CN104372541B - Illegal using method prevented by a kind of embroidery machine version band - Google Patents

Illegal using method prevented by a kind of embroidery machine version band Download PDF

Info

Publication number
CN104372541B
CN104372541B CN201410571178.1A CN201410571178A CN104372541B CN 104372541 B CN104372541 B CN 104372541B CN 201410571178 A CN201410571178 A CN 201410571178A CN 104372541 B CN104372541 B CN 104372541B
Authority
CN
China
Prior art keywords
machine
band
version
version band
embroidery
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410571178.1A
Other languages
Chinese (zh)
Other versions
CN104372541A (en
Inventor
朱阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SOLARPEX TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN SOLARPEX TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SOLARPEX TECHNOLOGY Co Ltd filed Critical SHENZHEN SOLARPEX TECHNOLOGY Co Ltd
Priority to CN201410571178.1A priority Critical patent/CN104372541B/en
Publication of CN104372541A publication Critical patent/CN104372541A/en
Priority to PCT/CN2015/073398 priority patent/WO2016061969A1/en
Application granted granted Critical
Publication of CN104372541B publication Critical patent/CN104372541B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • DTEXTILES; PAPER
    • D05SEWING; EMBROIDERING; TUFTING
    • D05CEMBROIDERING; TUFTING
    • D05C5/00Embroidering machines with arrangements for automatic control of a series of individual steps
    • D05C5/02Embroidering machines with arrangements for automatic control of a series of individual steps by electrical or magnetic control devices
    • DTEXTILES; PAPER
    • D05SEWING; EMBROIDERING; TUFTING
    • D05CEMBROIDERING; TUFTING
    • D05C13/00Auxiliary devices incorporated in embroidering machines, not otherwise provided for; Ancillary apparatus for use with embroidering machines
    • D05C13/02Counting, measuring, indicating, warning, or safety devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Textile Engineering (AREA)
  • Sewing Machines And Sewing (AREA)

Abstract

Illegal using method prevented by the open a kind of embroidery machine version band of the present invention, uses the computer embroidering machine of version band to have unique private and PKI, and private key is cryptographically stored in computerized embroidery Electrical Control, and PKI random device is supplied to user;Embroidery machine unique public is supplied to an edition band owner by computer embroidering machine user, and the version band owner is by version band write restriction of production data and utilizes this public key encryption and is sent to computer embroidering machine user;After computer embroidering machine user receives encrypted version band data, version band being read in specified machine, computerized embroidery Electrical Control performs embroidery after utilizing private key deciphering version band success.The version band that can make design can not be used by random bootlegging; and can arrange and the access times authorizing price to adapt during authorizing legal use; can effectively protect edition rights and interests of band designer, it is also ensured that user buys flexibly, improve the purchase intention of buyer.

Description

Illegal using method prevented by a kind of embroidery machine version band
Technical field
The invention belongs to computer embroidering machine field, illegally make particularly to a kind of embroidery machine version band is anti- Method.
Background technology
Computer embroidering machine version band is ordinary file (.dst .emb etc.) at present, and its content describes Computer embroidering machine produces the production stage needed for this design embroidery, including needle tracking, colour changing, special Instruction code etc..This document can be copied freely and disseminate at present, and can be at computer embroidering machine On carry out unrestricted production and application.
The computer embroidering machine version band certain specialized techniques personnel of needs take a significant amount of time and carry out Design, and a good version band needs repeatedly to try embroider into and embroider effect repeatedly according to examination Amendment can be only achieved good embroidery effect.Its work is similar to artistic creation.And these a large amount of works The result made the most all is embodied in computer embroidering machine version tape file.Owing to this document can be by arbitrarily Replicate and unrestrictedly produce on machine, the most once spreading, it may be difficult to guarantee designer Member's due income of acquisition, and injure the creation enthusiasm of designer the most at last, or greatly Limit the application of embroidery version band, the final sound development affecting whole industry.
In that case, cause high-quality version band to be difficult to obtain, or price is high, or Of poor quality, or version band is the most out-of-date.
Owing to version band can arbitrarily replicate, unrestrictedly produce, beat version personnel's rights and interests and cannot be protected Barrier, it is impossible to give full play to beat the enthusiasm of version personnel.On the other hand, in order to cost-recovering, Newly-designed high-quality version band price is high, needs the abundant time to carry out repeatedly bootlegging Just can gradually reduce price, the most greatly upset and limit edition development in band market.The most logical Cross version band that improper means obtains owing to not paying corresponding version band expense, thus cause phase Lower production cost is produced for regular purchase version band, finally promotes illegal circulation means climing Prolong.
United States Patent (USP) 5924372 provides a kind of invention for limiting style embroidery number of times, its It is used for protecting style by special ROM storage style, calculates embroidery number of times by embroidery machine Determine whether normally to embroider.It is stored in special ROM although the method can limit The embroidery number of times of style, but the program is necessarily dependent upon special media, for the transmission of style Bring inconvenience, also cannot be carried out by network, therefore strongly limit the application of the method.
Summary of the invention
The present invention provides a kind of embroidery machine version band to prevent illegal using method, can make the version band of design Can not be used by random bootlegging, and can authorize arrange during legal use with The access times authorizing price to adapt, can effectively protect edition rights and interests of band designer, it is possible to To ensure that user buys flexibly, improve the purchase intention of buyer.
The present invention is realized by techniques below means:
Illegal using method prevented by a kind of embroidery machine version band, comprises the steps of
S1, uses the computer embroidering machine of version band to have unique private and PKI, and private key cryptographically stores up Existing in computerized embroidery Electrical Control, PKI random device is supplied to user;
S2, embroidery machine unique public is supplied to an edition band owner by computer embroidering machine user, and version band owns Person is by version band write restriction of production data and utilizes this public key encryption and is sent to computer embroidering machine User;
S3, after computer embroidering machine user receives encrypted version band data, reads in specified machine, electricity by version band Brain embroidery machine is automatically controlled utilizes private key to perform embroidery after deciphering the success of version band.
Wherein, described version band restricted information is to limit information or the restriction spy that particular machine uses Determine machine and use the information of specific times, use, at other when described version band limits particular machine Machine cannot normally identify;When version band not only limits particular machine use but also limits making of particular machine When using number of times, described machine performs after the number of times of described version band is performed, this edition band without Method continues to use.
Wherein, it is not only to limit particular machine but also limit the access times of particular machine when described version band Time, the version band that write allows access times is used together computer together with the possessory PKI of version band The public key encryption of embroidery machine is sent to computer embroidering machine user;After computer embroidering machine deciphering version band then Generating a random code, described random code generates secondary after using version band owner's public key encryption Authentication file sends back to an edition band owner;After the version band owner receives described secondary authentication file Utilize the private key decrypted random code of oneself, be then sent to computer embroidering machine user;Embroidery machine is used The random code input computer embroidering machine that family will receive, the automatically controlled comparison of embroidery machine is errorless then will perform life Produce;If contrasting inconsistent, then it is assumed that be that computer embroidering machine user does not receives the two of designer Secondary authentication, it will again produce new random code, it is desirable to proceed secondary authentication.
Wherein, version information and the random code information of described encryption can be joined by computer embroidering machine Physical medium transport under net transmission or line.
Finally, described PKI is computer embroidering machine unique machine identification code, and described PKI is available for The version band owner to production of machinery manufacturer or automatically controlled production firm inquire about with guarantee this PKI not by Forge.
Illegal using method prevented by the version band of implementation above, can stop an edition band illegal circulation, it is to avoid Unrestrictedly replicating and produce version band and damage designer's rights and interests, also avoiding because embroidering quantity Number causes producers to spend but embroidery quantity is few or flower under-buy version Carry but produce in a large number;So that the design cost of version band can with in Cost Allocation to sampler, Ensure that the dual interests of designer and producers;Edition band designer and a Sheng can be improved The enthusiasm of product personnel, lifting version band designing quality and embroidery quality, specification computerized embroidery market, Promote that it develops in a healthy way.
Accompanying drawing explanation
Fig. 1 be version band prevent illegal using method realize process schematic.
Detailed description of the invention
Below with reference to accompanying drawing, the specific implementation process of the present invention is described in detail.
Illegal using method prevented by a kind of embroidery machine version band, uses the computer embroidering machine of version band to have only One private key and PKI, it is automatically controlled interior that private key is cryptographically stored in machine, and PKI random device provides To user, in general, the machine exclusive identification code being provided with by computer embroidering machine is as computer embroidery The PKI of embroidery machine, this PKI is sold with computer embroidering machine and is supplied to user in the lump;Embroidery machine user Embroidery machine unique public is supplied to an edition band owner, can be by the open inquiry of Web Publishing Mode, it is also possible to point-to-point be supplied to an edition band owner;In order to protect edition band designer or a version Carrying proprietary interests, it is to avoid the unconfined use of version band, when version band is sold, version band owns Person is by version band write restriction of production data and utilizes the computer embroidering machine PKI of edition band purchaser to add Close and be sent to computer embroidering machine user;Described restriction of production data can be to limit specific machine The data that device uses, it is also possible to use the data of restriction number of times, computer embroidery for limiting particular machine After embroidery machine user receives encrypted version band data, after utilizing the deciphering version band success of computer embroidering machine private key Version band is loaded into specific computer embroidering machine, and described computer embroidering machine could perform embroidery.This Sample can accomplish the quantified controlling version band purchaser usage amount to version band, also allows for version band further The owner carries out arm's length pricing according to the usage amount of version band purchaser, for less the purchasing of output Buyer is priced low, height of fixing a price for the purchaser that output is big, as Cost Allocation cost, makes It is strong that middle-size and small-size user also can buy the version band of high quality design, beneficially industry with reasonable price Kang Fazhan.
When described version band is the version not only having limited the access times using machine but also limit described machine During band, after using up in order to avoid version band write number of times, version band buyer is by again filling after unloading Carry the mode used and carry out the illegal use of version band, limit described version band and decipher when being performed every time Need a secondary authentication random number provided by the version band owner could perform version band.If It is not intended to access times, only limits the version band of specific use machine, then without carrying out above-mentioned secondary Authentication process.
Specifically, as it is shown in figure 1, version carries everyone or version band designer to close in version band Become version band to limit use information and version carries everyone PKI, then use the computer of pending version band Version band composite signal described in the public key encryption of embroidery machine is also sent to the computer of pending version band Embroidery machine, after embroidery machine is deciphered by private key, embroidery machine detects that the restriction of version band uses information, Then after generating a random code and using version with everyone or the public key encryption of version band designer Beaming back version carries everyone or version band designer to carry out secondary authentication, and version carries everyone or the design of version band People is sent to described embroidery machine, described computer embroidery after random code being deciphered with the private key of oneself Decrypted random code described in the input of embroidery machine, the errorless edition band that can normally perform of comparison produces; If contrasting inconsistent, then it is assumed that be computer embroidering machine user do not receive designer secondary mirror Power, it will again produce new random code, it is desirable to proceed secondary authentication.If it is described Computer embroidering machine is networking work, then described secondary authentication file can be automatic by internet Authentication completes, if described embroidery machine is state under line, described secondary authentication file is permissible Complete by manual operation and by other physical medium transport.
By above method, the machine one_to_one corresponding of version band and use version band can be made, also The quantization that can preferably control version band uses, and facilitates version band designer or version to carry everyone right Version band carries out arm's length pricing, meets the purchasing demand of the purchaser of various usage amount, both protected Version band designer or the proprietary interests of version band, also protect the sound development of embroidery industry.
Above-described version carries everyone or version band designer to refer to have the right to replicate also to version band To replicating the people enjoying proprietary.
The present invention is carried out the scheme of simple change gained also within the scope of protection of the invention.

Claims (5)

1. an illegal using method prevented by embroidery machine version band, comprises the steps of
S1, uses the computer embroidering machine of version band to have unique private and PKI, and private key cryptographically stores up Existing in computerized embroidery Electrical Control, PKI random device is supplied to user;
S2, embroidery machine unique public is supplied to an edition band owner by embroidery machine user, and the version band owner will Version band write is sent to computer embroidering machine user after limiting data and utilizing this public key encryption;
S3, after computer embroidering machine user receives encrypted version band data, reads in specified machine, thorn by version band Embroider after Electrical Control utilizes private key deciphering version band success and version band is loaded into computer embroidering machine, computerized embroidery Machine performs embroidery.
The anti-illegal method used of embroidery machine version band the most according to claim 1, its feature exists In: described version band restricted information is to limit particular machine to use information or the restriction of described version band Particular machine uses the information of described version band specific times, makes when described version band limits particular machine With, cannot normally identify at other machines;When version band not only limits particular machine but also limit specific machine During the access times of device, described machine performs after the number of times of described version band is performed, should Version band cannot continue to use.
The anti-illegal method used of embroidery machine version band the most according to claim 2, its feature exists In: when described version band is not only to have limited particular machine but also limited the access times of particular machine, will Write allows the version band of access times to be used together computerized embroidery together with the possessory PKI of version band The public key encryption of machine is sent to computer embroidering machine user;Then generate after computer embroidering machine deciphering version band One random code, described random code generates secondary authentication after using version band owner's public key encryption File sends back to an edition band owner;The version band owner utilizes after receiving described secondary authentication file The private key decrypted random code of oneself, is then sent to computer embroidering machine user;Embroidery machine user will The random code input computer embroidering machine received, the automatically controlled comparison of embroidery machine is errorless then will perform production; If contrasting inconsistent, then it is assumed that be computer embroidering machine user do not receive designer secondary mirror Power, it will again produce new random code, it is desirable to proceed secondary authentication.
The anti-illegal method used of embroidery machine version band the most according to claim 3, its feature exists In: the version information of described encryption and random code information can pass through computer embroidering machine networking transport Or physical medium transport under line.
The anti-illegal method used of embroidery machine version band the most according to claim 1, its feature exists In: described PKI is computer embroidering machine unique machine identification code.
CN201410571178.1A 2014-10-23 2014-10-23 Illegal using method prevented by a kind of embroidery machine version band Expired - Fee Related CN104372541B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410571178.1A CN104372541B (en) 2014-10-23 2014-10-23 Illegal using method prevented by a kind of embroidery machine version band
PCT/CN2015/073398 WO2016061969A1 (en) 2014-10-23 2015-02-28 Illegal use prevention method of pattern band of embroidery machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410571178.1A CN104372541B (en) 2014-10-23 2014-10-23 Illegal using method prevented by a kind of embroidery machine version band

Publications (2)

Publication Number Publication Date
CN104372541A CN104372541A (en) 2015-02-25
CN104372541B true CN104372541B (en) 2016-08-24

Family

ID=52551722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410571178.1A Expired - Fee Related CN104372541B (en) 2014-10-23 2014-10-23 Illegal using method prevented by a kind of embroidery machine version band

Country Status (2)

Country Link
CN (1) CN104372541B (en)
WO (1) WO2016061969A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104372541B (en) * 2014-10-23 2016-08-24 深圳思瑞普科技有限公司 Illegal using method prevented by a kind of embroidery machine version band

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5791270A (en) * 1995-12-20 1998-08-11 Brother Kogyo Kabushiki Kaisha Sewing data processing device with data editing function
US5826526A (en) * 1996-11-19 1998-10-27 Brother Kogyo Kabushiki Kaisha Sewing machine
US5865134A (en) * 1997-03-28 1999-02-02 Brother Kogyo Kabushiki Kaisha Sewing data converting device for sewing machine
US5924372A (en) * 1997-03-11 1999-07-20 Brother Kogyo Kabushiki Kaisha Embroidery data processing device for sewing machine including means for limiting repeated use of embroidery data
US6176189B1 (en) * 1999-07-05 2001-01-23 Brother Kogyo Kabushiki Kaisha Sewing machine having a non-volatile memory
US6196146B1 (en) * 2000-03-23 2001-03-06 Pulse Microsystems Ltd. Web based embroidery system and method
US6216618B1 (en) * 2000-04-07 2001-04-17 Pulse Microsystems Ltd. Embroidery system utilizing windows CE based GUI
CN104539654A (en) * 2014-12-05 2015-04-22 江苏大学 Personal data filling system solving method based on privacy protection

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1176663A (en) * 1997-09-08 1999-03-23 Brother Ind Ltd Embroidery system with communication function
CN1157914C (en) * 2000-04-04 2004-07-14 日星特殊精密株式会社 Diagnostic system and method for fault diagnosis of embroidering machine
JP2008097577A (en) * 2006-09-13 2008-04-24 Brother Ind Ltd Software distribution system for sewing machine, sewing machine and computer readable recording medium
US7920939B2 (en) * 2006-09-30 2011-04-05 Vistaprint Technologies Limited Method and system for creating and manipulating embroidery designs over a wide area network
FR2923627B1 (en) * 2007-11-08 2013-08-30 Siemens Vdo Automotive METHOD FOR UNLOCKING A MOTOR CONTROL COMPUTER
CN102079167A (en) * 2010-11-01 2011-06-01 天津伟力捷包装设备有限公司 Ink jet printer circuit with remote control function
CN201950970U (en) * 2010-11-01 2011-08-31 天津伟力捷包装设备有限公司 Ink jet printer circuit with remote control function
CN102182024A (en) * 2011-05-03 2011-09-14 惠州神田精密机械有限公司 Computer embroidery process
CN102978843A (en) * 2011-09-06 2013-03-20 天津宝盈电脑机械有限公司 Processing method for double sequin pattern version of embroidery machine
CN104372541B (en) * 2014-10-23 2016-08-24 深圳思瑞普科技有限公司 Illegal using method prevented by a kind of embroidery machine version band

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5791270A (en) * 1995-12-20 1998-08-11 Brother Kogyo Kabushiki Kaisha Sewing data processing device with data editing function
US5826526A (en) * 1996-11-19 1998-10-27 Brother Kogyo Kabushiki Kaisha Sewing machine
US5924372A (en) * 1997-03-11 1999-07-20 Brother Kogyo Kabushiki Kaisha Embroidery data processing device for sewing machine including means for limiting repeated use of embroidery data
US5865134A (en) * 1997-03-28 1999-02-02 Brother Kogyo Kabushiki Kaisha Sewing data converting device for sewing machine
US6176189B1 (en) * 1999-07-05 2001-01-23 Brother Kogyo Kabushiki Kaisha Sewing machine having a non-volatile memory
US6196146B1 (en) * 2000-03-23 2001-03-06 Pulse Microsystems Ltd. Web based embroidery system and method
US6216618B1 (en) * 2000-04-07 2001-04-17 Pulse Microsystems Ltd. Embroidery system utilizing windows CE based GUI
CN104539654A (en) * 2014-12-05 2015-04-22 江苏大学 Personal data filling system solving method based on privacy protection

Also Published As

Publication number Publication date
WO2016061969A1 (en) 2016-04-28
CN104372541A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
KR20070088105A (en) Apparatus and method for digital rights management
CN108599930A (en) Firmware encrypting and deciphering system and method
CN103294496B (en) Programming system
CN103782538A (en) Authenticator
CN104463026B (en) A kind of system and method for the anti-flight of hardware
WO2001042888A1 (en) Portable authorization device for authorizing use of protected information and associated method
CN107341368A (en) Licensing effective time method of calibration and device
CN101562040A (en) High-security mobile memory and data processing method thereof
CN107534559B (en) The method of dialogue-based watermark for media content
JP2012248178A (en) Secure removable media and method for managing the same
US11218322B2 (en) System and method for reconfiguring and deploying soft stock-keeping units
US8522351B2 (en) Production security control apparatus for software products and control method thereof
CN104573536A (en) File protection method and device
CN201185082Y (en) Mobile memory with high safety
AU778380B2 (en) Portable authorization device for authorizing use of protected information and associated method
NG et al. Interactive clothes based on IOT using NFC and Mobile Application
CN104372541B (en) Illegal using method prevented by a kind of embroidery machine version band
JP5164372B2 (en) Game machine control chip and its ROM writer
CN102122336A (en) Method, equipment and system for encrypting and decrypting game protection
CN101826141A (en) Information processing device, data recording system, information processing method and program
CN103186723A (en) Digital content security cooperation method and system
KR100524176B1 (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
CN107925574A (en) The safe programming of secret data
CN106056726B (en) It is a kind of can two-way authentication CPU card access-control card reader safety certifying method
CN105354462B (en) A kind of guard method of mobile memory and mobile memory

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160824

Termination date: 20181023

CF01 Termination of patent right due to non-payment of annual fee