CPC G06Q 30/018 (2013.01) [G06Q 10/0875 (2013.01); G06T 7/0008 (2013.01); H04L 9/0869 (2013.01); H04L 9/3242 (2013.01); H04L 9/50 (2022.05)] | 18 Claims |
1. A method for determining the authenticity of a supply item in an imaging device, the method comprising:
receiving, by a supply item follower component in the supply item communicatively connected to an imaging device leader component in the imaging device, a seed;
storing the seed in a block of non-volatile memory in the supply item follower component;
calculating, by the supply item follower component, an output of a cryptographic function with the input based on the seed and storing the output in the block of non-volatile memory;
iteratively calculating, by the supply item follower component, the outputs of the cryptographic function wherein for each iteration the input for the cryptographic function is based on the seed and all previous outputs, and for each iteration storing the output in the block of non-volatile memory; and
determining the authenticity of the supply item based on a selected output of the cryptographic function of the supply item follower component, the selected output being one of the outputs stored in the block of non-volatile memory,
the method further comprising:
calculating, by an imaging device component in the imaging device, the output of the cryptographic function based on the seed in the same manner as the calculation by the supply item follower component, and storing the output in a block of non-volatile memory in the imaging device component; and
iteratively calculating, by the imaging device component, the outputs of the cryptographic function wherein for each iteration the input for the cryptographic function is based on the seed and all previous outputs in the same manner as the calculation by the supply item follower component, and for each iteration storing the output in the block of non-volatile memory of the imaging device component,
wherein the number of iterations of the calculation of the cryptographic function performed by the supply item follower component is the same as the number of iterations of the calculation of the cryptographic function performed by the imaging device component, and
wherein determining the authenticity of the supply item comprises comparing the selected output of the cryptographic function of the supply item follower component with the corresponding output of the cryptographic function of the imaging device component to determine if they are the same.
|