Chip authentication method, system, printer, consumable chip and consumable box

A consumable chip and authentication method technology, which is applied in printing and other directions, can solve problems such as security loopholes in authentication methods, and achieve the effect of solving security loopholes

Active Publication Date: 2017-05-10
APEX MICROELECTRONICS CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the embodiment of the present invention provides a chip authentication method, system, printer, consumable chi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chip authentication method, system, printer, consumable chip and consumable box
  • Chip authentication method, system, printer, consumable chip and consumable box
  • Chip authentication method, system, printer, consumable chip and consumable box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] An embodiment of the present invention provides a chip authentication method, which is executed on a printer.

[0087] Specifically, please refer to figure 1 , which is a schematic flowchart of Embodiment 1 of the chip authentication method provided by the embodiment of the present invention, as shown in figure 1 As shown, the method includes the following steps:

[0088] S101. Send an authentication instruction to the consumable chip.

[0089] It should be noted that the authentication instruction includes a specified code, and the specified code is compiled according to the program compilation format of the authentication consumable chip.

[0090] In a specific implementation process, the authentication instruction may also include but not limited to: at least one of command, length, data and check.

[0091] S102, receiving the operation result returned by the consumable chip.

[0092] S103, according to the operation result, determine whether the consumable chip ...

Embodiment 2

[0118] An embodiment of the present invention provides a chip authentication method, which is executed on a consumable chip.

[0119] Specifically, please refer to figure 2 , which is a schematic flowchart of Embodiment 2 of the chip authentication method provided by the embodiment of the present invention, as figure 2 As shown, the method includes the following steps:

[0120] S201. Receive an instruction sent by the printer.

[0121] S202. Identify whether the received instruction is an authentication instruction.

[0122] Specifically, the authentication instruction includes a specified code, and the specified code is compiled according to the program compilation format of the authentication consumable chip.

[0123] In a specific implementation process, the authentication instruction may also include but not limited to: at least one of command, length, data and check.

[0124] S203. If it is recognized that the received command is an authentication command, run a spe...

Embodiment 3

[0172] Based on the chip authentication method provided in the first embodiment above and the chip authentication method provided in the second embodiment above, an embodiment of the present invention provides a chip authentication system.

[0173] Specifically, please refer to image 3 , which is a functional block diagram of the chip authentication system provided by the embodiment of the present invention, such as image 3 As shown, the system includes:

[0174] The printer 31 is configured to send an authentication instruction to the consumable chip 32, the authentication instruction includes a specified code, and the specified code is compiled according to the program compilation format of the authentication consumable chip 32;

[0175] Consumables chip 32, configured to receive instructions sent by the printer 31;

[0176] The consumables chip 32 is also used to identify whether the received instruction is an authentication instruction;

[0177] The consumable chip 32...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a chip authentication method, a system, a printer, a consumable chip and consumable box. On one hand, according to the embodiment of the invention, the printer sends an authentication instruction to the consumable chip; the authentication instruction includes a designation code which is compiled in accordance with a program compilation format of the authentication consumable chip; the consumable chip receives the instruction sent by the printer, and identifies whether the received instruction is an authentication instruction; if the received instruction is identified as the authentication instruction, the consumable chip runs a designation code and obtains the running results; and the consumable chip returns the running result to the printer, and the printer receives the running result and judges whether the consumable chip is an authentication consumable chip. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of security vulnerability of an authentication method for the consumable chip by the printer in the prior art.

Description

[0001] 【Technical field】 [0002] The invention relates to the technical field of printing and imaging, in particular to a chip authentication method, system, printer, consumable chip and consumable box. [0003] 【Background technique】 [0004] At present, when the printer authenticates the consumable chip in the consumable box, the consumable chip is generally in slave mode. Specifically, the consumable chip only needs to receive the authentication instruction sent by the printer. This authentication instruction is generally used to indicate some specific algorithms and specific data. Then, the consumable chip processes these specific data according to these specific algorithms to obtain processing results. The processing result is fed back to the printer, and the printer determines whether the authentication of the consumable chip is successful according to the processing result. [0005] In the course of realizing the present invention, the inventor finds that there are at ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): B41J2/175
CPCB41J2/17543
Inventor 邓超爱孙学进
Owner APEX MICROELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products