less secure encryption schemes in communication protocols, enhancing overall security.

Benefits

The benefits of this technology include improved data security, protection against cyber threats, and enhanced privacy for users.

Potential Commercial Applications

The technology could be utilized in secure messaging apps for businesses, financial institutions, and government agencies.

Possible Prior Art

One possible prior art could be the use of automatic encryption scheme upgrades in software applications to enhance security.

What are the specific encryption schemes used in this technology?

The specific encryption schemes used in this technology are not explicitly mentioned in the abstract. However, it is clear that the second encryption scheme is more secure than the first encryption scheme.

How does the first communication device determine the level of security of the encryption schemes?

The abstract does not provide details on how the first communication device determines the level of security of the encryption schemes. It would be interesting to know the criteria or algorithms used for this determination.


Original Abstract Submitted

In a case where a first communication device obtains a first setting request not including first version information indicating a first version of an encrypted communication protocol but including second version information indicating a second version of the encrypted communication protocol, the first communication device may send first setting information to a second communication device, the first setting information including the second version information and second scheme information indicating a second encryption scheme but not including first scheme information indicating a first encryption scheme which is less secure than the second encryption scheme.