WO2023124245A1 - Procédé de vérification, puce consommable, produit consommable et appareil de formation d'image - Google Patents

Procédé de vérification, puce consommable, produit consommable et appareil de formation d'image Download PDF

Info

Publication number
WO2023124245A1
WO2023124245A1 PCT/CN2022/118896 CN2022118896W WO2023124245A1 WO 2023124245 A1 WO2023124245 A1 WO 2023124245A1 CN 2022118896 W CN2022118896 W CN 2022118896W WO 2023124245 A1 WO2023124245 A1 WO 2023124245A1
Authority
WO
WIPO (PCT)
Prior art keywords
consumable
image forming
consumable chip
random number
chip
Prior art date
Application number
PCT/CN2022/118896
Other languages
English (en)
Chinese (zh)
Inventor
梁嘉俊
Original Assignee
珠海奔图电子有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 珠海奔图电子有限公司 filed Critical 珠海奔图电子有限公司
Publication of WO2023124245A1 publication Critical patent/WO2023124245A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/06Apparatus for electrographic processes using a charge pattern for developing
    • G03G15/08Apparatus for electrographic processes using a charge pattern for developing using a solid developer, e.g. powder developer
    • G03G15/0822Arrangements for preparing, mixing, supplying or dispensing developer
    • G03G15/0863Arrangements for preparing, mixing, supplying or dispensing developer provided with identifying means or means for storing process- or use parameters, e.g. an electronic memory
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G21/00Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
    • G03G21/16Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements
    • G03G21/18Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit
    • G03G21/1875Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit provided with identifying means or means for storing process- or use parameters, e.g. lifetime of the cartridge
    • G03G21/1878Electronically readable memory
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G21/00Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
    • G03G21/16Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements
    • G03G21/18Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit
    • G03G21/1875Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit provided with identifying means or means for storing process- or use parameters, e.g. lifetime of the cartridge
    • G03G21/1878Electronically readable memory
    • G03G21/1892Electronically readable memory for presence detection, authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • the present application relates to the technical field of image formation, in particular to a verification method, a consumable chip, a consumable and an image forming device.
  • consumables such as toner cartridges, ink cartridges, and toner cartridges are generally detachably installed in image forming devices such as printers as consumable products.
  • a consumable chip is installed on the consumable.
  • the image forming device will detect the consumable chip before using the consumable to perform imaging operations such as printing or copying, so as to determine whether the consumable is a legitimate consumable, such as whether it is an original consumable. Or whether it is a legal compatible consumable, etc., the consumable will start to use the consumable for imaging after passing the test.
  • the conventional method of detection is that the controller in the image forming device (such as the image forming control unit) sends an inquiry signal to the consumable chip, and when the response signal returned by the consumable chip matches the information stored in the memory of the image forming device, And when the time of the response signal returned by the consumable chip meets the predetermined requirement, the consumable is considered as legal consumable.
  • the controller in the image forming device such as the image forming control unit
  • the inventor found that due to the influence of the electrostatic field in the image forming device and the contact conditions (such as the size, shape, material) between the image forming device and the consumable chip, the image forming The communication between the device and consumables is often disturbed, making the reliability of the response signal returned by the consumable chip less reliable.
  • the time of the response signal returned by the consumable chip may be delayed, resulting in image formation
  • the device mistakenly identifies legitimate consumable chips as illegal, or recognizes illegal consumable chips as legitimate; on the other hand, the protection measures for communication between the consumable chip and the image forming device are relatively weak, and the response signal is easily intercepted by imitators , imitating the original chip to send a response signal, so that the non-original consumables are recognized as original.
  • the use of illegal consumables such as non-original consumables may damage the image forming device or reduce the image quality, affecting user experience.
  • the embodiment of the present application provides a verification method, a consumable chip, a consumable and an image forming device, which can improve the accuracy of the validity verification of the consumable chip and prevent misjudgment; and can also improve the communication between the consumable chip and the image forming device body Safety.
  • the embodiment of the present application provides a verification method, which is applied to a consumable chip, the consumable chip is installed on the consumable, the consumable is detachably installed in the image forming device, and digital certificate information is stored in the consumable chip; the method includes: consumable The chip sends a first feedback message to the image forming device in response to the first request; wherein, the first feedback message carries digital certificate information, and the digital certificate information includes at least a first public key; the first public key is based on the unique hardware of the consumable chip
  • the identifier PUF ID is generated; the first request is a request sent by the image forming device for obtaining a digital certificate; the consumable chip receives the identity challenge message sent by the image forming device; the identity challenge message includes the first encryption result, and the first encryption result is obtained by using The first public key is used to encrypt the first random number; the first random number is generated by the image forming device; the consumable chip uses the first private key to decrypt the first encrypted result to obtain the second random
  • the embodiment of the present application provides a chip for consumables.
  • the chip for consumables is used to be installed on consumables.
  • the consumables are used to be detachably installed in an image forming device.
  • Digital certificate information is stored in the consumables chip; the digital certificate information includes at least The first public key; the first public key is generated based on the unique hardware identifier PUF ID of the consumable chip; the chip control unit is also used to obtain the unique hardware identifier PUF ID of the consumable chip, and generate the first private key based on the PUF ID.
  • a private key and the first public key belong to the same key pair; the first private key is used to decrypt the first encrypted result to obtain a second random number; The random number is obtained by encryption; the second random number is used to obtain the verification result of the consumable chip.
  • an embodiment of the present application provides a consumable, including: a housing; a developer container located in the housing for accommodating the developer; and the consumable chip according to any one of the above-mentioned second aspects.
  • an embodiment of the present application provides a consumable, which includes: a photosensitive drum; a charging roller for charging the photosensitive drum; and the consumable chip according to any one of the above-mentioned second aspects.
  • the embodiment of the present application provides an image forming apparatus, including: consumables, on which the consumables chip according to any one of the above-mentioned second aspects is installed; an image forming control unit, configured to: send the consumables chip To obtain the first request for a digital certificate; receive the first feedback message sent by the consumable chip, and generate a first random number, use the first public key carried in the first feedback message to encrypt the first random number, and obtain the first An encryption result; sending an identity challenge message to the consumable chip, where the identity challenge message includes the first encryption result.
  • a digital certificate is stored in the consumable chip, and the digital certificate includes a first public key, and the first public key is generated based on the unique hardware identifier of the consumable chip, and also That is, the first public key is a public key associated with the unique hardware identifier of the consumable chip; after the consumable is installed in the image forming device, the consumable chip responds to the request (first request) for obtaining a digital certificate sent by the image forming device, Return the feedback message carrying the digital certificate information.
  • the image forming device After the image forming device obtains the first public key, it will use the first public key to encrypt the generated first random number, and then send the encrypted data (first encryption result) to The consumable chip, if the consumable chip is a legal chip, the consumable chip will hold the first private key, the first private key is generated based on the unique hardware identifier, that is, the first private key is the private key associated with the unique hardware identifier of the consumable chip key, the first private key can decrypt the first encryption result, and the decrypted second random number is the same as the first random number.
  • the consumable chip is an illegal chip, the consumable chip will not hold the first private key , so the first encryption result cannot be decrypted or the decrypted random number is different from the first random number, so when the image forming device sends an identity challenge message to the consumable chip, the image forming device decrypts the first random number If the response information is correct, you can know whether the consumable chip is legal. This scheme does not depend on the feedback time of the response signal, so it is not affected by the communication environment between the consumable chip and the image forming device, and in this scheme, only the legal consumable chip can generate the first private key, and the first private key The key is generated based on the unique hardware identifier PUF ID, which is non-replicable and cannot be imitated. Therefore, even if the exchange information between the consumable chip and the image forming device is intercepted, it will not affect the verification of the consumable chip, so the verification result is reliable. Sex is higher.
  • FIG. 1 is a schematic flow diagram of an embodiment of a verification method provided in an embodiment of the present application
  • FIG. 2 is a system architecture diagram of a verification method provided in an embodiment of the present application.
  • Fig. 3 is an interactive flowchart of a verification method provided by the embodiment of the present application.
  • FIG. 4 is an interactive flowchart for generating a digital certificate in the embodiment of the present application.
  • FIG. 5 is a structural cross-sectional view of an image forming device provided by an embodiment of the present application.
  • Fig. 6 is a schematic structural diagram of an embodiment of consumables provided by the embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an image forming apparatus provided by an embodiment of the present application.
  • the embodiment of the present application provides a verification method, which can be applied to the scene of verifying consumable chips based on various image forming devices. Detachable connection.
  • An image forming device refers to various devices used to perform image forming operations.
  • An image forming job may be at least one of operations such as generation, printing, copying, and scanning.
  • An image forming device may also be used to receive and send image data, for example Specifically, the image forming apparatus may be an inkjet printer, a laser printer, an LED (Light Emitting Diode, light emitting diode) printer, a copier, a scanner, or a multifunctional facsimile machine, and a multifunctional peripheral performing the above functions in a single device.
  • Equipment MFP, Multi-Functional Peripheral
  • a complete image forming device mainly includes an image forming control unit, an image forming part, consumables, and a memory, wherein the consumables include consumable chips, the image forming control unit is used to control the entire image forming device, and the image forming part is used for Based on the image data, an image is formed on the conveyed paper under the control of the image forming control unit.
  • the image forming control unit may be a SoC (System on Chip, system on a chip).
  • SoC is a miniature system composed of multiple system components configured to control the imaging processing operations of the image forming device, such as processing image data Perform linear correction, noise reduction, bad point removal, detail enhancement and other processing to improve the quality of image output.
  • the image formation control unit is also used to perform engine control related processing operations such as data transmission and reception, command transmission and printing, and image printing, for example, through the interface unit (including but not limited to USB port, wired network port, wireless network port or other interfaces, etc.) to send and receive data, print engine control commands, status, etc.
  • the interface unit including but not limited to USB port, wired network port, wireless network port or other interfaces, etc.
  • the image forming control unit is responsible for verifying the consumable chip, reading and writing characteristic information on the consumable chip, and controlling the image forming unit.
  • the image forming control unit obtains specified image forming parameters, such as high voltage parameters, etc., and coordinates each image forming mechanism according to the image forming parameters, so that the correct image content is displayed on the medium.
  • Consumables can be toner cartridges, ink cartridges, toner cartridges, laser toner cartridges, organic photoconductors (Organic Photo Conductor, OPC, referred to as photosensitive drums), etc.
  • the consumable chip refers to the chip installed on the consumable, which is used to store the characteristic parameters in image formation, the remaining quantity of the consumable and other parameters.
  • the consumable chip in the embodiment of the present application also stores information such as digital certificates.
  • the non-volatile storage unit is used to store the digital certificate of the CA server and other information that needs to be saved when the power is turned off.
  • a complete image forming device includes consumables, and in the embodiment of this application, unless otherwise specified, in the following description of the verification method, the image forming device refers to the body structure of the image forming device that does not contain consumables, and the body of the image forming device Specifically, the structure may include an image forming control unit, for example, sending a message to an image forming device, specifically, sending a message to an image forming control unit. In other embodiments, it may also be other components with communication functions in the image forming device, for example, a message may also be sent to the wireless communication module of the image forming device, and the image forming control unit on the side of the image forming device communicates with the Consumable chip communication.
  • an image forming control unit for example, sending a message to an image forming device, specifically, sending a message to an image forming control unit.
  • it may also be other components with communication functions in the image forming device, for example, a message may also be sent to the wireless communication module of the image forming device, and
  • the complete image forming device is divided into consumables and the main body structure of the image forming device for description, and in the process of interaction between the consumable chip and the image forming device, the image forming device refers The body structure of consumables.
  • the body or body structure of the image forming apparatus refers to at least one of other hardware components in the image forming apparatus except consumables.
  • the embodiment of the present application provides a verification method.
  • the execution subject is a consumable chip.
  • the consumable chip is a chip manufactured based on PUF-Physically Unclonable Function (PUF).
  • PUF ID the unique hardware identifier
  • the PUFID is an electrical and electrical fingerprint.
  • the electronic fingerprint is related to the naturally occurring physical characteristics of semiconductor devices during the wafer manufacturing process and is used to distinguish other same Semiconductor equipment (such as consumable chips).
  • the method may include the following processes:
  • a digital certificate is stored in the consumable chip, and the digital certificate information includes at least a first public key, and the first public key is generated based on the unique hardware identifier PUF ID of the consumable chip. For example, an asymmetric encryption algorithm is implemented on the unique hardware identifier, and the generated public key is the first public key. The first public key is associated with the PUF ID.
  • the digital certificate is stored in the consumable chip, which may be stored in the chip control unit, or stored in a storage unit external to the chip control unit.
  • the consumable chip After receiving the first request sent by the image forming device, the consumable chip will send a first feedback message to the image forming device, and the first feedback message carries digital certificate information.
  • the first request is a request issued by the image forming apparatus for obtaining a digital certificate.
  • the identity challenge message carries a first encryption result, and the first encryption result is obtained by encrypting the first random number with the first public key; the first random number is generated by the image forming device.
  • the image forming device verifies the digital certificate sent by the consumable chip, and generates a random number after passing the verification, and the random number is the first random number.
  • the digital certificate not only includes the first public key generated based on the PUF ID of the consumable chip, but also includes the signature value of the digital certificate, which can be understood as a key used to identify the identity of the digital certificate Uniquely identifying information.
  • the signature value of the digital certificate can be calculated and generated based on the first public key and digital certificate attribute information according to a preset algorithm, where the attribute information can include digital certificate ID, digital certificate version, issuer, user, issuer At least one item of information such as date, validity period, and signature algorithm.
  • the image forming device After receiving the digital certificate, the image forming device verifies the signature value of the digital certificate, and generates a random number as the first random number if the verification is passed. How to generate a signature value and how to verify the signature value will be explained in detail later.
  • the image forming device encrypts the first random number with the first public key, and then sends the encrypted data (first encryption result) to the consumable chip.
  • the consumable chip uses the first private key to decrypt the first encryption result to obtain a second random number.
  • the first private key is also generated based on the PUF ID, and the first private key and the first public key are respectively the private key and the public key in a key pair generated based on an asymmetric encryption algorithm.
  • the first private key may also be generated by the consumable chip in real time after receiving the identity challenge message.
  • the consumable chip obtains its own PUF ID, performs an asymmetric encryption operation based on the PUF ID, and generates the same private key as the first private key.
  • a public key is paired with a first private key.
  • the first private key can be pre-stored in the consumable chip, that is, before the consumable chip leaves the factory, the corresponding first private key and the first public key are generated in advance according to the PUF ID of the consumable chip. The key is stored as a part of the digital certificate, and then the first private key is encrypted and stored.
  • the data encrypted with the first public key (the first encryption result) can be encrypted using the first A private key is used for decryption, and only the first private key can be decrypted. If the consumable chip can decrypt the first encryption result and the decrypted random number is correct, so when the image forming device sends a query message to the consumable chip, the response information obtained by the image forming device by decrypting the first random number is correct , the consumable chip is considered legal, otherwise it is illegal.
  • Legal in this embodiment of the application refers to meeting predetermined requirements, for example, an original chip or a chip that is authorized to be produced.
  • a legal chip is a chip that meets predetermined requirements.
  • the second random number is used as the symmetric key to encrypt the response content used to respond to the identity challenge message to obtain a second feedback message and send it to the image forming device.
  • the image forming device After receiving the second feedback message, the image forming device will use the first random number to decrypt the encrypted response content. If it can be decrypted correctly, it means that the password is symmetrical, that is, the decrypted password is the encrypted password, and the second The random number is the same as the first random number, so the response information of the identity challenge message obtained by decrypting the first random number is correct, then the verification is passed, and the consumable chip is a legal chip, and the verification is passed. If the first random number held by the image forming apparatus cannot decrypt the response content, for example, the decrypted content is garbled, then the consumable chip is considered to be an illegal chip.
  • the subsequent communication between the consumable chip and the image forming device can use the second random number (equal to the first random number) as the symmetric key for various communication messages Perform encryption processing.
  • the first random number is a number randomly generated by the image forming device during use, different devices may randomly generate different numbers, so it is meaningless to copy the random number, which can also prevent imitators from knowing the encryption in advance
  • a password is used to intercept a communication message or to send an encrypted message to an image forming device in imitation of a legitimate consumable chip.
  • the verification method provided by the embodiment of the present application can be implemented based on the system architecture shown in FIG. 2 .
  • a complete verification example is listed below in combination with Figure 2 and Figure 3.
  • the verification method provided by the embodiment of the present application can be implemented based on the following process:
  • the image forming control unit on the side of the image forming apparatus sends a request for acquiring a digital certificate (a first request).
  • the request message may be a message encrypted by the first encryption algorithm.
  • the first encryption algorithm may be a symmetric encryption algorithm, such as any one of the following symmetric encryption algorithms: Data Encryption Standard (Data Encryption Standard, DES), Advanced Encryption Standard (Advanced Encryption Standard , AES), Blowfish, RC2, RC4, RC5, IDEA (International Data Encryption Algorithm), SKIPJACK and other algorithms.
  • Data Encryption Standard Data Encryption Standard, DES
  • Advanced Encryption Standard Advanced Encryption Standard
  • Blowfish Blowfish
  • RC2, RC4, RC5 Blowfish
  • IDEA International Data Encryption Algorithm
  • SKIPJACK International Data Encryption Algorithm
  • the consumable chip After receiving the first request, the consumable chip first decrypts the first request through a first encryption algorithm to obtain request content, and then reads the digital certificate stored in the consumable chip according to the request content.
  • the digital certificate stored in the consumable chip is compressed information after encryption and compression processing, and the algorithm for encrypting and compressing the original plaintext information of the digital certificate is defined as the first compression algorithm, the first compression
  • the algorithm should use an encryption algorithm that supports restoration after compression, that is, an encryption algorithm that can restore the original plaintext data after compression.
  • the consumable chip sends a message including the compressed information of the digital certificate to the image forming device, specifically to the image forming control unit on the side of the image forming device.
  • the message sent in step 303 may also be encrypted using the first encryption algorithm.
  • the image forming control unit on the side of the image forming device decrypts the compressed information of the digital certificate obtained through the first encryption algorithm. Since the compressed information of the digital certificate is encrypted and stored, after reading it, it needs to be decrypted by the decryption algorithm corresponding to the first compression algorithm, that is, the plaintext file of the digital certificate is restored according to the first encryption compression algorithm. In addition to the first public key, the restored digital certificate also includes a signature value.
  • the memory on the side of the image forming apparatus may be a non-volatile storage unit in which verification information for verifying the signature value in the digital certificate is stored.
  • the verification information may be a CA server certificate.
  • the image forming control unit reads the CA server certificate in the non-volatile storage unit, verifies the signature value in the digital certificate sent by the consumable chip, and generates a random number A locally after the verification is passed, and save.
  • the image forming control unit uses the first public key in the digital certificate sent by the consumable chip to encrypt the random number A to obtain encrypted data (the first encryption result), and sends an identity carrying the first encryption result to the consumable chip. Challenge message.
  • the consumable chip After the consumable chip receives the identity challenge message, as an implementable method, it will read its own PUF ID and other information, and calculate the private key custom-generated from the PUF ID and other information through an asymmetric encryption algorithm (section A private key), the private key and the public key (the first public key) in the digital certificate of the consumable chip belong to the same public-private key pair, that is, the data encrypted by the first public key can only be decrypted by the first private key. Therefore, the consumable chip holding the first private key can decrypt the first encrypted result in the identity challenge message through the private key, and obtain the random number B.
  • section A private key asymmetric encryption algorithm
  • the consumable chip does not respond (it may not be decrypted), or the content of the identity challenge response is incorrect, it is determined to be a counterfeit consumable.
  • the consumable may be produced by copying the flash content of the original consumable, which may cause damage to the image of the original printer. damage to the device.
  • the first private key may also be pre-stored in the storage unit of the consumable chip, but it should be stored encrypted to prevent the first private key from leaking.
  • the consumable chip uses the random number B to symmetrically encrypt the response content used to respond to the identity challenge message, obtains the response message and sends it to the image forming control unit of the image forming device.
  • the image forming control unit of the image forming device uses the random number A as a decryption password to symmetrically decrypt the response message sent by the consumable chip.
  • the random number B on one side is equal, and the consumable chip is a legal chip, such as an original genuine consumable, and the verification is passed. If it cannot be decrypted or the decrypted response content is garbled, that is, the response content is incorrect, it is determined to be a counterfeit consumable.
  • the random number A (that is, the random number B) can be used as a symmetric key between the image forming device and the consumable chip to encrypt subsequent communication content.
  • the generation process of the digital certificate of the consumable chip is described below.
  • the digital certificate can be written into the consumable chip before leaving the factory.
  • the system architecture involved in the digital certificate generation process includes three parts, namely consumable chip, consumable chip production tooling equipment and certificate authority (Certificate Authority, CA) server.
  • the consumable chip is equivalent to a processor.
  • the processor has a hardware unique identifier PUF ID.
  • the PUF ID has been permanently written in the chip manufacturing factory and cannot be changed.
  • the CA server receives the certificate issuance request (second request) sent by the consumable chip production tooling equipment.
  • the second request includes but is not limited to the first public key generated based on the PUF ID and the attribute information of the digital certificate.
  • the attribute information of the digital certificate can include at least one of the issuance time, digital certificate version, signature algorithm, hash algorithm and other information.
  • the attribute information can include the digital certificate ID, digital certificate version, issuer, user, issue date, Validity period, signature algorithm and other information.
  • the CA server calculates a hash value through a hash algorithm for the second request information, and uses the private key (second private key) of the CA server to asymmetrically encrypt the hash value to generate a signature value, and sends the signature
  • the value is stored in a digital certificate, which is then stored in the consumable chip.
  • the digital certificate stored in the consumable chip can be compressed information encrypted by a specific compression encryption algorithm (the first compression algorithm), that is, Store digital certificates in encrypted compressed form.
  • the first compression algorithm the first compression algorithm
  • the key content in the digital certificate is extracted and compressed, the purpose is to reduce the size of the digital certificate file, and at the same time better protect the plain text content of the digital certificate.
  • Obtain the PUF ID of the consumable chip generate the first public key, then obtain the attribute information of the digital certificate, combine the attribute information with the first public key, and then perform a hash algorithm on the combined data to obtain a hash value; for example, hash
  • the column algorithm may be a hash operation to obtain a corresponding hash value; then, the second private key is used to sign the hash value to obtain the signature value of the digital certificate.
  • the issued digital certificate includes the first public key and the signature value.
  • a second public key will be written in the memory (such as a non-volatile storage unit) in the image forming apparatus before leaving the factory, and the second public key is the same as the first public key.
  • the two private keys belong to the same key pair, that is, the signature value signed by the second private key, and only the second public key can pass the signature verification. That is to say, during the manufacturing process of the original consumable chip, the signature value of its digital certificate, only the manufacturer of the image forming device such as the original printer can master the public key for verifying the signature, that is to say, only the original The consumable chip can pass the signature verification.
  • encryption algorithms such as the first encryption algorithm (excluding asymmetric encryption algorithms) can also be the following algorithm process: before or after the text content of the message, a large random number is embedded, such as: 2345774356, the encryption algorithm Then extract the 2nd, 3rd, 5th, and 6th bits of the large random number as the symmetric key, and encrypt and decrypt the data. When decrypting, read the large random number and extract the 2nd, 3rd, 5th, and 6th bits As a decryption key, decryption is realized. The specific number of digits to be extracted can be agreed upon in advance.
  • encryption algorithms such as the first encryption algorithm can also be in the form of a password book. This application aims to protect the technical ideas of information interaction and information storage, and the specific encryption algorithms are not listed one by one.
  • the embodiment of the present application also provides a consumable chip, the consumable chip stores digital certificate information; the digital certificate information includes at least a first public key; the first public key is based on the unique hardware identifier PUF of the consumable chip ID generation.
  • the chip control unit is also used to obtain the unique hardware identifier PUF ID of the consumable chip, and generate the first private key based on the PUF ID.
  • the first private key and the first public key belong to the same key pair; the first private key is used for
  • the first encryption result is decrypted to obtain a second random number; wherein, the first encryption result is obtained by encrypting the first random number with a first public key; the first random number is generated by the image forming device; the second random number, Validation results used to determine consumable chips.
  • the second random number can be used as the symmetric key to encrypt the data
  • the first random number can be used as the decryption key to decrypt the data. If the decryption is possible and the decrypted content is correct, the verification is considered to be passed, otherwise the verification is not passed.
  • the chip control unit further includes an encryption unit and a decryption unit, wherein the encryption unit is configured to encrypt data to be sent to the image forming device, and the decryption unit is configured to receive the encrypted data sent by the image forming device and encrypt the encrypted data. The data is decrypted.
  • the encryption unit or the decryption unit may be an algorithm module supporting an algorithm such as an asymmetric encryption algorithm and/or a first encryption algorithm.
  • the above digital certificate information also includes a signature value
  • the signature value is generated based on the first public key and the attribute information of the digital certificate, and the signature value is used for comparison with a preset signature value to The validity of the signature value is determined.
  • the attribute information of the digital certificate includes at least one of the following information: digital certificate ID, digital certificate version, issuer, user, issue date, validity period, and signature algorithm.
  • the chip control unit is configured to receive an identity challenge message and determine response information corresponding to the above identity challenge message, where the above identity challenge message includes the above first encryption result, and uses the above second random number as a symmetric key, for the above Encrypting the response content to obtain a second feedback message, and sending it to the above-mentioned image forming device; the above-mentioned second feedback message is used to obtain the above-mentioned Verification result of the consumable chip.
  • the above-mentioned second feedback message is specifically used to obtain the verification result of the above-mentioned consumable chip as verification passed when the above-mentioned second feedback message can be decrypted by using the first random number and the obtained response content is correct.
  • the chip control unit is configured to use the second random number as a symmetric key to encrypt various communication messages sent to the image forming device when the verification result of the consumable chip is passed.
  • the consumable chip can be mounted on the circuit substrate of the consumable.
  • the circuit substrate includes a memory and contacts connected to the memory. Foot connection.
  • the embodiment of the present application also provides a consumable chip, the consumable chip is used to be installed on the consumable, the consumable is used to be detachably installed in the image forming device, the consumable chip stores digital certificate information, and is used to execute the The verification method in the example.
  • the embodiment of the present application also provides a consumable.
  • the overall hardware structure of the image forming apparatus is described first.
  • FIG. 4 shows a schematic structural diagram of an image forming apparatus involved in an embodiment of the present application.
  • the image forming part of the image forming device may include:
  • the developer container 11 is used for containing the developer, which may be materials such as toner, carbon powder, etc.;
  • the developing component 12 for example, includes components such as a developing roller;
  • the developer conveying element 13 includes components such as a powder feeding roller;
  • the transfer member 15, the fixing unit 5, and the like are the transfer member 15, the fixing unit 5, and the like.
  • the paper to be printed moves in the direction of paper feeding, and after successively passing through the powder feeding operation of the developer feeding member 13 and the developing operation of the developing unit 12, it reaches the nip area between the photosensitive unit 14 and the transfer unit 15 for transfer. Afterwards, it is fixed through the fixing assembly 5 to complete the image forming operation.
  • At least one consumable is installed in the image forming device, and the consumable is detachably connected to the body of the image forming device.
  • the image forming device is detachably installed with four consumables, which are consumables 1, 2, 3 and 4 shown in FIG.
  • the image forming apparatus supplies developers of four colors: black K, cyan C, magenta M, and yellow Y.
  • the number of consumables installed in the image forming apparatus may be increased or decreased, for example, 5 or 6 or even more or less, etc., which is not limited in the present application.
  • the method provided in the embodiment of the present application may be applied to a scenario where the number of consumables installed in the image forming apparatus is greater than or equal to two.
  • the consumable may only include the developer container 11 .
  • the embodiment of the present application also provides a consumable, including: a housing 51 , a developer accommodating part 11 and a consumable chip 52 , the developer accommodating part 11 is located in the housing 51 for Contains developer.
  • the consumables further include a developer conveying part for conveying the developer.
  • the developer conveying part may be a developing member, may be a developer conveying member, or may include a developing member and a developer conveying member, which is not limited here.
  • the consumables may further include a photosensitive drum and a charging roller for charging the photosensitive drum.
  • the consumable provided in the embodiment of the present application only includes a photosensitive drum 61 , a charging roller 62 and any consumable chip 52 described in the above embodiments.
  • the charging roller 62 is used to charge the photosensitive drum 61 .
  • the consumables may be developing cartridges.
  • the consumable can be a drum cartridge.
  • the consumables may have a split structure, for example, the consumables (1, 2, 3 or 4) respectively include a developing cartridge and a drum cartridge which are detachable from each other, wherein the developing cartridge includes a housing, a developer container 11, The developing member 12 and/or the developer conveying member 13; the drum cartridge includes a photosensitive member 14, that is, a photosensitive drum and a charging roller.
  • the developer conveying member 13 is used to convey the developer to the developing member 12, and the developing member 13 is used to convey the developer to the photosensitive drum.
  • the developer conveying element can also be other conveying components, such as powder pushing screw and other components.
  • the developer accommodating portion 11 is located in the casing for accommodating the developer.
  • the consumables are in an integrated structure, and the consumables (1, 2, 3, or 4) include a developer container 11, a developing member 12, a developer conveying member 13, a photosensitive member 14, etc., and the components are integrated into an integrated structure .
  • the verification scheme provided by the embodiment of the present application involves the communication between the main body of the image forming device and the consumable chip of the consumable.
  • Both the main body side of the image forming device and the consumable chip side include electrical contacts. When the part is in good contact with the electrical contact part on the side of the consumable chip, data can be stably transmitted between the image forming apparatus and the consumable chip.
  • the electrical contact may be a conductive plane, a conductive probe, a conductive coil, or the like.
  • the consumable chip sends a message to the image forming device, which may be through the electrical contact part on the chip side to the electrical contact part on the image forming device body side, and the image forming device sends a request or message to the consumable chip through
  • the electrical contacts on the body side of the image forming apparatus transmit messages to the electrical contacts on the chip side.
  • the embodiment of the present application also provides an image forming device, as shown in FIG. 7 , including:
  • a consumable 72, the consumable 72 is equipped with a consumable chip as described in any one of the above-mentioned embodiments;
  • the image forming control unit 71 is configured to implement the following operations: sending a first request for obtaining a digital certificate to the consumable chip; receiving a first feedback message sent by the consumable chip, and generating a first random number, using the The first public key carried in the first feedback message encrypts the first random number to obtain a first encryption result; sends an identity challenge message to the consumable chip, and the identity challenge message includes the first encryption result.
  • the image forming control unit on the side of the image forming apparatus is further configured to verify the validity of the signature value, and generate a first random number after the verification is passed.
  • the processor reads the verification information used to verify the signature from the non-volatile storage unit, and verifies the signature value in the digital certificate.
  • the image forming apparatus further includes a memory, and the memory may include a non-volatile storage unit 73, which stores a CA server digital certificate, and the CA server digital certificate stores information for verifying the signature value of the digital certificate of the consumable chip. verify message.
  • the number of the above-mentioned units, chips or processors can be one or more, and optionally, a memory is also provided, and the processor and the memory can be connected through a bus or in other ways.
  • the memory can be used to store non-transitory software programs, non-transitory computer-executable programs and modules, such as program instructions/modules corresponding to the devices in the embodiments of the present application.
  • the processor executes various functional applications and data processing by running non-transitory software programs, instructions and modules stored in the memory, that is, implements the anti-cracking method in any of the above method embodiments.
  • the memory may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function; and necessary data and the like.
  • the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage devices.
  • An embodiment of the present application further provides a storage medium, and an executable program is stored in the storage medium, and when the executable program is run on the electronic device, the electronic device is made to execute the verification method in any of the foregoing embodiments.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, DSL) or wireless (eg, infrared, wireless, microwave, etc.) means.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a Solid State Disk).
  • "at least one” means one or more, and “multiple” means two or more.
  • “And/or” describes the association relationship of associated objects, indicating that there may be three kinds of relationships, for example, A and/or B may indicate that A exists alone, A and B exist simultaneously, or B exists alone. Among them, A and B can be singular or plural.
  • the character “/” generally indicates that the contextual objects are an “or” relationship.
  • “At least one of the following" and similar expressions refer to any combination of these items, including any combination of single or plural items.
  • At least one of a, b, and c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, and c may be single or multiple.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Control Or Security For Electrophotography (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

La présente invention concerne le domaine technique de la formation d'image, et en particulier un procédé de vérification, une puce consommable, un produit consommable et un appareil de formation d'image au moyen desquels la légitimité d'une puce consommable peut être vérifiée avec précision. Le procédé comprend les étapes suivantes : en réponse à une première demande, une puce consommable envoie un premier message de rétroaction à un appareil de formation d'image, le premier message de rétroaction contenant des informations de certificat numérique, les informations de certificat numérique comprenant au moins une première clé publique, et la première clé publique étant générée sur la base d'un identifiant matériel unique PUF ID de la puce consommable ; la puce consommable reçoit un message de défi d'identité envoyé par l'appareil de formation d'image, le message de défi d'identité comprenant un premier résultat de chiffrement, le premier résultat de chiffrement étant obtenu en chiffrant un premier nombre aléatoire à l'aide de la première clé publique, et le premier nombre aléatoire étant généré par l'appareil de formation d'image ; et la puce consommable déchiffre le premier résultat de chiffrement à l'aide d'une première clé privée, de façon à obtenir un second nombre aléatoire, le second nombre aléatoire étant utilisé pour obtenir un résultat de vérification de la puce consommable.
PCT/CN2022/118896 2021-12-30 2022-09-15 Procédé de vérification, puce consommable, produit consommable et appareil de formation d'image WO2023124245A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111649105.6 2021-12-30
CN202111649105.6A CN114236994B (zh) 2021-12-30 2021-12-30 验证方法、耗材芯片、耗材和图像形成装置

Publications (1)

Publication Number Publication Date
WO2023124245A1 true WO2023124245A1 (fr) 2023-07-06

Family

ID=80744629

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/118896 WO2023124245A1 (fr) 2021-12-30 2022-09-15 Procédé de vérification, puce consommable, produit consommable et appareil de formation d'image

Country Status (2)

Country Link
CN (1) CN114236994B (fr)
WO (1) WO2023124245A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117278330A (zh) * 2023-11-21 2023-12-22 国网江西省电力有限公司电力科学研究院 一种电力物联网设备网络的轻量级组网与安全通信方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11290290B2 (en) * 2019-03-22 2022-03-29 Lexmark International, Inc. Physical unclonable function variable read sensor
CN114236994B (zh) * 2021-12-30 2023-06-30 珠海奔图电子有限公司 验证方法、耗材芯片、耗材和图像形成装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346586B1 (en) * 1997-07-15 2008-03-18 Silverbrook Research Pty Ltd Validation protocol and system
US20170005811A1 (en) * 2015-06-30 2017-01-05 Maxim Integrated Products, Inc. Systems and methods for authentication based on physically unclonable functions
CN109840433A (zh) * 2017-11-29 2019-06-04 台湾积体电路制造股份有限公司 用于对装置进行验证的方法
CN113722698A (zh) * 2020-05-26 2021-11-30 英飞凌科技股份有限公司 系统、设备、用于运行系统的方法和计算机程序
CN114236994A (zh) * 2021-12-30 2022-03-25 珠海奔图电子有限公司 验证方法、耗材芯片、耗材和图像形成装置

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110093714A1 (en) * 2009-10-20 2011-04-21 Infineon Technologies Ag Systems and methods for asymmetric cryptographic accessory authentication
CN104553384B (zh) * 2014-12-25 2017-08-11 珠海艾派克微电子有限公司 一种耗材芯片及其序列号的识别方法和装置
CN108804953B (zh) * 2018-06-15 2020-03-27 杭州旗捷科技有限公司 耗材芯片及其通信方法,耗材芯片与成像设备通信系统、方法
CN109977656B (zh) * 2019-04-08 2019-12-20 广州众诺电子技术有限公司 身份验证方法和耗材盒及存储介质
CN110481155B (zh) * 2019-08-19 2021-04-13 佛山普瑞威尔科技有限公司 一种安全打印方法、芯片、打印耗材和打印机
CN112180699B (zh) * 2020-09-29 2022-08-30 珠海奔图电子有限公司 耗材芯片、图像形成装置、图像形成控制方法及耗材

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346586B1 (en) * 1997-07-15 2008-03-18 Silverbrook Research Pty Ltd Validation protocol and system
US20170005811A1 (en) * 2015-06-30 2017-01-05 Maxim Integrated Products, Inc. Systems and methods for authentication based on physically unclonable functions
CN109840433A (zh) * 2017-11-29 2019-06-04 台湾积体电路制造股份有限公司 用于对装置进行验证的方法
CN113722698A (zh) * 2020-05-26 2021-11-30 英飞凌科技股份有限公司 系统、设备、用于运行系统的方法和计算机程序
CN114236994A (zh) * 2021-12-30 2022-03-25 珠海奔图电子有限公司 验证方法、耗材芯片、耗材和图像形成装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117278330A (zh) * 2023-11-21 2023-12-22 国网江西省电力有限公司电力科学研究院 一种电力物联网设备网络的轻量级组网与安全通信方法
CN117278330B (zh) * 2023-11-21 2024-03-12 国网江西省电力有限公司电力科学研究院 一种电力物联网设备网络的轻量级组网与安全通信方法

Also Published As

Publication number Publication date
CN114236994A (zh) 2022-03-25
CN114236994B (zh) 2023-06-30

Similar Documents

Publication Publication Date Title
WO2023124245A1 (fr) Procédé de vérification, puce consommable, produit consommable et appareil de formation d'image
RU2598331C2 (ru) Блок, использующий операционную систему, и устройство формирования изображения, использующее его
US9973658B2 (en) CRUM chip and image forming device for authentication and communication, and methods thereof
US9594897B2 (en) Crum chip mountable in comsumable unit, image forming apparatus for authentificating the crum chip, and method thereof
CA2851587C (fr) Systeme et procede de communication maitre-esclave securisee
JP2017143437A (ja) 画像形成装置、その制御方法、プログラム、及びカートリッジ
US9380050B2 (en) Scan image authentication
US20220317613A1 (en) Consumable chip, consumable and communication method
US11296896B2 (en) Method of authenticating authentication-target apparatus using challenge and response
JP2014143568A (ja) 認証システム及び認証子変換器
US10177920B2 (en) Server apparatus and communication system comprising server apparatus
US10389913B2 (en) Information management control apparatus, image processing apparatus, and information management control system
JP4572324B2 (ja) デバイス識別情報管理システムおよびデバイス識別情報管理方法
US11782665B2 (en) Image forming control method, consumable chip, image forming apparatus, and consumable
US11528384B2 (en) Image forming system, image forming apparatus, and non-transitory computer-readable storage medium for exporting and importing configuration information via recording medium
JP2007174395A (ja) 画像処理装置およびその方法
CN108551535B (zh) 图像形成控制系统及控制方法
JP6139335B2 (ja) メンテナンス方法及び電子機器
KR20180055790A (ko) 소모품 유닛에 탑재 가능한 crum 칩과 이를 인증하는 화상형성장치 및 그 인증 방법
US20230122687A1 (en) Information processing apparatus and control method
US20210281556A1 (en) Authentication system for preventing replication of authentication target apparatus authenticated by authentication apparatus
JP7347135B2 (ja) 署名システム、画像処理装置及び制御方法
US11726676B2 (en) Electronic apparatus
CN115859294A (zh) 图像形成控制方法及其装置、图像形成装置、电子设备
JP5897528B2 (ja) セキュリティ処理装置及びセキュリティ処理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22913514

Country of ref document: EP

Kind code of ref document: A1