CN110920261B - Authentication method of consumable chip and printing consumable - Google Patents

Authentication method of consumable chip and printing consumable Download PDF

Info

Publication number
CN110920261B
CN110920261B CN201911264704.9A CN201911264704A CN110920261B CN 110920261 B CN110920261 B CN 110920261B CN 201911264704 A CN201911264704 A CN 201911264704A CN 110920261 B CN110920261 B CN 110920261B
Authority
CN
China
Prior art keywords
password
pseudo
reading
consumable chip
preset value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911264704.9A
Other languages
Chinese (zh)
Other versions
CN110920261A (en
Inventor
陈浩
曹嘉欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jihai Microelectronics Co ltd
Original Assignee
Apex Microelectronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apex Microelectronics Co Ltd filed Critical Apex Microelectronics Co Ltd
Priority to CN202110474514.0A priority Critical patent/CN113199870B/en
Priority to CN201911264704.9A priority patent/CN110920261B/en
Publication of CN110920261A publication Critical patent/CN110920261A/en
Application granted granted Critical
Publication of CN110920261B publication Critical patent/CN110920261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41JTYPEWRITERS; SELECTIVE PRINTING MECHANISMS, i.e. MECHANISMS PRINTING OTHERWISE THAN FROM A FORME; CORRECTION OF TYPOGRAPHICAL ERRORS
    • B41J2/00Typewriters or selective printing mechanisms characterised by the printing or marking process for which they are designed
    • B41J2/005Typewriters or selective printing mechanisms characterised by the printing or marking process for which they are designed characterised by bringing liquid or particles selectively into contact with a printing material
    • B41J2/01Ink jet
    • B41J2/17Ink jet characterised by ink handling
    • B41J2/175Ink supply systems ; Circuit parts therefor
    • B41J2/17503Ink cartridges
    • B41J2/17543Cartridge presence detection or type identification
    • B41J2/17546Cartridge presence detection or type identification electronically

Landscapes

  • Control Or Security For Electrophotography (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

The invention relates to an authentication method of a consumable chip and a printing consumable, wherein the method comprises the following steps: receiving a password reading request sent by a printing device; judging whether the current password reading number exceeds a preset value; when the current password reading number does not exceed a preset value, sending a password to printing equipment; when the current password reading number exceeds a preset value, sending a pseudo password to the printing equipment; and after the password is sent to the printing equipment, updating the current password reading number. According to the embodiment of the application, whether the number of the read passwords exceeds the preset value or not can be judged, and if the number of the read passwords exceeds the preset value, correct passwords cannot be read, so that other manufacturers are prevented from stealing the passwords.

Description

Authentication method of consumable chip and printing consumable
Technical Field
The invention relates to the technical field of printing and imaging, in particular to an authentication method of a consumable chip and a printing consumable.
Background
With the popularization of office automation, printing equipment is indispensable in office activities, and consumables such as ink cartridges and toner cartridges are needed in the printing process; when a consumable material (e.g., a consumable material such as ink, printing powder, etc.) stored in the consumable material is exhausted, the consumable material may be replaced with a new consumable material in which the printing material is stored. In which, the consumable generally uses a chip as a medium for data transmission. And after the consumable is installed in the printing equipment, the printing equipment controller sends an instruction to communicate and authenticate with the consumable chip.
At present, a plurality of passwords used for authentication in the consumable chip are provided, and some third-party manufacturers compete maliciously and read the plurality of passwords in the consumable chip at one time so as to realize consumable authentication. Therefore, in the prior art, it is difficult to prevent other manufacturers from stealing the password in the consumable chip.
Disclosure of Invention
In order to overcome the defects, the application provides the authentication method of the consumable chip and the printing consumable, and can effectively prevent other manufacturers from stealing the password in the consumable chip.
In a first aspect, an embodiment of the present invention provides an authentication method for a consumable chip, where the method is performed on a consumable chip including a memory, and the method includes:
receiving a password reading request sent by a printing device;
judging whether the current password reading number exceeds a preset value;
when the current password reading number does not exceed the preset value, sending a password to the printing equipment;
when the current password reading number exceeds the preset value, sending a pseudo password to the printing equipment;
and after the password is sent to the printing equipment, updating the current password reading number.
With reference to the first aspect, in a possible implementation manner, the pseudo password is a preset error character.
With reference to the first aspect, in one possible implementation, the pseudo password is a read password.
With reference to the first aspect, in a possible implementation manner, before the sending the password to the printing device, the method further includes: and generating a password by using a preset secret key.
With reference to the first aspect, in a possible implementation manner, before the sending the pseudo password to the printing device, the method further includes: and changing the preset secret key, and generating a pseudo password by using the changed secret key.
With reference to the first aspect, in a possible implementation manner, before the sending the pseudo password to the printing device, the method further includes: and generating a password by using the preset secret key, and changing the generated password to obtain a pseudo password.
With reference to the first aspect, in a possible implementation manner, before the receiving the password read request sent by the printing device, the method further includes:
receiving a state reading request sent by a printing device; judging whether the current password reading number exceeds the preset value; when the current password reading number does not exceed the preset value, sending state information to the printing equipment, wherein the state information comprises the current password reading number; and when the current password reading number exceeds the preset value, sending status information to the printing equipment, wherein the status information comprises the password reading pseudo number.
With reference to the first aspect, in a possible implementation manner, the updating the current password reading number includes:
judging whether the password sent to the printing equipment is used for the first time or not;
when the password sent to the printing equipment is used for the first time, updating the current password reading number;
when the password transmitted to the printing apparatus is not used for the first time, the current password reading number is not updated.
In a second aspect, an embodiment of the present invention provides an authentication method for a consumable chip, which is executed on a consumable chip including a memory, and the method includes:
receiving a state and password reading request sent by printing equipment, wherein the reading request is used for indicating to read the state information and the password of the consumable chip;
judging whether a preset counter is equal to a preset value or not;
when the counter is not equal to the preset value, sending state information and a password to the printing equipment, wherein the state information comprises the current password reading number;
when the counter is equal to the preset value, sending state information and a pseudo password to the printing equipment, wherein the state information comprises the number of password reading pseudo;
incrementing the counter after sending the status information and the password to the printing device.
With reference to the second aspect, in one possible implementation, the counter is stored in the memory in the form of computer instructions; or the counter is arranged on the consumable chip in a hardware mode.
In a third aspect, an embodiment of the present invention provides an authentication method for a consumable chip, which is executed on a consumable chip including a memory, and the method includes:
receiving a state and password reading request sent by printing equipment, wherein the reading request is used for indicating to read the state information and the password of the consumable chip;
judging whether a preset mark is set or not;
when the preset mark is not set, sending state information and a password to the printing equipment, wherein the state information comprises the current password reading number;
when the preset mark is set, sending state information and a pseudo password to the printing equipment, wherein the state information comprises the number of the pseudo passwords read;
and after the state information and the passwords are sent to the printing equipment, updating the current password reading number.
With reference to the third aspect, in a possible implementation manner, after updating the current password reading number, the method further includes:
judging whether the updated password reading number exceeds a preset value;
and setting the preset mark when the updated password reading number exceeds the preset value.
With reference to the third aspect, in one possible implementation, the flag is stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a printing consumable, where the printing consumable includes a consumable chip, the consumable chip includes a controller and a memory, the memory stores an executable computer program, and the controller implements the authentication method of the consumable chip when executing the computer program.
In the scheme, the password or the information of the consumable chip is prevented from being stolen by other manufacturers by judging whether the number of the read passwords exceeds a preset value or not, and if the number of the read passwords exceeds the preset value, the correct passwords cannot be read or the correct number of the read passwords cannot be read.
Drawings
The invention is further illustrated with reference to the following figures and examples.
Fig. 1 is a schematic structural diagram of a consumable chip according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of an authentication method for a consumable chip according to embodiment 1 of the present application;
fig. 3 is a schematic flowchart of an authentication method for a consumable chip according to embodiment 2 of the present application;
fig. 4 is a schematic flowchart of an authentication method for a consumable chip according to embodiment 3 of the present application;
fig. 5 is a schematic flowchart of an authentication method for a consumable chip according to embodiment 4 of the present application;
fig. 6 is a schematic structural diagram of an authentication device of a consumable chip according to an embodiment of the present disclosure.
DETAILED DESCRIPTION OF EMBODIMENT (S) OF INVENTION
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
As shown in fig. 1, an embodiment of the invention provides a consumable chip 10, which includes a controller 11 and a memory 12. The controller 11 is used to determine and control data written in the consumable chip 10, and store the data in the memory 12.
Specifically, the data stored in the memory 12 includes a plurality of passwords and the number of password reads; wherein, the password is used for authenticating the consumable chip; the password reading number is used for recording the number of the passwords of the consumable chip which are read; in other embodiments, the data stored in memory 12 also includes a key used to generate a password. The data stored in the memory 12 may also include printing apparatus serial numbers, consumable installation dates, customer data, consumable consumption amounts, capacities, and other data.
In one embodiment, the memory 12 is a non-volatile memory for storing a password for authenticating the consumable chip, and for storing other data such as serial number and capacity of the consumable.
It is understood that the consumable may be an ink cartridge or a liquid container applied to an inkjet printing apparatus, and may also be a toner cartridge or a powder cartridge applied to a laser printing apparatus.
Example 1
Please refer to fig. 2, which is a flowchart illustrating a consumable chip authentication method according to embodiment 1 of the present invention, and as shown in fig. 2, the consumable chip authentication method is applicable to a consumable chip. The method comprises the following steps:
and step S01, receiving a status and password reading request sent by the printing equipment, wherein the reading request is used for indicating to read the status information and the password of the consumable chip.
Understandably, after the consumable provided with the consumable chip is installed on the printing device, the printing device can provide an electric signal for the consumable chip, namely, the printing device supplies power to the consumable chip. The printing equipment sends a state and password reading request to the consumable chip, starts to communicate with the consumable chip, and the consumable chip receives the state and password reading request.
The state information comprises a consumable serial number, a consumable production date, manufacturer information, consumable consumption, a consumable exhaustion identifier, a current password reading number and the like. Specifically, the number of current password reads is N, where N is a positive integer greater than or equal to 0.
Step S02, determine whether the current number of password reads exceeds a preset value.
The consumable chip judges whether the consumable is used for the first time according to the state information after receiving the state and password reading request; and when the consumable is not used for the first time, judging whether the current password reading number exceeds a preset value.
The preset values are set by a development designer, and may be, for example, 8, 12, 20, and the like, which is not limited herein.
In one embodiment, the consumable serial number (id) is used for the printing apparatus to analyze and determine the installed consumable chip, and since the serial number of the consumable chip that has been consumed or used may be stored in the partial printing apparatus, the partial printing apparatus may determine whether the consumable chip is a used or consumed consumable chip according to the consumable serial number.
Step S03, when the current password reading number does not exceed the preset value, sending status information and the password to the printing device, where the status information includes the current password reading number.
It is understood that the number of password readings increases by 1 for each password read from the plurality of passwords stored in the memory. When the password requested by the printing equipment to the consumable chip is the read password, namely the password is requested for the same password for multiple times, the number of the read passwords is not changed. When the password requested by the printing equipment to the consumable chip is a new password (password which is not read), the number of the current password reading in the state information is updated from N to N + 1.
Further, the memory stores a key for generating a password, which may generate a plurality of passwords.
Prior to step S03, the method further comprises: and generating a password by using a preset secret key.
It can be understood that the number of password readings increases by 1 for each password read in the memory. When the password requested by the printing equipment to the consumable chip is the read password, namely the password is requested for the same password for multiple times, a preset secret key is not needed to be used for generating a new password, and the current password reading number in the state information cannot be changed. When the password requested by the printing equipment to the consumable chip is a new password (password which is not read), a key is needed to generate the new password, and the number of current password reads in the state information is updated from N to N + 1.
Illustratively, 32 passwords can be stored in the memory in total, but since the printing device is only allowed to read the partial passwords (the consumable chip retrieves the partial passwords), for example, only 8 passwords can be read, when the number of the password readings of the consumable chips reaches a preset value, the remaining 24 passwords cannot be retrieved and read, so that after the printing materials in the consumable are consumed, the consumable chips cannot be reused due to the fact that the consumable chips are limited to reading the number of the passwords.
In one embodiment, the printing device signs the status, the password read request with a digital encryption key, or in some other manner.
In this embodiment, after the printing device receives the status information and the password, the consumable chip is authenticated according to the password. And the printer can utilize the consumable material where the consumable material chip is located to execute image printing after the authentication is passed, otherwise, the image printing cannot be carried out.
It is understood that, when a printing apparatus performs consumable authentication, only authenticated consumables can be applied to the printing apparatus, and otherwise, cannot be applied.
And step S04, when the password reading number exceeds the preset value, sending status information and the pseudo password to the printing equipment, wherein the status information comprises the password reading pseudo number.
In one embodiment, the pseudo password may be a predetermined error character, such as "0000"/"FFFF" or other error password.
In other embodiments, prior to step S04, the method further comprises: and changing the preset secret key, and generating a pseudo password by using the changed secret key.
It is understood that the key used to generate the cipher may be changed after the number of cipher readings reaches a predetermined value, for example, after the key is operated/changed, the key may be changed to generate a pseudo cipher different from the true cipher.
Alternatively, before step S04, the method further comprises: and generating a password by using a preset secret key, and changing the generated password to obtain a pseudo password.
It can be understood that, after the number of read passwords reaches the preset value, the key is interfered when generating the real password, for example, after the generated real password is operated/changed, the generated real password is changed into a pseudo password different from the real password. After the number of the passwords read reaches a preset value of 8, the passwords which are not read, such as the rest 24 passwords, stored in the consumable chip are operated/changed to be pseudo passwords different from the real passwords, wherein the read passwords are not changed.
In yet another embodiment, the pseudo password is a read password. For example, after the number of password readings reaches the preset value, the key generates the same password as before the number of password readings reaches the preset value as a pseudo password, for example, when the number of password readings reaches 8, the consumable chip sends the state information and the pseudo password, for example, the password sent when the printing device reads the password for the 2 nd time is sent to the printing device.
Further, the number of password reading artifacts is, for example, any positive integer smaller than a preset value. For example, in other embodiments, the preset value of the number of password reads is 8, and the number of password read pseudo numbers may be a preset positive integer smaller than 8, such as 1, 2, 3, and the like.
Specifically, when the current password reading number reaches 8, the consumable chip replaces the current password reading number in the state information by the password reading pseudo number 1, and sends the replaced state information and the pseudo password to the printing equipment.
Further, the number of the password reading artifacts may be set to a preset fixed value, for example, 3, as the number of the password reading artifacts, or may be set to a random positive integer smaller than the preset value as the number of the password reading artifacts.
In other embodiments, the number of password read artifacts is, for example, any positive integer greater than a preset value. Illustratively, the preset value of the number of password reads is 8, and the number of password read pseudo numbers may be a preset positive integer greater than 8, such as 9, 10, etc.
And when the current password reading number reaches 8, the consumable chip replaces the current password reading number in the state information by the password reading pseudo number, and sends the replaced state information and the pseudo password to the printing equipment.
Further, the number of the password reading artifacts may be set to a preset fixed value, for example, 11, as the number of the password reading artifacts, or may be set to a random positive integer greater than a preset value as the number of the password reading artifacts.
In the above embodiment, the sending of the password reading pseudo number is to prevent data from being stolen after the consumable chip is discarded.
In another embodiment, the password reading pseudo number is the actual current password reading number; for example, the preset value of the number of password readings is 8, and when the number of password readings reaches 8, the printing device reads the status information and the new password, the consumable chip sends the current number of password readings, such as the number of password readings of 9, and the pseudo password to the printing device. In this embodiment, after the consumable chip executes step S04, it continues to execute step S05 to record the current number of true password readings. In this embodiment, the current number of sent passwords is used to record the actual number of sent passwords and the actual usage of consumables.
In the scheme, when the number of the passwords in the consumable chip exceeds the preset value, the printing equipment cannot read other passwords or the consumable chip cannot retrieve or generate other passwords, so that other manufacturers are effectively prevented from stealing the passwords.
In step S05, the current password reading number is updated.
In the present embodiment, step S05 includes:
judging whether the password sent to the printing equipment is used for the first time;
when the password transmitted to the printing apparatus is first used, the current password reading number is updated, for example, from 0 to 1.
When the password transmitted to the printing apparatus is not used for the first time, the current password reading number is not updated. That is, the current password reading number is not updated from N to N +1 in the memory, but is maintained in N.
Example 2
Fig. 3 is a flowchart illustrating a method for reading a status and a password of a consumable chip according to embodiment 2 of the present invention, as shown in fig. 3, in steps S01 to S25, step S01, step S03 and step S04 are the same as those in embodiment 1, and will not be repeated here, and the differences from embodiment 1 are step S22 and step S25, which specifically include:
in step S22, it is determined whether the preset counter is equal to the preset value.
In this embodiment, the consumable chip has a counter, which may be an increment-only counter that can be incremented without being decremented. The counter is stored in a memory (e.g., memory 12); the counter can also be arranged on the consumable chip in a hardware mode, and the counter is controlled to count through the controller.
The consumable chip judges whether the counter is equal to a preset value or not. If the counter equals the preset value, it means that the consumable chip has provided a predetermined number of different passwords to the printing apparatus. Therefore, if the counter is equal to the preset value, the consumable chip sends state information and a pseudo password to the printing device, wherein the state information comprises the number of password reading pseudo numbers. If the counter is not equal to the preset value, it means that the consumable chip does not provide a predetermined number of different passwords to the printing apparatus. Therefore, the consumable chip sends status information and a password to the printing device, wherein the status information comprises the current password reading number.
In step S25, the counter is incremented.
It is understood that after the consumable chip sends a new password to the printing device, the counter indicating the number of password readings is incremented.
Example 3
Fig. 4 is a flowchart illustrating a consumable chip authentication method according to embodiment 3 of the present invention, and as shown in fig. 4, in steps S01 to S37, steps S01, S03 and S05 are the same as those in embodiment 1, and will not be repeated here, and the differences from embodiment 1 are step S32, step S36 and step S37, which specifically include: :
in step S32, it is determined whether the preset flag is set.
The consumable chip is stored with a preset mark, wherein the preset mark is used for indicating that the number of the read passwords reaches a preset value. The flag may be a settable only flag that can be set but not cleared.
The consumable chip judges whether the flag is set. If the flag has been set, it means that the consumable chip has provided a predetermined number of different passwords to the printing apparatus, i.e., the number of password readings has reached a preset value. Therefore, if the flag is set, the consumable chip sends status information including the password read pseudo number and a pseudo password to the printing apparatus. If the flag is not set, it means that the consumable chip does not provide a predetermined number of different passwords to the printing apparatus, i.e., the number of password readings does not reach the preset value. Therefore, the consumable chip sends status information and a password to the printing device, wherein the status information comprises the current password reading number.
Step S36, determine whether the updated password reading number exceeds a preset value.
In this embodiment, the consumable chip determines whether the updated password reading number exceeds a preset value. And when the updated password reading number exceeds the preset value, setting the preset mark by the consumable chip. And when the updated password reading number does not exceed the preset value, the consumable chip finishes the process.
In step S37, the consumable chip sets a preset flag.
Example 4
Fig. 5 is a schematic flowchart of a consumable chip authentication method according to embodiment 4 of the present invention, where the method includes:
step S11, receiving a status reading request sent by the printing apparatus, the status reading request being used for instructing to read status information of the consumable chips. Wherein the state information includes the current password reading number. The number of current password reading is N, and N is a positive integer greater than or equal to 0.
Understandably, after the consumable provided with the consumable chip is installed on the printing device, the printing device can provide an electric signal for the consumable chip, and the printing device supplies power to the consumable chip. The printing equipment sends a state reading request to the consumable chip, starts to communicate with the consumable chip, and the consumable chip receives the state reading request.
The state information also comprises consumable serial numbers, consumable production dates, manufacturer information, consumable consumption, consumable exhaustion marks and the like.
Step S12, determine whether the current number of password reads exceeds a preset value.
The consumable chip judges whether the consumable is used for the first time according to the state information after receiving the state reading request; and when the consumable is not used for the first time, judging whether the current password reading number exceeds a preset value.
The preset values are set by a development designer, and may be, for example, 8, 12, 20, and the like, which is not limited herein.
In step S13, when the current password reading number does not exceed the preset value, status information is sent to the printing apparatus, where the status information includes the current password reading number.
In this embodiment, when the printing apparatus receives the status information, a password read request is sent to the consumable chip.
And step S14, when the password reading number exceeds the preset value, sending status information to the printing equipment, wherein the status information comprises the password reading pseudo number.
Specifically, the number of password reading artifacts is, for example, another integer value smaller than a preset value. In another embodiment, the pseudo number of password reads is, for example, the actual number of password reads.
In step S15, a password read request sent by the printing apparatus is received.
Step S16, determine whether the current number of password reads exceeds a preset value.
And step S17, when the password reading number does not exceed the preset value, the consumable chip sends the password to the printing equipment.
And step S18, when the password reading number exceeds the preset value, the consumable chip sends a pseudo password to the printing equipment. The pseudo password here is an error password such as "0000"/"FFFF".
In step S19, the number of current password reads is updated from N to N + 1.
Wherein, step S19 includes:
judging whether the password sent to the printing equipment is used for the first time;
when the password transmitted to the printing apparatus is first used, the current password reading number is updated from N to N +1, for example, from 0 to 1.
When the password transmitted to the printing apparatus is not used for the first time, the current password reading number is not updated. That is, the current password reading number is not updated from N to N +1 in the memory, but is maintained in N.
Example 5
Fig. 6 is a schematic structural diagram of an authentication apparatus for a consumable chip according to embodiment 5 of the present invention, the authentication apparatus for a consumable chip is used for performing the authentication method for the consumable chip, and referring to fig. 6, the authentication apparatus includes a receiving unit 10, a determining unit 20, a first sending unit 30, a second sending unit 40, and an updating unit 50.
A receiving unit 10, configured to receive a status and a password reading request sent by a printing apparatus, where the reading request is used to instruct to read status information and a password of a consumable chip;
a judging unit 20, configured to judge whether a current password reading number exceeds a preset value;
a first sending unit 30, configured to send status information and a password to the printing apparatus when the current password reading number does not exceed a preset value, where the status information includes the current password reading number;
a second sending unit 40, configured to send status information and a pseudo password to the printing apparatus when the current password reading number exceeds a preset value, where the status information includes the password reading pseudo number;
and the updating unit 50 is used for updating the current password reading number after the status information and the password are sent to the printing equipment.
Understandably, after the consumable provided with the consumable chip is installed on the printing device, the printing device can provide an electric signal for the consumable chip, namely, the printing device supplies power to the consumable chip. The printing equipment sends a state and password reading request to the consumable chip, starts to communicate with the consumable chip, and the consumable chip receives the state and password reading request.
The state information comprises a consumable serial number, a consumable production date, manufacturer information, consumable consumption, a consumable exhaustion identifier, a current password reading number and the like. Specifically, the number of current password reads is N, where N is a positive integer greater than or equal to 0.
Optionally, the apparatus further comprises a generating unit.
And the generating unit is used for generating the password by using a preset secret key.
It can be understood that the number of password readings increases by 1 for each password read in the memory. When the password requested by the printing equipment to the consumable chip is the read password, namely the password is requested for the same password for multiple times, a preset secret key is not needed to be used for generating a new password, and the current password reading number in the state information cannot be changed. When the password requested by the printing equipment to the consumable chip is a new password (password which is not read), a key is needed to generate the new password, and the number of current password reads in the state information is updated from N to N + 1.
Illustratively, 32 passwords can be stored in the memory in total, but since the printing device is only allowed to read the partial passwords (the consumable chip retrieves the partial passwords), for example, only 8 passwords can be read, when the number of the password readings of the consumable chips reaches a preset value, the remaining 24 passwords cannot be retrieved and read, so that after the printing materials in the consumable are consumed, the consumable chips cannot be reused due to the fact that the consumable chips are limited to reading the number of the passwords.
In one embodiment, the printing device signs the status, the password read request with a digital encryption key, or in some other manner.
In this embodiment, after the printing device receives the status information and the password, the consumable chip is authenticated according to the password. And the printer can utilize the consumable material where the consumable material chip is located to execute image printing after the authentication is passed, otherwise, the image printing cannot be carried out.
It is understood that, when a printing apparatus performs consumable authentication, only authenticated consumables can be applied to the printing apparatus, and otherwise, cannot be applied.
In one embodiment, the pseudo password may be a predetermined error character, such as "0000"/"FFFF" or other error password.
Optionally, the apparatus further includes a first processing unit, configured to modify a preset key and generate a pseudo password by using the modified key.
It is understood that the key used to generate the cipher may be changed after the number of cipher readings reaches a predetermined value, for example, after the key is operated/changed, the key may be changed to generate a pseudo cipher different from the true cipher.
Optionally, the apparatus further includes a second processing unit, configured to, after the password is generated by the generation unit, change the generated password to obtain a pseudo password.
It can be understood that, after the number of read passwords reaches the preset value, the key is interfered when generating the real password, for example, after the generated real password is operated/changed, the generated real password is changed into a pseudo password different from the real password. After the number of the passwords read reaches the preset value, the passwords which are not read, such as the rest 24 passwords, are operated/changed to become pseudo passwords different from the real passwords, wherein the read passwords are not changed.
In yet another embodiment, the pseudo password is a read password. For example, after the number of password readings reaches the preset value, the key generates the same password as before the number of password readings reaches the preset value as a pseudo password, for example, when the number of password readings reaches 8, the consumable chip sends the state information and the pseudo password, for example, the password sent when the printing device reads the password for the 2 nd time is sent to the printing device.
Further, the number of password reading artifacts is, for example, any positive integer smaller than a preset value. For example, in other embodiments, the preset value of the number of password reads is 8, and the number of password read pseudo numbers may be a preset positive integer smaller than 8, such as 1, 2, 3, and the like.
And when the current password reading number reaches 8, the consumable chip replaces the current password reading number in the state information by the password reading pseudo number, and sends the replaced state information and the pseudo password to the printing equipment.
Further, a preset fixed value, for example, 3, may be set as the number of password reading artifacts, or a random positive integer smaller than a preset value may be set as the number of password reading artifacts;
in the above embodiment, the sending of the password reading pseudo number is to prevent data from being stolen after the consumable chip is discarded.
In another embodiment, the password reading pseudo number is the actual current password reading number; for example, the preset value of the number of password readings is 8, and when the number of password readings reaches 8, the printing device reads the status information and the new password, the consumable chip sends the current number of password readings, such as the number of password readings of 9, and the pseudo password to the printing device. And in this embodiment, the second sending unit 40 and the updating unit 50 of the consumable chip execute in sequence to record the current real password reading number. In this embodiment, the current number of sent passwords is used to record the actual number of sent passwords and the actual usage of consumables.
In the scheme, when the number of the passwords in the consumable chip exceeds the preset value, the printing equipment cannot read other passwords or the consumable chip cannot retrieve or generate other passwords, so that other manufacturers are effectively prevented from stealing the passwords.
Optionally, the updating unit 50 includes a judging subunit, an updating subunit and a processing subunit.
A judgment subunit that judges whether the password sent to the printing apparatus is used for the first time;
an updating subunit, configured to update the current password reading number when the password sent to the printing apparatus is used for the first time;
and the processing subunit is used for not updating the password reading number when the password sent to the printing equipment is not used for the first time. That is, the current password reading number is not updated from N to N +1 in the memory, but is maintained in N.
Example 7
Embodiment 7 of the present invention provides a computer-readable storage medium, where the storage medium includes a stored program, and when the program runs, the storage medium is controlled to execute the method for authenticating a consumable chip according to any one of embodiments 1 to 5.
The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
Example 8
Embodiment 8 of the present invention provides a consumable chip, including a controller and a memory, where the memory stores an executable computer program, and the controller implements the authentication method of the consumable chip according to any one of embodiments 1 to 5 when executing the computer program.
Example 9
Embodiment 9 of the present invention provides a printing consumable, where the printing consumable includes a consumable chip, the consumable chip includes a controller and a memory, the memory stores an executable computer program, and the controller implements the authentication method of the consumable chip according to any one of embodiments 1 to 5 when executing the computer program.
The Memory in the above embodiment may be a ROM, Flash Memory, or the like, but is not limited thereto.
Those skilled in the art will appreciate that all or part of the processes in the above method embodiments may be implemented by a computer program instructing associated hardware.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalent substitutions, improvements, etc. within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (12)

1. An authentication method of a consumable chip, performed on a consumable chip comprising a memory, the method comprising:
receiving a password reading request sent by a printing device;
judging whether the current password reading number exceeds a preset value;
when the current password reading number does not exceed the preset value, sending a password to the printing equipment;
when the current password reading number exceeds the preset value, changing a preset secret key, generating a pseudo password by using the changed secret key, and sending the pseudo password to the printing equipment;
and after the password is sent to the printing equipment, updating the current password reading number.
2. The method of claim 1, wherein the pseudo password is a predetermined error character.
3. The method of claim 1, wherein the pseudo password is a read password.
4. The method of claim 1, wherein prior to the sending the password to the printing device, the method further comprises:
and generating a password by using a preset secret key.
5. The method of claim 4, wherein prior to the sending the pseudo password to the printing device, the method further comprises:
and generating a password by using the preset secret key, and changing the generated password to obtain a pseudo password.
6. The method of claim 1, wherein prior to the receiving the password read request sent by the printing device, the method further comprises:
receiving a state reading request sent by a printing device;
judging whether the current password reading number exceeds the preset value;
when the current password reading number does not exceed the preset value, sending state information to the printing equipment, wherein the state information comprises the current password reading number;
and when the current password reading number exceeds the preset value, sending status information to the printing equipment, wherein the status information comprises the password reading pseudo number.
7. The method of claim 6, wherein the pseudo number of password reads is any positive integer smaller than the preset value.
8. The method of any one of claims 1 to 7, wherein updating the current number of password reads comprises:
judging whether the password sent to the printing equipment is used for the first time or not;
when the password sent to the printing equipment is used for the first time, updating the current password reading number;
when the password transmitted to the printing apparatus is not used for the first time, the current password reading number is not updated.
9. An authentication method of a consumable chip, performed on a consumable chip comprising a memory, the method comprising:
receiving a state and password reading request sent by printing equipment, wherein the reading request is used for indicating to read the state information and the password of the consumable chip;
judging whether a preset counter is equal to a preset value or not;
when the counter is not equal to the preset value, sending state information and a password to the printing equipment, wherein the state information comprises the current password reading number;
when the counter is equal to the preset value, the preset secret key is changed, a pseudo password is generated by using the changed secret key, state information and the pseudo password are sent to the printing equipment, and the state information comprises the number of password reading pseudo;
incrementing the counter after sending the status information and the password to the printing device.
10. An authentication method of a consumable chip, performed on a consumable chip comprising a memory, the method comprising:
receiving a state and password reading request sent by printing equipment, wherein the reading request is used for indicating to read the state information and the password of the consumable chip;
judging whether a preset mark is set or not;
when the preset mark is not set, sending state information and a password to the printing equipment, wherein the state information comprises the current password reading number;
when the preset mark is set, changing a preset secret key, generating a pseudo password by using the changed secret key, and sending state information and the pseudo password to the printing equipment, wherein the state information comprises the number of password reading pseudo;
and after the state information and the passwords are sent to the printing equipment, updating the current password reading number.
11. The method of claim 10, wherein after updating the current number of password reads, the method further comprises:
judging whether the updated password reading number exceeds a preset value;
and setting the preset mark when the updated password reading number exceeds the preset value.
12. A printing consumable comprising a consumable chip, wherein the consumable chip comprises a controller and a memory, the memory stores an executable computer program, and the controller implements the authentication method of the consumable chip according to any one of claims 1 to 11 when executing the computer program.
CN201911264704.9A 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable Active CN110920261B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110474514.0A CN113199870B (en) 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable
CN201911264704.9A CN110920261B (en) 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911264704.9A CN110920261B (en) 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110474514.0A Division CN113199870B (en) 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable

Publications (2)

Publication Number Publication Date
CN110920261A CN110920261A (en) 2020-03-27
CN110920261B true CN110920261B (en) 2021-05-04

Family

ID=69858858

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201911264704.9A Active CN110920261B (en) 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable
CN202110474514.0A Active CN113199870B (en) 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202110474514.0A Active CN113199870B (en) 2019-12-11 2019-12-11 Authentication method of consumable chip and printing consumable

Country Status (1)

Country Link
CN (2) CN110920261B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115742573A (en) * 2021-11-30 2023-03-07 极海微电子股份有限公司 Consumable chip and consumable box
CN114274676B (en) * 2021-12-22 2023-06-20 极海微电子股份有限公司 Authentication information switching method, consumable chip and consumable box

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000198220A (en) * 1998-11-05 2000-07-18 Seiko Epson Corp Ink-jet recording apparatus, and ink cartridge
CN202448490U (en) * 2012-03-06 2012-09-26 杭州旗捷科技有限公司 Printing-supplies storage chip
US9030682B2 (en) * 2013-01-02 2015-05-12 Static Control Components, Inc. Systems and methods for universal imaging components
EP3698976B1 (en) * 2016-06-17 2021-08-04 Hewlett-Packard Development Company, L.P. Replaceable item authentication
CN106302514A (en) * 2016-09-06 2017-01-04 苏州协鑫集成科技工业应用研究院有限公司 The dynamic encrypting method of memory card and decryption method and device thereof
AU2016325189A1 (en) * 2016-10-27 2018-05-17 Hewlett-Packard Development Company, L.P. Replaceable item authentication
KR101934221B1 (en) * 2016-10-27 2018-12-31 휴렛-팩커드 디벨롭먼트 컴퍼니, 엘.피. Replaceable item authentication
CN106671610B (en) * 2017-01-03 2018-07-24 珠海艾派克微电子有限公司 Sequence number method of adjustment, device, consumable chip and imaging cartridge
WO2018188071A1 (en) * 2017-04-14 2018-10-18 广州众诺电子技术有限公司 Method for verifying consumable chip, consumable chip and consumable container
US10833877B2 (en) * 2017-10-12 2020-11-10 Canon Kabushiki Kaisha Method of authenticating authentication-target apparatus by authentication apparatus, authentication apparatus, authentication- target apparatus, and image forming apparatus
CN108116053B (en) * 2017-12-19 2019-07-26 杭州旗捷科技有限公司 A kind of consumable chip authentication method, consumable chip and imaging cartridge
CN110001210B (en) * 2018-10-16 2020-02-18 珠海艾派克微电子有限公司 Consumable chip, consumable, and image forming system
CN110370810B (en) * 2019-07-22 2020-05-29 珠海中恒集成电路有限公司 Consumable chip data processing method and device, consumable chip and imaging box

Also Published As

Publication number Publication date
CN110920261A (en) 2020-03-27
CN113199870B (en) 2022-06-28
CN113199870A (en) 2021-08-03

Similar Documents

Publication Publication Date Title
US9857727B2 (en) Imaging supply memory
KR101485750B1 (en) Authenticating a replaceable printer component
EP3183122B1 (en) Printing material cartridge
KR20150033895A (en) crum chip mauntable in comsumable unit, image forming apparatus for authentificating the crum chip, and method thereof
CN110920261B (en) Authentication method of consumable chip and printing consumable
EP2286328B3 (en) Replaceable printer component including a memory storing a tag encryption mask
JP2005288878A (en) System for managing consumables
KR101837364B1 (en) Printing material cartridge
KR20090048830A (en) Image forming apparatus and method the same
JP2007086897A (en) Image formation apparatus, program and method
CN111629118B (en) Chip verification method, consumable chip and imaging box
CN114274676B (en) Authentication information switching method, consumable chip and consumable box
US20240146540A1 (en) Logic circuitry
CN117435148A (en) Communication method of consumable chip, consumable and image forming device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 519060 building 01, 83 Guangwan street, Xiangzhou District, Zhuhai City, Guangdong Province

Patentee after: Jihai Microelectronics Co.,Ltd.

Address before: 519060 building 01, 83 Guangwan street, Xiangzhou District, Zhuhai City, Guangdong Province

Patentee before: APEX MICROELECTRONICS Co.,Ltd.