KR20120059387A - Multiple market consumable id differentiation and validation system - Google Patents

Multiple market consumable id differentiation and validation system Download PDF

Info

Publication number
KR20120059387A
KR20120059387A KR1020110124601A KR20110124601A KR20120059387A KR 20120059387 A KR20120059387 A KR 20120059387A KR 1020110124601 A KR1020110124601 A KR 1020110124601A KR 20110124601 A KR20110124601 A KR 20110124601A KR 20120059387 A KR20120059387 A KR 20120059387A
Authority
KR
South Korea
Prior art keywords
consumer
unit
printer
code
cru
Prior art date
Application number
KR1020110124601A
Other languages
Korean (ko)
Inventor
브렌트 로드니 존스
브라이언 패터슨
Original Assignee
제록스 코포레이션
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 제록스 코포레이션 filed Critical 제록스 코포레이션
Priority to KR1020110124601A priority Critical patent/KR20120059387A/en
Publication of KR20120059387A publication Critical patent/KR20120059387A/en

Links

Images

Classifications

    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/50Machine control of apparatus for electrographic processes using a charge pattern, e.g. regulating differents parts of the machine, multimode copiers, microprocessor control
    • G03G15/5075Remote control machines, e.g. by a host
    • G03G15/5079Remote control machines, e.g. by a host for maintenance
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G15/00Apparatus for electrographic processes using a charge pattern
    • G03G15/55Self-diagnostics; Malfunction or lifetime display
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G21/00Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
    • G03G21/16Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements
    • G03G21/18Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit
    • G03G21/1875Mechanical means for facilitating the maintenance of the apparatus, e.g. modular arrangements using a processing cartridge, whereby the process cartridge comprises at least two image processing means in a single unit provided with identifying means or means for storing process- or use parameters, e.g. lifetime of the cartridge

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Control Or Security For Electrophotography (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

According to aspects of embodiments, systems for authenticating a consumer switchable unit (CRU) in a printer system, a computer readable medium by comparing the verification code in a consumer switchable unit (CRU) with a printer generated confirmation code, and Methods are provided. The confirmation code is a string of numbers and / or characters that can be referred to as a value. The confirmation code consists of a market program indicator or code string, a value string containing a combination of all or some of the randomly generated values that may be hidden from view and identification information. The codes are independently established by the printing system or device using the same algorithms and information and identify the resulting codes as they match. The printing system or device should verify the consumable's identification code and ID applicability to consider the consumable to be suitable for use.

Description

MULTIPLE MARKET CONSUMABLE ID DIFFERENTIATION AND VALIDATION SYSTEM}

This application is directed to a co-pending application in which the entirety of the name “CONSUMABLE ID DIFFERENTIATION AND VALIDATION SYSTEM WITH ON-BOARD PROCESSOR” by Agent Pat. No. 056-0259-KR, below, is incorporated by reference.

This disclosure relates generally to controlling interchangeable modules in a printing system, such as a digital printing device. More specifically, the present invention relates to a computerized method and system for encoding image device consumables such that products with suitable preprogramming can accommodate and recognize authorized consumables that are likely to face through their lifetime.

Many machines have interchangeable sub-assemblies. These subassemblies may be arranged as a unit called a cartridge and may be referred to as a consumer exchangeable unit (CRU), if intended for replacement by a consumer or machine owner. Examples of CRUs may include printer cartridges, toner cartridges, transfer assembly units, photoconductive imaging units, transfer rollers, fuser or drum oil units, and the like. It may be desirable for a CRU design to change over time due to manufacturing variations, or to address post-release problems with a machine, CRU, or CRU and machine interaction. It is known to provide a CRU with a monitoring device, commonly referred to as a customer exchangeable unit monitor (CRUM). CRUMs are typically memory devices, such as ROM, EEPROM, SRAM, or other suitable nonvolatile memory provided in or on the cartridge. Information identifying the CRU is recorded on the EEPROM during the manufacture of the CRUM. For example, information identifying a CRU as a developer cartridge and identifying the type of carrier, developer, and transfer mechanism included in the developer cartridge may be recorded in a memory included in the CRUM. When a CRU containing such a CRUM is installed in a machine, the control unit of the machine reads identification information stored in the CRUM.

It is also important to ensure that the CRU (Consumable Exchangeable Unit) certifies and meets the operating specifications of the Original Equipment Manufacturer (OEM). Imaging devices, such as printers, may be programmed to function differently in different markets, even if the hardware is the same. Actions such as reconstructing and copying electronic chip based identification not only entail product functional risks and reduced image quality for consumers, but also create significant problems that affect not only the manufacturer's interests but also legitimate resellers. Poor quality counterfeiting may also present problems to the consumer, such as, for example, insufficient sealing of fine toner powder and health and safety risks extending from the materials used. Similarly, a CRU beyond its useful life may have a detrimental effect on print quality and / or machine components. In some cases, it is desirable to determine whether a machine, in particular a CRU, operates in accordance with contractual obligations such as a warranty or a license.

An object of the present invention is to provide a multi-market consumable ID identification and confirmation system.

The present disclosure relates to a computerized method and system for authenticating an imaging device consumer exchangeable unit (CRU) used in products such as a printing system with proper programming to reliably recognize and accept authorized consumables. The microcontroller or processing chip can be integrated with the CRU and generate an identification code. The code key consists of a value string comprising a market program indicator or coded character representing a combination of code, consumable identification (ID) information, and a randomly generated value that may be hidden from view. The resulting string key is based on the algorithm generated confirmation code. This code is generated by the consumable processor and readable by the printing system or device into which the CRU is inserted. The codes are independently established by the printing system or device using the same algorithms and information and identify the resulting codes as they match. The printing system or device should verify the consumable's identification code and ID applicability to be considered appropriate for use.

1 is a simplified front view of a printing system such as a phase change ink image generation machine having a controller capable of implementing authentication services for at least one replaceable unit in accordance with one embodiment.
2 is an exemplary block diagram of a controller and replaceable units having a memory structure according to one embodiment.
3 is an illustration of a customer replaceable unit and printer system replacement sequence, according to one embodiment.
4 is an illustration of an electro-photographic printer having a coupling and control unit with CRUMs of a developer cartridge and a toner cartridge according to one embodiment.
5 is an illustration of hardware and operating environment in a consumer switchable unit according to one embodiment.
6 is a flow chart of a method for authenticating a consumer exchangeable unit in a printer system according to one embodiment.
7 is a flow chart of a method for generating a printer system confirmation code and a CRU certificate in accordance with one embodiment.
8 is a flow chart of a method of generating and storing a confirmation code in a consumer exchangeable unit according to one embodiment.
9 is a flow chart of a method of identifying a consumer exchangeable unit, according to one embodiment.
10 is a flow chart of a method for authenticating and verifying a CRU in a printing system according to one embodiment.

In one aspect, the invention relates to a computerized method and system for authenticating consumables in a product such as a printing system. The consumables can include any of a number of items, including but not limited to toner cartridges, marking or imaging units, and other components well known in the art. The consumables include a processing chip capable of generating a verification code. The consumable has a code key that contains a market program indicator or code, a value string that includes programmed characters that represent a combination of consumable identification information and a randomly generated value that may be hidden from view. The product reads data at the time of shipment of consumables to derive an equivalent code key. The resulting string key is based on an algorithm generated confirmation code generated by both the product and the consumables. In the first case, the confirmation code is readable by the device generated and inserted in the consumable processor. In other cases, the confirmation is recorded or stored in the consumables and the confirmation code is generated in the product through the authentication function.

As used herein, the term “printing system” or “printer” refers to a digital copier or printer, an image printing machine, a digital printing machine, an image reproduction machine, a bookmaking machine, a facsimile machine, a composite machine, and the like, and various marking engines, It may include feed mechanisms, scanning assemblies as well as other print media processing units such as paper feeders, finishers, and the like.

As used herein, the terms "controller area network" or "control area network" (CAN) are typically used to describe the control bus and associated control processor found in a printer system.

1 is a simplified front view of a printing system such as a phase change ink image generation machine 100 or a solid ink (SI) printer having a controller capable of implementing authentication services for at least one replaceable unit in accordance with one embodiment. As illustrated, the solid ink printer 100 includes a frame 11 on which all its operating subsystems and components are mounted, directly or indirectly, as described below. To begin, the solid ink printer 100 is shown in the form of a drum, but equally includes an imaging member 12 which may be in the form of a supported endless belt or other movable surface. The imaging member 12 movable in the direction 16 has an imaging surface 14, which may be an intermediate transfer surface or coating on which phase change ink images are formed. Ink images formed on the surface 14, such as paper, which may be heated before the heated fixed roller 19, which is rotatable in the direction 17, enters the heated fix nip 18, may be formed of a medium ( 49 is loaded against the surface 14 of the drum 12 to form a fixed nip 18 fixed on it. In the phase change ink image generation machine 100, the printing process starts with a maintenance drum / roller 21ACD that applies an ultrathin liquid layer such as silicone oil to facilitate ink discharge from the drum 12. Molten ink from the feed system flows to the printhead 32 and, in this example, to the ink reservoir of the second printhead 34. Any number of printheads may be used. The maintenance drum 21ACD includes a CRUM including a nonvolatile memory device (eg, electrically erasable programmable read only memory (EEPROM), flash memory, etc.) electrically connected to the controller 80. The terms CRUM or chip are intended to mean essentially the same and may be used interchangeably herein.

The solid ink printer 100 includes a phase change ink loader 20 configured to receive phase change ink in solid form, referred to herein as ink or toner cartridge or solid ink sticks. The ink loader 120 also includes a phase change ink melt assembly (not shown) that melts or phase changes the phase change ink in solid form into liquid form. Phase change inks are typically solid at room temperature. The ink melting assembly is configured to heat the phase change ink to a melting temperature selected to phase change or melt the solid ink into its liquid or molten form. Currently, common phase change inks are typically heated to about 100 ° C. to 140 ° C. to melt the solid ink for delivery to the printhead (s).

As further shown, the phase change ink image generation machine or SI printer 100 includes a medium or substrate supply and processing system 40. Substrate supply and processing system 40 may include, for example, a sheet or substrate supply sources 42, 44, 46, wherein feed source 46 is, for example, path 48 and path. A high capacity paper feed or feeder for storing and feeding image receiving substrates in the form of cut sheets 49 through 50. Substrate supply or processing system 40 also includes a substrate or seat heater or pre-heater assembly 52. SI printer 100 as shown also includes an original document feeder 70 having a document holding tray 72 and a document exposure portion and scanning system 76.

Operation and control of the various subsystems, components, and functions of the machine or SI printer 100 are performed with the help of a controller or electronic subsystem (ESS) 80. For example, the ESS or controller 80 may be a self-contained dedicated mini-computer having a central processing unit (CPU) 204, electronic storage 206, 208, 210, and a display or user interface (UI). have. For example, the ESS or controller 80 includes sensor input and control as well as pixel placement and control as shown in FIG. In addition, the CPU 204 reads image input flows, such as the scanning system 76, or image data flow between the online or work station connection 90 and the printhead assemblies 32, 34, 36, 38. Capture, prepare and manage. As such, the ESS or controller 80 is the main multi-tasking processor that operates and controls the machine subsystems and functions. Multiple controllers or processing units may be used, each achieving specific operational functions that may be different from other processing units. Appropriate references to controllers or processors are intended to include non-descriptive configurations in which multiple such units may be used.

As illustrated, solid ink printer 100 is used with multiple different colors of solid ink, typically cyan 22, magenta 24, yellow 26, and black 28 (CMYK). And a multicolor imaging solid ink printer comprising a phase change ink processing system 20 configured for the purpose. However, solid ink printer 100 may be configured to use somewhat different colors or shades of ink. The melt assembly (not shown) includes a heated plate.

Ink sticks 22, 24, 26 and 28 of each color are delivered through corresponding individual ones of the feed channels. The ink processing system 20 has a unique key plate with openings to assist the printer user in ensuring that only ink of the appropriate color is inserted into each feed channel. Each of the ink cartridges may include an electronically readable identification device. A CRUM or similar ID chip achieves authentication and verification as previously described. "ID information" contained in a CRU chip or CRUM includes all information about the CRU including values related to security, verification and CRU usage. Specific reference to the ID of the CRU excludes random values and security aspects of identification, such as a confirmation key or code.

An example of a consumer exchangeable unit (CRU) monitoring system 200 in a network arrangement is shown in FIG. 2. An example of a monitoring system 500 in a consumable with at least a controller and memory structure is shown in FIG. 5. The monitoring system 500 has similar hardware as shown for the controller 80 in FIG. 2. Regardless of the arrangement, each CRUM may include multiple memories and different types of circuits. Contact pads, pins, and the like are provided to enable the CRUM to be electrically connected and disconnected from the printing system upon installation or removal of the CRU. Each CRU includes a memory structure created in non-volatile memory (NVM) with assigned fields of protection and assigned levels as discussed in FIGS. 3 and 5. The CRUs are communicatively connected to the controller 80 or to each other by a communication path that may include cabling, optical coupling, or wireless means using infrared, radio frequency (RF), ultrasonic, optical technology, and the like. The communication path may also be a network such as a standard wide area network (WAN) 232, or a CAN-bus 230, or the like. The CRUM stores specific functions determined from monitored fields, such as a key string, to facilitate determination of the confirmation code, or information about the CRU, such as installation date, identification information, and embedded executables that perform the fields. It may also include an addressable memory.

The description of FIG. 2 provides an overview of computer hardware and a suitable computing environment along with which of some embodiments may be implemented.

Controller 80 includes a processor 204 commercially available from Intel®, Motorola®, Cyrix®, and others. The controller 80 also enables random access memory (RAM) 206, read-only memory (ROM) 208, and one or more large storage devices 210, and various system components to the processing unit 204. And a system bus 212 for coupling. Memory 206, 208, and mass storage devices 210 are types of computer accessible media. Mass storage devices 210 are more specifically types of non-volatile computer accessible media and may include one or more hard disk drives, floppy disk drives, optical disk drives, and tape cartridge drives. The processor 204 executes computer programs stored on a computer accessible medium.

The controller 80 can be communicatively connected to the internet 214 via the communication device 216. Internet 214 connectivity is well known in the art. In one embodiment, communication device 216 is a modem that responds to communication drivers to connect to the Internet through what is known in the art as a "dial-up connection." In another embodiment, communication device 216 is itself connected to a local area network (LAN) that is connected to the Internet via what is known in the art as a "direct connection" (eg, T1 line, broadband, etc.). ® or similar hardware network card.

The user enters commands and information into the controller 80 through input devices such as a keyboard 218 or pointing device 220. Input device 218, such as a keyboard, allows input of syntax information to computer 36, as is known in the art, and the embodiments are not limited to any particular type of keyboard. Pointing devices (not shown) such as touch pads, trackballs, remote controls and point sticks allow control of the screen pointer provided by the graphical user interface (GUI) of operating systems such as versions of Microsoft Windows®. .

In some embodiments, the controller 80 is operatively coupled to the display device 222. Display device 222 is connected to a system bus 212. Display device 222 allows the display of information including computer, video and other information for viewing by a user of the computer. Embodiments are not limited to any particular display device 222. In addition to the monitor, the computer typically includes other peripheral input / output devices such as printers (not shown). Speakers 224 and 226 provide the audio output of the signals. The speaker is also connected to the system bus 212.

The controller 80 also includes a computer accessible media RAM 206, a ROM 208, and an operating system (not shown) that is stored on the mass storage device 210 and executed by the processor 204. Examples of operating systems include Microsoft Windows®, Apple MacOS®, Linux®, UNIX®. Examples are not limited to any particular operating system, but the configuration and use of such operating systems are well known in the art.

Embodiments of the controller 80 are not limited to any type of computer. In varying embodiments, the controller 80 includes a PC-compatible computer, a MacOS®-compatible computer, a Linux®-compatible computer, or a UNIX®-compatible computer. The construction and operation of such computers is well known in the art.

The controller 80 can be operated using at least one operating system to provide a graphical user interface (GUI) that includes a user controllable pointer. The controller 80 is capable of accessing at least one operating system to enable users of the controller 80 to access intranets, extranets or Internet world-wide-web pages when addressed by universal resource locator (URL) addresses. It can have at least one web browser application program to run within. Examples of browser application programs include Netscape Navigator® and Microsoft Internet Explorer®.

Controller 80 can operate in a networked environment using logical connections to one or more remote devices, such as CRUs 21A & 21ACD. These logical connections are achieved by a communication device coupled to the controller 80, or part of the controller. The logical connections shown in FIG. 2 include a local area network (LAN) and a wide area network (WAN) 232. Such networking environments are commonplace in offices, enterprise computer networks, intranets, extranets and the Internet.

When used in a LAN-networking environment, the controller 80 and modules are connected to the local network through network interfaces or adapters 234, which is one type of communication device 216. Remote computer 228 also includes a network device 236. When used in a conventional WAN-networking environment, computer 36 and remote computer 228 communicate with WAN 232 via a modem (not shown). The modem, which may be internal or external, is connected to the system bus 212. In a networked environment, program modules depicted for the controller 80, or portions thereof, may be stored in the remote computer 228. Controller 80 also includes a power source 238. Each power source may be a battery.

3 is an illustration of a consumer replaceable unit and printer system exchange sequence 300 according to one embodiment. The exchange prints the identification information associated with the consumer exchangeable unit including the randomly generated value, a data value selected from the group consisting of market indicator codes, and a confirmation code (VC CRUM ) calculated at the CRU or stored in the CRU. Beginning with CRU 310 providing to 320. The pull values from the selection elements or ID information are used to establish the code key, and then the algorithm is used for the key string to generate the confirmation code. The printing system receives the data value including the confirmation code, the ID and the random value, and other information listed above (340). With the data received, the printing system performs an authentication function 350 that calculates a confirmation code. This function is preferably secret for the manufacture of unique and preferably authentic CRUs. Preferably, this one-to-one mapping is not a requirement, but the preparation function may map the selections received from the CRU to the unique results. A cryptographic hash algorithm such as MD5 (Message Digest 5) or SHA-1 (Secure Hash Algorithm) may be used as the function. Aspects of elements that establish code keys or other variables and / or confirmation codes may be changed based on market program, geography, initial installation as opposed to subsequent installations, promotional units, and the like.

Then, after the printer system generates its independent identification code (V System ) or any other code that distinguishes the product type, manufacturer, etc., the printer system continues the process of authenticating the consumer exchangeable unit. The authenticating process 360 may compare the internally calculated value of V SYSTEM with the value of V CRUM read from the CRU. If the values match, this is an authorized CRU of type "XXX" available for that printer system. If an invalid authentication code is detected, all valid flags and the remaining media counters may be reset to zero and may be locked by a reset flag process well known to those skilled in the art. In addition to disabling print services, an error code indicating “data mismatch” or “communication failure” is generated, which may be stored in the consumable's memory and possibly displayed on an appropriate operator interface. Other codes are equally possible, such as "fully used" or "VOID" or similar description indicating an unusable condition.

After the consumable is identified, it is used in the printer system in the consumable use process 370 to enable printing functions. If it is determined that the CRU has been completely consumed by the consumable usage process, an identifier of the consumable, such as a serial number (S / N), is stored in the list of used consumable data indicating that the particular consumable is completely consumed. The used consumables data list may include the identification of all consumables loaded into the printing system and the percentage of life remaining in each consumable. Products may be programmed to exclude the acceptance of consumables past the serviced date or adhering to code results indicating a limited way of "N" days, weeks or months from the final consumable replacement. Initial types of genuine consumables may still be used if the correct enabling or authentication code provided by the supplier after verification has been manually entered. In this case, the S / N of the unit is tracked and duplication is not allowed. Duplicate S / Ns are evidence of illegal units. Marketing indicators or codes, also referred to as program codes, relate to serial numbers and may be encoded at appropriate distribution points under control by the manufacturer.

4 is an illustration of an electro-photographic printer having a coupling and control unit with CRUMs of a developer cartridge and a toner cartridge according to one embodiment. The illustrated consumer replaceable units are a plurality of toner cartridges 402, each of which may have separate consumable processors 500. An electro-photographic printer utilizes each of a replaceable photosensitive cartridge, a replaceable developer cartridge 413, and a replaceable toner cartridge 415, each designed to provide a predetermined number of images in the form of a print or copy. A laser printer having a laser or LED unit 417. And while a printer is illustrated as one printer in the following description and figures, other types of reproducing machines, such as copiers, inkjet printers, etc., may be considered.

Cartridges 402 are typically guaranteed to produce a predetermined number of images Y, respectively. When the number of remaining images reaches a predetermined level (X), a warning is provided. This warning allows the consumer time to order a new cartridge. After the warning is given, the machine continues to build the final remaining images (X). At this time, the entire images Y are created, the cartridge is disabled, and further operation of the machine 10 is prevented. At this time, the "dead" cartridge must be removed and replaced with a new "live" cartridge for further operation of the printer.

The photosensitive cartridge includes a photosensitive drum 411 whose outer surface is coated with a suitable photoconductive material, and a filling device for filling the drum photoconductive surface 411 in preparing for imaging. The drum is suitable for rotation in the cartridge body, and the drum 411 has its photoconductive surface or conveying belt 407 mounted to the exposed portion of the printer, the developer 413, and the transfer stations in the installation of the cartridge in the machine. Rotate in the direction to pass. In addition to ensuring that only an applied and still valid zero graphics developer 413, and toner cartridges 415 are used, it is also possible to maintain a running count of the number of images made up of each cartridge and ensure that all cartridges are exhausted. To prevent other uses when each cartridge has an identification / memory chip in the form of a consumer replaceable unit memory (CRUM) 500 integrated therewith.

The CRUM 500 may have a number of interactive functions, for example, to allow the printer to send messages for a cartridge through a user interface or by a programmed command, and to determine the amount or components of available toner inside the cartridge. Monitor the movement of subcomponents or pixels to verify lifetime, provide a handshake feature with the controller 80 to ensure that the correct cartridge is installed in the printer, and Stop, enable cartridge life cycle planning during manufacturing, enable remote diagnostics, and provide a secure interlock to the printer.

As discussed with reference to CRUMS 21A- 21ACD, CRUM 500 may be an electrically erasable programmable read only memory (EEPROM). Alternatively, the CRUM can be any type of electronic memory, such as a ROM, RAM, self readable, bar code or optical memory system. It is also possible that the CRUM may comprise multiple memory means of different types.

5 is an illustration of hardware 500 and operating environment in a consumer replaceable unit, such as in toner cartridge 415 or drum maintenance unit 21ACD, according to one embodiment. The CRU has a minimum of an input / output (I / O) interface 505 that exchanges data with various controllers in the printing system or authorization authority having a processor that authenticates the CRU before it can operate in a printing environment. The processor performs an authentication function after compiling software 514 in storage device 512. It should be noted that the operating system of the processor 510 may be different from the OS of the controller or the CPU 204. The software component 514 is an object 516 that performs functions for generating random numbers or randomly generated values, executable or program code for performing data collection and manipulation, key code generation algorithms, and algorithms for generating verification codes. You can also have Random numbers may be generated at the factory or recorded in the CRUM. Memory unit 518 may include one or more caches, ROM, PROM, EPROM, EEPROM, flash, SRAM, or other devices, but memory is not limited thereto. The memory unit is a unique identifier assigned to the chip of the CRU, a factory assigned serial number, a factory assigned random number, a media access control address, a key code element string, an identification assigned by an external source or determined in situ. A code, market indicator code, additional identification or manufacturing information, product type, manufacturer, or any other code that identifies the manufacturer can be held. The contents of the storage 512, in particular the authentication program (software 514) and the stored data 516, are stored in a secure area to hide from potential theft. The authentication program cannot be read from the processor and the program cannot be observed during execution. This helps to prevent potential illegals from determining or restoring the authentication algorithm that calculates the verification code. The same protection is provided to algorithms, data, and execution sequences in the printing system or authorization authority.

6 is a flow chart of a method 600 for authenticating a consumer exchangeable unit in a printer system according to one embodiment. The use of a processing chip rather than some form of ROM or other non-processing chip in the consumable causes the confirmation code to be determined within the consumable rather than being written to the consumable. The actions of method 600 are performed in a consumer exchangeable unit, and the results from the CRU are then processed in an authorization entity, such as the printing system shown in FIG. In action 605, the CRU generates a first confirmation code using a programmed algorithm. In action 610, the confirmation code generated from action 605 is transmitted by action 610 along with the data value for the CRU. The data value includes data selected from the group consisting of ID information associated with a consumer exchangeable unit, a randomly generated value, and a market indicator code. Selection elements from these values, and if desired ID information, are used to establish the code key string, and then the algorithm is used for the key string to generate the confirmation code. Control then passes to action 615 at authentication authority. In action 615, authorization permission to use the same key stream and use the same algorithm as used in the CRU generates a second verification code. At action 620, a determination is made between the first and second confirmation codes. The determination at action 620 is a comparison of the two strings to see if there is a match. If a match exists, the CRU is authenticated (625) and the function is allowed. If no match exists, the CRU is rejected (630) and is prevented from operating. Preventing CRUs from operating may protect the printing system from incompatible units that may introduce harmful or incompatible chemicals or materials and / or only within certain circumstances, such as contract supply programs or geographic areas. It may also prevent the use of consumer exchangeable units intended to be available. The printing systems may be preprogrammed to generate confirmation codes in multiple ways with the resulting value string used for comparison matching against the confirmation code generated by the consumable processor. As long as the number of confirmation codes generated by one or any intended sequence, batch or printing system matches the intended values or values in the CRU, this is acceptable. In this way, periodic changes in the method or algorithm used to generate the verification code may, but may not, hinder yield from the source reading the method used initially.

7 is a flow chart of a method 700 for generating a printer system confirmation code and a CRU certificate in accordance with one embodiment. The method 700 covers a scenario in which the confirmation code and data reside in the CRU. In action 705, ID data and confirmation code are read from the CRU. In action 710, a system verification code is generated. The system identification code is a key generated by a system such as a printer using well known algorithms. In action 715, a comparison is made between the confirmation code read from the CRU and the system confirmation code generated by the printer. If a match is found to exist, the CRU is allowed to operate. If there is no match, control returns to action 705 where a new CRU is introduced into the system or a new code is introduced into the CRU, and the authentication process is repeated.

8 is a flow chart of a method 800 for generating and storing a confirmation code in a consumer exchangeable unit, according to one embodiment. In method 800, authorization authority selects an authentication function based on the CRU. In action 805, the action begins when the CRU is first inserted into the printing system. In action 810, the processor selects an authentication function for a consumer exchangeable unit. This selection may be based on the geographic location of the printing system, differences between CRU generations, variations due to market programs, geography, first to subsequent installations, promotional units, and the like. As an example, one type may use a five digit code, and the other type is a six digit code. These differences can be accommodated by implementing the printing system with different algorithms that can be selected in the appropriate situation. The authentication function is then selected at action 810, and control passes to action 815 for further processing. In action 815, the ID information can be read by the processor and analyzed by the selected authentication function. In action 820, a system verification code is calculated from the read ID information. In action 825, the confirmation code may be stored in volatile memory to be compared against the CRU confirmation code.

9 is a flow chart of a method 900 for identifying a consumer exchangeable unit, according to one embodiment. The methods 900 and 1000 generally illustrate the system's data flow and operation flow for one particular embodiment that checks the reliability of a CRU loaded into a printing system. When a CRU is initially installed, the printing system first detects the newly loaded CRU via the CRU detection process 910. The CRU may be detected by a mechanical sensor by recognizing the proximity of the radio frequency transponder, or by any other suitable sensor for such detection. After detection of a new CRU, the printer reads values of serial number (S / N), confirmation code, CRU type, etc. from memory on the installed CRU (915).

The reading of the data may be done as successive processes of serial number (S / N) reading process, CRU type reading process, and confirmation code reading process. The order of these operations is not critical and may be performed in a different sequence in other embodiments without departing from the scope of the present invention. After reading the CRU type, the validity of the CRU for a particular printing system is tested in the consumable type validity checking process 920. The CRU type may include physical forms such as keying features and / or package sizes and shapes. Physical shape differences are generally reserved for different product lines. Valid types of CRUs are known for certain printing systems. If the CRU is of an invalid type for a particular printing system (925), the host will report the status of the incompatible CRU using the status report process or reject report (935) and terminate (940). If the media type is incompatible with a particular host, there is no need to check the reliability of the media. If the CRU is a valid type for the printing system, authentication process 930 is initiated. Note that although a CRU serial number or other identifying information may be rejected and included in one or more CRU field activity / use databases, it may be captured.

10 is a flow chart of a method for authenticating and verifying a CRU in a printing system according to one embodiment. Authentication function data 1005 is available for use in checking the reliability of the CRU. Before the printing system is sold, it may be programmed with the same authentication function that was later used to manufacture the CRU for use in the printing system. The sequence of actions defining the authentication function may be stored in the printing system as authentication function data. If the CRU is a valid type for a particular printing system, the CRU validity code 1010 is checked using the authentication function 1005 in the validity code check process 1015. The authentication check process 1015 executes an algorithm that defines an authentication relationship using different validity codes as input and compares its internally calculated value with the value read from the CRU. If they match (1020), this is an authorized CRU of type “XXX” available for that printing system. If the CRU is detected with an inappropriate authentication code (1020), all valid flags and counters may be reset to zero and may be locked by the flag reset process. Such a counterfeit CRU may be detected by the printer and disabled for any future application if detected by setting its state, such as "fully used." The status report process or reject report 935 ends the authentication method 1000 (940). The CRU data list used is made available to the printing system (1025) to confirm (1030) that a previously consumed cartridge has not been inserted. After the CRU is identified, it is used at the host in the consumable use process 460. When it is determined that the CRU has been completely consumed, an identifier of the CRU, such as a unique serial number, is stored in the used consumable data list 1035 indicating that the particular consumable is fully used. The consumable data list used may include the identification of all consumables loaded into the printing system and the percentage of life remaining in each consumable.

While specific embodiments of the present technology have been described, those skilled in the art will understand that there are other embodiments that are equivalent to the described embodiments. Accordingly, it should be understood that this technique is not limited by the particular illustrated embodiments, but only by the scope of the appended claims.

Claims (10)

An authentication method for authenticating a consumer exchangeable unit in a printer system,
Reading identification data and key code elements stored on the consumer exchangeable unit;
Reading a confirmation code stored on the consumer exchangeable unit;
Applying an authentication function to the identification data and key code element to calculate a printer generated confirmation code;
Determining that the consumer exchangeable unit is authenticated only if the confirmation code corresponds to the printer generation confirmation code; And
Allowing use of the consumer switchable unit in the printer system when the consumer switchable unit is determined to be authenticated.
The method of claim 1,
The identification data is at least one from a group comprising a customer exchangeable unit serial number, chip serial number, unique ID, fill amount, life estimation threshold, life data, remaining life identifier, product code and part number. An authentication method for authenticating a consumer switchable unit comprising the above values.
The method of claim 1,
And the key code element is a string value and a randomly generated value based on the identification data.
The method of claim 3, wherein
And wherein said authentication function is a cryptographic transformation of at least a portion of said identification data and a key code element.
The method of claim 3, wherein
The authentication function using a SHA-1 (Secure Hash Algorithm) engine.
A network arrangement for authenticating switchable units of a printing system,
A network connecting a plurality of locations in the printing system;
A switchable unit at each of the locations connected to the network, each switchable unit having a memory structure having identification data, a key code element, and a confirmation code; And
A controller connected to the switchable unit at each of the locations via the network;
The controller,
Read the identification data and the key code element stored on a consumer exchangeable unit,
Read the verification code stored on the consumer exchangeable unit,
Apply an authentication function to the identification data and key code element to calculate a printer generated confirmation code,
Only if the confirmation code corresponds to the printer generated confirmation code, determines that the consumer exchangeable unit is authenticated,
By allowing the use of the consumer switchable unit in a printer system when the consumer switchable unit is determined to be authenticated,
And a network arrangement for authenticating a consumable unit of a printing system that executes instructions for processing authentication services for each of the locations.
The method according to claim 6,
The identification data is at least one from a group comprising a customer exchangeable unit serial number, a unique ID, a fill amount, a life estimation threshold, life data, a remaining life identifier, a chip serial number, a product code and a part number. A network arrangement for authenticating a consumable unit of a printing system, comprising the above values.
The method of claim 7, wherein
And the key code element is a string value and a randomly generated value based on the identification data.
The method of claim 8,
And determining whether the consumer exchangeable unit is compatible with the printing system based on the identification data.
The method of claim 9,
Providing a counter configured to be read by the printer system on the customer replaceable unit,
Periodically update the consumer replaceable unit usage value in the counter to reflect the range of use or consumption of the consumer replaceable unit when the consumer exchangeable unit is used,
Read the customer replaceable unit usage value by the printer system,
Determine that the consumer replaceable unit is authenticated only when the consumer replaceable unit usage value is less than a predetermined value,
Allowing use of the consumer replaceable unit in the printer system when the consumer exchangeable unit is authenticated, and disabling use of the consumer replaceable unit in the printer system when the consumer exchangeable unit is not authenticated. And a network arrangement for authenticating the consumable unit of the printing system.
KR1020110124601A 2010-11-29 2011-11-25 Multiple market consumable id differentiation and validation system KR20120059387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020110124601A KR20120059387A (en) 2010-11-29 2011-11-25 Multiple market consumable id differentiation and validation system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/955,321 2010-11-29
KR1020110124601A KR20120059387A (en) 2010-11-29 2011-11-25 Multiple market consumable id differentiation and validation system

Publications (1)

Publication Number Publication Date
KR20120059387A true KR20120059387A (en) 2012-06-08

Family

ID=46610683

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020110124601A KR20120059387A (en) 2010-11-29 2011-11-25 Multiple market consumable id differentiation and validation system

Country Status (1)

Country Link
KR (1) KR20120059387A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015056870A1 (en) * 2013-10-18 2015-04-23 Samsung Electronics Co., Ltd. Crum chip, image forming device for verifying consumable unit comprising the crum chip, and methods thereof
CN113777899A (en) * 2021-09-18 2021-12-10 珠海奔图电子有限公司 Security verification method, consumable chip, consumable and image forming apparatus

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015056870A1 (en) * 2013-10-18 2015-04-23 Samsung Electronics Co., Ltd. Crum chip, image forming device for verifying consumable unit comprising the crum chip, and methods thereof
US9581935B2 (en) 2013-10-18 2017-02-28 Samsung Electronics Co., Ltd. Crum chip, image forming device for verifying consumable unit comprising the crum chip, and methods thereof
US9864300B2 (en) 2013-10-18 2018-01-09 S-Printing Solution Co., Ltd. CRUM chip, image forming device for verifying consumable unit comprising the CRUM chip, and methods thereof
CN113777899A (en) * 2021-09-18 2021-12-10 珠海奔图电子有限公司 Security verification method, consumable chip, consumable and image forming apparatus

Similar Documents

Publication Publication Date Title
KR101789833B1 (en) Consumable id differentiation and validation system with on-board processor
US8532506B2 (en) Multiple market consumable ID differentiation and validation system
US7970292B2 (en) Consumable unit and image forming apparatus including memory storing consumable item information
CN102043361B (en) Image forming appartus
US8453260B2 (en) Unit using OS and image forming apparatus using the same
JP5016189B2 (en) Electronic device, electronic device control method, program, and recording medium
KR20130085554A (en) Image forming apparatus for using consumable unit and method for certifying the consumable unit
US20140082302A1 (en) Systems and methods for employing an electronically-readable monitoring module associated with a customer replaceable component to update a non-volatile memory in an image forming device
US20230120746A1 (en) Toner refill control of image forming apparatus
US20240142892A1 (en) Method for error handling in the toner refill process
KR20120059387A (en) Multiple market consumable id differentiation and validation system
US8913902B2 (en) Systems and methods for generating and detecting unique identification signatures for customer replaceable units in image forming devices
JP2004062078A (en) System and method for identifying consumables
KR20070075101A (en) Method and apparatus for image forming
US20030191718A1 (en) Method and data processing system providing a pay-for-usage managed print service
JP5157280B2 (en) Image forming apparatus, printing control method and printing control program for the same, and consumable unit

Legal Events

Date Code Title Description
A201 Request for examination
A302 Request for accelerated examination
E902 Notification of reason for refusal
E601 Decision to refuse application