US 12,450,398 B2
Methods and systems for determining the authenticity of a component
Samuel Davidson, Lexington, KY (US); James Howard Ellis, Lexington, KY (US); Zachary Nathan Fister, Lexington, KY (US); Timothy John Rademacher, Richmond, KY (US); and Jennifer Topmiller Williams, Lexington, KY (US)
Assigned to LEXMARK INTERNATIONAL, INC., Lexington, KY (US)
Filed by Lexmark International, Inc., Lexington, KY (US)
Filed on Jan. 27, 2023, as Appl. No. 18/102,530.
Claims priority of provisional application 63/421,768, filed on Nov. 2, 2022.
Prior Publication US 2024/0143725 A1, May 2, 2024
Int. Cl. G06F 21/73 (2013.01); G06F 21/44 (2013.01); H04N 1/00 (2006.01); H04N 1/44 (2006.01)
CPC G06F 21/73 (2013.01) [G06F 21/44 (2013.01); H04N 1/00875 (2013.01); H04N 1/4433 (2013.01); G06F 2221/2103 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method of determining trust in a supply item in an imaging device for verifying other supply items installed in the imaging device via at least two or more algorithms, wherein the imaging device has a plurality of installed supply items, the method comprising:
sending, by a controller of the imaging device, challenge data and an indication of the at least two or more algorithms to a candidate supply item, the candidate supply item being one of the installed supply items,
receiving, by the controller, a challenge response from the candidate supply item, and
determining, by the controller, a status of the challenge response, the status being verified or unverified, wherein when the controller determines that the received challenge response is a correct output of each of the at least two or more algorithms when the challenge data is input to the at least two or more algorithms, the status is determined as verified, and
wherein when the status of the challenge response from the candidate supply item is verified, it is determined that the candidate supply item is trusted for the at least two or more algorithms, and the controller is configured to determine if all installed supplies are trusted for all algorithms in an initial list of the at least two or more algorithms.