CRUM chip, image forming device for verifying consumable unit comprising the CRUM chip, and methods thereof

ABSTRACT

Provided herein is an image forming device including a main body; a consumable unit detachable from and attachable to the main body, and including a CRUM chip; a storage which stores a detection list including information on counterfeit CRUM chips and a conversion serial information list including a plurality of conversion serial information each of which is converted from serial information stored in the CRUM chip according to a plurality of different predetermined rules; and a controller to limit use of the consumable unit, when verifying the consumable unit based on at least one of the detection list and the conversion serial information list fails.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/204,250, filed on Mar. 11, 2014, which claims priority benefit fromKorean Patent Application No. 10-2013-0124823, filed in the KoreanIntellectual Property Office on Oct. 18, 2013, the disclosures of whichare incorporated herein by reference.

BACKGROUND

1. Field

Embodiments of methods and apparatuses relate to an image forming deviceconfigured to verify a consumable unit using at least one of a detectionlist and a conversion serial information list and a verifying methodthereof.

2. Description of the Related Art

Due to the development of electronic technologies, various types ofelectronic devices are being developed and provided. Especially, ascomputer propagation has been popularized, the supply rate of computerperipherals is also increasing every day. Computer peripherals refer todevices for improving the utility of computers. For example, imageforming devices such as printers, scanners, copiers, and multifunctionperipherals may be computer peripherals.

An image forming device is a device configured to perform an imageforming job of forming an image on paper or other medium. In order toperform an image forming job, a developer such as ink or toner may beused. In the case of a laser type image forming device which uses toner,an electric charge unit, developing unit, transcription unit, lightexposure unit, and settlement unit etc. are used. Such units that areconsumed as jobs are performed may be called consumable units. Afterusing such a consumable unit for a certain period of time,characteristics of the consumable unit would change, and thus it isdifficult to expect good printing quality. Especially, in the case of atoner cartridge which contains toner, when the toner runs out, there maybe times when the toner cartridge must be replaced. In preparation forsuch cases, product manufacturers sell consumable units separately fromcomplete products. An image forming device may form the best qualityimages when mounted with such genuine consumable units.

However, there is possibility of installing a consumable unit that isnot suitable to the image forming device or a nongenuine (counterfeit)consumable unit with low quality. Furthermore, when a malicious thirdparty sells a nongenuine consumable unit having poor quality which is acopy of a genuine consumable unit, there is possibility of using thenongenuine consumable unit. However, when a nongenuine consumable unitis fitted (installed) in an image forming device, operations of theimage forming device may not be made properly, or what is even worse isthat the image forming device may be damaged by the nongenuineconsumable unit. An image forming device uses high temperature and highpressure in the process of performing a job, and thus there is alsopossibility of fire or explosion due to using a nongenuine consumableunit.

In order to prepare against such risks, memories are being fitted ontoconsumable units that are to be mounted onto image forming devices, thememories for performing processes of authenticating consumable units.However, if a third party having malicious purposes analyzes the codeprotocol and encoded key by hacking the memory fitted to (installed in)a consumable unit or the memory of main body of the image formingdevice, the third party could make a nongenuine consumable unit whereauthentication is made properly.

Accordingly, in addition to prior art processes, there requires atechnology for verifying a consumable unit appropriately.

SUMMARY

In an aspect of one or more embodiments, there is provided methods andapparatuses to resolve the aforementioned problems, that is to provide amethod for preventing manipulating risk regarding a consumable unit byverifying the consumable unit using at least one of a detection list andconversion serial information list.

According to an exemplary embodiment of the present disclosure, there isprovided a CRUM chip including a memory configured to store a detectionlist including information on nongenuine CRUM chips, serial information,and a conversion serial information list including a plurality ofconversion serial information (pieces of conversion serial information)converted from the serial information according to a plurality ofdifferent predetermined rules; an interface for performing communicationwith a controller fitted inside a main body of an image forming device;and a central processing unit (CPU) configured to provide the detectionlist and the conversion serial information list to the controller of themain body.

The conversion serial information list may further include a trigger bitto designate at least one piece of conversion serial information to beused in verifying among the pieces of conversion serial information.

In addition, the detection list may include at least one of toner serialinformation, chip serial information, and serial number of thenongenuine (counterfeit) CRUM chips, data recorded in a certain addressinside a CRUM memory, and random data used during authentication.

According to an exemplary embodiment of the present disclosure, there isprovided an image forming device including a main body; a consumableunit, which is detachable from the main body and attachable to the mainbody, and including a CRUM chip; a storage which stores a detection listincluding information on nongenuine CRUM chips (information aboutcounterfeit CRUM chips) and a conversion serial information listincluding a plurality of conversion serial information each of which isconverted from serial information stored in the CRUM chip according to aplurality of different predetermined rules; and a controller configuredto limit use of the consumable unit, when verifying the consumable unitbased on at least one of the detection list and the conversion serialinformation list fails.

The CRUM chip includes a storage which stores the serial information,the detection list, and the conversion serial information; and a CPUconfigured to provide the detection list and the conversion serialinformation list to the controller, when the consumable unit is fittedto (installed in) the main body, and the controller stores the detectionlist and the conversion serial information list provided from the CPU tothe storage.

In addition, the controller may check a version of the detection liststored in the CPU, and if the version is a latest version than adetection list prestored in the storage, requests the CPU for a listtransmission, and when the detection list is provided from the CPUaccording to the request, updates the list stored in the storage.

In addition, the conversion serial information list may further includea trigger bit for designating at least one conversion serial informationto be used in the verifying among the plurality of conversion serialinformation.

In addition, the controller may authenticate the CRUM chip according toa predetermined authentication algorithm when the consumable unit isfitted to the main body, check whether or not the CRUM chip is a CRUMchip registered in the detection list if the authentication succeeds,and perform a first verifying of the CRUM chip, and if the CRUM chip isa CRUM chip not registered in the detection list, download theconversion serial information from the CRUM chip, check the trigger bit,select at least one conversion serial information among the conversionserial information list, convert the serial information of the CRUM chipaccording to rules corresponding to the selected conversion serialinformation, compare a converted result value and the selectedconversion serial information, and perform a second verifying of theCRUM chip.

In addition, if the detection list version of the CRUM chip is a latestversion than the detection list stored in the storage, the controllermay download the detection list from the CRUM chip and update thedetection list stored in the storage and check whether or not serialinformation of the CRUM chip is registered in the updated detection listand performs a first verifying of the CRUM chip, and if the CRUM chip isa CRUM chip not registered in the detection list, download theconversion serial information list from the CRUM chip, check the triggerbit, select at least one conversion serial information among theconversion serial information list, convert the serial information ofthe CRUM chip according to rules corresponding to the selectedconversion serial information, compare a converted result value and theselected conversion serial information, and perform a second verifyingof the CRUM chip.

According to an exemplary embodiment of the present disclosure, theimage forming device may further include a communicator for performingcommunication with a server apparatus. In this case, the controller maytransmit at least one of the serial information, the detection list, andthe conversion serial information list provided from the CRUM chip tothe server apparatus as a result of verifying the consumable unit.

In addition, the image forming device may further include a communicatorconfigured to perform communication with a server apparatus, thecontroller may receive the detection list and the conversion serialinformation list from the server device and store at the storage unit.

In addition, the detection list may include at least one of toner serialinformation, chip serial information, and serial number of thenongenuine CRUM chips, data recorded in a certain address inside a CRUMmemory, and random data used during authentication.

According to an exemplary embodiment of the present disclosure, there isprovided a consumable unit verifying method of an image forming devicewhere a consumable unit including a CRUM chip may be attached theretoand detached therefrom, the method including verifying the consumableunit based on at least one of a detection list including information onnongenuine CRUM chips and a conversion serial information list includinga plurality of conversion serial information each of which is convertedfrom serial information stored in the CRUM chip according to a pluralityof different predetermined rules; and limiting use of the consumableunit, when the verifying the consumable unit fails.

In addition, the method may further include receiving the serialinformation, the detection list, and the conversion serial informationlist from the CRUM chip; and storing the detection list and theconversion serial information list in a main body of the image formingdevice.

In addition, the method may further include checking a version of thedetection list stored in the CPU, and if the version is a latest versionthan a detection list prestored in the main body of the image formingdevice and requesting the CPU for a list transmission; and when thedetection list is provided from the CPU according to the request,updating the detection list prestored in the main body of the imageforming device.

The conversion serial information list may further include a trigger bitconfigured to designate at least one among the plurality of differentrules.

In addition, the method may further include performing verifying theCRUM chip according to a predetermined authentication algorithm when theconsumable unit is fitted to the main body. The verifying the consumableunit may be performed after the authentication succeeds.

In addition, the verifying the CRUM chip may include if the detectionlist version of the CRUM chip is a latest version than a detection listprestored in the main body of the image forming device, downloading thedetection list from the CRUM chip and updating the prestored detectionlist; performing a first verifying of the CRUM chip by checking whetheror not serial information of the CRUM chip is registered in the updateddetection list; if the CRUM chip is a CRUM chip not registered in theupdated detection list, downloading the conversion serial informationlist from the CRUM chip; selecting at least one conversion serialinformation among the conversion serial information list by checking thetrigger bit; converting the serial information of the CRUM chipaccording to rules corresponding to the selected conversion serialinformation; and performing a second verifying the CRUM chip bycomparing a converted result value and the selected conversion serialinformation.

In addition, the method may further include transmitting at least one ofthe serial information, the detection list and the conversion serialinformation list from the CRUM chip as a result of verifying theconsumable unit.

In addition, according to an exemplary embodiment of the presentdisclosure, there is provided a server apparatus including a servercommunicator configured to perform communication with a plurality ofimage forming devices; a database configured to store nongenuine(counterfeit) management information; and a server controller configuredto receive a verification result and update the nongenuine managementinformation when the verifying the consumable unit is performed in eachof the plurality of image forming devices. The image forming device mayverify the CRUM using at least one a detection list includinginformation on nongenuine CRUM chips and a conversion serial informationlist including a plurality of conversion serial information convertedfrom the serial information according to a plurality of differentpredetermined rules.

According to an aspect of one or more embodiments, there is provided atleast one non-transitory computer readable medium storing computerreadable instructions to implement methods of embodiments when executedby at least one processing element.

According to the aforementioned various exemplary embodiment of thepresent disclosure, it is possible to verify a consumable unit using atleast one of a detection list and a conversion serial information list.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and/or other aspects of the present disclosure will be moreapparent by describing certain present disclosure with reference to theaccompanying drawings, in which:

FIG. 1 is a view for explaining operations of an image forming deviceaccording to an exemplary embodiment;

FIG. 2 is a block diagram for explaining a configuration of an imageforming device according to an exemplary embodiment;

FIG. 3 is a flowchart for explaining a consumable unit verifying methodof an image forming device according to an exemplary embodiment;

FIG. 4 is a block diagram for explaining a configuration of a CRUM chipaccording to an exemplary embodiment;

FIG. 5 is a view illustrating an example of a data structure of a datastored in a CRUM;

FIG. 6 is a flowchart for specifically explaining a consumable unitverifying method of an image forming device according to an exemplaryembodiment;

FIG. 7 is a block diagram illustrating an example of a detailedconfiguration of an image forming device according to an exemplaryembodiment;

FIG. 8 is a view illustrating a configuration of a network systemaccording to an exemplary embodiment;

FIG. 9 is a view illustrating an example of a database table managing aserver apparatus;

FIG. 10 is a block diagram illustrating a configuration of a serverapparatus according to an exemplary embodiment;

FIG. 11 is a timing view for explaining a consumable unit managingmethod in a network system according to an exemplary embodiment;

FIGS. 12 and 13 are views illustrating examples of various connectingstructures between a consumable unit and an image forming device mainbody; and

FIG. 14 is a block diagram illustrating an example of a detailedconfiguration of a CRUM chip according to an exemplary embodiment;

DETAILED DESCRIPTION

Certain exemplary embodiments are described in higher detail below withreference to the accompanying drawings.

In the following description, like drawing reference numerals are usedfor the like elements, even in different drawings. The matters definedin the description, such as detailed construction and elements, areprovided to assist in a comprehensive understanding of exemplaryembodiments. However, exemplary embodiments can be practiced withoutthose specifically defined matters. Also, well-known functions orconstructions are not described in detail since they would obscure theapplication with unnecessary detail.

FIG. 1 is a view for explaining a consumable unit authenticating methodof an image forming device according to an exemplary embodiment of thepresent disclosure.

The image forming device 100 may perform an image forming job using atleast one consumable unit 200. The consumable unit 200 may be freelyattached to and detached from a main body of the image forming device100.

In FIG. 1, for simplicity of explanation, it is illustrated that theconsumable unit 200 is separated from the main body, but in fact,communication between the main body and the consumable unit 200 may bemade with the consumable unit 200 fitted to (installed in) the mainbody.

That is, when the consumable unit 200 is fitted, the image formingdevice 100 may perform various operations such as authentication,verification and data communication etc. between the image formingdevice 100 and the CRUM chip 210 fitted (installed) inside theconsumable unit 200.

Authentication refers to checking whether or not the CRUM chip 210fitted inside the consumable unit 200 is an effective chip, and creatinga common section key for safe communication. Authentication may be madeby various configurative elements. For example, authentication may bemade by software by the CPU inside the image forming device 100executing firmware. Otherwise, if there is an ASIC (Application SpecificIntegrated Circuit) separately formed inside the image forming device100 for authentication, authentication may be executed by hardware usingthe ASIC. An authenticating method may be embodied in various ways aswell. Authenticating methods will be explained in detail hereinafter.

When authentication of the CRUM chip 210 is completed, the image formingdevice 100 may perform a verifying operation of checking whether or notthe CRUM chip 210 or consumable unit 200 is a genuine one. Verifying maybe performed on the CRUM chip 210, or the consumable unit 200 having theCRUM chip 210 installed therein, but for simplicity of explanationhereinafter the explanation is based on the assumption that theverifying is made on the consumable unit 200. In addition, although inFIG. 1 it is illustrated that a verifying operation is made afterauthentication, but verifying operation may precede the authenticationor may be included in the authentication process.

Verifying may be made in various ways depending on exemplaryembodiments. According to an exemplary embodiment, the image formingdevice 100 may verify the consumable unit 200 based on a detection list.The detection list may refer to a list of serial information that hasbeen determined to require additional action after checking theconformity and integrity of record information inside the CRUM memoryfor safe and normal authenticating of the consumable unit.

In addition, the detection list may refer to data including informationon nongenuine (counterfeit) CRUM chips. Various serial information thatmay discern nongenuine (counterfeit) CRUM chips may be registered in thedetection list. If serial information on the consumable unit 200 or CRUMchip 210 is already registered in the detection list, the image formingdevice 100 may determine that the corresponding consumable unit 200 isnongenuine and limit using the corresponding consumable unit 200.

The detection list may be provided from various source. For example, thedetection list may be stored in an image forming device 100 before theimage forming device 100 is placed in the stream of commerce (placed inthe market place). Otherwise, the detection list may also be newlymodified when inserting the detection list into a new firmware of theimage forming device 100 to update a program of the image forming device100. By another example, the image forming device 100 may be providedwith a detection list from the CRUM chip 210. In this case, when thedetection list is updated, in the CRUM chip 210 produced thereafter, theupdated detection list may be stored. Accordingly, the image formingdevice 100 where a consumable unit has been replaced by the consumableunit having the corresponding CRUM chip 210 becomes capable of receivingthe updated detection list.

According to an exemplary embodiment, the image forming device 100 mayverify the consumable unit 200 based on a conversion serial informationlist. The conversion serial information list refers to data includingpieces (portions, items, or units) of conversion serial information (aplurality of conversion serial information) converted from serialinformation of the CRUM chip 210 or the consumable unit 200 according toa plurality of predetermined different rules. rules refer to rulesdetermined to convert the serial information of the CRUM chip 210 orconsumable unit 200 into another value. For example, if in the casewhere the serial number of the consumable unit 200 is 1234567890, thefirst rule is to shift each value to the right, the first conversionserial information would be 0123456789. In addition, if in the casewhere the second rule is to shift the values to the left, the secondconversion serial information would be 2345678901. In addition, if thethird rule is to change the location of the third value and the seventhvalue among the entire values, the third conversion serial informationwould be 1274563890. Therefore, if the serial number is consideredserial information, the conversion serial information created based onthat serial number is also serial information.

The image forming device 100 converts the serial information of theconsumable unit 200 using the rule used in the conversion serialinformation list, and compares the converted value with thecorresponding value inside the conversion serial information list. Ifthe converted value is identical to the corresponding value inside theconversion serial information list, the consumable unit 200 may bedetermined as a genuine product, and if not, a nongenuine produce.

The comparison may also be made by converting into the serialinformation of the consumable unit in reverse using the conversionserial information and mathematical formulas, and then comparing theconverted value with the serial information of the consumable unit.

According to an exemplary embodiment, the image forming device 100 mayperform a verifying operation using all the detection list andconversion serial information list. In this case, the checking order maybe determined in any way.

When verifying the consumable unit 200 is completed, the image formingdevice 100 determines that the consumable unit 200 is usable.Accordingly, when necessary, the image forming device 100 may performdata communication with the consumable unit 200.

For example, at a waiting state, when an event for starting an imageforming device occurs, the image forming device 100 performs an imageforming job using the consumable unit 200. In addition, variousinformation such as the developer information, job information, jobexecution time, developer usage amount, number of printed pages etc.consumed in the image forming job is transmitted to the consumable unit200. The CRUM chip 210 stores the transmitted information to its memory.

FIG. 2 is a block diagram illustrating a configuration of an imageforming device according to an exemplary embodiment of the presentdisclosure. According to FIG. 2, the image forming device 100 includes aconsumable unit 200, storage 120, and main controller 110.

The consumable unit 200 may be an independent unit that may be attachedto and detached from a main body of the image forming device 100. Forexample, in the case where the image forming device 100 is a laserprinter using toner, the consumable unit 200 may be variousconfiguration elements such as an electric charge unit, developing unit,transcription unit, light exposure unit, and settlement unit etc. Eachconsumable unit 200 may include a CRUM chip 210.

The storage 120 is a configurative element for storing various programsand data necessary for operating the image forming device 100. Forexample, in the storage 120, a detection list and conversion serialinformation list may be stored. The detection list and the conversionserial information list may be recorded in the storage 120 in themanufacturing process before the image forming device 100 is put tomarket or may be downloaded from the consumable unit 200 and be recordedin the storage 120 when the consumable unit 200 is initially fitted orreplaced. Otherwise, data may be changed during updating programs of theimage forming device 100.

The controller 110 may verify the consumable unit based on at least oneamong the detection list and conversion serial information list storedin the storage 120.

When the verification succeeds, the controller 110 determines that thecorresponding consumable unit 200 is usable, and falls into a waitingstate. On the other hand, if the verification fails, the controller 110limits the use of the corresponding consumable unit 1200 or perform thepredetermined operations at the corresponding state, and output an errormessage through a display (not illustrated) or speaker (not illustrated)etc.

FIG. 3 is a flowchart for explaining a consumable unit verifying methodof an image forming device according to an exemplary embodiment of thepresent disclosure. According to FIG. 3, when the consumable unitincluding a CRUM chip is fitted to the main body of the image formingdevice 100, the image forming device 100 may verify the consumable unitbased on at least one of the detection list and the conversion serialinformation list (S310).

More specifically, in the case of using the detection list, thecontroller 110 checks the serial information of the consumable unit 200,and checks whether or not that serial information is registered in thedetection list. If it is checked that the serial information isregistered in the detection list, it is determined that the verificationfailed (S320). Accordingly, using the corresponding consumable unit islimited (S340). On the other hand, when it is checked that the serialinformation is not registered in the detection list, it is determinedthat the verification succeeded (S320). Accordingly, using theconsumable unit is allowed (S330).

In the case where the conversion serial information list is used, thecontroller 110 may read all the conversion serial information liststored in the CRUM chip 210 and store the read conversion serialinformation list in the storage 120. According to exemplary embodiments,an aptitude test may be performed first regarding whether or not thereis any problem in the conversion serial information list before storingit in the storage. For example, in the conversion serial informationlist, a check sum value, hash value or certain rule data may beincluded. If the conversion serial information does not correspond tosuch data, the controller may regard the conversion serial informationas conversion serial information created by a 3^(rd) party or waste datainitially contained in the chip, and process it to be a verificationfailure. Accordingly, it may be processed as not printable or an errormessage may be displayed on the UI.

When there is no problem in the conversion serial information list inthe first place, the controller 110 may perform verification based onthe conversion serial information list. For example, the conversionserial information list may include a trigger bit and conversion serialinformation data. The trigger bit is a bit for designating theconversion serial information to be used in verification. For example,in the case where a total of 20 pieces of conversion serial informationare registered, the trigger bit may be embodied as 20 bits. Each triggerbit may be recorded as 0 or 1. The controller 110 may selectivelyperform verification regarding the conversion serial information only.For example, if a first conversion serial information (first piece ofconversion serial information) is designated by the trigger bit, thecontroller 110 converts the serial information according to the firstrule. The controller 110 compares the converted result value with thefirst piece of conversion serial information inside the conversionserial information list. If the converted result value is identical tothe first piece of conversion serial information, it is processed to bea verification success, and if not, a verification failure (S320).

If there are a plurality of trigger bits having 0 value, the controller110 of the image forming device 100 may verify all conversion serialinformation corresponding to each trigger bit and verify the consumableunit.

When the verification on each trigger bit having 0 value is completedsuccessfully, the controller 110 may determine that the consumable unit200 is usable. On the other hand, if the verification failed, thecontroller 110 may limit using the corresponding consumable unit (S340),and output various error messages. In this example, it is embodied toverify the corresponding conversion serial information when the triggerbit included in the serial information list is 0, but it may also beembodied to verify the corresponding conversion serial information whenthe trigger value is 1 and not to verify the corresponding conversionserial information when the trigger value is 0.

FIG. 4 is a block diagram illustrating a configuration of a CRUM chipaccording to an exemplary embodiment of the present disclosure.According to FIG. 4, the CRUM chip 210 includes a communicationinterface 211, CPU 212, and memory 213.

The communication interface 211 is a configurative element forperforming communication with the main body of the image forming device100. More specifically, the communication interface 211 may performcommunication with the controller 110 inside the main body using variouscommunication methods such as GPUI, 12C, and RFID etc. For example of12C, the communication interface 211 may be connected to the controllervia a VCC and GND that supply power, an SCL that supplies clock forsynchronization and an SDA that is a dataline etc. Besides, thecommunication interface 211 may perform communication with thecontroller 110 according to wireless communication standards such asblue tooth, Wifi, Zigbee, and NFC(Near Field Communication) etc.

The memory 213 is a configurative element for storing variousinformation and programs related to the consumable unit. Morespecifically, in the memory 213, various information such as serialinformation, and use information may be recorded. Serial informationrefers to information for discerning the consumable unit 200 or CRUMchip 210. For example, information on the manufacturer of the consumableunit 200, information on the manufacturer of the image forming device,name of apparatuses that may be fitted to the image forming device,toner serial information, chip serial information, serial number,information on the manufacturing date, model name, electronic signatureinformation, encoded key, and encoded key index etc. may be included.Serial information may be called as feature information oridentification information instead. Use information refers toinformation related to the use state of the consumable unit. Morespecifically, use information may include information on how many sheetshave been printed using the consumable unit, how many more sheets can beprinted using the consumable unit, and how much toner is left etc.

Besides, not only general information such as the version, serialnumber, set model name, and service starting date etc. of the consumableunit 200 but also various option information such as RAM size and EEPROMsize, information related to life span of the consumable unit, featureinformation of the consumable unit, features of the consumable unit,color menus, and set up menus etc. may be stored in the memory 213.

In addition, in the memory 213, various programs that may be executed bythe CPU 212 may be stored. More specifically, in the program to bestored in the memory 213, not only general applications but also O/S(Operating System) program, initialization program, encoding program maybe included. These O/S program, or initialization program, encodingprogram may be provided separately from the O/S program orinitialization program, encoding program used in the main body of theimage forming device 100 and be stored in the memory 213.

In the case where the CRUM chip is embodied to have an O/S of its own,the CPU 212 may perform authentication using the O/S between the CPU 212and the main body of the image forming device 100. More specifically,when an authentication event occurs, the CPU 212 performs authenticationbetween the CPU 212 and the controller 110. An authentication eventrefers to a state where a condition requiring authentication of theconsumable unit has been satisfied, more specifically, when the imageforming device 100 has been turned off and then turned on, or when animage forming job has ended, or when the consumable unit has beenreplaced. Otherwise, arrival of a predetermined time period may also beincluded in the authentication even.

A detection list and conversion serial information list asaforementioned may be stored in the memory 213. According to exemplaryembodiments, both or either of the detection list and conversion serialinformation list may be stored in the memory 213. In the case where thedetection list and conversion serial information list are both stored inthe memory 213, the CPU 212, when authentication is completed, mayprovide the detection list and the conversion serial information liststored in the memory 213 to the controller 110.

FIG. 5 is a view illustrating an example of a memory structure of amemory included in a CRUM chip 210. According to FIG. 5, the memory 213may be divided into a plurality of storage areas 510, 520, 530, 540.Each storage area 510, 520, 530, 540 may store various designated data.For example, there may be provided an area storing chip serial number510, area storing toner serial number 520, area storing detection list530, and area storing conversions serial information list 540 etc.

In the detection list area 530, header information 531 for identifyingthat detection list area, and various serial information 532 used in aprediscovered nongenuine produce may be recorded. In addition, a checksum value for checking the legitimacy of the corresponding detectionlist, or hash value or certain rule data may be recorded together in thedetection list area 530.

In the conversion serial information list area 540, a trigger bit 541,and a plurality of conversion serial information (pieces of conversionserial information) 542 may be recorded. As aforementioned, a check sumvalue for checking the legitimacy of the corresponding detection list,or hash value or certain rule data may be recorded together in theconversion serial information list area 530.

According to an exemplary embodiment of the present disclosure, theimage forming device may check the version of the detection listrecorded in the CRUM chip 210 and update the detection list.

FIG. 6 is a flowchart for explaining a consumable unit verifying methodof an image forming device according to an exemplary embodiment.According to FIG. 6, the image forming device 100 is fitted with aconsumable unit, and when a predetermined authentication event occurs,performs authentication of the consumable unit 200. (S610)

For example, the controller 110 may encode the signal for authenticationand transmit the signal to the CRUM chip 210. In the transmitted signal,any value R1 may be included. R1 may be a random value randomly createdat every authentication, or any predetermined fixed value. When thecorresponding signal is received, the CPU 212 of the CRUM chip 210 thatreceived the signal creates a section key using information includingthe any value R2 and the received R1. The section key refers to anencoding key used during one communication session.

The CPU 212 encodes data using the session key and encoding algorithmand creates MAC (Message Authentication Code). In the encoded data,various information on the consumable unit 200 and CRUM unit 210 may beincluded. For example, electronic signature information or serial numbermay be included. For simplicity of explanation, the MAC created theforemost will be called the first MAC.

The CPU 212 transmits the signal with the data including R2 and thefirst MAC combined to the controller 110. R2 may be a value that the CPUrandomly creates, or any fixed value. The controller 110 creates asession key using the received R2 and R1, and creates the second MACusing the created session key. In addition, the created second MAC iscompared to the first MAC included in the received signal toauthenticate the CRUM chip 210. In the case where an OS executedseparately from the main body is stored in the memory 213, the CPU 212may use the OS to perform the R2 creating operation, session keycreating operation, first MAC creating operation, and transmittingoperation etc. consecutively, and complete authentication.

In an exemplary embodiment, one example of the method of authenticationis explained, but authentication may be performed using other methods aswell. Especially, instead of using the method of creating MACinformation and comparing, it is possible to perform communicationbetween the image forming device and the CRUM chip according to theencoding protocol and share the same information to createauthentication and a session key.

Next is an example of such authentication. In the signal that the imageforming device 100 transmits in the process of sending data to the CRUMchip 200 for an authentication operation, CMD1, DATA1, CRC1, Symbol, VC1are included. CMD1 refers to a command. In CMD1, options related toauthentication or size information of the data being sent may beincluded in CMD1. DATA1 includes of Random Data that is data necessaryfor authentication, encoded related data value for authentication, andcertain information stored in the image forming device. In the case of afirst authentication process, besides the aforementioned random data R1,key size information and session key related data such as various keyrelated information used in an asymmetric algorithm, and otherinformation stored in the image forming device main body 100 may betransmitted. In some cases, some of this information may be omitted, orreplaced by other information.

Random data may be a value that the image forming device 100 randomlycreates for authentication. Therefore, random data may differ at everyauthentication, but in some cases, it may be embodied such that anypredetermined fixed value is transmitted instead of random data. CRC1refers to an error detection code. CRC1 is transmitted to check error ofCMD1 and DATA1. Checksum or MAC may be used as an error detection methodin addition to the CRC1 method, or used to replace CRC1 method. Besides,there may be additional information in the information to betransmitted.

When information is received from the image forming device, the CRUMchip 200 transmits a response according to the received data back to theimage forming device. DATA2, SW2, CRC2, SECU2, VC2 are included in thedata transmitted. A first random data R1, second random data R2, chipserial number (CSN), key related information used in an asymmetric keyalgorithm, and internal information of the CRUM may be included in theDATA.

The first random data R1 is a value received from the image formingdevice, and the second random data R2 is a value created by the CRUMchip 200. In some cases, these information included in Com-2 may beomitted or replaced by other information.

Besides the above, SW2 refers to a result data that is the result ofexecution of an operation performed in the CRUM chip 200 as data of theimage forming device is received. CRC2 plays the same role as CRC1, andthus explanation on CRC2 is omitted. When an authentication process ismade as explained above, the first random data R1 created in the imageforming device 100 and the second random data R2 created in the CRUMchip 200 may be shared by each other. The image forming device 100 andthe CRUM chip 200 may each create a session key using the R1 and R2received. Otherwise, besides R1 and R2, the image forming device 100 andthe CRUM chip 200 may each create the same session key using theinformation shared between the image forming device and the CRUM chip.

As such, according to various exemplary embodiments, in such anauthentication process, electronic signature information or keyinformation may be transceived and used in the authentication.

Besides, authentication may be performed in various ways.

When the authentication fails (S615), the image forming device 100limits use of the consumable unit 200 where the corresponding CRUM chip210 is fitted (S655).

When the authentication succeeds (S615), the image forming device 100checks the version of the detection list stored in the CRUM chip 210(S620).

As a result of the checking, if the version of the detection list storedin the CRUM chip 210 is a latest version than the detection list storedin the main body (S625), the controller 110 downloads the detection listfrom the CRUM chip 210, and updates the detection list prestored in thestorage 120 (S630). On the other hand, if the version of the detectionlist stored in the CRUM chip 210 is not a latest version than thedetection list stored in the main body, the controller 110 does notdownload the detection list separately, but maintains the existingdetection list.

In the case where the detection list is updated or the existingdetection list is maintained, the controller 110 verifies the consumableunit 200 based on that detection list (S635). That is, the controllerdetermines whether or not the serial information stored in the CRUM chip210 is already registered in the detection list, and if it is determinedthat the serial information stored in the CRUM chip 210 is alreadyregistered in the detection list, the controller determines it to be averification failure and limits the usage (S655).

On the other hand, if it is determined that the serial informationstored in the CRUM chip 210 is not registered in the detection list, thecontroller performs verification based on the conversion serialinformation list. More specifically, the controller 110 may download theconversion serial information list from the CRUM chip, perform a logicaloperation such as bit OR regarding the trigger bit prestored in thestorage 120 and the trigger bit included in the conversion serialinformation list downloaded from the CRUM chip, and have the result as anew trigger bit. The controller 110 may check the new trigger bit, checkat least one conversion serial information among the conversioninformation list, convert the serial information of the CRUM chipaccording to rules corresponding to the selected conversion serialinformation, and compare the converted result value with the selectedconversion serial information to perform a second verifying of the CRUMchip.

In the case of using both the detection list and conversion serialinformation list as in the present exemplary embodiment, verificationusing the detection list may be called a first verifying, and theverification using the conversion serial information list may be calleda second verifying, but there is no limitation to the order thereof.

For a verification using the conversion serial information list, thecontroller 110 first downloads the conversion serial information listincluding the trigger bit and conversion serial information (S640).

The controller 110 may select at least one conversion serial informationamong the conversion serial information list based on the trigger bit,and perform verification based on the selected conversion serialinformation. More specifically, the controller 110 may perform a logicaloperation such as bit OR logical operation regarding the trigger bitprestored in the storage 120, and the trigger bit included in thedownloaded conversion serial information list.

The controller 110 stores the logical operation result value in thestorage 120. More specifically, the controller 110 may store the logicalresult value in a nonvolatile memory such as EEPROM or flash memory ofthe storage 120.

For example, if the trigger bit stored in the storage 120 of the imageforming device 100 is 0111111111 and the trigger bit downloaded from theCRUM chip 210 is 1011111111, its OR logical operation value is0011111111. The controller 110 stores the result value to the storage120.

The controller 110 verifies the conversion serial informationcorresponding to the bit having a certain value (for example 0) in thelogical operation result value stored in the storage 120 (S645).

In the case where 0011111111 is stored in the storage 120 asaforementioned, the controller 120 performs verification regarding thefirst and second conversion serial information. For example, if theserial number of the consumable unit 200 is 1234567890 asaforementioned, and the first rule is shifting each value to the right,the controller 110 may convert its serial number into 0123456789according to the corresponding rule. The controller 110 compares theconversion result value with the first conversion serial informationincluded in the conversion serial information list (S645).

If as a result of comparison the conversion result value is notidentical to the value registered in the conversion serial informationlist (S650), the controller 110 processes the verification being afailure, and limits using the corresponding consumable unit (S655).

On the other hand, when the conversion result value is identical to theregistered value (S650), the controller 110 checks the next trigger bitstored in the storage 120 (S665) and determines the verification untilthe entirety of the trigger bit is checked (S660). In the aforementionedexample, the next trigger bit is also 0, and thus the controller 110performs verification regarding the second conversion serial informationas well. Therefore, the controller 110 converts the serial informationaccording to the second rule, compares the converted serial informationwith the second conversion serial information to perform verification.

In this way, the controller 110 checks each trigger bit (S665), andperforms verification. When checking the entirety of the trigger bit iscompleted (S660), the controller 110 determines the verification to be asuccess and thus falls into a use waiting state (S670).

Otherwise, the controller 110 may use the method of comparison byconverting the conversion serial information into serial information inreverse.

In the present example, it is embodied that verification is made to theconversion serial information in the case where the trigger bit includedin the serial information list is 0, but it may also be embodied toverify the conversion serial information when trigger bit is 1 and notto verify the conversion serial information in the case where thetrigger bit is 0.

According to an exemplary embodiment, in a manufacturer whichmanufactures an image forming device 100, in the case of producing aCRUM chip 210 and intending to add verification regarding a newconversion serial information, the manufacturer has only to change thetrigger bit of the CRUM chip 210. That is, when the trigger bit of theCRUM chip 210 is recorded as 1001111111, as a result of OR logicaloperation by the controller 110, 0001111111 is stored in the storage120. Therefore, verification on the third conversion serial informationmay also be performed.

Although not illustrated in FIG. 6, before performing a verificationbased on the detection list and a verification based on the conversionserial information list, the controller 110 may further perform aprocess of verifying the legitimacy of that list. This was explained indetail above, and thus repeated explanation is omitted.

In the aforementioned various exemplary embodiments, it was illustratedand explained that the image forming device 100 includes a controller110, storage 120, and consumable unit 200, but the image forming device100 may further include various configurative elements, and some of theconfigurative elements may be omitted or changed according to embodimentexamples.

FIG. 7 is a block diagram for explaining a configuration of an imageforming device according to an exemplary embodiment of the presentdisclosure. According to FIG. 7, the image forming device 100 includes acontroller 110, storage 120, user interface 130, communicator 140, and aplurality of consumable units 200-1, 200-2, . . . , 200-n.

Any repetitive explanation on the controller 110, storage 120, andconsumable units 200-1, 200-2, . . . , 200-n as that aforementioned willbe omitted.

The user interface 130 plays a role of receiving various commands fromthe user or displaying various information. The user interface 130 mayinclude an LCD or LED display, at least one button, and speaker etc.,and in some cases a touch screen.

The communicator 140 refers to a configuration connected to variousexternal devices such as an external server apparatus or host PC viawires or wireless. The communicator 140 may perform communicationthrough various kinds of interfaces such as a local interface, USB(Universal Serial BUS) interface, and wireless communication networketc.

The controller 110 controls overall operations of the image formingdevice based on various programs and data stored in the storage 120.

More specifically, the controller 110 processes data according to thecommand received through the communicator 140 or user interface 130, andconverts it into a format where image formation can be made.

Next, the controller 110 performs an image forming job regarding thedata converted using the plurality of consumable units USB 200-1, 200-2,. . . , 200-n. The consumable units may be provided in various formatsaccording to different kinds of the image forming device. Asaforementioned, in the case of a laser printer, not only an electriccharge unit, developing unit, transcription unit, light exposure unit,and settlement unit, but also various replaceable units such as aroller, belt, and OPC drum etc. may be included.

The controller 110 may perform authentication regarding the consumableunit where the CRUM chip is fitted inside, or perform verification basedon at least one of the detection list and conversion serial informationlist.

In the authentication process, the controller 110 may perform operationsfor creating a common session key between the controller 110 and theCRUM chip 210. In addition, in the authentication process, thecontroller 110 may check whether or not it is state where the fittedCRUM chip 210 can be normally used. For example, the controller 110 mayreset the CRUM chip 210 and read the data and check the data, or sendadditional commands, analyze the result of response to the commands inthe CRUM chip 210, and determine whether or not it is usable. In thisprocess, it is possible to confirm whether or not the communication isperformed well, and whether or not it is a CRUM chip 210 suitable to thecorresponding image forming device.

In some cases, it is possible to check whether the CRUM chip 210 is at astate prepared for performing encoded communication with the imageforming device, for example checking whether or not the key informationused in the encoded communication is inside the CRUM chip. The keyinformation used during authentication is not included during theinitial manufacturing of the chip but may be inserted through a processof issuance in the next manufacturing process. Code authentication maybe passed only when key insertion is completed. Accordingly, code keysmay differ per model of the image forming device or CRUM chip.

Besides, as aforementioned, the controller 110 may transmit variousinformation such as random data 1, data necessary for codeauthentication protocol, and feature information of the image formingdevice to the CRUM chip 210. Accordingly, the controller 110 checks therandom data 2 responding in the CRUM chip 210, additional data necessaryfor the code authentication protocol, and feature information of theCRUM chip 210 etc. In this process, authentication is made, and theimage forming device and the CRUM chip turn out to have the sameinformation. Based on this information, it is possible to create asession key to be used in the next code communication. The code protocolused in an authentication may be a symmetric key algorithm, anasymmetric key algorithm, or both in combination.

When the authentication and verification regarding the consumable unitsucceeded, the controller 110 may perform data communication with theCRUM chip. In this case, the controller may perform encoded datacommunication using the session key created in the authenticationprocess.

For example, the controller 110 may encode various data or commands andtransmit encoded communication messages, likewise, the CRUM chip mayresponse by encoded communication messages. MAC may be used in encodedcommunication messages as well. For example, when creating acommunication message to be transmitted to the CRUM chip 210, thecontroller 110 applies the key and code algorithm to the data andcreates a third MAC. Next, the controller 110 may attach the third MACto the communication message and send it to the CRUM chip 210. The CRUMchip 210 extracts the data portion from the transmitted communicationmessage, and creates applies the aforementioned key and code algorithmto create a fourth MAC. The CRUM chip 210 compares the third MACdetected in the transmitted communication message and the fourth MACcreated by the CRUM chip 210. And if they are found to be identical toeach other, it is regarded as a legitimate communication message, and anoperation corresponding to that message is performed. For example, whenan image forming job is performed, the consumed toner amount, number ofpages, operation time, and operation details of the job may be recordedin the memory 213. But if they are found to be different from eachother, the CPU 121 may regard the corresponding message as anillegitimate communication message and delete it.

Besides the MAC explained above, various message verification methods ofcommunication messages such as CheckSum, CRC may be used to checkwhether or not a communication message is legitimate, and thus there isno limitation to MAC.

Furthermore, the entirety or portion of the data to be transmitted isencoded using the session key created in the preexecuted authenticationprocess, decodes the received data using the session key at thereceiving side and performs the corresponding command, and if thereceived data is not decoded normally, the operations of the imageforming device 100 is limited or error messages are shown orpredetermined operations are made.

According to FIG. 7, the controller 110 may include configurativeelements such as a main CPU 111, RAM 112, ROM 113, and I2C controller(I²C controller) 114.

The main CPU 111 may control the operations of the image forming deviceusing various programs stored in the storage 120. For example, when thepower is turned on, the main CPU 111 accesses the storage 120, and usesthe O/S stored in the storage 120 to perform booting. In addition,various operations are performed using various programs, contents, anddata stored in the storage 120.

In the ROM 113, command sets etc. for system booting are stored. When aturn on command is input and power is supplied, the main CPU 111 copiesthe O/S stored in the storage 120 to the RAM 112 according to thecommand stored in the ROM 113, and executes the O/S to boot the system.When the booting is completed, the main CPU 111 copies various programsstored in the storage 120 to the RAM 112, and executes the programscopied in the RAM 112 to perform various operations.

The I2C controller (I²C controller) 114 is a configurative element whichmay be provided when the main body of the image forming device 100 andthe consumable unit 200 perform communication by 12C interface. The 12Ccontroller 114 plays the master role, and the CRUM chips of eachconsumable unit 200 plays the slave role.

The main CPU 111 downloads the detection list and the conversion serialinformation list of the consumable unit 200 using the 12C controller(I²C controller) 114, and stores it in the storage 120. And based onthis, the main CPU 111 may perform verification. Detailed explanation onthe verification method was made above and thus detailed explanationwill be omitted.

As illustrated in FIG. 7, in the case where the image forming device 100includes a communicator 140, the controller 110 may receive at least oneof the detection list and conversion serial information list from anexternal server apparatus through the communicator 140.

The controller 110 may store the detection list and the conversionserial information list provided by the server apparatus (notillustrated) in the storage 120, and based on this, the controller 110may verify the consumable unit 200.

In addition, as a result of verifying the consumable unit 200, thecontroller 110 may transmit at least one of various information such asthe detection list, conversion serial information list, and serialinformation provided from the consumable unit 200, to the serverapparatus (not illustrated). Based on these information, the serverapparatus may easily understand the distribution status of nongenuineconsumable units.

FIG. 8 is a view illustrating a configuration of a network systemaccording to an exemplary embodiment of the present disclosure.According to FIG. 8, the network system includes a plurality of imageforming devices 100-1˜100-m, and a server apparatus 800 managing them.

The server apparatus 800 may receive information directly from eachimage forming apparatus 100-1˜100-m, but may instead receive theinformation of the image forming apparatuses 100-1˜100-m through a hostconnected to each image forming device.

In the case of using a host PC (personal computer) 900, the host PC 900may request the image forming device 100-1 for consumable unitinformation, detection list information, conversion serial informationlist, and verification result etc. stored in the CRUM chip 210 whencertain conditions are satisfied.

The image forming device 100 may transmit these information by therequest of the host PC 900. The transmitted information is transmittedback the server apparatus 800.

Otherwise, information may be transmitted to the server apparatus 800directly using the functions of the image forming device 100. Forexample, after printing by the image forming device 100, information ofthe consumable unit fitted to the host PC that made the printing commandand the conversion serial information are sent in a predeterminedformat. When the corresponding information enters, the host PC 900transmits the information to the predetermined server apparatus. Whenthe information cannot be sent directly to the server apparatus 800, theinformation may be sent to other servers or image forming devices or PCthat may send the information to the server apparatus 800.

The server apparatus 800 may collect these information and manage them.

In addition, the server apparatus 800 may analyze the data transmittedto the server and check whether or not there exists a nongenuine chip.For example, the server apparatus 800 may investigate the number ofconsumable units having the same conversion serial information and thesame consumable unit information. A consumable unit having the sameinformation are not made by more than a certain number, and thus whenmore than a certain number of consumable units exist, the consumableunits having that serial information may be regarded as nongenuineconsumable units. Besides the aforementioned, there may be used a methodof analyzing the various collected information to distinguish betweengenuine products and nongenuine products.

As aforementioned, in the case where the serial information of theconsumable unit and the conversion serial information verified in theimage forming device are the same, the manufacturer of the image formingdevice 100 may change the value of the trigger bit of the CRUM chip 210fitted in the consumable unit 200, and have additional conversion serialinformation verified besides the conversion serial information that usedto be verified.

Otherwise, when the serial information of the consumable unit and allconversion serial information are the same when checked in the serverapparatus 800, it may be regarded that a genuine CRUM chip having thecorresponding information has been copied and used. In this case, it ispossible to add the serial information (for example: Toner SerialNumber) of the consumable unit corresponding to the CRUM chip of thatconsumable unit to the detection list. Accordingly, the consumable unitshaving the corresponding information may be identified as nongenuinechips in the image forming device.

FIG. 9 illustrates an example of a configuration of a database managedin the server apparatus 800. According to FIG. 9, the server apparatus800 may arrange and manage various information such as the chip serialnumber (CSN), toner serial number (TSN) and conversion serialinformation etc. used in various image forming devices put to market inone database table.

When information of each image forming device is collected, the serverapparatus 800 may use the information to create and update the databasetable. For example, since the toner serial number is serial informationof the consumable unit, this information could not be in numerousconsumable units at the same time. Therefore, if there are more than acertain number of identical serial number, it can be seen that there isan illegally produced CRUM chip inside the consumable unit having thecorresponding toner serial number. For example, if 10 or more identicalserial numbers have been found, it can be determined that the CRUM chiphaving the corresponding serial number has been copied or hacked.

The operator of the server apparatus 800 may add the serial informationof the CRUM chip determined to have been copied or hacked to thedetection list and update the detection list. In addition, regarding thenewly produced consumable unit 200, the updated version detection listmay be stored. Otherwise, the updated detection list may be downloadedin each image forming apparatus 100-1˜100-m. Accordingly, in an imageforming device that stored a new detection list, it is possible to limituse of the newly discovered nongenuine consumable unit.

Otherwise, the operator of the server apparatus 800 may set at least oneof the trigger bits included in the conversion serial information listof the newly produced consumable units to 0. In this case, the imageforming device where the newly consumable unit is fitted verifies theconversion serial information corresponding to the bit stored as 0 inthe new IBL trigger bit. Upon verifying the conversion serialinformation, the nongenuine chip produced without knowing the conversionrule of the corresponding bit does not have the same conversion value asthe value included in the conversion serial information list. Therefore,the image forming device processes that verification regarding theconsumable unit where the corresponding CRUM chip is fitted to be afailure.

In the present example, the verification is made regarding theconversion serial information in the case where the trigger bit includedin the serial information list is 0, but it may also be embodied toverify the corresponding conversion serial information when the triggervalue is 1 and not to verify the corresponding conversion serialinformation when the trigger value is 0.

FIG. 10 is a block diagram illustrating a configuration of a serverapparatus according to an exemplary embodiment of the presentdisclosure. According to FIG. 10, the server apparatus 800 includes aserver communicator 810, server controller 820, and database 830.

The server communicator 810 is a configurative element for performingcommunication with various external apparatuses such as a plurality ofimage forming devices or host PC etc. The server communicator 810 maycollect various information received from each external apparatus.

The database 830 is a configurative element for storing the nongenuineproduct management information. More specifically, the database 830 maystore a database table as illustrated in FIG. 9.

When verification regarding each consumable unit is performed in each ofthe image forming apparatus, the server controller 820 may receive theverification result and update the nongenuine management information.That is, as aforementioned, when a consumable unit including a CRUM chipis fitted, each image forming device 100 may verify the CRUM chip usingat least one of the detection list and the conversion serial informationlist. In addition, the server controller 820 may provide theverification result showing various information obtained in theverifying process or whether or not the verification failed to theserver apparatus 800.

The server controller 820 may update the data stored in the database 830based on these information.

FIG. 11 is a view for explaining operations performed inside a networksystem in the case where a CRUM chip is produced and provided.

In FIG. 11, the manufacturing steps and provision steps of the CRUM chip210 are explained separately. First, in the manufacturing steps, in anissuance application 1110, various serial information including thetoner serial numbers to be allocated to the corresponding CRUM chip 210is created and provided to the issuance firmware 1120 (S1100). Theissuance firmware 1120 converts the created serial information accordingto the predetermined rules, and creates the conversion serialinformation (S1105). The issuance firmware 1120 provides the createdconversion serial information, serial information, and trigger bit etc.to the CRUM chip 210 (S1110). The CRUM chip 210 may be put to marketwith it storing various information provided (S1115). FIG. 11 explainedonly information related to the conversion serial information list, butthe detection list may also be stored in the CRUM chip 210 in the samemanner.

In this state, the user may purchase the consumable unit 200 where aCRUM chip 210 is fitted, and fit the consumable unit 200 into the user'simage forming device 100.

When the consumable unit 200 is fitted, the controller 110 performsauthentication as aforementioned (S1120), and may receive the serialinformation and detection list of the CRUM chip 210 (S1125, S1130). Thecontroller 110 checks the received detection list (S1135), and performsa first verification. After the first verification, the controller 110may receive the trigger bit and the conversion serial information(S1140). Then, the controller 110 may perform a second verificationbased on the trigger bit and the conversion serial information (S1145).

When the first and second verifications all succeed (S1150), thecontroller 110 may perform data communication between the controller 110and the CRUM chip 210 (S1160). On the other hand, if even one of thefirst and second verifications fails (S1155), the controller 110 limitsuse of the consumable unit (S1155).

The controller 110 may transmit various information obtained in theverification process to the server apparatus 800 (S1165). The serverapparatus 800 may update the management information using thetransmitted information (S1170).

As aforementioned, the consumable unit 200 may be attached to anddetached from the main body of the image forming device 100. When beingfitted, the consumable unit 200 must be electrically connected to themain body. This connection may be embodied in a contact type orconnector type.

FIG. 12 is an example of an exterior configuration of a consumable unit200 embodied in a contact type. According to FIG. 12, the consumableunit 200 includes a contact point 1200 for communication. FIG. 12illustrates a case where 12C interface using four contact terminals areused. Also in the main body 100 of the image forming device, a contactpoint of the same shape as the contact point 1200 is provided. When theconsumable unit 200 is fitted to the main body 100, the contact point1200 may contact the contact point provided in the main body 100 of theimage forming device 100.

When a contact signal is received from the contact point, the controller110 of the image forming device 100 may consecutively perform theauthentication and verification steps.

FIG. 13 is a view illustrating an example of an exterior configurationof an interface of a connector type. According to FIG. 13, theconsumable unit 200 includes a connector 1310. The connector 1310 isconnected to the port 1300 provided in the main body 100 of the imageforming device. The controller 110 of the image forming device 100 mayconsecutively perform the authentication and verification steps when theconnection signal of the connector 1310 is received through the port1300.

As aforementioned, the consumable unit 200 may be configured in variousformats. In addition, the CRUM chip 210 may also be configured invarious formats according to the type of the consumable unit 200.

FIG. 14 is a block diagram illustrating an example of a configuration ofa CRUM chip 210.

According to FIG. 14, the CRUM chip 210 may include various elementssuch as a communication interface 211, CPU 212, O/S memory 213-1,nonvolatile memory 213-2, volatile memory 213-3, crypto module 214(crypto unit 214), and temper detector 215.

Although not illustrated in FIG. 14, inside the CRUM chip 210, a cluck(not illustrated) that outputs a cluck signal or a random valuegenerator (not illustrated) that generates a random value forauthentication may be further included, and some elements may be removedor other elements may be further included.

According to FIG. 14, the O/S memory 213-1 stores O/S for driving theconsumable unit 200. In the nonvolatile memory 213-2, various data andprograms related to a consumable unit and CRUM chip may be stored. Morespecifically, electronic signal information, various encoding programcodes, state information of consumable unit (for example, remainingtoner amount information, replacing time information, remaining numberof printable paper etc.), serial information (for example, manufacturerinformation, manufacturing date information, serial number, and productmodel name information), A/S information etc. may be stored in thenonvolatile memory 213-2.

The CPU 212 may load the programs and data stored in the nonvolatilememory 213-2 to the volatile memory 213-3, and use the same.

The crypto unit 214 may support the encoding algorithm to enableauthentication between the crypto unit 214 and the controller 110provided in the main body of the image forming device or encodedcommunication. More specifically, the crypto unit 214 uses the variousencoding algorithms to perform authentication or encoding datacommunication.

The temper detector 215 is a unit for preventing various physicalhacking attempts that is tempering. More specifically, it monitorsregarding the voltage, temperature, pressure, light, and frequency, andif there is an attempt such as a Decap, deletes the data or physicallyblocks the data. In this case, the temper detector 215 may have anadditional power.

In FIG. 4 and FIG. 14, there is illustration of the CRUM chip 210including the CPU 212, but the configuration of the CRUM chip 210 is notlimited thereto. For example, the CRUM chip 210 may include only amemory.

As aforementioned, according to various exemplary embodiments of thepresent disclosure, the image forming device may use at least one of thedetection list and conversion serial information list to verify theconsumable unit. Accordingly, it is possible to limit use of anongenuine chip. In addition, a manufacturer or seller of the imageforming device may collect information on the CRUM chip and checkwhether or not the nongenuine chips are used in the market. Ifnongenuine chips or units are being used, it is possible to limit use ofthe nongenuine units without developing a new CRUM chip or changing thefirmware. Accordingly, it is possible to quickly take action to preventproblems of accident, quality deterioration or damage.

The aforementioned exemplary embodiments were based on consumable unitsor CRUM chips mounted on image forming devices or apparatuses, but thesemethods are not limited to use in image forming devices.

That is, in the case of verifying configurative elements mounted insideor external elements in a general electronic apparatus, theaforementioned various exemplary embodiments may be applied. Forexample, an external storage medium may be connected through a USB cablefor a mobile phone, PC, tablet PC, laptop PC, and TV etc. In this case,the controller provided inside the terminal device may verify whether ornot the external storage medium is a legitimate apparatus based on theat least one of the detection list and conversion serial informationlist.

In addition, the various methods explained in the aforementioned variousexemplary embodiments may be performed by programs stored innontransitory computer readable medium. A nontransitory computerreadable medium refers to a computer readable medium that may store datasemi permanently and not temporarily such as a register, cache andmemory. These various applications or programs may be provided in anontransitory computer readable medium such as a CD, DVD, hard disk,blue ray disk and memory card and ROM etc.

More specifically, when the verifying of the consumable unit based on atleast one of the detection list including the information on thenongenuine CRUM chip and the serial information list including theplurality of conversion serial information converted from thepredetermined plurality of different rules fails, a nontransitorycomputer readable medium where a program code for performing the stepsof limiting use of the consumable unit is stored may be used.

Processes, functions, methods, and/or software in apparatuses describedherein may be recorded, stored, or fixed in one or more non-transitorycomputer-readable storage media (computer readable recording medium)that includes program instructions (computer readable instructions) tobe implemented to cause one or more processing elements to execute orperform the program instructions. Examples of processing elementsinclude controllers, ASICs, CPUs, processors, and the like. The mediamay also include, alone or in combination with the program instructions,data files, data structures, and the like. The media and programinstructions may be those specially designed and constructed, or theymay be of the kind well-known and available to those having skill in thecomputer software arts. Examples of program instructions include machinecode, such as produced by a compiler, and files containing higher levelcode that may be executed by the computer using an interpreter. Inaddition, a non-transitory computer-readable storage medium may bedistributed among devices and computer-readable codes or programinstructions may be stored and executed in a decentralized manner byprocessing elements such as controllers, ASICs, CPUs, processors, andthe like.

Although a few embodiments have been shown and described, it would beappreciated by those skilled in the art that changes may be made tothese embodiments without departing from the principles and spirit ofthe disclosure, the scope of which is defined in the claims and theirequivalents.

What is claimed is:
 1. A Customer Replaceable Unit Monitoring (CRUM)chip comprising: a memory to store a detection list includinginformation on counterfeit CRUM chips, serial information, and aconversion serial information list including pieces of conversion serialinformation converted from the serial information according to aplurality of different predetermined rules; an interface configured toperform communication with a controller installed in an image formingdevice; and a central processing unit (CPU) configured to provide thedetection list and the conversion serial information list to the imageforming device, wherein the conversion serial information list furthercomprises a trigger bit to designate at least one piece of conversionserial information to be used in verifying among pieces of conversionserial information.
 2. The CRUM chip according to claim 1, wherein thedetection list comprises at least one of toner serial information, chipserial information, and serial number of the counterfeit CRUM chips,data recorded in a certain address inside a CRUM memory, and random dataused during authentication.
 3. An image forming device comprising: amain body; a consumable unit, which is detachable from the main body andattachable to the main body, and comprising a Customer Replaceable UnitMonitoring (CRUM) chip; a storage which stores a detection listincluding information about counterfeit CRUM chips and a conversionserial information list including pieces of conversion serialinformation each of which is converted from serial information stored inthe CRUM chip according to a plurality of different predetermined rules;and a controller configured to limit use of the consumable unit, whenverifying the consumable unit based on at least one of the detectionlist and the conversion serial information list fails, wherein the CRUMchip comprises: a storage which stores the serial information, thedetection list, and the conversion serial information; and a centralprocessing unit (CPU) configured to provide the detection list and theconversion serial information list to the controller, when theconsumable unit is installed in the main body, and wherein thecontroller stores the detection list and the conversion serialinformation list provided from the CPU to the storage, wherein theconversion serial information list further comprises a trigger bit fordesignating at least one piece of conversion serial information to beused in the verifying among the pieces of conversion serial information.4. The image forming device according to claim 3, wherein: thecontroller checks a version of the detection list stored in the CPU, andif the version is a latest version than a detection list prestored inthe storage, requests the CPU for a list transmission, and when thedetection list is provided from the CPU according to the request,updates the list stored in the storage.
 5. The image forming deviceaccording to claim 3, wherein: the controller authenticates the CRUMchip according to a predetermined authentication algorithm when theconsumable unit is installed in the main body, the controller checkswhether or not the CRUM chip is a CRUM chip registered in the detectionlist if the authentication succeeds, and performs a first verifying ofthe CRUM chip, and if the CRUM chip is a CRUM chip not registered in thedetection list, the controller downloads the conversion serialinformation from the CRUM chip, checks the trigger bit, selects at leastone piece of conversion serial information among pieces of theconversion serial information of the conversion serial information list,converts the serial information of the CRUM chip according to rulescorresponding to the selected conversion serial information, compares aconverted result value and the selected conversion serial information,and performs a second verifying of the CRUM chip.
 6. The image formingdevice according to claim 3, wherein: if the detection list version ofthe CRUM chip is a latest version than the detection list stored in thestorage, the controller downloads the detection list from the CRUM chipand updates the detection list stored in the storage and checks whetheror not serial information of the CRUM chip is registered in the updateddetection list and performs a first verifying of the CRUM chip, and ifthe CRUM chip is a CRUM chip not registered in the detection list,downloads the conversion serial information list from the CRUM chip,checks the trigger bit, selects at least one piece of conversion serialinformation among pieces of the conversion serial information of theconversion serial information list, converts the serial information ofthe CRUM chip according to rules corresponding to the selectedconversion serial information, compares a converted result value and theselected conversion serial information, and performs a second verifyingof the CRUM chip.
 7. The image forming device according to claim 3,further comprising: a communicator configured to perform communicationwith a server apparatus, wherein the controller transmits at least onepiece of the serial information, the detection list, and the conversionserial information list provided from the CRUM chip to the serverapparatus as a result of verifying the consumable unit.
 8. The imageforming device according to claim 3, wherein the detection listcomprises at least one of toner serial information, chip serialinformation, and serial number of the counterfeit CRUM chips, datarecorded in a certain address inside a CRUM memory, and random data usedduring authentication.
 9. A consumable unit verifying method of an imageforming device where a consumable unit including a Customer ReplaceableUnit Monitoring (CRUM) chip may be attached thereto and detachedtherefrom, the method comprising: verifying the consumable unit based onat least one of a detection list including information on counterfeitCRUM chips and a conversion serial information list including pieces ofconversion serial information each of which is converted from serialinformation stored in the CRUM chip according to a plurality ofdifferent predetermined rules; and limiting use of the consumable unit,when the verifying the consumable unit fails wherein the method furthercomprises: receiving the serial information, the detection list, and theconversion serial information list from the CRUM chip; and storing thedetection list and the conversion serial information list in a main bodyof the image forming device, wherein the conversion serial informationlist further comprises a trigger bit to designate at least one among theplurality of different rules.
 10. The method according to claim 9,further comprising: checking a version of the detection list stored inthe CPU, and if the version is a latest version than a detection listprestored in the main body of the image forming device, requesting theCPU for a list transmission; and when the detection list is providedfrom the CPU according to the request, updating the detection listprestored in the main body of the image forming device.
 11. The methodaccording to claim 9, further comprising: performing verifying the CRUMchip according to a predetermined authentication algorithm when theconsumable unit is installed in the main body, wherein the verifying theconsumable unit is performed after the authentication succeeds.
 12. Themethod according to claim 9, wherein the verifying the CRUM chipcomprises: if the detection list version of the CRUM chip is a latestversion than a detection list prestored in the main body of the imageforming device, downloading the detection list from the CRUM chip andupdating the prestored detection list; performing a first verifying ofthe CRUM chip by checking whether or not serial information of the CRUMchip is registered in the updated detection list; if the CRUM chip is aCRUM chip not registered in the updated detection list, downloading theconversion serial information list from the CRUM chip; selecting atleast one piece of conversion serial information among pieces of theconversion serial information of the conversion serial information listby checking the trigger bit; converting the serial information of theCRUM chip according to rules corresponding to the selected conversionserial information; and performing a second verifying the CRUM chip bycomparing a converted result value and the selected conversion serialinformation.
 13. The method according to claim 9, further comprisingtransmitting at least one of the serial information, the detection listand the conversion serial information list from the CRUM chip as aresult of verifying the consumable unit.
 14. A server apparatuscomprising: a server communicator configured to perform communicationwith a plurality of image forming devices; a database to storecounterfeit management information; and a server controller configuredto receive a verification result and update the counterfeit managementinformation when the verifying the consumable unit is performed in eachof the plurality of image forming devices, wherein the image formingdevice verifies a Customer Replaceable Unit Monitoring (CRUM) chip usingat least one a detection list including information on counterfeit CRUMchips and a conversion serial information list including conversionserial information converted from the serial information according to aplurality of different predetermined rules, wherein the conversionserial information list further comprises a trigger bit to designate atleast one piece of conversion serial information to be used in verifyingamong pieces of conversion serial information.
 15. At least onenon-transitory computer readable medium storing computer readableinstructions which when executed control at least one processing elementto implement the method of claim 9.