WO2016061969A1 - Illegal use prevention method of pattern band of embroidery machine - Google Patents

Illegal use prevention method of pattern band of embroidery machine Download PDF

Info

Publication number
WO2016061969A1
WO2016061969A1 PCT/CN2015/073398 CN2015073398W WO2016061969A1 WO 2016061969 A1 WO2016061969 A1 WO 2016061969A1 CN 2015073398 W CN2015073398 W CN 2015073398W WO 2016061969 A1 WO2016061969 A1 WO 2016061969A1
Authority
WO
WIPO (PCT)
Prior art keywords
embroidery machine
machine
version
public key
owner
Prior art date
Application number
PCT/CN2015/073398
Other languages
French (fr)
Chinese (zh)
Inventor
朱阳
Original Assignee
深圳思瑞普科技有限公司
惠州神田精密机械有限公司
朱阳
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳思瑞普科技有限公司, 惠州神田精密机械有限公司, 朱阳 filed Critical 深圳思瑞普科技有限公司
Publication of WO2016061969A1 publication Critical patent/WO2016061969A1/en

Links

Images

Classifications

    • DTEXTILES; PAPER
    • D05SEWING; EMBROIDERING; TUFTING
    • D05CEMBROIDERING; TUFTING
    • D05C5/00Embroidering machines with arrangements for automatic control of a series of individual steps
    • D05C5/02Embroidering machines with arrangements for automatic control of a series of individual steps by electrical or magnetic control devices
    • DTEXTILES; PAPER
    • D05SEWING; EMBROIDERING; TUFTING
    • D05CEMBROIDERING; TUFTING
    • D05C13/00Auxiliary devices incorporated in embroidering machines, not otherwise provided for; Ancillary apparatus for use with embroidering machines
    • D05C13/02Counting, measuring, indicating, warning, or safety devices

Definitions

  • the invention belongs to the field of computer embroidery machines, and particularly relates to a method for preventing illegal use of an embroidery machine version.
  • the computerized embroidery machine version is a common file (.dst, .emb, etc.), and its content describes the production steps required for the computer embroidery machine to produce the design embroidery, including stitching, color change, special instruction code, and the like.
  • the file can be Freely copy and distribute, and can be used for unlimited production on computer embroidery machines.
  • the computerized embroidery machine belt requires a certain amount of professional technicians to spend a lot of time on design, and a good version of the belt needs to be tried multiple times and repeatedly modified according to the trial embroidery effect to achieve a good embroidery effect, and its work is similar to art. creation.
  • the result of this large amount of work is ultimately reflected in the computer embroidery machine version with documents. Since the file can be arbitrarily copied and unrestricted on the machine, once it is circulated, it will be difficult to ensure that the designer gets the benefits he deserves, and will ultimately hurt the creative enthusiasm of the designer, or greatly limit the embroidery version. Application ultimately affects the healthy development of the entire industry.
  • the high quality version of the tape is difficult to obtain, either at a high price or with poor quality, or the band is outdated.
  • the plate can be copied at will, unlimited production, the rights of the plate makers can not be guaranteed, and the enthusiasm of the pattern makers cannot be fully mobilized.
  • the high-quality version of the new design is expensive and requires enough time for multiple illegal copies to gradually lower the price, thus greatly disrupting and limiting the development of the ribbon market.
  • the version obtained by the improper means does not pay the corresponding band fee, which results in lower production cost relative to the regular purchase band, and finally promotes the spread of illegal circulation.
  • U.S. Patent 5,924,372 provides an invention for limiting the number of patterns of embroidery, which is used to protect patterns by special ROM storage patterns, and the number of times of embroidery is calculated by an embroidery machine to determine whether normal embroidery can be performed.
  • this method can limit the number of times of embroidery stored in a special ROM, the scheme must rely on a special medium, which is inconvenient for the transmission of the pattern and cannot be performed through the network, thus greatly limiting the application of the method.
  • the invention provides an anti-illegal use method for the embroidery machine version, which can make the designed version tape can not be illegally copied and used, and can set the number of uses corresponding to the authorized price in the process of authorizing legal use, and can effectively protect the version. With the designer's rights, it can also ensure that users can purchase flexibly and increase the buyer's willingness to purchase.
  • An embroidery machine version with anti-illegal use method comprising the following steps:
  • the computer embroidery machine using the version has a unique private key and a public key, and the private key is stored in the computer embroidery electronic control in an encrypted manner, and the public key randomizer is provided to the user;
  • the computer embroidery machine user provides the unique public key of the embroidery machine to the owner of the tape, and the owner of the tape writes the version tape to the production limit data and encrypts it with the public key and sends it to the user of the computer embroidery machine;
  • the version restriction information is information for defining a specific machine or defining a specific number of times of use by a specific machine, and when the version is restricted to use by a specific machine, the other machine cannot be recognized normally;
  • the tape is used to define both the use of a particular machine and the number of uses of a particular machine, the number of times the machine performs the tape is executed and the tape cannot be used.
  • the version of the license that is written to the number of times of use is sent together with the public key of the owner of the tape to the computer using the public key of the computer embroidery machine.
  • Embroidery machine user after the computer embroidery machine decryption version, a random code is generated, and the random code is encrypted by the owner with the public key to generate a second authentication file and sent back to the owner of the tape; After the second authentication file, the private code is used to decrypt the random code, and then sent to the computer embroidery machine user; the embroidery machine user inputs the random code received into the computer embroidery machine, and the embroidery mechanical control is correct. If the comparison is inconsistent, it is considered that the computer embroidery machine user has not received the designer's second authentication, and will generate a new random code again, requesting to continue the secondary authentication.
  • the encrypted version of the strip information and the random code information may be transmitted through a computerized embroidery machine or transmitted offline.
  • the public key is a computerized embroidery machine unique machine identification code
  • the public key allows the owner of the strap to query the machine manufacturer or electronically controlled manufacturer to ensure that the public key is not forged.
  • the above-implemented version is protected against illegal use, which can eliminate illegal circulation of the plate, avoid unrestricted copying and production of the tape, and damage the designer's rights. It also avoids the fact that the number of embroidery may cause the manufacturer to purchase at a high price but the embroidery is small. Or buy a low-priced version of the belt but mass production; so that the design cost of the belt can be reasonably distributed to the embroidery samples, ensuring the dual interests of designers and production personnel; can improve the enthusiasm of the belt designer and production staff, improve The plate design quality and embroidery quality standardize the computer embroidery market to promote its healthy development.
  • Figure 1 is a schematic diagram of the implementation process of the version with anti-illegal use method.
  • the computerized embroidery machine with the version has a unique private key and a public key.
  • the private key is stored in the electronic control of the machine in an encrypted manner, and the public key randomizer is provided to the user.
  • the unique identification code of the machine provided by the computer embroidery machine is provided.
  • the public key of the computer embroidery machine the public key is sold to the user along with the computer embroidery machine; the embroidery machine user provides the unique public key of the embroidery machine to the owner of the tape.
  • the method of public inquiry can be published through the network, or it can be provided to the owner of the tape by point-to-point; in order to protect the interests of the designer or the owner of the plate, and to avoid unrestricted use of the plate,
  • the license owner writes the ribbon to the production limit data and encrypts it with the computer embroidery machine public key of the purchaser and sends it to the computer embroidery machine user;
  • the production limit data can be defined for a specific machine.
  • the data used can also be used to limit the number of times a particular machine is used.
  • the user of the computerized embroidery machine uses the computer embroidery machine to decrypt the version of the private key and then loads the version into a specific computer embroidery machine.
  • the computer embroidery machine can perform embroidery. .
  • the plate is a tape that limits both the use of the machine and the number of times the machine is used
  • the tape purchaser performs the tape loading by reloading after unloading.
  • Illegal use limited
  • the version band requires a secondary authentication random code provided by the owner of the tape to perform the tape strip each time the decryption is performed. If it is not limited to the number of uses, only the band of the specific machine is limited, then the above secondary authentication process is not required.
  • the version with the owner or the version of the designer in the version of the in-band composite version with restricted use information and version with the owner's public key and then use the public key of the computer embroidery machine to be executed to encrypt the version of the combined information and send
  • the embroidery machine detects the restricted use information of the plate. Then generate a random code and use the public key of the owner or the band designer to encrypt it and send it back to the owner to bring the owner or the designer to perform the second authentication.
  • the version is owned by the owner or the designer.
  • the private key decrypts the random code and sends it to the embroidering machine, and the computer embroidering machine inputs the decrypted random code, and the binding can be performed normally if the comparison is correct; If the comparison is inconsistent, it is considered that the user of the computer embroidery machine has not received the second authentication of the designer, and a new random code will be generated again, requesting to continue the secondary authentication.
  • the second authentication file may be automatically authenticated by the Internet. If the embroidery machine is in an offline state, the secondary authentication file may be manually Operation is completed by other physical media transfers.
  • the plate can be matched with the machine using the plate, and the quantitative use of the plate can be controlled well, so that the designer or the owner of the plate can reasonably price the plate to satisfy each.
  • the purchase demand of the purchaser of the use quantity not only protects the interests of the designer or the owner of the plate, but also protects the healthy development of the embroidery industry.
  • the above-mentioned version of the owner or the band designer refers to the person who has the right to copy and enjoy the property rights of the copy.

Landscapes

  • Engineering & Computer Science (AREA)
  • Textile Engineering (AREA)
  • Sewing Machines And Sewing (AREA)

Abstract

An illegal use prevention method of a pattern band of an embroidery machine, a computerized embroidery machine using a pattern band has a unique private key and a public key, the private key is stored in an electronic control device of the computerized embroidery machine in an encrypted manner, and the public key along with the machine is provided to a user; the computerized embroidery machine user provides the unique public key to a pattern band owner. The pattern band owner writes the pattern band into production restriction data and uses the public key to encrypt and send to the computerized embroidery machine user. The computerized embroidery machine user reads the pattern band to a designated machine after receiving the encrypted pattern band data; the electronic control device of the computerized embroidery machine performs embroidery by use of the private key after decrypting the pattern band. The designed pattern band cannot be illegally and freely copied and used, and the using times corresponding to the authorization price can be set in an authorized legal using process.

Description

一种刺绣机版带防非法使用方法  An embroidery machine version with anti-illegal use method 技术领域  Technical field
本发明属于电脑刺绣机领域,特别涉及一种刺绣机版带防非法使用的方法。  The invention belongs to the field of computer embroidery machines, and particularly relates to a method for preventing illegal use of an embroidery machine version.
背景技术  Background technique
目前电脑刺绣机版带为普通文件(.dst,.emb等),其内容描述了电脑刺绣机生产该设计绣品所需的生产步骤,包括针迹、换色、特殊指令码等。目前该文件可以 被 随意复制和散播,且可以在电脑刺绣机上进行无限制生产使用。 At present, the computerized embroidery machine version is a common file (.dst, .emb, etc.), and its content describes the production steps required for the computer embroidery machine to produce the design embroidery, including stitching, color change, special instruction code, and the like. Currently the file can be Freely copy and distribute, and can be used for unlimited production on computer embroidery machines.
电脑刺绣机版带需要一定的专业化技术人员花费大量时间进行设计,并且一个良好的版带需要进行多次试绣进并根据试绣效果反复修改才能达到良好的刺绣效果,其工作类似于艺术创作。而这大量工作的结果最终都体现在电脑刺绣机版带文件。由于该文件可以被任意复制和在机器上进行无限制生产,因此一旦流传,将难以确保设计人员获得应有的收益,并最终将伤害设计人员的创作积极性,或是极大限制刺绣版带的应用,最终影响整个行业的健康发展。 The computerized embroidery machine belt requires a certain amount of professional technicians to spend a lot of time on design, and a good version of the belt needs to be tried multiple times and repeatedly modified according to the trial embroidery effect to achieve a good embroidery effect, and its work is similar to art. creation. The result of this large amount of work is ultimately reflected in the computer embroidery machine version with documents. Since the file can be arbitrarily copied and unrestricted on the machine, once it is circulated, it will be difficult to ensure that the designer gets the benefits he deserves, and will ultimately hurt the creative enthusiasm of the designer, or greatly limit the embroidery version. Application ultimately affects the healthy development of the entire industry.
在这个情况下,导致高质量的版带难以获取,要么价格高,要么质量差,或者版带已经过时。 In this case, the high quality version of the tape is difficult to obtain, either at a high price or with poor quality, or the band is outdated.
由于版带可以随意复制,无限制生产,打版人员权益无法得到保障,无法充分调动打版人员的积极性。另一方面,为了能够收回成本,新设计的高质量版带价格高昂,需要足够多的时间进行多次非法复制才能逐步降低价格,因此极大扰乱和限制了版带市场的发展。例如通过不正当手段得到的版带由于没有支付相应的版带费用,从而导致相对于正规购买版带产生更低的生产成本,最终促使非法流通手段蔓延。 Because the plate can be copied at will, unlimited production, the rights of the plate makers can not be guaranteed, and the enthusiasm of the pattern makers cannot be fully mobilized. On the other hand, in order to be able to recover the cost, the high-quality version of the new design is expensive and requires enough time for multiple illegal copies to gradually lower the price, thus greatly disrupting and limiting the development of the ribbon market. For example, the version obtained by the improper means does not pay the corresponding band fee, which results in lower production cost relative to the regular purchase band, and finally promotes the spread of illegal circulation.
美国专利5924372提供了一种用于限制花样刺绣次数的发明,其通过特殊的ROM存储花样用来保护花样,通过刺绣机计算刺绣次数来确定是否能进行正常刺绣。虽然该方法可以限制储存在特殊ROM中的花样的刺绣次数,但是该方案必须依赖于特殊介质,对于花样的传输造成不便,也无法通过网络进行,因此极大限制了该方法的应用。 U.S. Patent 5,924,372 provides an invention for limiting the number of patterns of embroidery, which is used to protect patterns by special ROM storage patterns, and the number of times of embroidery is calculated by an embroidery machine to determine whether normal embroidery can be performed. Although this method can limit the number of times of embroidery stored in a special ROM, the scheme must rely on a special medium, which is inconvenient for the transmission of the pattern and cannot be performed through the network, thus greatly limiting the application of the method.
发明内容  Summary of the invention
本发明提供一种刺绣机版带防非法使用方法,可以使设计的版带不能被随意非法复制使用,并且可以在授权合法使用的过程中设置与授权价格相适应的使用次数,可以有效保护版带设计人的权益,也可以保证使用者灵活购买,提高购买者的购买意愿。 The invention provides an anti-illegal use method for the embroidery machine version, which can make the designed version tape can not be illegally copied and used, and can set the number of uses corresponding to the authorized price in the process of authorizing legal use, and can effectively protect the version. With the designer's rights, it can also ensure that users can purchase flexibly and increase the buyer's willingness to purchase.
本发明通过以下技术手段实现: The invention is achieved by the following technical means:
一种刺绣机版带防非法使用方法,包含以下步骤: An embroidery machine version with anti-illegal use method, comprising the following steps:
S1,使用版带的电脑刺绣机拥有唯一私钥和公钥,私钥以加密方式储存在电脑刺绣机电控内,公钥随机器提供给用户; S1, the computer embroidery machine using the version has a unique private key and a public key, and the private key is stored in the computer embroidery electronic control in an encrypted manner, and the public key randomizer is provided to the user;
S2,电脑刺绣机用户将刺绣机唯一公钥提供给版带所有者,版带所有者将版带写入生产限制数据并利用此公钥加密并发送给电脑刺绣机用户; S2, the computer embroidery machine user provides the unique public key of the embroidery machine to the owner of the tape, and the owner of the tape writes the version tape to the production limit data and encrypts it with the public key and sends it to the user of the computer embroidery machine;
S3,电脑刺绣机用户收到加密版带数据后,将版带读入指定机器,电脑刺绣机电控利用私钥解密版带成功后执行刺绣。 S3, after the user of the computerized embroidery machine receives the encrypted version with the data, the user will read the version into the designated machine, and the computer embroidery electronic control will use the private key to decrypt the version and perform the embroidery.
其中,所述版带限制信息为限定特定机器使用的信息或者限定特定机器使用特定次数的信息,当所述版带限制特定机器使用,在其他机器无法正常识别 ; 当版带既限定特定机器使用又限定特定机器的使用次数时,所述的机器执行所述版带的次数被执行完毕后,该版带无法被继续使用。 Wherein, the version restriction information is information for defining a specific machine or defining a specific number of times of use by a specific machine, and when the version is restricted to use by a specific machine, the other machine cannot be recognized normally; When the tape is used to define both the use of a particular machine and the number of uses of a particular machine, the number of times the machine performs the tape is executed and the tape cannot be used.
其中,当所述版带为既限定特定机器又限定特定机器的使用次数时,将写入允许使用次数的版带连同版带所有者的公钥一起使用电脑刺绣机的公钥加密发送给电脑刺绣机用户;电脑刺绣机解密版带后则生成一个随机码,所述的随机码采用版带所有者公钥加密后生成二次鉴权文件发回给版带所有者;版带所有者收到所述的二次鉴权文件后利用自己的私钥解密随机码,然后发送给电脑刺绣机用户;刺绣机用户将收到的随机码输入电脑刺绣机,刺绣机电控比对无误则将执行生产;如果对比不一致,则认为是电脑刺绣机用户未收到设计人员的二次鉴权,将会再次产生新的随机码,要求继续进行二次鉴权。 Wherein, when the version is to limit the number of uses of a specific machine and a specific machine, the version of the license that is written to the number of times of use is sent together with the public key of the owner of the tape to the computer using the public key of the computer embroidery machine. Embroidery machine user; after the computer embroidery machine decryption version, a random code is generated, and the random code is encrypted by the owner with the public key to generate a second authentication file and sent back to the owner of the tape; After the second authentication file, the private code is used to decrypt the random code, and then sent to the computer embroidery machine user; the embroidery machine user inputs the random code received into the computer embroidery machine, and the embroidery mechanical control is correct. If the comparison is inconsistent, it is considered that the computer embroidery machine user has not received the designer's second authentication, and will generate a new random code again, requesting to continue the secondary authentication.
其中,所述的加密的版带信息及随机码信息可通过电脑刺绣机联网传输或线下物理介质传输。 The encrypted version of the strip information and the random code information may be transmitted through a computerized embroidery machine or transmitted offline.
最后,所述的公钥为电脑刺绣机唯一机器标识码, 所述 公钥可供版带所有者向机器生产厂商或电控生产厂商查询以确保该公钥不被伪造。 Finally, the public key is a computerized embroidery machine unique machine identification code, The public key allows the owner of the strap to query the machine manufacturer or electronically controlled manufacturer to ensure that the public key is not forged.
以上实现的版带防非法使用方法,可以杜绝版带非法流通,避免无限制复制和生产版带而损害设计人员权益,也避免因为刺绣数量的多寡导致生产人员可能会花高价购买但刺绣数量少或花低价购买版带但大量生产;从而使版带的设计成本可以合理分摊到刺绣样品里,保证了设计人员和生产人员的双重利益;可以提高版带设计人员和生产人员的积极性,提升版带设计质量和绣品质量规范化电脑刺绣市场,促进其健康发展。 The above-implemented version is protected against illegal use, which can eliminate illegal circulation of the plate, avoid unrestricted copying and production of the tape, and damage the designer's rights. It also avoids the fact that the number of embroidery may cause the manufacturer to purchase at a high price but the embroidery is small. Or buy a low-priced version of the belt but mass production; so that the design cost of the belt can be reasonably distributed to the embroidery samples, ensuring the dual interests of designers and production personnel; can improve the enthusiasm of the belt designer and production staff, improve The plate design quality and embroidery quality standardize the computer embroidery market to promote its healthy development.
附图说明  DRAWINGS
图1为版带防非法使用方法的实现过程示意图。  Figure 1 is a schematic diagram of the implementation process of the version with anti-illegal use method.
具体实施方式  detailed description
以下将结合附图对本发明的具体实施过程进行详细说明。  The specific implementation process of the present invention will be described in detail below with reference to the accompanying drawings.
一种刺绣机版带防非法使用方法, 使用版带的电脑刺绣机拥有唯一私钥和公钥,私钥以加密方式储存在机器电控内,公钥随机器提供给用户,一般来说,将电脑刺绣机设有的机器唯一标识码作为电脑刺绣机的公钥,该公钥随电脑刺绣机出售一并提供给用户;刺绣机用户将刺绣机唯一公钥提供给版带所有者, 可以通过网络发布公开查询的方式,也可以点对点提供给版带所有者; 为了保护版带设计人或者版带所有人的利益,避免版带无限制的使用, 在版带出售时,版带所有者将版带写入生产限制数据并利用版带购买人的电脑刺绣机公钥加密并发送给电脑刺绣机用户;所述的生产限制数据可以为限定特定机器使用的数据,也可以为限定特定机器使用限定次数的数据, 电脑刺绣机用户收到加密版带数据后,利用电脑刺绣机私钥解密版带成功后将版带载入特定的电脑刺绣机,所述的电脑刺绣机才能执行刺绣 。这样可以做到量化控制版带购买人对版带的使用量,进一步也便于版带所有者根据版带购买人的使用量进行合理定价,对于生产量较小的购买者定价低、对于生产量大的购买人定价高,作为合理分摊成本,使中小型用户也能以合理价格购买到高质量设计的版带,有利于行业健康发展。  An embroidery machine version with anti-illegal use method, The computerized embroidery machine with the version has a unique private key and a public key. The private key is stored in the electronic control of the machine in an encrypted manner, and the public key randomizer is provided to the user. Generally, the unique identification code of the machine provided by the computer embroidery machine is provided. As the public key of the computer embroidery machine, the public key is sold to the user along with the computer embroidery machine; the embroidery machine user provides the unique public key of the embroidery machine to the owner of the tape. The method of public inquiry can be published through the network, or it can be provided to the owner of the tape by point-to-point; in order to protect the interests of the designer or the owner of the plate, and to avoid unrestricted use of the plate, When the ribbon is sold, the license owner writes the ribbon to the production limit data and encrypts it with the computer embroidery machine public key of the purchaser and sends it to the computer embroidery machine user; the production limit data can be defined for a specific machine. The data used can also be used to limit the number of times a particular machine is used. After receiving the encrypted version of the data, the user of the computerized embroidery machine uses the computer embroidery machine to decrypt the version of the private key and then loads the version into a specific computer embroidery machine. The computer embroidery machine can perform embroidery. . This can be used to quantify the control version with the purchaser's use of the tape, and further facilitate the owner of the tape to be reasonably priced according to the amount of use of the purchaser of the tape, for the producers with smaller production, the price is low, for the production Large buyers are priced high, and as a reasonable cost sharing, small and medium-sized users can also purchase high-quality design ribbons at reasonable prices, which is conducive to the healthy development of the industry.
当所述版带为既限制使用机器又限定所述机器的使用次数的版带时,为了避免版带写入次数用尽后,版带购买者通过卸载后重新装载使用的方式进行版带的非法使用,限定所述 版带每次解密被执行时需要一个由版带所有者提供的二次鉴权随机码才能执行版带。如果是不限制使用次数,只限制特定使用机器的版带,则无需进行上述二次鉴权过程。 When the plate is a tape that limits both the use of the machine and the number of times the machine is used, in order to avoid the use of the tape writes, the tape purchaser performs the tape loading by reloading after unloading. Illegal use, limited The version band requires a secondary authentication random code provided by the owner of the tape to perform the tape strip each time the decryption is performed. If it is not limited to the number of uses, only the band of the specific machine is limited, then the above secondary authentication process is not required.
具体来说,如图1所示, 版带所有人或者版带设计人在版带内合成版带限制使用信息和版带所有人公钥,然后使用待执行版带的电脑刺绣机的公钥加密所述的版带合成信息并发送给待执行版带的电脑刺绣机,刺绣机通过私钥解密后,刺绣机检测到版带的限制使用信息, 然后生成一个随机码并使用版带所有人或版带设计人的公钥加密后发回版带所有人或版带设计人进行二次鉴权,版带所有人或版带设计人用自己的私钥将随机码解密后发送给所述的刺绣机,所述的电脑刺绣机输入所述的解密随机码,比对无误方能正常执行版带进行生产; 如果对比不一致,则认为是电脑刺绣机用户未收到设计人员的二次鉴权,将会再次产生新的随机码,要求继续进行二次鉴权。如果所述的电脑刺绣机为联网工作,则所述的二次鉴权文件可以通过互联网自动鉴权完成,如果所述的刺绣机为线下状态,所述的二次鉴权文件可以通过人工操作并由其他物理介质传输完成。  Specifically, as shown in Figure 1, The version with the owner or the version of the designer in the version of the in-band composite version with restricted use information and version with the owner's public key, and then use the public key of the computer embroidery machine to be executed to encrypt the version of the combined information and send For the computerized embroidery machine to be executed, after the embroidery machine is decrypted by the private key, the embroidery machine detects the restricted use information of the plate. Then generate a random code and use the public key of the owner or the band designer to encrypt it and send it back to the owner to bring the owner or the designer to perform the second authentication. The version is owned by the owner or the designer. The private key decrypts the random code and sends it to the embroidering machine, and the computer embroidering machine inputs the decrypted random code, and the binding can be performed normally if the comparison is correct; If the comparison is inconsistent, it is considered that the user of the computer embroidery machine has not received the second authentication of the designer, and a new random code will be generated again, requesting to continue the secondary authentication. If the computerized embroidery machine is working in networking, the second authentication file may be automatically authenticated by the Internet. If the embroidery machine is in an offline state, the secondary authentication file may be manually Operation is completed by other physical media transfers.
通过以上方法,可以使版带与使用版带的机器一一对应起来,也可以较好的控制版带的量化使用,方便版带设计人或者版带所有人对版带进行合理定价,满足各种使用量的购买人的购买需求,既保护了版带设计人或者版带所有人的利益,也保护了刺绣行业的健康发展。 Through the above method, the plate can be matched with the machine using the plate, and the quantitative use of the plate can be controlled well, so that the designer or the owner of the plate can reasonably price the plate to satisfy each. The purchase demand of the purchaser of the use quantity not only protects the interests of the designer or the owner of the plate, but also protects the healthy development of the embroidery industry.
以上所述的版带所有人或者版带设计人是指对版带有权复制并对复制享有财产权的人。 The above-mentioned version of the owner or the band designer refers to the person who has the right to copy and enjoy the property rights of the copy.
对本发明进行简单变化所得的方案也在本发明保护的范围之内。 It is also within the scope of the present invention to make a simple change to the present invention.

Claims (5)

  1. 一种刺绣机版带防非法使用方法,包含以下步骤: An embroidery machine version with anti-illegal use method, comprising the following steps:
    S1,使用版带的电脑刺绣机拥有唯一私钥和公钥,私钥以加密方式储存在电脑刺绣机电控内,公钥随机器提供给用户;S1, the computer embroidery machine using the version has a unique private key and a public key, and the private key is stored in the computer embroidery electronic control in an encrypted manner, and the public key randomizer is provided to the user;
    S2,刺绣机用户将刺绣机唯一公钥提供给版带所有者,版带所有者将版带写入限制数据并利用此公钥加密 后 发送给电脑刺绣机用户;S2, the embroidery machine user provides the unique public key of the embroidery machine to the owner of the tape, and the owner of the tape writes the band to the limit data and encrypts the key with the public key. Send to computer embroidery machine users;
    S3,电脑刺绣机用户收到加密版带数据后,将版带读入指定机器,刺绣机电控利用私钥解密版带成功后将版带载入电脑刺绣机,电脑刺绣机执行刺绣。S3, after the user of the computerized embroidery machine receives the encrypted version with the data, the version is read into the designated machine, and the embroidered electrical control uses the private key to decrypt the version. After successful, the version is loaded into the computer embroidery machine, and the computer embroidery machine performs embroidery.
  2. 根据权利要求1所述的刺绣机版带防非法使用的方法,其特征在于:所述版带限制信息为限定特定机器使用 所述版带 的信息或者限定特定机器使用 所述版带 特定次数的信息,当所述版带限制特定机器使用,在其他机器无法正常识别 ; 当版带既限定特定机器又限定特定机器的使用次数时,所述的机器执行所述版带的次数被执行完毕后,该版带无法被继续使用。 A method for preventing illegal use of an embroidery machine according to claim 1, wherein said plate restriction information is used to define a specific machine The information or the specific machine uses the specified number of times with the specified number of times. When the version is restricted to use by a particular machine, it cannot be recognized normally by other machines; When the version of the tape defines both the specific machine and the number of uses of the particular machine, the number of times the machine performs the tape is executed and the tape cannot be used.
  3. 根据权利要求2所述的刺绣机版带防非法使用的方法,其特征在于:当所述版带为既限定特定机器又限定特定机器的使用次数时,将写入允许使用次数的版带连同版带所有者的公钥一起使用电脑刺绣机的公钥加密发送给电脑刺绣机用户;电脑刺绣机解密版带后则生成一个随机码,所述的随机码采用版带所有者公钥加密后生成二次鉴权文件发回给版带所有者;版带所有者收到所述的二次鉴权文件后利用自己的私钥解密随机码,然后发送给电脑刺绣机用户;刺绣机用户将收到的随机码输入电脑刺绣机,刺绣机电控比对无误则将执行生产;如果对比不一致,则认为是电脑刺绣机用户未收到设计人员的二次鉴权,将会再次产生新的随机码,要求继续进行二次鉴权。 A method for preventing illegal use of an embroidery machine according to claim 2, wherein when said tape is used to define both a specific machine and a specific machine, the number of times the number of permitted uses is written together with The public key of the owner with the owner's public key is sent to the user of the computer embroidery machine using the public key of the computer embroidery machine; after the computerized embroidery machine decrypts the version, a random code is generated, and the random code is encrypted by using the owner's public key. Generating a secondary authentication file and sending it back to the owner of the tape; after receiving the second authentication file, the owner of the tape decrypts the random code with his private key and sends it to the user of the computer embroidery machine; the user of the embroidery machine will The random code received is input into the computerized embroidery machine, and the embroidery and mechanical control are executed correctly. If the comparison is inconsistent, it is considered that the user of the computerized embroidery machine has not received the second authentication of the designer, and will generate a new one again. Random code, request to continue the second authentication.
  4. 根据权利要求3所述的刺绣机版带防非法使用的方法,其特征在于:所述的加密的版带信息及随机码信息可通过电脑刺绣机联网传输或线下物理介质传输。 The method for preventing illegal use of an embroidery machine according to claim 3, wherein the encrypted version information and random code information can be transmitted by a computer embroidery machine or transmitted by an offline physical medium.
  5. 根据权利要求1所述的刺绣机版带防非法使用的方法,其特征在于:所述的公钥为电脑刺绣机唯一机器标识码。 The method for preventing illegal use of an embroidery machine according to claim 1, wherein the public key is a unique machine identification code of a computer embroidery machine.
PCT/CN2015/073398 2014-10-23 2015-02-28 Illegal use prevention method of pattern band of embroidery machine WO2016061969A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410571178.1A CN104372541B (en) 2014-10-23 2014-10-23 Illegal using method prevented by a kind of embroidery machine version band
CN201410571178.1 2014-10-23

Publications (1)

Publication Number Publication Date
WO2016061969A1 true WO2016061969A1 (en) 2016-04-28

Family

ID=52551722

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/073398 WO2016061969A1 (en) 2014-10-23 2015-02-28 Illegal use prevention method of pattern band of embroidery machine

Country Status (2)

Country Link
CN (1) CN104372541B (en)
WO (1) WO2016061969A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104372541B (en) * 2014-10-23 2016-08-24 深圳思瑞普科技有限公司 Illegal using method prevented by a kind of embroidery machine version band

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1176663A (en) * 1997-09-08 1999-03-23 Brother Ind Ltd Embroidery system with communication function
CN1318934A (en) * 2000-04-04 2001-10-24 日星特殊精密株式会社 Diagnostic system and method for fault diagnosis of embroidering machine
US20080079727A1 (en) * 2006-09-30 2008-04-03 Soft Sight, Inc Method and System for Creating and Manipulating Embroidery Designs Over a Wide Area Network
JP2008097577A (en) * 2006-09-13 2008-04-24 Brother Ind Ltd Software distribution system for sewing machine, sewing machine and computer readable recording medium
CN101855111A (en) * 2007-11-08 2010-10-06 法国欧陆汽车公司 Method of unlocking an engine control computer
CN102079167A (en) * 2010-11-01 2011-06-01 天津伟力捷包装设备有限公司 Ink jet printer circuit with remote control function
CN201950970U (en) * 2010-11-01 2011-08-31 天津伟力捷包装设备有限公司 Ink jet printer circuit with remote control function
CN102182024A (en) * 2011-05-03 2011-09-14 惠州神田精密机械有限公司 Computer embroidery process
CN102978843A (en) * 2011-09-06 2013-03-20 天津宝盈电脑机械有限公司 Processing method for double sequin pattern version of embroidery machine
CN104372541A (en) * 2014-10-23 2015-02-25 深圳思瑞普科技有限公司 Illegal use prevention method of pattern band of embroidery machine

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09168680A (en) * 1995-12-20 1997-06-30 Brother Ind Ltd Sewing data processor
JP3948037B2 (en) * 1996-11-19 2007-07-25 ブラザー工業株式会社 sewing machine
JPH10249080A (en) * 1997-03-11 1998-09-22 Brother Ind Ltd Embroidery data processor
JPH10263231A (en) * 1997-03-28 1998-10-06 Brother Ind Ltd Sewing data converter
JP2001198372A (en) * 1999-07-05 2001-07-24 Brother Ind Ltd Equipment for setting sewing conditions of electronic controlled sewing machine
US6196146B1 (en) * 2000-03-23 2001-03-06 Pulse Microsystems Ltd. Web based embroidery system and method
US6216618B1 (en) * 2000-04-07 2001-04-17 Pulse Microsystems Ltd. Embroidery system utilizing windows CE based GUI
CN104539654A (en) * 2014-12-05 2015-04-22 江苏大学 Personal data filling system solving method based on privacy protection

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1176663A (en) * 1997-09-08 1999-03-23 Brother Ind Ltd Embroidery system with communication function
CN1318934A (en) * 2000-04-04 2001-10-24 日星特殊精密株式会社 Diagnostic system and method for fault diagnosis of embroidering machine
JP2008097577A (en) * 2006-09-13 2008-04-24 Brother Ind Ltd Software distribution system for sewing machine, sewing machine and computer readable recording medium
US20080079727A1 (en) * 2006-09-30 2008-04-03 Soft Sight, Inc Method and System for Creating and Manipulating Embroidery Designs Over a Wide Area Network
CN101855111A (en) * 2007-11-08 2010-10-06 法国欧陆汽车公司 Method of unlocking an engine control computer
CN102079167A (en) * 2010-11-01 2011-06-01 天津伟力捷包装设备有限公司 Ink jet printer circuit with remote control function
CN201950970U (en) * 2010-11-01 2011-08-31 天津伟力捷包装设备有限公司 Ink jet printer circuit with remote control function
CN102182024A (en) * 2011-05-03 2011-09-14 惠州神田精密机械有限公司 Computer embroidery process
CN102978843A (en) * 2011-09-06 2013-03-20 天津宝盈电脑机械有限公司 Processing method for double sequin pattern version of embroidery machine
CN104372541A (en) * 2014-10-23 2015-02-25 深圳思瑞普科技有限公司 Illegal use prevention method of pattern band of embroidery machine

Also Published As

Publication number Publication date
CN104372541B (en) 2016-08-24
CN104372541A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
US9305173B2 (en) Portable authorization device for authorizing use of protected information and associated method
EP1125182B1 (en) Distributing access to a data item
KR101135145B1 (en) Secure Multimedia Card, Rights object issue method and apparatus for using digital contents
CA2560477C (en) Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
US7496540B2 (en) System and method for securing digital content
KR101169021B1 (en) Method and Apparatus for sending right object information between device and portable storage
WO2021128244A1 (en) Registration authorization method and system
WO2005045651B1 (en) Method for judging use permission of information and content distribution system using the method
JP2004056620A5 (en)
JP2007538317A (en) Content reproduction method and apparatus using digital copyright management between portable storage device and device, and portable storage device therefor
JP2004046833A (en) Publishing of contents related to digital copyright management (drm) system
AU778380B2 (en) Portable authorization device for authorizing use of protected information and associated method
CN105095691B (en) A kind of method and apparatus sending digital publication
Jakobsson et al. Discouraging software piracy using software aging
CN103186723A (en) Digital content security cooperation method and system
KR101979323B1 (en) Software license authentication management method
WO2016061969A1 (en) Illegal use prevention method of pattern band of embroidery machine
TW200534663A (en) Copyright protection method for the digital publication and system thereof
WO2010134517A1 (en) System for browsing or viewing/listening to the contents of removable memory media
US20040123126A1 (en) Method and apparatus for deterring piracy
JP2010271771A5 (en)
CN105046112A (en) Digital copyright protection method
US11748459B2 (en) Reducing software release date tampering by incorporating software release date information into a key exchange protocol
KR100725902B1 (en) Protective Method for Digital Content Using Meta-Information
US20090307503A1 (en) Digital content management systems and methods

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15852158

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 02/08/2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15852158

Country of ref document: EP

Kind code of ref document: A1