METHODS AND SYSTEMS FOR DETERMINING THE AUTHENTICITY OF A COMPONENT USING ELLIPTIC-CURVE CRYPTOGRAPHY

    公开(公告)号:US20240428269A1

    公开(公告)日:2024-12-26

    申请号:US18828177

    申请日:2024-09-09

    Abstract: A method of determining the authenticity of a replaceable toner cartridge in a printing device using an elliptic curve E defined over a finite field Fq, where q is an integer, the method comprising: the printing device generating a random integer j, where the random integer j is in the interval of one to the integer q; the printing device calculating a point T=j·S, where point S is a point on elliptic curve E(Fq); the printing device calculating a binary value k which is equal to the binary random integer j with a bitmask m applied thereto; the printing device sending point T and binary value k to the replaceable toner cartridge; and the replaceable toner cartridge iteratively calculating point U=n·S for different values of integer n, where for each iterative calculation integer n takes different values.

    METHODS FOR UPDATING AN ELECTRONIC DEVICE

    公开(公告)号:US20240411551A1

    公开(公告)日:2024-12-12

    申请号:US18811040

    申请日:2024-08-21

    Abstract: Methods for updating an imaging device are described. The methods comprise: receiving, by the imaging device, update information from a memory of a supply item connected to the imaging device, the update information comprising an update value, and updating a firmware variable of the imaging device based on the update information. An imaging device is also described. The imaging devices comprise firmware and a memory, the memory storing a firmware variable, wherein the firmware is configured to read the firmware variable, and the imaging device is configured to update the firmware variable, by: receiving update information from a memory of a supply item connected to the imaging device, the update information comprising an update value, and updating the firmware variable of the imaging device based on the update information.

    AUTHENTICATION USING MAGNETIC FIELD BASED ON CURRENT DRAWN BY SECURITY DEVICE

    公开(公告)号:US20230409695A1

    公开(公告)日:2023-12-21

    申请号:US17861850

    申请日:2022-07-11

    CPC classification number: G06F21/44 G01R33/07 G01R33/09

    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.

    SYSTEM AND METHODS FOR DETECTING NON-AUTHENTIC SLAVE COMPONENTS USING CLOCK FREQUENCY CHANGES

    公开(公告)号:US20210181665A1

    公开(公告)日:2021-06-17

    申请号:US17188003

    申请日:2021-03-01

    Abstract: A method for detecting a non-authentic slave component in an electronic printer device which includes receiving a command from a master component in the device, identifying a response to the command based upon a frequency of a plurality of clock pulses used by the master component while sending the command, and sending the response to the master component for use as a basis in determining whether the slave component is one of an authentic slave component and a non-authentic slave component. The disclosed method may be performed by a replaceable slave component in an imaging device including a slave circuit communicating with a master circuit of the master component along a serial communications interface. The master circuit includes an instruction to change a clock frequency when sending a command to the slave circuit to trigger a unique response from slave circuits of authentic slave components.

    METHODS AND SYSTEMS FOR SELECTIVELY PREVENTING OPERATION OF A COMPONENT

    公开(公告)号:US20250047799A1

    公开(公告)日:2025-02-06

    申请号:US18924123

    申请日:2024-10-23

    Abstract: An imaging system comprising an imaging device and a supply item installed in the imaging device. The imaging device comprises: a system control component having host firmware stored thereon, the system control component comprising a print head operation module actuatable by the host firmware to transmit signals to a print head of the imaging system, the signals configured to cause the print head to operate. The imaging device further comprises: an imaging device security device and a monitor-enforce module. The monitor-enforce module comprises: a monitor interface configured to receive security information from the imaging device security device, wherein the security information indicates an authentication status of the supply item, and an enforce module, the enforce module being configured to selectively interrupt said signals transmitted by the print head operation module, based on the security information. The imaging device further comprises: a security communication system configured to allow the monitor interface of the monitor-enforce module to receive communication from the imaging device security device.

    AUTHENTICATION USING MAGNETIC FIELD BASED ON CURRENT DRAWN BY SECURITY DEVICE

    公开(公告)号:US20230409697A1

    公开(公告)日:2023-12-21

    申请号:US17866962

    申请日:2022-07-18

    CPC classification number: G06F21/44 G01R33/09 G01R33/07

    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.

    Chip and Supply Item for Imaging Device, Including Communication

    公开(公告)号:US20190356817A1

    公开(公告)日:2019-11-21

    申请号:US16531695

    申请日:2019-08-05

    Abstract: A supply item has toner for use in an imaging device. A chip has memory storing quanta indicating allowed usage of the supply item over its lifetime and a multiplier correlating the quanta to toner mass. The imaging device requires quanta to conduct imaging operations and loads the quanta and multiplier by way of a certificate stored in the memory. The imaging device retrieves quanta from the chip over time and both devices keep tally. Initialization between the supply item and imaging device includes providing encrypted and unencrypted instances of firmware versions and certificates from the supply item that the imaging device can compare for security. Alternatively, the supply item defines a fuser assembly, imaging unit, intermediate transfer member, or other component installed for use in the imaging device.

    AUTHENTICATION USING MAGNETIC FIELD BASED ON CURRENT DRAWN BY SECURITY DEVICE

    公开(公告)号:US20230409696A1

    公开(公告)日:2023-12-21

    申请号:US17863745

    申请日:2022-07-13

    CPC classification number: G06F21/44 G01R33/07 G01R33/09

    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.

Patent Agency Ranking