CN110816089B - Safe burning method of printing program, chip and printing consumable - Google Patents

Safe burning method of printing program, chip and printing consumable Download PDF

Info

Publication number
CN110816089B
CN110816089B CN201910976869.2A CN201910976869A CN110816089B CN 110816089 B CN110816089 B CN 110816089B CN 201910976869 A CN201910976869 A CN 201910976869A CN 110816089 B CN110816089 B CN 110816089B
Authority
CN
China
Prior art keywords
terminal equipment
printing program
key
cloud server
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910976869.2A
Other languages
Chinese (zh)
Other versions
CN110816089A (en
Inventor
周露露
钟晓欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhongnuo Microelectronics Co ltd
Original Assignee
Foshan Prewell Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Prewell Technology Co ltd filed Critical Foshan Prewell Technology Co ltd
Priority to CN201910976869.2A priority Critical patent/CN110816089B/en
Publication of CN110816089A publication Critical patent/CN110816089A/en
Application granted granted Critical
Publication of CN110816089B publication Critical patent/CN110816089B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41JTYPEWRITERS; SELECTIVE PRINTING MECHANISMS, i.e. MECHANISMS PRINTING OTHERWISE THAN FROM A FORME; CORRECTION OF TYPOGRAPHICAL ERRORS
    • B41J29/00Details of, or accessories for, typewriters or selective printing mechanisms not otherwise provided for
    • B41J29/38Drives, motors, controls or automatic cut-off devices for the entire printing mechanism
    • B41J29/393Devices for controlling or analysing the entire machine ; Controlling or analysing mechanical parameters involving printing of test patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/26Coin-freed apparatus for hiring articles; Coin-freed facilities or services for printing, stamping, franking, typing or teleprinting apparatus
    • G07F17/266Coin-freed apparatus for hiring articles; Coin-freed facilities or services for printing, stamping, franking, typing or teleprinting apparatus for the use of a photocopier or printing device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

The invention provides a safe burning method of a printing program, a chip and a printing consumable material, wherein the method comprises the following steps: acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to a cloud server; searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment; sending the printer model to be used to a key server through terminal equipment; searching a corresponding key factor by the key server according to the model of the printer and returning the key factor to the terminal equipment; the terminal equipment calculates and obtains a corresponding encryption key according to the key factor, and decrypts the printing program ciphertext by using the encryption key to obtain a printing program plaintext; and receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into the chip. The invention can realize the reutilization of the chip and can ensure the safety and the reliability of the burning process of the printing program.

Description

Safe burning method of printing program, chip and printing consumable
Technical Field
The invention relates to the technical field of printing, in particular to a safe burning method of a printing program, a chip and a printing consumable material.
Background
Printers currently include mainly inkjet printers and laser printers. Both ink jet and laser printers comprise the following two parts: the printer comprises a printer host and a plurality of detachable printing consumables. Each printing consumable comprises an ink box or a powder box and a chip attached to the ink box or the powder box. During use, the chip communicates with the printer host. The chip is used for storing original information such as manufacturer information, model, color, total ink amount and the like of corresponding printing consumables. Simultaneously in subsequent use processes such as switching on and shutting down, change printing consumables and printing, printer owner can read and write the chip in this printing consumables with specific communication protocol through relevant interface to this realizes detecting this printing consumables of authentication, and relevant printing information such as record printing date, printing number of sheets and ink surplus carries out the information interaction through the chip with in the printing consumables and can effectively make statistics of the user state of ink horn or powder box, controls whole printing process.
Conventionally, when the number of printed sheets recorded by a chip in a printing consumable reaches a preset threshold (for example, 500 sheets), a printer is enabled to consider that the printing consumable runs out of ink or powder and cannot be used continuously; at this time, the chip is discarded along with the printing consumables, which results in waste of chip resources. Meanwhile, users need to purchase new printing consumables for the chip purchase order, and the printing cost of the users is increased.
Disclosure of Invention
In order to solve at least one technical problem, the invention provides a printing program safe burning method, a chip and a printing consumable.
In order to achieve the above object, a first aspect of the present invention provides a method for safely burning a printing program, the method comprising:
acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to the cloud server;
searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment for pre-storing;
sending the printer model to be used to a key server through the terminal equipment;
searching a corresponding key factor by the key server according to the received printer model, and returning the key factor to the terminal equipment;
calculating and acquiring a corresponding encryption key by the terminal equipment according to the key factor, and decrypting the printing program ciphertext by using the encryption key to obtain a printing program plaintext;
and receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into a chip.
In this scheme, before the printer model to be used is acquired through the terminal device and the acquired printer model is sent to the cloud server, the method further includes:
the cloud server receives an externally uploaded printing program and a printer model corresponding to the printing program, and then feeds the printer model back to the key server to request a corresponding key factor;
generating a key factor by the key server according to the printer model fed back by the cloud server, storing the key factor in association with the printer model, and returning the generated key factor to the cloud server;
and the cloud server calculates and acquires a corresponding encryption key according to the key factor, and encrypts the externally uploaded printing program by using the encryption key to obtain a printing program ciphertext.
In this scheme, calculating and obtaining a corresponding encryption key according to the key factor specifically includes:
and the cloud server or the terminal equipment uses a preset shared key in the cloud server or the terminal equipment to perform digest calculation on the key factor through a digest algorithm, and an obtained digest value is used as the encryption key.
In this scheme, before the printer model to be used is acquired through the terminal device and the acquired printer model is sent to the cloud server, the method further includes:
generating a first identity authentication request by the terminal equipment, encrypting the first identity authentication request by adopting a preset private key to obtain a first identity authentication request ciphertext, and simultaneously sending the first identity authentication request and the first identity authentication request ciphertext to the cloud server;
the cloud server decrypts the received first identity authentication request ciphertext by adopting the public key of the terminal equipment and compares the decrypted plaintext information with the received first identity authentication request to finish the identity authentication of the terminal equipment;
generating a second identity authentication request by the cloud server, encrypting the second identity authentication request by using a preset private key to obtain a second identity authentication request ciphertext, and simultaneously sending the second identity authentication request and the second identity authentication request ciphertext to the terminal equipment;
and the terminal equipment decrypts the received second identity authentication request ciphertext by adopting the public key of the cloud server and compares the decrypted plaintext information with the received second identity authentication request to finish the identity authentication of the cloud server.
In this scheme, acquire the printer model that wants to use through terminal equipment, specifically include:
the method comprises the steps that image information of a printer to be used is shot through the terminal equipment, and a corresponding printer model is identified according to the image information; and/or
And scanning the identification code of the printer to be used through the terminal equipment to acquire a corresponding printer signal.
In this scheme, after the cloud server searches for the corresponding printing program ciphertext according to the received printer model, the method further includes:
sending a payment request to the terminal equipment by the cloud server according to a charging standard;
after the terminal equipment receives the payment request, paying the amount of money by means of a third-party payment platform;
and after the cloud server receives the payment amount, issuing a printing program ciphertext to the terminal equipment.
In this scheme, burn the printing procedure plaintext to the chip, specifically include:
erasing an original printing program in the chip;
and after the erasing is finished, burning the printing program plaintext into the chip.
In this scheme, burn the printing procedure plaintext to the chip, specifically include:
upgrading the original printing program in the chip according to the printing program plaintext; and/or
And formatting the parameters of the original printing program in the chip according to the printing program plaintext.
The third aspect of the present invention further provides a chip, the chip being communicatively connected to a printer, the chip comprising:
the near-end communication module is used for carrying out near-end communication with the terminal equipment and receiving a burning command and a burning printing program sent by the terminal equipment;
the storage module is used for providing a burning space to store the printing program;
wherein, the burning step of the printing program is as follows: acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to the cloud server; searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment for pre-storing; sending the printer model to be used to a key server through the terminal equipment; searching a corresponding key factor by the key server according to the received printer model, and returning the key factor to the terminal equipment; calculating and acquiring a corresponding encryption key by the terminal equipment according to the key factor, and decrypting the printing program ciphertext by using the encryption key to obtain a printing program plaintext; and receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into a chip.
The third aspect of the invention also provides a printing consumable, which comprises a processing box and a chip, wherein the chip is detachably connected to the processing box and is in communication connection with a printer.
After the traditional printing consumables are used up, the chips in the traditional printing consumables are discarded along with the printing consumables, and further waste of chip resources is caused. Compared with the traditional mode, the invention can realize the reutilization of the chip, effectively avoids the waste of chip resources and further saves the cost of purchasing printing consumables by customers. Meanwhile, the encryption mechanism is additionally arranged on the path for downloading and acquiring the printing program by the terminal equipment, so that the printing program is prevented from being stolen by others, and the safety and the reliability of the burning process of the printing program are further ensured.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
FIG. 1 is a flow chart of a method for safely burning a printing program according to the invention;
fig. 2 shows a communication link diagram among a cloud server, a key server, a terminal device, and a chip of the present invention;
FIG. 3 shows a block diagram of a chip of the present invention;
FIG. 4 is a schematic perspective view of a printing supply according to the present invention.
Reference numerals:
20: printing consumables;
15: a process cartridge; 12: a chip;
121: a near-end communication module; 122: and a storage module.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flow chart of a method for safely burning a printing program according to the invention.
As shown in fig. 1, a first aspect of the present invention provides a method for safely burning a printing program, where the method includes:
s102, acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to the cloud server;
s104, searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment for pre-storing;
s106, sending the printer model to be used to a key server through the terminal equipment;
s108, the key server searches a corresponding key factor according to the received printer model and returns the key factor to the terminal equipment;
s110, the terminal equipment calculates and acquires a corresponding encryption key according to the key factor, and decrypts the printing program ciphertext by using the encryption key to obtain a printing program plaintext;
and S112, receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into a chip.
It should be noted that the terminal device may be a communication device such as a mobile phone, a PC, an IPAD, and the like.
According to an embodiment of the present invention, before acquiring a printer model to be used by a terminal device and sending the acquired printer model to the cloud server, the method further includes:
the cloud server receives an externally uploaded printing program and a printer model corresponding to the printing program, and then feeds the printer model back to the key server to request a corresponding key factor;
generating a key factor by the key server according to the printer model fed back by the cloud server, storing the key factor in association with the printer model, and returning the generated key factor to the cloud server;
and the cloud server calculates and acquires a corresponding encryption key according to the key factor, and encrypts the externally uploaded printing program by using the encryption key to obtain a printing program ciphertext.
Further, calculating and acquiring a corresponding encryption key according to the key factor specifically includes:
and the cloud server or the terminal equipment uses a preset shared key in the cloud server or the terminal equipment to perform digest calculation on the key factor through a digest algorithm, and an obtained digest value is used as the encryption key.
As shown in fig. 2, the cloud server and the terminal device may perform remote communication to implement a sending and receiving step of a printing program ciphertext; the cloud server and the terminal equipment are respectively in remote communication with the key server to realize the receiving and sending steps of the key factors; the terminal equipment and the chip can carry out near-end communication so as to realize the burning process of the printing program.
The remote communication may adopt a wireless communication method such as 3G, 4G, 5G, and the like, or may adopt a wired communication method such as a network cable and an optical fiber; the near-end communication can be any one or more of NFC, RFID, Bluetooth and WIFI. Preferably, the near-end communication is NFC, but is not limited thereto.
According to the embodiment of the invention, a first security module is arranged in the cloud server, the first security module uses a preset shared key in the first security module, digest calculation is carried out on the key factor through a digest algorithm, and an obtained digest value is used as the encryption key. And a second security module is arranged in the terminal equipment, and the second security module uses a preset shared key in the second security module to perform digest calculation on the key factor through a digest algorithm, and uses an obtained digest value as the encryption key.
It can be understood that the shared key is negotiated between the cloud server and the terminal device in advance, and is common to both the cloud server and the terminal device. The shared secret key can be updated regularly, and preferably, the updating period can be 1 day, 1 week, 1 month and the like. By regularly updating the shared secret key, the shared secret key can be effectively prevented from being cracked by others, and the safety is improved.
According to the embodiment of the invention, after receiving the key factor, the cloud server can call a first security module to calculate and obtain an encryption key; then encrypting the printing program by using the encryption key to obtain a printing program ciphertext, digitally signing the printing program ciphertext by using a private key arranged in the first security module, and pre-storing the signed printing program ciphertext; the terminal equipment acquires a printer model to be used and sends the acquired printer model to the cloud server; the cloud server searches a corresponding signed printing program ciphertext according to the received printer model and returns the ciphertext to the terminal equipment; the terminal equipment sends the printer model to be used to the key server; the key server returns a key factor corresponding to the printer model to the terminal equipment; after receiving the key factor, the terminal device may call a second security module to calculate an encryption key; and the terminal equipment checks the signature of the printing program ciphertext through the public key of the cloud server, and if the signature check is successful, the second security module is called to decrypt the printing program ciphertext by using the encryption key so as to obtain the printing program plaintext.
According to an embodiment of the present invention, before acquiring a printer model to be used by a terminal device and sending the acquired printer model to the cloud server, the method further includes:
generating a first identity authentication request by the terminal equipment, encrypting the first identity authentication request by adopting a preset private key to obtain a first identity authentication request ciphertext, and simultaneously sending the first identity authentication request and the first identity authentication request ciphertext to the cloud server;
the cloud server decrypts the received first identity authentication request ciphertext by adopting the public key of the terminal equipment and compares the decrypted plaintext information with the received first identity authentication request to finish the identity authentication of the terminal equipment;
generating a second identity authentication request by the cloud server, encrypting the second identity authentication request by using a preset private key to obtain a second identity authentication request ciphertext, and simultaneously sending the second identity authentication request and the second identity authentication request ciphertext to the terminal equipment;
and the terminal equipment decrypts the received second identity authentication request ciphertext by adopting the public key of the cloud server and compares the decrypted plaintext information with the received second identity authentication request to finish the identity authentication of the cloud server.
It can be understood that before the terminal device requests to download the printing program, the cloud server and the terminal device need to perform bidirectional authentication, and for the cloud server, whether the identity of the terminal device is legal can be effectively confirmed, so that other terminal devices are prevented from impersonating the legal terminal device to download the printing program; for the terminal equipment, whether the identity of the cloud server is legal or not can be effectively confirmed, and the validity of the downloaded printing program is ensured. The cloud server and the terminal equipment are respectively preset with a private and public key pair; meanwhile, the cloud server can obtain a digital certificate of the terminal equipment through inquiry of a third-party certification authority, and the digital certificate comprises a public key of the terminal equipment; the terminal equipment can obtain the digital certificate of the cloud server through inquiry of a third-party certification authority, and the digital certificate comprises the public key of the cloud server.
According to the embodiment of the present invention, acquiring the model of the printer to be used by the terminal device specifically includes:
the method comprises the steps that image information of a printer to be used is shot through the terminal equipment, and a corresponding printer model is identified according to the image information; and/or
And scanning the identification code of the printer to be used through the terminal equipment to acquire a corresponding printer signal.
According to an embodiment of the present invention, after the cloud server searches for the corresponding printer ciphertext according to the received printer model, the method further includes:
sending a payment request to the terminal equipment by the cloud server according to a charging standard;
after the terminal equipment receives the payment request, paying the amount of money by means of a third-party payment platform;
and after the cloud server receives the payment amount, issuing a printing program ciphertext to the terminal equipment.
It should be noted that the third party payment platform may be a payment bank, a payment account, and the like. It will be appreciated that the charging criteria for downloading the print program is much lower than the purchase price of a conventional one-piece chip (i.e., a chip that is used once and has the print program attached to it when purchased). For a customer, the chip is purchased only once, and the printing program can be downloaded and obtained by delivering a small amount of cost subsequently, so that the cyclic utilization of the chip is realized, and the printing cost is effectively saved. For a chip manufacturer, the continuous profit can be realized by only investing the production cost of the chip once and downloading and acquiring the printing program by paying at the later stage, and the economic benefit of the chip manufacturer is improved.
According to the embodiment of the invention, burning the printing program plaintext into the chip specifically comprises the following steps:
erasing an original printing program in the chip;
and after the erasing is finished, burning the printing program plaintext into the chip.
It should be noted that before burning the printing program, if the original printing program may exist in the chip, the original printing program needs to be erased, so as to make room for burning a new printing program later.
It will be appreciated that the same chip may be used on different models of printers. For example, when a chip is used in a first printer, a first printing program is used. According to the customer's needs, when the chip is transferred to the second printer, the existing first printing program of the chip needs to be erased, and then the second printing program is burnt to the chip, so that the diversified repeated application of the same chip can be realized.
According to the embodiment of the invention, burning the printing program plaintext into the chip specifically comprises the following steps:
upgrading the original printing program in the chip according to the printing program plaintext; and/or
And formatting the parameters of the original printing program in the chip according to the printing program plaintext.
It should be noted that, when the printer is upgraded, in order to meet the upgrade requirement of the printer, the original printing program in the chip also needs to be upgraded.
It should be noted that the parameters may include the number of sheets to be printed, the remaining amount of ink or powder, the amount used, the number of times of recording printing, the time, and the like. Specifically, when the chip is replaced from the old printing consumable to the new printing consumable, since the number of printed sheets recorded by the original printing program in the chip reaches the maximum (e.g. 500 sheets), the new printing consumable is not used, and the parameters of the original printing program of the chip need to be formatted. For example: the printing number parameter in the printing program is set to be 0, and the printer can know that the printing consumable material is new according to the interaction with the chip, so that normal printing can be realized.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
The above is a description of method embodiments, and the embodiments of the present invention are further described below by way of apparatus embodiments.
Fig. 3 shows a block diagram of a chip according to the invention.
As shown in fig. 3, the second aspect of the present invention further provides a chip 12, wherein the chip 12 is communicatively connected to a printer, and the chip 12 includes:
a near-end communication module 121, configured to perform near-end communication with a terminal device, and receive a burning instruction and a burned printing program sent by the terminal device;
a storage module 122, configured to provide a burning space to store the printing program;
wherein, the burning step of the printing program is as follows: acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to the cloud server; searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment for pre-storing; sending the printer model to be used to a key server through the terminal equipment; searching a corresponding key factor by the key server according to the received printer model, and returning the key factor to the terminal equipment; calculating and acquiring a corresponding encryption key by the terminal equipment according to the key factor, and decrypting the printing program ciphertext by using the encryption key to obtain a printing program plaintext; and receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into a chip.
According to the embodiment of the invention, the near-end communication module can be any one or more of an NFC communication module, an RFID communication module, a Bluetooth communication module and a WIFI communication module. Preferably, the near-end communication module is an NFC communication module, but is not limited thereto.
According to the embodiment of the invention, the cloud server is used for receiving an externally uploaded printing program and a printer model corresponding to the printing program, and then feeding back the printer model to the key server to request a corresponding key factor; the key server generates a key factor according to the printer model fed back by the cloud server, stores the key factor in association with the printer model, and simultaneously returns the generated key factor to the cloud server; and the cloud server calculates and acquires a corresponding encryption key according to the key factor, and encrypts the externally uploaded printing program by using the encryption key to obtain a printing program ciphertext.
According to the embodiment of the invention, the cloud server or the terminal device uses the preset shared key in the cloud server or the terminal device to perform digest calculation on the key factor through a digest algorithm, and the obtained digest value is used as the encryption key.
According to the embodiment of the invention, the terminal equipment generates a first identity authentication request, encrypts the first identity authentication request by adopting a preset private key to obtain a first identity authentication request ciphertext, and simultaneously sends the first identity authentication request and the first identity authentication request ciphertext to the cloud server; and the cloud server decrypts the received first identity authentication request ciphertext by adopting the public key of the terminal equipment and compares the decrypted plaintext information with the received first identity authentication request to finish the identity authentication of the terminal equipment. The cloud server generates a second identity authentication request, encrypts the second identity authentication request by using a preset private key to obtain a second identity authentication request ciphertext, and simultaneously sends the second identity authentication request and the second identity authentication request ciphertext to the terminal equipment; and the terminal equipment decrypts the received second identity authentication request ciphertext by adopting the public key of the cloud server and compares the decrypted plaintext information with the received second identity authentication request to finish the identity authentication of the cloud server.
According to the embodiment of the invention, the terminal equipment is also used for shooting the image information of the printer to be used and identifying the corresponding printer model according to the image information; the terminal equipment is also used for scanning the identification code of the printer to be used so as to obtain a corresponding printer signal.
According to the embodiment of the invention, after the cloud server searches the corresponding printing program ciphertext according to the received printer model, the cloud server sends a payment request to the terminal equipment according to the charging standard; after the terminal equipment receives the payment request, paying the amount of money by means of a third-party payment platform; and after the cloud server receives the payment amount, issuing a printing program ciphertext to the terminal equipment.
According to the embodiment of the invention, before burning the printing program plaintext into a chip, the original printing program in the chip needs to be erased; and after the erasing is finished, burning the printing program plaintext into the chip.
Further, upgrading the original printing program in the chip according to the printing program plaintext; and/or carrying out formatting processing on the parameters of the original printing program in the chip according to the printing program plaintext.
FIG. 4 is a schematic perspective view of a printing supply according to the present invention.
As shown in FIG. 4, the third aspect of the present invention also provides a printing consumable 20, which comprises a processing box 15 and a chip 12, wherein the chip 12 is detachably connected to the processing box 15 and is communicatively connected to a printer; the chip 12 includes:
a near-end communication module 121, configured to perform near-end communication with a terminal device, and receive a burning instruction and a burned printing program sent by the terminal device;
a storage module 122, configured to provide a burning space to store the printing program;
wherein, the burning step of the printing program is as follows: acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to the cloud server; searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment for pre-storing; sending the printer model to be used to a key server through the terminal equipment; searching a corresponding key factor by the key server according to the received printer model, and returning the key factor to the terminal equipment; calculating and acquiring a corresponding encryption key by the terminal equipment according to the key factor, and decrypting the printing program ciphertext by using the encryption key to obtain a printing program plaintext; and receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into a chip.
According to the embodiment of the invention, the near-end communication module can be any one or more of an NFC communication module, an RFID communication module, a Bluetooth communication module and a WIFI communication module. Preferably, the near-end communication module is an NFC communication module, but is not limited thereto.
According to the embodiment of the invention, the cloud server is used for receiving an externally uploaded printing program and a printer model corresponding to the printing program, and then feeding back the printer model to the key server to request a corresponding key factor; the key server generates a key factor according to the printer model fed back by the cloud server, stores the key factor in association with the printer model, and simultaneously returns the generated key factor to the cloud server; and the cloud server calculates and acquires a corresponding encryption key according to the key factor, and encrypts the externally uploaded printing program by using the encryption key to obtain a printing program ciphertext.
According to the embodiment of the invention, the cloud server or the terminal device uses the preset shared key in the cloud server or the terminal device to perform digest calculation on the key factor through a digest algorithm, and the obtained digest value is used as the encryption key.
According to the embodiment of the invention, the terminal equipment generates a first identity authentication request, encrypts the first identity authentication request by adopting a preset private key to obtain a first identity authentication request ciphertext, and simultaneously sends the first identity authentication request and the first identity authentication request ciphertext to the cloud server; and the cloud server decrypts the received first identity authentication request ciphertext by adopting the public key of the terminal equipment and compares the decrypted plaintext information with the received first identity authentication request to finish the identity authentication of the terminal equipment. The cloud server generates a second identity authentication request, encrypts the second identity authentication request by using a preset private key to obtain a second identity authentication request ciphertext, and simultaneously sends the second identity authentication request and the second identity authentication request ciphertext to the terminal equipment; and the terminal equipment decrypts the received second identity authentication request ciphertext by adopting the public key of the cloud server and compares the decrypted plaintext information with the received second identity authentication request to finish the identity authentication of the cloud server.
According to the embodiment of the invention, the terminal equipment is also used for shooting the image information of the printer to be used and identifying the corresponding printer model according to the image information; the terminal equipment is also used for scanning the identification code of the printer to be used so as to obtain a corresponding printer signal.
According to the embodiment of the invention, after the cloud server searches the corresponding printing program ciphertext according to the received printer model, the cloud server sends a payment request to the terminal equipment according to the charging standard; after the terminal equipment receives the payment request, paying the amount of money by means of a third-party payment platform; and after the cloud server receives the payment amount, issuing a printing program ciphertext to the terminal equipment.
According to the embodiment of the invention, before burning the printing program plaintext into a chip, the original printing program in the chip needs to be erased; and after the erasing is finished, burning the printing program plaintext into the chip.
Further, upgrading the original printing program in the chip according to the printing program plaintext; and/or carrying out formatting processing on the parameters of the original printing program in the chip according to the printing program plaintext.
After the traditional printing consumables are used up, the chips in the traditional printing consumables are discarded along with the printing consumables, and further waste of chip resources is caused. Compared with the traditional mode, the invention can realize the reutilization of the chip, effectively avoids the waste of chip resources and further saves the cost of purchasing printing consumables by customers. Meanwhile, the encryption mechanism is additionally arranged on the path for downloading and acquiring the printing program by the terminal equipment, so that the printing program is prevented from being stolen by others, and the safety and the reliability of the burning process of the printing program are further ensured.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (9)

1. A method for safely burning a printing program is characterized by comprising the following steps:
acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to a cloud server;
searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment for pre-storing;
sending the printer model to be used to a key server through the terminal equipment;
searching a corresponding key factor by the key server according to the received printer model, and returning the key factor to the terminal equipment;
calculating and acquiring a corresponding encryption key by the terminal equipment according to the key factor, and decrypting the printing program ciphertext by using the encryption key to obtain a printing program plaintext;
receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into a chip;
before the terminal device acquires a printer model to be used and sends the acquired printer model to the cloud server, the method further includes:
generating a first identity authentication request by the terminal equipment, encrypting the first identity authentication request by adopting a preset private key to obtain a first identity authentication request ciphertext, and simultaneously sending the first identity authentication request and the first identity authentication request ciphertext to the cloud server;
the cloud server decrypts the received first identity authentication request ciphertext by adopting the public key of the terminal equipment and compares the decrypted plaintext information with the received first identity authentication request to finish the identity authentication of the terminal equipment;
generating a second identity authentication request by the cloud server, encrypting the second identity authentication request by using a preset private key to obtain a second identity authentication request ciphertext, and simultaneously sending the second identity authentication request and the second identity authentication request ciphertext to the terminal equipment;
the terminal equipment decrypts the received second identity authentication request ciphertext by adopting the public key of the cloud server and compares the decrypted plaintext information with the received second identity authentication request to finish the identity authentication of the cloud server;
a first security module is arranged in the cloud server, the first security module uses a preset shared key in the first security module, performs digest calculation on the key factor through a digest algorithm, and uses an obtained digest value as the encryption key; and a second security module is arranged in the terminal equipment, and the second security module uses a preset shared key in the second security module to perform digest calculation on the key factor through a digest algorithm, and uses an obtained digest value as the encryption key.
2. The method for safely burning the printing program according to claim 1, wherein before the printer model to be used is acquired by the terminal device and the acquired printer model is sent to the cloud server, the method further comprises:
the cloud server receives an externally uploaded printing program and a printer model corresponding to the printing program, and then feeds the printer model back to the key server to request a corresponding key factor;
generating a key factor by the key server according to the printer model fed back by the cloud server, storing the key factor in association with the printer model, and returning the generated key factor to the cloud server;
and the cloud server calculates and acquires a corresponding encryption key according to the key factor, and encrypts the externally uploaded printing program by using the encryption key to obtain a printing program ciphertext.
3. The method for safely burning the printing program according to claim 1 or 2, wherein the step of calculating and acquiring the corresponding encryption key according to the key factor specifically comprises:
and the cloud server or the terminal equipment uses a preset shared key in the cloud server or the terminal equipment to perform digest calculation on the key factor through a digest algorithm, and an obtained digest value is used as the encryption key.
4. The method for safely burning a printing program according to claim 1, wherein obtaining the type of the printer to be used through the terminal device specifically comprises:
the method comprises the steps that image information of a printer to be used is shot through the terminal equipment, and a corresponding printer model is identified according to the image information; and/or
And scanning the identification code of the printer to be used through the terminal equipment to acquire a corresponding printer signal.
5. The method for safely burning the printing program according to claim 1, wherein after the cloud server searches the corresponding printing program ciphertext according to the received printer model, the method further comprises:
sending a payment request to the terminal equipment by the cloud server according to a charging standard;
after the terminal equipment receives the payment request, paying the amount of money by means of a third-party payment platform;
and after the cloud server receives the payment amount, issuing a printing program ciphertext to the terminal equipment.
6. The method for safely burning the printing program according to claim 1, wherein burning the printing program into the chip in the plaintext specifically comprises:
erasing an original printing program in the chip;
and after the erasing is finished, burning the printing program plaintext into the chip.
7. The method for safely burning the printing program according to claim 1, wherein burning the printing program into the chip in the plaintext specifically comprises:
upgrading the original printing program in the chip according to the printing program plaintext; and/or
And formatting the parameters of the original printing program in the chip according to the printing program plaintext.
8. A chip, wherein the chip is communicatively coupled to a printer, the chip comprising:
the near-end communication module is used for carrying out near-end communication with the terminal equipment and receiving a burning command and a burning printing program sent by the terminal equipment;
the storage module is used for providing a burning space to store the printing program;
wherein, the burning step of the printing program is as follows: acquiring a printer model to be used through terminal equipment, and sending the acquired printer model to a cloud server;
searching a corresponding printing program ciphertext by the cloud server according to the received printer model, and returning the printing program ciphertext to the terminal equipment for pre-storing;
sending the printer model to be used to a key server through the terminal equipment;
searching a corresponding key factor by the key server according to the received printer model, and returning the key factor to the terminal equipment;
calculating and acquiring a corresponding encryption key by the terminal equipment according to the key factor, and decrypting the printing program ciphertext by using the encryption key to obtain a printing program plaintext;
receiving a burning command sent by the terminal equipment in a near-end communication mode, and burning the printing program plaintext into a chip;
before the printer model to be used is acquired through the terminal device and the acquired printer model is sent to the cloud server, the method further includes:
generating a first identity authentication request by the terminal equipment, encrypting the first identity authentication request by adopting a preset private key to obtain a first identity authentication request ciphertext, and simultaneously sending the first identity authentication request and the first identity authentication request ciphertext to the cloud server;
the cloud server decrypts the received first identity authentication request ciphertext by adopting the public key of the terminal equipment and compares the decrypted plaintext information with the received first identity authentication request to finish the identity authentication of the terminal equipment;
generating a second identity authentication request by the cloud server, encrypting the second identity authentication request by using a preset private key to obtain a second identity authentication request ciphertext, and simultaneously sending the second identity authentication request and the second identity authentication request ciphertext to the terminal equipment;
the terminal equipment decrypts the received second identity authentication request ciphertext by adopting the public key of the cloud server and compares the decrypted plaintext information with the received second identity authentication request to finish the identity authentication of the cloud server;
a first security module is arranged in the cloud server, the first security module uses a preset shared key in the first security module, performs digest calculation on the key factor through a digest algorithm, and uses an obtained digest value as the encryption key; and a second security module is arranged in the terminal equipment, and the second security module uses a preset shared key in the second security module to perform digest calculation on the key factor through a digest algorithm, and uses an obtained digest value as the encryption key.
9. A printing consumable comprising a processing cartridge and a chip according to claim 8, wherein the chip is detachably connectable to the processing cartridge and is communicatively connectable to a printer.
CN201910976869.2A 2019-10-15 2019-10-15 Safe burning method of printing program, chip and printing consumable Active CN110816089B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910976869.2A CN110816089B (en) 2019-10-15 2019-10-15 Safe burning method of printing program, chip and printing consumable

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910976869.2A CN110816089B (en) 2019-10-15 2019-10-15 Safe burning method of printing program, chip and printing consumable

Publications (2)

Publication Number Publication Date
CN110816089A CN110816089A (en) 2020-02-21
CN110816089B true CN110816089B (en) 2021-11-05

Family

ID=69549372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910976869.2A Active CN110816089B (en) 2019-10-15 2019-10-15 Safe burning method of printing program, chip and printing consumable

Country Status (1)

Country Link
CN (1) CN110816089B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112561502A (en) * 2020-12-07 2021-03-26 成都网信天成科技有限公司 Jmatrix general third-party payment processing system and method
CN112905202B (en) * 2021-02-07 2024-01-02 广州众诺微电子有限公司 Chip upgrading method, burning device and chip upgrading system
CN113254976B (en) * 2021-06-17 2021-10-26 北京辰光信安电子有限公司 Printer security enhancement system, method and electronic equipment
CN115018035A (en) * 2022-06-17 2022-09-06 阿里云计算有限公司 Data processing method and device for electronic tag and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015182785A1 (en) * 2014-05-31 2015-12-03 船井電機株式会社 Cartridge for image forming device
CN106341371A (en) * 2015-07-08 2017-01-18 杭州奕锐电子有限公司 Cloud storage data encryption method and cloud storage system
CN207234821U (en) * 2017-09-05 2018-04-13 北京立思辰计算机技术有限公司 One kind printing safety control system
CN108650261A (en) * 2018-05-09 2018-10-12 南京理工大学紫金学院 Mobile terminal system software method for burn-recording based on remote encryption interaction
CN109274500A (en) * 2018-10-15 2019-01-25 百富计算机技术(深圳)有限公司 A kind of key downloading method, client, encryption device and terminal device
CN109558096A (en) * 2017-09-26 2019-04-02 佳能株式会社 Printing device, control method and storage medium
CN109656114A (en) * 2019-02-22 2019-04-19 珠海天威飞马打印耗材有限公司 Data-updating method, consumable chip, consumable container, the computer readable storage medium of consumable chip

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10419641B1 (en) * 2018-04-13 2019-09-17 Lexmark International, Inc. Chip and supply item for imaging device, including communication
CN109410406B (en) * 2018-11-14 2021-11-16 北京华大智宝电子系统有限公司 Authorization method, device and system
CN110135176B (en) * 2019-04-26 2023-04-18 深圳市金城保密技术有限公司 Encryption method for printing data transmission

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015182785A1 (en) * 2014-05-31 2015-12-03 船井電機株式会社 Cartridge for image forming device
CN106341371A (en) * 2015-07-08 2017-01-18 杭州奕锐电子有限公司 Cloud storage data encryption method and cloud storage system
CN207234821U (en) * 2017-09-05 2018-04-13 北京立思辰计算机技术有限公司 One kind printing safety control system
CN109558096A (en) * 2017-09-26 2019-04-02 佳能株式会社 Printing device, control method and storage medium
CN108650261A (en) * 2018-05-09 2018-10-12 南京理工大学紫金学院 Mobile terminal system software method for burn-recording based on remote encryption interaction
CN109274500A (en) * 2018-10-15 2019-01-25 百富计算机技术(深圳)有限公司 A kind of key downloading method, client, encryption device and terminal device
CN109656114A (en) * 2019-02-22 2019-04-19 珠海天威飞马打印耗材有限公司 Data-updating method, consumable chip, consumable container, the computer readable storage medium of consumable chip

Also Published As

Publication number Publication date
CN110816089A (en) 2020-02-21

Similar Documents

Publication Publication Date Title
CN110816089B (en) Safe burning method of printing program, chip and printing consumable
CN110712436B (en) Printing program burning method, chip and printing consumable
CN100358334C (en) Image processing method and image processing device
CN105900125B (en) System and method for convenient and secure mobile transactions
US20160052295A1 (en) Printing system and method for applying a design to at least one fingernail/toenail surface
EP1947587A1 (en) Rights object acquisition method of mobile terminal in digital right management system
TWI517027B (en) Providing authenticated communications to a replaceable printer component
US20160055477A1 (en) Mobile payment solution for self-service multi-function printer
CN110481155B (en) Safe printing method, chip, printing consumable and printer
CN109274488A (en) Integrated circuit burning program method, storage medium and system
KR100973553B1 (en) Method for Processing Payment Statement of Affiliate Payment Terminal, and Affiliate Store Payment Terminal
US10015350B2 (en) Terminal device, mail transmission system, and transmission method
JP2003061064A (en) Image distribution system, image data distributor, image distribution method, and program for the image data distributor and computer-readable recording medium with the program recorded thereon
US9552181B1 (en) Method and apparatus for authorizing a print device to perform a service
CN110712435B (en) Printing program burning method, chip and printing consumable
TW201342118A (en) Mobile authentication for enabling host device functions
JP2010061490A (en) Accessory authentication system, accessory authentication method, and management server
KR20070117420A (en) System and method for payment and program recording medium
CN111309339A (en) Chip burning method and system based on Internet of things and readable storage medium
US20120075669A1 (en) Image forming system
EP1289187B1 (en) System and method for decrypting and printing images
CN113524913B (en) Ink authorization use method, server, upper computer, printing equipment and system
CN110275685B (en) Print amount control method for image forming apparatus, terminal device, and image forming apparatus
JP2005174172A (en) Image forming apparatus, terminal equipment, charging system, charging device and charging method
JP5874078B2 (en) Credit card payment system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220314

Address after: 510000 Room 202, building G10, South China new material innovation park, No. 31 Kefeng Road, high tech Industrial Development Zone, Guangzhou, Guangdong

Patentee after: GUANGZHOU ZHONO ELECTRONIC TECHNOLOGY Co.,Ltd.

Address before: 528000 No.15, room 116, Business Incubator Co., Ltd., building 1, chuangyue times cultural and creative park, No.61, Xianan Road, Guicheng Street, Nanhai District, Foshan City, Guangdong Province

Patentee before: Foshan Prewell Technology Co.,Ltd.

TR01 Transfer of patent right
CP01 Change in the name or title of a patent holder

Address after: 510000 Room 202, building G10, South China new material innovation park, No. 31 Kefeng Road, high tech Industrial Development Zone, Guangzhou, Guangdong

Patentee after: Guangzhou Zhongnuo Microelectronics Co.,Ltd.

Address before: 510000 Room 202, building G10, South China new material innovation park, No. 31 Kefeng Road, high tech Industrial Development Zone, Guangzhou, Guangdong

Patentee before: GUANGZHOU ZHONO ELECTRONIC TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder