Search

CN-122001645-A - Consumable authentication chip and encryption authentication method

CN122001645ACN 122001645 ACN122001645 ACN 122001645ACN-122001645-A

Abstract

The invention discloses a consumable authentication chip and an encryption authentication method, which relate to the technical field of encryption authentication and comprise an information tracing unit, wherein the information tracing unit is used for storing static information and dynamic information of consumable materials in an encryption mode and a secret key and an authentication protocol, the static information comprises factory information, life cycle initial values, unique identification codes, material numbers, manufacturer information, production dates, backup identification codes and running water numbers, the dynamic information comprises charging times and health status, the anti-counterfeiting authentication unit is used for generating authentication information by adopting a hash function based on the stored information so as to enable equipment to conduct authenticity verification, a counter is arranged in a life management unit, the service life of the consumable materials is managed according to the charging times, the state change can be triggered when the service life reaches a preset threshold, and high-safety consumable identity authentication and full life cycle management are achieved by constructing a three-party authentication framework consisting of the consumable authentication chip, using equipment and a cloud server and combining a physically isolated secret key storage and a dynamically changing authentication mechanism.

Inventors

  • Request for anonymity

Assignees

  • 深圳市世渤科技有限公司

Dates

Publication Date
20260508
Application Date
20260130

Claims (9)

  1. 1. A consumable authentication chip disposed on a consumable for authentication and data management with a device using the consumable, comprising: The information tracing unit is used for storing static information and dynamic information of consumable materials in an encrypted form and a secret key and an authentication protocol, wherein the static information comprises factory information, a life cycle initial value, a unique identification code, a material number, manufacturer information, a production date, a backup mark code and a serial number; The anti-counterfeiting authentication unit is used for generating authentication information by adopting a hash function based on the stored information so as to be used for verifying the authenticity of the equipment; And the service life management unit is internally provided with a counter, is used for managing the service life of the consumable according to the charging times and can trigger state change when the service life reaches a preset threshold value.
  2. 2. The consumable authentication chip of claim 1, wherein the information trace back unit comprises a FLASH memory divided into three physically isolated regions: The first area is used for storing the encrypted static information; a second area for storing the dynamic information; and a third area for storing keys and authentication protocols.
  3. 3. The consumable authentication chip of claim 1, wherein the authentication information is generated by hash function calculation by using static information and dynamic information of the consumable as input.
  4. 4. The consumable authentication chip of claim 1, wherein the lifetime management unit specifically comprises: when the charging times recorded by the counter reach a first threshold value, a replacement reminding signal is sent to the equipment; when the charging times recorded by the counter reach a second threshold value, triggering an irreversible disabling instruction, so that the consumable cannot be reused.
  5. 5. An encryption authentication method based on the consumable authentication chip as claimed in any one of claims 1 to 4, wherein the chip, the using device and the cloud server form a three-party authentication architecture, and the encryption authentication method is characterized by comprising the following steps: S1, generating a random number challenge value by using equipment, and sending an authentication request to the consumable authentication chip; S2, an anti-counterfeiting authentication unit receives the random number challenge value, reads static information, dynamic information and a key of a physically isolated key storage area in the information tracing unit, generates a first authentication code through a password hash function based on the static information, the dynamic information and the key storage area, and sends the first authentication code and a chip unique identifier to the using equipment; The cloud server acquires corresponding verification information according to the unique identifier, generates a second authentication code by adopting the same algorithm as the chip, and compares the consistency of the first authentication code and the second authentication code; and S4, if the comparison is consistent, the authentication is passed, the cloud server authorizes the using equipment and triggers the consumable authentication chip to update a counter and a secret key, if the comparison is inconsistent, the authentication is failed, the cloud server returns a failure alarm, and the equipment immediately cuts off the power supply to the consumable authentication chip.
  6. 6. The encryption authentication method according to claim 5, wherein the step S2 specifically includes: the anti-fake authentication unit constructs an input character string The dynamic information is formed by splicing the current value of a counter in the static information and the dynamic information with the health state and the random number challenge value; Based on keys read from physically isolated key storage areas Calculating the first authentication code : ; Wherein, the As a cryptographic hash function, the number of iterations An integer derived from the current value of the counter by a preset rule; The first authentication code And sending the unique identifier of the chip to the using device.
  7. 7. The method for encrypting and authenticating according to claim 6, wherein said number of iterations Expressed as: ; Wherein, the For the current value of the counter.
  8. 8. The encryption authentication method according to claim 7, wherein S3 specifically comprises: And the cloud server inquires the corresponding static information copy, dynamic information copy and key copy according to the unique identifier, and generates a second authentication code by adopting the same algorithm as the S2.
  9. 9. The method for encrypting and authenticating according to claim 8, wherein when the consumable is started for the first time, the consumable authentication chip is subjected to key initialization, and the method comprises the following steps: Performing key output on the single state sequence by adopting an iteration sequence; Defining the internal state of data as Initial state From initial parameters Constructing; Proceeding with A second state iterative operation in which The next time is Is 1 to 1 ) The iterative process is as follows: to the current state And fixed input value As input by a mapping function Calculating to obtain new internal state Expressed as: ; By the above After the iteration, the final internal state of the data is obtained ; Key generation function In this final state Sum parameters As input, an initial key is generated The calculation formula is as follows: 。

Description

Consumable authentication chip and encryption authentication method Technical Field The invention relates to the technical field of encryption authentication, in particular to a consumable authentication chip and an encryption authentication method. Background Along with popularization of the internet of things technology and development of intelligent equipment, anti-counterfeiting and safety management of high-value consumables are very important. In the prior art, static coding or fixed keys are mostly adopted, authentication information is unchanged, and is very easy to copy or replay and attack, so that counterfeit consumables are flooded. Meanwhile, the schemes generally lack an effective life management mechanism, can not prevent scrapped consumables from being recycled and renovated, and bring risks to equipment safety and user rights. The improvement scheme in the prior art introduces bidirectional authentication or cloud verification, but cannot radically solve the security problem. For example, the authentication process relies heavily on the terminal device, with the overall system security crashing once the device is broken. In addition, most schemes are stiff in authentication logic, keys are fixed for a long time and are not tightly bound with consumable real-time states, so that safety is insufficient, and the harsh requirements of high-end industry and vehicle-mounted fields on consumable authentication are difficult to meet. Disclosure of Invention In order to solve the problems, the invention provides a consumable authentication chip and an encryption authentication method, which realize high-security consumable identity authentication and full life cycle management by constructing a three-party authentication architecture consisting of a consumable authentication chip, a using device and a cloud server and combining a physically isolated key storage and a dynamically changed authentication mechanism. In order to achieve the above object, the present invention provides a consumable authentication chip, which is disposed on a consumable and used for authentication and data management with a device using the consumable, and comprises: The information tracing unit is used for storing static information and dynamic information of consumable materials in an encrypted form and a secret key and an authentication protocol, wherein the static information comprises factory information, a life cycle initial value, a unique identification code, a material number, manufacturer information, a production date, a backup mark code and a serial number; The anti-counterfeiting authentication unit is used for generating authentication information by adopting a hash function based on the stored information so as to be used for verifying the authenticity of the equipment; And the service life management unit is internally provided with a counter, is used for managing the service life of the consumable according to the charging times and can trigger state change when the service life reaches a preset threshold value. Preferably, the information tracing unit comprises a FLASH memory, and the memory is divided into three physically isolated areas: The first area is used for storing the encrypted static information; a second area for storing the dynamic information; and a third area for storing keys and authentication protocols. Preferably, the anti-counterfeiting authentication unit uses static information and dynamic information of the consumable as input, and generates the authentication information through hash function calculation. Preferably, the lifetime management unit specifically includes: when the charging times recorded by the counter reach a first threshold value, a replacement reminding signal is sent to the equipment; when the charging times recorded by the counter reach a second threshold value, triggering an irreversible disabling instruction, so that the consumable cannot be reused. An encryption authentication method based on consumable authentication chip, the using device and the cloud server form a three-party authentication architecture, comprising the following steps: S1, generating a random number challenge value by using equipment, and sending an authentication request to the consumable authentication chip; S2, an anti-counterfeiting authentication unit receives the random number challenge value, reads static information, dynamic information and a key of a physically isolated key storage area in the information tracing unit, generates a first authentication code through a password hash function based on the static information, the dynamic information and the key storage area, and sends the first authentication code and a chip unique identifier to the using equipment; The cloud server acquires corresponding verification information according to the unique identifier, generates a second authentication code by adopting the same algorithm as the chip, and compares the consistency of the first