Background technology
Along with the becoming increasingly abundant of functions of the equipments, precision are higher, a lot of equipment in use need constantly to change according to situation about using, typical in ink-cases of printers, colour band, and the drum of color laser printer, powder, such consumptive materials such as the transfer belt of label machine, ink-jet printer is common PRN device, for modern office provides great convenience.For example existing ink-jet printer uses dismountable print cartridge to load mostly and prints the ink that uses, a lot of cartridge cases are equipped with chip, chip is provided with electronic module and is provided with a plurality of contacts, store the relevant information of print cartridge in the electronic module, as information such as print cartridge model, ink color, print cartridge ink inside surplus data.After print cartridge is packed ink-jet printer into, ink-jet printer promptly reads the information that is stored in the electronic module, and judge whether this print cartridge is applicable to this ink-jet printer, judge simultaneously whether sufficient ink is arranged in the print cartridge, have only ink-jet printer to judge that print cartridge is suitable for and when storing sufficient ink, ink-jet printer just prints work.The ink remaining amount data of the electronic module record of existing part ink box chip are controlled by ink-jet printer, before the each printing of ink-jet printer, read the ink remaining amount data of storing in the electronic module earlier, and calculate the quantity of ink of consumption according to the type of each print paper, the quantity of print paper, then original ink remaining amount is deducted quantity of ink that this time print to consume and calculate ink remaining amount in the current print cartridge, at last these ink remaining amount data are write back in the electronic module.
Whether in addition, also some machine is to utilize chip on the master control borad to write down the operating position of each consumptive material, by detecting consumptive material and use in the life span of regulation in that resetting means or chip being set on the consumptive material.
Above scheme has following these common defectives:
1, the chip on the consumptive material all adopts the contact contact to link to each other with main frame, those contact contacts exist easily get rusty, flimsy shortcoming, to such an extent as in start, reset or when monitoring the ink use amount in real time, can't effectively authenticate to consumptive material.
2, those chips are simple data-storing only, are easy to be cracked, and make the use amount of consumptive material to be rewritten arbitrarily, to such an extent as to make the operating position of consumptive material and whether be that the judgement of original-pack consumptive material can not get guaranteeing, thus the normal operation that jeopardizes equipment.
3, those chips need just write corresponding data before being installed on consumptive material, thereby need prepare enough different chips at different consumptive materials when producing, and utilized the content easy crack of machine mainboard control chip, existed serious safety problem.
Because consumptive material itself is the key of the normal operation of system; and existing recognition methods can't be protected the safety of use information; exceed the time limit to use because of user's modification information easily; perhaps use some fake and forged products; and influence the normal operation of equipment; so just need a kind of method that can discern the safety of the consumptive material true and false and behaviour in service, thereby help main frame can judge the legitimacy of consumptive material (consumable accessory), further protect the operation of whole system device.
The utility model content
For the destruction that prevents to use non-original factory and the pseudo-consumptive material that emits that equipment is produced; main purpose of the present utility model is to provide a kind of accessory encryption device; communicate by letter by the method for getting in touch with through enciphered message with radio electronic label by equipment, consumptive material is carried out the device of encipherment protection.
A time purpose of the present utility model is by the method that installs radio electronic label (RFID) on the consumptive material of various device additional, and a kind of encryption device that can convenient and swift flexible identification consumptive material record is provided.
Further purpose of the present utility model is to provide a kind of encryption device of protecting the consumable information safe and complete.
For reaching above-mentioned purpose, the technological means that the utility model adopts is:
A kind of accessory encryption device is arranged at an accessory, and this encryption device is a radio electronic label.
The advantage of method of the present utility model is:
1, adopts contactless radio electronic label that consumptive material is encrypted, overcome that easily get rusty in the contact contact, flimsy shortcoming, increased reliability.
2, adopt contactless radio electronic label that consumptive material is encrypted, can after the consumptive material assembling, carry out initialization to radio electronic label again, improved initialized speed greatly, be convenient to very much work out simultaneously multiple cipher.
3, owing to improved the initialized speed of radio electronic label, be convenient to work out multiple cipher simultaneously, therefore very convenient production and management.For the different password of different demand establishments provides possibility, can pass through the different password of establishment as different clients or zones of different, thus a lot of practical problems such as solution falsifying.
4, owing to add in the RF tag radio frequency module for reading and writing separate processor arranged, the independent program of use, and with physical method module is encapsulated, can't obtain whole keys by the method that cracks mainframe program, thereby improve the stability of encrypting greatly.
5, by automatic protection functions being set, when having the people to attempt to crack encryption, cracking for several times and just damage automatically, ensure information security at radio electronic label.
The specific embodiment
For the purpose of this utility model, technical scheme are further understood, now also be described below in detail in conjunction with the accompanying drawings with specific embodiment:
For the destruction that prevents to use non-original factory and the pseudo-consumptive material that emits that equipment is produced; we have designed a kind of radio electronic label 20 encryption devices; and by apparatus body 10 and radio electronic label 20 by communicating by letter, so that consumptive material is carried out encipherment protection through the method for enciphered message contact.
Of the present utility modelly a kind ofly carry out method of encrypting by 20 pairs of consumptive materials of radio electronic label, radio electronic label 20 at first is installed on consumptive material (easy-consuming fitting), and on apparatus body 10, be provided with a radio frequency module for reading and writing 102 of distinguishing with interpretation RFID in addition, on the radio electronic label 20 of equipment and consumptive material, write authenticate key respectively, version information, authentication information etc.This radio frequency module for reading and writing 102 can integrate with the form of apparatus body 10 with general module, but be preferably separate processor and the independent program used, and this radio frequency module for reading and writing 102 is encapsulated with physical method, thereby can't obtain whole keys by the method that cracks mainframe program, improve the stability of encrypting greatly.In preferred version, key separated into two parts on the apparatus body 10, be stored in respectively and reach in the radio frequency module for reading and writing 102 in the device memory 101 (processing module, memory module), be a complete authenticate key through radio frequency module for reading and writing 102 with two parts cipher key combinations again, then be preset with this complete authenticate key on the label.In device power-up or when resetting, equipment at first needs to use this complete authenticate key that the radio electronic label on the consumptive material 20 is authenticated, promptly the authenticate key that prestores in the password memory block 201 of radio electronic label 20 is read and comparison the two consistent authentication authorization and accounting success.After the authentication success, produce session key by radio frequency module for reading and writing 102.Device Host uses session key, and the radio electronic label on the consumptive material 20 is authenticated once more, starts the ciphertext transmission, and the consumptive material use amount in the data storage area 202 is wherein carried out read-write operation.Equipment can be regularly in executable operations or not timing ground the radio electronic label on the consumptive material 20 is carried out the ciphertext read-write, have only and just carry out relevant operation after reading and writing successfully, equipment will record the quantity situation that each consumptive material uses among the data storage area 202 of radio electronic label 20.After the consumptive material use amount of record in the radio electronic label 20 met or exceeded theoretical value, equipment pointed out consumptive material to finish using automatically, the consumptive material that requires the user more to renew.If detect less than encrypting radio electronic label 20 when equipment uses, can't work.Equipment will be periodically when executable operations judging the use amount of record in 20 data storage areas 202 of the radio electronic label on the consumptive material, have only the consumptive material use amount of data storage area 202 records in the radio electronic label 20 to be lower than under the situation of theoretical value of apparatus settings, equipment could be carried out the operation of being correlated with.In addition, this radio electronic label 20 can be provided with to be prevented cracking function, when the people wants to crack, and three password bads, radio electronic label 20 will damage automatically, forever can't recover.This method also can be applied to above the equipment of those critical components that must regularly replace, and reminds the user regularly to carry out more capable of to prevent the generation of problem.
This radio electronic label 20 is preferably the serial radio-frequency card of the radio-frequency card " Crypto RF Card " by name that meets ISO14443TYPE B standard in present embodiment, its advantage is, it should provide the eeprom memory that 1K bits-64K bits does not wait in the sheet by the series card according to different models, and the card of different models except capacity with number of partitions is different, hardware interface of being supported and command set are compatible fully, make things convenient for the upgrading and the cost control of system; And support memory block planning: EEPROM adopts popular zone configuration in the sheet.The number of partitions of the card of different model is between 4-16; Can pass through password, the configuration of authority realizes the merging and the partition of subregion, is fit to very much one card for multiple uses; The password of this card, key, configuration information are stored in one independently in the configure partition in addition.Do not take the space of user's partition holding, the great like this operating factor of memory space that improved.And help the unified management of card.Especially each key, password all have and independently prevent malicious sabotage error counter SCAC, SC checks when correct, SC is readable and erasable, SC checks when incorrect, and SC can not read with erasable and the SCAC value subtracted one, and the SCAC initial value is 4, SC checks every wrong 1 time SCAC is subtracted 1, SCAC equals at 0 o'clock, and the card self-destruction reverts to initial value 4 if SC checks correct SCAC.This radio-frequency card supports writing of card to latch in addition.
In order further to guarantee the security of information, except utilizing the cryptographic means that has of those radio electronic labels 20 itself, the device that the utility model further provides a kind of printer to cooperate with this radio electronic label 20: (following said main frame refers to processing module and the memory module that has printer now)
At first, carry out the Device Host chip initiation, program in the Device Host must arrive the essential information such as initial configuration of fetch program operation in the encryption chip 103, just can finish the initialization (promptly having the program of sub-fraction key to leave in this encryption chip) of main frame.
Secondly, authenticate key is divided into two parts, write respectively in the radio frequency module for reading and writing 102 on main frame and the main frame, after this radio frequency module for reading and writing 102 is a complete authenticate key with two parts cipher key combinations, and use this complete key that the radio electronic label on the consumptive material 20 is authenticated.
Owing to separate processor is arranged in the main frame radio frequency module for reading and writing 102, the independent program of use, and with physical method module is encapsulated, thereby can guarantee to obtain whole keys by the method that cracks mainframe program, increase the security of information.
Below be that example specifies its implementation process with the thermal transfer printer, and as Device Host in detail this scheme is described in detail, but is not limited to this kind main process equipment with the ARM single-chip microcomputer.
One, the storage of enciphered message
1, at first, a mainboard encryption chip 103 is housed in addition on the mainboard of ARM single-chip microcomputer, the initial key that computer program stored operation in the inside is necessary, version information, authentication information etc., the confidentiality of assurance program.
2, radio electronic label 20 has several data storage areas 202, respectively this independently data storage area 202 can storage version information and authentication information and the access times that are used for the storage print head, consumptive material use amount information such as print length length.
3, in addition, the authenticate key of radio frequency encryption chip authentication divides two parts storage.A part is stored in the ARM single-chip microcomputer; Another part is stored in the ARM single-chip microcomputer radio frequency module for reading and writing 102.
Be responsible for reading key part in the ARM single-chip microcomputer by radio frequency module for reading and writing 102, and in conjunction with the part that is stored in the radio frequency module for reading and writing 102, after authenticate key is integrated, finish the initial authentication process of radio electronic label 20, generation also provides session key for the ARM single-chip microcomputer.The ARM single-chip microcomputer utilizes this session key, carries out the encrypting read/write of data, with the operating position of record ink ribbon.
Two, ciphering process is described:
Device initialize: use PC software before the ARM single-chip microcomputer dispatches from the factory, mainboard encryption chip 103 is carried out initialization (initial key, version information, authentication information etc.).
Radio frequency module for reading and writing 102 initialization: the initialized PC software that utilizes simultaneously of ARM single-chip microcomputer, the part of colour band authenticate key is stored into radio frequency module for reading and writing 102, and another part deposits the device memory 101 (memory of Device Host management) of ARM single-chip microcomputer in.
The colour band initialization: the label on the consumptive material can independently write complete authenticate key on the initialization apparatus before embedding colour band, and relevant authentication information, and access times etc. are initialized as zero, or the available number of input consumptive material.Because of this radio electronic label 20 is contactless, thereby partly or entirely also can before dispatching from the factory, the writing of those information, perhaps returns and reinitialize after factory reproduces.
In device power-up or when resetting, the ARM single-chip microcomputer need use initial key that mainboard encryption chip 103 is authenticated again, behind the authentication success, the ARM single-chip microcomputer is the necessary initializes configuration information of fetch program operation from mainboard encryption chip 103, makes program be able to normal operation.
Print when maybe needing to read consumable information when needs in the program normal course of operation, the ARM single-chip microcomputer passes to radio frequency module for reading and writing 102 with the part colour band authenticate key of its preservation, radio frequency module for reading and writing 102 will be stored in another part key and next synthetic complete authenticate key of set of cipher key of ARM single-chip microcomputer transmission wherein, and use this authenticate key to carry out authentication initialization by the radio electronic label 20 on 104 pairs of consumptive materials of antenna, promptly the authenticate key that prestores in the password memory block 201 of radio electronic label 20 is read and comparison the two consistent authentication authorization and accounting success.After authentication was passed through, radio frequency module for reading and writing 102 produced session key, and the ARM single-chip microcomputer uses this session key that the RF tag on the colour band is authenticated once more, started the ciphertext transmission.The data storage area 202 of this radio electronic label 20 is divided into several independently data storage areas 202, and its quantity is good with 4, described respectively this independently data storage area 202 can storage version information and authentication information.Behind the ciphertext transmission start, can carry out read-write operation to the consumptive material use amount.The use information of colour band is transmitted by radio frequency module for reading and writing 102, and the data of being finished radio electronic label 20 by radio frequency module for reading and writing 102 write.This scheme optimization is for being provided with separate processor in radio frequency module for reading and writing 102, use independent program, and module is encapsulated with physical method, and can be provided with the anti-module that cracks, thereby can't obtain whole keys, thereby improved the stability of encrypting greatly by the method that cracks mainframe program.
In program, the ARM single-chip microcomputer can carry out the ciphertext read-write to mainboard encryption chip 103 or colour band RF tag in not timing ground when carrying out key operation.Have only and just carry out relevant operation after reading and writing successfully.
The advantage of this cipher mode:
Owing to adopted 20 pairs of consumptive materials of contactless radio electronic label to encrypt, overcome that easily get rusty in the contact contact, flimsy shortcoming, increased reliability.
Adopt 20 pairs of consumptive materials of contactless radio electronic label to encrypt, can after the consumptive material assembling, carry out initialization to radio electronic label 20 again, improved initialized speed greatly, be convenient to very much work out simultaneously multiple cipher.
Owing to improved the initialized speed of radio electronic label 20, be convenient to work out multiple cipher simultaneously, therefore very convenient production and management.For the different password of different demand establishments provides possibility, can pass through the different password of establishment as different clients or zones of different, thus a lot of practical problems such as solution falsifying.
Owing to adding in the RF tag radio frequency module for reading and writing 102 separate processor is arranged in addition, the independent program of using, and with physical method module is encapsulated, thereby can't obtain whole keys by the method that cracks mainframe program, thus the stability of encrypting improved greatly.