Electronic cigarette encryption authentication method and system and electronic cigarette

An encryption authentication and electronic cigarette technology, applied in the field of electronic cigarettes, can solve the problems of no authentication process, complex communication circuits, and less smoke, and achieve the effect of saving chip IO ports, simple circuit structure, and small occupied area

Pending Publication Date: 2020-10-20
西安恩狄集成电路有限公司
View PDF17 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

E-cigarettes with good quality and good brands are very popular with consumers and occupy a large market share. However, some poor-quality e-cigarettes are not sold well, and it is possible to fake or counterfeit the atomizers of good-brand e-cigarettes. It is supplied to consumers as an alternative, and it attracts consumers with the advantage of low price. However, due to its poor quality, consumers may have problems such as oil leakage, circuit power failure, less smoke, and poor quality of smoke liquid during use. It will bring bad experience to those who use electronic cigarettes, and also cause bad reputation to genuine e-cigarette companies.
[0004] However, in most electronic cigarettes currently on the market, the communication circuit between the device and the pod is relatively complicated and not universal; the pod must be connected to the device in a specific direction, which brings inconvenience to use; and, the device There is no certification process between the pod and the pod, which leads to the pod can be adapted to a variety of pods, and it is impossible to avoid the mixed use from the source, resulting in the rampant use of counterfeit and shoddy products, causing serious economic and reputation damage to businesses, and also to users. damage to health

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic cigarette encryption authentication method and system and electronic cigarette
  • Electronic cigarette encryption authentication method and system and electronic cigarette
  • Electronic cigarette encryption authentication method and system and electronic cigarette

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] See figure 1 , figure 1 A flow chart of an electronic cigarette encryption authentication method provided by the embodiment of the present invention, which is applied to cigarette device, includes:

[0058] S11. Supply power to the pod device, and monitor whether the first connection information is received;

[0059]In this embodiment, the pod device does not have an independent power supply unit. After the pod device needs to be electrically connected to it, the pod device can supply power to the pod device through the power supply interface. In one example, the power supply interface can be used simultaneously. Signal transmission, that is, power supply and communication through a single line, reduces the design complexity of the device, effectively saves the chip I / O port, reduces the size of the device, thereby improving chip performance and reducing power consumption.

[0060] After the power supply is normal, the pod device can receive and process information no...

Embodiment 2

[0073] See image 3 , image 3 An electronic cigarette encryption authentication method provided by the embodiment of the present invention is a flow chart of the pod terminal, which is applied to the pod device, including:

[0074] S21. Send the first connection information to the tobacco device to obtain the first feedback message;

[0075] After the device is powered normally, the pod device actively sends the first connection information to the device to inform the device that it can send information normally, so as to request the device for identity authentication information. Correspondingly, the pod device needs to monitor whether the first connection information sent by the pod device is received, so as to confirm whether the pod device is working normally. For example, see Figure 4 , Figure 4 It is a specific example diagram of the pod end of an electronic cigarette encryption authentication method provided by the embodiment of the present invention. The first co...

Embodiment 3

[0088] See Figure 5 , Figure 5 A circuit structure schematic diagram of an electronic cigarette encryption authentication system provided by an embodiment of the present invention, including:

[0089] The main control chip set on the device of the cigarette rod, the main control chip includes a voltage source VCC, a main power supply communication interface IO1, a ground terminal GND, and a resistor R, wherein the resistor R is connected between the voltage source VCC and the main power supply Between the communication interface IO1;

[0090] The slave chip set on the pod device, the slave chip includes a first power interface Y1, a second power interface Y2, a slave power supply communication interface IO, a capacitor pin CAP, a capacitor ground pin CAPGND, a capacitor C, A heating wire F, wherein the capacitor C is connected between the capacitor pin CAP and the capacitor ground pin CAP GND, and the heating wire F is arranged between the first power supply interface Y1 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic cigarette encryption authentication method and system and an electronic cigarette, and the method comprises the steps: supplying power to smoke cartridge equipment, and monitoring whether first connection information is received or not; responding to the received first connection information, sending a first feedback message to the smoke cartridge equipment, and sending first identification information to the smoke cartridge equipment to obtain second identification information; responding to the received second identification information, and judging whether the second identification information is correct or not; in response to that the second identification information is correct, stopping supplying power to the smoke cartridge equipment and igniting a heating wire, wherein the second identification information is obtained by encrypting the first identification information. According to the authentication method, the cigarette lighting operationis performed only after the authentication succeeds, so that the user can conveniently authenticate whether the currently used electronic cigarette product is a genuine product or not, the user is effectively prevented from using a counterfeit electronic cigarette product, and adverse health influence on the user is avoided.

Description

technical field [0001] The invention belongs to the technical field of electronic cigarettes, and in particular relates to an encryption authentication method and system for electronic cigarettes and electronic cigarettes. Background technique [0002] Electronic cigarettes generally include atomizers and battery components. Electronic cigarettes are heated by the atomizer to atomize the liquid to produce electronic smoke for smokers to smoke. Since electronic cigarette liquid does not contain tobacco tar, smoking electronic cigarettes The smoke emitted also does not contain tobacco tar. Electronic cigarettes reduce the harm of tobacco tar to people's health to some extent. Therefore, electronic cigarettes gradually replace cigarettes and are widely used. [0003] With the popularity of electronic cigarettes, the sales of electronic cigarettes in the society are also increasing year by year. E-cigarettes with good quality and good brands are very popular with consumers and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): A24F40/50A24F40/10A24F40/40
CPCA24F40/50A24F40/10A24F40/40
Inventor 焦继业叶新华赵尧主
Owner 西安恩狄集成电路有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products