CN110968274B - Color printer control method and system based on SOC chip - Google Patents

Color printer control method and system based on SOC chip Download PDF

Info

Publication number
CN110968274B
CN110968274B CN201911194068.7A CN201911194068A CN110968274B CN 110968274 B CN110968274 B CN 110968274B CN 201911194068 A CN201911194068 A CN 201911194068A CN 110968274 B CN110968274 B CN 110968274B
Authority
CN
China
Prior art keywords
control
information
strategy
protection
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911194068.7A
Other languages
Chinese (zh)
Other versions
CN110968274A (en
Inventor
张怿
黄智�
王伟聪
吴泽民
龙安川
唐忞旻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Castle Security Tech Co ltd
Original Assignee
Shenzhen Castle Security Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Castle Security Tech Co ltd filed Critical Shenzhen Castle Security Tech Co ltd
Priority to CN201911194068.7A priority Critical patent/CN110968274B/en
Publication of CN110968274A publication Critical patent/CN110968274A/en
Application granted granted Critical
Publication of CN110968274B publication Critical patent/CN110968274B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1253Configuration of print job parameters, e.g. using UI at the client
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server

Abstract

The embodiment of the application provides a color printer control method and system based on an SOC chip, a control code instruction of control information is obtained from a preset encryption area through the cooperation of the SOC chip and a safety control chip, each line of control code in the control code instruction is detected to be in a safety parameter in the safety control chip, a control result corresponding to each line of control code is recorded at the same time, the safety control chip is independent of the SOC chip and can be used for setting the safety parameter of each printer control task, when the safety parameter changes, the surface of the color printer possibly has a safety problem in the control process, and at the moment, the safety problem is reported to a server.

Description

Color printer control method and system based on SOC chip
Technical Field
The application relates to the technical field of printers, in particular to a color printer control method and system based on an SOC chip.
Background
In the prior art, the color printer is controlled by a remote terminal, and the color printer works independently in the printing control process, so that the safety of the color printer is one of important considerations, if a large number of safety problems occur, the quality of the control process can be greatly influenced, and critical information can be seriously damaged or stolen due to the safety problems. The current operation and maintenance mode mainly comprises manual remote checking according to results, so that the labor cost and time cost are high, time and labor are consumed, and the efficiency is extremely low; if thousands of color printers need to be maintained, the manual checking mode obviously cannot meet the requirements.
Disclosure of Invention
In order to overcome at least the above disadvantages in the prior art, an object of the present application is to provide a color printer control method and system based on an SOC chip, wherein a control code command of control information is obtained from a preset encryption region through cooperation between the SOC chip and a security control chip, a security parameter of each line of control code in the control code command in the security control chip is detected, and a control result corresponding to each line of control code is recorded.
In a first aspect, the present application provides a color printer control method based on an SOC chip, applied to a color printer control system based on an SOC chip, the color printer control system based on an SOC chip includes a color printer, a control terminal and a server in communication connection with the color printer and the control terminal, the color printer is provided with an SOC chip and a security control chip electrically connected to the SOC chip, the method includes:
when receiving a printer control task sent by the control terminal, the server analyzes a task message of the printer control task to determine control information of the color printer and sends the control information to the color printer;
the color printer acquires a control code instruction of the control information from a preset encryption area through the SOC chip according to the control information;
reading each line of control codes in the control code instruction, detecting the safety parameters of each line of control codes in the safety control chip, and recording the control result corresponding to each line of control codes;
counting whether the safety parameters of the corresponding control codes in the safety control chip change in safety type or not in all the control results corresponding to each row of the control codes, and if the safety parameters change in safety type, sending the corresponding control results to the server;
and the server generates a corresponding safety protection control strategy according to the control result and sends the safety protection control strategy to the color printer.
In one possible design of the first aspect, the step of parsing the task message of the printer control task to determine the control information of the color printer includes:
determining at least one control node identified from within control node data indicated by a task message of a printer control task as a current control node;
matching the control node information of the current control node with the control node information of each control node to be determined respectively;
when the control node information of the current control node is matched with the control node information of any control node to be determined, determining that the current control node is the control node to be determined, and updating the control logic information of the control node to be determined, otherwise, determining that the current control node is a new control node to be determined, and establishing the control logic information of the new control node to be determined, wherein the control logic information comprises: control time sequence information, control node identification, time sequence number of each control time sequence and storage control time sequence information of the control node to be determined on the control node data;
acquiring control strategy information in the control logic information through a first control container according to the control logic information of each control node to be determined, wherein the control strategy information is obtained through Hash calculation of the control time sequence information, a control node identifier, a time sequence number of each control time sequence and storage control time sequence information through the first control container;
automatically extracting a plurality of specific control strategies from the control strategy information as permitted control strategies, respectively carrying out simulation control processing on the control strategies according to the control processes, the control time sequences and the hidden Markov model algorithm of the plurality of permitted control strategies after the permitted control strategies are locked, calculating strategy feasibility degree information of each permitted control strategy in the control strategy information, and storing the strategy feasibility degree information in a database;
determining a first control level value and a first control time sequence number value of the control logic information in a second control container according to the strategy feasibility degree information of the permitted control strategies in the control strategy information, calculating a first control level value and a first control time sequence number value corresponding to the strategy feasibility degree information of each permitted control strategy, and storing the first control level value and the first control time sequence number value in a database, wherein the first control level value and the first control time sequence number value are updated in real time along with the dynamic transformation of the permitted control strategies in the control strategy information;
calculating the first control level value and the first control time sequence number value corresponding to the current permitted control strategy through the second control container to obtain the strategy content, so that the second control container always calculates the permitted control strategy and continuously simulates and controls the permitted control strategy in real time;
identifying the strategy content of the permitted control strategy in the control strategy information according to the control process and the control time sequence information of the permitted control strategy, identifying the control process of the next time sequence, calculating a first control grade value and a first control time sequence number value corresponding to the next time sequence, transmitting the first control grade value and the first control time sequence number value to a second control container, and controlling the second control container to carry out simulation control processing on the permitted control strategy;
when the permitted control strategy is blocked in the control logic information and cannot be permitted, carrying out identification processing and simulation control processing on the permitted control strategy according to the control process and control sequence information of the permitted control strategy and the past process information thereof as well as feedback information during blocking;
calculating a plurality of identification control processes which are possibly carried out by the permitted control strategy and corresponding strategy feasibility degrees thereof through identification processing, carrying out analog control processing on a second control container according to the identification control process with the maximum strategy feasibility degree, carrying out control strategy identification detection on feedback information during blocking in control strategy information according to the identification control processes through a first control container, finishing the analog control processing on the second control container when the first control container detects the permitted control strategy, carrying out processing on the permitted control strategy according to control time sequence information thereof, and acquiring strategy content thereof;
after the first control container locks the permitted control strategy, calculating a time sequence hash value of the permitted control strategy, appointing the permitted control strategy by the second control container according to a first control level value and a first control time sequence value converted by the time sequence hash value, re-appointing the permitted control strategy in the strategy content, calculating a control process hash value of the permitted control strategy in the strategy content, and judging whether the control process hash value is a set control process of the strategy content;
if yes, locking the permitted control strategy, and dynamically adjusting the second control container along with the change of the permitted control strategy so that the permitted control strategy is always locked in the strategy content;
if not, calculating a second control grade value and a second control time sequence number value corresponding to the next time sequence of the permitted control strategy in the second control container according to the central control process, and adjusting the strategy content through the second control container according to the second control grade value and the second control time sequence number value;
and obtaining the control information of the color printer according to the adjusted strategy content.
In a possible design of the first aspect, the step of matching the control node information of the current control node with the control node information of each control node to be determined includes:
determining the association degree of the current control node and each control node to be determined according to the control time sequence information of the current control node on the task message of the printer control task and the control time sequence information of each control node to be determined in the last control information;
when the minimum association degree in the association degrees of the current control node and each control node to be determined is smaller than a first threshold value, determining that the current control node is matched with a first control node to be determined corresponding to the minimum association degree, and otherwise, matching the identification information of the current control node with the identification information of each control node to be determined;
when the second small association degree in the association degrees of the current control node and each control node to be determined is smaller than a second threshold value, and the number of the same identifiers in the identifier information of the current control node and the identifier information of a second control node to be determined corresponding to the second small association degree is larger than a set number, determining that the current control node is matched with the second control node to be determined, otherwise, determining that the current control node is a new control node to be determined.
In a possible design of the first aspect, the step of the color printer obtaining, by the SOC chip, a control code instruction associated with the control information from a preset encryption area according to the control information includes:
the color printer searches a corresponding preset encryption area through the SOC chip according to the control information;
constructing virtual printers in preset encryption areas corresponding to the actual physical control process of the color printer, wherein each virtual printer corresponds to one encryption area, and the encryption areas corresponding to different virtual printers have overlapping areas;
in the process that the color printer acquires control information through the SOC chip, receiving actual receiving node information of the control information from the color printer in an area where the control information is actually received, and determining a first encryption characteristic of the control information in the preset encryption area by using the actual receiving node information;
judging whether the first encryption characteristic is located in an overlapping area of an encryption area of a first virtual printer and an encryption area of a second virtual printer corresponding to the color printer;
if yes, determining that the control information is transferred to an encryption area of a second color printer corresponding to the second virtual printer;
determining a current virtual function script of the second virtual printer as a first script, determining a virtual function script between the current virtual function script of the second virtual printer and the first encryption feature of the control information in the preset encryption region as a second script, and obtaining an encryption feature identifier of the color printer, which needs to execute encryption access, as a script feature matching identifier between the first script and the second script;
and carrying out an encryption access request to the searched preset encryption area through the SOC chip according to the encryption characteristic identifier of the color printer needing to execute encryption access so as to acquire a control code instruction of the control information from the preset encryption area.
In a possible design of the first aspect, the step of generating, by the server, a corresponding security protection control policy according to the control result includes:
the server acquires a suspected protection process of the color printer in the current printer control task according to the control result;
determining a plurality of suspected nodes in the executing process of the current printer control task again according to the protection suspected process, and acquiring the control process of each suspected node;
obtaining a subordinate protection suspected process on the current printer control task based on the control process of each suspected node, wherein the subordinate protection suspected process is used for assisting the control process of the color printer on the subsequent printer control task;
dividing the suspected protection process and the suspected slave protection process into a plurality of protection process lists according to the process information of the suspected protection process and the suspected slave protection process;
establishing a first protection control model for each protection process list, and obtaining a control process of the suspected protection process in the next task which is the same as the current printer control task according to the first protection control model;
generating a second protection control model according to a control process of the suspected protection process in a next task which is the same as the current printer control task, wherein the second protection control model comprises a primary protection control model and a protection verification model; the primary protection control model comprises extracted bottom-level semantic features of the control process, the protection verification model comprises extracted high-level semantic features of the control process in a second description mode, the complexity of the bottom-level semantic features is smaller than that of the high-level semantic features of the second description mode, and the complexity is used for representing the control quantity of the control process on each unit time sequence;
determining a to-be-defined characteristic in a primary protection control model of the control process;
extracting a plurality of semantic features to be contrasted from a protection verification model of the control process;
calculating the association degree of each undetermined comparison semantic feature and the undetermined semantic feature;
determining a pending comparison semantic feature with the highest association degree with the pending semantic feature from the plurality of pending comparison semantic features as the pending semantic feature;
and generating a corresponding safety protection control strategy according to the determined undetermined semantic features and the corresponding relation between the features and the control strategy.
In a possible design of the first aspect, the step of establishing a first protection control model for each protection process list, and obtaining a control process of the suspected protection process in a next task that is the same as the current printer control task according to the first protection control model includes:
dividing each protection process list in the current printer control task into two lists, wherein the first list is as follows: the suspected protection processes in the protection process list are aggregated in the current printer control task, and the second list is as follows: respectively aiming at suspected nodes contained in each protection process list;
constructing a protection association model for each protection process list, wherein the protection association model is obtained by constructing a minimum association model for the protection suspected processes in each list of the same protection process list and combining the protection suspected processes with process overlapping between different lists of the same protection process list;
and converging the protection correlation model to obtain a control process of the suspected protection process in the next task which is the same as the current printer control task.
In a possible design of the first aspect, after the step of generating, by the server, a corresponding security control policy according to the control result and sending the security control policy to the color printer, the method further includes:
and the color printer acquires corresponding safety protection control information from the safety protection control strategy through the SOC chip and updates the safety monitoring parameters of the safety control chip according to the safety protection control information.
In a possible design of the first aspect, the step of updating the security monitoring parameter of the security control chip according to the security protection control information includes:
presetting a safety zone according to the safety protection control information, and determining the characteristics of a target safety zone according to each preset safety zone;
according to the determined target safety region characteristics, acquiring safety monitoring nodes of each planned preset safety region in the safety control chip, and generating target safety monitoring nodes according to the safety monitoring nodes of the target safety region characteristics in the SOC chip and the safety monitoring nodes in the safety control chip;
scribing according to a preset safety area to generate different first safety areas;
respectively calculating the association rate of a first safety region and a target safety monitoring node, and selecting a safety region exceeding a preset association rate from the first safety region as a second safety region;
determining a safety region corresponding to the safety monitoring parameters of the safety control chip as a third safety region according to a safety region characteristic region in the second safety region;
integrating the target safety monitoring node and the third safety region to obtain a final target safety monitoring node;
and updating the safety monitoring parameters of the safety control chip according to the final target safety monitoring node and the safety monitoring parameters to be replaced indicated in the safety protection control information.
In a second aspect, an embodiment of the present application provides a color printer control system based on an SOC chip, where the color printer control system based on the SOC chip includes a color printer, a control terminal, and a server in communication connection with the color printer and the control terminal, and a security control chip electrically connected to the SOC chip and disposed in the color printer;
the server is used for analyzing a task message of the printer control task to determine control information of the color printer and sending the control information to the color printer when receiving the printer control task sent by the control terminal;
the color printer is used for acquiring a control code instruction of the control information from a preset encryption area through the SOC chip according to the control information;
the color printer is used for reading each line of control codes in the control code instruction, detecting the safety parameters of each line of control codes in the safety control chip and recording the control result corresponding to each line of control codes;
the color printer is used for counting whether the safety parameters of the corresponding control codes in the safety control chip change in safety type or not in all the control results corresponding to each line of control codes recorded, and if the safety parameters change in safety type, the corresponding control results are sent to the server;
and the server is used for generating a corresponding safety protection control strategy according to the control result and sending the safety protection control strategy to the color printer.
In a third aspect, an embodiment of the present application provides a color printer control method based on an SOC chip, which is applied to a color printer in a color printer control system based on an SOC chip, where the color printer control system based on an SOC chip further includes a server and a control terminal, the color printer and the control terminal are in communication link with the server, and the color printer is provided with the SOC chip and a security control chip electrically connected to the SOC chip, where the method includes:
receiving the control information of the color printer determined by analyzing the task message of the printer control task when the server receives the printer control task sent by the control terminal;
acquiring a control code instruction of the control information from a preset encryption area through the SOC chip according to the control information;
reading each line of control codes in the control code instruction, detecting the safety parameters of each line of control codes in the safety control chip, and recording the control result corresponding to each line of control codes;
counting whether the security parameters of the corresponding control codes in the security control chip change in security type in all the control results corresponding to each line of the recorded control codes, and if the security parameters change in security type, sending the corresponding control results to the server, so that the server generates a corresponding security protection control strategy according to the control results, and sends the security protection control strategy to the color printer.
In a fourth aspect, the present application provides a color printer control apparatus based on SOC chip, is applied to the color printer in the color printer control system based on SOC chip, color printer control system based on SOC chip still includes server and control terminal, color printer and control terminal and server communication link, be provided with in the color printer SOC chip and with SOC chip electric connection's safety control chip, the apparatus includes:
the receiving module is used for receiving the control information of the color printer determined by analyzing the task message of the printer control task when the server receives the printer control task sent by the control terminal;
the acquisition module is used for acquiring a control code instruction of the control information from a preset encryption area through the SOC chip according to the control information;
the reading detection module is used for reading each line of control codes in the control code instruction, detecting the safety parameters of each line of control codes in the safety control chip and recording the control results corresponding to each line of control codes;
and the statistical recording module is used for counting whether the security parameters of the corresponding control codes in the security control chip change in security types or not in all the control results corresponding to each row of the recorded control codes, and if the security parameters change in security types, sending the corresponding control results to the server so that the server generates corresponding security protection control strategies according to the control results and sends the security protection control strategies to the color printer.
In a fifth aspect, embodiments of the present application provide a color printer, including a processor, a memory, and a network interface. The memory and the network interface processor can be connected through a bus system. The network interface is configured to receive a message, the memory is configured to store a program, instructions or code, and the processor is configured to execute the program, instructions or code in the memory to perform the operations of the first aspect or any possible design of the first aspect.
In a sixth aspect, embodiments of the present application provide a computer-readable storage medium having stored therein instructions that, when detected on a computer, cause the computer to perform the above-mentioned method.
Based on any one of the aspects, the control code instruction of the control information is acquired from the preset encryption area through the matching of the SOC chip and the safety control chip, each line of control code in the control code instruction is detected to be in the safety parameter in the safety control chip, and the control result corresponding to each line of control code is recorded at the same time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic view of an application scenario of a color printer control system based on an SOC chip according to an embodiment of the present application;
FIG. 2 is a schematic flowchart of a method for controlling a color printer based on an SOC chip according to an embodiment of the present disclosure;
FIG. 3 is a second flowchart of a method for controlling a color printer based on an SOC chip according to an embodiment of the present application;
FIG. 4 is a schematic flow chart of another method for controlling a color printer based on an SOC chip according to an embodiment of the present disclosure;
fig. 5 is a functional block diagram of a SOC-chip-based color printer control apparatus according to an embodiment of the present application, corresponding to the SOC-chip-based color printer control method shown in fig. 4;
fig. 6 is a block diagram schematically illustrating a structure of a color printer for executing the SOC-chip-based color printer control method according to an embodiment of the present application.
Detailed Description
The present application will now be described in detail with reference to the drawings, and the specific operations in the method embodiments may also be applied to the apparatus embodiments or the system embodiments. In the description of the present application, "at least one" includes one or more unless otherwise specified. "plurality" means two or more. For example, at least one of A, B and C, comprising: a alone, B alone, a and B in combination, a and C in combination, B and C in combination, and A, B and C in combination. In this application, "/" means "or, for example, A/B may mean A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone.
Fig. 1 is an interactive schematic diagram of a color printer control system 10 based on an SOC chip according to an embodiment of the present application. For example, the SOC chip-based color printer control system 10 may be an online debugging platform for, for example, a laser printer. The SOC chip-based color printer control system 10 may include a color printer 100, a server 200, and a control terminal 300, and the server 200 may include therein a processor that performs an instruction operation. The SOC-chip based color printer control system 10 shown in fig. 1 is only one possible example, and in other possible embodiments, the SOC-chip based color printer control system 10 may include only a portion of the components shown in fig. 1 or may include other components.
In some embodiments, the server 200 may be a single server or a group of servers. The set of operating servers may be centralized or distributed (e.g., server 200 may be a distributed system). In some embodiments, server 200 may be local or remote to color printer 100. For example, the server 200 may access information stored in the color printer 100, the control terminal 300, and a database, or any combination thereof, via a network. As another example, the server 200 may be directly connected to at least one of the color printer 100, the control terminal 300, and a database to access information and/or data stored therein. In some embodiments, the server 200 may be implemented on a cloud platform; by way of example only, the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud (community cloud), a distributed cloud, an inter-cloud, a multi-cloud, and the like, or any combination thereof. In some embodiments, the server 200, the color printer 100, and the control terminal 300 may be implemented on an electronic device 200 having one or more components shown in fig. 2 in the embodiments of the present application.
In some embodiments, the server 200 may include a processor. The processor may process information and/or data related to the service request to perform one or more of the functions described herein. For example, in a shared printing service, the processor may determine a target laser printer based on a print reservation request obtained from a commissioning terminal. A processor may include one or more processing cores (e.g., a single-core processor (S) or a multi-core processor (S)). Merely by way of example, a Processor may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), an Application Specific Instruction Set Processor (ASIP), a Graphics Processing Unit (GPU), a Physical Processing Unit (PPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), a Programmable Logic Device (PLD), a controller, a microcontroller Unit, a reduced Instruction Set computer (reduced Instruction Set computer), a microprocessor, or the like, or any combination thereof.
The network may be used for the exchange of information and/or data. In some embodiments, one or more components (e.g., the server 200, the color printer 100, the control terminal 300, and the database) in the SOC chip-based color printer control system 10 may send information and/or data to other components. For example, the server 200 may acquire a print request to the color printer 100 via a network. In some embodiments, the network may be any type of wired or wireless network, or combination thereof. Merely by way of example, Network 130 may include a wired Network, a Wireless Network, a fiber optic Network, a telecommunications Network, an intranet, the internet, a Local Area Network (LAN), a Wide Area Network (WAN), a Wireless Local Area Network (WLAN), a WLAN, a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a Public Switched Telephone Network (PSTN), a bluetooth Network, a ZigBee Network, a Near Field Communication (NFC) Network, or the like, or any combination thereof. In some embodiments, the network may include one or more network access points. For example, the network may include wired or wireless network access points, such as base stations and/or network switching nodes, through which one or more components of the SOC chip-based color printer control system 10 may connect to the network to exchange data and/or information.
The aforementioned database may store data and/or instructions. In some embodiments, the database may store data obtained from the color printer 100 and/or the control terminal 300. In some embodiments, the database may store data and/or instructions for the exemplary methods described herein. In some embodiments, the database may include mass storage, removable storage, volatile Read-write Memory, or Read-Only Memory (ROM), among others, or any combination thereof. By way of example, mass storage may include magnetic disks, optical disks, solid state drives, and the like; removable memory may include flash drives, floppy disks, optical disks, memory cards, zip disks, tapes, and the like; volatile read-write Memory may include Random Access Memory (RAM); the RAM may include Dynamic RAM (DRAM), Double data Rate Synchronous Dynamic RAM (DDR SDRAM); static RAM (SRAM), Thyristor-Based Random Access Memory (T-RAM), Zero-capacitor RAM (Zero-RAM), and the like. By way of example, ROMs may include Mask Read-Only memories (MROMs), Programmable ROMs (PROMs), Erasable Programmable ROMs (PERROMs), Electrically Erasable Programmable ROMs (EEPROMs), compact disk ROMs (CD-ROMs), digital versatile disks (ROMs), and the like. In some embodiments, the database may be implemented on a cloud platform. By way of example only, the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud, a distributed cloud, across clouds, multiple clouds, or the like, or any combination thereof.
In some embodiments, a database may be connected to a network to communicate with one or more components in the SOC chip-based color printer control system 10 (e.g., the server 200, the color printer 100, the control terminal 300, etc.). One or more components in the SOC chip-based color printer control system 10 may access data or instructions stored in a database via a network. In some embodiments, the database may be directly connected to one or more components in the SOC chip-based color printer control system 10 (e.g., the server 200, the color printer 100, the control terminal 300, etc.); alternatively, in some embodiments, the database may also be part of the server 200.
The color printer 100 may be provided with an SOC chip and a security control chip electrically connected to the SOC chip. The SOC chip may be a micro control Unit, which appropriately reduces the frequency and specification of a Central Processing Unit (CPU), and integrates peripheral interfaces such as a Memory (Memory), a counter (Timer), a USB, an a/D converter, a UART, a PLC, a DMA, and even an LCD driving circuit on a single chip, thereby forming a chip-level computer and performing different combination control for different printing tasks. The safety control chip can run a parameter monitoring program to monitor the change of related safety parameters and ensure the safety of the printing environment.
In order to solve the technical problem in the foregoing background art, fig. 2 is a schematic flowchart of a control method of the SOC-chip-based color printer according to an embodiment of the present application, which can be executed by the SOC-chip-based color printer control system 10 shown in fig. 1, and the detailed description of the control method of the SOC-chip-based color printer is described below.
In step S110, the server 200, upon receiving the printer control task transmitted from the control terminal 300, parses the task message of the printer control task to determine the control information of the color printer 100, and transmits the control information to the color printer 100.
In step S120, the color printer 100 acquires a control code command associated with the control information from the preset encryption area via the SOC chip according to the control information.
Step S130, reading each line of control codes in the control code instruction, detecting the security parameters of each line of control codes in the security control chip, and recording the control result corresponding to each line of control codes.
Step S140, counting whether a security parameter of the corresponding control code in the security control chip changes in security type in all the control results corresponding to each line of the recorded control codes, and if there is a security parameter that changes in security type, sending the corresponding control result to the server 200.
In step S150, the server 200 generates a corresponding security control policy according to the control result, and sends the security control policy to the color printer 100.
Based on the above steps, in this embodiment, the control code instruction of the control information is obtained from the preset encryption region through the cooperation of the SOC chip and the security control chip, the security parameter of each line of control code in the control code instruction in the security control chip is detected, and the control result corresponding to each line of control code is recorded at the same time, the security control chip is independent of the SOC chip and can be used for setting the security parameter of each printer control task, when the security parameter changes, the security problem may exist in the control process of this time, and at this time, the security parameter is reported to the server 200, so that the security in the printing control process can be greatly improved, time and labor are saved, and the troubleshooting efficiency is high.
In some possible designs, step S110 may be specifically implemented as follows:
first, at least one control node identified from within control node data indicated by a task message of a printer control task is determined as a current control node.
And secondly, matching the control node information of the current control node with the control node information of each control node to be determined respectively.
Thirdly, when the control node information of the current control node is matched with the control node information of any control node to be determined, determining the current control node as the control node to be determined, and updating the control logic information of the control node to be determined, otherwise, determining the current control node as a new control node to be determined, and establishing new control logic information of the control node to be determined, wherein the control logic information comprises: and control time sequence information of the control node to be determined on the control node data, a control node identifier, a time sequence number of each control time sequence and storage control time sequence information.
And fourthly, acquiring control strategy information in the control logic information through a first control container according to the control logic information of each control node to be determined, wherein the control strategy information is obtained through Hash calculation of the control time sequence information, the control node identification, the time sequence number of each control time sequence and the storage control time sequence information through the first control container.
And fifthly, automatically extracting a plurality of specific control strategies from the control strategy information as the permitted control strategies, after the permitted control strategies are locked, respectively carrying out simulation control processing on the control strategies according to the control processes, the control time sequences and the hidden Markov model algorithm of the plurality of permitted control strategies, calculating the strategy feasibility degree information of each permitted control strategy in the control strategy information, and storing the strategy feasibility degree information in a database.
And sixthly, determining a first control level value and a first control time sequence number value of the control logic information in the second control container according to the strategy feasibility degree information of the permitted control strategies in the control strategy information, calculating the first control level value and the first control time sequence number value corresponding to the strategy feasibility degree information of each permitted control strategy, and storing the first control level value and the first control time sequence number value into a database, wherein the first control level value and the first control time sequence number value are updated in real time along with the dynamic transformation of the permitted control strategies in the control strategy information.
And seventhly, calculating the first control level value and the first control time sequence number value according to the current corresponding first control level value and the first control time sequence number value of the permitted control strategy through the second control container, acquiring the strategy content of the second control container, enabling the second control container to always calculate the permitted control strategy, and carrying out real-time continuous simulation control processing on the permitted control strategy.
And eighthly, identifying the strategy content of the permitted control strategy in the control strategy information according to the control process and the control time sequence information of the permitted control strategy, identifying the control process of the next time sequence, calculating a first control level value and a first control time sequence number value corresponding to the next time sequence, transmitting the first control level value and the first control time sequence number value to a second control container, and controlling the second control container to carry out simulation control processing on the permitted control strategy.
Ninth, when the permitted control strategy is blocked in the control logic information and can not be permitted, the permitted control strategy is subjected to identification processing and simulation control processing according to the control process and control sequence information of the permitted control strategy and the past process information thereof, and feedback information during blocking.
Tenth, calculating a plurality of identification control processes possibly carried out by the permitted control strategy and corresponding strategy feasibility degrees through identification processing, carrying out simulation control processing on the second control container according to the identification control process with the maximum strategy feasibility degree, carrying out control strategy identification detection on feedback information during blocking in control strategy information according to the plurality of identification control processes through the first control container, finishing the simulation control processing by the second control container when the permitted control strategy is detected by the first control container, carrying out processing on the permitted control strategy according to control time sequence information of the second control container, and obtaining strategy content of the permitted control strategy.
Eleventh, after the first control container locks the permitted control policy, calculating a time sequence hash value of the permitted control policy, the second control container appoints the permitted control policy according to the first control level value and the first control time sequence value converted by the time sequence hash value, re-appoints the permitted control policy in the policy content, calculates a control process hash value of the permitted control policy in the policy content, and judges whether the control process hash value is a set control process of the policy content.
Twelfth, if so, the licensed control policy is locked, and the second control container is dynamically adjusted following the change of the licensed control policy, so that the licensed control policy is always locked in the policy content. If not, calculating a second control level value and a second control time sequence number value corresponding to the next time sequence of the permitted control strategy in a second control container according to the central control process, and adjusting the strategy content through the second control container according to the second control level value and the second control time sequence number value, thereby obtaining the control information of the color printer 100 according to the adjusted strategy content.
Therefore, based on the design, the control node information is adopted to match the control node data indicated by the task message to generate the final control information, so that the accurate control information can be obtained only by a small amount of calculation, and the efficiency of the whole process is improved.
And moreover, when the permitted control policy is temporarily abnormal, the policy content of the permitted control policy is always kept locked through the policy content of the second control container, and the policy content of the permitted control policy is not lost.
Secondly, monitoring the permitted control strategies, performing simulation control processing on tracks of the permitted control strategies according to the control process and the control time sequence of the permitted control strategies, calculating strategy feasibility information of each permitted control strategy in the control strategy information, and calculating a first control level value and a first control time sequence number value corresponding to the next time sequence, so that the permitted control strategies can be rapidly monitored by a second control container, and the content of the permitted control strategies is prevented from being lost due to abnormity; it is also possible to perform an analog control process on the licensed control strategy in case it is blocked.
Moreover, when the policy content is instantaneously switched among a plurality of permitted control policies, the second control container can quickly calculate the policy content according to the first control level value and the first control sequence number of the switched permitted control policy, so that the integrity of the policy content is ensured, and the smooth switching operation of the permitted control policy is completed.
Meanwhile, under the condition that the licensed control strategy is blocked, the condition that the strategy content is lost due to the problem of time sequence difference when the locked licensed control strategy is obtained again is avoided.
In some possible designs, the control node information of the current control node is respectively matched with the control node information of each control node to be determined, specifically, the association degree between the current control node and each control node to be determined is determined according to the control timing sequence information of the current control node on the task message of the printer control task and the control timing sequence information of each control node to be determined in the last control information, when the minimum association degree of the association degrees between the current control node and each control node to be determined is smaller than a first threshold value, the current control node is determined to be matched with the first control node to be determined corresponding to the minimum association degree, otherwise, the identification information of the current control node is matched with the identification information of each control node to be determined, when the second minimum association degree of the association degrees between the current control node and each control node to be determined is smaller than a second threshold value, and when the number of the same identifications in the identification information of the current control node and the identification information of the second to-be-determined control node corresponding to the second small degree of association is greater than the set number, determining that the current control node is matched with the second to-be-determined control node, otherwise, determining that the current control node is a new to-be-determined control node.
In some possible designs, step S120 may be specifically implemented as follows:
first, the color printer 100 searches for a corresponding preset encryption area through the SOC chip according to the control information.
Secondly, virtual printers are constructed in preset encryption areas corresponding to the actual physical control process of the color printer 100, wherein each virtual printer corresponds to one encryption area, and the encryption areas corresponding to different virtual printers have overlapping areas.
Third, in the process of the color printer 100 performing instruction acquisition of the control information through the SOC chip, actual receiving node information of the control information in the area where the control information is actually received from the color printer 100 is received, and the first encryption feature of the control information in the preset encryption area is determined using the actual receiving node information.
Fourth, it is determined whether the first encryption characteristic is located in an overlapping area of the encryption area of the first virtual printer and the encryption area of the second virtual printer corresponding to the color printer 100.
Fifth, if so, it is determined that the control information is transferred to the encryption area of the second color printer 100 corresponding to the second virtual printer.
Sixthly, determining that the current virtual function script of the second virtual printer is the first script, determining that the virtual function script between the current virtual function script of the second virtual printer and the first encryption feature of the control information in the preset encryption region is the second script, and obtaining the encryption feature identifier of the color printer 100, which needs to execute encryption access, as the script feature matching identifier between the first script and the second script.
And seventhly, performing an encryption access request to the searched preset encryption area through the SOC chip according to the encryption characteristic identifier of the color printer 100 needing to perform encryption access so as to acquire a control code instruction of the control information from the preset encryption area.
Therefore, the preset encryption area can be quickly positioned, the control code instruction of the control information is acquired from the preset encryption area, the situation that the encryption access is wrong can be avoided through the construction of the virtual printer, and the adaptability in the encryption access process is improved.
In some possible designs, step S150 may be specifically implemented as follows:
first, the server 200 acquires a suspected protection process of the color printer 100 in the current printer control task according to the control result.
Secondly, determining a plurality of suspected nodes again in the executing process of the current printer control task according to the protection suspected process, and obtaining the control process of each suspected node.
Thirdly, a subordinate protection suspected process on the current printer control task is obtained based on the control process of each suspected node, and the subordinate protection suspected process is used for assisting the control process of the color printer 100 on the subsequent printer control task.
And fourthly, dividing the suspected protection process and the suspected slave protection process into a plurality of protection process lists according to the process information of the suspected protection process and the suspected slave protection process.
And fifthly, establishing a first protection control model for each protection process list, and obtaining a control process of a protection suspected process in the next task which is the same as the current printer control task according to the first protection control model.
And sixthly, generating a second protection control model according to a control process of the suspected protection process in the next task which is the same as the current printer control task, wherein the second protection control model comprises a primary protection control model and a protection verification model. The primary protection control model comprises a bottom semantic feature protection verification model of the extracted control process and a high-level semantic feature of the control process extracted by a second description mode, the complexity of the bottom semantic feature is smaller than that of the high-level semantic feature of the second description mode, and the complexity is used for representing the control quantity of the control process on each unit time sequence.
Seventhly, determining a to-be-defined characteristic in a primary protection control model of the control process.
And eighthly, extracting a plurality of semantic features to be determined and contrasted from the protection verification model in the control process.
And ninthly, calculating the association degree of each undetermined comparison semantic feature and each undetermined semantic feature.
Tenthly, determining the undetermined comparison semantic feature with the highest correlation degree with the undetermined semantic feature in the undetermined comparison semantic features as the undetermined semantic feature.
Eleventh, according to the determined undetermined semantic features, generating corresponding safety protection control strategies according to the corresponding relations between the features and the control strategies.
Therefore, the control process is respectively processed through the first protection control model and the second protection control model by carrying out subsequent processing on the control result, and the bottom semantic feature and the high semantic feature are respectively considered, so that the safety in the printing control process can be greatly improved.
In some possible designs, a first protection control model is established for each protection process list, a control process of a suspected protection process in a next task which is the same as a current printer control task is obtained according to the first protection control model, and each protection process list in the current printer control task can be divided into two lists, wherein the first list is: the current printer control task is aggregated into a protection suspected process of a protection process list, and the second list is as follows: and respectively aiming at the suspected nodes contained in each protection process list.
And then, constructing a protection association model for each protection process list, wherein the protection association model is obtained by constructing a minimum association model for the suspected protection processes in each list of the same protection process list and combining the suspected protection processes with process overlapping between different lists of the same protection process list, and then converging the protection association model to obtain the control process of the suspected protection process in the next task which is the same as the current printer control task.
In some possible designs, please further refer to fig. 3, in step S150, the method for controlling a color printer based on an SOC chip according to this embodiment may further include the following steps:
in step S160, the color printer 100 obtains corresponding security control information from the security control policy through the SOC chip, and updates the security monitoring parameter of the security control chip according to the security control information.
In detail, in this embodiment, a preset safety region may be scribed according to the safety protection control information, a target safety region characteristic may be determined according to each scribed preset safety region, a safety monitoring node of each scribed preset safety region in the safety control chip may be obtained according to the determined target safety region characteristic, and a target safety monitoring node may be generated according to the safety monitoring node of the target safety region characteristic in the SOC chip and the safety monitoring node in the safety control chip.
And then, scribing according to a preset safety region to generate different first safety regions, respectively calculating the association rate of the first safety regions and target safety monitoring nodes, selecting the safety regions exceeding the preset association rate from the first safety regions as second safety regions, and then determining the safety regions corresponding to the safety monitoring parameters of the safety control chip according to the safety region characteristic regions in the second safety regions as third safety regions. And then, integrating the target safety monitoring node and the third safety region to obtain a final target safety monitoring node, and updating the safety monitoring parameters of the safety control chip according to the final target safety monitoring node and the safety monitoring parameters to be replaced indicated in the safety protection control information.
Fig. 4 is another schematic flow chart of a method for controlling a color printer based on an SOC chip according to an embodiment of the present application, and unlike the above-described embodiment, the method for controlling a color printer based on an SOC chip according to the present embodiment may be executed by the color printer 100 shown in fig. 1. It should be noted that details of the steps to be described next in the present embodiment have been described in the foregoing embodiments, and details regarding the following embodiments may refer to the parts of the foregoing embodiments, and only the steps performed by the color printer 100 will be described in detail below.
In step S210, the receiving server 200, upon receiving the printer control job transmitted from the control terminal 300, parses the job message of the printer control job to determine the control information of the color printer 100.
And step S220, acquiring a control code instruction of the control information from a preset encryption area through the SOC chip according to the control information.
Step S230, reading each line of control codes in the control code instruction, detecting the security parameters of each line of control codes in the security control chip, and recording the control result corresponding to each line of control codes.
Step S240, counting whether a security parameter of the corresponding control code in the security control chip in all the control results corresponding to each line of the recorded control codes changes in security type, and if there is a security parameter that changes in security type, sending the corresponding control result to the server 200, so that the server 200 generates a corresponding security protection control policy according to the control result, and sends the security protection control policy to the color printer 100.
Fig. 5 is a schematic diagram of functional modules of an SOC chip-based color printer control apparatus 400 according to an embodiment of the present application, and the present embodiment may divide the functional modules of the SOC chip-based color printer control apparatus 400 according to the above method embodiment. For example, the functional blocks may be divided for the respective functions, or two or more functions may be integrated into one processing block. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, the division of the modules in the present application is schematic, and is only a logical function division, and there may be another division manner in actual implementation. For example, in the case of dividing each functional block according to each function, the SOC-chip-based color printer control apparatus 400 shown in fig. 5 is only a schematic diagram of one apparatus. The SOC-chip-based color printer control apparatus 400 may include a receiving module 410, an obtaining module 420, a reading detection module 430, and a statistics recording module 440, and the functions of the functional modules of the SOC-chip-based color printer control apparatus 400 will be described in detail below.
A receiving module 410, configured to receive control information of the color printer 100, which is determined by the server 200 parsing a task message of a printer control task when receiving the printer control task sent by the control terminal 300.
And the obtaining module 420 is configured to obtain, according to the control information, a control code instruction of the control information from the preset encryption region through the SOC chip.
The reading detection module 430 is configured to read each line of control codes in the control code instruction, detect a security parameter of each line of control codes in the security control chip, and record a control result corresponding to each line of control codes.
The statistical recording module 440 is configured to count whether security parameters of the corresponding control codes in the security control chip in all the control results corresponding to each line of the recorded control codes change in security type, and if there is a security parameter that changes in security type, send the corresponding control result to the server 200, so that the server 200 generates a corresponding security protection control policy according to the control result, and sends the security protection control policy to the color printer 100.
Fig. 6 is a schematic structural diagram of a color printer 100 for executing the SOC-chip-based color printer control method according to an embodiment of the present disclosure, and as shown in fig. 6, the color printer 100 may include a network interface 110, a machine-readable storage medium 120, a processor 130, and a bus 140. The simulation container data of the processor 130 may be one or more, and one processor 130 is taken as an example in fig. 6; the network interface 110, the machine-readable storage medium 120, and the processor 130 may be connected by a bus 140 or otherwise, as exemplified by the connection by the bus 140 in fig. 6.
The machine-readable storage medium 120, which is a computer-readable storage medium, may be used to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the SOC chip-based color printer control method in the embodiments of the present application (for example, the receiving module 410, the obtaining module 420, the reading detection module 430, and the statistics recording module 440 in the SOC chip-based color printer control apparatus 400 shown in fig. 5). The processor 130 executes various functional applications and data processing of the terminal device by detecting software programs, instructions and modules stored in the machine-readable storage medium 120, that is, the color printer control method based on the SOC chip is implemented, and details are not repeated herein.
The machine-readable storage medium 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the machine-readable storage medium 120 may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double data rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous link SDRAM (SLDRAM), and direct memory bus RAM (DR RAM). It should be noted that the memories of the systems and methods described herein are intended to comprise, without being limited to, these and any other suitable memory of a publishing node. In some examples, the machine-readable storage medium 120 may further include memory located remotely from the processor 130, which may be connected to the terminal device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, transit communication networks, and combinations thereof.
The processor 130 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 130. The processor 130 may be a general-purpose processor, a digital signal processor (digital signal processor dsp), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
The color printer 100 can perform information interaction with other devices (e.g., the server 200) through the communication interface 110. Communication interface 110 may be a circuit, bus, transceiver, or any other device that may be used to exchange information. Processor 130 may send and receive information using communication interface 110.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server 200, or data center to another website, computer, server 200, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as server 200, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), etc.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to encompass such modifications and variations.

Claims (9)

1. The color printer control method based on the SOC chip is applied to a color printer control system based on the SOC chip, the color printer control system based on the SOC chip comprises a color printer, a control terminal and a server in communication connection with the color printer and the control terminal, the color printer is provided with the SOC chip and a safety control chip electrically connected with the SOC chip, and the method comprises the following steps:
when receiving a printer control task sent by the control terminal, the server analyzes a task message of the printer control task to determine control information of the color printer and sends the control information to the color printer;
the color printer acquires a control code instruction of the control information from a preset encryption area through the SOC chip according to the control information;
reading each line of control codes in the control code instruction, detecting the safety parameters of each line of control codes in the safety control chip, and recording the control result corresponding to each line of control codes;
counting whether the safety parameters of the corresponding control codes in the safety control chip change in safety type or not in all the control results corresponding to each row of the control codes, and if the safety parameters change in safety type, sending the corresponding control results to the server;
the server generates a corresponding safety protection control strategy according to the control result and sends the safety protection control strategy to the color printer;
the step of generating a corresponding safety protection control strategy by the server according to the control result comprises the following steps:
the server acquires a suspected protection process of the color printer in the current printer control task according to the control result;
determining a plurality of suspected nodes in the executing process of the current printer control task again according to the protection suspected process, and acquiring the control process of each suspected node;
obtaining a subordinate protection suspected process on the current printer control task based on the control process of each suspected node, wherein the subordinate protection suspected process is used for assisting the control process of the color printer on the subsequent printer control task;
dividing the suspected protection process and the suspected slave protection process into a plurality of protection process lists according to the process information of the suspected protection process and the suspected slave protection process;
establishing a first protection control model for each protection process list, and obtaining a control process of the suspected protection process in the next task which is the same as the current printer control task according to the first protection control model;
generating a second protection control model according to a control process of the suspected protection process in a next task which is the same as the current printer control task, wherein the second protection control model comprises a primary protection control model and a protection verification model; the primary protection control model comprises extracted bottom-level semantic features of the control process, the protection verification model comprises extracted high-level semantic features of the control process in a second description mode, the complexity of the bottom-level semantic features is smaller than that of the high-level semantic features of the second description mode, and the complexity is used for representing the control quantity of the control process on each unit time sequence;
determining a to-be-defined characteristic in a primary protection control model of the control process;
extracting a plurality of semantic features to be contrasted from a protection verification model of the control process;
calculating the association degree of each undetermined comparison semantic feature and the undetermined semantic feature;
determining a pending comparison semantic feature with the highest association degree with the pending semantic feature from the plurality of pending comparison semantic features as the pending semantic feature;
and generating a corresponding safety protection control strategy according to the determined undetermined semantic features and the corresponding relation between the features and the control strategy.
2. The SOC chip based color printer control method according to claim 1, wherein the step of parsing the task message of the printer control task to determine the control information of the color printer includes:
determining at least one control node identified from within control node data indicated by a task message of a printer control task as a current control node;
matching the control node information of the current control node with the control node information of each control node to be determined respectively;
when the control node information of the current control node is matched with the control node information of any control node to be determined, determining that the current control node is the control node to be determined, and updating the control logic information of the control node to be determined, otherwise, determining that the current control node is a new control node to be determined, and establishing the control logic information of the new control node to be determined, wherein the control logic information comprises: control time sequence information, control node identification, time sequence number of each control time sequence and storage control time sequence information of the control node to be determined on the control node data;
acquiring control strategy information in the control logic information through a first control container according to the control logic information of each control node to be determined, wherein the control strategy information is obtained through Hash calculation of the control time sequence information, a control node identifier, a time sequence number of each control time sequence and storage control time sequence information through the first control container;
automatically extracting a plurality of specific control strategies from the control strategy information as permitted control strategies, respectively carrying out simulation control processing on the control strategies according to the control processes, the control time sequences and the hidden Markov model algorithm of the plurality of permitted control strategies after the permitted control strategies are locked, calculating strategy feasibility degree information of each permitted control strategy in the control strategy information, and storing the strategy feasibility degree information in a database;
determining a first control level value and a first control time sequence number value of the control logic information in a second control container according to the strategy feasibility degree information of the permitted control strategies in the control strategy information, calculating a first control level value and a first control time sequence number value corresponding to the strategy feasibility degree information of each permitted control strategy, and storing the first control level value and the first control time sequence number value in a database, wherein the first control level value and the first control time sequence number value are updated in real time along with the dynamic transformation of the permitted control strategies in the control strategy information;
calculating the first control level value and the first control time sequence number value corresponding to the current permitted control strategy through the second control container to obtain the strategy content, so that the second control container always calculates the permitted control strategy and continuously simulates and controls the permitted control strategy in real time;
identifying the strategy content of the permitted control strategy in the control strategy information according to the control process and the control time sequence information of the permitted control strategy, identifying the control process of the next time sequence, calculating a first control grade value and a first control time sequence number value corresponding to the next time sequence, transmitting the first control grade value and the first control time sequence number value to a second control container, and controlling the second control container to carry out simulation control processing on the permitted control strategy;
when the permitted control strategy is blocked in the control logic information and cannot be permitted, carrying out identification processing and simulation control processing on the permitted control strategy according to the control process and control sequence information of the permitted control strategy and the past process information thereof as well as feedback information during blocking;
calculating a plurality of identification control processes which are possibly carried out by the permitted control strategy and corresponding strategy feasibility degrees thereof through identification processing, carrying out analog control processing on a second control container according to the identification control process with the maximum strategy feasibility degree, carrying out control strategy identification detection on feedback information during blocking in control strategy information according to the identification control processes through a first control container, finishing the analog control processing on the second control container when the first control container detects the permitted control strategy, carrying out processing on the permitted control strategy according to control time sequence information thereof, and acquiring strategy content thereof;
after the first control container locks the permitted control strategy, calculating a time sequence hash value of the permitted control strategy, appointing the permitted control strategy by the second control container according to a first control level value and a first control time sequence value converted by the time sequence hash value, re-appointing the permitted control strategy in the strategy content, calculating a control process hash value of the permitted control strategy in the strategy content, and judging whether the control process hash value is a set control process of the strategy content;
if yes, locking the permitted control strategy, and dynamically adjusting the second control container along with the change of the permitted control strategy so that the permitted control strategy is always locked in the strategy content;
if not, calculating a second control grade value and a second control time sequence number value corresponding to the next time sequence of the permitted control strategy in the second control container according to the central control process, and adjusting the strategy content through the second control container according to the second control grade value and the second control time sequence number value;
and obtaining the control information of the color printer according to the adjusted strategy content.
3. The SOC chip-based color printer control method according to claim 2, wherein the step of matching the control node information of the current control node with the control node information of each control node to be determined, respectively, includes:
determining the association degree of the current control node and each control node to be determined according to the control time sequence information of the current control node on the task message of the printer control task and the control time sequence information of each control node to be determined in the last control information;
when the minimum association degree in the association degrees of the current control node and each control node to be determined is smaller than a first threshold value, determining that the current control node is matched with a first control node to be determined corresponding to the minimum association degree, and otherwise, matching the identification information of the current control node with the identification information of each control node to be determined;
when the second small association degree in the association degrees of the current control node and each control node to be determined is smaller than a second threshold value, and the number of the same identifiers in the identifier information of the current control node and the identifier information of a second control node to be determined corresponding to the second small association degree is larger than a set number, determining that the current control node is matched with the second control node to be determined, otherwise, determining that the current control node is a new control node to be determined.
4. The SOC chip based color printer control method according to claim 1, wherein the step of the color printer obtaining the control code instruction with the control information from a preset encryption area by the SOC chip based on the control information, comprises:
the color printer searches a corresponding preset encryption area through the SOC chip according to the control information;
constructing virtual printers in preset encryption areas corresponding to the actual physical control process of the color printer, wherein each virtual printer corresponds to one encryption area, and the encryption areas corresponding to different virtual printers have overlapping areas;
in the process that the color printer acquires control information through the SOC chip, receiving actual receiving node information of the control information from the color printer in an area where the control information is actually received, and determining a first encryption characteristic of the control information in the preset encryption area by using the actual receiving node information;
judging whether the first encryption characteristic is located in an overlapping area of an encryption area of a first virtual printer and an encryption area of a second virtual printer corresponding to the color printer;
if yes, determining that the control information is transferred to an encryption area of a second color printer corresponding to the second virtual printer;
determining a current virtual function script of the second virtual printer as a first script, determining a virtual function script between the current virtual function script of the second virtual printer and the first encryption feature of the control information in the preset encryption region as a second script, and obtaining an encryption feature identifier of the color printer, which needs to execute encryption access, as a script feature matching identifier between the first script and the second script;
and carrying out an encryption access request to the searched preset encryption area through the SOC chip according to the encryption characteristic identifier of the color printer needing to execute encryption access so as to acquire a control code instruction of the control information from the preset encryption area.
5. The SOC-chip-based color printer control method according to claim 1, wherein the step of establishing a first protection control model for each protection process list, and obtaining a control procedure of the protection suspected process in a next task that is the same as the current printer control task according to the first protection control model, includes:
dividing each protection process list in the current printer control task into two lists, wherein the first list is as follows: the suspected protection processes in the protection process list are aggregated in the current printer control task, and the second list is as follows: respectively aiming at suspected nodes contained in each protection process list;
constructing a protection association model for each protection process list, wherein the protection association model is obtained by constructing a minimum association model for the protection suspected processes in each list of the same protection process list and combining the protection suspected processes with process overlapping between different lists of the same protection process list;
and converging the protection correlation model to obtain a control process of the suspected protection process in the next task which is the same as the current printer control task.
6. The SOC chip based color printer control method of claim 1, wherein after the step of the server generating a corresponding safeguard control policy according to the control result and sending the safeguard control policy to the color printer, the method further comprises:
and the color printer acquires corresponding safety protection control information from the safety protection control strategy through the SOC chip and updates the safety monitoring parameters of the safety control chip according to the safety protection control information.
7. The SOC chip-based color printer control method according to claim 6, wherein the step of updating the security monitoring parameter of the security control chip according to the security protection control information includes:
presetting a safety zone according to the safety protection control information, and determining the characteristics of a target safety zone according to each preset safety zone;
according to the determined target safety region characteristics, acquiring safety monitoring nodes of each planned preset safety region in the safety control chip, and generating target safety monitoring nodes according to the safety monitoring nodes of the target safety region characteristics in the SOC chip and the safety monitoring nodes in the safety control chip;
scribing according to a preset safety area to generate different first safety areas;
respectively calculating the association rate of a first safety region and a target safety monitoring node, and selecting a safety region exceeding a preset association rate from the first safety region as a second safety region;
determining a safety region corresponding to the safety monitoring parameters of the safety control chip as a third safety region according to a safety region characteristic region in the second safety region;
integrating the target safety monitoring node and the third safety region to obtain a final target safety monitoring node;
and updating the safety monitoring parameters of the safety control chip according to the final target safety monitoring node and the safety monitoring parameters to be replaced indicated in the safety protection control information.
8. A color printer control system based on an SOC chip is characterized by comprising a color printer, a control terminal and a server in communication connection with the color printer and the control terminal, wherein the color printer is internally provided with the SOC chip and a safety control chip electrically connected with the SOC chip;
the server is used for analyzing a task message of the printer control task to determine control information of the color printer and sending the control information to the color printer when receiving the printer control task sent by the control terminal;
the color printer is used for acquiring a control code instruction of the control information from a preset encryption area through the SOC chip according to the control information;
the color printer is used for reading each line of control codes in the control code instruction, detecting the safety parameters of each line of control codes in the safety control chip and recording the control result corresponding to each line of control codes;
the color printer is used for counting whether the safety parameters of the corresponding control codes in the safety control chip change in safety type or not in all the control results corresponding to each line of control codes recorded, and if the safety parameters change in safety type, the corresponding control results are sent to the server;
the server is used for generating a corresponding safety protection control strategy according to the control result and sending the safety protection control strategy to the color printer;
the server generates a corresponding safety protection control strategy according to the control result, and the method comprises the following steps:
the server acquires a suspected protection process of the color printer in the current printer control task according to the control result;
determining a plurality of suspected nodes in the executing process of the current printer control task again according to the protection suspected process, and acquiring the control process of each suspected node;
obtaining a subordinate protection suspected process on the current printer control task based on the control process of each suspected node, wherein the subordinate protection suspected process is used for assisting the control process of the color printer on the subsequent printer control task;
dividing the suspected protection process and the suspected slave protection process into a plurality of protection process lists according to the process information of the suspected protection process and the suspected slave protection process;
establishing a first protection control model for each protection process list, and obtaining a control process of the suspected protection process in the next task which is the same as the current printer control task according to the first protection control model;
generating a second protection control model according to a control process of the suspected protection process in a next task which is the same as the current printer control task, wherein the second protection control model comprises a primary protection control model and a protection verification model; the primary protection control model comprises extracted bottom-level semantic features of the control process, the protection verification model comprises extracted high-level semantic features of the control process in a second description mode, the complexity of the bottom-level semantic features is smaller than that of the high-level semantic features of the second description mode, and the complexity is used for representing the control quantity of the control process on each unit time sequence;
determining a to-be-defined characteristic in a primary protection control model of the control process;
extracting a plurality of semantic features to be contrasted from a protection verification model of the control process;
calculating the association degree of each undetermined comparison semantic feature and the undetermined semantic feature;
determining a pending comparison semantic feature with the highest association degree with the pending semantic feature from the plurality of pending comparison semantic features as the pending semantic feature;
and generating a corresponding safety protection control strategy according to the determined undetermined semantic features and the corresponding relation between the features and the control strategy.
9. The SOC chip based color printer control system of claim 8, wherein the server is specifically configured to determine the control information of the color printer by:
determining at least one control node identified from within control node data indicated by a task message of a printer control task as a current control node;
matching the control node information of the current control node with the control node information of each control node to be determined respectively;
when the control node information of the current control node is matched with the control node information of any control node to be determined, determining that the current control node is the control node to be determined, and updating the control logic information of the control node to be determined, otherwise, determining that the current control node is a new control node to be determined, and establishing the control logic information of the new control node to be determined, wherein the control logic information comprises: control time sequence information, control node identification, time sequence number of each control time sequence and storage control time sequence information of the control node to be determined on the control node data;
acquiring control strategy information in the control logic information through a first control container according to the control logic information of each control node to be determined, wherein the control strategy information is obtained through Hash calculation of the control time sequence information, a control node identifier, a time sequence number of each control time sequence and storage control time sequence information through the first control container;
automatically extracting a plurality of specific control strategies from the control strategy information as permitted control strategies, respectively carrying out simulation control processing on the control strategies according to the control processes, the control time sequences and the hidden Markov model algorithm of the plurality of permitted control strategies after the permitted control strategies are locked, calculating strategy feasibility degree information of each permitted control strategy in the control strategy information, and storing the strategy feasibility degree information in a database;
determining a first control level value and a first control time sequence number value of the control logic information in a second control container according to the strategy feasibility degree information of the permitted control strategies in the control strategy information, calculating a first control level value and a first control time sequence number value corresponding to the strategy feasibility degree information of each permitted control strategy, and storing the first control level value and the first control time sequence number value in a database, wherein the first control level value and the first control time sequence number value are updated in real time along with the dynamic transformation of the permitted control strategies in the control strategy information;
calculating the first control level value and the first control time sequence number value corresponding to the current permitted control strategy through the second control container to obtain the strategy content, so that the second control container always calculates the permitted control strategy and continuously simulates and controls the permitted control strategy in real time;
identifying the strategy content of the permitted control strategy in the control strategy information according to the control process and the control time sequence information of the permitted control strategy, identifying the control process of the next time sequence, calculating a first control grade value and a first control time sequence number value corresponding to the next time sequence, transmitting the first control grade value and the first control time sequence number value to a second control container, and controlling the second control container to carry out simulation control processing on the permitted control strategy;
when the permitted control strategy is blocked in the control logic information and cannot be permitted, carrying out identification processing and simulation control processing on the permitted control strategy according to the control process and control sequence information of the permitted control strategy and the past process information thereof as well as feedback information during blocking;
calculating a plurality of identification control processes which are possibly carried out by the permitted control strategy and corresponding strategy feasibility degrees thereof through identification processing, carrying out analog control processing on a second control container according to the identification control process with the maximum strategy feasibility degree, carrying out control strategy identification detection on feedback information during blocking in control strategy information according to the identification control processes through a first control container, finishing the analog control processing on the second control container when the first control container detects the permitted control strategy, carrying out processing on the permitted control strategy according to control time sequence information thereof, and acquiring strategy content thereof;
after the first control container locks the permitted control strategy, calculating a time sequence hash value of the permitted control strategy, appointing the permitted control strategy by the second control container according to a first control level value and a first control time sequence value converted by the time sequence hash value, re-appointing the permitted control strategy in the strategy content, calculating a control process hash value of the permitted control strategy in the strategy content, and judging whether the control process hash value is a set control process of the strategy content;
if yes, locking the permitted control strategy, and dynamically adjusting the second control container along with the change of the permitted control strategy so that the permitted control strategy is always locked in the strategy content;
if not, calculating a second control grade value and a second control time sequence number value corresponding to the next time sequence of the permitted control strategy in the second control container according to the central control process, and adjusting the strategy content through the second control container according to the second control grade value and the second control time sequence number value;
and obtaining the control information of the color printer according to the adjusted strategy content.
CN201911194068.7A 2019-11-28 2019-11-28 Color printer control method and system based on SOC chip Active CN110968274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911194068.7A CN110968274B (en) 2019-11-28 2019-11-28 Color printer control method and system based on SOC chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911194068.7A CN110968274B (en) 2019-11-28 2019-11-28 Color printer control method and system based on SOC chip

Publications (2)

Publication Number Publication Date
CN110968274A CN110968274A (en) 2020-04-07
CN110968274B true CN110968274B (en) 2020-10-16

Family

ID=70032090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911194068.7A Active CN110968274B (en) 2019-11-28 2019-11-28 Color printer control method and system based on SOC chip

Country Status (1)

Country Link
CN (1) CN110968274B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201063694Y (en) * 2007-02-14 2008-05-21 上海瑞达安全集成电路有限公司 Information processing and conversion device
CN101815292B (en) * 2010-04-22 2014-04-30 中兴通讯股份有限公司 Device and method for protecting data of mobile terminal
CN103095462B (en) * 2013-01-24 2015-10-28 中国科学院软件研究所 Based on the data broadcast distribution guard method acting on behalf of re-encryption and safety chip
CN205395480U (en) * 2016-03-09 2016-07-27 国网江西省电力公司信息通信分公司 Safety parts's printer mainboard has been strengthened
US10942690B2 (en) * 2017-05-25 2021-03-09 Xerox Corporation System and method for implementing a color shift security feature in a print job

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DYNSUB: A high fidelity coupled code system for the evaluation of local safety parameters – Part I: Development, implementation and verification;Armando MiguelGomez-Torres,Victor Hugo Sanchez-Espinoza,Kostadin;《Annals of Nuclear Energy》;20120625;全文 *
移动应用访问控制代码生成与安全性测试研究;王艳;《中国优秀硕士学位论文全文数据库 信息科技辑》;20181015;全文 *

Also Published As

Publication number Publication date
CN110968274A (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN111064711B (en) Block chain-based data stream detection method and device and server
CN109359866B (en) Risk hidden danger monitoring method and device based on leasing equipment and computer equipment
CN104461693B (en) Virtual machine update method and system under a kind of desktop cloud computing environment
CN111132145B (en) Network communication safety monitoring method, device, server and network communication system
CN110062918B (en) Method for updating software in a cloud gateway, computer program for carrying out said method and processing unit for carrying out said method
CN110892675A (en) Monitoring of block chains
CN102903043A (en) Payment server and payment channel acquisition method
CN111209336A (en) Data distribution method and device based on block chain and server
CN110826606B (en) Element matching method, device, server and readable storage medium
CN112208591A (en) Train operation plan adjusting method and device and readable storage medium
KR102213460B1 (en) System and method for generating software whistlist using machine run
CN110968274B (en) Color printer control method and system based on SOC chip
CN109636338A (en) A kind of broad band photoelectrical operation management platform system
KR102584292B1 (en) Creation of a blockchain with blocks containing an adjustable number of transaction blocks and multiple intermediate blocks
CN112529218A (en) Building safety detection method and system based on correlation analysis
CN111148046B (en) Track recording method, device and system
CN112235376B (en) Electric vehicle information monitoring method and device and electric vehicle management system
CN112836843B (en) Base station out-of-service alarm prediction method and device
CN111258968A (en) Enterprise redundant data cleaning method and device and big data platform
CN112926084B (en) Access authority management method and system
CN111124321B (en) Debugging method and system of laser printer
CN112396251A (en) Motor train station dispatching method based on uncertain processing framework and rule combination algorithm
CN110765667B (en) Simulation method and system of laser printer
CN112529739A (en) Building quality global detection method and system
Dodonov et al. Modeling the Survivability of Network Structures.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200407

Assignee: Guobao Union Information Security Technology (Guangdong) Co.,Ltd.

Assignor: SHENZHEN CASTLE SECURITY TECH. Co.,Ltd.

Contract record no.: X2021440000041

Denomination of invention: Control method and system of color printer based on SOC chip

Granted publication date: 20201016

License type: Common License

Record date: 20210202

Application publication date: 20200407

Assignee: Zhaoqing Anke Electronic Technology Co.,Ltd.

Assignor: SHENZHEN CASTLE SECURITY TECH. Co.,Ltd.

Contract record no.: X2021440000040

Denomination of invention: Control method and system of color printer based on SOC chip

Granted publication date: 20201016

License type: Common License

Record date: 20210202

Application publication date: 20200407

Assignee: Shenzhen Deli Technology Co.,Ltd.

Assignor: SHENZHEN CASTLE SECURITY TECH. Co.,Ltd.

Contract record no.: X2021440000042

Denomination of invention: Control method and system of color printer based on SOC chip

Granted publication date: 20201016

License type: Common License

Record date: 20210202

EE01 Entry into force of recordation of patent licensing contract