CN113688433A - Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium - Google Patents

Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium Download PDF

Info

Publication number
CN113688433A
CN113688433A CN202111021283.4A CN202111021283A CN113688433A CN 113688433 A CN113688433 A CN 113688433A CN 202111021283 A CN202111021283 A CN 202111021283A CN 113688433 A CN113688433 A CN 113688433A
Authority
CN
China
Prior art keywords
attribute information
encryption
encryption rule
consumable chip
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111021283.4A
Other languages
Chinese (zh)
Inventor
骆韶聪
杜放
祝远昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhono Electronic Technology Co ltd
Original Assignee
Guangzhou Zhono Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhono Electronic Technology Co ltd filed Critical Guangzhou Zhono Electronic Technology Co ltd
Priority to CN202111021283.4A priority Critical patent/CN113688433A/en
Publication of CN113688433A publication Critical patent/CN113688433A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application provides a method and a device for preventing a consumable chip from being cracked, electronic equipment and a computer readable storage medium, belonging to the field of data processing technology, wherein the method comprises the following steps: the method comprises the steps of receiving an encryption mode request, wherein the encryption mode request comprises second attribute information of a consumable chip to be encrypted, determining the type of the second attribute information, inquiring out a conventional encryption rule of the type, generating a demand encryption rule different from the conventional encryption rule according to the second attribute information, and generating an encryption mode according to the demand encryption rule, so that the conventional encryption rule can be avoided by the encryption mode of the consumable chip to be encrypted, and the problem that the existing consumable chip is high in leakage risk due to the fact that the existing consumable chip is encrypted by adopting artificially set encryption information or using a fixed algorithm can be solved.

Description

Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method and an apparatus for preventing a consumable chip from being cracked, an electronic device, and a computer-readable storage medium.
Background
During use of the printing apparatus, the printing apparatus may be replaced by replacing a component of the printing apparatus, i.e. a printing consumable, such as: the ink box, the selenium drum and the printing head prolong the service life of the whole machine. Most printing consumables are provided with consumable chip, and the printing equipment identifies whether the printing consumables are legal certified products or not by reading and checking information in the consumable chip. In order to prevent the phenomenon that a competitor makes counterfeit products to cause poor printing quality and even equipment failure, manufacturers generally perform encryption protection on information of a chip in a serial number and encryption algorithm mode, so that the anti-counterfeiting capability is improved.
The serial number information or encryption algorithm of the consumable chip is generally set by a manufacturer technician. The serial number is usually set in two ways, one is defined directly by the technician, and the other is calculated and generated by a set algorithm according to the information (such as model, color, ink amount, etc.) of the printing supplies. The data calculated by the human setting and the fixed algorithm present a risk of leakage.
Disclosure of Invention
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, preferred embodiments accompanied with figures are described in detail below.
The application aims to provide a method and a device for preventing a consumable chip from being cracked, electronic equipment and a computer readable storage medium, so that the problem that the leakage risk is high due to the fact that the existing consumable chip is encrypted by adopting encryption information set artificially or using a fixed algorithm can be solved.
In a first aspect, the present application provides a method for preventing a consumable chip from being cracked, which adopts the following technical scheme:
a method for preventing a consumable chip from being cracked, comprising the following steps:
receiving an encryption mode request, wherein the encryption mode request comprises second attribute information of the consumable chip to be encrypted;
determining the type of the second attribute information, inquiring a conventional encryption rule of the type, and generating a demand encryption rule different from the conventional encryption rule according to the second attribute information;
and generating an encryption mode according to the demand encryption rule.
In a possible embodiment, the method further comprises the step of obtaining a regular encryption rule, which comprises:
acquiring multiple groups of first attribute information of each consumable chip, and determining the type of each group of first attribute information; wherein, one consumable chip corresponds to a group of first attribute information;
performing algorithm simulation according to the first attribute information of each kind to obtain a conventional encryption rule of each kind;
and storing the conventional encryption rule and the belonged category in a corresponding relationship.
In one possible embodiment, the first attribute information includes a manufacturer, a model number, a color, a capacity, and a serial number;
the step of performing algorithm simulation according to the first attribute information of each of the categories to obtain a plurality of kinds of conventional encryption rules of each of the categories includes:
aiming at each kind of the kind, taking the serial number in each group of the first attribute information as an output target, taking any number in the residual data of the same group of the first attribute information as input, and carrying out algorithm simulation to obtain a plurality of simulated encryption rules of each kind;
obtaining a regular encryption rule for each of said categories based on a plurality of simulated encryption rules for each of said categories.
In one possible embodiment, the method further comprises:
storing each group of the first attribute information and the belonged category in a corresponding relationship;
said step of deriving a regular encryption rule for each said category based on a plurality of simulated encryption rules for each said category, comprising:
aiming at various analog encryption rules of each kind, verifying by adopting all the stored first attribute information of the kind to obtain the probability value of each kind of analog encryption rule;
and based on a preset threshold value, taking the simulated encryption rule with the probability value larger than the threshold value as the conventional encryption rule of the category.
In a possible implementation manner, after the step of acquiring the first attribute information of each consumable chip and before the step of determining the category of each set of the first attribute information, the method further includes:
comparing the first attribute information, and judging whether the same first attribute information exists or not;
if yes, only one group of data is reserved in the same multiple groups of first attribute information.
In one possible embodiment, the first attribute information includes a manufacturer, a model number, a color, a capacity, and a serial number;
the step of determining the category of each group of the first attribute information includes:
and determining the type of each group of the first attribute information according to the manufacturer and the model of each group of the first attribute information.
In one possible embodiment, the encryption mode includes a sequence number generation algorithm and an encryption algorithm.
In a second aspect, the application provides a device is prevented cracking by consumptive material chip, adopts following technical scheme:
a consumable chip anti-cracking device comprises an encryption mode generation module, a data analysis module and a database;
the database is used for storing various conventional encryption rules;
the data analysis module is used for receiving an encryption mode request, and the encryption mode request comprises second attribute information of the consumable chip to be encrypted;
the data analysis module is further configured to determine a type of the second attribute information, query a conventional encryption rule of the type, and generate a required encryption rule different from the conventional encryption rule according to the second attribute information;
and the encryption mode generating module is used for generating an encryption mode according to the requirement encryption rule.
In a third aspect, the present application provides an electronic device, which adopts the following technical solutions:
an electronic device, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of the first aspect when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium comprising a computer program which, when executed, controls an electronic device in which the computer-readable storage medium is located to perform the method of the first aspect.
The beneficial effects of the embodiment of the application include, for example:
the utility model provides a method for preventing deciphering of consumable part chip, the kind of this second attribute information is confirmed through the second attribute information who contains the consumable part chip of treating encrypting that receives, treat the kind of encrypting the consumable part chip in essence promptly, after inquiring out the conventional encryption rule of the kind of second attribute information, avoid these conventional encryption rules, generate the demand encryption rule different with the conventional encryption rule of this kind according to second attribute information, thereby can be according to the encryption mode of demand encryption rule formation treatment consumption part chip, so that treat the encryption mode of encrypting the consumable part chip and can avoid conventional encryption rule, and then can improve current consumable part chip and adopt the artificial encryption information of setting for or use fixed algorithm to encrypt, and lead to the higher problem of risk of leakage.
Drawings
In order to more clearly explain the technical solutions of the present disclosure, the drawings needed for the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present disclosure and therefore should not be considered as limiting the scope, and that those skilled in the art can also derive other related drawings from these drawings without inventive effort.
Fig. 1 is a block diagram of an electronic device provided in the present application.
Fig. 2 is a schematic structural diagram of the anti-cracking system.
Fig. 3 is a block diagram of the server in fig. 2.
FIG. 4 is a flowchart illustrating a method for preventing a consumable chip from being broken according to an embodiment.
FIG. 5 is a flowchart illustrating a method for preventing a consumable chip from being cracked according to another embodiment.
Fig. 6 is a flowchart illustrating a sub-step of step S100 in fig. 4 or fig. 5.
Fig. 7 is a schematic flow chart of another sub-step of step S100 in fig. 4 or 5.
Fig. 8 is a flowchart illustrating a sub-step of step S120 in fig. 6 or fig. 7.
Fig. 9 is a flowchart illustrating a sub-step of step S122 in fig. 8.
FIG. 10 is a block diagram of an anti-hacking device for consumable chips according to an embodiment.
Description of reference numerals: 01-an electronic device; 02-a processor; 03-a memory; 04-terminal; 05-a server; 06-a database; 07-a data analysis module; 08-encryption mode generation module; 09-data processing module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, may be arranged and designed in various configurations.
Thus, the following detailed description of the embodiments of the present application, as presented in the figures, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments in the present application, are within the scope of protection of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Furthermore, the appearances of the terms "first," "second," and the like, if any, are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
Referring to fig. 1, a block diagram of an electronic device 01 provided in an embodiment of the present disclosure may include, but is not limited to, a memory 03 and a processor 02.
Wherein the processor 02 and the memory 03 are both located in the electronic device 01 but are separate. However, it should be understood that the memory 03 may be replaced with a computer-readable storage medium, and both the memory 03 and the computer-readable storage medium may be independent of the electronic device 01 and may be accessed by the processor 02 through a bus interface. Furthermore, the memory 03 may be integrated into the processor 02, e.g. may be a cache and/or general purpose registers.
In this embodiment, both the computer-readable storage medium and the memory 03 can be used for storing a computer program, and when the processor 02 executes the computer program, the method for preventing the consumable chip from being cracked provided by the embodiment of the present application can be implemented.
It should be noted that, in the structural schematic diagram of the electronic device 01 shown in fig. 1, the electronic device 01 may further include more or less components than those shown in fig. 1, or have a different configuration from that shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof. The electronic device 01 may be, but is not limited to, a computer, a mobile phone, an IPad, a server 05, a laptop, a mobile internet device, etc.
The method for preventing the consumable chip from being cracked can be applied to the application environment shown in fig. 2. The anti-cracking method of the consumable chip is applied to an anti-cracking system. The anti-cracking system comprises a terminal 04 and a server 05. Wherein the terminal 04 and the server 05 communicate through a network, as shown in fig. 3, the server 05 includes a database, a classification comparator, a simulation analyzer and an encryption pattern generator, and the terminal 04 includes a screen supporting human-computer interaction. Receiving an encryption request through the terminal 04, wherein the encryption mode request comprises second attribute information of the consumable chip to be encrypted; the server 05 determines the type of the second attribute information, queries a conventional encryption rule of the type, and generates a demand encryption rule different from the conventional encryption rule according to the second attribute information; the encryption pattern generator generates an encryption pattern according to the required encryption rule. The terminal 04 may be, but not limited to, various personal computers, notebook computers, smart phones, and tablet computers, and the server 05 may be implemented by an independent server 05 or a server 05 cluster formed by a plurality of servers 05.
In one embodiment, as shown in FIG. 4, a method for preventing a consumable chip from being broken is provided. This embodiment is mainly exemplified by applying this method to the server 05 as shown in fig. 1. The server 05 obtains a database in which various kinds of conventional encryption rules are stored.
S200, receiving an encryption mode request.
The encryption mode request comprises second attribute information of the consumable chip to be encrypted.
Specifically, the technician inputs the encryption mode request through the terminal 04, and the server 05 receives the encryption mode request transmitted by the terminal 04.
S300, determining the type of the second attribute information, inquiring a conventional encryption rule of the type, and generating a demand encryption rule different from the conventional encryption rule according to the second attribute information.
Specifically, the server 05 determines the type of the second attribute information according to the second attribute information, that is, the type of the consumable chip to be encrypted substantially, queries a conventional encryption rule of the type from the database, and generates a required encryption rule different from the queried conventional encryption rule of the type according to the second attribute information.
And S400, generating an encryption mode according to the required encryption rule.
Specifically, an encryption pattern generator on the server 05 generates an encryption pattern according to the obtained requirement encryption rule.
According to the consumable chip anti-cracking method, the type of the second attribute information is determined through the received second attribute information containing the consumable chip to be encrypted, after the conventional encryption rules of the type of the second attribute information are inquired, the conventional encryption rules are avoided, the requirement encryption rules different from the conventional encryption rules of the type are generated according to the second attribute information, the encryption mode of the consumable chip to be encrypted can be generated according to the requirement encryption rules, the encryption mode of the consumable chip to be encrypted is the encryption mode different from the conventional encryption rules of the consumable chips of the same type, and the problem that the leakage risk is high due to the fact that the existing consumable chip is encrypted by means of artificially setting the encryption information or using a fixed algorithm can be solved. Meanwhile, the difference between the required encryption rule and the conventional encryption rule can be improved, the repeatability brought by artificial habits can be reduced, and the influence of the personal habits of algorithm developers on the encryption mode is avoided to a certain extent, so that the cracking prevention capability of the consumable chip can be improved.
In another embodiment, the step S300 may be performed in the terminal 04. In addition, the encryption mode includes a sequence number generation algorithm and an encryption algorithm.
Further, as shown in fig. 5, the method for preventing the consumable chip from being cracked further includes step S100.
S100, acquiring a conventional encryption rule.
Specifically, the server 05 acquires the regular encryption rules of the various kinds of consumable chips. It should be noted that, when steps S200 to S400 are executed, step S100 need not be performed each time. Also, step S100 and steps S200-S400 may be performed independently, i.e., server 05 may perform steps S200-S400 while performing step S100.
It should be understood that steps S100 and steps S200-S400 may be performed on different servers 05, or may be performed on the same server 05.
Further, the second attribute information includes, but is not limited to, a manufacturer, a model, a color, a capacity, a production time, and a serial number of the consumable chip to be encrypted.
In one possible embodiment, as shown in fig. 6, a schematic flow chart of the sub-steps to step S100 is shown.
S110, acquiring multiple groups of first attribute information of each consumable chip and determining the type of each group of first attribute information.
Wherein, one consumable chip corresponds to one group of first attribute information.
Specifically, the first attribute information of the consumable chip may be entered into the server 05 through the terminal 04. Or in the process of refreshing and burning the consumable chip, the burning device can package the read original chip information of the consumable chip and the burning information into a group of first attribute information and then send the first attribute information to the database of the server 05. When a terminal 04 user uses the printing device, the printing device reads out the first attribute information of the consumable chip and sends the first attribute information to the server 05, and when the printing device detects that the consumable chip is replaced, the printing device reads out the first attribute information of the new consumable chip and sends the first attribute information to the server 05. After the server 05 receives the first attribute information of each consumable chip, the analyzing comparator determines the type of the first attribute information, which is substantially the type of the consumable chip.
And S120, performing algorithm simulation according to the first attribute information of each type to obtain a conventional encryption rule of each type.
Specifically, for each category, the simulation analyzer of the server 05 performs algorithm simulation based on the first attribute information of the category to obtain the normal encryption rule for the category.
S130, storing the conventional encryption rule and the belonged category in a corresponding relationship.
Specifically, after obtaining the conventional encryption rule of each category, the server 05 stores the conventional encryption rule in the database in a corresponding relationship with the category to which the conventional encryption rule belongs.
In the method for acquiring the conventional encryption rule, after the first attribute information of the consumable chip is acquired, the type of the acquired first attribute information is determined, and algorithm simulation is performed according to the first attribute information of each type by taking the type as a unit to simulate the encryption rule of each type of consumable chip so as to acquire the conventional encryption rule of each type.
It should be understood that the server 05 may obtain the first attribute information of each consumable chip continuously or at intervals, and the first attribute information of each consumable chip obtained at each time may be the first attribute information of an original existing consumable chip or the first attribute information of an original non-existing consumable chip. The consumable chips of the same manufacturer and the same model can have different first attribute information due to different production time. And, the more the first attribute information of each kind, i.e. the larger the data size, the greater the probability of simulating the conventional encryption rule with higher accuracy.
It should be noted that, if the conventional encryption rule of the consumable chip is known when the first attribute information of the consumable chip is obtained, the conventional encryption rule of the consumable chip is directly stored, and algorithm simulation is not required to obtain the conventional encryption rule.
With respect to step S110, after acquiring the plurality of sets of first attribute information of each consumable chip, before determining the type of each set of first attribute information, the method further includes:
comparing the first attribute information, and judging whether the same first attribute information exists or not;
if yes, only one group of data is reserved in the same multiple groups of first attribute information.
After the first attribute information is acquired, if the same first attribute information exists, only one group of data is reserved in multiple groups of the same first attribute information, so that the data repetition rate is reduced.
Furthermore, as shown in fig. 7, the method for preventing the consumable chip from being broken further includes step S140.
S140, storing each group of first attribute information and the belonged type in a corresponding relationship.
After the server 05 determines the category of the acquired first attribute information, the server 05 stores each set of the first attribute information and the category thereof in a database in a corresponding relationship.
And in order to increase the amount of the first attribute information in the database, the first attribute information can be continuously acquired, after the first attribute information is acquired, the database compares the acquired first attribute information with the existing first attribute information in the database, if the same data exists, the database only records the log of data storage, and a new space is not opened up to store the group of first attribute information. Therefore, invalid data in the database can be reduced to a certain extent, or malicious uploaded data can be avoided.
It should be noted that step S140 may be executed after step S110 and before step S120.
Optionally, the first attribute information includes, but is not limited to, manufacturer, model, color, volume, time of manufacture, and serial number.
In addition, the method for determining the type of each group of first attribute information in step S110 specifically includes:
and determining the type of each group of first attribute information according to the manufacturer and the model of each group of first attribute information.
And if the manufacturers and the models of the multiple groups of first attribute information are the same, the multiple groups of first attribute information are of the same type, otherwise, the multiple groups of first attribute information are of different types.
In one embodiment, as shown in fig. 8, a flow chart of the sub-step of step S120 is shown.
And S121, aiming at each type, taking the serial number in each group of first attribute information as an output target, taking any number in the residual data of the same group of first attribute information as input, and performing algorithm simulation to obtain a plurality of simulated encryption rules of each type.
And S122, obtaining the conventional encryption rule of each type according to the plurality of analog encryption rules of each type.
In the method, the input of the algorithm simulation is any one of the first attribute information except the serial number, so that the obtained simulated encryption rule can cover various possible encryption rules as much as possible, and the probability of obtaining the accurate encryption rule can be increased to a certain extent.
For S121, specifically, the simulation analyzer performs an algorithm simulation on each group of the first attribute information. Each set of first attribute information obtains one or more analog encryption rules, and each obtained analog encryption rule, the analog analyzer sends the analog encryption rule to the classification comparator. And after receiving an analog encryption rule, the classification comparator compares the analog encryption rule with analog encryption rules of the same type stored in the database, wherein the same type refers to the type of the first attribute information of the analog encryption rule. If the simulation encryption rule consistent with the simulation encryption rule exists in the database, the simulation encryption rule is not stored in the database, otherwise, the obtained simulation encryption rule is stored in the database.
The algorithm used in the algorithm simulation may be a machine learning algorithm or a set algorithm.
In one embodiment, as shown in fig. 9, a flow chart of the sub-step of step S122 is illustrated.
S510, aiming at multiple analog encryption rules of each kind, all the stored first attribute information of the kind is adopted for verification, and the probability value of each analog encryption rule is obtained.
S520, based on a preset threshold, taking the analog encryption rule with the probability value larger than the threshold as the conventional encryption rule of the category.
Specifically, after obtaining a plurality of analog encryption rules of each kind, or after obtaining one analog encryption rule, the server 05 verifies the analog encryption rule of the same kind using all the first attribute information of the same kind, and obtains a probability value of each analog encryption rule.
The verification method may be that, for each analog encryption rule, the input data meeting the analog encryption rule in the first attribute information is used as the input of the analog encryption rule, and after the corresponding analog serial number is obtained, if the analog serial number is consistent with the serial number in the first attribute information, the first attribute information passes verification, otherwise, the verification fails, that is, the verification is not matched. And calculating the ratio between the number of the first attribute information of each analog encryption rule passing the verification and the total number of the first attribute information of the type to which the analog encryption rule belongs, wherein the ratio is the probability value of the analog encryption rule.
The probability value of the simulated encryption rule is larger, which indicates that the simulated encryption rule is more likely to be a common encryption rule of the category to which the simulated encryption rule belongs, so that the conventional encryption rule of each category is determined according to the probability value, and the probability of determining the conventional encryption rule to be a real conventional encryption rule can be increased to a certain extent.
It should be understood that although the various steps in the flowcharts of fig. 4-9 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 4-9 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, the present application further provides a consumable chip anti-cracking device, as shown in fig. 10, the consumable chip anti-cracking device includes an encryption pattern generation module 08, a data analysis module 07, and a database 06.
A database 06 for storing various kinds of conventional encryption rules.
And the data analysis module 07 is configured to receive the encryption mode request, determine the type of the second attribute information, query a type of a conventional encryption rule, and generate a required encryption rule different from the conventional encryption rule according to the second attribute information.
The encryption mode request comprises second attribute information of the consumable chip to be encrypted.
And an encryption pattern generation module 08, configured to generate an encryption pattern according to the required encryption rule.
In one embodiment, the apparatus further comprises a data processing module 09 for obtaining the regular encryption rules.
The data processing module 09 is specifically configured to:
acquiring multiple groups of first attribute information of each consumable chip, and determining the type of each group of first attribute information; wherein, one consumable chip corresponds to a group of first attribute information;
performing algorithm simulation according to the first attribute information of each type to obtain a conventional encryption rule of each type;
and storing the conventional encryption rule and the belonged category in a corresponding relationship.
Above-mentioned device is prevented cracking by consumptive material chip, data analysis module 07 confirms the kind of this second attribute information through the second attribute information that the contained consumptive material chip of treating encrypting of receipt, treat the kind of encryption consumptive material chip in essence, and after inquiring out the conventional encryption rule of the kind of second attribute information, avoid these conventional encryption rules, generate the demand encryption rule different with this kind of conventional encryption rule according to second attribute information, encryption mode gassing module generates the encryption mode of treating the encryption consumptive material chip according to demand encryption rule, so that treat the encryption mode of encryption consumptive material chip and can avoid conventional encryption rule, and then can improve current consumptive material chip and adopt the artificial setting encryption information or use fixed algorithm to encrypt, and lead to the higher problem of the risk of leaking, with the anti-cracking performance of improvement consumptive material chip.
For specific limitations of the apparatus for loading a web page, reference may be made to the above limitations of the method for loading a web page, and details are not described herein again. The modules in the device for loading the web page can be wholly or partially implemented by software, hardware and a combination thereof. The modules may be embedded in the processor 02 of the electronic device 01 in a hardware form or may be independent of the processor 02 of the electronic device 01, or may be stored in the memory 03 of the electronic device 01 in a software form, so that the processor 02 may call and execute operations corresponding to the modules.
In the several embodiments provided in the present disclosure, it should be understood that the disclosed apparatus, system diagram and method may be implemented in other manners. The apparatus, system, and method embodiments described above are merely illustrative, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods, and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present disclosure may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, an electronic device, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory 03 (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is intended only as an alternative embodiment of the present disclosure, and not as a limitation thereof, and it will be apparent to those skilled in the art that various modifications and variations can be made in the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (10)

1. A method for preventing a consumable chip from being cracked is characterized by comprising the following steps:
receiving an encryption mode request, wherein the encryption mode request comprises second attribute information of the consumable chip to be encrypted;
determining the type of the second attribute information, inquiring a conventional encryption rule of the type, and generating a demand encryption rule different from the conventional encryption rule according to the second attribute information;
and generating an encryption mode according to the demand encryption rule.
2. The method of claim 1, further comprising the step of obtaining a regular encryption rule, the step comprising:
acquiring multiple groups of first attribute information of each consumable chip, and determining the type of each group of first attribute information; wherein, one consumable chip corresponds to a group of first attribute information;
performing algorithm simulation according to the first attribute information of each kind to obtain a conventional encryption rule of each kind;
and storing the conventional encryption rule and the belonged category in a corresponding relationship.
3. The method of claim 2, wherein the first attribute information includes a manufacturer, a model number, a color, a capacity, and a serial number;
the step of performing algorithm simulation according to the first attribute information of each of the categories to obtain a plurality of kinds of conventional encryption rules of each of the categories includes:
aiming at each kind of the kind, taking the serial number in each group of the first attribute information as an output target, taking any number in the residual data of the same group of the first attribute information as input, and carrying out algorithm simulation to obtain a plurality of simulated encryption rules of each kind;
obtaining a regular encryption rule for each of said categories based on a plurality of simulated encryption rules for each of said categories.
4. The method of claim 3, further comprising:
storing each group of the first attribute information and the belonged category in a corresponding relationship;
said step of deriving a regular encryption rule for each said category based on a plurality of simulated encryption rules for each said category, comprising:
aiming at various analog encryption rules of each kind, verifying by adopting all the stored first attribute information of the kind to obtain the probability value of each kind of analog encryption rule;
and based on a preset threshold value, taking the simulated encryption rule with the probability value larger than the threshold value as the conventional encryption rule of the category.
5. The method according to any one of claims 2 to 4, wherein after the step of acquiring first attribute information of each consumable chip, before the step of determining the kind of each set of the first attribute information, the method further comprises:
comparing the first attribute information, and judging whether the same first attribute information exists or not;
if yes, only one group of data is reserved in the same multiple groups of first attribute information.
6. The method of claim 2, wherein the first attribute information includes a manufacturer, a model number, a color, a capacity, and a serial number;
the step of determining the category of each group of the first attribute information includes:
and determining the type of each group of the first attribute information according to the manufacturer and the model of each group of the first attribute information.
7. The method of any of claims 1-4, wherein the encryption mode comprises a sequence number generation algorithm and an encryption algorithm.
8. A consumable chip anti-cracking device is characterized by comprising an encryption mode generation module, a data analysis module and a database;
the database is used for storing various conventional encryption rules;
the data analysis module is used for receiving an encryption mode request, and the encryption mode request comprises second attribute information of the consumable chip to be encrypted;
the data analysis module is further configured to determine a type of the second attribute information, query a conventional encryption rule of the type, and generate a required encryption rule different from the conventional encryption rule according to the second attribute information;
and the encryption mode generating module is used for generating an encryption mode according to the requirement encryption rule.
9. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, comprising a computer program which, when executed, controls an electronic device in which the computer-readable storage medium is located to perform the method of any of claims 1 to 7.
CN202111021283.4A 2021-09-01 2021-09-01 Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium Pending CN113688433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111021283.4A CN113688433A (en) 2021-09-01 2021-09-01 Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111021283.4A CN113688433A (en) 2021-09-01 2021-09-01 Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN113688433A true CN113688433A (en) 2021-11-23

Family

ID=78584785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111021283.4A Pending CN113688433A (en) 2021-09-01 2021-09-01 Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN113688433A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN108804953A (en) * 2018-06-15 2018-11-13 杭州旗捷科技有限公司 Consumable chip and its communication means, consumable chip and imaging device communication system, method
CN109714163A (en) * 2019-01-30 2019-05-03 江永林 A kind of chip serial number coding method and system, storage medium and terminal
CN112398647A (en) * 2020-11-03 2021-02-23 武汉先同科技有限公司 Consumable dynamic encryption method for channel distribution management
CN112637166A (en) * 2020-12-15 2021-04-09 平安科技(深圳)有限公司 Data transmission method, device, terminal and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN108804953A (en) * 2018-06-15 2018-11-13 杭州旗捷科技有限公司 Consumable chip and its communication means, consumable chip and imaging device communication system, method
CN109714163A (en) * 2019-01-30 2019-05-03 江永林 A kind of chip serial number coding method and system, storage medium and terminal
CN112398647A (en) * 2020-11-03 2021-02-23 武汉先同科技有限公司 Consumable dynamic encryption method for channel distribution management
CN112637166A (en) * 2020-12-15 2021-04-09 平安科技(深圳)有限公司 Data transmission method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
AU2022204197B2 (en) Security weakness and infiltration detection and repair in obfuscated website content
US11385942B2 (en) Systems and methods for censoring text inline
CN105590055B (en) Method and device for identifying user credible behaviors in network interaction system
JP5157318B2 (en) Document monitoring apparatus, document monitoring program, and document monitoring system
US7523318B2 (en) Method and system for automated password generation
CN107852412A (en) For phishing and the system and method for brand protection
Royston et al. Interaction of treatment with a continuous variable: simulation study of significance level for several methods of analysis
US11232182B2 (en) Open data biometric identity validation
CN110474911A (en) Trusted end-user recognition methods, device, equipment and computer readable storage medium
CN108664471A (en) Text region error correction method, device, equipment and computer readable storage medium
CN111222181B (en) AI model supervision method, system, server and storage medium
CN113544665B (en) Execution of measurements of trusted agents in resource-constrained environments using proof of work
CN113688433A (en) Anti-cracking method and device for consumable chip, electronic equipment and computer-readable storage medium
EP3879418B1 (en) Identity verification method and device
US20210042423A1 (en) Security assessment system
US20210192054A1 (en) Use of word embeddings to locate sensitive text in computer programming scripts
CN113343189A (en) Method and device for preventing malicious swiping of short message verification code
CN112926084A (en) Access authority management method and system
WO2021133592A1 (en) Malware and phishing detection and mediation platform
CN111737090A (en) Log simulation method and device, computer equipment and storage medium
CN105809074B (en) USB data transmission control method, device, control assembly and system
KR102641950B1 (en) Method for clustering user information of terminal, method and server for estimating demographic information of terminal
Frank et al. Mining permission request patterns from android and facebook applications (extended author version)
CN109947905A (en) Generate the method and apparatus for puing question to answer pair
CN117132283A (en) Identification method, apparatus, computer device, storage medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination