WO2020151509A1 - 一种耗材芯片、耗材芯片通信方法 - Google Patents

一种耗材芯片、耗材芯片通信方法 Download PDF

Info

Publication number
WO2020151509A1
WO2020151509A1 PCT/CN2020/071637 CN2020071637W WO2020151509A1 WO 2020151509 A1 WO2020151509 A1 WO 2020151509A1 CN 2020071637 W CN2020071637 W CN 2020071637W WO 2020151509 A1 WO2020151509 A1 WO 2020151509A1
Authority
WO
WIPO (PCT)
Prior art keywords
consumable
unit
mcu unit
mcu
verification
Prior art date
Application number
PCT/CN2020/071637
Other languages
English (en)
French (fr)
Inventor
孙云
刘天翔
郭伟欣
Original Assignee
杭州旗捷科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州旗捷科技有限公司 filed Critical 杭州旗捷科技有限公司
Priority to US17/287,505 priority Critical patent/US11709927B2/en
Priority to EP20745015.6A priority patent/EP3915792B1/en
Publication of WO2020151509A1 publication Critical patent/WO2020151509A1/zh

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41JTYPEWRITERS; SELECTIVE PRINTING MECHANISMS, i.e. MECHANISMS PRINTING OTHERWISE THAN FROM A FORME; CORRECTION OF TYPOGRAPHICAL ERRORS
    • B41J2/00Typewriters or selective printing mechanisms characterised by the printing or marking process for which they are designed
    • B41J2/005Typewriters or selective printing mechanisms characterised by the printing or marking process for which they are designed characterised by bringing liquid or particles selectively into contact with a printing material
    • B41J2/01Ink jet
    • B41J2/17Ink jet characterised by ink handling
    • B41J2/175Ink supply systems ; Circuit parts therefor
    • B41J2/17503Ink cartridges
    • B41J2/17543Cartridge presence detection or type identification
    • B41J2/17546Cartridge presence detection or type identification electronically
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41JTYPEWRITERS; SELECTIVE PRINTING MECHANISMS, i.e. MECHANISMS PRINTING OTHERWISE THAN FROM A FORME; CORRECTION OF TYPOGRAPHICAL ERRORS
    • B41J29/00Details of, or accessories for, typewriters or selective printing mechanisms not otherwise provided for
    • B41J29/38Drives, motors, controls or automatic cut-off devices for the entire printing mechanism
    • B41J29/393Devices for controlling or analysing the entire machine ; Controlling or analysing mechanical parameters involving printing of test patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/43Checking; Contextual analysis
    • G06F8/433Dependency analysis; Data or control flow analysis
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41JTYPEWRITERS; SELECTIVE PRINTING MECHANISMS, i.e. MECHANISMS PRINTING OTHERWISE THAN FROM A FORME; CORRECTION OF TYPOGRAPHICAL ERRORS
    • B41J29/00Details of, or accessories for, typewriters or selective printing mechanisms not otherwise provided for
    • B41J29/38Drives, motors, controls or automatic cut-off devices for the entire printing mechanism
    • B41J29/393Devices for controlling or analysing the entire machine ; Controlling or analysing mechanical parameters involving printing of test patterns
    • B41J2029/3937Wireless communication between the printer and the cartridge, carriage or printhead
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1279Controller construction, e.g. aspects of the interface hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping

Definitions

  • the invention relates to the technical field of chip communication, in particular to a consumable chip and a consumable chip communication method.
  • consumables generally use chips as the media for consumable information and usage, and the cipher text data of the verification password algorithm between the consumable chip and the printer is stored in the non-volatile storage unit of the consumable chip.
  • the printer When the printer is turned on, the printer will send the index byte and key of the verification password algorithm to the consumable chip.
  • the consumable chip After the consumable chip receives the index byte and key, it decrypts the cipher text data of the verification cryptographic algorithm into plain text code according to the index byte and the key, and the MCU core runs the plain text code of the verification cryptographic algorithm to calculate the sum Modify the verification password between the consumable chip and the printer.
  • the MCU core compatible with consumables cannot run the plaintext code of the decrypted verification password algorithm. Therefore, the general consumables can only support the decrypted verification password algorithm. For the newly decrypted verification password algorithm after the printer firmware is upgraded, the general consumables cannot support, resulting in poor product resistance to upgrade.
  • the invention patent application CN106626792A discloses a chip authentication method, a system, a printer, a consumable chip and a consumable box, and specifically discloses a chip authentication method, which is executed on the printer, and the method includes: sending an authentication instruction to the consumable chip, the authentication The instruction includes a designated code, the designated code is compiled according to the program compilation format of the authentication consumable chip; receiving the running result returned by the consumable chip after running according to the authentication instruction; determining the consumable according to the running result Whether the chip is a certified consumable chip.
  • the consumable chip used in the invention is a single core, and is used to solve the problem of security loopholes in the printer's authentication method for the consumable chip in the prior art, and does not solve the problem of poor upgrade resistance of the consumable chip.
  • the present invention proposes a consumable chip and a consumable chip communication method that solves the problem of the anti-upgrade capability of the consumable chip.
  • the present invention provides a consumable chip, including a first consumable MCU unit, a second consumable MCU unit, and a verification cryptographic operation unit; when the first consumable MCU unit is not compatible with the printer, the first consumable MCU unit starts the first consumable MCU unit.
  • the second consumable MCU unit executes the second consumable chip core processing flow; the second consumable MCU unit executes the verification password algorithm function program of the verification password operation unit, and stores the new verification password obtained by calculation in the verification password Operation unit; when the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the first consumable MCU unit reads the new verification of the verification cryptographic arithmetic unit The password is sent to the printer; the new verification password can be received by the printer to achieve compatibility between the first consumable MCU unit and the printer.
  • the verification cryptographic operation unit includes:
  • Algorithm code storage subunit used to store the plaintext data of the verification algorithm after decryption
  • Data storage subunit used to store the new verification password and the old verification password
  • the second consumable MCU unit executes the verification password algorithm function program of the algorithm code storage subunit according to the plaintext data of the verification algorithm, and the new verification password obtained by calculation is stored in the data storage subunit.
  • the consumable chip further includes: a storage unit for storing the verification algorithm ciphertext data; after the first consumable MCU unit receives the index byte and key sent by the printer, it finds the verification algorithm secret through the index byte The data is decrypted according to the key and sent to the verification cryptographic operation unit; the second consumable MCU unit executes the verification cryptographic algorithm function program according to the verification algorithm plaintext data.
  • the consumable chip also includes:
  • Storage unit used to store the startup code
  • the startup code of the storage unit is copied to the startup code storage unit after the consumable chip is powered on.
  • the first consumable MCU unit includes:
  • the execution sub-unit is used to interact with the printer and start the second consumable MCU unit when the printer is not compatible; and after the detection sub-unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, read the Verify the new verification password of the cryptographic operation unit, turn off the second consumable MCU unit, and then send the new verification password to the printer;
  • the detection sub-unit is configured to confirm that the second consumable MCU unit completes the second consumable chip core processing flow when the completion flag of the second consumable MCU unit completing the second consumable chip core processing flow is inquired.
  • the first consumable MCU unit further includes a flag clearing subunit, which is used to complete the second consumable chip core processing procedure of the previous second consumable MCU unit before the execution subunit starts the second consumable MCU unit The flag is cleared.
  • a flag clearing subunit which is used to complete the second consumable chip core processing procedure of the previous second consumable MCU unit before the execution subunit starts the second consumable MCU unit The flag is cleared.
  • the first consumable MCU unit further includes a judging subunit for judging whether the index byte corresponds to the tag value of the first generation chip. If so, the second consumable MCU unit is not activated. The first consumable MCU unit and the printer Compatible; otherwise, the execution subunit activates the second consumable MCU unit.
  • the consumable chip also includes:
  • the storage unit is used to store the cipher text data of the verification algorithm, the startup code, and the old verification password;
  • the first consumable MCU unit When the first consumable MCU unit starts the second consumable MCU unit, the first consumable MCU unit copies the startup code of the storage unit to the startup code storage unit after the consumable chip is powered on, and the first consumable The MCU unit sends the old verification password to the verification password operation unit;
  • the first consumable MCU unit After the first consumable MCU unit receives the index byte and the key sent by the printer, it finds the ciphertext data of the verification algorithm through the index byte, decrypts it according to the key and sends it to the verification cryptographic operation unit; The second consumable MCU unit executes the verification password algorithm function program according to the plaintext data of the verification algorithm.
  • a consumable chip communication method for consumable chips including a first consumable MCU unit, a verification cryptographic operation unit, and a second consumable MCU unit; the method includes:
  • the first consumable MCU unit When the first consumable MCU unit is not compatible with the printer, the first consumable MCU unit starts the second consumable MCU unit to execute the second consumable chip core processing flow, the verification cryptographic algorithm function program of the verification cryptographic operation unit is called to calculate the new calibration Password verification
  • the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the first consumable MCU unit reads the new verification password and sends it to the printer, and the new verification password can be used by the printer Receive to achieve compatibility between the first consumable MCU unit and the printer.
  • the consumable chip further includes a storage unit; the method further includes: before the first consumable MCU unit starts the second consumable MCU unit, the first consumable MCU unit receives the index bytes sent by the printer and After the key, the ciphertext data of the verification algorithm is searched in the storage unit through the index byte, and decrypted according to the key and sent to the verification cryptographic operation unit; the second consumable MCU unit plaintext data according to the verification algorithm Execute the verification password algorithm function program of the verification password operation unit and calculate a new verification password.
  • the consumable chip further includes a startup code storage unit and a storage unit; the method further includes: before the first consumable MCU unit starts the second consumable MCU unit, the first consumable MCU unit is on the consumable chip After powering on, the startup code of the storage unit is copied to the startup code storage unit; the startup code storage unit is called after the second consumable MCU unit is activated.
  • the method further includes: confirming that the second consumable MCU unit completes the second consumable chip when the first consumable MCU unit inquires that the second consumable MCU unit completes the completion mark of the second consumable chip core processing flow In the kernel processing flow, after reading the new verification password, the first consumable MCU unit closes the second consumable MCU unit.
  • the method further includes: before the first consumable MCU unit starts the second consumable MCU unit, clearing the completion flag of the second consumable chip core processing flow completed by the previous second consumable MCU unit to zero.
  • the method further includes: before finding the ciphertext data of the verification algorithm through the index byte, the first consumable MCU unit determines whether the index byte corresponds to the initial generation chip mark value, and if so, the second consumable MCU unit is not activated , The first consumable MCU unit is compatible with the printer; otherwise, the second consumable MCU unit is activated.
  • the consumable chip further includes a storage unit and a startup code storage unit; the method further includes:
  • the first consumable MCU unit When the first consumable MCU unit starts the second consumable MCU unit, the first consumable MCU unit copies the startup code of the storage unit to the startup code storage unit after the consumable chip is powered on, and Sending the old verification password of the storage unit to the verification password operation unit;
  • the first consumable MCU unit After the first consumable MCU unit receives the index byte and the key sent by the printer, it finds the ciphertext data of the verification algorithm through the index byte, decrypts it according to the key and sends it to the verification cryptographic operation unit; The second consumable MCU unit executes the verification password algorithm function program of the verification password operation unit according to the verification algorithm plaintext data and calculates a new verification password.
  • the steps for the second consumable MCU unit to execute the second consumable chip core processing flow are specifically as follows:
  • the second consumable MCU unit jumps to the startup code storage unit to run the startup code according to the reset address;
  • the second consumable MCU unit closes all interrupts
  • the second consumable MCU unit calls the verification password algorithm function program in the algorithm code storage subunit and jumps to the algorithm code storage subunit to run;
  • the second consumable MCU unit runs the verification password algorithm function program in the algorithm code storage subunit and jumps back to the startup code storage unit to run;
  • the second consumable MCU unit sets the completion flag for the second consumable MCU unit to complete the second consumable chip core processing flow, and then enters the waiting.
  • the invention provides a consumable chip and a communication method for the consumable chip, which solves the problem of the anti-upgrade capability of the consumable chip and improves the compatibility between the consumable chip and the printer.
  • Figure 1 is a structural block diagram of a consumable chip of the present invention
  • FIG. 2 is a structural block diagram of a first consumable MCU unit in a consumable chip of the present invention
  • FIG. 3 is a structural block diagram of a consumable chip according to an embodiment of the present invention.
  • FIG. 4 is a block diagram of the processing flow of a consumable chip communication method on the side of the first consumable MCU unit of the present invention
  • FIG. 5 is a block diagram of the processing flow of the second consumable MCU unit in FIG. 3;
  • FIG. 6 is a flowchart of an embodiment of a consumable chip communication method processed on the side of the first consumable MCU unit of the present invention
  • FIG. 7 is a block diagram of the processing flow of a consumable chip communication method on the side of the second consumable MCU unit of the present invention.
  • FIG. 8 is a flowchart of a method for communicating with a consumable chip of the present invention in an embodiment of processing on the side of a second consumable MCU unit.
  • the present invention adds a consumable chip core on the basis of the existing consumable chip, and corresponding units, data information, etc. that interact with the two consumable chip cores.
  • the consumable chip of the present invention is a dual-core chip, and the dual-core consumable chip is used to solve the authentication and communication between the consumable chip and the printer in different situations, including the printer firmware not upgraded and the printer firmware upgrade.
  • the present invention provides a consumable chip, which includes a first consumable MCU unit, a second consumable MCU unit, and a verification cryptographic operation unit.
  • the first consumable MCU unit activates the second consumable MCU unit to execute the second consumable chip core processing flow; otherwise, it does not activate.
  • the second consumable MCU unit executes the verification password algorithm function program of the verification password operation unit, and stores the calculated new verification password in the verification password operation unit.
  • the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the first consumable MCU unit reads the new verification password of the verification password operation unit and sends it To the printer.
  • the new verification password can be received by the printer to achieve compatibility between the first consumable MCU unit and the printer.
  • the first consumable MCU unit is the main processor of the consumable chip of the present invention, and it may be an ARM core or an MSP430 core.
  • the first consumable MCU unit is responsible for printer command data processing, including receiving commands and data sent by the printer, such as an on-machine authentication command.
  • the second consumable MCU unit is the coprocessor of the consumable chip of the present invention, which may be an ST23 kernel, and is responsible for executing the verification cryptographic algorithm function program of the verification cryptographic operation unit.
  • the first consumable MCU unit may be a general consumable MCU unit
  • the second consumable MCU unit may be an original consumable MCU unit.
  • the first consumable MCU unit can pass the printer authentication to communicate with it, only the single core of the consumable chip is needed, that is, the first consumable MCU unit works, and the second consumable MCU unit does not need to be activated; when the first consumable MCU unit When the printer cannot be authenticated and compatible with the communication, you need to turn on the dual core of the consumable chip, with the first consumable MCU unit as the main and the second consumable MCU unit as the auxiliary.
  • the second consumable MCU unit is activated to perform the verification
  • the new verification password of the cryptographic operation unit is calculated to obtain the authentication of the printer.
  • the verification cryptographic operation unit includes an algorithm code storage subunit and a data storage subunit.
  • the algorithm code storage subunit is used to store the plaintext data of the verification algorithm after decryption.
  • the data storage subunit is used to store the new verification password and the old verification password.
  • the second consumable MCU unit executes the verification password algorithm function program of the algorithm code storage subunit according to the plaintext data of the verification algorithm, and the new verification password obtained by calculation is stored in the data storage subunit.
  • the second consumable MCU unit executes the verification password algorithm function program of the verification password operation unit based on the plaintext data of the verification algorithm.
  • the plaintext data of the verification algorithm can be obtained by calculation after the second consumable MCU unit is started.
  • the first consumable MCU unit obtains the index byte and key through the printer and sends it to the second consumable MCU unit.
  • the second consumable MCU unit queries the ciphertext data of the verification algorithm according to the index byte, and uses the key to perform It is decrypted into plaintext data of the verification algorithm and stored in the verification cryptographic operation unit.
  • the plaintext data of the verification algorithm may be calculated by the first consumable MCU unit and then sent to the second consumable MCU unit to obtain, and be stored in the verification cryptographic operation unit.
  • the consumable chip further includes a storage unit for storing the ciphertext data of the verification algorithm. Taking the latter embodiment as an example, specifically, after the first consumable MCU unit receives the index byte and key sent by the printer, it finds the ciphertext data of the verification algorithm through the index byte, and decrypts and combines it according to the key. Sent to the verification cryptographic operation unit; the second consumable MCU unit executes the verification cryptographic algorithm function program according to the verification algorithm plaintext data.
  • the storage unit may be a volatile storage unit or a non-volatile storage unit, and the storage unit is not limited to one, and there may be multiple storage units.
  • the second consumable MCU unit executes the startup program.
  • the startup code is provided by the first consumable MCU unit, and when it is sent to the second consumable MCU unit, once the second consumable MCU unit receives the startup sent by the first consumable MCU When instructed, it runs according to the startup code sent.
  • the consumable chip further includes a startup code storage unit and a storage unit. The storage unit is used to store the startup code.
  • the storage unit may be a volatile storage unit or a non-volatile storage unit, and the storage unit is not limited to one, and there may be multiple storage units.
  • the old verification password may be stored in the verification password operation unit.
  • the old verification password can be left over from the previous operation; when the old verification password is before the first new verification password operation, it can be pre-stored in the verification password operation unit as the initial value of the verification password.
  • the first consumable MCU unit can be sent to the verification cryptographic operation unit before starting the second consumable MCU unit.
  • the storage unit of the consumable chip also stores the old verification password; before storing the new verification password in the verification password operation unit, the The first consumable MCU unit sends the old verification password to the verification password operation unit.
  • the storage unit may be a volatile storage unit or a non-volatile storage unit, and the storage unit is not limited to one, and there may be multiple storage units.
  • the first consumable MCU unit includes an execution subunit and a detection subunit.
  • the execution subunit is used to interact with the printer, and when the printer is not compatible, start the second consumable MCU unit; and after the detection subunit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, it reads all The new verification password of the verification password arithmetic unit is sent to the printer.
  • the detection sub-unit is configured to confirm that the second consumable MCU unit completes the second consumable chip core processing flow when the second consumable MCU unit completes the completion flag of the second consumable chip core processing flow.
  • the completion mark can clarify whether the core processing flow of the second consumable chip is over or not.
  • the second consumable MCU unit can remain activated after being activated. However, this will cause a large power loss in the subsequent communication and interaction between the first consumable MCU unit and the printer, and reduce the first consumable MCU unit and the printer. The efficiency of communication and interaction between the two. To this end, after the detection subunit detects the completion flag and the execution subunit reads the new verification code password, the execution subunit turns off the second consumable MCU unit, and then sends the new verification password to the printer.
  • the second consumable MCU unit has completed the calculation of the new check code, that is, after the auxiliary operation when the first consumable MCU unit is incompatible with the printer, the second consumable MCU unit has no meaning to be turned on, so turn it off, leaving only
  • the first consumable MCU unit single core authenticates and communicates with the printer, speeding up communication efficiency.
  • the verification cryptographic operation unit also stops working.
  • the first consumable MCU unit further includes a flag reset subunit. Before the execution subunit starts the second consumable MCU unit, clear the completion flag of the previous second consumable MCU unit to complete the second consumable chip core processing flow. After the second consumable MCU unit was started up for use last time, the mark is non-zero, and it is cleared before starting up again. After the second consumable MCU unit is turned on and the second chip core processing procedure is executed, the flag changes to non-zero. When the first consumable MCU unit detects that the flag is non-zero, it reads the new verification password from the data storage subunit, and then closes the second consumable MCU unit.
  • the first consumable MCU unit further includes a judging subunit for judging whether the index byte corresponds to the initial generation chip tag value, and if so, the second consumable MCU unit is not activated, and the first consumable MCU unit is compatible with the printer. Otherwise, the execution subunit activates the second consumable MCU unit. Due to the existence of the judging sub-unit, it can be judged before starting the second consumable MCU unit.
  • the printer authentication and communication can be adapted, there is no need to start the second consumable MCU unit to execute the second consumable chip core processing flow, as long as the first The consumable MCU unit is sufficient, and the verification password stored on the first consumable MCU unit or the new verification password directly calculated by the first consumable MCU unit can be directly sent to the printer to quickly enter the authentication and interactive communication.
  • This process is equivalent to enabling the dual-core or single-core judgment process, which helps the system to optimize operation.
  • the tag value of the first generation chip is 0, if the index byte value is equal to 0, the first consumable MCU unit sends the verification password to the printer; if the index byte value is not equal to 0, the dual core is activated and the second consumable The MCU unit calculates the new verification code, and the first consumable MCU unit sends the new verification code to the printer.
  • the mark value of the first-generation chip is not limited to 0, and the mark value of the first-generation chip can be understood not only as the first-generation chip, but also as the general-purpose chip before the printer firmware is upgraded.
  • the first consumable MCU unit Whether the first consumable MCU unit is compatible with the printer, in addition to judging whether the index byte corresponds to the mark value of the first generation chip, other methods can also be used. For example, in one embodiment, through the first consumable MCU unit Look up the ciphertext data of the verification algorithm. If the ciphertext data of the verification algorithm after the printer firmware upgrade is not found, it is considered incompatible, and the subsequent compatibility authentication needs to be performed through the verification algorithm ciphertext data stored in the second consumable MCU unit; In another embodiment, the first consumable MCU unit and the printer directly perform existing communication authentication. Once the authentication fails, it is incompatible. In this case, the second consumable MCU unit replaces the first consumable MCU unit for subsequent authentication communication.
  • Figure 2 shows a specific implementation of a consumable chip of the present invention, including a first consumable MCU unit, a storage unit, a verification cryptographic operation unit (including an algorithm code storage subunit and a data storage subunit), and a startup code storage unit , The second consumable MCU unit, communication unit.
  • the storage unit copies the startup code to the startup code storage unit after the consumable chip is powered on, and the first consumable MCU unit verifies the old
  • the password is sent to the verification password operation unit.
  • the cryptographic operation unit and the second consumable MCU unit will be verified. The parameters are sent to the corresponding location. Once the second consumable MCU unit is started, it can immediately execute the startup program and calculate the new verification password.
  • the first consumable MCU unit After the first consumable MCU unit receives the index byte and the key sent by the printer, it finds the ciphertext data of the verification algorithm through the index byte, decrypts it according to the key and sends it to the verification cryptographic operation unit; The second consumable MCU unit executes the verification password algorithm function program according to the plaintext data of the verification algorithm.
  • the storage unit may be a non-volatile storage unit or a volatile storage unit.
  • the storage unit is not limited to one, and there may be multiple.
  • the non-volatile storage unit may be FLASH or EEPROM, which is used to store consumable software programs, verification algorithm ciphertext data, and startup codes, such as BOOT codes.
  • the volatile storage unit is SRAM, which is used to store temporary data generated during the operation of the first consumable MCU unit and the communication unit.
  • the storage unit is also used to store the old verification password, and when the printer firmware is not upgraded, the old verification password is used for authentication between the consumable chip and the printer.
  • the communication unit may be an I2C communication module or a single-wire communication module, which is responsible for sending and receiving printer command data.
  • the first consumable MCU unit is the main processor of the consumable chip of the present invention.
  • the first consumable MCU unit is responsible for printer command data processing, including receiving commands and data sent by the printer, such as an on-machine authentication command.
  • the first consumable MCU unit can decrypt the verification algorithm ciphertext data in the storage unit, and write the decrypted verification algorithm plaintext data into the algorithm code storage subunit.
  • the first consumable MCU unit may also write the startup code stored in the storage unit into the startup code storage unit.
  • the first consumable MCU unit can also perform read and write processing on the data storage subunit.
  • the first consumable MCU unit can also start/stop the second consumable MCU unit.
  • the boot code storage unit may be a boot code RAM unit, such as a BOOT code RAM unit, such as SRAM, which is used to store the boot code of the second consumable MCU unit.
  • a boot code RAM unit such as a BOOT code RAM unit, such as SRAM, which is used to store the boot code of the second consumable MCU unit.
  • the second consumable MCU unit is the coprocessor of the consumable chip of the present invention, which is responsible for executing the programs of the startup code storage unit and the verification cryptographic operation unit, and stores the new verification password obtained by calculation in the verification cryptographic calculation unit in.
  • the verification cryptographic operation unit includes an algorithm code storage subunit and a data storage subunit.
  • the algorithm code storage subunit may be an algorithm code RAM unit, such as SRAM, for storing the plaintext data of the verification algorithm after decryption.
  • the data storage subunit may be a data RAM unit, such as SRAM, which is used to store a new verification password and an old verification password. When the new verification password is stored, it will overwrite the old verification password stored in it. Or, after the new verification password is saved, the old and new verification passwords coexist, and the new verification password is the first choice for calling.
  • the first consumable MCU unit calls and runs the consumable software program, first copies the startup code in the storage unit to the startup code storage unit, and then waits for the printer to send commands and data.
  • the first consumable MCU unit After the consumable chip receives the index byte and the key sent by the printer, the first consumable MCU unit first finds the corresponding check algorithm ciphertext data in the storage unit according to the index byte.
  • the verification algorithm ciphertext data is stored in the form of a verification algorithm ciphertext data table, and a number of verification algorithm ciphertext data identified by index bytes are stored.
  • the check algorithm ciphertext data table is queried according to the index byte to obtain the corresponding check algorithm ciphertext data.
  • the first consumable MCU unit decrypts the verification algorithm ciphertext data into verification algorithm plaintext data according to the key and writes the verification algorithm plaintext data into the algorithm code storage subunit, and then writes the old verification password Go to the data storage sub-unit, and finally start the second consumable MCU unit.
  • the first consumable MCU unit queries the second consumable MCU unit to complete the second consumable chip core processing flow after startup, reads the new verification password in the data storage subunit, and turns off the second consumable MCU unit after the The new verification code is sent to the printer.
  • the consumable software program includes the software program of the first consumable MCU unit, and the process completed by the first consumable MCU unit is a part of the software program of the first consumable MCU unit (see FIG. 6).
  • the first consumable MCU unit includes an execution subunit and a detection subunit.
  • the execution subunit is used to copy the startup code, decrypt the ciphertext data of the verification algorithm, and start the second consumable MCU after sending the plaintext data of the verification algorithm to the algorithm code storage subunit and the old verification password to the data storage subunit
  • the detection sub-unit queries the second consumable MCU unit to complete the second consumable chip core processing flow
  • the sub-unit executes the sub-unit to close the second consumable MCU unit, and sends a new verification password to the printer.
  • the detection sub-unit is configured to confirm that the second consumable MCU unit completes the second consumable chip core processing flow when the second consumable MCU unit completes the completion flag of the second consumable chip core processing flow.
  • the execution sub-unit reads the new verification password and turns off the second consumable MCU unit.
  • the first consumable MCU unit also includes a flag clearing subunit, which is used to complete the second consumable chip core processing flow of the previous second consumable MCU unit before the execution subunit starts the second consumable MCU unit
  • the completion flag is cleared. After the second consumable MCU unit was started up for use last time, the mark is non-zero, and it is cleared before starting up again. After the second consumable MCU unit is turned on and the second chip core processing procedure is executed, the flag changes to non-zero.
  • the first consumable MCU unit detects that the flag is non-zero, it reads the new verification password from the data storage subunit, and then closes the second consumable MCU unit.
  • the first consumable MCU unit also includes a judging subunit for judging whether the index byte corresponds to the tag value of the first generation chip. If so, the second consumable MCU unit is not activated and the old verification password in the storage unit is sent To the printer; otherwise, the execution subunit decrypts the verification algorithm ciphertext data, and starts the second consumable MCU unit after sending the verification algorithm plaintext data to the algorithm code storage subunit and the old verification password to the data storage subunit; After the detection subunit queries the second consumable MCU unit to complete the second consumable chip core processing flow, the execution subunit closes the second consumable MCU unit and sends a new verification password to the printer.
  • the judging sub-unit Due to the existence of the judging sub-unit, it can be judged before starting the second consumable MCU unit.
  • the printer authentication and communication can be adapted, there is no need to start the second consumable MCU unit to execute the second consumable chip core processing flow, as long as the first
  • the consumable MCU unit can be used to directly send the old verification password to the printer, and then the authentication and interactive communication can be quickly entered. This process is equivalent to enabling the dual-core or single-core judgment process, which helps the system to optimize operation.
  • the tag value of the first generation chip is 0, if the index byte value is equal to 0, the first consumable MCU unit sends the old verification password to the printer; if the index byte value is not equal to 0, the dual core is activated, and the second The consumable MCU unit calculates the new verification password, and the first consumable MCU unit sends the new verification password to the printer.
  • the mark value of the first-generation chip is not limited to 0, and the mark value of the first-generation chip can be understood not only as the first-generation chip, but also as the general-purpose chip before the printer firmware is upgraded.
  • the second consumable MCU unit executes the second consumable chip core processing flow: the second consumable MCU unit first runs the startup code in the startup code storage unit, and then jumps to the algorithm code storage subunit To run the verification password algorithm function program. After the verification password algorithm function program runs, the new verification password is written into the data storage subunit, and the second consumable MCU unit jumps back to the startup code storage unit and sets the second consumable MCU unit processing completion flag.
  • the consumable software program further includes a software program of the second consumable MCU unit, and the process completed by the second consumable MCU unit is the software program of the second consumable MCU unit (see FIG. 5).
  • the first consumable MCU unit After the first consumable MCU unit detects that the second consumable MCU unit completes the completion flag of the second consumable chip core processing flow, it first reads the new verification password from the data storage subunit, and then sends the new verification password to the printer.
  • the above-mentioned process completed by the first consumable MCU unit is also a part of the software program of the first consumable MCU unit (see FIG. 6).
  • Fig. 4 shows a communication method of a consumable chip of the present invention. Used for the consumable chip including the first consumable MCU unit, the verification cryptographic operation unit, and the second consumable MCU unit; the method includes:
  • Step S1 When the first consumable MCU unit is not compatible with the printer, the first consumable MCU unit starts the second consumable MCU unit to execute the second consumable chip core processing flow, and the verification cryptographic algorithm function program of the verification cryptographic operation unit is called and Calculate the new verification password.
  • the first consumable MCU unit when the first consumable MCU unit is compatible with the printer, there is no need to perform step S2, and the first consumable MCU unit directly performs existing authentication and interactive communication with the printer.
  • Step S2 After the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the first consumable MCU unit reads the new verification password and sends it to the printer.
  • the new verification password It can be received by the printer to achieve compatibility between the first consumable MCU unit and the printer.
  • the second consumable MCU unit executes the verification cipher algorithm function program of the verification cipher operation unit based on the plaintext data of the verification algorithm, and the plaintext data of the verification algorithm is obtained in the following manner:
  • the The plaintext data of the verification algorithm can be calculated after the second consumable MCU unit is started.
  • the first consumable MCU unit obtains the index byte and key through the printer and sends it to the second consumable MCU unit.
  • the second consumable MCU unit queries the ciphertext data of the verification algorithm according to the index byte, and uses the key to perform It is decrypted into plaintext data of the verification algorithm and stored in the verification cryptographic operation unit.
  • the method of the present invention further includes the step of obtaining the plaintext data of the verification algorithm, which can obtain the plaintext data of the verification algorithm according to the existing consumable MCU unit and printer authentication method, that is, using the key to decrypt the ciphertext data of the verification algorithm.
  • the plaintext data of the verification algorithm may be calculated by the first consumable MCU unit and then sent to the second consumable MCU unit to obtain and be stored in the verification cryptographic operation unit.
  • the consumable chip further includes a storage unit for storing the plaintext data of the verification algorithm obtained in the above manner.
  • the method further includes: before the first consumable MCU unit starts the second consumable MCU unit, the first consumable MCU unit receives the index byte and the key sent by the printer Then, the ciphertext data of the verification algorithm is found through the index byte, and it is decrypted according to the key and sent to the verification cryptographic operation unit.
  • the subsequent steps are executed as described in S1-S2, that is, after that, the second consumable MCU unit executes the verification cryptographic algorithm function program of the verification cryptographic operation unit according to the verification algorithm plaintext data And calculate the new verification password.
  • the second consumable MCU unit executes the startup program.
  • the startup code is provided by the first consumable MCU unit.
  • the consumable chip further includes a startup code storage unit and a storage unit; the method further includes: before the first consumable MCU unit starts the second consumable MCU unit, the startup code of the storage unit is turned on after the consumable chip is powered on Is copied to the boot code storage unit; the boot code storage unit is called after the second consumable MCU unit is activated.
  • the old verification password may be stored in the verification password operation unit.
  • the old verification password can be left over from the previous operation; when the old verification password is before the first new verification password operation, it can be pre-stored in the verification password operation unit as the initial value of the verification password.
  • the first consumable MCU unit can be sent to the verification cryptographic operation unit before starting the second consumable MCU unit.
  • the storage unit of the consumable chip also stores the old verification password.
  • the first consumable MCU unit sends the old verification password to the verification password operation unit.
  • the steps of the first consumable MCU unit inquiring that the second consumable MCU unit completes the second consumable chip core processing flow are specifically as follows: the first consumable MCU unit inquiring about the second consumable MCU unit completing the second consumable
  • the completion flag of the chip core processing flow is indicated, it is confirmed that the second consumable MCU unit has completed the second consumable chip core processing flow. If the completion flag is not set, it is impossible to clearly and promptly confirm whether the second consumable MCU unit has completed the second consumable chip core processing flow.
  • the completion flag can be a flag. When it is not completed, the flag is equal to 0, and when it is completed, it is equal to 1.
  • the completion flag can also be an end parameter or feedback instruction after the program execution ends. When the first consumable MCU unit determines that the feedback instruction or parameter is a predetermined completion flag, it confirms that the second consumable chip core processing flow is completed.
  • the second consumable MCU unit can remain activated after being activated. However, this will cause a large power loss in the subsequent communication and interaction between the first consumable MCU unit and the printer, and reduce the first consumable MCU unit and the printer.
  • the efficiency of communication and interaction between the two further includes: when the first consumable MCU unit inquires that the second consumable MCU unit completes the second consumable chip core processing flow and reads the new verification password, the first consumable MCU unit closes the second consumable MCU unit Two consumables MCU unit.
  • the previous second consumable MCU unit completes the second consumable chip core processing flow
  • the completion flag is cleared. It can be realized by the above flag clearing subunit.
  • the method of the present invention further includes: before finding the ciphertext data of the verification algorithm through the index byte, The first consumable MCU unit judges whether the index byte corresponds to the first-generation chip tag value, and if so, the second consumable MCU unit is not activated, and the first consumable MCU unit is compatible with the printer; otherwise, the second consumable MCU unit is activated, For example, assuming that the tag value of the first generation chip is 0, if the index byte value is equal to 0, the first consumable MCU unit sends the verification password to the printer; if the index byte value is not equal to 0, the dual core is activated and the second consumable The MCU unit calculates the new verification code, and the first consumable MCU unit sends the new verification code to the printer.
  • the mark value of the first-generation chip is not limited to 0, and the mark value of the first-generation chip can be understood not only as the first-generation chip, but also as the general-purpose chip before the printer firmware is upgraded.
  • the latter understands that the chips of earlier generations are generally eliminated and used for many years without production, so that consumable chips do not need to record the data of earlier generation chips, such as the old verification password of earlier generation chips, which can facilitate the improvement of consumable chips. The efficiency of interaction with the printer communication system.
  • the first consumable MCU unit Whether the first consumable MCU unit is compatible with the printer, in addition to judging whether the index byte corresponds to the mark value of the first generation chip, other methods can also be used. For example, in one embodiment, through the first consumable MCU unit Look up the ciphertext data of the verification algorithm. If the ciphertext data of the verification algorithm after the printer firmware upgrade is not found, it is considered incompatible, and the subsequent compatibility authentication needs to be performed through the verification algorithm ciphertext data stored in the second consumable MCU unit; In another embodiment, the first consumable MCU unit and the printer directly perform existing communication authentication. Once the authentication fails, it is incompatible. In this case, the second consumable MCU unit replaces the first consumable MCU unit for subsequent authentication communication.
  • Figure 6 shows a specific implementation of a consumable chip communication method of the present invention.
  • the method is used for consumable chips including a first consumable MCU unit, a storage unit, a startup code storage unit, a verification cryptographic operation unit, and a second consumable MCU unit.
  • the verification cryptographic operation unit includes an algorithm code storage subunit and a data storage subunit. This method specifically relies on the example implementation of the consumable chip shown in FIG. 3.
  • Methods include:
  • Step S01 the first consumable MCU unit copies the startup code stored in the storage unit to the startup code storage unit;
  • Step S02 after receiving the index byte and key sent by the printer, the first consumable MCU unit decrypts the verification algorithm ciphertext data in the storage unit and writes it into the algorithm code storage subunit;
  • the MCU unit of the first consumable will wait for the command until it receives the command and executes the following steps.
  • Step S03 the first consumable MCU unit writes the old verification password stored in the storage unit into the data storage subunit;
  • Step S04 the first consumable MCU unit starts the second consumable MCU unit to execute the second consumable chip core processing flow
  • Step S05 the first consumable MCU unit queries the second consumable MCU unit after completing the second consumable chip core processing flow, reads the new verification password of the data storage sub-unit and closes the second consumable MCU unit;
  • Step S06 the first consumable MCU unit sends the new verification password to the printer
  • the new verification password of the data storage subunit is in the process of executing the second consumable chip core processing by the second consumable MCU unit, and the second consumable MCU unit executes the verification password algorithm function in the algorithm code storage subunit
  • the program writes the calculated new check code into the data storage subunit.
  • the method further includes: adding a dual-core or single-core system selection judgment process at step S02.
  • the printer After receiving the index byte and key sent by the printer, it is judged whether the index byte corresponds to the mark value of the first generation chip. If so, the second consumable MCU unit is not started, and the first consumable MCU unit sends the old consumables stored in the storage unit.
  • the verification password is given to the printer, and the method ends; otherwise, the first consumable MCU unit decrypts the verification algorithm ciphertext data in the storage unit and writes it into the algorithm code storage subunit, and continues to perform steps S03-S06 until the end.
  • the tag value of the first generation chip is 0, if the index byte value is equal to 0, the first consumable MCU unit sends the old verification password to the printer; if the index byte value is not equal to 0, the dual core is activated, and the second The consumable MCU unit calculates the new verification password, and the first consumable MCU unit sends the new verification password to the printer.
  • the mark value of the first-generation chip is not limited to 0, and the mark value of the first-generation chip can be understood not only as the first-generation chip, but also as the general-purpose chip before the printer firmware is upgraded.
  • the first consumable MCU unit querying the second consumable MCU unit to complete the second consumable chip core processing flow is specifically as follows: when the first consumable MCU unit queries the second consumable MCU unit to complete the completion flag of the second consumable chip core processing flow, Confirm that the second MCU unit completes the core processing flow of the second consumable chip.
  • the consumable chip communication method further includes: adding a completion flag clearing step before step S04.
  • the completion flag of the previous second consumable MCU unit completing the second consumable chip core processing procedure is cleared.
  • the mark is non-zero, and it is cleared before starting up again.
  • the second consumable MCU unit is turned on and the second chip core processing procedure is executed, the flag changes to non-zero.
  • the first consumable MCU unit detects that the flag is non-zero, it reads the new verification password from the data storage subunit, and then closes the second consumable MCU unit.
  • the operation of turning off the second consumable MCU unit actually switches the dual-core to a single-core, and the first consumable MCU unit is the master during subsequent communication and interaction with the printer, which improves the communication efficiency.
  • the second consumable MCU unit executes the second consumable chip core processing flow specifically as follows:
  • Step S41 the second consumable MCU unit jumps to the startup code storage unit to run the startup code according to the reset address;
  • Step S42 the second consumable MCU unit closes all interrupts
  • Step S43 the second consumable MCU unit calls the verification password algorithm function program in the algorithm code storage subunit and jumps to the algorithm code storage subunit to run;
  • Step S44 the second consumable MCU unit runs the verification password algorithm function program in the algorithm code storage subunit and jumps back to the startup code storage unit to run;
  • step S45 the second consumable MCU unit sets a completion flag for the second consumable MCU unit to complete the processing procedure of the second consumable chip core, and then enters waiting.
  • the present invention also proposes a consumable chip communication method, as shown in Figure 7.
  • the method is used for a consumable chip including a first consumable MCU unit, a verification cryptographic operation unit, and a second consumable MCU unit; the method includes:
  • Step S1' when the second consumable MCU unit receives a signal that the first consumable MCU unit is incompatible with the printer, it starts and executes the second consumable chip core processing flow;
  • Step S2' the second consumable MCU unit executes the verification password algorithm function program of the verification password operation unit, and stores the calculated new verification password in the verification password operation unit;
  • Step S3' after the first consumable MCU unit inquires that the second consumable MCU unit has completed the second consumable chip core processing flow, the new verification password is read by the first consumable MCU unit and sent to The printer, the new verification password can be received by the printer to achieve compatibility between the first consumable MCU unit and the printer.
  • the verification cryptographic operation unit includes an algorithm code storage subunit and a data storage subunit; the second consumable MCU unit executes the verification cryptographic algorithm function program of the verification cryptographic operation unit, and calculates the new verification
  • the step of storing the password in the verification password operation unit is specifically as follows: the second consumable MCU unit executes the verification password algorithm function program of the algorithm code storage subunit according to the plaintext data of the verification algorithm, and the new verification password is calculated Stored in the data storage subunit.
  • the second consumable MCU unit executes the startup program.
  • the startup code is provided by the first consumable MCU unit, and the consumable chip further includes a startup code storage unit and a storage unit; the method further includes: when the second consumable MCU Before the unit is started, the startup code of the storage unit is copied to the startup code storage unit after the consumable chip is powered on; the startup code storage unit is called after the second consumable MCU unit is started.
  • the method further includes: when the first consumable MCU unit inquires that the second consumable MCU unit completes the second consumable chip core processing flow and reads the new verification password, the second consumable MCU unit receives The first consumable MCU unit closes the instruction and closes.
  • the method further includes: before the second consumable MCU unit is started, clearing the completion flag of the previous second consumable MCU unit to complete the second consumable chip core processing flow.
  • FIG. 8 is a specific implementation implemented according to the example of the consumable chip shown in FIG. 3.
  • the method of the present invention includes:
  • Step S10 when the second consumable MCU unit receives a signal that the first consumable MCU unit is incompatible with the printer, it starts and executes the second consumable chip core processing flow;
  • Step S20 the second consumable MCU unit executes the startup code program of the startup code storage unit and the check password algorithm function program of the algorithm code storage subunit, and stores the calculated new check password in the data storage subunit ;
  • Step S30 after the second consumable MCU unit completes the second consumable chip core processing flow, the completion flag is set and fed back to the first consumable MCU unit, so that the first consumable MCU unit reads the new verification password stored in the data storage subunit , The new verification password can be received by the printer to achieve compatibility between the first consumable MCU unit and the printer.
  • the signal that the first consumable MCU unit and the printer are not compatible is determined by determining whether the index byte corresponds to the mark value of the first generation chip in one embodiment, if it corresponds, it is compatible, if it does not correspond, it is not compatible; In one embodiment, by searching the ciphertext data of the verification algorithm in the first consumable MCU unit, if the ciphertext data of the verification algorithm after the printer firmware upgrade is not found, it is considered incompatible, and the second consumable MCU unit is required
  • the stored verification algorithm ciphertext data is subjected to subsequent compatibility authentication; in another embodiment, the first consumable MCU unit and the printer directly perform existing communication authentication. Once the authentication fails, it is incompatible. At this time, the second consumable MCU The unit replaces the first consumable MCU unit for authentication communication.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Control Or Security For Electrophotography (AREA)

Abstract

提供了一种耗材芯片及耗材芯片通信方法。耗材芯片包括第一耗材MCU单元、校验密码运算单元、第二耗材MCU单元。方法包括:当第一耗材MCU单元与打印机无法兼容时,第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程,校验密码运算单元的校验密码算法函数程序被调用而计算新校验密码(S1);当第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,第一耗材MCU单元读取新校验密码并发送给打印机,新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容(S2)。解决了耗材芯片抗升级能力的问题,提高了耗材芯片与打印机的兼容性。

Description

一种耗材芯片、耗材芯片通信方法 技术领域
本发明涉及芯片通信技术领域,尤其涉及一种耗材芯片、耗材芯片通信方法。
背景技术
目前耗材普遍使用了芯片作为耗材的信息和使用量的介质,耗材芯片与打印机之间校验密码算法的密文数据存于耗材芯片非易失性存储单元中。当打印机开机时,打印机会向耗材芯片发送校验密码算法的索引字节和密钥。耗材芯片收到索引字节和密钥后,会根据索引字节和密钥将校验密码算法的密文数据解密为明文代码并由MCU内核运行校验密码算法的明文代码,以此计算并修改耗材芯片与打印机之间校验密码。
但是,兼容耗材的MCU内核无法运行解密后的校验密码算法的明文代码。因此,通用耗材只能支持已解密的校验密码算法,对于打印机固件升级后新解密的校验密码算法,通用耗材无法支持,造成产品抗升级能力差。
发明专利申请CN106626792A公开了芯片认证方法、系统、打印机、耗材芯片和耗材盒,并具体公开了一种芯片认证方法,执行于打印机上,所述方法包括:发送认证指令给耗材芯片,所述认证指令包括指定代码,所述指定代码是按照认证耗材芯片的程序编译格式进行编译的;接收所述耗材芯片返回的根据所述认证指令运行后的运行结果;根据所述运行结果,确定所述耗材芯片是否为认证耗材芯片。该发明所采用的耗材芯片为单核,并用来解决现有技术中打印机对耗材芯片的认证方法存在安全性漏洞的问题,并未解决耗材芯片抗升级能力差的问题。
技术问题
本发明针对现有技术存在的问题,提出了一种解决耗材芯片抗升级能力问题的耗材芯片、耗材芯片通信方法。
技术解决方案
本发明是通过以下技术方案得以实现的:
本发明提供一种耗材芯片,包括第一耗材MCU单元、第二耗材MCU单元、校验密码运算单元;当所述第一耗材MCU单元与打印机无法兼容时,所述第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程;所述第二耗材MCU单元执行所述校验密码运算单元的校验密码算法函数程序,并将计算得到的新校验密码存储于校验密码运算单元;当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,所述第一耗材MCU单元读取所述校验密码运算单元的新校验密码并发送给打印机;所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
作为优选,所述校验密码运算单元包括:
算法代码存储子单元,用于存储解密后校验算法明文数据;
数据存储子单元,用于存储新校验密码、旧校验密码;
所述第二耗材MCU单元根据校验算法明文数据,执行所述算法代码存储子单元的校验密码算法函数程序,计算得到的新校验密码存储于所述数据存储子单元。
作为优选,耗材芯片还包括:存储单元,用于存储校验算法密文数据;所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据,执行所述校验密码算法函数程序。
作为优选,耗材芯片还包括:
启动代码存储单元;
存储单元,用于存储启动代码;
当所述第一耗材MCU单元启动第二耗材MCU单元前,所述存储单元的启动代码在耗材芯片上电后被复制到所述启动代码存储单元中。
作为优选,所述第一耗材MCU单元包括:
执行子单元,用于与打印机交互,在与打印机无法兼容时,启动第二耗材MCU单元;并在检测子单元查询到第二耗材MCU单元完成第二耗材芯片内核处理流程后,读取所述校验密码运算单元的新校验密码,关闭所述第二耗材MCU单元,之后发送新校验密码给打印机;
检测子单元,用于在查询到第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认第二耗材MCU单元完成第二耗材芯片内核处理流程。
作为优选,所述第一耗材MCU单元还包括标志清零子单元,用于在执行子单元启动第二耗材MCU单元前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。
作为优选,所述第一耗材MCU单元还包括判断子单元,用于判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,所述第一耗材MCU单元与打印机兼容;否则,所述执行子单元启动第二耗材MCU单元。
作为优选,耗材芯片还包括:
存储单元,用于存储校验算法密文数据,启动代码,旧校验密码;
启动代码存储单元;
当所述第一耗材MCU单元启动第二耗材MCU单元前,所述第一耗材MCU单元在耗材芯片上电后将存储单元的启动代码复制到所述启动代码存储单元中,所述第一耗材MCU单元将旧校验密码发送给所述校验密码运算单元;
所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据,执行所述校验密码算法函数程序。
一种耗材芯片通信方法,用于包括第一耗材MCU单元、校验密码运算单元、第二耗材MCU单元的耗材芯片;方法包括:
当第一耗材MCU单元与打印机无法兼容时,第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程,校验密码运算单元的校验密码算法函数程序被调用而计算新校验密码;
当第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,第一耗材MCU单元读取新校验密码并发送给打印机,所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
作为优选,所述耗材芯片还包括存储单元;方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节在存储单元查找校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据执行所述校验密码运算单元的校验密码算法函数程序并计算新校验密码。
作为优选,所述耗材芯片还包括启动代码存储单元、存储单元;方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元在耗材芯片上电后将存储单元的启动代码复制到所述启动代码存储单元中;所述启动代码存储单元在所述第二耗材MCU单元被启动后调用。
作为优选,方法还包括:当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认所述第二耗材MCU单元完成第二耗材芯片内核处理流程,读取新校验密码后,第一耗材MCU单元关闭所述第二耗材MCU单元。
作为优选,方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。
作为优选,方法还包括:在通过索引字节找到校验算法密文数据前,所述第一耗材MCU单元判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,所述第一耗材MCU单元与打印机兼容;否则,启动第二耗材MCU单元。
作为优选,所述耗材芯片还包括存储单元、启动代码存储单元;方法还包括:
当所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元在耗材芯片上电后将所述存储单元的启动代码复制到所述启动代码存储单元中,并将所述存储单元的旧校验密码发送到所述校验密码运算单元;
所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据执行所述校验密码运算单元的校验密码算法函数程序并计算新校验密码。
作为优选,所述第二耗材MCU单元执行第二耗材芯片内核处理流程的步骤具体为:
第二耗材MCU单元根据复位地址跳到启动代码存储单元中运行启动代码;
第二耗材MCU单元关闭所有中断;
第二耗材MCU单元调用算法代码存储子单元中的校验密码算法函数程序并跳转到算法代码存储子单元中运行;
第二耗材MCU单元运行算法代码存储子单元中的校验密码算法函数程序并跳回到启动代码存储单元中运行;
第二耗材MCU单元设置第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志,之后进入等待。
有益效果
本发明一种耗材芯片、耗材芯片通信方法,解决了耗材芯片抗升级能力的问题,提高耗材芯片与打印机的兼容性。
附图说明
图1为本发明一种耗材芯片的结构框图;
图2为本发明一种耗材芯片中第一耗材MCU单元的结构框图;
图3为本发明一种耗材芯片一实施方式下的结构框图;
图4为本发明一种耗材芯片通信方法于第一耗材MCU单元侧处理的流程框图;
图5为图3中第二耗材MCU单元处理的流程框图;
图6为本发明一种耗材芯片通信方法于第一耗材MCU单元侧处理的一实施方式下的流程框图;
图7为本发明一种耗材芯片通信方法于第二耗材MCU单元侧处理的流程框图;
图8为本发明一种耗材芯片通信方法于第二耗材MCU单元侧处理的一实施方式下的流程框图。
本发明的最佳实施方式
以下是本发明的具体实施例并结合附图,对本发明的技术方案作进一步的描述,但本发明并不限于这些实施例。
由于现有单核耗材芯片无法在打印机固件升级后适用,无法与打印机进行认证,进而无法实现正常通信交互。为此,本发明在现有耗材芯片的基础上增加一个耗材芯片内核,及配合上述两个耗材芯片内核进行交互的相应单元、数据信息等。也就是说,本发明耗材芯片为双核芯片,利用双核耗材芯片解决不同情况下的耗材芯片与打印机之间认证、通信,包括打印机固件未升级情况和打印机固件升级情况。
如图1,本发明提供一种耗材芯片,包括第一耗材MCU单元、第二耗材MCU单元和校验密码运算单元。当所述第一耗材MCU单元与打印机无法兼容时,所述第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程,否则,不启动。所述第二耗材MCU单元执行所述校验密码运算单元的校验密码算法函数程序,并将计算得到的新校验密码存储于校验密码运算单元。当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,所述第一耗材MCU单元读取所述校验密码运算单元的新校验密码并发送给打印机。所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
也就是说,所述第一耗材MCU单元为本发明耗材芯片的主处理器,可以是ARM内核,也可以是MSP430内核。所述第一耗材MCU单元负责打印机命令数据处理,包括接收打印机发送的命令和数据,如上机认证命令。而所述第二耗材MCU单元为本发明耗材芯片的协处理器,可以是ST23内核,负责执行所述校验密码运算单元的校验密码算法函数程序。例如,第一耗材MCU单元可以为通用耗材MCU单元,第二耗材MCU单元可以为原装耗材MCU单元。当第一耗材MCU单元能通过打印机认证与之兼容通信时,则只需要耗材芯片的单核,即第一耗材MCU单元工作即可,而第二耗材MCU单元无需启动;当第一耗材MCU单元无法通过打印机认证与之兼容通信时,则需要开启耗材芯片的双核,以第一耗材MCU单元为主,第二耗材MCU单元为辅,在认证时,通过启动第二耗材MCU单元来执行校验密码运算单元的新校验密码计算,以获得打印机的认证通过。
具体地,所述校验密码运算单元包括算法代码存储子单元、数据存储子单元。所述算法代码存储子单元,用于存储解密后校验算法明文数据。所述数据存储子单元,用于存储新校验密码、旧校验密码。所述第二耗材MCU单元根据校验算法明文数据,执行所述算法代码存储子单元的校验密码算法函数程序,计算得到的新校验密码存储于所述数据存储子单元。
其中,所述第二耗材MCU单元执行所述校验密码运算单元的校验密码算法函数程序是依据于校验算法明文数据。在一实施方式下,该校验算法明文数据可通过第二耗材MCU单元启动后计算获得。所述第一耗材MCU单元通过打印机获得索引字节、密钥后将其发送给第二耗材MCU单元,第二耗材MCU单元根据索引字节查询到校验算法密文数据,并利用密钥进行解密为校验算法明文数据,并存储在校验密码运算单元内。在另一实施方式下,该校验算法明文数据可通过第一耗材MCU单元计算后发送至第二耗材MCU单元获得,并存储在校验密码运算单元内。在上述两个实施方式下,所述耗材芯片还包括存储单元,用于存储校验算法密文数据。以后者实施方式为例,具体地,所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据,执行所述校验密码算法函数程序。所述存储单元可以为易失性存储单元或非易失性存储单元,所述存储单元不限于一个,可以有多个。
其中,所述第二耗材MCU单元执行启动程序,在一实施方式下,通过在第二耗材MCU单元内默认设置启动代码,一旦第二耗材MCU单元接收到第一耗材MCU发送的启动指令时,则自动按照启动代码运行;在另一实施方式下,该启动代码由第一耗材MCU单元提供,当发送至第二耗材MCU单元后,一旦第二耗材MCU单元接收到第一耗材MCU发送的启动指令时,则按照发送来的启动代码运行。在后者实施方式下,所述耗材芯片还包括启动代码存储单元、存储单元。所述存储单元用于存储启动代码。当所述第一耗材MCU单元启动第二耗材MCU单元前,所述存储单元的启动代码在耗材芯片上电后被复制到所述启动代码存储单元中。所述存储单元可以为易失性存储单元或非易失性存储单元,所述存储单元不限于一个,可以有多个。
其中,在所述校验密码运算单元的新校验密码生成前,可在校验密码运算单元内存储有旧校验密码。该旧校验密码可以是前一次运算留下的;当旧校验密码是在第一次新校验密码运算前的,可以预先存储在校验密码运算单元内作为校验密码初始值,也可以通过第一耗材MCU单元在准备启动第二耗材MCU单元前发送到校验密码运算单元。在由第一耗材MCU单元发送来的旧校验密码的实施方式下,耗材芯片的存储单元还存储旧校验密码;在将新校验密码存储于所述校验密码运算单元前,所述第一耗材MCU单元将旧校验密码发送给所述校验密码运算单元。所述存储单元可以为易失性存储单元或非易失性存储单元,所述存储单元不限于一个,可以有多个。
具体地,所述第一耗材MCU单元包括执行子单元、检测子单元。所述执行子单元用于与打印机交互,在与打印机无法兼容时,启动第二耗材MCU单元;并在检测子单元查询到第二耗材MCU单元完成第二耗材芯片内核处理流程后,读取所述校验密码运算单元的新校验密码并发送给打印机。所述检测子单元,用于在查询到第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认第二耗材MCU单元完成第二耗材芯片内核处理流程。通过完成标志能明确第二耗材芯片内核处理流程结束与否。
所述第二耗材MCU单元可在被启动后,一直保持启动状态,然则,这对后续第一耗材MCU单元与打印机的通信交互造成很大的功耗损失,并且降低第一耗材MCU单元与打印机两者通信交互效率。为此,在检测子单元检测到完成标志且在执行子单元读取新校验码密码后,所述执行子单元关闭所述第二耗材MCU单元,进而发送新校验密码给打印机。一旦第二耗材MCU单元完成新校验码的运算后,即完成第一耗材MCU单元与打印机不兼容时的辅助运算后,则第二耗材MCU单元也无开启意义,则将其关闭,只留第一耗材MCU单元(单核)与打印机认证、通信,加快了通信效率。并且,一旦第二耗材MCU单元被关闭,校验密码运算单元也停止工作。
为了确保本发明耗材芯片多次使用后仍能不出错,所述第一耗材MCU单元还包括标志清零子单元。在执行子单元启动第二耗材MCU单元前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。第二耗材MCU单元上一次启动使用后,标志为非零,在新一次启动前,清零处理。在第二耗材MCU单元开启后,执行第二芯片内核处理流程后,标志变化为非零。第一耗材MCU单元检测到标志为非零时,从数据存储子单元中读取新校验密码,然后关闭第二耗材MCU单元。
所述第一耗材MCU单元还包括判断子单元,用于判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,所述第一耗材MCU单元与打印机兼容。否则,所述执行子单元启动第二耗材MCU单元。由于判断子单元的存在,可在是否启动第二耗材MCU单元前进行判断,当能够适配打印机认证和通信,无需启动第二耗材MCU单元执行第二耗材芯片内核处理流程,只要用到第一耗材MCU单元即可,直接发送第一耗材MCU单元上已存储的校验密码或直接由第一耗材MCU单元计算的新校验密码给打印机,就能快速进入认证和交互通信。此过程相当于,启用双核或单核的判断过程,有助于系统优化运行。举例说明,假定初代芯片标记值为0,如果索引字节值等于0,则第一耗材MCU单元将校验密码发送给打印机;如果索引字节值不等于0,则启动双核,由第二耗材MCU单元计算新校验密码,并由第一耗材MCU单元将新校验密码发送给打印机。所述初代芯片标记值不限于0,并且初代芯片标记值不仅可以理解成第一代芯片,也可以理解成打印机固件未升级前的通用代芯片。后者理解,一般是在较早代芯片已被淘汰使用很多年且不生产,这样耗材芯片无需记录较早代芯片的数据,如较早代芯片的旧校验密码,这样可便于提高耗材芯片与打印机通信系统的交互效率。
所述第一耗材MCU单元与打印机是否兼容,除了通过判断索引字节是否对应于初代芯片标记值的方式外,还可以通过其他方式,如在一实施方式下,通过在第一耗材MCU单元内查找校验算法密文数据,若未查到打印机固件升级后的校验算法密文数据,则认为不兼容,则需要通过第二耗材MCU单元存储的校验算法密文数据进行后续兼容认证;在另一实施方式下,第一耗材MCU单元与打印机直接进行现有通信认证,一旦认证不通过则为不兼容,此时由第二耗材MCU单元代替第一耗材MCU单元进行后续认证通信。
图2示出了本发明一种耗材芯片的一具体实施方式,包括第一耗材MCU单元、存储单元、校验密码运算单元(包括算法代码存储子单元和数据存储子单元)、启动代码存储单元、第二耗材MCU单元、通信单元。
当所述第一耗材MCU单元启动第二耗材MCU单元前,所述存储单元在耗材芯片上电后将启动代码复制到所述启动代码存储单元中,所述第一耗材MCU单元将旧校验密码发送给所述校验密码运算单元。也就是说,当确定第一耗材MCU单元与打印机不兼容时并准备开启第二耗材MCU单元后,且在启动第二耗材MCU单元前,将校验密码运算单元和第二耗材MCU单元所需的参数发送到相应位置,一旦第二耗材MCU单元启动,就能马上执行启动程序并计算新校验密码。
所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据,执行所述校验密码算法函数程序。
所述存储单元可以是非易失性存储单元,也可以是易失性存储单元。所述存储单元不限于一个,可以有多个。所述非易失性存储单元可以是FLASH,也可以是EEPROM,用于存储耗材软件程序、校验算法密文数据、启动代码,如BOOT代码。所述易失性存储单元是SRAM,用于存储第一耗材MCU单元和通信单元运行时产生的临时数据。所述存储单元还用于存储旧校验密码,在打印机固件未升级的情况下,采用旧校验密码进行作为耗材芯片与打印机之间认证。
所述通信单元可以是I2C通信模块,也可以是单线通信模块,负责发送和接收打印机命令数据。
所述第一耗材MCU单元为本发明耗材芯片的主处理器。所述第一耗材MCU单元负责打印机命令数据处理,包括接收打印机发送的命令和数据,如上机认证命令。所述第一耗材MCU单元可将存储单元中的校验算法密文数据进行解密,并将解密后的校验算法明文数据写入算法代码存储子单元。所述第一耗材MCU单元还可以将存储单元存储的启动代码写入启动代码存储单元中。所述第一耗材MCU单元还可以对数据存储子单元进行读写处理。所述第一耗材MCU单元还可以启动/停止第二耗材MCU单元。
所述启动代码存储单元,可以是启动代码RAM单元,如BOOT代码RAM单元,如SRAM,用于存储第二耗材MCU单元的启动代码。
所述第二耗材MCU单元为本发明耗材芯片的协处理器,负责执行所述启动代码存储单元和校验密码运算单元的程序,并将计算获得的新校验密码存储于校验密码运算单元中。所述校验密码运算单元包括算法代码存储子单元和数据存储子单元。所述算法代码存储子单元可以是算法代码RAM单元,如SRAM,用于存储解密后校验算法明文数据。所述数据存储子单元可以是数据RAM单元,如SRAM,用于存储新校验密码、旧校验密码。当新校验密码存入后,将覆盖存储于内的旧校验密码。或者,新校验密码存入后,新旧校验密码并存,并且新校验密码作为调用的首选。
耗材芯片上电后,第一耗材MCU单元调用并运行耗材软件程序,首先将存储单元中的启动代码复制到所述启动代码存储单元中,然后等待打印机发送命令和数据。
耗材芯片接收到打印机发送的索引字节和密钥后,所述第一耗材MCU单元首先根据索引字节在存储单元中找到对应的校验算法密文数据。其中,所述校验算法密文数据以校验算法密文数据表形式存储,存储有若干以索引字节标识的校验算法密文数据。具体地,根据索引字节查询校验算法密文数据表,获得对应的校验算法密文数据。然后,所述第一耗材MCU单元根据密钥将校验算法密文数据解密为校验算法明文数据并将校验算法明文数据写入到算法代码存储子单元,之后将旧校验密码写入到数据存储子单元,最后启动第二耗材MCU单元。所述第一耗材MCU单元查询所述第二耗材MCU单元在启动后完成第二耗材芯片内核处理流程,读取数据存储子单元内的新校验密码,并在关闭第二耗材MCU单元后将新校验密码发送给打印机。所述耗材软件程序包括第一耗材MCU单元的软件程序,上述第一耗材MCU单元完成的过程即为第一耗材MCU单元的软件程序中的一部分(参见图6)。
如图3,所述第一耗材MCU单元包括执行子单元、检测子单元。所述执行子单元,用于复制启动代码,解密校验算法密文数据,在发送校验算法明文数据给算法代码存储子单元和发送旧校验密码给数据存储子单元后启动第二耗材MCU单元,在检测子单元查询第二耗材MCU单元完成第二耗材芯片内核处理流程后执行子单元关闭第二耗材MCU单元,发送新校验密码给打印机。所述检测子单元,用于在查询到第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认第二耗材MCU单元完成第二耗材芯片内核处理流程。之后,所述执行子单元读取新校验密码,关闭第二耗材MCU单元。
为避免查询出错,所述第一耗材MCU单元还包括标志清零子单元,用于在执行子单元启动第二耗材MCU单元前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。第二耗材MCU单元上一次启动使用后,标志为非零,在新一次启动前,清零处理。在第二耗材MCU单元开启后,执行第二芯片内核处理流程后,标志变化为非零。第一耗材MCU单元检测到标志为非零时,从数据存储子单元中读取新校验密码,然后关闭第二耗材MCU单元。
另外,所述第一耗材MCU单元还包括判断子单元,用于判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,将存储单元中的旧校验密码发送给打印机;否则,所述执行子单元解密校验算法密文数据,在发送校验算法明文数据给算法代码存储子单元和发送旧校验密码给数据存储子单元后启动第二耗材MCU单元;在检测子单元查询第二耗材MCU单元完成第二耗材芯片内核处理流程后执行子单元关闭第二耗材MCU单元,发送新校验密码给打印机。由于判断子单元的存在,可在是否启动第二耗材MCU单元前进行判断,当能够适配打印机认证和通信,无需启动第二耗材MCU单元执行第二耗材芯片内核处理流程,只要用到第一耗材MCU单元即可,直接发送旧校验密码给打印机,就能快速进入认证和交互通信。此过程相当于,启用双核或单核的判断过程,有助于系统优化运行。举例说明,假定初代芯片标记值为0,如果索引字节值等于0,则第一耗材MCU单元将旧校验密码发送给打印机;如果索引字节值不等于0,则启动双核,由第二耗材MCU单元计算新校验密码,并由第一耗材MCU单元将新校验密码发送给打印机。所述初代芯片标记值不限于0,并且初代芯片标记值不仅可以理解成第一代芯片,也可以理解成打印机固件未升级前的通用代芯片。后者理解,一般是在较早代芯片以被淘汰使用很多年且不生产,这样耗材芯片无需记录较早代芯片的数据,如较早代芯片的旧校验密码,这样可便于提高耗材芯片与打印机通信系统的交互效率。
第二耗材MCU单元被启动后,第二耗材MCU单元执行第二耗材芯片内核处理流程具体为:第二耗材MCU单元首先运行启动代码存储单元中的启动代码,然后跳转到算法代码存储子单元去运行校验密码算法函数程序。校验密码算法函数程序运行完毕后,新校验密码被写入到数据存储子单元,第二耗材MCU单元跳回到启动代码存储单元并设置第二耗材MCU单元处理完成标志。所述耗材软件程序还包括第二耗材MCU单元的软件程序,上述第二耗材MCU单元完成的过程为第二耗材MCU单元的软件程序(参见图5)。
第一耗材MCU单元检测到第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志后,首先从数据存储子单元中读取新校验密码,然后将新校验密码发送给打印机。上述第一耗材MCU单元完成的过程也为第一耗材MCU单元的软件程序中的一部分(参见图6)。
图4示出了本发明一种耗材芯片的通信方法。用于包括第一耗材MCU单元、校验密码运算单元、第二耗材MCU单元的耗材芯片;方法包括:
步骤S1,当第一耗材MCU单元与打印机无法兼容时,第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程,校验密码运算单元的校验密码算法函数程序被调用而计算新校验密码。其中,当第一耗材MCU单元与打印机兼容时,无需执行步骤S2,直接由第一耗材MCU单元与打印机进行现有认证并交互通信。
步骤S2,当第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,第一耗材MCU单元读取新校验密码并发送给打印机,所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
所述第二耗材MCU单元执行所述校验密码运算单元的校验密码算法函数程序是依据于校验算法明文数据,而校验算法明文数据的获得通过以下方式:在一实施方式下,该校验算法明文数据可通过第二耗材MCU单元启动后计算获得。所述第一耗材MCU单元通过打印机获得索引字节、密钥后将其发送给第二耗材MCU单元,第二耗材MCU单元根据索引字节查询到校验算法密文数据,并利用密钥进行解密为校验算法明文数据,并存储于校验密码运算单元。在此方式下,本发明方法还包括针对校验算法明文数据获得步骤,可根据现有耗材MCU单元与打印机认证方式获得校验算法明文数据,即利用密钥解密校验算法密文数据。在另一实施方式下,该校验算法明文数据可通过第一耗材MCU单元计算后发送至第二耗材MCU单元获得,并存储在校验密码运算单元。在上述两者实施方式下,所述耗材芯片还包括存储单元,用于存储上述方式获得的校验算法明文数据。以后者实施方式为例,具体地,方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元。在获得校验算法明文数据后,后续步骤按照S1-S2所述执行,即此后,所述第二耗材MCU单元根据校验算法明文数据执行所述校验密码运算单元的校验密码算法函数程序并计算新校验密码。
其中,所述第二耗材MCU单元执行启动程序,在一实施方式下,通过在第二耗材MCU单元内默认设置启动代码,一旦第二耗材MCU单元接收到第一耗材MCU发送的启动指令时,则自动按照启动代码运行;在另一实施方式下,该启动代码由第一耗材MCU单元提供。所述耗材芯片还包括启动代码存储单元、存储单元;方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述存储单元的启动代码在耗材芯片上电后被复制到所述启动代码存储单元中;所述启动代码存储单元在所述第二耗材MCU单元被启动后调用。
其中,在所述校验密码运算单元的新校验密码生成前,可在校验密码运算单元内存储有旧校验密码。该旧校验密码可以是前一次运算留下的;当旧校验密码是在第一次新校验密码运算前的,可以预先存储在校验密码运算单元内作为校验密码初始值,也可以通过第一耗材MCU单元在准备启动第二耗材MCU单元前发送到校验密码运算单元。由第一耗材MCU单元发送来的旧校验密码的实施方式下,耗材芯片的存储单元还存储旧校验密码。在所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元将旧校验密码发送给所述校验密码运算单元。
其中,所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程的步骤具体为:所述第一耗材MCU单元在查询到第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认第二耗材MCU单元完成第二耗材芯片内核处理流程。若不设置完成标志,则无法明确、及时确认第二耗材MCU单元是否已经完成第二耗材芯片内核处理流程。完成标志可以是标志符,在未完成时标志符等于0,完成了则等于1;完成标志还可以是程序执行结束后的结束参数或反馈指令。第一耗材MCU单元确定反馈指令或参数为预先规定的完成标志时,则确认第二耗材芯片内核处理流程完成。
所述第二耗材MCU单元可在被启动后,一直保持启动状态,然则,这对后续第一耗材MCU单元与打印机的通信交互造成很大的功耗损失,并且降低第一耗材MCU单元与打印机两者通信交互效率。为此,方法还包括:当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程并读取新校验密码后,第一耗材MCU单元关闭所述第二耗材MCU单元。
为了确保本发明耗材芯片多次使用后仍能不出错,在所述第一耗材MCU单元启动所述第二耗材MCU单元前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。可通过上述标志清零子单元实现。
为了避免第一耗材MCU单元是否与打印机兼容而每次均启动第一耗材MCU单元进行一次新校验密码的计算,本发明方法还包括:在通过索引字节找到校验算法密文数据前,所述第一耗材MCU单元判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,所述第一耗材MCU单元与打印机兼容;否则,启动第二耗材MCU单元,举例说明,假定初代芯片标记值为0,如果索引字节值等于0,则第一耗材MCU单元将校验密码发送给打印机;如果索引字节值不等于0,则启动双核,由第二耗材MCU单元计算新校验密码,并由第一耗材MCU单元将新校验密码发送给打印机。所述初代芯片标记值不限于0,并且初代芯片标记值不仅可以理解成第一代芯片,也可以理解成打印机固件未升级前的通用代芯片。后者理解,一般是在较早代芯片以被淘汰使用很多年且不生产,这样耗材芯片无需记录较早代芯片的数据,如较早代芯片的旧校验密码,这样可便于提高耗材芯片与打印机通信系统的交互效率。
所述第一耗材MCU单元与打印机是否兼容,除了通过判断索引字节是否对应于初代芯片标记值的方式外,还可以通过其他方式,如在一实施方式下,通过在第一耗材MCU单元内查找校验算法密文数据,若未查到打印机固件升级后的校验算法密文数据,则认为不兼容,则需要通过第二耗材MCU单元存储的校验算法密文数据进行后续兼容认证;在另一实施方式下,第一耗材MCU单元与打印机直接进行现有通信认证,一旦认证不通过则为不兼容,此时由第二耗材MCU单元代替第一耗材MCU单元进行后续认证通信。
图6示出了本发明一种耗材芯片通信方法的具体实施方式,方法用于包括第一耗材MCU单元、存储单元、启动代码存储单元、校验密码运算单元、第二耗材MCU单元的耗材芯片。所述校验密码运算单元包括算法代码存储子单元、数据存储子单元。该方法具体依赖于图3所示耗材芯片示例实现。
方法包括:
步骤S01,第一耗材MCU单元将存储于存储单元的启动代码复制到启动代码存储单元;
步骤S02,当接收到打印机发来的索引字节和密钥后,第一耗材MCU单元解密存储单元中的校验算法密文数据并写入算法代码存储子单元;
若打印机一直未发送索引字节和密钥,第一耗材MCU单元一直等待命令,直到接收到后执行后续步骤。
步骤S03,第一耗材MCU单元将存储于存储单元的旧校验密码写入数据存储子单元;
步骤S04,第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程;
步骤S05,第一耗材MCU单元查询第二耗材MCU单元完成第二耗材芯片内核处理流程后,读取数据存储子单元的新校验密码并关闭第二耗材MCU单元;
步骤S06,第一耗材MCU单元发送新校验密码给打印机;
其中,数据存储子单元的新校验密码是在第二耗材MCU单元执行第二耗材芯片内核处理过程中,所述第二耗材MCU单元执行所述算法代码存储子单元内的校验密码算法函数程序,将计算获得新校验码写入数据存储子单元内。
方法还包括:在步骤S02处增加双核或单核系统选择判断过程。
当接收到打印机发来的索引字节和密钥后,判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,第一耗材MCU单元发送存储于存储单元的旧校验密码给打印机,方法结束;否则,第一耗材MCU单元解密存储单元中的校验算法密文数据并写入算法代码存储子单元,继续执行步骤S03-S06,直至结束。
举例说明,假定初代芯片标记值为0,如果索引字节值等于0,则第一耗材MCU单元将旧校验密码发送给打印机;如果索引字节值不等于0,则启动双核,由第二耗材MCU单元计算新校验密码,并由第一耗材MCU单元将新校验密码发送给打印机。所述初代芯片标记值不限于0,并且初代芯片标记值不仅可以理解成第一代芯片,也可以理解成打印机固件未升级前的通用代芯片。后者理解,一般是在较早代芯片以被淘汰使用很多年且不生产,这样耗材芯片无需记录较早代芯片的数据,如较早代芯片的旧校验密码,这样可便于提高耗材芯片与打印机通信系统的交互效率。
其中,第一耗材MCU单元查询第二耗材MCU单元完成第二耗材芯片内核处理流程具体为:第一耗材MCU单元在查询到第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认第二MCU单元完成第二耗材芯片内核处理流程。
为避免查询出错,耗材芯片通信方法还包括:在步骤S04前增加完成标志清零步骤。
在第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。第二耗材MCU单元上一次启动使用后,标志为非零,在新一次启动前,清零处理。在第二耗材MCU单元开启后,执行第二芯片内核处理流程后,标志变化为非零。第一耗材MCU单元检测到标志为非零时,从数据存储子单元中读取新校验密码,然后关闭第二耗材MCU单元。所述关闭第二耗材MCU单元的操作实际将双核切换为单核,在后续与打印机通信交互时第一耗材MCU单元为主,提高了通信效率。
如图5,第二耗材MCU单元执行第二耗材芯片内核处理流程具体为:
步骤S41,第二耗材MCU单元根据复位地址跳到启动代码存储单元中运行启动代码;
步骤S42,第二耗材MCU单元关闭所有中断;
步骤S43,第二耗材MCU单元调用算法代码存储子单元中的校验密码算法函数程序并跳转到算法代码存储子单元中运行;
步骤S44,第二耗材MCU单元运行算法代码存储子单元中的校验密码算法函数程序并跳回到启动代码存储单元中运行;
步骤S45,第二耗材MCU单元设置第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志,之后进入等待。
本发明还提出一种耗材芯片通信方法,如图7。方法用于包括第一耗材MCU单元、校验密码运算单元、第二耗材MCU单元的耗材芯片;方法包括:
步骤S1’,第二耗材MCU单元在接收到第一耗材MCU单元与打印机无法兼容的信号时,启动并执行第二耗材芯片内核处理流程;
步骤S2’,第二耗材MCU单元执行所述校验密码运算单元的校验密码算法函数程序,并将计算得到的新校验密码存储于校验密码运算单元;
步骤S3’,当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,所述新校验密码被所述第一耗材MCU单元读取并发送给打印机,所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
其中,所述校验密码运算单元包括算法代码存储子单元和数据存储子单元;第二耗材MCU单元执行所述校验密码运算单元的校验密码算法函数程序,并将计算得到的新校验密码存储于校验密码运算单元的步骤具体为:所述第二耗材MCU单元根据校验算法明文数据,执行所述算法代码存储子单元的校验密码算法函数程序,计算得到的新校验密码存储于所述数据存储子单元。
其中,所述第二耗材MCU单元执行启动程序,在一实施方式下,通过在第二耗材MCU单元内默认设置启动代码,一旦第二耗材MCU单元接收到第一耗材MCU发送的启动指令时,则自动按照启动代码运行;在另一实施方式下,该启动代码由第一耗材MCU单元提供,所述耗材芯片还包括启动代码存储单元、存储单元;方法还包括:当所述第二耗材MCU单元被启动前,所述存储单元的启动代码在耗材芯片上电后被复制到所述启动代码存储单元中;所述启动代码存储单元在所述第二耗材MCU单元被启动后调用。
所述第二耗材MCU单元执行第二耗材芯片内核处理流程的步骤具体参照图5所示步骤。
所述第二耗材MCU单元可在被启动后,一直保持启动状态,会造成很大的功耗损失。为此,方法还包括:当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程并读取新校验密码后,所述第二耗材MCU单元接收到第一耗材MCU单元的关闭指令并关闭。
为了避免查询出错,方法还包括:在第二耗材MCU单元被启动前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。
图8为依据图3所示耗材芯片示例实现的具体实施方式。本发明方法包括:
步骤S10,第二耗材MCU单元在接收到第一耗材MCU单元与打印机无法兼容的信号时,启动并执行第二耗材芯片内核处理流程;
步骤S20,第二耗材MCU单元执行所述启动代码存储单元的启动代码程序和所述算法代码存储子单元的校验密码算法函数程序,并将计算得到的新校验密码存储于数据存储子单元;
步骤S30,第二耗材MCU单元完成第二耗材芯片内核处理流程后设置完成标志并反馈给第一耗材MCU单元,以使得第一耗材MCU单元读取所述数据存储子单元存储的新校验密码,所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
所述第一耗材MCU单元与打印机无法兼容的信号,在一实施方式下,通过判断索引字节是否对应于初代芯片标记值的方式判断,若对应,则兼容,若不对应则不兼容;另一实施方式下,通过在第一耗材MCU单元内查找校验算法密文数据,若未查到打印机固件升级后的校验算法密文数据,则认为不兼容,则需要通过第二耗材MCU单元存储的校验算法密文数据进行后续兼容认证;在另一实施方式下,第一耗材MCU单元与打印机直接进行现有通信认证,一旦认证不通过则为不兼容,此时由第二耗材MCU单元代替第一耗材MCU单元进行认证通信。
本领域的技术人员应理解,上述描述及附图中所示的本发明的实施例只作为举例而并不限制本发明。本发明的目的已经完整有效地实现。本发明的功能及结构原理已在实施例中展示和说明,在没有背离所述原理下,本发明的实施方式可以有任何变形或修改。

Claims (16)

  1. 一种耗材芯片,其特征在于,包括第一耗材MCU单元、第二耗材MCU单元、校验密码运算单元;当所述第一耗材MCU单元与打印机无法兼容时,所述第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程;所述第二耗材MCU单元执行所述校验密码运算单元的校验密码算法函数程序,并将计算得到的新校验密码存储于校验密码运算单元;当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,所述第一耗材MCU单元读取所述校验密码运算单元的新校验密码并发送给打印机;所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
  2. 根据权利要求1所述的一种耗材芯片,其特征在于,所述校验密码运算单元包括:
    算法代码存储子单元,用于存储解密后校验算法明文数据;
    数据存储子单元,用于存储新校验密码、旧校验密码;
    所述第二耗材MCU单元根据校验算法明文数据,执行所述算法代码存储子单元的校验密码算法函数程序,计算得到的新校验密码存储于所述数据存储子单元。
  3. 根据权利要求1所述的一种耗材芯片,其特征在于,还包括:存储单元,用于存储校验算法密文数据;所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据,执行所述校验密码算法函数程序。
  4. 根据权利要求1所述的一种耗材芯片,其特征在于,还包括:
    启动代码存储单元;
    存储单元,用于存储启动代码;
    当所述第一耗材MCU单元启动第二耗材MCU单元前,所述存储单元的启动代码在耗材芯片上电后被复制到所述启动代码存储单元中。
  5. 根据权利要求1所述的一种耗材芯片,其特征在于,所述第一耗材MCU单元包括:
    执行子单元,用于与打印机交互,在与打印机无法兼容时,启动第二耗材MCU单元;并在检测子单元查询到第二耗材MCU单元完成第二耗材芯片内核处理流程后,读取所述校验密码运算单元的新校验密码,关闭所述第二耗材MCU单元,之后发送新校验密码给打印机;
    检测子单元,用于在查询到第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认第二耗材MCU单元完成第二耗材芯片内核处理流程。
  6. 根据权利要求5所述的一种耗材芯片,其特征在于,所述第一耗材MCU单元还包括标志清零子单元,用于在执行子单元启动第二耗材MCU单元前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。
  7. 根据权利要求5所述的一种耗材芯片,其特征在于,所述第一耗材MCU单元还包括判断子单元,用于判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,所述第一耗材MCU单元与打印机兼容;否则,所述执行子单元启动第二耗材MCU单元。
     
  8. 根据权利要求1、5、6、7中的任一项所述的一种耗材芯片,其特征在于,还包括:
    存储单元,用于存储校验算法密文数据,启动代码,旧校验密码;
    启动代码存储单元;
    当所述第一耗材MCU单元启动第二耗材MCU单元前,所述第一耗材MCU单元在耗材芯片上电后将存储单元的启动代码复制到所述启动代码存储单元中,所述第一耗材MCU单元将旧校验密码发送给所述校验密码运算单元;
    所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据,执行所述校验密码算法函数程序。
  9. 一种耗材芯片通信方法,其特征在于,用于包括第一耗材MCU单元、校验密码运算单元、第二耗材MCU单元的耗材芯片;方法包括:
    当第一耗材MCU单元与打印机无法兼容时,第一耗材MCU单元启动第二耗材MCU单元执行第二耗材芯片内核处理流程,校验密码运算单元的校验密码算法函数程序被调用而计算新校验密码;
    当第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程后,第一耗材MCU单元读取新校验密码并发送给打印机,所述新校验密码能被打印机接收以实现第一耗材MCU单元与打印机两者兼容。
  10. 根据权利要求9所述的一种耗材芯片通信方法,其特征在于,所述耗材芯片还包括存储单元;方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节在存储单元查找校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据执行所述校验密码运算单元的校验密码算法函数程序并计算新校验密码。
  11. 根据权利要求9所述的一种耗材芯片通信方法,其特征在于,所述耗材芯片还包括启动代码存储单元、存储单元;方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元在耗材芯片上电后将存储单元的启动代码复制到所述启动代码存储单元中;所述启动代码存储单元在所述第二耗材MCU单元被启动后调用。
  12. 根据权利要求9所述的一种耗材芯片通信方法,其特征在于,方法还包括:当所述第一耗材MCU单元查询到所述第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志时,确认所述第二耗材MCU单元完成第二耗材芯片内核处理流程,读取新校验密码后,第一耗材MCU单元关闭所述第二耗材MCU单元。
  13. 根据权利要求12所述的一种耗材芯片通信方法,其特征在于,方法还包括:在所述第一耗材MCU单元启动所述第二耗材MCU单元前,将前次第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志清零。
  14. 根据权利要求10所述的一种耗材芯片通信方法,其特征在于,方法还包括:在通过索引字节找到校验算法密文数据前,所述第一耗材MCU单元判断索引字节是否对应于初代芯片标记值,若是,则不启动第二耗材MCU单元,所述第一耗材MCU单元与打印机兼容;否则,启动第二耗材MCU单元。
  15. 根据权利要求9所述的一种耗材芯片通信方法,其特征在于,所述耗材芯片还包括存储单元、启动代码存储单元;方法还包括:
    当所述第一耗材MCU单元启动所述第二耗材MCU单元前,所述第一耗材MCU单元在耗材芯片上电后将所述存储单元的启动代码复制到所述启动代码存储单元中,并将所述存储单元的旧校验密码发送到所述校验密码运算单元;
    所述第一耗材MCU单元接收到打印机发送的索引字节和密钥后,通过索引字节找到校验算法密文数据,并根据密钥将其解密并发送给所述校验密码运算单元;所述第二耗材MCU单元根据校验算法明文数据执行所述校验密码运算单元的校验密码算法函数程序并计算新校验密码。
  16. 根据权利要求12的一种耗材芯片通信方法,其特征在于,所述第二耗材MCU单元执行第二耗材芯片内核处理流程的步骤具体为:
    第二耗材MCU单元根据复位地址跳到启动代码存储单元中运行启动代码;
    第二耗材MCU单元关闭所有中断;
    第二耗材MCU单元调用算法代码存储子单元中的校验密码算法函数程序并跳转到算法代码存储子单元中运行;
    第二耗材MCU单元运行算法代码存储子单元中的校验密码算法函数程序并跳回到启动代码存储单元中运行;
    第二耗材MCU单元设置第二耗材MCU单元完成第二耗材芯片内核处理流程的完成标志,之后进入等待。
PCT/CN2020/071637 2019-01-22 2020-01-13 一种耗材芯片、耗材芯片通信方法 WO2020151509A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US17/287,505 US11709927B2 (en) 2019-01-22 2020-01-13 Consumable chip and communication method for consumable chip
EP20745015.6A EP3915792B1 (en) 2019-01-22 2020-01-13 Consumable chip, and consumable chip communication method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910057851.2 2019-01-22
CN201910057851.2A CN109624529B (zh) 2019-01-22 2019-01-22 一种耗材芯片、耗材芯片通信方法

Publications (1)

Publication Number Publication Date
WO2020151509A1 true WO2020151509A1 (zh) 2020-07-30

Family

ID=66063003

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/071637 WO2020151509A1 (zh) 2019-01-22 2020-01-13 一种耗材芯片、耗材芯片通信方法

Country Status (4)

Country Link
US (1) US11709927B2 (zh)
EP (1) EP3915792B1 (zh)
CN (1) CN109624529B (zh)
WO (1) WO2020151509A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113873681A (zh) * 2021-10-19 2021-12-31 珠海奔图电子有限公司 通信方法、耗材芯片、耗材及图像形成装置
CN114987057A (zh) * 2022-06-15 2022-09-02 珠海市创飞自动化设备有限公司 一种适用于升级侧向设置的墨盒芯片的直压式装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109624529B (zh) * 2019-01-22 2020-04-24 杭州旗捷科技有限公司 一种耗材芯片、耗材芯片通信方法
CN110378096A (zh) 2019-07-15 2019-10-25 杭州旗捷科技有限公司 一种耗材芯片通信方法、耗材芯片及耗材
CN111338584A (zh) 2020-01-20 2020-06-26 杭州旗捷科技有限公司 耗材芯片写读方法、耗材芯片、耗材芯片系统和写读设备
US11893444B2 (en) 2020-01-20 2024-02-06 Hangzhou Chipjet Technology Co., Ltd. Consumable chip system and consumable container
CN111959139B (zh) * 2020-08-31 2022-05-13 湖南鼎一致远科技发展有限公司 一种热转印打印机的加密系统

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104097401A (zh) * 2014-06-24 2014-10-15 中山铭祺电子科技有限公司 一种打印耗材的通用芯片
CN104441982A (zh) * 2014-11-10 2015-03-25 中山铭祺电子科技有限公司 一种用于再生打印耗材的通用芯片及通信验证方法
US20150089630A1 (en) * 2013-09-25 2015-03-26 Samsung Electronics Co., Ltd Crum chip mountable in comsumable unit, image forming apparatus for authentificating the crum chip, and method thereof
CN105346256A (zh) * 2015-11-09 2016-02-24 杭州旗捷科技有限公司 一种打印机芯片、墨盒、和打印机芯片存储分配方法
CN105398225A (zh) * 2015-12-10 2016-03-16 杭州旗捷科技有限公司 墨盒芯片、墨盒、墨盒识别系统和墨盒识别方法
CN106626792A (zh) 2016-12-30 2017-05-10 珠海艾派克微电子有限公司 芯片认证方法、系统、打印机、耗材芯片和耗材盒
CN107577444A (zh) * 2017-10-20 2018-01-12 珠海美佳音科技有限公司 打印机兼容芯片的同步传输电路及同步方法
CN108116053A (zh) * 2017-12-19 2018-06-05 杭州旗捷科技有限公司 一种耗材芯片认证方法、耗材芯片及成像盒
CN109624529A (zh) * 2019-01-22 2019-04-16 杭州旗捷科技有限公司 一种耗材芯片、耗材芯片通信方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6312106B1 (en) * 1999-04-20 2001-11-06 Hewlett-Packard Company Method and apparatus for transferring information between a replaceable consumable and a printing device
CN101894285A (zh) * 2010-01-26 2010-11-24 珠海天威技术开发有限公司 射频芯片、耗材容器、数据写入方法及验证方法
CN103465631A (zh) * 2013-07-26 2013-12-25 中山铭祺电子科技有限公司 一种打印机用耗材计数芯片
GB201404737D0 (en) * 2014-03-17 2014-04-30 Omarco Network Solutions Ltd Multi-function tickets
CN106295376A (zh) * 2016-08-24 2017-01-04 杭州旗捷科技有限公司 一种应用于打印领域的高效安全通信系统及其操作方法
WO2019119393A1 (zh) * 2017-12-22 2019-06-27 广州众诺电子技术有限公司 芯片复位方法、芯片及耗材容器
CN112644180B (zh) * 2020-12-17 2021-08-03 广州众诺电子技术有限公司 一种芯片启动方法、装置、存储介质和耗材芯片

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150089630A1 (en) * 2013-09-25 2015-03-26 Samsung Electronics Co., Ltd Crum chip mountable in comsumable unit, image forming apparatus for authentificating the crum chip, and method thereof
CN104097401A (zh) * 2014-06-24 2014-10-15 中山铭祺电子科技有限公司 一种打印耗材的通用芯片
CN104441982A (zh) * 2014-11-10 2015-03-25 中山铭祺电子科技有限公司 一种用于再生打印耗材的通用芯片及通信验证方法
CN105346256A (zh) * 2015-11-09 2016-02-24 杭州旗捷科技有限公司 一种打印机芯片、墨盒、和打印机芯片存储分配方法
CN105398225A (zh) * 2015-12-10 2016-03-16 杭州旗捷科技有限公司 墨盒芯片、墨盒、墨盒识别系统和墨盒识别方法
CN106626792A (zh) 2016-12-30 2017-05-10 珠海艾派克微电子有限公司 芯片认证方法、系统、打印机、耗材芯片和耗材盒
CN107577444A (zh) * 2017-10-20 2018-01-12 珠海美佳音科技有限公司 打印机兼容芯片的同步传输电路及同步方法
CN108116053A (zh) * 2017-12-19 2018-06-05 杭州旗捷科技有限公司 一种耗材芯片认证方法、耗材芯片及成像盒
CN109624529A (zh) * 2019-01-22 2019-04-16 杭州旗捷科技有限公司 一种耗材芯片、耗材芯片通信方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3915792A4

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113873681A (zh) * 2021-10-19 2021-12-31 珠海奔图电子有限公司 通信方法、耗材芯片、耗材及图像形成装置
CN113873681B (zh) * 2021-10-19 2023-06-16 珠海奔图电子有限公司 通信方法、耗材芯片、耗材及图像形成装置
CN114987057A (zh) * 2022-06-15 2022-09-02 珠海市创飞自动化设备有限公司 一种适用于升级侧向设置的墨盒芯片的直压式装置
CN114987057B (zh) * 2022-06-15 2023-02-24 珠海市创飞自动化设备有限公司 一种适用于升级侧向设置的墨盒芯片的直压式装置

Also Published As

Publication number Publication date
EP3915792A1 (en) 2021-12-01
CN109624529A (zh) 2019-04-16
EP3915792B1 (en) 2023-11-22
US20210390169A1 (en) 2021-12-16
EP3915792A4 (en) 2022-10-26
US11709927B2 (en) 2023-07-25
CN109624529B (zh) 2020-04-24

Similar Documents

Publication Publication Date Title
WO2020151509A1 (zh) 一种耗材芯片、耗材芯片通信方法
TWI598814B (zh) 用於管理及診斷配備有統一可延伸韌體介面(uefi)相容韌體的計算裝置之系統與方法
US20030226040A1 (en) Controlling access to data stored on a storage device of a trusted computing platform system
JP2003233534A (ja) メモリシステム
WO2011134207A1 (zh) 软件保护方法
US10248795B2 (en) Implementing method for JavaCard application function expansion
JP5466645B2 (ja) 記憶装置、情報処理装置およびプログラム
US7613932B2 (en) Method and system for controlling access to software features in an electronic device
JP2003288128A (ja) 外部接続デバイスにおけるアプリケーションの適正使用方法及び外部接続デバイス
CN112068904A (zh) 一种芯片boot运行方法、装置及相关组件
US6591366B1 (en) Method and configuration for loading data for basic system routines of a data processing system
US20080209200A1 (en) Method for protecting data in a hard disk
JP3930576B2 (ja) ソフトウェア不正使用防止機能を備えたコンピュータシステム
US7600132B1 (en) System and method for authentication of embedded RAID on a motherboard
US7502942B1 (en) System and method for authentication of embedded raid on a motherboard having input/output processor
CN110889110A (zh) 车辆的程序控制方法、装置、车辆及存储介质
JP2007323133A (ja) Icカード発行方法およびicカード
JP4324100B2 (ja) データ書込制御装置及びデータ書込制御方法
JP7011697B1 (ja) 情報処理装置および情報処理方法
US11822661B2 (en) Method for carrying out a secured startup sequence of a control unit
JPH11167525A (ja) 不揮発性メモリ混載マイコン及びその不揮発性メモリ書換え方法並びに不揮発性メモリ混載マイコンの不揮発性メモリ書換えプログラムを記録した記録媒体
CN112685057A (zh) 根文件系统的升级方法、电子设备及计算机可读存储介质
JP2000267995A (ja) セキュリティ統合管理装置、セキュリティ統合管理方法およびセキュリティ統合管理用プログラムを記録した記録媒体
CN118020071A (zh) 管理电子设备的所有权
CN116257839A (zh) 升级签名固件的方法、电子设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20745015

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020745015

Country of ref document: EP

Effective date: 20210823