CN104372541B - Illegal using method prevented by a kind of embroidery machine version band - Google Patents
Illegal using method prevented by a kind of embroidery machine version band Download PDFInfo
- Publication number
- CN104372541B CN104372541B CN201410571178.1A CN201410571178A CN104372541B CN 104372541 B CN104372541 B CN 104372541B CN 201410571178 A CN201410571178 A CN 201410571178A CN 104372541 B CN104372541 B CN 104372541B
- Authority
- CN
- China
- Prior art keywords
- machine
- band
- version
- version band
- embroidery
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- D—TEXTILES; PAPER
- D05—SEWING; EMBROIDERING; TUFTING
- D05C—EMBROIDERING; TUFTING
- D05C5/00—Embroidering machines with arrangements for automatic control of a series of individual steps
- D05C5/02—Embroidering machines with arrangements for automatic control of a series of individual steps by electrical or magnetic control devices
-
- D—TEXTILES; PAPER
- D05—SEWING; EMBROIDERING; TUFTING
- D05C—EMBROIDERING; TUFTING
- D05C13/00—Auxiliary devices incorporated in embroidering machines, not otherwise provided for; Ancillary apparatus for use with embroidering machines
- D05C13/02—Counting, measuring, indicating, warning, or safety devices
Landscapes
- Engineering & Computer Science (AREA)
- Textile Engineering (AREA)
- Sewing Machines And Sewing (AREA)
Abstract
Illegal using method prevented by the open a kind of embroidery machine version band of the present invention, uses the computer embroidering machine of version band to have unique private and PKI, and private key is cryptographically stored in computerized embroidery Electrical Control, and PKI random device is supplied to user;Embroidery machine unique public is supplied to an edition band owner by computer embroidering machine user, and the version band owner is by version band write restriction of production data and utilizes this public key encryption and is sent to computer embroidering machine user;After computer embroidering machine user receives encrypted version band data, version band being read in specified machine, computerized embroidery Electrical Control performs embroidery after utilizing private key deciphering version band success.The version band that can make design can not be used by random bootlegging; and can arrange and the access times authorizing price to adapt during authorizing legal use; can effectively protect edition rights and interests of band designer, it is also ensured that user buys flexibly, improve the purchase intention of buyer.
Description
Technical field
The invention belongs to computer embroidering machine field, illegally make particularly to a kind of embroidery machine version band is anti-
Method.
Background technology
Computer embroidering machine version band is ordinary file (.dst .emb etc.) at present, and its content describes
Computer embroidering machine produces the production stage needed for this design embroidery, including needle tracking, colour changing, special
Instruction code etc..This document can be copied freely and disseminate at present, and can be at computer embroidering machine
On carry out unrestricted production and application.
The computer embroidering machine version band certain specialized techniques personnel of needs take a significant amount of time and carry out
Design, and a good version band needs repeatedly to try embroider into and embroider effect repeatedly according to examination
Amendment can be only achieved good embroidery effect.Its work is similar to artistic creation.And these a large amount of works
The result made the most all is embodied in computer embroidering machine version tape file.Owing to this document can be by arbitrarily
Replicate and unrestrictedly produce on machine, the most once spreading, it may be difficult to guarantee designer
Member's due income of acquisition, and injure the creation enthusiasm of designer the most at last, or greatly
Limit the application of embroidery version band, the final sound development affecting whole industry.
In that case, cause high-quality version band to be difficult to obtain, or price is high, or
Of poor quality, or version band is the most out-of-date.
Owing to version band can arbitrarily replicate, unrestrictedly produce, beat version personnel's rights and interests and cannot be protected
Barrier, it is impossible to give full play to beat the enthusiasm of version personnel.On the other hand, in order to cost-recovering,
Newly-designed high-quality version band price is high, needs the abundant time to carry out repeatedly bootlegging
Just can gradually reduce price, the most greatly upset and limit edition development in band market.The most logical
Cross version band that improper means obtains owing to not paying corresponding version band expense, thus cause phase
Lower production cost is produced for regular purchase version band, finally promotes illegal circulation means climing
Prolong.
United States Patent (USP) 5924372 provides a kind of invention for limiting style embroidery number of times, its
It is used for protecting style by special ROM storage style, calculates embroidery number of times by embroidery machine
Determine whether normally to embroider.It is stored in special ROM although the method can limit
The embroidery number of times of style, but the program is necessarily dependent upon special media, for the transmission of style
Bring inconvenience, also cannot be carried out by network, therefore strongly limit the application of the method.
Summary of the invention
The present invention provides a kind of embroidery machine version band to prevent illegal using method, can make the version band of design
Can not be used by random bootlegging, and can authorize arrange during legal use with
The access times authorizing price to adapt, can effectively protect edition rights and interests of band designer, it is possible to
To ensure that user buys flexibly, improve the purchase intention of buyer.
The present invention is realized by techniques below means:
Illegal using method prevented by a kind of embroidery machine version band, comprises the steps of
S1, uses the computer embroidering machine of version band to have unique private and PKI, and private key cryptographically stores up
Existing in computerized embroidery Electrical Control, PKI random device is supplied to user;
S2, embroidery machine unique public is supplied to an edition band owner by computer embroidering machine user, and version band owns
Person is by version band write restriction of production data and utilizes this public key encryption and is sent to computer embroidering machine
User;
S3, after computer embroidering machine user receives encrypted version band data, reads in specified machine, electricity by version band
Brain embroidery machine is automatically controlled utilizes private key to perform embroidery after deciphering the success of version band.
Wherein, described version band restricted information is to limit information or the restriction spy that particular machine uses
Determine machine and use the information of specific times, use, at other when described version band limits particular machine
Machine cannot normally identify;When version band not only limits particular machine use but also limits making of particular machine
When using number of times, described machine performs after the number of times of described version band is performed, this edition band without
Method continues to use.
Wherein, it is not only to limit particular machine but also limit the access times of particular machine when described version band
Time, the version band that write allows access times is used together computer together with the possessory PKI of version band
The public key encryption of embroidery machine is sent to computer embroidering machine user;After computer embroidering machine deciphering version band then
Generating a random code, described random code generates secondary after using version band owner's public key encryption
Authentication file sends back to an edition band owner;After the version band owner receives described secondary authentication file
Utilize the private key decrypted random code of oneself, be then sent to computer embroidering machine user;Embroidery machine is used
The random code input computer embroidering machine that family will receive, the automatically controlled comparison of embroidery machine is errorless then will perform life
Produce;If contrasting inconsistent, then it is assumed that be that computer embroidering machine user does not receives the two of designer
Secondary authentication, it will again produce new random code, it is desirable to proceed secondary authentication.
Wherein, version information and the random code information of described encryption can be joined by computer embroidering machine
Physical medium transport under net transmission or line.
Finally, described PKI is computer embroidering machine unique machine identification code, and described PKI is available for
The version band owner to production of machinery manufacturer or automatically controlled production firm inquire about with guarantee this PKI not by
Forge.
Illegal using method prevented by the version band of implementation above, can stop an edition band illegal circulation, it is to avoid
Unrestrictedly replicating and produce version band and damage designer's rights and interests, also avoiding because embroidering quantity
Number causes producers to spend but embroidery quantity is few or flower under-buy version
Carry but produce in a large number;So that the design cost of version band can with in Cost Allocation to sampler,
Ensure that the dual interests of designer and producers;Edition band designer and a Sheng can be improved
The enthusiasm of product personnel, lifting version band designing quality and embroidery quality, specification computerized embroidery market,
Promote that it develops in a healthy way.
Accompanying drawing explanation
Fig. 1 be version band prevent illegal using method realize process schematic.
Detailed description of the invention
Below with reference to accompanying drawing, the specific implementation process of the present invention is described in detail.
Illegal using method prevented by a kind of embroidery machine version band, uses the computer embroidering machine of version band to have only
One private key and PKI, it is automatically controlled interior that private key is cryptographically stored in machine, and PKI random device provides
To user, in general, the machine exclusive identification code being provided with by computer embroidering machine is as computer embroidery
The PKI of embroidery machine, this PKI is sold with computer embroidering machine and is supplied to user in the lump;Embroidery machine user
Embroidery machine unique public is supplied to an edition band owner, can be by the open inquiry of Web Publishing
Mode, it is also possible to point-to-point be supplied to an edition band owner;In order to protect edition band designer or a version
Carrying proprietary interests, it is to avoid the unconfined use of version band, when version band is sold, version band owns
Person is by version band write restriction of production data and utilizes the computer embroidering machine PKI of edition band purchaser to add
Close and be sent to computer embroidering machine user;Described restriction of production data can be to limit specific machine
The data that device uses, it is also possible to use the data of restriction number of times, computer embroidery for limiting particular machine
After embroidery machine user receives encrypted version band data, after utilizing the deciphering version band success of computer embroidering machine private key
Version band is loaded into specific computer embroidering machine, and described computer embroidering machine could perform embroidery.This
Sample can accomplish the quantified controlling version band purchaser usage amount to version band, also allows for version band further
The owner carries out arm's length pricing according to the usage amount of version band purchaser, for less the purchasing of output
Buyer is priced low, height of fixing a price for the purchaser that output is big, as Cost Allocation cost, makes
It is strong that middle-size and small-size user also can buy the version band of high quality design, beneficially industry with reasonable price
Kang Fazhan.
When described version band is the version not only having limited the access times using machine but also limit described machine
During band, after using up in order to avoid version band write number of times, version band buyer is by again filling after unloading
Carry the mode used and carry out the illegal use of version band, limit described version band and decipher when being performed every time
Need a secondary authentication random number provided by the version band owner could perform version band.If
It is not intended to access times, only limits the version band of specific use machine, then without carrying out above-mentioned secondary
Authentication process.
Specifically, as it is shown in figure 1, version carries everyone or version band designer to close in version band
Become version band to limit use information and version carries everyone PKI, then use the computer of pending version band
Version band composite signal described in the public key encryption of embroidery machine is also sent to the computer of pending version band
Embroidery machine, after embroidery machine is deciphered by private key, embroidery machine detects that the restriction of version band uses information,
Then after generating a random code and using version with everyone or the public key encryption of version band designer
Beaming back version carries everyone or version band designer to carry out secondary authentication, and version carries everyone or the design of version band
People is sent to described embroidery machine, described computer embroidery after random code being deciphered with the private key of oneself
Decrypted random code described in the input of embroidery machine, the errorless edition band that can normally perform of comparison produces;
If contrasting inconsistent, then it is assumed that be computer embroidering machine user do not receive designer secondary mirror
Power, it will again produce new random code, it is desirable to proceed secondary authentication.If it is described
Computer embroidering machine is networking work, then described secondary authentication file can be automatic by internet
Authentication completes, if described embroidery machine is state under line, described secondary authentication file is permissible
Complete by manual operation and by other physical medium transport.
By above method, the machine one_to_one corresponding of version band and use version band can be made, also
The quantization that can preferably control version band uses, and facilitates version band designer or version to carry everyone right
Version band carries out arm's length pricing, meets the purchasing demand of the purchaser of various usage amount, both protected
Version band designer or the proprietary interests of version band, also protect the sound development of embroidery industry.
Above-described version carries everyone or version band designer to refer to have the right to replicate also to version band
To replicating the people enjoying proprietary.
The present invention is carried out the scheme of simple change gained also within the scope of protection of the invention.
Claims (5)
1. an illegal using method prevented by embroidery machine version band, comprises the steps of
S1, uses the computer embroidering machine of version band to have unique private and PKI, and private key cryptographically stores up
Existing in computerized embroidery Electrical Control, PKI random device is supplied to user;
S2, embroidery machine unique public is supplied to an edition band owner by embroidery machine user, and the version band owner will
Version band write is sent to computer embroidering machine user after limiting data and utilizing this public key encryption;
S3, after computer embroidering machine user receives encrypted version band data, reads in specified machine, thorn by version band
Embroider after Electrical Control utilizes private key deciphering version band success and version band is loaded into computer embroidering machine, computerized embroidery
Machine performs embroidery.
The anti-illegal method used of embroidery machine version band the most according to claim 1, its feature exists
In: described version band restricted information is to limit particular machine to use information or the restriction of described version band
Particular machine uses the information of described version band specific times, makes when described version band limits particular machine
With, cannot normally identify at other machines;When version band not only limits particular machine but also limit specific machine
During the access times of device, described machine performs after the number of times of described version band is performed, should
Version band cannot continue to use.
The anti-illegal method used of embroidery machine version band the most according to claim 2, its feature exists
In: when described version band is not only to have limited particular machine but also limited the access times of particular machine, will
Write allows the version band of access times to be used together computerized embroidery together with the possessory PKI of version band
The public key encryption of machine is sent to computer embroidering machine user;Then generate after computer embroidering machine deciphering version band
One random code, described random code generates secondary authentication after using version band owner's public key encryption
File sends back to an edition band owner;The version band owner utilizes after receiving described secondary authentication file
The private key decrypted random code of oneself, is then sent to computer embroidering machine user;Embroidery machine user will
The random code input computer embroidering machine received, the automatically controlled comparison of embroidery machine is errorless then will perform production;
If contrasting inconsistent, then it is assumed that be computer embroidering machine user do not receive designer secondary mirror
Power, it will again produce new random code, it is desirable to proceed secondary authentication.
The anti-illegal method used of embroidery machine version band the most according to claim 3, its feature exists
In: the version information of described encryption and random code information can pass through computer embroidering machine networking transport
Or physical medium transport under line.
The anti-illegal method used of embroidery machine version band the most according to claim 1, its feature exists
In: described PKI is computer embroidering machine unique machine identification code.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410571178.1A CN104372541B (en) | 2014-10-23 | 2014-10-23 | Illegal using method prevented by a kind of embroidery machine version band |
PCT/CN2015/073398 WO2016061969A1 (en) | 2014-10-23 | 2015-02-28 | Illegal use prevention method of pattern band of embroidery machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410571178.1A CN104372541B (en) | 2014-10-23 | 2014-10-23 | Illegal using method prevented by a kind of embroidery machine version band |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104372541A CN104372541A (en) | 2015-02-25 |
CN104372541B true CN104372541B (en) | 2016-08-24 |
Family
ID=52551722
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410571178.1A Expired - Fee Related CN104372541B (en) | 2014-10-23 | 2014-10-23 | Illegal using method prevented by a kind of embroidery machine version band |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104372541B (en) |
WO (1) | WO2016061969A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104372541B (en) * | 2014-10-23 | 2016-08-24 | 深圳思瑞普科技有限公司 | Illegal using method prevented by a kind of embroidery machine version band |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5791270A (en) * | 1995-12-20 | 1998-08-11 | Brother Kogyo Kabushiki Kaisha | Sewing data processing device with data editing function |
US5826526A (en) * | 1996-11-19 | 1998-10-27 | Brother Kogyo Kabushiki Kaisha | Sewing machine |
US5865134A (en) * | 1997-03-28 | 1999-02-02 | Brother Kogyo Kabushiki Kaisha | Sewing data converting device for sewing machine |
US5924372A (en) * | 1997-03-11 | 1999-07-20 | Brother Kogyo Kabushiki Kaisha | Embroidery data processing device for sewing machine including means for limiting repeated use of embroidery data |
US6176189B1 (en) * | 1999-07-05 | 2001-01-23 | Brother Kogyo Kabushiki Kaisha | Sewing machine having a non-volatile memory |
US6196146B1 (en) * | 2000-03-23 | 2001-03-06 | Pulse Microsystems Ltd. | Web based embroidery system and method |
US6216618B1 (en) * | 2000-04-07 | 2001-04-17 | Pulse Microsystems Ltd. | Embroidery system utilizing windows CE based GUI |
CN104539654A (en) * | 2014-12-05 | 2015-04-22 | 江苏大学 | Personal data filling system solving method based on privacy protection |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1176663A (en) * | 1997-09-08 | 1999-03-23 | Brother Ind Ltd | Embroidery system with communication function |
CN1157914C (en) * | 2000-04-04 | 2004-07-14 | 日星特殊精密株式会社 | Diagnostic system and method for fault diagnosis of embroidering machine |
JP2008097577A (en) * | 2006-09-13 | 2008-04-24 | Brother Ind Ltd | Software distribution system for sewing machine, sewing machine and computer readable recording medium |
US7920939B2 (en) * | 2006-09-30 | 2011-04-05 | Vistaprint Technologies Limited | Method and system for creating and manipulating embroidery designs over a wide area network |
FR2923627B1 (en) * | 2007-11-08 | 2013-08-30 | Siemens Vdo Automotive | METHOD FOR UNLOCKING A MOTOR CONTROL COMPUTER |
CN102079167A (en) * | 2010-11-01 | 2011-06-01 | 天津伟力捷包装设备有限公司 | Ink jet printer circuit with remote control function |
CN201950970U (en) * | 2010-11-01 | 2011-08-31 | 天津伟力捷包装设备有限公司 | Ink jet printer circuit with remote control function |
CN102182024A (en) * | 2011-05-03 | 2011-09-14 | 惠州神田精密机械有限公司 | Computer embroidery process |
CN102978843A (en) * | 2011-09-06 | 2013-03-20 | 天津宝盈电脑机械有限公司 | Processing method for double sequin pattern version of embroidery machine |
CN104372541B (en) * | 2014-10-23 | 2016-08-24 | 深圳思瑞普科技有限公司 | Illegal using method prevented by a kind of embroidery machine version band |
-
2014
- 2014-10-23 CN CN201410571178.1A patent/CN104372541B/en not_active Expired - Fee Related
-
2015
- 2015-02-28 WO PCT/CN2015/073398 patent/WO2016061969A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5791270A (en) * | 1995-12-20 | 1998-08-11 | Brother Kogyo Kabushiki Kaisha | Sewing data processing device with data editing function |
US5826526A (en) * | 1996-11-19 | 1998-10-27 | Brother Kogyo Kabushiki Kaisha | Sewing machine |
US5924372A (en) * | 1997-03-11 | 1999-07-20 | Brother Kogyo Kabushiki Kaisha | Embroidery data processing device for sewing machine including means for limiting repeated use of embroidery data |
US5865134A (en) * | 1997-03-28 | 1999-02-02 | Brother Kogyo Kabushiki Kaisha | Sewing data converting device for sewing machine |
US6176189B1 (en) * | 1999-07-05 | 2001-01-23 | Brother Kogyo Kabushiki Kaisha | Sewing machine having a non-volatile memory |
US6196146B1 (en) * | 2000-03-23 | 2001-03-06 | Pulse Microsystems Ltd. | Web based embroidery system and method |
US6216618B1 (en) * | 2000-04-07 | 2001-04-17 | Pulse Microsystems Ltd. | Embroidery system utilizing windows CE based GUI |
CN104539654A (en) * | 2014-12-05 | 2015-04-22 | 江苏大学 | Personal data filling system solving method based on privacy protection |
Also Published As
Publication number | Publication date |
---|---|
WO2016061969A1 (en) | 2016-04-28 |
CN104372541A (en) | 2015-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20070088105A (en) | Apparatus and method for digital rights management | |
CN108599930A (en) | Firmware encrypting and deciphering system and method | |
CN103294496B (en) | Programming system | |
CN103782538A (en) | Authenticator | |
CN104463026B (en) | A kind of system and method for the anti-flight of hardware | |
WO2001042888A1 (en) | Portable authorization device for authorizing use of protected information and associated method | |
CN107341368A (en) | Licensing effective time method of calibration and device | |
CN101562040A (en) | High-security mobile memory and data processing method thereof | |
CN107534559B (en) | The method of dialogue-based watermark for media content | |
JP2012248178A (en) | Secure removable media and method for managing the same | |
US11218322B2 (en) | System and method for reconfiguring and deploying soft stock-keeping units | |
US8522351B2 (en) | Production security control apparatus for software products and control method thereof | |
CN104573536A (en) | File protection method and device | |
CN201185082Y (en) | Mobile memory with high safety | |
AU778380B2 (en) | Portable authorization device for authorizing use of protected information and associated method | |
NG et al. | Interactive clothes based on IOT using NFC and Mobile Application | |
CN104372541B (en) | Illegal using method prevented by a kind of embroidery machine version band | |
JP5164372B2 (en) | Game machine control chip and its ROM writer | |
CN102122336A (en) | Method, equipment and system for encrypting and decrypting game protection | |
CN101826141A (en) | Information processing device, data recording system, information processing method and program | |
CN103186723A (en) | Digital content security cooperation method and system | |
KR100524176B1 (en) | Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone | |
CN107925574A (en) | The safe programming of secret data | |
CN106056726B (en) | It is a kind of can two-way authentication CPU card access-control card reader safety certifying method | |
CN105354462B (en) | A kind of guard method of mobile memory and mobile memory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160824 Termination date: 20181023 |
|
CF01 | Termination of patent right due to non-payment of annual fee |