18511997. COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE simplified abstract (BROTHER KOGYO KABUSHIKI KAISHA)
Contents
- 1 COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
Organization Name
BROTHER KOGYO KABUSHIKI KAISHA
Inventor(s)
COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE - A simplified explanation of the abstract
This abstract first appeared for US patent application 18511997 titled 'COMMUNICATION DEVICE AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR COMMUNICATION DEVICE
Simplified Explanation
The abstract describes a patent application related to encrypted communication protocols and encryption schemes. The first communication device receives a setting request with second version information for the encrypted communication protocol and sends setting information with the second version information and a more secure second encryption scheme.
- The patent application involves a system for managing encrypted communication protocols.
- The first communication device upgrades the encryption scheme to a more secure option based on the received setting request.
Potential Applications
This technology could be applied in secure messaging applications, online banking platforms, and data transfer systems.
Problems Solved
This technology addresses the issue of using less secure encryption schemes in communication protocols, enhancing overall security.
Benefits
The benefits of this technology include improved data security, protection against cyber threats, and enhanced privacy for users.
Potential Commercial Applications
The technology could be utilized in secure messaging apps for businesses, financial institutions, and government agencies.
Possible Prior Art
One possible prior art could be the use of automatic encryption scheme upgrades in software applications to enhance security.
What are the specific encryption schemes used in this technology?
The specific encryption schemes used in this technology are not explicitly mentioned in the abstract. However, it is clear that the second encryption scheme is more secure than the first encryption scheme.
How does the first communication device determine the level of security of the encryption schemes?
The abstract does not provide details on how the first communication device determines the level of security of the encryption schemes. It would be interesting to know the criteria or algorithms used for this determination.
Original Abstract Submitted
In a case where a first communication device obtains a first setting request not including first version information indicating a first version of an encrypted communication protocol but including second version information indicating a second version of the encrypted communication protocol, the first communication device may send first setting information to a second communication device, the first setting information including the second version information and second scheme information indicating a second encryption scheme but not including first scheme information indicating a first encryption scheme which is less secure than the second encryption scheme.