Abstract:
According to examples, an apparatus may include a processor and a memory on which may be stored instructions that when executed by the processor, may cause the processor to access first identification information associated with the apparatus and send a portion of the first identification information to a server. A list of second identification information may be received from the server having portions that match the sent portion of the first identification information. In some examples, the processor may determine that the apparatus is authorized to communicate apparatus data of the apparatus to a services provider server based on a determination that the first identification information matches a second identification information among the received list of second identification information. Based on a determination that the apparatus is authorized to communicate the apparatus data, the processor may communicate the apparatus data over a network to the services provider server.
Abstract:
An example print supply includes a non-transitory computer-readable medium. The non-transitory computer-readable medium includes data. The data includes an indication of a schema for the data. The data also includes an indication of an identifier. The data includes an indication of a digital signature. The digital signature is usable to authenticate a type of the data, the schema, and the identifier. The print supply also includes a communication interface. The communication interface is to output the data from the non-transitory computer-readable medium.
Abstract:
In some examples, a device authenticates a first consumable product installed in the device, sends a first identifier of the authenticated first consumable product over a network to an engine, receives, over the network from the engine, a list of identifiers for consumable products classified as non-authentic, and in response to installation of a second consumable product in the device that stores an identifier in memory, determines whether the identifier of the second consumable product matches one of the identifiers in the received list of identifiers.
Abstract:
Authenticating a consumable product based on a remaining life value includes determining whether an identifier stored in memory of a consumable product is listed in a device history and concluding that the consumable product is not authentic if the device is determined to have used the consumable product previously based on the device history and a current remaining life value associated with the consumable product indicates less use than a recorded remaining life value for the consumable product associated with the identifier in the device history.
Abstract:
A roaming device obtains an identifier for a network-enabled resource as a result of interacting with the network-enabled resource. The roaming device uses the identifier to obtain a link for the network-enabled device through a cloud service. The address is used to access and use the network-enabled resource using the cloud service.
Abstract:
In one example of the disclosure, subject audio data, indicative of a subject audio captured via a transducer during an operation of a subject electromechanical device, is accessed. Baseline audio data, indicative of a baseline audio captured during an operation of a baseline electromechanical device, is accessed. An electronic file that includes differences between the subject audio data and the baseline audio data is created.
Abstract:
Authenticating a consumable product based on a remaining life value includes determining whether an identifier stored in memory of a consumable product is listed in a device history and concluding that the consumable product is not authentic if the device is determined to have used the consumable product previously based on the device history and a current remaining life value associated with the consumable product indicates less use than a recorded remaining life value for the consumable product associated with the identifier in the device history.