CN112123923A - Thermal transfer printer, encryption management system and method - Google Patents

Thermal transfer printer, encryption management system and method Download PDF

Info

Publication number
CN112123923A
CN112123923A CN202011010515.1A CN202011010515A CN112123923A CN 112123923 A CN112123923 A CN 112123923A CN 202011010515 A CN202011010515 A CN 202011010515A CN 112123923 A CN112123923 A CN 112123923A
Authority
CN
China
Prior art keywords
consumable
module
length value
thermal transfer
genuine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011010515.1A
Other languages
Chinese (zh)
Other versions
CN112123923B (en
Inventor
倪继超
唐国初
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Dingyi Zhiyuan Technology Development Co Ltd
Original Assignee
Hunan Dingyi Zhiyuan Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Dingyi Zhiyuan Technology Development Co Ltd filed Critical Hunan Dingyi Zhiyuan Technology Development Co Ltd
Priority to CN202011010515.1A priority Critical patent/CN112123923B/en
Publication of CN112123923A publication Critical patent/CN112123923A/en
Application granted granted Critical
Publication of CN112123923B publication Critical patent/CN112123923B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41FPRINTING MACHINES OR PRESSES
    • B41F16/00Transfer printing apparatus
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41FPRINTING MACHINES OR PRESSES
    • B41F16/00Transfer printing apparatus
    • B41F16/0006Transfer printing apparatus for printing from an inked or preprinted foil or band
    • B41F16/0093Attachments or auxiliary devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1203Improving or facilitating administration, e.g. print management
    • G06F3/1208Improving or facilitating administration, e.g. print management resulting in improved quality of the output result, e.g. print layout, colours, workflows, print preview
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1239Restricting the usage of resources, e.g. usage or user levels, credit limit, consumables, special fonts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The invention relates to a thermal transfer printer, an encryption management system and a method, which relate to the technical field of printers, wherein the encryption management system of the thermal transfer printer comprises a card reader for reading first encryption data in an IC card on a consumable; an execution module for acquiring the consumption length value of the consumable and executing a print permission command or a print inhibition command; the consumable length management module acquires a default length value of the consumable according to the first encryption data when the consumable is judged to be a genuine product based on the secret key authentication module, and calculates an available length value of the consumable according to the default length value and the consumption length value; the length of the consumable can be managed through the set encryption management system, and the printing prohibition command is issued after the default length value of the consumable is consumed, so that the condition that the consumable of the counterfeit product is used for printing after the default length value of the consumable of the genuine product is consumed is avoided.

Description

Thermal transfer printer, encryption management system and method
Technical Field
The invention relates to the technical field of printers, in particular to a thermal transfer printer, an encryption management system and an encryption management method.
Background
The thermal transfer printer utilizes special consumptive material, beats printer head's theory of operation through similar fax machine, with the coating on the consumptive material through the mode of heating, on rendition paper or other medium, can select the not good consumptive material that can not obtain as required, and then produce stronger adhesive force, in addition print media's selection, satisfy the demand of long-term storage. Since the consumables are consumables and the printing demand is large, counterfeit consumables exist in the market. When the counterfeit consumable material is used for printing, the printing effect is poor, so that the consumable material needs to be identified in the using process to ensure the printing quality.
In order to identify genuine/counterfeit consumables, an encryption system is arranged on a thermal transfer printer, the existing consumable encryption system for the thermal transfer printer comprises an onboard IC card, an external IC card reader, an MCU and an upper computer, wherein the external IC card reader is used for reading encrypted data in the external IC card arranged on the consumables (a ribbon or an adhesive tape), the MCU and the onboard IC card are both arranged on a printer mainboard, and the MCU is electrically connected with the onboard IC card, the external IC card reader and the upper computer respectively so as to transmit the encrypted data; the upper computer is used for acquiring the encrypted data in the onboard IC card and the encrypted data in the external IC card through the MCU, then decrypting the encrypted data in the onboard IC card and the encrypted data in the external IC card to acquire plaintext data, and analyzing the plaintext data to judge whether the secret key of the external IC card is the same as the secret key in the onboard IC card. When the key of the external IC card is the same as the key in the onboard IC card, the consumable encryption system judges that the current consumable is a genuine product, and when the key of the external IC card is different from the key in the onboard IC card, the consumable encryption system judges that the current consumable is a counterfeit product.
Although the consumable encryption system of the thermal transfer printer can identify the consumable to be true or false to a certain extent, the existing thermal transfer printer does not manage the length of the consumable. Generally, the genuine products have a default length value, i.e. the total length of a roll of genuine products. When the consumable encryption system is used for printing, after the default length value of the genuine consumable is consumed, the total length of the consumable is not limited, and the counterfeit consumable can be randomly used for continuously printing.
Disclosure of Invention
In order to solve the problems, the invention discloses a thermal transfer printer, an encryption management system and a method, the length of a genuine article consumable can be managed through the arranged encryption management system, when the default length value of the genuine article consumable is consumed, printing can not be carried out, the authenticity of the consumable needs to be distinguished again, and the condition that the genuine article consumable can be continuously used for printing by using a fake article consumable after the default length value of the genuine article consumable is used is further avoided.
The technical scheme for solving the technical problems is as follows: an encryption management system of a thermal transfer printer comprises a card reader, a first encryption module and a second encryption module, wherein the card reader is used for reading first encryption data in an IC card on a consumable; the execution module is used for acquiring the consumption length value of the consumable and executing a print permission command or a print inhibition command; the secret key authentication module is used for judging whether the consumable is a genuine product or a counterfeit product based on the first encrypted data, and when the consumable is the counterfeit product, the secret key authentication module issues a printing prohibition command to the execution module; the consumable length management module is used for acquiring a default length value of the consumable according to first encrypted data when the consumable is judged to be a genuine product based on the secret key authentication module, and calculating an available length value of the consumable according to the default length value and the consumed length value; when the available length value is smaller than a preset value, the consumable length management module issues a printing prohibition command to the execution module, and when the available length value is larger than the preset value, the consumable length management module issues a printing permission command to the execution module.
Through adopting above-mentioned technical scheme, judge the true and false of consumptive material through the key authentication module that sets up, simultaneously, monitor the available length value of consumptive material through consumptive material length management module, issue permission print order and forbid print order based on true and false judgement result and available length value, realize lasting the supervision to the consumptive material, avoided the condition that genuine consumptive material has run up and has used the printing of counterfeit goods consumptive material to a certain extent.
On the basis of the technical scheme, the invention can be further improved as follows:
further, the key authentication module can acquire second encrypted data and decrypt and acquire a plurality of genuine consumable keys based on the second encrypted data; the key authentication module decrypts the first encrypted data to obtain a first key to be detected, and judges whether the consumable is a genuine product or a counterfeit product based on the comparison result between the genuine consumable key and the first key to be detected.
Through adopting above-mentioned technical scheme, through the second encryption data that sets up, when the true and false of judgement consumptive material, through the first encryption data of deciphering, obtain and wait to detect the key, with first secret key and the contrast of certified products consumptive material key one by one, can be in order to judge the true and false of consumptive material.
Further, the consumable length management module can acquire third encrypted data and decrypt and acquire an authentic consumable management table based on the third encrypted data, wherein the authentic consumable management table comprises a plurality of authentic consumable keys and a plurality of authentic consumable default length values which are in one-to-one correspondence with each other; and when the consumable length management module judges that the consumable is a genuine product based on the key authentication module, the consumable length management module acquires the first key to be detected from the key authentication module, and acquires the default length value corresponding to the first key to be detected according to the genuine product consumable management table.
Further, the consumable length management module can acquire third encrypted data and decrypt and acquire an authentic consumable management table based on the third encrypted data, wherein the authentic consumable management table comprises a plurality of authentic consumable keys and a plurality of authentic consumable default length values which are in one-to-one correspondence with each other; and the consumable length management module decrypts and acquires a second secret key to be detected based on the first encrypted data, and acquires the default length value corresponding to the second secret key to be detected according to the certified consumable management table.
By adopting the technical scheme, when the consumable is judged to be a genuine product, the corresponding default length value is obtained through the genuine product consumable management table, and then, the available length value can be calculated according to the default length value and the consumption length value, so that the consumable can be continuously monitored.
Further, the thermal transfer printer encryption management system comprises an SOC device and a cloud server which are electrically connected with each other, and the secret key authentication module is arranged on the SOC device or the cloud server; the consumable length management module is arranged on the SOC device or the cloud server.
Through adopting above-mentioned technical scheme, through SOC device and the high in the clouds server that sets up, when using, can select to set up secret key authentication module, consumptive material length management module respectively at SOC device, high in the clouds server, perhaps separately sets up, establishes corresponding communication link between heat-transfer seal printer and high in the clouds server, manages the available length of well commodity consumptive material, avoids using the printing of pseudo-commodity consumptive material after the well commodity consumptive material exhausts. Through the setting, the difficulty of cracking the consumable key system is increased to a certain extent, and the rate of certified products of the consumable of the thermal transfer printer is further ensured.
Further, the execution module comprises an FPGA chip; when the FPGA chip receives a print permission command, the FPGA chip receives a print instruction of a user and then can execute the print instruction; and when the FPGA chip receives the print prohibition command, the FPGA chip does not execute the print command or cannot receive the print command of the user after receiving the print command of the user.
Further, the execution module comprises a length detection unit for detecting the consumed length value of the consumable, and the length detection unit comprises a consumable consumption detector for detecting the length of the consumable or a motor turn number counter for counting the rotation turn number of the consumable driving motor.
Further, the thermal transfer printer further comprises a prompting module, when the execution module receives a print permission command or a print prohibition command, the prompting module is sent with a prompting command, and the prompting module gives a prompt that the consumable is a genuine product or a counterfeit product based on the prompting command.
The invention also provides a thermal transfer printer encryption management method, which is based on the thermal transfer printer encryption management system and comprises the following steps: acquiring first encrypted data in an IC card on a consumable and acquiring a consumption length value used by the consumable; decrypting based on the first encrypted data to obtain a key to be detected, comparing the key of the genuine consumable item with the key to be detected, and judging the consumable item to be the genuine or counterfeit; when the consumable is a genuine product, acquiring a default length value of the consumable based on the key to be detected or the first encrypted data, and calculating an available length value based on the consumed length value and the default length value; when the available length value is larger than a preset value, issuing a print permission command to the execution module; and when the consumable is a counterfeit product or the available length value is smaller than a preset value, issuing a printing prohibition command to the execution module.
The invention also provides a thermal transfer printer, which uses the encryption management system of the thermal transfer printer or the encryption management method of the thermal transfer printer to execute printing, and the thermal transfer printer comprises a printing module; the printing module determines whether to perform a printing operation based on a print permission command or a print prohibition command of the execution module.
Through adopting above-mentioned technical scheme, when using the heat transfer printer, encryption management system acquires the encrypted data on the consumptive material, later handles encrypted data, judges certified products or counterfeit, has avoided carrying out the mode of discriminating to the consumptive material true and false on the heat transfer printer, has increased the degree of difficulty that consumptive material secret key system was deciphered to a certain extent, and then has guaranteed the certified product rate of heat transfer printer consumptive material. Meanwhile, the available length value of the genuine consumables is calculated in the using process, and a printing instruction or a printing prohibition instruction is issued based on the available length value, so that the condition that the counterfeit consumables are used for printing is avoided.
By adopting the technical scheme, the prompting module can prompt a user to a certain extent, and when the thermal transfer printer prohibits printing, the user can be informed of the reason for prohibiting printing, so that the user can conveniently replace consumables.
In summary, the present invention has the following technical effects:
1. the authenticity of the consumable is judged through the set key authentication module, meanwhile, the usable length value of the consumable is monitored through the consumable length management module, the printing permission command and the printing prohibition command are issued based on the authenticity judgment result and the usable length value, the consumable is continuously supervised, and the condition that the counterfeit consumable is continuously used for printing after the consumable of the genuine consumable is exhausted is avoided to a certain extent.
2. Through SOC device and the high in the clouds server that sets up, when using, can select to set up secret key authentication module, consumptive material length management module respectively at SOC device, high in the clouds server, perhaps separately sets up, establishes corresponding communication link between heat-transfer seal printer and high in the clouds server, manages the available length of well commodity consumptive material, avoids using the counterfeit product printing consumptive material after the consumption of good commodity consumptive material. Through the setting, the difficulty of cracking the consumable key system is increased to a certain extent, and the rate of certified products of the consumable of the thermal transfer printer is further ensured.
Drawings
FIG. 1 is a schematic diagram of a structural framework of an encryption management system of a thermal transfer printer according to the present invention;
FIG. 2 is a schematic diagram of a specific structural framework of the thermal transfer printer encryption management system of the present invention;
FIG. 3 is a schematic view of the process of encryption management of the cloud encryption management system of the thermal transfer printer according to the present invention;
fig. 4 is a logic diagram of the judgment of the key to be detected by the cloud server in the cloud encryption management system of the thermal transfer printer according to the present invention;
FIG. 5 is a schematic flow chart of a cloud encryption management method for a thermal transfer printer according to the present invention;
FIG. 6 is a schematic view of a structural framework of the thermal transfer printer of the present invention;
FIG. 7 is a schematic diagram of a structural framework of the thermal transfer printer encryption management system of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with examples which are set forth to illustrate, but are not to be construed to limit the scope of the invention.
A thermal transfer printer cloud encryption management system is shown in figure 1 and comprises a card reader, an execution module, a key authentication module and a consumable length management module.
The card reader is used for reading first encrypted data in an IC card on the consumable. Wherein, the consumptive material can be typewriter ribbon, sticky tape or other consumptive materials, all is provided with the IC-card that is used for discerning the consumptive material true and false on the consumptive material, and the card reader is through reading the first encryption data on the IC-card, later through discerning the true and false of consumptive material to first encryption data. Specifically, the consumable item specifically refers to a consumable item which is accessed by the thermal transfer printer during working, and the authenticity of the consumable item is identified by reading the encrypted data on the IC card after the consumable item is accessed.
Referring to fig. 1 to 3, the execution module is configured to obtain a consumption length value of the consumable part usage, and execute a print permission command or a print inhibition command; note that, when the consumable is a counterfeit consumable, the consumable cannot be used.
The secret key authentication module judges whether the consumable is a genuine product or a counterfeit product based on the first encrypted data, when the consumable is the genuine product, a printing permission instruction can be issued, and when the consumable is the counterfeit product, the secret key authentication module issues a printing prohibition instruction to the execution module.
The consumable length management module is used for acquiring a default length value of the consumable according to the first encrypted data when the consumable is judged to be a genuine product based on the secret key authentication module, and calculating an available length value of the consumable according to the default length value and the consumed length value; when the available length value of the consumable is smaller than the preset value, the consumable length management module issues a printing prohibition command to the execution module, and when the available length value is larger than the preset value, the consumable length management module issues a printing permission command to the execution module. The preset value may be 0 or other values as needed.
The authenticity of the consumable is judged through the set key authentication module, meanwhile, the usable length value of the consumable is monitored through the consumable length management module, the printing permission command and the printing prohibition command are issued based on the authenticity judgment result and the usable length value, the consumable is continuously supervised, and the condition that the counterfeit consumable is continuously used for printing after the consumable of the genuine consumable is exhausted is avoided to a certain extent.
Specifically, the key authentication module can acquire second encrypted data and decrypt the second encrypted data to acquire a plurality of certified consumable keys; the key authentication module decrypts the first encrypted data to obtain a first key to be detected, and judges whether the consumable is a genuine product or a counterfeit product based on a comparison result of the genuine consumable key and the first key to be detected.
Specifically, when the consumable is judged to be true or false, the first to-be-detected secret key is obtained by decrypting the first encrypted data through the set second encrypted data, the first to-be-detected secret key is compared with the consumable secret key of the genuine product one by one, and if the first to-be-detected secret key is the same as any consumable secret key of the genuine product, the first to-be-detected secret key is the genuine product, otherwise, the first to-be-detected secret key is the counterfeit product.
The consumable length management module can acquire the third encrypted data and acquire a genuine consumable management table based on the third encrypted data decryption, wherein the genuine consumable management table comprises a plurality of genuine consumable keys and a plurality of genuine consumable default length values which are in one-to-one correspondence with each other.
And when the consumable length management module judges that the consumable is a genuine product based on the key authentication module, the consumable length management module acquires the first key to be detected from the key authentication module and acquires a default length value corresponding to the first key to be detected according to the genuine product consumable management table.
In another embodiment, when the consumable length management module judges that the consumable is a genuine product based on the key authentication module, the second key to be detected is obtained based on the decryption of the first encrypted data, and the default length value corresponding to the second key to be detected is obtained according to the genuine consumable management table.
Specifically, the method comprises the following steps. Judging whether the consumable is a genuine product, namely when any one of the first to-be-detected secret key and the genuine consumable secret key is the same, judging that the first to-be-detected secret key is the genuine product, and acquiring an available length value; and when the first key to be detected is not the same as the genuine consumable key, judging that the first key to be detected is a counterfeit.
And comparing the first key to be detected with the first genuine consumable key, judging that the first key to be detected is a genuine product when the first key to be detected is the genuine product, stopping the key comparison and simultaneously sending a print permission command, continuing to compare with the second genuine consumable key when the comparison result is different, repeating the comparison process until the comparison result is different from the last genuine consumable key, judging that the first key to be detected is a counterfeit product and sending a print prohibition command if the comparison result is different. When the key is judged to be the genuine article consumable key, the consumable length management module acquires a default length value corresponding to the first key to be detected according to the genuine article consumable management table, and then calculates an available length value through the default length value and the consumption length value, wherein the available length value is equal to the default length value minus the consumption length value.
Specifically, when the consumable is judged to be a genuine product, the corresponding default length value is obtained through the genuine product consumable management table, and then, an available length value can be obtained through calculation according to the default length value and the consumption length value, so that the consumable can be continuously monitored.
It should be noted that, the key authentication module and the consumable length management module may obtain the first encrypted data in the card reader at the same time, or one of the key authentication module and the consumable length management module may obtain the first encrypted data from the card reader, and after obtaining the first encrypted data, the first encrypted data may be sent to the other module.
The printing permission command or the printing prohibition command can be issued by a key authentication module and a consumable length management module, or after the key authentication module and the consumable length management module judge the authenticity and the available length value, the command to be issued is sent to one of the key authentication module and the consumable length management module, and then the printing permission command or the printing prohibition command is issued in a unified manner. For example, the key authentication module issues a command, that is, after the consumable length management module determines whether the available length value can be used continuously, the allowed print command or the prohibited print command that needs to be issued is sent to the key authentication module, and then the key authentication module issues the command.
As shown in fig. 4, the thermal transfer printer encryption management system includes an SOC device and a cloud server electrically connected to each other, and a key authentication module is disposed on the SOC device or the cloud server; the consumable length management module is arranged on the SOC device or the cloud server.
The specific mode can include that key authentication module, consumptive material length management module all set up on the SOC device, perhaps all set up on the high in the clouds server, perhaps set up key authentication module, consumptive material length management module respectively at SOC device and high in the clouds server.
When the key authentication module and the consumable length management module are arranged on the cloud server, the consumable is judged to be a genuine product or a counterfeit product on the basis of the first encryption data on the cloud server, and when the consumable is the genuine product, the default length value of the consumable is obtained and the available length value is calculated. And verifying whether the available length value exceeds the use length on the cloud server based on a preset value, and issuing a printing instruction or forbidding the printing instruction based on a verification result.
When the encryption management system is used, firstly, the card reader reads encrypted data in the IC card, then the encrypted data are sent to the cloud server, the secret key authentication module and the consumable length management module on the cloud server judge whether consumable items corresponding to the encrypted data are genuine or counterfeit based on the second encrypted data, when the consumable items are genuine, the usable length values of the consumable items are continuously monitored, and a print permission command or a print prohibition command is issued according to the judgment result.
This scheme is through discerning certified products or counterfeit at high in the clouds server, manage the available length value of certified products consumptive material simultaneously, establish corresponding communication link between heat transfer printer and high in the clouds server, the encrypted data that information receiving portion read deciphers at the high in the clouds server, judge the consumptive material after the deciphering and be certified products or counterfeit, the mode of examining the consumptive material true and false on heat transfer printer has been avoided, the degree of difficulty that the consumptive material secret key system was deciphered has been increased to a certain extent, and then the certified product rate of heat transfer printer consumptive material has been guaranteed.
Specifically, the cloud server stores third encrypted data and third encrypted data, the key authentication module can acquire the second encrypted data, and the consumable length management module can acquire the third encrypted data.
The cloud server is provided with login management authority, and when the cloud server has the login management authority, the cloud server can be logged in to update the genuine article consumable management table.
Through the login management authority who sets up, can supply engineering maintenance personnel to log in the cloud end server and maintain, and then proofread and correct or update certified products consumptive material management table, guarantee certified products consumptive material key can contain most or all known certified products consumptive material key, guarantee the accuracy of key comparison. Meanwhile, when new genuine consumables appear, the cloud server information can be updated in time, and convenience of user consumable authentication is improved to a certain extent. Meanwhile, when the consumable management system is maliciously cracked by people, the login management authority of the cloud server needs to be cracked additionally, and the safety and the accuracy of the consumable management system are improved.
Preferably, the execution module comprises an FPGA chip; the FPGA chip acquires the consumed length value of a consumable, and the specific mode can be a consumable consumption detector, or the number of turns of the consumable driving motor which rotates when the printer prints at each time is acquired, and the consumed length value is set based on the number of turns of the consumable driving motor which rotates when the printer prints.
When the FPGA chip receives a print permission command, the FPGA chip receives a print instruction of a user and then can execute the print instruction; when the FPGA chip receives the print prohibition command, the FPGA chip does not execute the print command or cannot receive the print command of the user after receiving the print command of the user.
The execution module further comprises a length detection unit for detecting the consumption length value of the consumable, and the length detection unit comprises a consumable consumption detector for detecting the length of the consumable or a motor turn number counter for counting the rotation turn number of a driving motor of the consumable. When specifically using, through the meter number of consumptive material consumption detector detection consumptive material consumption, perhaps count through the number of turns to the motor rotation, then the conversion reachs the meter number of consumptive material consumption.
Preferably, in some embodiments, the cloud server is connected to the SOC module through a networking module, and the SOC module obtains encrypted data of the card reader and then sends the encrypted data to the cloud server through the networking module. In another implementation mode, the card reader directly sends information to the cloud server when reading encrypted data of the IC card on the consumable. It should be understood that the cloud server may obtain the encrypted data through the information receiving portion or directly obtain the encrypted data through the card reader.
Specifically, the networking module may be an ethernet port, a WiFi module, a 4G module, a 5G module, and the like.
As shown in fig. 5, in another embodiment, when the key authentication module and the consumable length management module are both disposed on the SOC device, the SOC device obtains the first encrypted data and then directly sends the first encrypted data to the key authentication module and the consumable length management module. And the second encrypted data may be stored in the SOC device, or an on-board IC card, which stores the second encrypted data therein, may be further provided, and the SOC device may acquire the second encrypted data.
The thermal transfer printer further comprises a prompting module, when the execution module receives the print permission command or the print prohibition command, the prompting module is sent with a prompting command, and the prompting module prompts that the consumable is a genuine product or a counterfeit product based on the prompting command.
The embodiment also provides an encryption management method for a thermal transfer printer, based on the encryption management system for a thermal transfer printer, as shown in fig. 6, the management method includes the following steps:
s1, obtaining the first encrypted data in the IC card on the consumable and obtaining the consumption length value used by the consumable.
S2, decrypting based on the first encrypted data to obtain a key to be detected, comparing the key of the consumable of the genuine product with the key to be detected, and judging the consumable to be the genuine product or the counterfeit product;
s3, when the consumable is a genuine product, acquiring a default length value of the consumable based on the key to be detected or the first encrypted data, and calculating an available length value of the consumable based on the consumption length value and the default length value;
s4, when the available length value is larger than the preset value, issuing a print permission command to the execution module; and when the consumable is a fake product or the available length value is smaller than the preset value, issuing a printing prohibition command to the execution module.
The embodiment also provides a thermal transfer printer, as shown in fig. 7, which prints by using the encryption management system of the thermal transfer printer or the encryption management method of the thermal transfer printer, and comprises a printing module, wherein the printing module judges whether to perform a printing operation based on a print permission command or a print inhibition command of the execution module. After the FPGA chip receives the print permission command, the printing module can execute a printing task. And after the FPGA chip receives the print prohibiting command, the FPGA chip sends the print prohibiting command to the printing module. When using this thermal transfer printer promptly, encryption management system can judge the true and false of consumptive material, and after judging the consumptive material true and false, printing module receives permission print order or forbid print order based on the information of judgement, when receiving forbid print order, does not carry out user's print job, and then, avoids the user to use counterfeit consumptive material to print.
The FPGA chip, the SOC device and the networking module are arranged on a printer mainboard of the thermal transfer printer. The printing module is connected with the FPGA chip, and when the FPGA chip executes a printing instruction, the FPGA chip sends a user printing instruction to the printing template; when the FPGA chip does not execute the printing instruction, the printing module is forbidden to be used.
Preferably, in some embodiments, in order to facilitate the user to use the thermal transfer printer, a prompt module is further provided, and the prompt module may issue a prompt when the FPGA chip executes the print instruction or cannot execute the print instruction.
Specifically, when the SOC module receives a print permission command or a print prohibition command, the SOC module issues a prompt command to the prompt module, and the prompt module prompts genuine products or counterfeit products based on the prompt command. The prompting module can be a display screen electrically connected with the processor module, and when the printing permission instruction or the printing prohibition instruction is received, relevant information is displayed on the display screen, for example, the consumable material is a genuine product for permitting printing, the consumable material is a counterfeit product for prohibiting printing, the usable length value of the genuine product is insufficient, printing is prohibited, and the like.
In addition, the prompting module may be a speaker, and when printing is allowed or inhibited, the user may be prompted by sound whether the thermal transfer printer can be normally used.
Preferably, the thermal transfer printer further comprises an upper computer, a user can issue a printing task through the upper computer, the upper computer sends the printing task of the user to the FPGA chip, and the FPGA chip sends the printing task of the user to the printing module to execute printing.
Preferably, in some embodiments, the cloud server is electrically connected to the FPGA or connected to the FPGA through a networking module, and then the print job may be issued to the FPGA through the cloud server. The printing system can be used for printing by the user through the operation of the upper computer, and the engineering maintenance personnel with the cloud server login management authority can log in the cloud server to send a printing image and a printing instruction.
In addition, the cloud server can set corresponding active operation functions, for example, locking the printer, unlocking the printer, restarting the printer, restoring factory settings of the printer and the like, and when a user breaks down in the using process, engineering maintenance personnel can remotely operate the thermal transfer printer to maintain by logging in the cloud server. Better, the current position of thermal transfer printer can also be collected through ip address or 4G module and the real-time location of 5G module to the high in the clouds server to can conveniently assist the user to track when the printer is stolen and retrieve the thermal transfer printer.
Preferably, in some embodiments, the card reader is provided in a number. The processor module can select the external card reader.
In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A thermal transfer printer encryption management system, comprising:
the card reader reads first encrypted data in an IC card on the consumable;
the execution module is used for acquiring the consumption length value of the consumable and executing a print permission command or a print inhibition command;
the secret key authentication module is used for judging whether the consumable is a genuine product or a counterfeit product based on the first encrypted data, and when the consumable is the counterfeit product, the secret key authentication module issues a printing prohibition command to the execution module;
the consumable length management module is used for acquiring a default length value of the consumable according to first encrypted data when the consumable is judged to be a genuine product based on the secret key authentication module, and calculating an available length value of the consumable according to the default length value and the consumed length value;
when the available length value is smaller than a preset value, the consumable length management module issues a printing prohibition command to the execution module, and when the available length value is larger than the preset value, the consumable length management module issues a printing permission command to the execution module.
2. The thermal transfer printer encryption management system according to claim 1, characterized in that: the key authentication module can acquire second encrypted data and decrypt and acquire a plurality of certified consumable keys based on the second encrypted data;
the key authentication module decrypts the first encrypted data to obtain a first key to be detected, and judges whether the consumable is a genuine product or a counterfeit product based on the comparison result between the genuine consumable key and the first key to be detected.
3. The thermal transfer printer encryption management system according to claim 2, characterized in that: the consumable length management module can acquire third encrypted data and decrypt and acquire a genuine consumable management table based on the third encrypted data, wherein the genuine consumable management table comprises a plurality of genuine consumable secret keys and a plurality of genuine consumable default length values which are in one-to-one correspondence with each other;
and when the consumable length management module judges that the consumable is a genuine product based on the key authentication module, the consumable length management module acquires the first key to be detected from the key authentication module, and acquires the default length value corresponding to the first key to be detected according to the genuine product consumable management table.
4. The thermal transfer printer encryption management system according to claim 1, characterized in that: the consumable length management module can acquire third encrypted data and decrypt and acquire a genuine consumable management table based on the third encrypted data, wherein the genuine consumable management table comprises a plurality of genuine consumable secret keys and a plurality of genuine consumable default length values which are in one-to-one correspondence with each other;
and when the consumable length management module judges that the consumable is a genuine product based on the key authentication module, the consumable length management module decrypts the genuine product based on the first encrypted data to obtain a second secret key to be detected, and obtains the default length value corresponding to the second secret key to be detected according to the genuine product consumable management table.
5. The thermal transfer printer encryption management system according to claim 2, characterized in that: the thermal transfer printer encryption management system comprises an SOC device and a cloud server which are electrically connected with each other, and the secret key authentication module is arranged on the SOC device or the cloud server; the consumable length management module is arranged on the SOC device or the cloud server.
6. The thermal transfer printer encryption management system according to claim 1, characterized in that: the execution module comprises an FPGA chip;
when the FPGA chip receives and executes a print permission command, the FPGA chip can execute a print task after receiving the print task of a user; and when the FPGA chip executes the print prohibition command, the FPGA chip does not execute the print task or cannot receive the print task of the user after receiving the print task of the user.
7. The thermal transfer printer encryption management system according to claim 1, characterized in that: the execution module comprises a length detection unit for detecting the consumption length value of the consumable, and the length detection unit comprises a consumable consumption detector for detecting the length of the consumable or a motor turn number counter for counting the rotation turn number of a driving motor of the consumable.
8. The thermal transfer printer encryption management system according to claim 1, characterized in that: the thermal transfer printer further comprises a prompting module, when the execution module receives a print permission command or a print prohibition command, the prompting module is sent with a prompting command, and the prompting module prompts that the consumable is a genuine product or a counterfeit product based on the prompting command.
9. An encryption management method for a thermal transfer printer is characterized by comprising the following steps: the thermal transfer printer encryption management system according to any one of claims 1 to 8, the method comprising the steps of:
acquiring first encrypted data in an IC card on a consumable and acquiring a consumption length value of the consumable;
decrypting based on the first encrypted data to obtain a key to be detected, comparing a genuine consumable key with the key to be detected, and judging whether the consumable is a genuine product or a counterfeit product;
when the consumable is a genuine product, acquiring a default length value of the consumable based on the key to be detected or the first encrypted data, and calculating an available length value based on the consumed length value and the default length value;
when the available length value is larger than a preset value, issuing a print permission command to the execution module; and when the consumable is a counterfeit product or the available length value is smaller than a preset value, issuing a printing prohibition command to the execution module.
10. A thermal transfer printer, characterized by: performing printing using the thermal transfer printer encryption management system of any one of claims 1-8 or the thermal transfer printer encryption management method of claim 9, the thermal transfer printer comprising a print module; the printing module determines whether to perform a printing operation based on a print permission command or a print prohibition command of the execution module.
CN202011010515.1A 2020-09-23 2020-09-23 Thermal transfer printer, encryption management system and method Active CN112123923B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011010515.1A CN112123923B (en) 2020-09-23 2020-09-23 Thermal transfer printer, encryption management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011010515.1A CN112123923B (en) 2020-09-23 2020-09-23 Thermal transfer printer, encryption management system and method

Publications (2)

Publication Number Publication Date
CN112123923A true CN112123923A (en) 2020-12-25
CN112123923B CN112123923B (en) 2022-03-08

Family

ID=73841265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011010515.1A Active CN112123923B (en) 2020-09-23 2020-09-23 Thermal transfer printer, encryption management system and method

Country Status (1)

Country Link
CN (1) CN112123923B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113110807A (en) * 2021-04-02 2021-07-13 威海新北洋技术服务有限公司 Printer consumable monitoring method and device and electronic equipment
CN114546303A (en) * 2022-01-24 2022-05-27 青岛安可存储技术有限公司 Credible anti-counterfeiting method for printer
CN116461230A (en) * 2023-03-07 2023-07-21 珠海恒盛条码设备有限公司 Chip reset type consumable replacement method and system

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0570909A2 (en) * 1992-05-22 1993-11-24 Seiko Epson Corporation Printer and method for controlling it
US20020113850A1 (en) * 2001-02-21 2002-08-22 Wheeler David M. Intelligent fluid delivery system for a fluid jet printing system
CN1719860A (en) * 2004-07-08 2006-01-11 夏普株式会社 Image forming apparatus and image scanner
CN101349548A (en) * 2001-07-12 2009-01-21 富士胶片株式会社 Devices relating to rolled product
CN101578181A (en) * 2007-03-16 2009-11-11 佳能株式会社 Cartridge and printer
CN201456574U (en) * 2009-04-27 2010-05-12 张诚泉 Label printer capable of identifying consumptive material information
CN102001538A (en) * 2009-08-26 2011-04-06 佳能株式会社 Image forming apparatus
CN103332026A (en) * 2013-06-28 2013-10-02 上海宜达胜电脑用品有限公司 Ribbon life metering device for protecting printer and ribbon box life metering method
CN103359505A (en) * 2012-04-09 2013-10-23 柯尼卡美能达商用科技株式会社 Control method of feeder and image forming system
CN103400441A (en) * 2010-07-07 2013-11-20 日立欧姆龙金融系统有限公司 Paper money processing device and paper money processing method
CN203418862U (en) * 2013-06-28 2014-02-05 上海宜达胜电脑用品有限公司 Color band service life metering device protecting printer
CN108055355A (en) * 2018-01-08 2018-05-18 珠海艾派克微电子有限公司 Imaging device, information processing method, imaging device management system and management method
CN109291661A (en) * 2018-11-29 2019-02-01 珠海趣印科技有限公司 A kind of printing imaging system
CN109501471A (en) * 2018-12-28 2019-03-22 湖南鼎致远科技发展有限公司 Print head assembly and thermal transfer printer with it
CN110126489A (en) * 2018-02-08 2019-08-16 东芝泰格有限公司 Printer and control method, computer readable storage medium, electronic equipment
CN110928157A (en) * 2019-12-09 2020-03-27 广州众诺电子技术有限公司 Consumable chip, consumable box, method for acquiring consumable information of consumable chip and medium

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0570909A2 (en) * 1992-05-22 1993-11-24 Seiko Epson Corporation Printer and method for controlling it
US20020113850A1 (en) * 2001-02-21 2002-08-22 Wheeler David M. Intelligent fluid delivery system for a fluid jet printing system
CN101349548A (en) * 2001-07-12 2009-01-21 富士胶片株式会社 Devices relating to rolled product
CN1719860A (en) * 2004-07-08 2006-01-11 夏普株式会社 Image forming apparatus and image scanner
CN101578181A (en) * 2007-03-16 2009-11-11 佳能株式会社 Cartridge and printer
CN201456574U (en) * 2009-04-27 2010-05-12 张诚泉 Label printer capable of identifying consumptive material information
CN102001538A (en) * 2009-08-26 2011-04-06 佳能株式会社 Image forming apparatus
CN103400441A (en) * 2010-07-07 2013-11-20 日立欧姆龙金融系统有限公司 Paper money processing device and paper money processing method
CN103359505A (en) * 2012-04-09 2013-10-23 柯尼卡美能达商用科技株式会社 Control method of feeder and image forming system
CN103332026A (en) * 2013-06-28 2013-10-02 上海宜达胜电脑用品有限公司 Ribbon life metering device for protecting printer and ribbon box life metering method
CN203418862U (en) * 2013-06-28 2014-02-05 上海宜达胜电脑用品有限公司 Color band service life metering device protecting printer
CN108055355A (en) * 2018-01-08 2018-05-18 珠海艾派克微电子有限公司 Imaging device, information processing method, imaging device management system and management method
CN110126489A (en) * 2018-02-08 2019-08-16 东芝泰格有限公司 Printer and control method, computer readable storage medium, electronic equipment
CN109291661A (en) * 2018-11-29 2019-02-01 珠海趣印科技有限公司 A kind of printing imaging system
CN109501471A (en) * 2018-12-28 2019-03-22 湖南鼎致远科技发展有限公司 Print head assembly and thermal transfer printer with it
CN110928157A (en) * 2019-12-09 2020-03-27 广州众诺电子技术有限公司 Consumable chip, consumable box, method for acquiring consumable information of consumable chip and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
戈新民: "无接头环形尼龙打印色带的研制", 《电子计算机与外部设备》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113110807A (en) * 2021-04-02 2021-07-13 威海新北洋技术服务有限公司 Printer consumable monitoring method and device and electronic equipment
CN114546303A (en) * 2022-01-24 2022-05-27 青岛安可存储技术有限公司 Credible anti-counterfeiting method for printer
CN114546303B (en) * 2022-01-24 2023-12-15 青岛安可存储技术有限公司 Printer credible anti-counterfeiting method
CN116461230A (en) * 2023-03-07 2023-07-21 珠海恒盛条码设备有限公司 Chip reset type consumable replacement method and system
CN116461230B (en) * 2023-03-07 2023-12-15 珠海恒盛条码设备有限公司 Chip reset type consumable replacement method and system

Also Published As

Publication number Publication date
CN112123923B (en) 2022-03-08

Similar Documents

Publication Publication Date Title
CN112123923B (en) Thermal transfer printer, encryption management system and method
CN101430751B (en) Data management apparatus and data management method
CN109155096A (en) Delivering for package and the automatic storage cabinet system and method got
JP4397883B2 (en) Information processing system, management server, and terminal
US7864955B2 (en) Print system, control method therefor, information processing apparatus, control method therefor, program for implementing the control method, and storage medium storing the control program
RU2010136825A (en) A UNIT USING THE OPERATING SYSTEM AND AN IMAGE USING THIS UNIT
CN108804953A (en) Consumable chip and its communication means, consumable chip and imaging device communication system, method
CN102915411A (en) Dereplication encryption lock for software and hardware of embedded system
CN107133523A (en) Cloud print service management method and device in 3D printing burglary-resisting system and wherein 3D printing equipment, system
CN101097589A (en) Printing system, printing control method, and computer readable medium
JP2007055022A (en) Printing apparatus
CN105513222B (en) A kind of note output system and method based on national secret algorithm
CN113516528B (en) Vending machine remote management and monitoring system
CN105917612A (en) Cryptographic watermarking of content in fuel dispensing environments
CN107392001B (en) Authorization method, system and card
CN100334536C (en) Image processing device and image processing system
CN101770559A (en) Data protecting device and data protecting method
CN204631875U (en) For the treatment of the equipment of bank note and/or coin
US9485250B2 (en) Authority trusted secure system component
CN101577656B (en) The control replacing integrated circuit card shows device and network system
CN112123922A (en) Thermal transfer printer, cloud encryption management system and method
CN102945354A (en) Information processing apparatus and data management method
CN102694655A (en) Hardware anti-counterfeiting method for LKJ monitoring device
CN110481160B (en) Printing supervision method, chip and printing consumable
JP2007180975A (en) Network print system, print device, facsimile communication system, and facsimile device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A heat transfer printer, encryption management system, and method

Effective date of registration: 20230714

Granted publication date: 20220308

Pledgee: Yiyang branch of Bank of Communications Ltd.

Pledgor: HUNAN DINGYI ZHIYUAN TECHNOLOGY DEVELOPMENT Co.,Ltd.

Registration number: Y2023980048463