WO2022072956A1 - Component constraints for printing devices - Google Patents

Component constraints for printing devices Download PDF

Info

Publication number
WO2022072956A1
WO2022072956A1 PCT/US2021/070812 US2021070812W WO2022072956A1 WO 2022072956 A1 WO2022072956 A1 WO 2022072956A1 US 2021070812 W US2021070812 W US 2021070812W WO 2022072956 A1 WO2022072956 A1 WO 2022072956A1
Authority
WO
WIPO (PCT)
Prior art keywords
printing device
component
components
controller
constraint
Prior art date
Application number
PCT/US2021/070812
Other languages
French (fr)
Inventor
Sibin Jos Koothur
Sudhindra Venkatesh KULKARNI
Laurent Pizot
Marvin Nelson
Original Assignee
Hewlett-Packard Development Company, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Development Company, L.P. filed Critical Hewlett-Packard Development Company, L.P.
Publication of WO2022072956A1 publication Critical patent/WO2022072956A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41JTYPEWRITERS; SELECTIVE PRINTING MECHANISMS, i.e. MECHANISMS PRINTING OTHERWISE THAN FROM A FORME; CORRECTION OF TYPOGRAPHICAL ERRORS
    • B41J29/00Details of, or accessories for, typewriters or selective printing mechanisms not otherwise provided for
    • B41J29/38Drives, motors, controls or automatic cut-off devices for the entire printing mechanism
    • B41J29/393Devices for controlling or analysing the entire machine ; Controlling or analysing mechanical parameters involving printing of test patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Definitions

  • a printing device may include components that provide the printing device with a plurality of functions.
  • a component of a printing device may include a printing agent cartridge (e.g., toner, ink, etc.) that may be utilized to form images on print media (e.g., paper).
  • a component of a printing device may include modules for performing various other functions of the printing device (e.g., wireless communications, scanning, copying, facsimile transmissions, email communications, etc.).
  • a component or components of the printing device may be replaced due to wear, compatibility, exhaustion of a consumable (e.g., printing agent), etc.
  • FIG. 1 is a schematic diagram of a system for monitoring for compliance with a component constraint that is based on an operational arrangement of a printing device according to some examples
  • FIGS. 2-4 are diagrams of machine-readable instructions for monitoring for compliance with a component constraint that is based on an operational arrangement of a printing device according to some examples.
  • a printing device may include components that may be replaced during the operational life thereof.
  • a manufacturer and/or seller e.g., collectively referred to as a “source” of a printing device may specify that approved replacement components are to be utilized within the printing device so as to avoid violating a warranty or other contractual arrangement involving the printing device.
  • An approved replacement component may comprise a component that is manufactured and/or sold by the source of the printing device, or is licensed by the source.
  • examples disclosed herein include methods of monitoring the components and/or functions of a printing device (or other suitable device as noted herein) to determine whether unauthorized components have been installed on the printing device and/or whether unauthorized changes have been made to machine-readable instructions stored on the printing device.
  • a printing device e.g., a controller thereof
  • component constraint refers to a rule, limitation, or the like for a component (or components) that may be installed within or used with a printing device (or other suitable device as noted below).
  • a component constraint may comprise a limitation for the source (i.e., a source limitation) of a component of the printing device.
  • the component constraint may include approved components and/or approved functions for the printing device.
  • a component constraint may comprise an instruction (or instructions) that may be stored in a memory of a printing device and/or another electronic device.
  • the component constraint may be based on an operational arrangement for the printing device.
  • the term “operational arrangement” refers to a configuration of the printing device that may specify the components may be installed within and/or the functions may be performed by the printing device.
  • the operational arrangement may relate to an arrangement, transaction, agreement, etc. that involves the printing device. For instance, as described in more detail below, an operational arrangement may be based on a warranty or servicing agreement between the source and the owner of the printing device.
  • the operational arrangement may relate to a purchasing transaction for the printing device (e.g., such as a selected model or version of the printing device that is chosen and purchased by the owner). Accordingly, the operational arrangement may be varied in a number of ways in various examples.
  • system 10 for monitoring for compliance with a component constraint that is based on an operational arrangement for a printing device 20 is shown.
  • system 10 includes the printing device 20, and an electronic device 50 that may communicate with the printing device 20 over a network 40.
  • Printing device 20 may comprise any device that is to place text, images, graphics, lines, or other markings (collectively referred to herein as “images”) on a print media, which may comprise paper or some other medium suitable for receiving the images thereon.
  • the printing device 20 may be a printer, copier, scanner, facsimile device, or a device that is to perform printing as well as scanning, copying, facsimile transmission, or a combination thereof.
  • the printing device 20 may place images on print media with a printing agent that may comprise toner, liquid printing agent (e.g., ink), etc., and may utilize a suitable printing technique (e.g., laser printing, inkjet printing, dot matrix printing, thermal printing, etc.).
  • printing device 20 may include a plurality of components 30, 32, 34, 36 that are to perform a plurality of functions of the printing device 20.
  • some of the components 30, 32, 34, 36 may comprise cartridges of printing agent.
  • some of the components 30, 32, 34, 36 may comprise components, systems, modules, etc. that may perform (e.g., wholly or partially) a function or functions of the printing device 20.
  • some of the components 30, 32, 34, 36 may comprise electronic components (e.g., printed circuit board (PCB), processors, memories, antennas, etc.) that may impart printing device 20 with various functions such as, for instance, copying, scanning, printing, facsimile communication, email communication, wireless communication, etc.
  • PCB printed circuit board
  • the printing device 20 may include a controller 22 that comprises a processor 24 and a memory 28.
  • the controller 22 may comprise a dedicated controller within the printing device 20 for performing the various functions described herein.
  • some or all of the components of controller 22 e.g., processor 24, memory 28, etc.
  • CPU central processing unit
  • the controller 22 may control or facilitate the general operations of printing device 20.
  • the processor 24 executes machine-readable instructions 26 stored on memory 28 (e.g., a non-transitory machine-readable medium), thereby causing the processor 24 (and, more generally, the controller 22) to perform some or all of the actions attributed herein to the processor 24 (and, more generally, to the controller 22 and the printing device 20).
  • the memory 28 may comprise volatile storage (e.g., random access memory (RAM)), non-volatile storage (e.g., flash storage, etc.), or combinations of both volatile and non-volatile storage. Data read or written by the processor 24 when executing the machine-readable instructions 26 can also be stored on memory 28.
  • Electronic device 50 may comprise any device or assembly that includes components such as processors (e.g., to execute machine-readable instructions), power supplies, memory, etc.
  • an electronic device 50 may include a server, a desktop computer, a smart phone, a tablet computer, a laptop computer, etc.
  • the electronic device 50 may include a collection of devices (e.g., such as those listed above).
  • the electronic device 50 includes a processor 52 and a memory 58 that may include many or all of the attributes previously described for the processor 24 and memory 28 of controller 22.
  • the processor 52 executes machine-readable instructions 56 stored on memory 58 (e.g., a non- transitory machine-readable medium), thereby causing the processor 52 (and, more generally, the electronic device 50) to perform some or all of the actions attributed herein to the processor 52 (and, more generally, to the electronic device 50).
  • the memory 58 may comprise volatile storage (e.g., random access memory (RAM)), non-volatile storage (e.g., flash storage, etc.), or combinations of both volatile and non-volatile storage.
  • RAM random access memory
  • non-volatile storage e.g., flash storage, etc.
  • Data read or written by the processor 52 when executing the machine-readable instructions 56 can also be stored on memory 58.
  • the network 40 may comprise any local and/or wide area network that may facilitate communication between devices (e.g., a local wired or wireless network, the Internet, a cellular network, or a combination thereof).
  • the communication between the printing device 20 and the electronic device 50 may comprise wired communication and/or wireless communication (e.g., such as via WiFi, BLUETOOTH®, and/or other radio frequency (RF) based communication).
  • the printing device 20 and electronic device 50 may comprise components that facilitate communication over the network 40 (e.g., antennas, ports, transistors, receivers, transceivers, etc.); however, these additional components are not specifically shown in FIG. 1 so as to simplify the drawing.
  • a selection may be made by the owner that result in an operational arrangement for the printing device 20.
  • an owner may elect to enter into a servicing agreement and/or warranty agreement for the printing device 20 that may result in a corresponding operational arrangement being selected or otherwise assigned to the printing device 20.
  • the mere selection of a particular model, version, or the selections of desired functions for the printing device 20 as a part of the purchasing or acquisition process may also result an operational arrangement selection for the printing device 20.
  • a servicing agreement may comprise an agreement between the owner and source of the printing device 20, stipulating that the source (or an agent thereof) is to supply components (e.g., components 30, 32, 34, 36) and/or perform services related to the printing device 20 throughout some or all of the operational life thereof.
  • a warranty agreement may comprise an agreement between the owner and source that the printing device 20 (or components 30, 32, 34, 36 thereof) may be replaced or repaired by the source at no additional charge during some or all of the operational life of the printing device 20, given that the printing device 20 is utilized in a defined and acceptable manner.
  • the source may allow the owner to purchase the printing device 20 at a reduced cost.
  • an owner may specifically choose to purchase a lower priced model or version of the printing device 20 that may not perform all of the potential, available functions during the purchasing process. As a result of any of these transactional arrangements, an owner may effectively select an operational arrangement of the printing device 20 as a part of the acquisition process.
  • an operational arrangement for the printing device 20 refers to a configuration of the printing device 20 that may specify the components (e.g., components 30, 32, 34, 36) may be installed within and/or the functions may be performed by the printing device 20.
  • the approved components and/or functions may result from an agreement (e.g., servicing agreement, warranty agreement, leasing agreement, etc.) and/or a purchasing selection (e.g., purchasing a lower priced model of printing device 20) as previously described.
  • an owner may be prohibited from using components 30, 32, 34, 36 that are not produced by and/or licensed from the source.
  • an owner may be prohibited from installing certain components 30, 32, 34, 36 (regardless of whether they are manufactured and/or licensed by the source) and/or to performing functions with the printing device 20 that were not available on the version or model of the printing device 20 that was actually purchased by the owner.
  • certain components 30, 32, 34, 36 regardless of whether they are manufactured and/or licensed by the source
  • a component constraint may be provided to and stored on the printing device 20 as machine- readable instructions (e.g., such as machine-readable instructions 26 stored on memory 28).
  • a component constraint refers to a rule (or multiple rules) relating to the components 30, 32, 34, 36 and/or functions of the printing device 20 that are based on the selected operational arrangement.
  • the component constraint may include machine- readable instructions that place limitations on the source of a component 30, 32, 34, 36 (e.g., that the component 30, 32, 34, 36 are to be manufactured and/or licensed by the source of the printing device 20).
  • the component constraint may include machine-readable instructions that place a restriction on the installation or use of a component 30, 32, 34, 36 entirely (e.g., regardless of the source of the component) and/or performance of a function with the printing device 20.
  • the component constraint may be provided to the printing device 20 at a manufacturing facility.
  • the component constraint may be provided to the printing device 20 by the electronic device 50 over the network 40.
  • the controller 22 may monitor the components 30, 32, 34, 36 installed therein and/or functions of the printing device 20 for compliance with the component constraint. Specifically, the controller 22 may determine an identification profile of the printing device 20 that includes an identification of the components 30, 32, 34, 36 installed therein. The controller 22 may then compare the identification profile to the component constraint, and based on this comparison, may allow or deny a function of the printing device 20.
  • the controller 22 may determine (as a result of a comparison of the identification profile to the component constraint) that the replacement component 30 was not manufactured and/or licensed by the source of the printing device 20 in violation of the component constraint. As a result, the controller 22 may deny use of the replacement component 30 and any function(s) performed wholly or partially thereby.
  • the replacement component 30 may comprise a printing agent cartridge, and the controller 22 (based on the comparison of the identification profile to the component constraint) may deny use of the replacement printing agent cartridge and thus possibly the entire printing functionality of the printing device 20.
  • the printing device 20 may also provide the identification profile to the electronic device 50 via the network 40.
  • the electronic device 50 may then also compare the identification profile to the component constraint and note whether the printing device 20 is being operated outside of the selected operational arrangement.
  • the electronic device 50 may provide an instruction to the printing device 20, via the network 40, to allow or deny a function performed (e.g., wholly or partially) by the replacement component 30 based on the comparison between the identification profile and the component constraint by the electronic device 50.
  • a printing device 20 may also provide the component constraint stored thereon to the electronic device 50 via the network 40.
  • the component constraint may be communicated from the printing device 20 to the electronic device 50 with or without the identification profile as noted above.
  • the electronic device 50 may compare the component constraint provided from the printing device 20 to a verified component constraint that is stored on (or accessible by) the electronic device 50. Based on this comparison, the electronic device 50 may determine whether the component constraint stored on the printing device 20 has been altered.
  • the electronic device 50 may generate a suitable alert (e.g., a message, alarm, flag, etc.) so as to alert the source (or an agent thereof) of the unauthorized change to the component constraint for the printing device 20.
  • a suitable alert e.g., a message, alarm, flag, etc.
  • the electronic device 50 may also send a copy of the verified component constraint that was stored in (or accessible by) the electronic device 50 to the printing device 20 to replace the component constraint stored on the printing device 20 and thereby effectively override the attempted change to the component constraint for the printing device 20.
  • an operational arrangement may be changed during the operational life of the printing device 20.
  • the owner of the printing device 20 may enter into and/or modify a suitable agreement (e.g., warranty agreement, servicing agreement, etc.) that may result in a different or updated operational arrangement for the printing device 20, which includes an updated component constraint corresponding thereto.
  • the operational arrangement change may be noted by the electronic device 50 (e.g., as a result of a change in the information stored in or accessible by the electronic device 50 by the source, as a result of an instruction or indication thereof received by the electronic device 50, etc.).
  • the electronic device 50 may then determine an updated component constraint based on the updated operational arrangement and then send the updated component constraint to the printing device 20 via the network 40 so that the printing device 20 may then compare subsequently generated identification profiles to the updated component constraint thereafter.
  • a source may monitor for violations of an agreement or purchasing arrangement relating to the printing device 20.
  • the use of unauthorized components within or the performance of unauthorized functions of the printing device 20 may be prevented.
  • unauthorized attempts e.g., by the owner or other individual to manipulate the component constraint stored on the printing device 20 so as to allow for the installation of otherwise unauthorized components (e.g., components 30, 32, 34, 36), and/or the performance of unauthorized functions may be detected and possibly corrected.
  • the printing device 20 may generate an identification profile as previously described.
  • the identification profile may comprise a collection of identifying information for the components 30, 32, 34, 36. Any suitable identifying information may be utilized as long as the identifying information is sufficiently unique to identify a particular component 30, 32, 34, 36 and/or a model version, type, etc. thereof.
  • the identifying information may comprise a serial number or other identifying number or sequence.
  • the identification profile determined by the controller 22 may comprise signals or information that is communicated between the controller 22 and components 30, 32, 34, 36.
  • the controller 22 may communicate with a component 30, 32, 34, 36 for purposes of identifying the component (e.g., component 30) and ultimately determining whether that component 30 is authorized in light of the component constraint.
  • the communication between the controller 22 and the component 30, 32, 34, 36 may comprise a verification and/or certification challenge by the controller 22.
  • verification challenge are described below for the component 30.
  • the controller 22 may send a first signal (e.g., an interrogation signal) to the component 30, and then may wait for a corresponding second signal (e.g., a response signal) from the component 30.
  • the controller 22 may then analyze the second signal to verify whether it meets certain rules that may allow the controller 22 to verify that the component 30 is of an approved make, model, type, etc.
  • a suitable encryption method may be utilized for the communications between the controller 22 and component 30 so as to avoid forgery of the second signal provided to the controller 22.
  • the controller 22 and/or the component 30 may employ cryptographic encryption techniques so as to further ensure that the verification of the component 30 by the controller 22 is genuine.
  • the second signal from the component 30 may be derived from a cryptographic encryption function.
  • the communications between the controller 22 and the component 30 may include authentication signatures (e.g., such as cryptographically generated authentication signatures) so as to further ensure that the verification of the component 30 by the controller 22 is genuine.
  • authentication signatures e.g., such as cryptographically generated authentication signatures
  • any suitable encryption or security protocol or technique may be used in various examples. Regardless of the specific security and/or encryption method(s) used for the communication between the controller 22 and component 30, if the component 30 should fail to produce the second signal as noted above (e.g., either by providing an incorrect signal or not providing a response signal at all), the controller 22 may determine that the component 30 is not of a make, model, type, etc. that is in accordance with the component constraint.
  • the communication between the controller 22 and component 30, and/or the result of the communication may be included in the identification profile.
  • the communications between the controller 22 and the electronic device 50 described herein may also include any suitable encryption, signature, and/or other security measures.
  • the communications between the controller 22 and the electronic device 50 described herein may include any of the security measures mentioned above for the communications between the controller 22 and the component 30 (e.g., encryption, authentication signatures, etc.).
  • the controller 22 of the printing device 20 and/or the electronic device 50 may also note various anomalies (e.g., other than those already noted above) based on the comparison of the identification profile and the component constraint.
  • an anomaly may indicate that a nonauthorized component (e.g., components 30, 32, 34, 36) has been installed within the printing device 20 and/or that a previous authorized component has been tampered with or modified (thereby causing that component to become an unauthorized component).
  • the anomalies may include the use of the same identifying information in a replaced component (e.g., components 30, 32, 34, 36) that was already utilized for a component in the same printing device 20 or a different printing device that is in communication with the electronic device 50 (which may indicate reuse of damaged, discarded, and/or counterfeit components), frequent component replacements, etc.
  • a machine learning model (or plurality thereof) (e.g., such as linear regression, classification, a neural network, etc.) may be utilized (e.g., via the electronic device 50) to verify whether certain anomalies indicate true component constraint violations within the printing device 20.
  • FIGS. 2-4 show example machine-readable instructions 100, 200, 300 that may be performed by controller 22 and/or electronic device 50 to monitor for and potentially address violations of a component constraint based on an operational arrangement for a printing device 20.
  • the machine-readable instructions 100, 200, 300 may be stored on memory 28 and/or memory 58 as an example of machine-readable instructions 26, 56, respectively, that may be executed by processors 24, 52, respectively (see e.g., FIG. 1).
  • processors 24, 52 respectively
  • FIG. 1 In describing the features of machine-readable instructions 100, 200, 300, continuing reference will be made to the schematic depictions of system 10 in FIG. 1, so as to provide clarity.
  • additional machine-readable instructions may be added or supplemented into the machine-readable instructions 100, 200, 300 shown in FIGS. 2-4, so as to allow for any of the additional functionality of the system 10 as described herein.
  • machine- readable instructions 100 may be stored on memory 28 of controller 22 as some or all of the machine-readable instructions 26 previously described.
  • Machine- readable instructions 100 include, at block 102, receiving a component constraint for a printing device from an electronic device over a network.
  • the component constraint may include approved components for the printing device, and the approved components may be determined based on an operational arrangement selected from a plurality of operational arrangements for the printing device.
  • the component constraint may be received from the electronic device 50 as a part of a start-up or connection sequence for the printing device 20 (e.g., such as when communication is established between the printing device 20 and electronic device 50 for a first or subsequent time over the network 40), and/or may be received at various points during the operational life of the printing device 20 (e.g., such as when a new component 30, 32, 34, 36 is installed into the printing device 20, at regular period intervals, etc.).
  • machine-readable instructions 100 include generating an identification profile of the plurality of components of the printing device at block 104.
  • the identification profile may include an identification of the plurality of components.
  • the identification profile may include identifying numbers or sequences (e.g., serial numbers) of the components and/or a verification communication (or a result or signal thereof) between the controller 22 and the components (e.g., components 30, 32, 34, 36).
  • machine-readable instructions 100 include comparing the identification profile to the component constraint at block 106, and allowing or denying a function of the plurality of functions of the printing device at block 108 based on the comparison at block 106.
  • the comparison between the identification profile and the component constraint may indicate that a component (or components) (e.g., components 30, 32, 34, 36) of the printing device 20 violates the component constraint (e.g., because they are not of an approved make, model, type, etc., are identified as previously used, damaged, discarded components, or are associated with other anomalies that indicate a violation of the component constraint).
  • the controller 22 may deny usage of the components 30, 32, 34, 36 that have been found to violate the component constraint, which may result in denying functions of the printing device 20 that may be performed (e.g., wholly or partially) by the violating components.
  • machine-readable instructions 200 may be stored on memory 58 of electronic device 50 as some or all of the machine-readable instructions 56 previously described.
  • Machine-readable instructions 200 include receiving an identification profile from a printing device at block 202.
  • the identification profile may include identifying information for a plurality of components of the printing device 20.
  • the machine-readable instructions 200 may include comparing the identification profile to a component constraint at block 204.
  • the component constraint may include approved components (e.g., components 30, 32, 34, 36) for the printing device 20, and the approved components may be based on an operational arrangement selected from a plurality of operational arrangements for the printing device 20.
  • the machine-readable instructions 200 include determining that the printing device is operating outside of the operational arrangement at block 206, based on the comparison in block 204.
  • the electronic device 50 may take further action based on the determination that the printing device 20 is operating outside of the established operational arrangement, such as, for instance, notifying a source, instructing the printing device 20 to deny a function thereof, etc.
  • machine- readable instructions 300 may be stored on memory 28 of controller 22 as some or all of the machine-readable instructions 26 previously described.
  • Machine- readable instructions 300 include determining an identification profile of a printing device at block 302.
  • the identification profile may include identifying information for a plurality of components (e.g., components 30, 32, 34, 36) that are to perform a plurality of functions of the printing device 20.
  • machine-readable instructions 300 include sending a first component constraint to an electronic device over a network at block 304.
  • the first component constraint may be stored on the printing device 20 (e.g., in memory 28) and may include approved components (e.g., components 30, 32, 34, 36) for the printing device 20.
  • the printing device 20 may send a component constraint stored on the printing device 20 to electronic device 50 over the network 40, either along with or separate from the identification profile.
  • the component constraint (or some form thereof) that is stored on the printing device 20 may have originally been provided to the printing device 20 from the electronic device 50 or may have been installed on the printing device 20 at a manufacturing facility.
  • machine-readable instructions 300 include receiving a second component constraint from the electronic device over the network at block 306.
  • the second component constraint may be different from the first component constraint, and, like the first component constraint, the second component constraint may include approved components for the printing device.
  • the second component constraint may be based on an operational arrangement selected from a plurality of operational arrangements for the printing device (and thus may be a verified component constraint for the printing device as previously described).
  • the component constraint stored on the printing device 20 may be altered (e.g., by an owner or other party), so as to potentially allow for the use of otherwise unauthorized components and/or the performance of unauthorized functions with the printing device 20.
  • the currently stored component constraint in the printing device 20 may be supplied to the electronic device 50, and the electronic device 50 may compare the currently stored component constraint with a verified component constraint (e.g., the second component constraint in machine-readable instructions 300) stored on (or accessible to) the electronic device 50.
  • the verified component constraint may be based on the currently selected operational arrangement for the printing device 20.
  • the electronic device 50 may send the verified component constraint to the printing device 20 so as to replace the currently stored component constraint and thereby override any unauthorized attempts to modify the printing device 20 to accept unauthorized components and/or perform unauthorized functions (e.g., in light of the operational arrangement).
  • machine-readable instructions 300 include comparing the identification profile to the second component constraint at block 308, and allowing or denying a function of the plurality of functions of the printing device at block 310, based on the comparison at block 308. These operations may be generally carried out in the manner previously described.
  • the examples disclosed herein include methods of monitoring the components and/or functions of a printing device (or other suitable device as noted herein) to determine whether unauthorized components have been installed on the printing device and/or whether unauthorized changes have been made to machine-readable instructions (e.g., a component constraint) stored on the printing device.
  • a printing device e.g., a controller thereof
  • a remote electronic device e.g., electronic device 50
  • a source of a printing device e.g., a manufacturer and/or seller
  • a printing device e.g., printing device 20
  • the above-described techniques may be utilized to monitor for unauthorized components and/or functions of other types of devices.
  • the techniques described hereby may be applied to monitor for unauthorized components and/or functions of a computing device (e.g., a laptop computer, desktop computer, all-in-one computer, tablet computer, etc.), a smart phone, a household or industrial appliance (e.g., refrigerator, dishwasher, oven, stove, microwave oven, etc.).
  • a computing device e.g., a laptop computer, desktop computer, all-in-one computer, tablet computer, etc.
  • a smart phone e.g., a household or industrial appliance
  • a household or industrial appliance e.g., refrigerator, dishwasher, oven, stove, microwave oven, etc.
  • the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to... .”
  • the term “couple” or “couples” is intended to be broad enough to encompass both indirect and direct connections. Thus, if a first device couples to a second device, that connection may be through a direct connection or through an indirect connection via other devices, components, and connections.

Abstract

Example printing devices are disclosed herein. In an example, the printing device includes a plurality of components that are to perform a plurality of functions. In addition, the printing device includes a controller coupled to the plurality of components. The controller is to receive a component constraint for the printing device from an electronic device over a network. The component constraint includes approved components for the printing device, and the approved components are based on an operational arrangement selected from a plurality of operational arrangements for the printing device. In addition, the controller is to generate an identification profile of the plurality of components. The identification profile includes an identification of the plurality of components. Further, the controller is to compare the identification profile to the component constraint, and allow or deny a function of the plurality of functions of the printing device based on the comparison.

Description

COMPONENT CONSTRAINTS FOR PRINTING DEVICES
BACKGROUND
[0001] A printing device may include components that provide the printing device with a plurality of functions. For instance, a component of a printing device may include a printing agent cartridge (e.g., toner, ink, etc.) that may be utilized to form images on print media (e.g., paper). In addition, a component of a printing device may include modules for performing various other functions of the printing device (e.g., wireless communications, scanning, copying, facsimile transmissions, email communications, etc.). Throughout the operational life of a printing device, a component or components of the printing device may be replaced due to wear, compatibility, exhaustion of a consumable (e.g., printing agent), etc.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] Various examples will be described below referring to the following figures:
[0003] FIG. 1 is a schematic diagram of a system for monitoring for compliance with a component constraint that is based on an operational arrangement of a printing device according to some examples; and
[0004] FIGS. 2-4 are diagrams of machine-readable instructions for monitoring for compliance with a component constraint that is based on an operational arrangement of a printing device according to some examples.
DETAILED DESCRIPTION
[0005] As previously described, a printing device may include components that may be replaced during the operational life thereof. In some instances, a manufacturer and/or seller (e.g., collectively referred to as a “source") of a printing device may specify that approved replacement components are to be utilized within the printing device so as to avoid violating a warranty or other contractual arrangement involving the printing device. An approved replacement component may comprise a component that is manufactured and/or sold by the source of the printing device, or is licensed by the source. In some instances, it may be difficult for the source to know and/or verify whether components that are installed into a printing device are approved components, such that violations of an agreement and/or unauthorized modifications to the printing device may go undetected by the source. In addition, it may also be particularly difficult for a source to detect instances when machine-readable instructions stored on a printing device have been altered.
[0006] Accordingly, examples disclosed herein include methods of monitoring the components and/or functions of a printing device (or other suitable device as noted herein) to determine whether unauthorized components have been installed on the printing device and/or whether unauthorized changes have been made to machine-readable instructions stored on the printing device. In some examples, a printing device (e.g., a controller thereof) may determine whether the components installed therein comply with a component constraint that is based on an operational arrangement for the printing device.
[0007] As used herein, the term “component constraint” refers to a rule, limitation, or the like for a component (or components) that may be installed within or used with a printing device (or other suitable device as noted below). In some instances, a component constraint may comprise a limitation for the source (i.e., a source limitation) of a component of the printing device. The component constraint may include approved components and/or approved functions for the printing device. In some implementations, a component constraint may comprise an instruction (or instructions) that may be stored in a memory of a printing device and/or another electronic device.
[0008] As noted above, the component constraint may be based on an operational arrangement for the printing device. As used herein, the term “operational arrangement” refers to a configuration of the printing device that may specify the components may be installed within and/or the functions may be performed by the printing device. The operational arrangement may relate to an arrangement, transaction, agreement, etc. that involves the printing device. For instance, as described in more detail below, an operational arrangement may be based on a warranty or servicing agreement between the source and the owner of the printing device. In addition, in some instances the operational arrangement may relate to a purchasing transaction for the printing device (e.g., such as a selected model or version of the printing device that is chosen and purchased by the owner). Accordingly, the operational arrangement may be varied in a number of ways in various examples.
[0009] Referring now to FIG. 1, a system 10 for monitoring for compliance with a component constraint that is based on an operational arrangement for a printing device 20 is shown. Generally speaking, system 10 includes the printing device 20, and an electronic device 50 that may communicate with the printing device 20 over a network 40.
[0010] Printing device 20 may comprise any device that is to place text, images, graphics, lines, or other markings (collectively referred to herein as “images”) on a print media, which may comprise paper or some other medium suitable for receiving the images thereon. The printing device 20 may be a printer, copier, scanner, facsimile device, or a device that is to perform printing as well as scanning, copying, facsimile transmission, or a combination thereof. The printing device 20 may place images on print media with a printing agent that may comprise toner, liquid printing agent (e.g., ink), etc., and may utilize a suitable printing technique (e.g., laser printing, inkjet printing, dot matrix printing, thermal printing, etc.).
[0011] As shown in FIG. 1, printing device 20 may include a plurality of components 30, 32, 34, 36 that are to perform a plurality of functions of the printing device 20. For instance, some of the components 30, 32, 34, 36 may comprise cartridges of printing agent. In addition, some of the components 30, 32, 34, 36 may comprise components, systems, modules, etc. that may perform (e.g., wholly or partially) a function or functions of the printing device 20. For instance, some of the components 30, 32, 34, 36 may comprise electronic components (e.g., printed circuit board (PCB), processors, memories, antennas, etc.) that may impart printing device 20 with various functions such as, for instance, copying, scanning, printing, facsimile communication, email communication, wireless communication, etc.
[0012] In addition, as is also shown in FIG. 1 , the printing device 20 may include a controller 22 that comprises a processor 24 and a memory 28. The controller 22 may comprise a dedicated controller within the printing device 20 for performing the various functions described herein. Alternatively, some or all of the components of controller 22 (e.g., processor 24, memory 28, etc.) may be incorporated within a central processing unit (CPU) or other electronic board or component of the printing device 20, such that, in addition to the functions described herein, the controller 22 may control or facilitate the general operations of printing device 20.
[0013] The processor 24 (e.g., microprocessor) executes machine-readable instructions 26 stored on memory 28 (e.g., a non-transitory machine-readable medium), thereby causing the processor 24 (and, more generally, the controller 22) to perform some or all of the actions attributed herein to the processor 24 (and, more generally, to the controller 22 and the printing device 20). The memory 28 may comprise volatile storage (e.g., random access memory (RAM)), non-volatile storage (e.g., flash storage, etc.), or combinations of both volatile and non-volatile storage. Data read or written by the processor 24 when executing the machine-readable instructions 26 can also be stored on memory 28.
[0014] Electronic device 50 may comprise any device or assembly that includes components such as processors (e.g., to execute machine-readable instructions), power supplies, memory, etc. For example, an electronic device 50 may include a server, a desktop computer, a smart phone, a tablet computer, a laptop computer, etc. In some examples, the electronic device 50 may include a collection of devices (e.g., such as those listed above). Generally speaking, the electronic device 50 includes a processor 52 and a memory 58 that may include many or all of the attributes previously described for the processor 24 and memory 28 of controller 22. Specifically, the processor 52 (e.g., microprocessor) executes machine-readable instructions 56 stored on memory 58 (e.g., a non- transitory machine-readable medium), thereby causing the processor 52 (and, more generally, the electronic device 50) to perform some or all of the actions attributed herein to the processor 52 (and, more generally, to the electronic device 50). The memory 58 may comprise volatile storage (e.g., random access memory (RAM)), non-volatile storage (e.g., flash storage, etc.), or combinations of both volatile and non-volatile storage. Data read or written by the processor 52 when executing the machine-readable instructions 56 can also be stored on memory 58.
[0015] Referring still to FIG. 1, the network 40 may comprise any local and/or wide area network that may facilitate communication between devices (e.g., a local wired or wireless network, the Internet, a cellular network, or a combination thereof). In some examples, the communication between the printing device 20 and the electronic device 50 may comprise wired communication and/or wireless communication (e.g., such as via WiFi, BLUETOOTH®, and/or other radio frequency (RF) based communication). As a result, the printing device 20 and electronic device 50 may comprise components that facilitate communication over the network 40 (e.g., antennas, ports, transistors, receivers, transceivers, etc.); however, these additional components are not specifically shown in FIG. 1 so as to simplify the drawing.
[0016] At the initial purchase or other acquisition (e.g., lease) of the printing device 20, a selection (or selections) may be made by the owner that result in an operational arrangement for the printing device 20. For instance, an owner may elect to enter into a servicing agreement and/or warranty agreement for the printing device 20 that may result in a corresponding operational arrangement being selected or otherwise assigned to the printing device 20. In addition, the mere selection of a particular model, version, or the selections of desired functions for the printing device 20 as a part of the purchasing or acquisition process may also result an operational arrangement selection for the printing device 20.
[0017] In particular, a servicing agreement may comprise an agreement between the owner and source of the printing device 20, stipulating that the source (or an agent thereof) is to supply components (e.g., components 30, 32, 34, 36) and/or perform services related to the printing device 20 throughout some or all of the operational life thereof. A warranty agreement may comprise an agreement between the owner and source that the printing device 20 (or components 30, 32, 34, 36 thereof) may be replaced or repaired by the source at no additional charge during some or all of the operational life of the printing device 20, given that the printing device 20 is utilized in a defined and acceptable manner. In some instances, as consideration for the above-noted agreements, the source may allow the owner to purchase the printing device 20 at a reduced cost. In addition, in some instances, an owner may specifically choose to purchase a lower priced model or version of the printing device 20 that may not perform all of the potential, available functions during the purchasing process. As a result of any of these transactional arrangements, an owner may effectively select an operational arrangement of the printing device 20 as a part of the acquisition process.
[0018] As previously described, an operational arrangement for the printing device 20 refers to a configuration of the printing device 20 that may specify the components (e.g., components 30, 32, 34, 36) may be installed within and/or the functions may be performed by the printing device 20. The approved components and/or functions may result from an agreement (e.g., servicing agreement, warranty agreement, leasing agreement, etc.) and/or a purchasing selection (e.g., purchasing a lower priced model of printing device 20) as previously described. For instance, as a part of the operational arrangement, an owner may be prohibited from using components 30, 32, 34, 36 that are not produced by and/or licensed from the source. As another example, as a part of the operational arrangement, an owner may be prohibited from installing certain components 30, 32, 34, 36 (regardless of whether they are manufactured and/or licensed by the source) and/or to performing functions with the printing device 20 that were not available on the version or model of the printing device 20 that was actually purchased by the owner. Given the wide variety of possible combinations of prohibitions (e.g., depending on the specific circumstances surrounding the acquisition of the printing device 20), there may be a plurality of different operational arrangements that may be selected for the printing device 20, with each possible operational arrangement including unique restrictions on the potential components 30, 32, 34, 36 and functions of the printing device 20.
[0019] Upon and/or after acquisition of the printing device 20 (and the corresponding selection of the operational arrangement therefor), a component constraint may be provided to and stored on the printing device 20 as machine- readable instructions (e.g., such as machine-readable instructions 26 stored on memory 28). As is also generally described herein, a component constraint refers to a rule (or multiple rules) relating to the components 30, 32, 34, 36 and/or functions of the printing device 20 that are based on the selected operational arrangement. As an example, the component constraint may include machine- readable instructions that place limitations on the source of a component 30, 32, 34, 36 (e.g., that the component 30, 32, 34, 36 are to be manufactured and/or licensed by the source of the printing device 20). In some instances, the component constraint may include machine-readable instructions that place a restriction on the installation or use of a component 30, 32, 34, 36 entirely (e.g., regardless of the source of the component) and/or performance of a function with the printing device 20.
[0020] As will be described in more detail below, the component constraint may be provided to the printing device 20 at a manufacturing facility. In addition, the component constraint may be provided to the printing device 20 by the electronic device 50 over the network 40. Regardless of the delivery method, during the operational life of the printing device 20, the controller 22 may monitor the components 30, 32, 34, 36 installed therein and/or functions of the printing device 20 for compliance with the component constraint. Specifically, the controller 22 may determine an identification profile of the printing device 20 that includes an identification of the components 30, 32, 34, 36 installed therein. The controller 22 may then compare the identification profile to the component constraint, and based on this comparison, may allow or deny a function of the printing device 20. For instance, if a replacement of the component 30 is installed on the printing device 20, the controller 22 may determine (as a result of a comparison of the identification profile to the component constraint) that the replacement component 30 was not manufactured and/or licensed by the source of the printing device 20 in violation of the component constraint. As a result, the controller 22 may deny use of the replacement component 30 and any function(s) performed wholly or partially thereby. In one practical example, the replacement component 30 may comprise a printing agent cartridge, and the controller 22 (based on the comparison of the identification profile to the component constraint) may deny use of the replacement printing agent cartridge and thus possibly the entire printing functionality of the printing device 20.
[0021] In addition, the printing device 20 may also provide the identification profile to the electronic device 50 via the network 40. The electronic device 50 may then also compare the identification profile to the component constraint and note whether the printing device 20 is being operated outside of the selected operational arrangement. In some examples, the electronic device 50 may provide an instruction to the printing device 20, via the network 40, to allow or deny a function performed (e.g., wholly or partially) by the replacement component 30 based on the comparison between the identification profile and the component constraint by the electronic device 50.
[0022] Further, in some examples, a printing device 20 may also provide the component constraint stored thereon to the electronic device 50 via the network 40. The component constraint may be communicated from the printing device 20 to the electronic device 50 with or without the identification profile as noted above. Upon receipt of the component constraint, the electronic device 50 may compare the component constraint provided from the printing device 20 to a verified component constraint that is stored on (or accessible by) the electronic device 50. Based on this comparison, the electronic device 50 may determine whether the component constraint stored on the printing device 20 has been altered. Based on this determination, the electronic device 50 may generate a suitable alert (e.g., a message, alarm, flag, etc.) so as to alert the source (or an agent thereof) of the unauthorized change to the component constraint for the printing device 20. In addition, the electronic device 50 may also send a copy of the verified component constraint that was stored in (or accessible by) the electronic device 50 to the printing device 20 to replace the component constraint stored on the printing device 20 and thereby effectively override the attempted change to the component constraint for the printing device 20.
[0023] In some circumstances, an operational arrangement may be changed during the operational life of the printing device 20. For instance, at some point, the owner of the printing device 20 may enter into and/or modify a suitable agreement (e.g., warranty agreement, servicing agreement, etc.) that may result in a different or updated operational arrangement for the printing device 20, which includes an updated component constraint corresponding thereto. In some of these examples, the operational arrangement change may be noted by the electronic device 50 (e.g., as a result of a change in the information stored in or accessible by the electronic device 50 by the source, as a result of an instruction or indication thereof received by the electronic device 50, etc.). The electronic device 50 may then determine an updated component constraint based on the updated operational arrangement and then send the updated component constraint to the printing device 20 via the network 40 so that the printing device 20 may then compare subsequently generated identification profiles to the updated component constraint thereafter.
[0024] As a result of these general operations, a source may monitor for violations of an agreement or purchasing arrangement relating to the printing device 20. In addition, the use of unauthorized components within or the performance of unauthorized functions of the printing device 20 may be prevented. Further, unauthorized attempts (e.g., by the owner or other individual) to manipulate the component constraint stored on the printing device 20 so as to allow for the installation of otherwise unauthorized components (e.g., components 30, 32, 34, 36), and/or the performance of unauthorized functions may be detected and possibly corrected.
[0025] During these general operations with the printing device 20 (and/or electronic device 50), the printing device 20 may generate an identification profile as previously described. The identification profile may comprise a collection of identifying information for the components 30, 32, 34, 36. Any suitable identifying information may be utilized as long as the identifying information is sufficiently unique to identify a particular component 30, 32, 34, 36 and/or a model version, type, etc. thereof. For instance, the identifying information may comprise a serial number or other identifying number or sequence.
[0026] In some examples, the identification profile determined by the controller 22 may comprise signals or information that is communicated between the controller 22 and components 30, 32, 34, 36. For instance, in some instances, the controller 22 may communicate with a component 30, 32, 34, 36 for purposes of identifying the component (e.g., component 30) and ultimately determining whether that component 30 is authorized in light of the component constraint. The communication between the controller 22 and the component 30, 32, 34, 36 may comprise a verification and/or certification challenge by the controller 22. [0027] For purposes of explanation, examples of verification challenge are described below for the component 30. Specifically, during operations, the controller 22 may send a first signal (e.g., an interrogation signal) to the component 30, and then may wait for a corresponding second signal (e.g., a response signal) from the component 30. The controller 22 may then analyze the second signal to verify whether it meets certain rules that may allow the controller 22 to verify that the component 30 is of an approved make, model, type, etc. A suitable encryption method may be utilized for the communications between the controller 22 and component 30 so as to avoid forgery of the second signal provided to the controller 22. For instance, the controller 22 and/or the component 30 may employ cryptographic encryption techniques so as to further ensure that the verification of the component 30 by the controller 22 is genuine. Thus, in some examples, the second signal from the component 30 may be derived from a cryptographic encryption function. In some examples, the communications between the controller 22 and the component 30 may include authentication signatures (e.g., such as cryptographically generated authentication signatures) so as to further ensure that the verification of the component 30 by the controller 22 is genuine. However, any suitable encryption or security protocol or technique may be used in various examples. Regardless of the specific security and/or encryption method(s) used for the communication between the controller 22 and component 30, if the component 30 should fail to produce the second signal as noted above (e.g., either by providing an incorrect signal or not providing a response signal at all), the controller 22 may determine that the component 30 is not of a make, model, type, etc. that is in accordance with the component constraint. The communication between the controller 22 and component 30, and/or the result of the communication (e.g., a correct, incorrect, failed, etc. response from the component 30) may be included in the identification profile. [0028] In some examples, the communications between the controller 22 and the electronic device 50 described herein may also include any suitable encryption, signature, and/or other security measures. For instance, the communications between the controller 22 and the electronic device 50 described herein may include any of the security measures mentioned above for the communications between the controller 22 and the component 30 (e.g., encryption, authentication signatures, etc.).
[0029] In some examples, the controller 22 of the printing device 20 and/or the electronic device 50 may also note various anomalies (e.g., other than those already noted above) based on the comparison of the identification profile and the component constraint. In some examples, an anomaly may indicate that a nonauthorized component (e.g., components 30, 32, 34, 36) has been installed within the printing device 20 and/or that a previous authorized component has been tampered with or modified (thereby causing that component to become an unauthorized component). While there is no intent to limit the possible anomalies that may be detected by the controller 22 and/or the electronic device 50, in some instances, the anomalies may include the use of the same identifying information in a replaced component (e.g., components 30, 32, 34, 36) that was already utilized for a component in the same printing device 20 or a different printing device that is in communication with the electronic device 50 (which may indicate reuse of damaged, discarded, and/or counterfeit components), frequent component replacements, etc. In some examples, a machine learning model (or plurality thereof) (e.g., such as linear regression, classification, a neural network, etc.) may be utilized (e.g., via the electronic device 50) to verify whether certain anomalies indicate true component constraint violations within the printing device 20.
[0030] FIGS. 2-4 show example machine-readable instructions 100, 200, 300 that may be performed by controller 22 and/or electronic device 50 to monitor for and potentially address violations of a component constraint based on an operational arrangement for a printing device 20. In some examples, the machine-readable instructions 100, 200, 300 may be stored on memory 28 and/or memory 58 as an example of machine-readable instructions 26, 56, respectively, that may be executed by processors 24, 52, respectively (see e.g., FIG. 1). In describing the features of machine-readable instructions 100, 200, 300, continuing reference will be made to the schematic depictions of system 10 in FIG. 1, so as to provide clarity. In addition, additional machine-readable instructions may be added or supplemented into the machine-readable instructions 100, 200, 300 shown in FIGS. 2-4, so as to allow for any of the additional functionality of the system 10 as described herein.
[0031] Referring specifically now to FIG. 2, in some examples machine- readable instructions 100 may be stored on memory 28 of controller 22 as some or all of the machine-readable instructions 26 previously described. Machine- readable instructions 100 include, at block 102, receiving a component constraint for a printing device from an electronic device over a network. As previously described, the component constraint may include approved components for the printing device, and the approved components may be determined based on an operational arrangement selected from a plurality of operational arrangements for the printing device. For instance, the component constraint may be received from the electronic device 50 as a part of a start-up or connection sequence for the printing device 20 (e.g., such as when communication is established between the printing device 20 and electronic device 50 for a first or subsequent time over the network 40), and/or may be received at various points during the operational life of the printing device 20 (e.g., such as when a new component 30, 32, 34, 36 is installed into the printing device 20, at regular period intervals, etc.).
[0032] In addition, machine-readable instructions 100 include generating an identification profile of the plurality of components of the printing device at block 104. As previously described, the identification profile may include an identification of the plurality of components. In some examples, the identification profile may include identifying numbers or sequences (e.g., serial numbers) of the components and/or a verification communication (or a result or signal thereof) between the controller 22 and the components (e.g., components 30, 32, 34, 36). [0033] Further, machine-readable instructions 100 include comparing the identification profile to the component constraint at block 106, and allowing or denying a function of the plurality of functions of the printing device at block 108 based on the comparison at block 106. For instance, as previously described, the comparison between the identification profile and the component constraint may indicate that a component (or components) (e.g., components 30, 32, 34, 36) of the printing device 20 violates the component constraint (e.g., because they are not of an approved make, model, type, etc., are identified as previously used, damaged, discarded components, or are associated with other anomalies that indicate a violation of the component constraint). As a result, the controller 22 may deny usage of the components 30, 32, 34, 36 that have been found to violate the component constraint, which may result in denying functions of the printing device 20 that may be performed (e.g., wholly or partially) by the violating components.
[0034] Referring specifically now to FIG. 3, in some examples machine- readable instructions 200 may be stored on memory 58 of electronic device 50 as some or all of the machine-readable instructions 56 previously described. Machine-readable instructions 200 include receiving an identification profile from a printing device at block 202. As previously described, the identification profile may include identifying information for a plurality of components of the printing device 20. In addition, the machine-readable instructions 200 may include comparing the identification profile to a component constraint at block 204. As previously described, the component constraint may include approved components (e.g., components 30, 32, 34, 36) for the printing device 20, and the approved components may be based on an operational arrangement selected from a plurality of operational arrangements for the printing device 20. Further, the machine-readable instructions 200 include determining that the printing device is operating outside of the operational arrangement at block 206, based on the comparison in block 204. In some examples, the electronic device 50 may take further action based on the determination that the printing device 20 is operating outside of the established operational arrangement, such as, for instance, notifying a source, instructing the printing device 20 to deny a function thereof, etc.
[0035] Referring specifically now to FIG. 4, in some examples machine- readable instructions 300 may be stored on memory 28 of controller 22 as some or all of the machine-readable instructions 26 previously described. Machine- readable instructions 300 include determining an identification profile of a printing device at block 302. As previously described, the identification profile may include identifying information for a plurality of components (e.g., components 30, 32, 34, 36) that are to perform a plurality of functions of the printing device 20.
[0036] In addition, machine-readable instructions 300 include sending a first component constraint to an electronic device over a network at block 304. The first component constraint may be stored on the printing device 20 (e.g., in memory 28) and may include approved components (e.g., components 30, 32, 34, 36) for the printing device 20. For instance, as previously described, the printing device 20 may send a component constraint stored on the printing device 20 to electronic device 50 over the network 40, either along with or separate from the identification profile. The component constraint (or some form thereof) that is stored on the printing device 20 may have originally been provided to the printing device 20 from the electronic device 50 or may have been installed on the printing device 20 at a manufacturing facility.
[0037] Further, machine-readable instructions 300 include receiving a second component constraint from the electronic device over the network at block 306. The second component constraint may be different from the first component constraint, and, like the first component constraint, the second component constraint may include approved components for the printing device. However, the second component constraint may be based on an operational arrangement selected from a plurality of operational arrangements for the printing device (and thus may be a verified component constraint for the printing device as previously described). As previously described for the system 10, the component constraint stored on the printing device 20 may be altered (e.g., by an owner or other party), so as to potentially allow for the use of otherwise unauthorized components and/or the performance of unauthorized functions with the printing device 20. As a result, the currently stored component constraint in the printing device 20 (e.g., the first component constraint in machine-readable instructions 300) may be supplied to the electronic device 50, and the electronic device 50 may compare the currently stored component constraint with a verified component constraint (e.g., the second component constraint in machine-readable instructions 300) stored on (or accessible to) the electronic device 50. The verified component constraint may be based on the currently selected operational arrangement for the printing device 20. The electronic device 50 may send the verified component constraint to the printing device 20 so as to replace the currently stored component constraint and thereby override any unauthorized attempts to modify the printing device 20 to accept unauthorized components and/or perform unauthorized functions (e.g., in light of the operational arrangement).
[0038] Still further, machine-readable instructions 300 include comparing the identification profile to the second component constraint at block 308, and allowing or denying a function of the plurality of functions of the printing device at block 310, based on the comparison at block 308. These operations may be generally carried out in the manner previously described.
[0039] As described herein, the examples disclosed herein include methods of monitoring the components and/or functions of a printing device (or other suitable device as noted herein) to determine whether unauthorized components have been installed on the printing device and/or whether unauthorized changes have been made to machine-readable instructions (e.g., a component constraint) stored on the printing device. In some examples, a printing device (e.g., a controller thereof) and/or a remote electronic device (e.g., electronic device 50) may determine whether the components installed therein or whether functions performed by the printing device comply with a component constraint that is based on an operational arrangement for the printing device. Thus, through use of the examples described herein, a source of a printing device (e.g., a manufacturer and/or seller) may be better able to monitor for unauthorized components, modification, or functions of a printing device through the operational life thereof.
[0040] While examples disclosed herein have been described in the context of monitoring for unauthorized components and/or functions of a printing device (e.g., printing device 20), in other examples, the above-described techniques may be utilized to monitor for unauthorized components and/or functions of other types of devices. For instance, in some examples, the techniques described hereby may be applied to monitor for unauthorized components and/or functions of a computing device (e.g., a laptop computer, desktop computer, all-in-one computer, tablet computer, etc.), a smart phone, a household or industrial appliance (e.g., refrigerator, dishwasher, oven, stove, microwave oven, etc.). As a result, unless specifically and otherwise stated herein, the above-described techniques are not to be limited to printing devices in various examples.
[0041] In the figures, certain features and components disclosed herein may be shown exaggerated in scale or in somewhat schematic form, and some details of certain elements may not be shown in the interest of clarity and conciseness. In some of the figures, in order to improve clarity and conciseness, a component or an aspect of a component may be omitted.
[0042] In the following discussion and in the claims, the terms "including" and "comprising" are used in an open-ended fashion, and thus should be interpreted to mean "including, but not limited to... ." Also, the term "couple" or "couples" is intended to be broad enough to encompass both indirect and direct connections. Thus, if a first device couples to a second device, that connection may be through a direct connection or through an indirect connection via other devices, components, and connections.
[0043] As used herein, including in the claims, the word “or" is used in an inclusive manner. For example, “A or B” means any of the following: “A” alone, “B" alone, or both “A" and “B.”
[0044] The above discussion is meant to be illustrative of the principles and various examples of the present disclosure. Numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such variations and modifications.

Claims

CLAIMS What is claimed is:
1. A printing device, comprising: a plurality of components that are to perform a plurality of functions of the printing device; and a controller coupled to the plurality of components, wherein the controller is to: receive a component constraint for the printing device from an electronic device over a network, the component constraint including approved components for the printing device, the approved components based on an operational arrangement selected from a plurality of operational arrangements for the printing device; generate an identification profile of the plurality of components, the identification profile including an identification of the plurality of components; compare the identification profile to the component constraint; and allow or deny a function of the plurality of functions of the printing device based on the comparison.
2. The printing device of claim 1 , wherein the controller is to: receive an updated component constraint from the electronic device over the network; compare the identification profile to the updated component constraint; and allow or deny the function based on the comparison of the identification profile to the updated component constraint.
3. The printing device of claim 1, wherein the component constraint comprises a source limitation for a first component of the plurality of components, and wherein the controller is to: determine whether the first component complies with the source limitation; and allow or deny use of the first component based on the determination.
4. The printing device of claim 3, wherein the controller is to determine whether the first component complies with the source limitation by: sending a first signal to the one of the plurality of components; and determining whether a second signal is received from the one of the plurality of components in response to the first signal.
5. The printing device of claim 4, wherein the second signal is derived from the first signal via a cryptographic encryption function.
6. A method, comprising: receiving an identification profile from a printing device, the identification profile including identifying information for a plurality of components of the printing device; comparing the identification profile to a component constraint, the component constraint including approved components for the printing device, the approved components based on an operational arrangement selected from a plurality of operational arrangements for the printing device; and determining that the printing device is operating outside of the operational arrangement based on the comparison.
7. The method of claim 6, comprising sending the component constraint to the printing device over a network.
8. The method of claim 7, comprising: receiving an instruction to change the operational arrangement to a second operational arrangement selected from the plurality of operational arrangements, wherein the second operational arrangement is different from the operational arrangement; determining a second component constraint based on the second operational arrangement, wherein the second component constraint is different from the component constraint; and sending the second component constraint to the printing device over the network.
9. The method of claim 6, wherein comparing the identification profile to a component constraint comprises: determining whether a component of the plurality of components complies with a source limitation of the component constraint.
10. A non-transitory, machine-readable medium, storing instructions, which, when executed by a controller of a printing device, cause the controller to: determine an identification profile of the printing device, the identification profile including identifying information for a plurality of components that are to perform a plurality of functions of the printing device; send a first component constraint to an electronic device over a network, the first component constraint being stored on the printing device and including approved components for the printing device; receive a second component constraint from the electronic device over the network, the second component constraint being different from the first component constraint, the second component constraint including approved components for the printing device based on an operational arrangement selected from a plurality of operational arrangements for the printing device; compare the identification profile to the second component constraint; and allow or deny a function of the plurality of functions of the printing device based on the comparison.
11. The non-transitory, machine-readable medium of claim 10, wherein the instructions, when executed by the controller, cause the controller to store the second component constraint on the printing device in place of the first component constraint.
12. The non-transitory, machine-readable medium of claim 10, wherein the instructions, when executed by the controller, cause the controller to: receive an indication of a replacement component of the plurality of components; determine a second identification profile for the printing device, the second identification profile including identifying information for the replacement component; compare the identification profile to the second component constraint; and allowing or denying a function performed by the replacement component based on the comparison of the second identification profile to the second component constraint.
13. The non-transitory, machine-readable medium of claim 10, wherein the instructions, when executed by the controller, cause the controller to compare the identification profile to the second component constraint by determining whether a first component of the plurality of components complies with a source limitation of the second component constraint.
14. The non-transitory, machine-readable medium of claim 13, wherein the instructions, when executed by the controller, cause the controller to determine whether the first component complies with the source limitation by: sending a first signal to the first component; and determining whether a second signal is received from the first component in response to the first signal.
15. The non-transitory, machine-readable medium of claim 14, wherein the second signal is derived from the first signal via a cryptographic encryption function.
PCT/US2021/070812 2020-10-01 2021-07-01 Component constraints for printing devices WO2022072956A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202041042754 2020-10-01
IN202041042754 2020-10-01

Publications (1)

Publication Number Publication Date
WO2022072956A1 true WO2022072956A1 (en) 2022-04-07

Family

ID=80951852

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2021/070812 WO2022072956A1 (en) 2020-10-01 2021-07-01 Component constraints for printing devices

Country Status (1)

Country Link
WO (1) WO2022072956A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559606A (en) * 1995-11-28 1996-09-24 Xerox Corporation Flexible configuration of document output terminals from autonomous machine modules
JP2002333800A (en) * 2001-05-10 2002-11-22 Canon Inc Image forming device and its consumables, controlling device for image forming device and image forming system
JP2005251156A (en) * 2004-02-05 2005-09-15 Ricoh Co Ltd Electronic device, image formation device, control method of electronic device, program, recording medium, image formation device management system, member with digital certificate stored, digital certificate acquisition method and digital certificate setting system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559606A (en) * 1995-11-28 1996-09-24 Xerox Corporation Flexible configuration of document output terminals from autonomous machine modules
JP2002333800A (en) * 2001-05-10 2002-11-22 Canon Inc Image forming device and its consumables, controlling device for image forming device and image forming system
JP2005251156A (en) * 2004-02-05 2005-09-15 Ricoh Co Ltd Electronic device, image formation device, control method of electronic device, program, recording medium, image formation device management system, member with digital certificate stored, digital certificate acquisition method and digital certificate setting system

Similar Documents

Publication Publication Date Title
US10956556B2 (en) Protecting data in memory of a consumable product
US9864300B2 (en) CRUM chip, image forming device for verifying consumable unit comprising the CRUM chip, and methods thereof
US8453260B2 (en) Unit using OS and image forming apparatus using the same
US9413356B1 (en) Chip or SoC including fusible logic array and functions to protect logic against reverse engineering
KR101780734B1 (en) CRUM chip and image forming device for communicating mutually, and method thereof
US20170315472A1 (en) Imaging supply memory
US8281983B2 (en) Method and apparatus for storing and verifying serial numbers using smart labels in an image production device
EP3028173B1 (en) Methods and systems for determining authenticity of a consumable product
US9015427B2 (en) Systems and methods for employing an electronically-readable monitoring module associated with a customer replaceable component to update a non-volatile memory in an image forming device
US9207888B2 (en) Systems and methods for detecting customer cost/contract avoidance in operation of image forming devices
US9660802B1 (en) Systems and methods for generating and storing silicon fingerprints for a security chip
WO2022072956A1 (en) Component constraints for printing devices
CN107209691B (en) Providing ancillary services and functionality on a device
KR20070075101A (en) Method and apparatus for image forming
CN111361310A (en) RFID-based carbon ribbon authenticity identification method and device, printer and storage medium
US20180220044A1 (en) Systems and methods for preventing unauthorized usage and movement of electronic components from one device to another device
US11651063B2 (en) Component verification and revocation
KR101866823B1 (en) CRUM chip and image forming device for communicating mutually, and method thereof
CN116150821A (en) Authentication method and device of security chip, electronic equipment and readable storage medium
CN117980881A (en) Method for updating an electronic device
CN103839330A (en) Smart card, operation request output method and operation request response method and system
JP2017010477A (en) Authentication system and authentication method
JP2009193225A (en) Image forming apparatus and operation authority determining method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21876680

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21876680

Country of ref document: EP

Kind code of ref document: A1