Method for ciphering, deciphering and rewriting external data memory

A technology of external data and memory, applied in the direction of preventing unauthorized use of memory, printing device, printing, etc., can solve the problems of paper waste, printer P3 impact, error, etc., to avoid waste of chips and be conducive to environmental protection.

Inactive Publication Date: 2008-10-01
ZHUHAI TIANWEI TECH DEV CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing external data memory 5 generally does not take security measures, and the data stored therein is easily read or written directly without passing through the microcontroller 4.
If the data about the consumable container stored in the external data memory 5, such as the applicable printer model of the consumable container, the remaining amount of consumables in the consumable container, etc., are abnormally rewritten, that is, the user does not directly rewrite the data in the external data memory 5 through the microcontroller 4 data, but the rewritten data is inconsistent with the actual situation of the consumable container, which will have a serious impact on the printer 1 and the consumable container
For example, the consumables in the consumables container C1 have been used up, but the user takes out the external data memory 5 of the chip 3, and directly copies the data in the external data memory 5 of the chip 3 of another unused consumables container to the external data of the consumables container C1. In the memory 5, that is, the user rewrites the data in the external data memory 5 of the consumable container C1 abnormally, so that the printer 1 thinks that the consumable container C1 is full of consumables, and prints, which not only causes waste of paper, but also causes damage to the print head. damage
Another example is that the consumable material container C2 is used in conjunction with the printer P2 and can be recognized by the printer P3 whose model is different from that of the printer P2. If the user refills the consumable material container C2 that has run out of consumable materials and rewrites the data in the external data memory 5, an error will occur. Put it into the printer P3 and use it. Although the printer P3 can work at this time, it will have a serious impact on the printer P3, and even cause permanent damage to the consumable container C2 and the printer P3.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for ciphering, deciphering and rewriting external data memory
  • Method for ciphering, deciphering and rewriting external data memory
  • Method for ciphering, deciphering and rewriting external data memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Referring to Fig. 1, Fig. 1 discloses a schematic diagram of the connection between a conventional printer and a consumable container chip. The encryption and decryption methods of the present invention are also realized according to the connection relationship between the printer and the consumable container chip in the figure. After the consumable material container is installed on the printer 1, the printer 1 will communicate with the chip 3 of the consumable material container. The printer 1 first sends information to the microcontroller 4, and the microcontroller 4 judges the information. If it is necessary to write or read data to the external data storage 5, the microcontroller 4 will write to the external data storage 5. The operation of encrypting data and decrypting the read data.

[0018] see figure 2 , figure 2 The work flow chart of the microcontroller in the first embodiment of the encryption method and the decryption method of the present invention is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method of encrypting, decoding and rewriting the external data memorizer, the encrypting method includes: a microcontroller processes code for the address and data to be written, writing the coded data in to the coded address; the decoding method includes the microcontroller coding the address needed to be read, reading data of the address according the coded address, and decoding the read data; the rewriting method includes the microcontroller extracting the address and data needed to be written according to the rewriting protocol, and coding the address and data, writing the coded data in the coded address. The encryption effectively prevents the data of the external data memorizer from incorrect rewrite, the encrypting method decodes the coded data, ensuring the printer recognize the data, the rewriting method effectively rewrites the external data memorizer, ensuring the chip setting with the external data memorizer circularly use.

Description

technical field [0001] The invention relates to a method for encrypting, decrypting and rewriting a memory, in particular to a method for encrypting, decrypting and effectively rewriting data on an external data memory on a consumable container chip. Background technique [0002] Printer is a kind of common office equipment, which brings great convenience to modern office. Existing printers are generally equipped with a consumable material container, and the consumable material in the consumable material container is sent to the printing medium during operation. Most of the existing consumable material containers are equipped with chips, and the microcontroller on the chip stores relevant information of the consumable material container. However, due to the small storage capacity of the microcontroller's data memory, generally only tens of bytes to hundreds of bytes, and its slow data access speed, it is often necessary to add an external data memory on the chip, such as EE...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14B41J29/38H04N1/44
Inventor 谢立功
Owner ZHUHAI TIANWEI TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products