CN106452797A - Consumable and equipment pairing method, consumable use method, consumable and equipment - Google Patents
Consumable and equipment pairing method, consumable use method, consumable and equipment Download PDFInfo
- Publication number
- CN106452797A CN106452797A CN201611087052.2A CN201611087052A CN106452797A CN 106452797 A CN106452797 A CN 106452797A CN 201611087052 A CN201611087052 A CN 201611087052A CN 106452797 A CN106452797 A CN 106452797A
- Authority
- CN
- China
- Prior art keywords
- equipment
- consumptive material
- authorization code
- consumable
- eigenvalue
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000013475 authorization Methods 0.000 claims abstract description 58
- 239000000463 material Substances 0.000 claims description 96
- 230000008878 coupling Effects 0.000 claims description 9
- 238000010168 coupling process Methods 0.000 claims description 9
- 238000005859 coupling reaction Methods 0.000 claims description 9
- 238000013461 design Methods 0.000 abstract description 3
- 238000012795 verification Methods 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 4
- 238000004378 air conditioning Methods 0.000 description 3
- 239000000843 powder Substances 0.000 description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 150000001875 compounds Chemical class 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 238000002493 microarray Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the field of consumable anti-counterfeiting design, and discloses a consumable and equipment pairing method, a consumable use method, a consumable and equipment, wherein the consumable and equipment pairing method comprises the following steps that a safety chip arranged in the consumable decrypts an authorization code of equipment associated with the consumable through a stored private key, wherein the authorization code is obtained by encrypting according to an equipment feature value; when a value obtained by decrypting the authorization code is matched with the feature value of the equipment associated with the consumable, the condition that the consumable is applicable to the equipment is determined. By using the technical scheme, the safety chip in the consumable decrypts the authorization code of the equipment associated with the consumable through the stored private key; the condition that the consumable is applicable to the equipment is determined through judging that the value obtained through decrypting the authorization code is matched with the feature value of the equipment associated with the consumable; verification on authenticity of the consumable is realized, so that the consumable cannot be counterfeited; or the counterfeited consumable cannot be used on the equipment.
Description
Technical field
The present invention relates to consumptive material anti-counterfeiting design field, in particular it relates to a kind of consumptive material is used with device pairing method, consumptive material
Method, consumptive material and equipment.
Background technology
All there is the scene of consumptive material replacing in the equipment such as printer, water purifier, air-conditioning, if using the unauthorized consumption of third party
Material, or the false consumptive material that forges, may cause extreme influence, or even damage equipment to the performance of equipment.
By taking the consumptive material of printer as an example.In order to prevent that consumptive material is forged, structure-based deemed-to-satisfy4 guarantor in prior art, is proposed
Shield, however adulterator only need to obtain mould can be carried out counterfeit.In order to solve the problems, such as structural anti false, prior art
In propose chip solution.Initially chip is recognizing machine, is the key of a connection consumptive material and whole machine, the print cartridge of microarray strip,
Powder box, drum box-packed enter machine on can make machine connect start working.But if this part of machine " short circuit ", so that it may so that
With any forgery consumptive material.In order to solve this problem, it is proposed that a kind of chip, it is counting chip, when drum box use predetermined
Number, no matter either with or without powder, drum core can be used, it is necessary to change.Similar, chip also is type self-destroyed, and powder box is used
Complete chip is just bad, it is not possible to use again.However as the development of the technology of forgery, whether counting chip or self-destruction chip, are making
Make all and no longer there is difficulty.Consumptive material anti-counterfeiting technology in prior art not have to be forged.
For above-mentioned technical problem, good solution in prior art, is there is no.
Content of the invention
It is an object of the invention to provide a kind of method and apparatus, the method and equipment can make consumptive material have high false proof energy
Power.
To achieve these goals, the present invention provides a kind of consumptive material and device pairing method, and the method includes:
The equipment that the safety chip being arranged in the consumptive material is associated with the consumptive material by the private key deciphering of storage
Authorization code, the wherein authorization code are obtained according to the encryption of the eigenvalue of equipment;And
During the eigenvalue coupling of the equipment being associated when the value that the deciphering authorization code is obtained and with the consumptive material, institute is determined
State consumptive material and be applied to the equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment
?.
Further, the eigenvalue of the equipment is device mac address or the character string comprising the device mac address.
Further, the eigenvalue of the equipment includes the device mac address and random number.
Further, the eigenvalue of the equipment is that 2048 bit strings, wherein random number is 2000 bits.
A kind of another aspect of the present invention, there is provided consumptive material using method, the method includes:
The consumptive material is installed to equipment, wherein, the consumptive material includes to be stored with the safety chip of private key, and the equipment is deposited
Contain authorization code;
The authorization code is deciphered using the private key by the safety chip;And
When the value that the deciphering authorization code is obtained is mated with the eigenvalue of the equipment, determine that the consumptive material is applied to institute
State equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment
?.
A kind of another aspect of the invention, there is provided consumptive material, the consumptive material includes:
Safety chip, the private key being configured to store for deciphering the authorization code being associated with equipment;
The safety chip is further configured to, when decipher value that the authorization code obtains with and the equipment that is associated of the consumptive material
Eigenvalue coupling when, determine the consumptive material be applied to the equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment
?.
Further, the safety chip is cryptography safety chip.
A kind of still another aspect of the present invention, there is provided equipment, the equipment includes:
Memorizer, is configured to store and encrypts the authorization code for obtaining, wherein the authorization code energy according to the eigenvalue of equipment
Enough private key deciphering by the safety chip being arranged in consumptive material by storage, when decipher value that the authorization code obtains and with described
During the eigenvalue coupling of equipment, the consumptive material can be used in the equipment.
Further, the authorization code is obtained by the public key encryption corresponding with the private key according to the eigenvalue of equipment
?.
By technique scheme, the safety chip in consumptive material is associated with the consumptive material by the private key deciphering of storage
The authorization code of equipment, by judge the eigenvalue of value that the deciphering authorization code obtains and the equipment be associated with consumptive material mate come
Determine that the consumptive material is applied to the equipment, it is achieved that the checking to consumptive material verity, so that consumptive material is forged, or make forgery
Consumptive material is not used to equipment.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Description of the drawings
Accompanying drawing is used to provide a further understanding of the present invention, and constitutes the part of description, with following tool
Body embodiment is used for explaining the present invention together, but is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the consumptive material and device pairing method flow diagram that embodiment of the present invention is provided;
Fig. 2 is the consumptive material using method flow chart that embodiment of the present invention is provided;
Fig. 3 is the consumptive material composition structural representation that embodiment of the present invention is provided;
Fig. 4 is the equipment composition structural representation that embodiment of the present invention is provided.
Description of reference numerals
1 consumptive material, 2 safety chip
3 equipment, 4 memorizer.
Specific embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.It should be appreciated that this place is retouched
The specific embodiment that states is merely to illustrate and explains the present invention, is not limited to the present invention.
Fig. 1 is the consumptive material and device pairing method flow diagram that embodiment of the present invention is provided.As shown in figure 1, reality of the present invention
The mode of applying provides a kind of consumptive material with device pairing method, and the method includes:
S101, private key deciphering and setting that the consumptive material be associated of the safety chip being arranged in the consumptive material by storage
Standby authorization code, the wherein authorization code are obtained according to the encryption of the eigenvalue of equipment;And
S102, during the eigenvalue coupling of the equipment being associated when the value that the deciphering authorization code is obtained and with the consumptive material,
Determine that the consumptive material is applied to the equipment.
By technique scheme, the safety chip in consumptive material is associated with the consumptive material by the private key deciphering of storage
The authorization code of equipment, by judge the eigenvalue of value that the deciphering authorization code obtains and the equipment be associated with consumptive material mate come
Determine that the consumptive material is applied to the equipment, it is achieved that the checking to consumptive material verity, so that consumptive material is forged, or make forgery
Consumptive material is not used to equipment.
In embodiments, authorization code can be according to the eigenvalue of equipment by the public key encryption corresponding with the private key
Obtain.Public key used in embodiment of the present invention and private key are the key pair for being obtained by special algorithm, wherein public key
It is part disclosed in cipher key pair, private key is then private part.Public key is generally used for encrypted session key, checking numeral and signs
Name, or encryption can be with the data of corresponding private key deciphering.The key for being obtained by this algorithm is unique to can guarantee that.Make
With this key to when, if with one of key encrypt one piece of data, it is necessary to use another secret key decryption.Such as use
Public key encryption data are necessary for being deciphered with private key, if must also use public key decryptions with private key encryption, otherwise deciphering will not become
Work(.Embodiment of the present invention establishes unique corresponding relation using above-mentioned encryption and deciphering principle between consumptive material and equipment.
In embodiments, the safety chip being arranged in consumptive material can be the chip with memory element and arithmetic element
Circuit or chip package.Can be with memorizer, for storing authorization code in the equipment being associated with consumptive material.
In embodiments, the eigenvalue of equipment can be device mac address or the character comprising the device mac address
String.In order to improve confidentiality further, the eigenvalue of the equipment can include device mac address and random number.
In a preferred embodiment, the eigenvalue of equipment can be 2048 bit strings, and wherein random number is 2000
Bit, and device mac address is 48 bits.
Based on above-mentioned encryption and deciphering principle, another aspect of the present invention provides a kind of consumptive material using method, such as Fig. 2
Shown, consumptive material using method includes:
S201, the consumptive material is installed to equipment, and wherein, the consumptive material includes to be stored with the safety chip of private key, described
Equipment is stored with authorization code;
S202, deciphers the authorization code by the safety chip using the private key;And
S203, when the value that the deciphering authorization code is obtained is mated with the eigenvalue of the equipment, determines that the consumptive material is fitted
For the equipment.
In embodiments, authorization code can according to the eigenvalue of the equipment of such as device mac address or ID by with private
The corresponding public key encryption of key is obtained.The encryption of private key and public key and deciphering principle as above, will not be described here.
In addition to the above methods, embodiments of the present invention additionally provide a kind of consumptive material, as shown in figure 3, embodiment party of the present invention
The consumptive material 1 that formula is provided can include:
Safety chip 2, the safety chip 2 may be configured to store the private for deciphering the authorization code being associated with equipment
Key;The safety chip 2 is further configured to, when decipher value that the authorization code obtains with and the spy of equipment that is associated of the consumptive material
During value indicative coupling, determine that the consumptive material is applied to the equipment.
In embodiments, the safety chip 2 being arranged in consumptive material 1 can be the core with memory element and arithmetic element
Piece circuit or chip package.Wherein, memory element can be stored with for deciphering the private key of authorization code and executing decrypting process
Program code.Arithmetic element can be extracted private key and program code from memory element and execute decrypting process, when deciphering is authorized
The value that obtains of code with and when the eigenvalue of equipment that is associated of consumptive material mates, arithmetic element can determine the consumptive material suitable for institute
Stating equipment and equipment is allowed using the consumptive material.In a preferred embodiment, the safety chip 2 can be the safe core of cryptography
Piece.
In embodiments, the example of consumptive material 1 includes but is not limited to the equipment such as printer, water purifier, air-conditioning, sphygomanometer makes
Consumptive material.
Another aspect of the present invention, additionally provides a kind of equipment, as shown in figure 4, embodiment of the present invention provide set
Standby 3 can include:
Memorizer 4, the storage its 4 may be configured to store according to the eigenvalue of equipment encrypt obtain authorization code, its
Described in authorization code can be by the safety chip being arranged in consumptive material by storage private key deciphering, obtain when the authorization code is deciphered
The value that arrives and when mating with the eigenvalue of the equipment 3, the consumptive material can be used in the equipment 3.
In embodiments, the example of equipment 3 includes but is not limited to printer, water purifier, air-conditioning, sphygomanometer etc..
In embodiments of the present invention, safety chip 2 can store secure private key, and public key can be stored in equipment
In.Splice the random number of upper 2000 bit using the MAC Address of equipment, constitute the character string of 2048 bits, then using public key
Encryption, generates authorization code, it is, in principle, that the authorization code only could normally solve equipment using corresponding safety chip private key
MAC Address.In actual production process, by the authorization code mandate plant produced consumptive material of safety chip and respective amount and can set
Standby.Wherein, safety chip can be with paster on consumptive material circuit, by authorization code burning in device memory (for example, flash memory).?
When use, when consumptive material is assemblied in equipment, safety chip can be decrypted to authorization code, and is sent the result to equipment and entered
Row verification.Equipment passes through to parse plaintext, thinks that consumptive material is legal if it can index the MAC Address with the machine coupling,
Carry out normal work.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited to above-mentioned reality
The detail in mode is applied, in the range of the technology design of the present invention, multiple letters can be carried out to technical scheme
Monotropic type, these simple variant belong to protection scope of the present invention.
It is further to note that each particular technique feature described in above-mentioned specific embodiment, in not lance
In the case of shield, can be combined by any suitable means.In order to avoid unnecessary repetition, the present invention to various can
The compound mode of energy is no longer separately illustrated.
Additionally, combination in any can also be carried out between a variety of embodiments of the present invention, as long as which is without prejudice to this
The thought of invention, which should equally be considered as content disclosed in this invention.
Claims (12)
1. a kind of consumptive material and device pairing method, it is characterised in that the method includes:
The mandate of the equipment that the safety chip being arranged in the consumptive material is associated with the consumptive material by the private key deciphering of storage
Code, the wherein authorization code are obtained according to the encryption of the eigenvalue of equipment;And
During the eigenvalue coupling of the equipment being associated when the value that the deciphering authorization code is obtained and with the consumptive material, the consumption is determined
Material is applied to the equipment.
2. method according to claim 1, it is characterised in that the authorization code according to the eigenvalue of equipment by with described
The corresponding public key encryption of private key is obtained.
3. method according to claim 1, it is characterised in that the eigenvalue of the equipment is device mac address or includes
The character string of the device mac address.
4. method according to claim 1, it is characterised in that the eigenvalue of the equipment includes the device mac address
And random number.
5. method according to claim 4, it is characterised in that the eigenvalue of the equipment be 2048 bit strings, its
Middle random number is 2000 bits.
6. a kind of consumptive material using method, it is characterised in that the method includes:
The consumptive material is installed to equipment, wherein, the consumptive material includes to be stored with the safety chip of private key, and the equipment is stored with
Authorization code;
The authorization code is deciphered using the private key by the safety chip;And
When the value that the deciphering authorization code is obtained is mated with the eigenvalue of the equipment, determine that the consumptive material is applied to described setting
Standby.
7. method according to claim 6, it is characterised in that the authorization code according to the eigenvalue of equipment by with described
The corresponding public key encryption of private key is obtained.
8. a kind of consumptive material, it is characterised in that the consumptive material includes:
Safety chip, the private key being configured to store for deciphering the authorization code being associated with equipment;
The safety chip is further configured to, when decipher value that the authorization code obtains with and the spy of equipment that is associated of the consumptive material
During value indicative coupling, determine that the consumptive material is applied to the equipment.
9. consumptive material according to claim 8, it is characterised in that the authorization code according to the eigenvalue of equipment by with described
The corresponding public key encryption of private key is obtained.
10. consumptive material according to claim 8, it is characterised in that the safety chip be.
11. a kind of equipment, it is characterised in that the equipment includes:
Memorizer, is configured to store and encrypts the authorization code for obtaining according to the eigenvalue of equipment, and the wherein authorization code can be by
Be arranged on the private key deciphering of safety chip in consumptive material by storage, when decipher value that the authorization code obtains and with the equipment
Eigenvalue coupling when, the consumptive material can be used in the equipment.
12. equipment according to claim 11, it is characterised in that the authorization code according to the eigenvalue of equipment by with institute
State the corresponding public key encryption of private key to obtain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611087052.2A CN106452797A (en) | 2016-11-30 | 2016-11-30 | Consumable and equipment pairing method, consumable use method, consumable and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611087052.2A CN106452797A (en) | 2016-11-30 | 2016-11-30 | Consumable and equipment pairing method, consumable use method, consumable and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106452797A true CN106452797A (en) | 2017-02-22 |
Family
ID=58223385
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611087052.2A Pending CN106452797A (en) | 2016-11-30 | 2016-11-30 | Consumable and equipment pairing method, consumable use method, consumable and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106452797A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107599631A (en) * | 2017-09-14 | 2018-01-19 | 北京赛腾标识系统股份公司 | A kind of spray printing device control system and method |
CN107633574A (en) * | 2017-08-25 | 2018-01-26 | 广东美的暖通设备有限公司 | Electronics lock management method, management system and computer equipment |
CN109859067A (en) * | 2018-12-28 | 2019-06-07 | 无锡井通网络科技有限公司 | Auxiliary manufacture verification method, device and electronic equipment based on block chain |
CN110798447A (en) * | 2019-09-18 | 2020-02-14 | 广州朗国电子科技有限公司 | Intelligent terminal local authorization method, device and system based on network communication |
CN112052432A (en) * | 2020-09-01 | 2020-12-08 | 禾麦科技开发(深圳)有限公司 | Terminal device authorization method and device |
CN113836516A (en) * | 2021-09-13 | 2021-12-24 | 北京安御道合科技有限公司 | Printer selenium drum anti-counterfeiting and printing frequency protection system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1547824A (en) * | 2001-08-24 | 2004-11-17 | Zih��˾ | Method and apparatus for article authentication |
CN102087684A (en) * | 2009-12-04 | 2011-06-08 | 徐峰 | Method for encrypting consumable items through radio frequency identification electronic tag |
CN102145596A (en) * | 2010-11-11 | 2011-08-10 | 童国海 | Method, system and ink box for controlling printing |
CN104553384A (en) * | 2014-12-25 | 2015-04-29 | 珠海艾派克微电子有限公司 | Consumable chip as well as identification method and device for serial number of consumable chip |
CN204774130U (en) * | 2015-06-25 | 2015-11-18 | 重庆品胜科技有限公司 | Anti -fake printer encryption device |
-
2016
- 2016-11-30 CN CN201611087052.2A patent/CN106452797A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1547824A (en) * | 2001-08-24 | 2004-11-17 | Zih��˾ | Method and apparatus for article authentication |
CN102087684A (en) * | 2009-12-04 | 2011-06-08 | 徐峰 | Method for encrypting consumable items through radio frequency identification electronic tag |
CN102145596A (en) * | 2010-11-11 | 2011-08-10 | 童国海 | Method, system and ink box for controlling printing |
CN104553384A (en) * | 2014-12-25 | 2015-04-29 | 珠海艾派克微电子有限公司 | Consumable chip as well as identification method and device for serial number of consumable chip |
CN204774130U (en) * | 2015-06-25 | 2015-11-18 | 重庆品胜科技有限公司 | Anti -fake printer encryption device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107633574A (en) * | 2017-08-25 | 2018-01-26 | 广东美的暖通设备有限公司 | Electronics lock management method, management system and computer equipment |
CN107599631A (en) * | 2017-09-14 | 2018-01-19 | 北京赛腾标识系统股份公司 | A kind of spray printing device control system and method |
CN109859067A (en) * | 2018-12-28 | 2019-06-07 | 无锡井通网络科技有限公司 | Auxiliary manufacture verification method, device and electronic equipment based on block chain |
CN110798447A (en) * | 2019-09-18 | 2020-02-14 | 广州朗国电子科技有限公司 | Intelligent terminal local authorization method, device and system based on network communication |
CN112052432A (en) * | 2020-09-01 | 2020-12-08 | 禾麦科技开发(深圳)有限公司 | Terminal device authorization method and device |
CN113836516A (en) * | 2021-09-13 | 2021-12-24 | 北京安御道合科技有限公司 | Printer selenium drum anti-counterfeiting and printing frequency protection system and method |
CN113836516B (en) * | 2021-09-13 | 2023-08-29 | 北京安御道合科技有限公司 | Printer selenium drum anti-counterfeiting and printing frequency protection system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106452797A (en) | Consumable and equipment pairing method, consumable use method, consumable and equipment | |
US9253162B2 (en) | Intelligent card secure communication method | |
EP2955871B1 (en) | Cryptographic method for securely exchanging messages and device and system for implementing this method | |
CN102904712A (en) | Information encrypting method | |
TW202121868A (en) | Data encryption and decryption method and device, storage medium and encrypted file | |
CN104637117B (en) | Method, intelligent lock core, lockset and key that intelligent lock core and key are realized | |
CN101917267B (en) | Method for storing random key based on encryption file capable of storing softdog | |
CN105184181B (en) | File encryption method, file decryption method and file encryption device | |
CN107135070A (en) | Method for implanting, framework and the system of RSA key pair and certificate | |
EP1841122A1 (en) | Encryption method for highest security applications | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
CN104268447A (en) | Encryption method of embedded software | |
CN103746805A (en) | External authentication key generation method and system | |
CN105281915A (en) | Ciphertext generating method of password keyboard | |
CN106453380A (en) | Secret key negotiation method and apparatus | |
CN105227312A (en) | Intelligent code key password authentification extracting method | |
US20230188336A1 (en) | Automatic Key Rolling for Link Encryption | |
CN107766725B (en) | Template attack resistant data transmission method and system | |
CN105120425B (en) | M2M recognition methods and device, internet-of-things terminal, M2M identifying system | |
CN108599927A (en) | The protective relaying device of integrated national secret algorithm security module | |
CN102968598B (en) | The decryption method of digital document | |
CN107070658A (en) | A kind of improved method of system encryption authentication mechanism | |
KR20170019679A (en) | Efficient white-box based encryption-decryption method and tag generation and verification method | |
TWI665901B (en) | Encryption method and decryption method | |
CN103475466A (en) | USBKey bus protection implementation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |