![]() ADVANCED PROTECTION SYSTEM OF CONSUMABLE OR DETACHABLE ELEMENTS
专利摘要:
The invention relates to a method for authenticating a consumable or detachable element (20) of a continuous ink jet printer (CIJ), comprising: - the generation, by the controller (3) of the printer, a first random information, and sending it to an authentication circuit of the element, - the encryption of this first random information, by this element authentication circuit, by a 1st encryption algorithm, and a 1st secret key, thus forming a first encrypted random information, and sent to the printer controller, - the encryption of this first random information, by the controller of the printer, by a second encryption algorithm, and a second key secret, thus forming a second encrypted random information, - the comparison of the first encrypted random information and the second encrypted random information. 公开号:FR3032540A1 申请号:FR1550958 申请日:2015-02-06 公开日:2016-08-12 发明作者:Damien Bonneton 申请人:Dover Europe SARL; IPC主号:
专利说明:
[0001] TECHNICAL FIELD AND PRIOR ART The invention relates to the field of continuous ink jet (CU) printers. It also relates to a device and a method for securing the use of such a printer and / or the use of spare parts or consumables, for example ink cartridges or solvent, implemented in such a printer. [0002] Continuous inkjet (CIJ) printers are well known in the field of coding and industrial marking of various products, for example to mark barcodes, the expiry date on food products, or references or distance marks on the cables or pipes directly on the production line and at high speed. This type of printer is also found in some areas of decoration where the graphic printing capabilities of the technology are exploited. These printers have several standard subassemblies as shown in FIG. 1. First, a print head 1, generally offset relative to the body of the printer 3, is connected thereto by a flexible umbilicus 2. bringing together the hydraulic and electrical connections necessary for the operation of the head by giving it a flexibility that facilitates the integration on the production line. The body of the printer 3 (also called desk or cabinet) usually contains three subsets: - an ink circuit in the lower part of the desk (zone 4 '), which allows on the one hand, to provide ink at the head, at a stable pressure and of adequate quality, and secondly to take charge of the jet ink, not used for printing, 3032540 2 - a controller located at the top of the desk (zone 5 '), able to manage the sequencing of actions and to carry out the treatments allowing the activation of the various functions of the ink circuit and the head. The controller 5 may comprise, for example, a microcomputer or a microprocessor and / or one (or more) electronic card and / or at least one embedded software, whose programming ensures (s) the control of the ink circuit. 4 and the print head 1. This controller makes it possible to transmit the printing instructions to the head but also to control the motors and the valves of the system in order to manage the power supply of the circuit in ink and / or solvent as well as as the recovery of the mixture of ink and air from the head. It is therefore programmed for this purpose, an interface 6 which gives the operator the means to implement the printer and to be informed about its operation. In other words, the cabinet comprises two subassemblies: in the upper part, the electronics, the power supply and the operator interface, and in the lower part an ink circuit supplying the ink, of nominal quality, under pressure. at the head and depression recovery of ink not used by the head. Figure 2 schematically shows a print head 1 of an ICJ printer. It comprises a drop generator 60 supplied with electrically conductive ink, pressurized by the ink circuit. [0003] This generator is capable of emitting at least one continuous stream through a small orifice called a nozzle. The jet is transformed into a regular succession of drops of identical size under the action of a periodic stimulation system (not shown) located upstream of the outlet of the nozzle. When the drops 7 are not intended for printing, they go to a gutter 62 which recovers them to recycle the unused ink and send it back into the ink circuit. Devices 61 placed along the jet (charge and deflection electrodes) make it possible, on command, to electrically charge the drops and to deflect them in an electric field Ed. These are then deviated from their natural trajectory of ejection of the generator of drops. The drops 9 intended for printing escape the gutter and will be deposited on the print medium 8. [0004] 3032540 3 This description can be applied to so-called continuous jet (CIJ) printers or multi-deflected continuous jet. The binary CIJ printers are equipped with a head whose drop generator has a multitude of jets, each drop of a jet can be oriented only to 2 paths: printing or recovery. In multi-deflected continuous jet printers, each drop of a single jet (or a few spaced jets) can be deflected on various paths corresponding to different charge commands from one drop to the next, thereby achieving a scanning the area to be printed in a direction which is the deflection direction, the other scanning direction of the area to be printed is covered by relative movement of the print head and the print medium 8. Generally the elements are arranged so that these two directions are substantially perpendicular. An ink circuit of a continuous ink jet printer makes it possible, on the one hand, to supply ink under controlled pressure, and possibly solvent, to the drop generator of the head 1 and, on the other hand, on the other hand, to create a depression to recover fluids not used for printing and which then come back from the head. It also allows the management of consumables (dispensing of ink and solvent from a reserve) and the control and maintenance of ink quality (viscosity / concentration). Finally, other functions are related to the comfort of the user and the automatic taking over of certain maintenance operations to guarantee a constant operation whatever the conditions of use. Among these functions are the solvent rinse of the head (drop generator, nozzle, gutter), the preventive maintenance aid, for example the replacement of components with limited life, including filters, and / or pumps. [0005] These different functions have very different ends and technical requirements. They are activated and sequenced by the controller of the printer which will be all the more complex as the number and sophistication of the functions will be great. [0006] 3032540 4 Consumables are essentially in the form of cartridges or bottles, containing the ink or solvent suitable for the operation of the machine. There are various ways to identify such a cartridge or bottle. Solutions based on identification means are known, as for example described in US 6738903, but they do not make it possible to avoid cloning or emulation of the tag implemented, in particular in the case of applications not connected to the device. network. [0007] Another solution is known from WO 97/28001. But these solutions do not solve the problem of being able to guarantee the authenticity of the consumable installed in order to be able to guarantee the behavior of the printer and the performances of the printing (quality, resistance, ...). This problem can be extended to the authentication of spare parts 15 and more generally to the detachable elements of the printers or to the software that the printer can use and / or to the modes of operation that the printer can implement. Another problem is that of being able to configure an ink jet printer in a variety of ways, without making any changes to the printer itself. [0008] Different configurations, with different modes of use, may be made necessary by different technical requirements. These problems arise in a context where printers are generally not connected to a communication network. SUMMARY OF THE INVENTION The invention relates in particular to an authentication system based on a secret key (or authentication key). The invention firstly relates to a method for authenticating a consumable or detachable element of a continuous ink jet printer (CIJ), comprising: - the generation, by the printer controller, of a first random information, and its sending to an authentication circuit of the element, this circuit being for example applied to the element, the encryption of this first random information, by this authentication circuit of the element, using an encryption algorithm and a first secret key, thus forming a first encrypted random information, and sending it to the controller of the printer, - the encryption of this first random information, by the controller of the printer, using a 2nd encryption algorithm and a 2 'secret key, thus forming a second encrypted random information, - the comparison of the first encrypted random information and the 2nd encrypted random information. If the comparison is satisfactory, the 2 algorithms and the 2 keys correspond, they are for example identical, and the consumable or detachable element 15 can be used. Otherwise, its use is made impossible by the controller. According to a particular embodiment, this method may further comprise: the generation, by the authentication circuit of the consumable or detachable element, of a random information item, and its sending to the controller of the printer; the encryption of this 2 'random information, by the controller of the printer using the 2' encryption algorithm and the 2 'secret key, thus forming a 3rd encrypted random information, and its sending to the authentication circuit the element, - the encryption of this 2 'random information, by the element authentication circuit 25, the encryption algorithm and the secret key pre, thus forming a 4' encrypted random information, - The comparison of the 3rd encrypted random information and the 4th encrypted random information. Again, if the comparison is satisfactory, the consumable or detachable element can be used. Otherwise, the consumable element, or detachable, not recognizing the controller, may refuse communication with the controller, and therefore any subsequent data exchange. The invention also relates to a method for authenticating a consumable or detachable element of a continuous ink jet printer (CIJ), comprising: sending the controller of the printer by the circuit authentication of the consumable or detachable element, of a password, - the comparison, by the controller, of this password with a password that it contains (and which is for example recorded in memory means 10 of the controller). If the comparison is satisfactory the use of the consumable, and / or a software element, may be authorized. The invention also relates to a method for exchanging data between a consumable or detachable element of a continuous inkjet printer (CU), and this continuous ink jet printer (CU), in which: a method of authenticating this consumable or detachable element for this continuous inkjet printer is carried out, according to one of the embodiments of the invention, and, after comparison of the first encrypted random information and The second encrypted random information item and, optionally, the comparison of the encrypted third information item and the 4th encrypted random information item, a fifth encryption algorithm and a key sememe, said shared key, are sent by the consumable or detachable element to the continuous inkjet printer. The shared key can then be used to decode all or part of the information from the consumable or detachable element. To enhance security, the method implements the secret key, which, through authentication, only allows the subsequent exchange of data between the consumable or detachable element and the machine. After sending a key shared by the consumable or detachable element to the continuous ink jet printer, at least one encrypted data, for example by the fifth encryption algorithm, may be sent from the element consumable or detachable to the continuous inkjet printer or vice versa; or this encrypted data can be read by the controller. More simply, in the case of password authentication, after exchange and control of the password, at least one piece of data, possibly encrypted, for example by an encryption algorithm, can be sent from the consumable element or detachable to the continuous inkjet printer or vice versa. This data can be one of those mentioned below (for example concerning at least one consumable or at least one spare part that the printer can use, and / or concerning at least one list of software that the printer can use , and / or concerning at least one mode of use that the printer can implement, ... etc). In the case of encrypted data the controller also has the means to decrypt the data. After performing an authentication method according to the invention, the consumable or detachable element can send to or receive from the continuous ink jet printer at least one encrypted data using an encryption algorithm, and the shared key. The invention also relates to a method of exchanging data between a consumable or detachable element of a continuous inkjet printer, and this continuous ink jet printer, without prior authentication process, but using a consumable element, or detachable, of the type already described above, the latter comprising means for implementing a first encryption algorithm, and a first secret key, allowing mutual authentication and a second encryption algorithm and a so-called shared key, the continuous inkjet printer, comprising means for also implementing the 2nd encryption algorithm, and the shared key, in which: at least one datum is transferred between the element consumable or detachable and the continuous inkjet printer, for example sent by the consumable or detachable element to the printer, or read by the printer, - the continuous ink jet printer encrypts the data thus received. [0009] In other words, it is possible to use, with a printer whose controller can not implement an authentication method of the type already described above, a consumable or detachable element of the type already described above. The shared key used by, or which implements, the encryption algorithm, may be time variable and / or have a limited validity period. According to one embodiment of one of the methods according to the invention, the secret key and / or, respectively, the second secret key, is modified using an algorithm implementing a digital data item available in, or associated with to respectively the consumable or detachable element or the continuous ink jet printer. [0010] The shared key may be modified using an algorithm implementing digital data available in, or associated with, the consumable or detachable element or the continuous ink jet printer. Such a method may further comprise the exchange and / or reading, for example, or in particular, by the controller of the printer, at least one piece of data: - concerning at least one other consumable or at least one piece the printer can use, then possibly, the comparison, with said at least one data exchanged or read, of at least one identification data of a consumable or a spare part, for example, in a particular case, of the one equipped with the identification circuit, and / or the authorization, or not, by the controller of the printer, the use of this consumable or this spare part, and / or concerning the least a list of software that the printer can use, then, possibly, the comparison, with said at least one piece of data exchanged or read, of at least one piece of software identification data with this list, and / or the authorization, or not, by the printer controller, the use of this 25 software; in this case, the element (for example a software) that can be authorized, or not, is different from the consumable carrying the identification circuit, and / or concerning at least one mode of use that the printer can implement, and possibly the adaptation of the operating mode of the printer. [0011] At least part of the second secret key and / or any shared key and / or data exchanged or to be exchanged may be stored on a card, or a data carrier, physically separated from the printer, and which exchanges, for example by RFID or by contact, data with the latter by means of communication means, provided on the one hand on the card, or the data carrier, and on the other hand in the printer . Data can be exchanged between the printer and a circuit of the consumable or detachable element. The data can be exchanged by RFID or by contact. The consumable or detachable element may be an ink or solvent cartridge or a filter, or a pump, or a solenoid valve, or a removable element, for example, the ink circuit of the printer or the printer head. print, or a data carrier. In a particular embodiment, the consumable or detachable element is a data carrier, at least one other consumable or detachable element or at least one spare part being an ink or solvent cartridge or a filter, or a pump, or a solenoid valve, or a removable module, for example the ink circuit of the printer or a printhead of the printer, or software or functionality of the printing machine. In this case, there is: authentication of the data carrier by the printer controller, exchange between the data medium and the controller, or reading by the controller in the medium of the data carrier. at least one data relating to the use of at least one other consumable or detachable element or a spare part and / or at least 25 software that the printer can use and / or at least one mode of use that the printer can implement, - optionally, authentication by said controller of the printer, a consumable or detachable element, or a spare part, - then, possibly: 3032540 10 a comparison, by said controller, at least one identification data, respectively of a consumable or a spare part and / or software, with said at least one piece of data read or exchanged, and / or the authorization, or no, by the controller, the use of this consumable or this spare part and / o u of this software, * and / or a comparison, by said controller, of at least one mode of use that the printer can implement, with said at least one data read or exchanged, respectively relating to at least a mode of use that the printer can implement and, possibly, the adaptation of the operating mode of the printer. The invention also relates to a controller of an ink jet printer, or a control data medium of a continuous ink jet printer (CU), implementing a method as described above. The invention also relates to a device, or a data carrier, for controlling a continuous inkjet printer for authenticating a consumable or detachable element of a continuous ink jet printer ( CIJ), comprising: means for generating random information, and means for sending it to an external circuit, for example an authentication circuit of the element, - means for encrypting this random information, by means of a ler encryption algorithm, and by a secret key, thereby forming encrypted random information; means for comparing this encrypted random information and other encrypted random information received from a consumable or detachable element. Possibly, these means can be used to conclude the authorization of use, or not, of the consumable or detachable element. Such a device may further comprise RFID-type means or contact data exchange means. [0012] Such a device, or data carrier, may include means for storing a second key, said shared key. According to a particular embodiment, the second key may be variable in time, and / or comprise means for varying it, or varying its content, over time. Such a device or data medium can furthermore comprise means for: storing at least one piece of data, or a list of data, concerning at least one consumable or at least one spare part that the printer can use and / or less software that the printer can use, and / or at least one mode of use that the printer can implement, - and, possibly, to: - compare at least one identification data of a consumable or a spare part or software with said data or said list, or compare at least one mode of use, with said at least one stored data relating to at least one mode of use that the printer can set implement, - and authorize, or not, the use of this consumable or this spare part or this software or this mode of use, according to the result of the preceding comparison. [0013] Such a control device of a continuous ink jet printer (CU), may allow the authentication of a consumable or detachable element of a continuous ink jet printer (CIJ), and include: means for authenticating, according to a method as already described above, a data medium, means for receiving, from said data medium, said at least one data item relating to at least one consumable or at least one spare part that the printer can use, and / or at least one software that the printer can use and / or at least one mode of use that the printer can implement. [0014] The invention also relates to a consumable or detachable element of a continuous ink jet printer (CU), comprising means for implementing a method as already described above. The invention also relates to a consumable or detachable element of a continuous ink jet printer (CU), comprising: means for generating random information, and means for sending it to an external circuit, for example a controller of a printer, means for encrypting this random information, by a first encryption algorithm and a secret key, thus forming an encrypted random information, means for comparing this encrypted random information and another encrypted random information received from a controller of a printer. Possibly, these means can be used to conclude the authorization of use, or not, of the consumable or detachable element. Such an element may comprise means for storing a second key, called a shared key, and a second encryption algorithm, which may be variable in time. Such an element may comprise means for sending a key, called a shared key, and an algorithm, called encryption and decryption, to a controller of a printer. [0015] Such an element may comprise RFID-type means or contact data exchange means. The invention also relates to a continuous inkjet printer, comprising: - an ink circuit, - a print head, - hydraulic connection means between the ink circuit and the print head, electrical connection means for electrically supplying said printhead; means for implementing a method according to the invention, for example a method of authentication of a consumable or detachable element, as described herein; -above. The invention also relates to a continuous ink jet printer, comprising: - an ink circuit, - a print head, - hydraulic connection means between the ink circuit and the print head, Electrical connection means for electrically supplying said print head, a device according to the invention, for example an authentication device for a consumable or detachable element, and a data carrier, as described herein. -above. [0016] A continuous inkjet printer according to the invention may further comprise at least one consumable or detachable element according to the invention, as described above and in the following. It can also be provided with a data carrier as described above. BRIEF DESCRIPTION OF THE FIGURES FIG. 1 shows a known printer structure. FIG. 2 represents a known structure of a print head of an ICJ type printer. - Figure 3 schematically shows a printer and an ink cartridge, provided with a tag, according to the present invention. FIG. 4 shows embodiment details of a controller and a tag of an ink cartridge, according to the present invention. FIGS. 5A and 5B show steps of an authentication method according to one aspect of the invention. FIGS. 6A and 6B show uses of a tag according to one aspect of the invention. FIG. 7 represents steps for producing a tag according to one aspect of the invention. Figures 8A, 8B show embodiments of another aspect of the invention, with an individual identification card of the printer. DETAILED DESCRIPTION OF AN EMBODIMENT FIG. 3 shows very schematically the body 3 of a printer and a consumable 20, for example a spare part or an ink or solvent cartridge. A consumable element is an element intended to be renewed because of the reduction in its content or its consumption, in order to achieve a functionality of the printer. It can also be an element for which an authorization of use is given in a limited way in time, for example a software or a software functionality. [0017] A detachable element is an element which, in order to satisfy the implementation of a functionality of the printer, must be temporarily connected thereto. In the following, we often quote the example of the ink cartridge: it can be connected to the printer to provide ink. The cartridge is both consumable and detachable. But the invention also applies to a spare part, for example a filter, or a pump, or a solenoid valve, or any other module or subassembly of the printer, for example a removable module as described in FIG. application PCT / EP2014 / 056215. Each of these elements has a limited life, after which it must be replaced for the proper functioning of the printer. Another example, described below, is that of an authentication card. [0018] The machine, in fact its controller, is equipped with communication means 30, for example of the RFID type, which will allow dialogue with this consumable. And the controller is programmed to implement the steps described below. [0019] The consumable 20 is equipped with a circuit 200 (hereinafter called "tag") which enables it to carry out the steps described below. This circuit may for example be in the form of a processor or a microprocessor, or an FPGA. This circuit can be programmed to implement a method according to the invention. Communication means are also provided, for example of the RFID type, which will allow dialogue with the controller. Alternatively, the communication between the body 3 of the printer and the consumable 20 may be of contact type. In this case, contacts are provided on each of the circuits to ensure the transmission of data between the two circuits. [0020] 10 In both cases, RFID and contact, an event will trigger a Pre step dialogue, whether authentication or data exchange. This is the case when there is a need to use the consumable or detachable element, for example: - during the start-up check of the printer, the latter detecting the presence of the consumable or detachable element, this detection forming the above event, or when connecting the consumable or detachable element, causing detection by the controller which then triggers a method according to the invention, or when the need for the element is manifest, for example when a low level of ink is detected in the main tank, needing to be supplied by the ink cartridge. The circuit 201 is for example applied against a wall of the consumable, so as to facilitate the dialogue (or the exchange of data) with the controller. [0021] FIG. 4 is a somewhat more detailed illustration of an exemplary embodiment of this architecture, in its version with RFID type communication means. The reference 31 designates a circuit of the controller 3, for example made in the form of a microprocessor, or an FPGA, programmed to perform certain functions, or process steps. For example, this circuit 31 is provided with means 32 for generating one or more information, for example random numbers. This circuit may be provided with memory means 37 for storing data, and in particular data for implementing a method according to the invention, for example data relating to a shared key 40 and / or a secret key 41. As explained later, the controller may not include: shared key, which is provided only when performing an event such as the start of an interaction session with the tag, - or secret key, no authentication process, of the type described below, then being implemented. [0022] In the present application, an algorithm implements a key. Each algorithm is defined by a set of instructions, stored in the corresponding circuit 31, 210, which encode steps of the algorithm. This circuit 31 will supply, to the means 30, data to be transmitted to the consumable (in fact: to the circuit - described below - associated with the consumable), and / or it receives, via the means 30, data transmitted by the same consumable (actually: by the circuit - described below - associated with the consumable). On the consumable side, the reference 200 designates the RFID interface of the tag 21. The reference 210 designates a circuit of the tag, for example made in the form of a microprocessor, or of an FPGA, which is programmed to perform certain functions. functions, or process steps, according to the invention. For example, this circuit 210 is provided with means, designated generally by the reference 215, comprising means 213 for generating one or more information, for example random numbers, means 212 implementing an authentication method and means 211 encryption. This circuit may be provided with storage means 214 for storing data, and in particular data for implementing a method according to the invention, for example data relating to a shared key 40 and / or a secret key 41. This circuit 210 will supply, to the means 200, data to be transmitted to the controller 3, or to make it available to the latter (for example so that it can read them) and / or it receives, via the means 200, data transmitted by the circuit 31 and the means 30 of the controller. The reference 35 symbolizes the exchange of data between the controller and the consumable tag. As indicated above, this is an example with RFID data exchange. According to a particularly interesting embodiment, the shared key 40, which is a key different from the secret key 41 (it can for example be more easily decoded than the latter) mainly serves, or even only, the encryption of information stored in the memory. The secret key 41 primarily serves, or even only, the authentication of the consumable by the controller or the mutual authentication of the consumable and the controller. This limits the risks of "piracy" that is to say unauthorized use of the data contained in the tag and, consequently, the associated consumable. The shared key may be for example: determined or chosen by the manufacturer of the controller, for example during the manufacture thereof; possibly it is variable in time, for example periodically, the controller can then have the list of keys or the algorithm to find, at the desired time, the shared key to use, or provided by the tag to the controller, only when the authentication has been validated. An example of a method that can be implemented by this system will be described, in connection with FIG. 5A. It is an algorithm, or a method, of authentication, before data exchange between tag and controller. As explained below, some methods according to the invention do not implement this prior authentication. According to this example, both the printer controller and the consumable tag memorize and implement a secret key 41 and a shared key 40; an encryption algorithm implements the secret key, the data relating to this algorithm being stored on the one hand in the controller and on the other hand in the tag. [0023] When performing an event, for example one of those mentioned above, the controller generates a first random number (more generally: a piece of information) A (step 101) that it sends (step 102) to cartridge tag; it encrypts this number (step 103) using its encryption algorithm and the secret key 41 and 5 returns (step 104) to the printer this encrypted number C (A). The controller 3 performs the same operation: it encrypts the same number (step 106) using its encryption algorithm and the secret key 41, thus forming C '(A). The circuit of the controller 3 compares (step 107) the result C '(A) obtained by its internal calculation with that C (A) returned by the tag. If C '(A) = C (A) (or, more generally, if it is satisfied with a relation between C (A) and C' (A), which makes it possible to conclude at their agreement or correspondence), then the tag and the associated consumable is authentic and data, for example confidential data contained in the tag, can be exchanged between this tag and the controller. These data can be qualified as technical data of use (they will concern technical aspects or functionalities of the machine and / or technical aspects of the machine's operation). Otherwise, the tag, and the consumable with which it is associated, is recognized as not authentic, and this data can not be exchanged between this tag and the controller. [0024] More generally, when setting up the spare part or before taking a consumable (for example a fluid such as ink or a solvent) in a cartridge or a bottle, an authentication can be carried out in the manner which has just been described. During the implementation of this authentication method, the shared key 40 does not play any role, only the secret key is used; this secret key allows the transmission of information from the "tag" to the controller, and vice versa. At this point, in fact, data (other than those relating to the authentication phase) are not yet exchanged. It is therefore possible to provide the shared key, to one or other of the 2 elements (consumable, controller), only after successful authentication. [0025] For example, it is sent by the tag 20 to the controller 3 after validated authentication 3032540 or successful. This is very advantageous in the embodiments in which the shared key is modified: then we do not have to reprogram the elements (tag, controller) that implement it. More precisely, a consumable will itself provide the printer with the (shared) key that will allow the data exchanged to be decoded. If this key has evolved or has been modified (for example because of technical developments or algorithmic modifications), there is no need to intervene on the printer, it recovers the new key shared during Pre interaction (after authentication) with the new consumable that has the modified shared key. In order to better protect the data of the tag, the authentication may be mutual and the tag may in turn generate a random number that it submits to the printer, according to the method of FIG. 5B: the tag generates a random number (more generally: information) A (step 101 ') that it sends (step 102') to the controller; it encrypts this number (step 103 ') using its encryption algorithm and the secret key 41 and returns 15 (step 104') to the printer tag this encrypted number C (A), - the controller performs the same operation: it encrypts the same number (step 106 ') using its encryption algorithm and the secret key 41, thus forming C' (A), - the tag compares (step 107 ') the result C '(A) obtained by its internal calculation with that C (A) returned by the controller. If C '(A) = C (A) (or, more generally, if it is satisfied with a relation between C (A) and C' (A), which makes it possible to conclude at their agreement or correspondence), then the tag can exchange data with the controller. Otherwise, the latter is recognized as not authentic or, more generally, not authorized to exchange data with the controller. It may be possible to proceed in the reverse order: the method described above is first carried out in connection with FIG. 5B and then that described above in connection with FIG. 5A. In the case of mutual authentication, the two authentications must have been validated to conclude a possible exchange of data between the consumable and the printer. [0026] In order to diversify the secret key 41, this can be diversified, for example by means of an algorithm. For example again, it is combined with identification information, it may be a number such as a serial number or a UID (unique identification number) 33 of the controller and / or 216 of the tag (FIG. 4), and / or a date according to an algorithm. As a variant, the secret key 41 present in the tag and the controller is then modified using an algorithm, for example using another number (available in the tag and / or the printer), for example before coding ( This diversification, which can be applied to the shared key, makes the system more robust because, as a result, the key concerned is valid only for this tag, this printer or this tag / printer combination. On occasion (before, during or after this) of this diversification step, the tag may be required to provide the controller with the data used for the diversification. [0027] A variant of the authentication method described above may be as follows. The consumable communicates to the controller a password; the controller compares this password with a password that it contains (and which is stored in the memory means of the controller); depending on the result of the comparison, the use of the consumable is allowed, or not. It can be the same with software. Once the authentication is successful, data can be exchanged or transferred between the tag and the controller, for example made available to the latter by the tag. In general this exchange is at the initiative of the controller, the tag making available to the latter and on request of it, the data it sends him or allows him to read. But, according to an even more efficient method in terms of security, once authentication has been successfully completed, the tag provides the shared key 40 to the controller (respectively to the tag). Alternatively: the controller provides the shared key to the tag, the controller and the tag each provide a portion of the shared key, respectively to the tag and the controller. After authentication, it is therefore possible to proceed, not only to the exchange of data, which allows the successful realization of the authentication, but also, and before data exchange, to the communication of at least part of the key shared 40 which will allow to decode this exchanged data. This can be for example the case during a "session" (period - which can be very brief, for example of the order of a few minutes - during which a tag and a controller are put in uninterrupted relationship), the controller does not receiving the shared key only for the session in question. The beginning of a session is for example the end of the authentication process, the end of a session is for example any other event after the beginning, for example a power failure. To further enhance security, this key may have been created, for example by a random process, only at the beginning of this session, or, more generally, at the beginning of a specified period, when performing a particular event or event, for example one of those mentioned above. Such a temporary key may have, relative to a permanent shared key, a length or a reduced footprint: the memory size for storing it is reduced; and the calculation time of any operation implementing it is also reduced. [0028] In one embodiment, the shared key 40 may be variable in time. In this case, the means 31 and / or 210 contain means, software and / or circuit programmed according to an algorithm, to develop this key 40 in time. As before, the secret key is preferably dedicated to authentication. We have also given above the example of a shared key created during the realization of an event (at the beginning of a session or during another determined event). The method described above makes it possible to guarantee the authentic appearance of the consumable and / or a spare part and the inviolability of the data stored in this tag. [0029] The algorithm or method explained above can be implemented by the printer, using its controller, programmed for this purpose, and by the tag, also programmed for this purpose. Two different examples of use according to the invention will be given, in connection with FIGS. 6A and 6B. In both cases, using a tag 200 according to the invention, of the type illustrated in FIG. 4 and provided with a secret key 41 and a shared key 40. The tag also contains data 50, intended to be exchanged. with the controller. The controller of the printer of FIG. 6A only has the shared key 40 installed in the controller before any contact with a tag 200 (the shared key can nevertheless, in this case also, evolve over time). No authentication method can therefore be implemented and the data 50 is exchanged between the tag 200 and the controller without authentication, although the tag has him, the secret key and the shared key. [0030] According to another use, the controller of the printer of FIG. 6B has the secret key 41. It can therefore first implement an authentication method, then the data 50 is exchanged between the tag 200 and the controller 3 after validation of the authentication. As explained above, the shared key 40 may be provided to the controller after authentication and / or be variable in time. [0031] Consequently, a tag according to the invention is compatible with a simple controller (in the case of FIG. 6A), provided with a shared key but no secret key, or with a more advanced controller (in the case of FIG. 6B), provided with a secret key and possibly the shared key. In general, the fact of having, in the tag, a shared key 40 and the secret key 41 makes it possible: to encrypt the data 49, to be inserted in the tag in the form of encrypted data 50, to using the shared key algorithm 40, and / or encrypting the shared key 40 using the secret key algorithm 41, in particular if the memory zone containing the shared key is accessible by 30 reading. [0032] An example of a method for preparing or manufacturing a tag 200 is illustrated in FIG. 7, in which: data 49, to be stored in the tag, are encrypted using the shared key 40 (FIG. not yet encrypted by the secret key, see below); 50 denotes the encrypted data stored in the tag, the shared key 40 is encrypted using the secret key algorithm 41, to form the shared key 40 'stored in the tag 200. The tag can therefore contain encrypted data 50, the secret key 41 and the shared key 40, the latter possibly being encrypted by the secret key (and 10 being stored in the form 40 '). Such a method may be performed by the printer manufacturer and / or consumables. An example of manufacture or preparation of a consumable element according to the invention and a printer according to the invention may be the following: 1. Preparation of the consumable: The tag is stored in the following manner: authentication and the first authentication key - and the second algorithm and the second key, said shared, possibly variable and / or possibly encrypted using the first key, - the encrypted data (by the shared key), 2. Preparation of the printer: The printer (or its controller) stores: the 1st authentication algorithm and the first authentication key 25 and the second algorithm and the second key, said shared, possibly variable and / or optionally encrypted using the first key (case of Figure 7). After these manufacturing or preparation steps, an authentication process can be performed, as already explained above. During a data exchange process between printer 30 (controller) and tag 200, data may be sent from the printer (or controller) to the tag, which data has been encrypted using the shared key. Data sent by the tag to the controller is read (decrypted) by the controller, also using the shared key. The shared key is also used in the tag to send data to the controller or to read or write the data sent by the controller. Examples are given below concerning the nature of the data 49 (or usage data) stored in the tag that can be sent to the controller. According to another embodiment, shown diagrammatically in FIGS. 8A and 8B, the algorithm or the method explained above can be implemented, by the machine, using an authentication card 300, 300 'which is associated. By card is also meant any type of data medium (USB key, ROM, RAM, flash memory, optical medium such as CD, or magnetic medium ... etc) .. This card 300, 300 'is a consumable or detachable element in the sense explained above. [0033] It will itself be subjected to an authentication process as described above. It can therefore contain the data that will make it possible to perform such an authentication method; for example, it comprises a circuit, such as the circuit 200 which has been described above, which will contain the data that will make it possible to perform such an authentication method. [0034] It may for example contain at least some of the information or data that will be transmitted to the controller, or exchanged with it, for example at the request of the latter, and allow it to implement the steps described above. As described above, the machine (or the printer) is then equipped with communication means, for example of the RFID type, or by contact, which will allow dialogue with elements such as consumables. But, according to an exemplary embodiment, the card 300, 300 'contains the encryption information that will allow to implement the steps described above. This card for example generates the random numbers for encryption, which are transmitted to the controller, which transmits them to the consumable tag 20. The latter performs the encryption operations and returns (step 104) the encrypted information to the controller, which transmits it to the card 300, 300 '. It has made its own encryption (step 106) and has the means that will enable it to perform the comparison step (step 107). It will then issue the controller, or not, an authorization to use the consumable 20. Alternatively, exchanges are made solely or mainly with the controller, which makes itself comparisons between the data of the card 300, 300 ', on the one hand, and the consumable element 20, on the other hand. The controller then validates the use of the consumable element if it has, on the one hand, authenticated this element (according to the authentication process as described above), and, on the other hand, after authentication of the card 300, 300 'according to an authentication method as described above for the consumable elements, obtained the authorization to use the consumable by the data exchanged with the card. The order of the steps can then be: a) authentication of the card 300, 300 ', according to one of the methods described above, b) authentication of the consumable 20, according to one of the methods described above, c) reading by the controller of at least one data item of the card concerning the possible use of the consumable 20 or the spare part. [0035] According to yet another example, the card 300, 300 'contains data which will allow, after authentication of the card, to authorize, no, the use of a software or a software functionality or a functionality of the printing machine. According to yet another example, the card 300, 300 'contains: on the one hand, data that will make it possible to authorize or not the use of a consumable 20 or a spare part, and on the other hand data which will allow, to authorize or not, the use of a software or a software functionality or a functionality of the printing machine (for example: rights of use of the printer). [0036] The card 300, 300 'may advantageously contain a set of technical data which will be valid only for a given printer. This avoids, for an already installed printer, to create a new program, or a new configuration, when technical data relating to the printer in question 5 are changed. In another example, this makes it possible to create a set of data for a new customer, who buys a printer: it is not this one which is directly configured, but the card 300, 300 '. FIG. 8A shows the case of a card 300 intended to be read by contact by the printer 3, the card is then inserted into a slot 301 of the printer body, in order to come into contact with a printer circuit. reading. FIG. 8B shows the case of a card 300 'intended to be read by RFID by the printer 3, which has an RFID reader 301 dedicated to reading the card 300'. In both cases, the data transmitted from the card to the printer may be of the type described below. The consumable 20 (FIG. 8B) is, in both cases, still equipped with the tag 21 which enables it to implement the steps described above and means of communication, for example of the RFID type, which will allow dialogue with the controller. [0037] The card 300, 300 'is a detachable element of the printer, which will allow authorization in 2 stages, the card serving, on the one hand, as an intermediary to authorize the use of a consumable (after having been itself authenticated), the latter being, on the other hand, authenticated according to one of the methods already described above. As a variant, the card 300, 300 ', after authentication by the controller, may allow the authorization of a consumable or detachable element that does not have authentication means. The authorization, by the controller, then passes either by an identification of technical data available on the consumable element, for example in a tag or a memory present on it, or by data entered into the printer by the user, for example by reading an identification label available on the element or data supplied with it (on the packaging, paper document attached to the element, ...). The order of the steps can then be, for example: a) authentication of the card 300, 300 ', according to one of the methods described above, b) reading, by the controller, of at least one piece of data. card 300, 300 '(or provided by it) regarding the possible use of the consumable 20 or the spare part. A particular use of the card 300, 300 'solves the problem of a user who wishes, for example, to use spare parts or consumables (inks) from a third party manufacturer (for example in the case of an ink with very specific properties) and / or distribution network for which the consumables protection policy must be adapted. To do this, one can realize a configuration of the card 300, 300 '15 machine by machine. In general, this card, or a tag as described above, may contain data, or technical data of use, relating to a list of information on the configuration of the printer and its expected behavior, and / or secure backup information. [0038] For example, one can find, in these technical data of use, data or information concerning: - At least one list of consumables that the printer can use, - and / or the possible use, or not, of at least one consumable and / or at least one spare part of a third-party manufacturer, 25 - and / or the authorization to use, or not, at least one consumable and / or at least one part unrecognized detached, - and / or at least one possibility of using at least one activated software in the printer controller, - and / or hardware options or device (s) (s) ) 30 implemented on the printer, for example a type of ink circuit and / or head, and / or rights of use of the printer: this is the case, for example, for a printer. "pay-per-print" option, according to which a user will see his billing calculated according to the number of impressions made. In this case, the card contains information relating to a maximum number of authorized prints and the controller will, after each printing, decrement, in the card, this maximum number, and / or, more generally, one or more data. specific to the operation of the printer. Such data may be, for example: drop charge sequence data by the charging electrodes of the printer's print head, for example depending on the different printing conditions, such as printing, or according to various print configurations, * and / or technical data relating to the printing of a given message, * and / or data relating to the use of a print font particular, and / or, more generally, relating to the authorization of access to certain functions of the printer. This data can be read by the printer controller. This one will, according to the data read, allow, or not, the envisaged use. For example, the information concerning at least one list of 20 consumables that the machine can use makes it possible to guarantee to the user that only a consumable compatible with his printer can be used: if a consumable, which is not part of the list in question, comes to be used, one or more machine features may be blocked (s). This is an advantage for the user, who will thus avoid using an ink, or a printhead, whose qualities are insufficient or incompatible for the printer used. The information concerning the authorization to use at least one consumable and / or at least one spare part from a third-party manufacturer allows the use, or the prohibition of use, of this one or of the latter, while this spare part or this consumable is not equipped with a tag or is equipped with another tag, for another printer, or is equipped with a tag to authorize, only, another specific application 3032540 . In the case where it is not equipped with a tag, a manual action of the operator can allow the use of the consumable or the part in question. The information concerning the authorization to use, or not, at least one unrecognized consumable and / or at least one unrecognized spare part 5 allows the use, or the prohibition of use, of at least one spare part, or at least one consumable, while this spare part or this consumable is not known by the manufacturer of the machine. The information concerning at least one possibility of using at least one software (or a software feature), in the printer controller, allows the use or prohibition of use of this software. or of this software functionality: for example, during manufacture, the controller of a printer is equipped with a first software Ll and a second software L2, different from Ll by at least its writing or one of its functionalities. The specific tag gives permission to use only the first Ll software. The second software L2 can not be used. The information concerning one or more rights of use of the printer will make it possible to adapt the operation of the printer, and in particular the storage of data, according to the rights of the user. For example, for a pay-per-print option, the controller 20 will memorize the number of prints made. In the case of an identification card 300, 300 ', it can change over time; for example, an identification card may be updated, or a new identification card may be given to the holder of an identification card, in order to update one or more data of the type mentioned above. -above. [0039] This identification card is generated, for example by the manufacturer of the machine (see Figure 7) and / or during a configuration change of the printer. In order to guarantee that the identification card is usable only on a given printer, during the first installation in the printer, an association of the card with the hardware of the printer is performed by saving the identifier. in the card 30 corresponding to this particular machine. Once registered, this data can be modified and the card is reserved for use on that particular machine. This solution offers the possibility of easily and securely configuring printer features at the end of the production line or even directly to a user. In other words, one can manufacture a single machine and vary its use by a user according to the data of the card 300, 300 '. An ink circuit of an inkjet printer, with its possible ink and solvent cartridges, is described for example in the document FR 13 52925 (WO2014 / 154830) or WO2009 / 047510. [0040] It will be recalled that the ink circuit mainly performs the following functions: supply of ink of adequate quality under pressure to the droplet generator of the head 1, recovery and recycling of the unused fluids for printing back from the gutter of the head 1, suction for purging the drop generator located in the head 1, supply of solvent to the head 1 for rinsing performed during the maintenance operations of the head. [0041] One and / or the other of the cartridges of this circuit may be provided with a tag according to the present invention. A printer controller may be of the type described above. The invention can be implemented in a continuous ink jet printer (CIJ) such as that described above in conjunction with FIGS. 1 and 2. This includes a print head 1, generally remote relative to the body of the printer 3, and connected thereto by means, for example in the form of a flexible umbilicus 2, bringing together the hydraulic and electrical connections for the operation of the head. The invention can be advantageously applied to a printer which is not connected to a communication network such as the Internet.
权利要求:
Claims (22) [0001] REVENDICATIONS1. A method of authenticating a consumable or detachable element (20, 300, 300 ') of a continuous inkjet printer (CIJ), comprising: - the generation, by the controller (3) of the printer, random information, and sending it to an authentication circuit (212, 215) of the element, the encryption of this random information, by this authentication circuit of the element, by a the encryption algorithm, and a secret key, thus forming an encrypted random information, and sending it to the controller (3) of the printer, encrypting this random information, by the controller of the printer, by a 2 'encryption algorithm, and a second secret key, thus forming a second encrypted random information, - the comparison of the encrypted random information and the encrypted second random information. [0002] 2. Method according to claim 1, further comprising: - generating, by the authentication circuit (212, 215) of the element (20), a second random information, and sending it to the controller (3) of the printer, - the encryption of this 2nd random information, by the printer controller, by the 2 'encryption algorithm, and the 2nd secret key, thus forming a 3rd encrypted random information, and its sending to the circuit d authentication of the element (20), the encryption of this second random information, by the authentication circuit of the element, by the encryption algorithm, and the secret key, thus forming a fourth information. random encrypted, - the comparison of the 3 'encrypted random information and the 4th encrypted random information. 3032540 32 [0003] A method of exchanging data between a consumable or detachable element (20, 300, 300 ') of a continuous ink jet printer (CIJ), and said continuous ink jet printer (CIJ), in a which: a method of authenticating this consumable or detachable element (20) for this continuous inkjet printer (CIJ) according to one of claims 1 or 2 is carried out, and, after comparison of the first encrypted random information and the second encrypted random information and, optionally, the comparison of the encrypted third random information and the fourth encrypted random information, a third encryption algorithm, and / or a third key, called the shared key, is sent by the consumable or detachable element (20) to the continuous ink jet printer. [0004] A method according to claim 3, wherein, after sending a third encryption algorithm and / or the third key, by the consumable or detachable element (20) to the continuous ink jet printer, at least one encrypted data, possibly by the third third encryption algorithm, is sent from the consumable or detachable element (20) to the continuous ink jet printer or vice versa. [0005] 5. Method according to one of claims 1 or 2, wherein the controller of the printer contains a third encryption algorithm, and a key, said shared key, the consumable or detachable element (20, 300, 300 '). ) sending, after authentication, to the continuous ink jet printer, or receiving from it, after authentication, at least one encrypted data using this third encryption algorithm, and this shared key. 25 [0006] A method of exchanging data between a consumable or detachable element (20) of a continuous ink jet printer (CIJ), and said continuous ink jet printer (CIJ), the consumable element having means for implementing an encryption algorithm, and a first secret key, and a second encryption algorithm, and a key, said shared key, the continuous ink jet printer (CIJ), 3032540 comprising means for also implementing this 2nd encryption algorithm, and this shared key, wherein: at least one data is transferred between the consumable or detachable element (20, 300, 300 ') and the jet printer d continuous ink, the continuous ink jet printer decrypts the data thus received. [0007] 7. Method according to one of claims 3 to 6, wherein the shared key is variable in time and / or has a limited validity period. 10 [0008] 8. Method according to one of claims 1 to 7, wherein: the first secret key and / or, respectively, the second secret key, is modified using an algorithm implementing a digital data available in , or associated with, respectively the consumable or detachable element (20) or the continuous ink jet printer, 15 - and / or the shared key is modified using an algorithm implementing a digital data item available in, or associated with, the consumable or detachable member (20) and / or the continuous ink jet printer. [0009] 9. Method according to one of claims 1 to 7, further comprising: - the exchange, between the controller and the consumable or detachable element, and / or reading, by the controller and / or the consumable element or detachable, at least one data item relating to at least one other consumable or detachable element or at least one spare part that the printer can use, and / or at least one software that the printer can use, and / or to least one mode of use that the printer can implement, - then, possibly: a comparison of at least one identification data, respectively consumable or a spare part and / or software with said at least one read or exchanged data relating respectively to at least one consumable or at least one spare part which the printer can use, and / or at least one software that the printer can use, and or the authorization, or otherwise, of the use of that consumable e or of this spare part and / or of this software, * and / or a comparison of at least one mode of use that the printer can implement, with said at least one piece of data read or exchanged, relative respectively at least one mode of use that the printer can implement and the adaptation of the operating mode of the printer. [0010] 10. Method according to one of claims 1 to 9, wherein at least part of the 2nd secret key or of the possible shared key or exchanged data is stored on a physically separated card (300, 300 '). of the printer, and which exchanges data with the latter by means of communication means (21, 210). 15 [0011] 11. Method according to one of claims 1 to 10, wherein data is exchanged between the consumable or detachable element (20, 300, 300 ') and a continuous inkjet printer (CU), by RFID or by contact. [0012] 12. Method according to one of claims 1 to 11, wherein the consumable or detachable element is an ink or solvent cartridge or a filter, or a pump, or a solenoid valve, or a removable module, for example an ink circuit of the printer or a printhead of the printer, or a data medium (300, 300 '). 25 [0013] The method of claim 9, or one of claims 10 or 11, taken in combination with claim 9, wherein the consumable or detachable element is a data carrier (300, 300 '), at least one other consumable element (20) or detachable or at least one spare part being an ink or solvent cartridge or a filter, or a pump, or a solenoid valve, or a removable module 3032540, for example the ink circuit of the printer or a printhead printer. [0014] 14. Device (3) for controlling a continuous ink jet printer (CU), or data medium (300, 300 '), for authenticating a consumable or detachable element of a printer continuous ink jet (CU), comprising: - means (31, 32, 30) for generating random information, and for sending it to an authentication circuit (210) of the element, - means ( 31) for encrypting this random information, by a 1st encryption algorithm, and a secret key pre, thereby forming encrypted random information, - means (31) for comparing this encrypted random information and other encrypted random information received from a consumable or detachable element. 15 [0015] 15. Device, or data carrier, according to claim 14, comprising means for storing a second key (40), said shared key, and a second algorithm, said decryption. 20 [0016] 16. Device or data medium according to claim 15, the second key (41) being variable in time. [0017] 17. Device or data medium according to one of claims 14 to 16, comprising RFID-type communication means or means 25 for exchanging data by contact. [0018] 18. Device, or data carrier, according to one of claims 14 to 17, further comprising means (37, 31) for: storing at least one data item relating to at least one consumable or at least one spare part; the printer can use, and / or at least 3032540 software that the printer can use and / or at least one mode of use that the printer can implement, - and, possibly, to: compare at least an identification data of a consumable 5 or a spare part or software with said at least one piece of data stored concerning at least one consumable or at least one spare part that the printer can use, and / or less a software that the printer can use, * or compare at least one mode of use, with said at least one stored data relating to at least one mode of use that the printer 10 can implement, * and / or whether or not to authorize the use of that consumable or spare part or software or the implementation of the said mode of use. [0019] 19. A device (3) for controlling a continuous ink jet printer (CU) according to claim 18, further comprising: - means for authenticating, according to a method according to one of claims 1 to 5 a data carrier (300, 300 '); means for receiving, from said data carrier, said at least one data item relating to at least one consumable or at least one spare part which the printer can use, and / or at least one software that the printer can use and / or at least one mode of use that the printer can implement. [0020] 20. Consumable or detachable element of a continuous ink jet printer (CU), comprising means (210) for carrying out a method according to one of claims 1 to 13. [0021] 21. A consumable or detachable element of a continuous ink jet printer (CU), comprising: - means (213) for generating random information, and means (210) for sending it to the controller of a printer, 3032540 37 - means (211) for encrypting this random information, by a first encryption algorithm and by a key pre, said secret key (41), thus forming an encrypted random information, - means (215) for comparing this encrypted random information 5 and other encrypted random information received from a controller (3) of a printer. [0022] 22. Element according to claim 21, comprising means for storing a second key (40), said shared key, and a second algorithm, said decryption. Element according to claim 22, the second key (40) being variable in time. 24. Element according to one of claims 21 to 23, comprising means for sending, or for receiving, a key (40), said shared key, and an algorithm, said decryption, to a controller of a printer. 25. Element according to one of claims 21 to 24, comprising RFID type communication means or contact data exchange means. 26. A continuous inkjet printer comprising: an ink circuit, a printhead (1), hydraulic connection means between the ink circuit and the printhead; electrical connection for electrically supplying said printhead; means for carrying out a method according to one of claims 1 to 13. 3032540 38 27. Continuous inkjet printer, comprising: - a circuit of ink, - a printhead (1), - hydraulic connection means between the ink circuit and the printing head, - electrical connection means for electrically supplying said printhead, - a device and / or a data carrier according to one of claims 14 to 19. 28. Continuous inkjet printer according to one of claims 26 or 27, further comprising at least one consumable or detachable element of a printer continuous inkjet jet according to one of claims 20 to 25. 10 15
类似技术:
公开号 | 公开日 | 专利标题 EP3254215B1|2020-07-22|Advanced protection of consumables or removable elements FR3054763B1|2019-08-30|SYSTEM FOR ADVANCED PROTECTION OF CONSUMABLE OR DETACHABLE ELEMENTS OF INDUSTRIAL PRINTER EP1372120A1|2003-12-17|Authentification of electronic ticket EP0317400B1|1994-03-23|Apparatus and method for securing data exchange between a teletext terminal and a host WO1998004966A1|1998-02-05|System for secure data storage on cd-rom EP0434551B1|1995-02-08|Method of generating a pseudo-random number in a dataprocessing-system, and a system for carrying out the method WO2002091139A2|2002-11-14|Security device for online transaction CN108804953A|2018-11-13|Consumable chip and its communication means, consumable chip and imaging device communication system, method FR2960328A1|2011-11-25|METHOD FOR MANAGING INTEGRATED CIRCUITS WITH INTERNAL GENERATION OF A PERSONAL AUTHENTICATION KEY EP2388948B1|2017-07-05|Method and system for access to an integrated circuit comprising a personal authentication key EP1622090B1|2008-11-19|Franking system with ink level control US11112725B2|2021-09-07|Consumable chip, consumable and consumable communication method FR2970357A1|2012-07-13|TRACING DEVICE AND METHOD FR3061449A1|2018-07-06|CARTRIDGE AND SYSTEM FOR PRINTING THREE-DIMENSIONAL PIECES CN104077537B|2018-04-27|Offer communicates with the certification of replaceable printer unit FR2774494A1|1999-08-06|Franking method for postal franking machine with security features WO2019185754A1|2019-10-03|Method for authenticating a product FR2783943A1|2000-03-31|Computer functionality access control device, in addition to computer access control, power supply to peripherals is controlled FR2790854A1|2000-09-15|Device for securing computer data exchanges of payment or remote payment has inaccessible area in secret memory in which primary codes of list may be used as preference for secure exchange WO2017098189A1|2017-06-15|Method for customising a secure document FR2648587A1|1990-12-21|Device for security protection of data exchange between a videotex terminal and a server, and method of initialising such a device FR2825213A1|2002-11-29|USER AUTHENTICATION SYSTEM FR3042626A1|2017-04-21|METHOD AND SYSTEM FOR SECURE ACCESS AND DISCRIMINATION TO INTEGRATED CIRCUIT SERVICES BY DIVERSIFYING A SINGLE ROOT KEY FR2994047A1|2014-01-31|Personalization device for distribution system for distributing subscription profile to secure module, has authentification units placed near device and module, and transfer unit transferring profile toward module if units are validated
同族专利:
公开号 | 公开日 US20180319170A1|2018-11-08| CN107431623A|2017-12-01| FR3032540B1|2018-09-07| EP3739481A1|2020-11-18| US20210070058A1|2021-03-11| US20200001612A1|2020-01-02| CN107431623B|2021-05-11| EP3254215A1|2017-12-13| US10052878B2|2018-08-21| WO2016124787A1|2016-08-11| CN113179167A|2021-07-27| US10449774B2|2019-10-22| US20180022104A1|2018-01-25| EP3254215B1|2020-07-22| US10933646B2|2021-03-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 WO1999018544A1|1997-10-08|1999-04-15|Powerdesk Plc|Computers| US20050008376A1|2003-07-08|2005-01-13|Parry Travis J.|Methods and systems for providing firmware to a printing device| US20070160204A1|2006-01-05|2007-07-12|Nec Electronics Corporation|Microcontroller and authentication method between the controllers| US20090222664A1|2008-03-03|2009-09-03|Samsung Electronics Co., Ltd.|Unit using os and image forming apparatus using the same| US20130169992A1|2010-09-08|2013-07-04|Stephen D. Panshin|Secure upgrade supplies and methods| WO2015016857A1|2013-07-31|2015-02-05|Hewlett-Packard Development Company, L.P.|Communicating a classification of a consumable product| NL292590A|1963-01-07| US4268715A|1978-05-03|1981-05-19|Atalla Technovations|Method and apparatus for securing data transmissions| US7133845B1|1995-02-13|2006-11-07|Intertrust Technologies Corp.|System and methods for secure transaction management and electronic rights protection| FR2744391B1|1996-02-01|1998-03-06|Imaje Sa|INDUSTRIAL PRINTER CAPABLE OF RECEIVING AT LEAST ONE CONSUMABLE CARTRIDGE| US6076167A|1996-12-04|2000-06-13|Dew Engineering And Development Limited|Method and system for improving security in network applications| US6494562B1|1998-09-03|2002-12-17|Hewlett-Packard Company|Method and apparatus for identifying a sales channel| JP2004152004A|2002-10-30|2004-05-27|Canon Inc|Image processor| CN1685306A|2002-11-06|2005-10-19|松下电器产业株式会社|Printing system, printing device and method for giving printing command| US8085418B2|2002-12-20|2011-12-27|Transact Technologies Incorporated|Method and apparatus for converting a printer firmware download port to a communicatons port| KR100544478B1|2003-12-01|2006-01-24|삼성전자주식회사|Device, system and method of authorizing to print information according to security level| US8046837B2|2005-08-26|2011-10-25|Sony Corporation|Information processing device, information recording medium, information processing method, and computer program| US7917963B2|2006-08-09|2011-03-29|Antenna Vaultus, Inc.|System for providing mobile data security| GB0720291D0|2007-10-12|2007-11-28|Videojet Technologies Inc|Ink jet printer| US20090235341A1|2008-03-14|2009-09-17|Canon Kabushiki Kaisha|Network interface apparatus, print control method, print control program, and image forming apparatus| JP5202203B2|2008-09-17|2013-06-05|株式会社日立産機システム|Inkjet recording device| FR2956061B1|2010-02-11|2012-12-21|Markem Imaje|INDUSTRIAL INK JET PRINTER WITH DIGITAL COMMUNICATION| US9079410B2|2011-06-15|2015-07-14|Hewlett-Packard Development Company, L.P.|Methods and cassettes for discarding ink| FR3003798B1|2013-03-29|2015-10-30|Markem Imaje|LOW COST INK CIRCUIT| FR3054763B1|2016-07-29|2019-08-30|Dover Europe Sarl|SYSTEM FOR ADVANCED PROTECTION OF CONSUMABLE OR DETACHABLE ELEMENTS OF INDUSTRIAL PRINTER|FR3054763B1|2016-07-29|2019-08-30|Dover Europe Sarl|SYSTEM FOR ADVANCED PROTECTION OF CONSUMABLE OR DETACHABLE ELEMENTS OF INDUSTRIAL PRINTER| FR3067651A1|2017-06-16|2018-12-21|Dover Europe Sarl|DEVICE FOR MEASURING THE OVERFLOW OF A GUTTER OF A PRINT HEAD OF AN INKJET PRINTER| CN108215513B|2018-02-05|2019-06-21|杭州旗捷科技有限公司|Feed circuit, consumable chip, the consumptive material of variable thresholding| CN108382073B|2018-02-05|2019-06-21|杭州旗捷科技有限公司|Feed circuit, consumable chip, the consumptive material of variable thresholding| FR3082777A1|2018-06-21|2019-12-27|Dover Europe Sarl|METHOD AND DEVICE FOR DETECTING THE PROPER FUNCTIONING OF NOZZLES OF A PRINTHEAD| FR3082779B1|2018-06-21|2021-02-12|Dover Europe Sarl|METHOD AND DEVICE FOR MAINTENANCE OF A PRINTING HEAD BY NOZZLE| FR3082778A1|2018-06-21|2019-12-27|Dover Europe Sarl|PRINTHEAD OF AN INK JET PRINTER WITH 2 RECOVERY GUTTERS, INCLUDING A MOBILE| US10353651B1|2018-07-06|2019-07-16|Toshiba Tec Kabushiki Kaisha|Image forming apparatus and operation mode setting method| FR3085772B1|2018-09-06|2021-06-25|Wisekey Semiconductors|PROCESS FOR SECURING THE USE OF AN APPARATUS OPERATING WITH AN ACCESSORY OR A CONSUMABLE| CN113168443A|2018-12-03|2021-07-23|惠普发展公司,有限责任合伙企业|Logic circuit system| WO2020117306A1|2018-12-03|2020-06-11|Hewlett-Packard Development Company, L.P.|Logic circuitry| US10894423B2|2018-12-03|2021-01-19|Hewlett-Packard Development Company, L.P.|Logic circuitry| CN110481155B|2019-08-19|2021-04-13|佛山普瑞威尔科技有限公司|Safe printing method, chip, printing consumable and printer| CN113671807A|2021-08-13|2021-11-19|北京辰光融信技术有限公司|USB consumable identification method for printer, consumable equipment and printer|
法律状态:
2016-02-29| PLFP| Fee payment|Year of fee payment: 2 | 2016-08-12| PLSC| Publication of the preliminary search report|Effective date: 20160812 | 2017-02-28| PLFP| Fee payment|Year of fee payment: 3 | 2018-02-26| PLFP| Fee payment|Year of fee payment: 4 | 2020-02-28| PLFP| Fee payment|Year of fee payment: 6 | 2021-02-26| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1550958A|FR3032540B1|2015-02-06|2015-02-06|ADVANCED PROTECTION SYSTEM OF CONSUMABLE OR DETACHABLE ELEMENTS| FR1550958|2015-02-06|FR1550958A| FR3032540B1|2015-02-06|2015-02-06|ADVANCED PROTECTION SYSTEM OF CONSUMABLE OR DETACHABLE ELEMENTS| EP20184323.2A| EP3739481A1|2015-02-06|2016-02-08|Advanced protection system for consumable or detachable elements| CN201680014988.4A| CN107431623B|2015-02-06|2016-02-08|Advanced protection system for consumable or removable components| US15/549,195| US10052878B2|2015-02-06|2016-02-08|System for advanced protection of consumable or detachable elements| PCT/EP2016/052637| WO2016124787A1|2015-02-06|2016-02-08|System for advanced protection of consumable or detachable elements| EP16705064.0A| EP3254215B1|2015-02-06|2016-02-08|Advanced protection of consumables or removable elements| CN202110420842.2A| CN113179167A|2015-02-06|2016-02-08|Advanced protection system for consumable or removable components| US16/038,552| US10449774B2|2015-02-06|2018-07-18|System for advanced protection of consumable or detachable elements| US16/567,413| US10933646B2|2015-02-06|2019-09-11|System for advanced protection of consumable or detachable elements| US16/953,675| US20210070058A1|2015-02-06|2020-11-20|System for advanced protection of consumable or detachable elements| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|