Electronic cigarette cartridge authentication method and device and electronic cigarette

An authentication method and pod technology, applied in tobacco and other directions, can solve the problems of unguaranteed security and high cost of authentication methods, and achieve the effects of high cost, low hardware resource consumption, and improved security.

Pending Publication Date: 2021-01-22
WUHAN RUINAJIE ELECTRONICS TECH
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an authentication method, device and electronic cigarette for electronic cigarette pods, aiming to solve technical problems such as high cost and unguaranteed safety of the authentication method for electronic cigarette pods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic cigarette cartridge authentication method and device and electronic cigarette
  • Electronic cigarette cartridge authentication method and device and electronic cigarette
  • Electronic cigarette cartridge authentication method and device and electronic cigarette

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] figure 1 It is a flow chart of realizing the authentication method of the electronic cigarette pod shown in the second embodiment. The authentication method for electronic cigarette cartridges shown in Embodiment 1 is applicable to electronic cigarette cartridges, for example, placed in the MCU of the electronic cigarette stick. For ease of description, only the parts related to the embodiments of the present invention are shown, and the details are as follows:

[0045] Step S110, obtaining the random number sent by the electronic cigarette pod.

[0046] Step S120, using the random number to scramble the current plaintext to obtain a first scrambled plaintext.

[0047] Step S130, using the RC4 algorithm to encrypt the first scrambled plaintext to obtain first MAC data.

[0048] Step S140, comparing the first MAC data with the second MAC data sent by the electronic cigarette cartridge to determine whether the electronic cigarette cartridge is authenticated.

[0049] ...

Embodiment 2

[0066] image 3 It shows a block diagram of the authentication device of the electronic cigarette pod provided by the second embodiment of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are shown, including:

[0067] A random number acquisition module 110, configured to acquire the random number sent by the electronic cigarette pod;

[0068] A plaintext scrambling module 120, configured to use the random number to scramble the current plaintext to obtain a first scrambled plaintext;

[0069] An encryption module 130, configured to encrypt the first scrambled plaintext using the RC4 algorithm to obtain first MAC data;

[0070] The authentication module 140 is configured to compare the first MAC data with the second MAC data sent by the electronic cigarette cartridge, and determine whether the electronic cigarette cartridge is authenticated.

[0071] In the embodiment of the present invention, each m...

Embodiment 3

[0073] Embodiment 3 provides an electronic cigarette, which performs all or part of the steps shown in Embodiment 1 above. The e-cigarette includes:

[0074] at least one processor; and

[0075] a memory communicatively coupled to the at least one processor; wherein,

[0076] The memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute the method described in any of the above exemplary embodiments. method.

[0077] The specific manner in which the processor in the device in this embodiment performs operations has been described in detail in the embodiment of the authentication method for the e-cigarette cartridge, and will not be described in detail here.

[0078] Optionally, in this embodiment, a storage medium is also provided. The storage medium is a computer-readable storage medium, for example, a temporary or non-transitory computer-readable stora...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of electronic cigarette cartridge authentication, and provides an electronic cigarette cartridge authentication method and device and an electronic cigarette. The electronic cigarette cartridge authentication method comprises the following steps: acquiring a random number sent by an electronic cigarette cartridge; scrambling the current plaintextby adopting the random number to obtain a first scrambled plaintext; performing encryption processing on the first scrambling plaintext by using an RC4 algorithm to obtain first MAC data; and comparing the first MAC data with second MAC data sent by the electronic cigarette cartridge, and determining whether the electronic cigarette cartridge passes authentication or not. Due to the fact that theRC4 algorithm low in hardware resource consumption is adopted, the technical problem that an electronic cigarette cartridge authentication method is high in cost is effectively solved, the plaintext is scrambled through the random number, and the authentication safety is effectively improved.

Description

technical field [0001] The invention belongs to the technical field of authentication of electronic cigarette cartridges, and in particular relates to an authentication method and device for electronic cigarette cartridges. Background technique [0002] With the development of technology, the experience of electronic cigarettes is far superior to that of traditional cigarettes, which makes the electronic cigarette market huge. Most of the e-cigarette pods on the market do not have the function of anti-copying boards, so there are a large number of counterfeit e-cigarette pods on the market, which not only damages the interests of design companies, but also counterfeit e-cigarette pods may also be harmful to consumers’ physical and mental health. cause some damages. [0003] At this stage, there are many anti-counterfeiting means, such as security chips, special anti-copy board chips, and small-capacity EEPROMs. The security chip is a dedicated MCU that has passed security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): A24F40/40
CPCA24F40/40
Inventor 叶玉成张红磊张明宇
Owner WUHAN RUINAJIE ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products