Chip authentication method, system, printer, consumable chip and consumable box
A consumable chip and authentication method technology, which is applied in printing and other directions, can solve problems such as security loopholes in authentication methods, and achieve the effect of solving security loopholes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0086] An embodiment of the present invention provides a chip authentication method, which is executed on a printer.
[0087] Specifically, please refer to figure 1 , which is a schematic flowchart of Embodiment 1 of the chip authentication method provided by the embodiment of the present invention, as shown in figure 1 As shown, the method includes the following steps:
[0088] S101. Send an authentication instruction to the consumable chip.
[0089] It should be noted that the authentication instruction includes a specified code, and the specified code is compiled according to the program compilation format of the authentication consumable chip.
[0090] In a specific implementation process, the authentication instruction may also include but not limited to: at least one of command, length, data and check.
[0091] S102, receiving the operation result returned by the consumable chip.
[0092] S103, according to the operation result, determine whether the consumable chip ...
Embodiment 2
[0118] An embodiment of the present invention provides a chip authentication method, which is executed on a consumable chip.
[0119] Specifically, please refer to figure 2 , which is a schematic flowchart of Embodiment 2 of the chip authentication method provided by the embodiment of the present invention, as figure 2 As shown, the method includes the following steps:
[0120] S201. Receive an instruction sent by the printer.
[0121] S202. Identify whether the received instruction is an authentication instruction.
[0122] Specifically, the authentication instruction includes a specified code, and the specified code is compiled according to the program compilation format of the authentication consumable chip.
[0123] In a specific implementation process, the authentication instruction may also include but not limited to: at least one of command, length, data and check.
[0124] S203. If it is recognized that the received command is an authentication command, run a spe...
Embodiment 3
[0172] Based on the chip authentication method provided in the first embodiment above and the chip authentication method provided in the second embodiment above, an embodiment of the present invention provides a chip authentication system.
[0173] Specifically, please refer to image 3 , which is a functional block diagram of the chip authentication system provided by the embodiment of the present invention, such as image 3 As shown, the system includes:
[0174] The printer 31 is configured to send an authentication instruction to the consumable chip 32, the authentication instruction includes a specified code, and the specified code is compiled according to the program compilation format of the authentication consumable chip 32;
[0175] Consumables chip 32, configured to receive instructions sent by the printer 31;
[0176] The consumables chip 32 is also used to identify whether the received instruction is an authentication instruction;
[0177] The consumable chip 32...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com