Movatterモバイル変換


[0]ホーム

URL:


CN119415049A - Printer authorization use method, device, equipment and storage medium - Google Patents

Printer authorization use method, device, equipment and storage medium
Download PDF

Info

Publication number
CN119415049A
CN119415049ACN202411294581.4ACN202411294581ACN119415049ACN 119415049 ACN119415049 ACN 119415049ACN 202411294581 ACN202411294581 ACN 202411294581ACN 119415049 ACN119415049 ACN 119415049A
Authority
CN
China
Prior art keywords
printer
matching
authorization code
verified
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411294581.4A
Other languages
Chinese (zh)
Inventor
樊杰
苏裔铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Precision Information Technology Co ltd
Original Assignee
Shenzhen Precision Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Precision Information Technology Co ltdfiledCriticalShenzhen Precision Information Technology Co ltd
Priority to CN202411294581.4ApriorityCriticalpatent/CN119415049A/en
Publication of CN119415049ApublicationCriticalpatent/CN119415049A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本申请涉及一种打印机授权使用方法、装置、设备及存储介质,所述方法包括:响应用户使用打印机的请求,获取请求中携带的待验证服务器授权码和待验证打印机授权码,将待验证服务器授权码进行解密后,与预先生成的授权账户的服务器授权码进行匹配得到第一匹配结果,将待验证打印机授权码进行解密后,与预先生成的授权账户的打印机授权码进行匹配得到第二匹配结果,若第一匹配结果及第二匹配结果均指示匹配成功,则激活并允许用户使用打印机。本申请可以避免授权过期后用户仍继续使用、授权重复安装使用或不同账号主体授权混用打印机的情况。

The present application relates to a method, apparatus, device and storage medium for authorized use of a printer, the method comprising: responding to a user's request to use a printer, obtaining a server authorization code to be verified and a printer authorization code to be verified carried in the request, decrypting the server authorization code to be verified, and matching it with a pre-generated server authorization code of an authorized account to obtain a first matching result, decrypting the printer authorization code to be verified, and matching it with a pre-generated printer authorization code of an authorized account to obtain a second matching result, if both the first matching result and the second matching result indicate a successful match, activating and allowing the user to use the printer. The present application can avoid situations where users continue to use the printer after the authorization expires, the authorization is repeatedly installed and used, or different account entities authorize mixed use of the printer.

Description

Printer authorized use method, device, equipment and storage medium
Technical Field
The present application relates to the field of printer control technologies, and in particular, to a method, an apparatus, a device, and a storage medium for authorizing a printer to use.
Background
The document management software, also called print management software or document output management software, is a tool for comprehensively managing the document work in offices. The method effectively improves the working efficiency, reduces the equipment loss and controls the text cost by centrally managing daily text tasks such as printing, copying, scanning and the like.
At present, a lessor of the printer device can grant corresponding service life or authority to a function in the lessor using the imprint management software of the printer according to actual service requirements, however, in actual application, the situation that after the imprint management software or the function authorization expires, the lessor user still continues to use, authorizes to repeatedly install and use or authorizes mixed use by using different account bodies may occur.
Therefore, how to avoid the situation that the user still continues to use, authorizes to repeatedly install and use or authorizes the mixed use printer by different account bodies after the authorization expires has become a technical problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the foregoing, the present application provides a method, apparatus, device and storage medium for authorizing a printer to use, which aims to solve the above technical problems.
In a first aspect, the present application provides a method of authorising use of a printer, the method comprising:
responding to a request of a user using a printer, and acquiring a server authorization code to be verified and a printer authorization code to be verified, which are carried in the request;
after decrypting the server authorization code to be verified, matching the server authorization code with a server authorization code of a pre-generated authorization account to obtain a first matching result;
After decrypting the printer authorization code to be verified, matching the printer authorization code with a printer authorization code of a pre-generated authorization account to obtain a second matching result;
and if the first matching result and the second matching result indicate that the matching is successful, activating and allowing the user to use the printer.
In a second aspect, the present application provides a printer authorised to use a device, the device comprising:
The acquisition module is used for responding to a request of using the printer by a user and acquiring a server authorization code to be verified and a printer authorization code to be verified carried in the request;
The first matching module is used for carrying out decryption on the server authorization code to be verified and then matching the server authorization code with a server authorization code of a pre-generated authorization account to obtain a first matching result;
The second matching module is used for carrying out decryption on the printer authorization code to be verified and then matching the decrypted printer authorization code with a printer authorization code of a pre-generated authorization account to obtain a second matching result;
And the activation module is used for activating and allowing the user to use the printer if the first matching result and the second matching result indicate that the matching is successful.
In a third aspect, the present application provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
A memory for storing a computer program;
And the processor is used for realizing the authorized use method of the printer according to any one of the embodiments of the first aspect when executing the program stored on the memory.
In a fourth aspect, a computer readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, implements a method for authorized use of a printer according to any one of the embodiments of the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
According to the method, the device and the system, the server authorization code to be verified and the printer authorization code to be verified carried in the request are obtained through responding to the request of the user for using the printer, after the server authorization code to be verified is decrypted, the server authorization code to be verified is matched with the server authorization code of the authorization account generated in advance to obtain a first matching result, after the printer authorization code to be verified is decrypted, the server authorization code to be verified is matched with the printer authorization code of the authorization account generated in advance to obtain a second matching result, if the first matching result and the second matching result indicate that the matching is successful, the user is activated and allowed to use the printer. Because the authorization of the watermark management software of the printer or a certain authorization function in the watermark management software may have a certain period and use time, when the user needs to use the watermark management software of the printer or use a certain authorization function in the watermark management software, the situation that the user still continues to use after the authorization expires, the user is authorized to install and use repeatedly or different account bodies authorize the mixed printer can be avoided by verifying the two authorization codes, namely the server authorization code to be verified and the printer authorization code to be verified.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flow chart of an embodiment of a method for authorizing printer use according to the present application;
FIG. 2 is a block diagram of an embodiment of a printer authorized using device according to the present application;
FIG. 3 is a schematic diagram of an embodiment of an electronic device of the present application;
the achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The following disclosure provides many different embodiments, or examples, for implementing different structures of the application. In order to simplify the present disclosure, components and arrangements of specific examples are described below. They are, of course, merely examples and are not intended to limit the application. Furthermore, the present application may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
The application provides a printer authorization using method. Referring to FIG. 1, a method flow diagram of an embodiment of a method for authorizing printer use according to the present application is shown. The method may be performed by an electronic device, which may be implemented in software and/or hardware. The authorized use method of the printer comprises the following steps:
step S10, responding to a request of using a printer by a user, and acquiring a server authorization code to be verified and a printer authorization code to be verified, which are carried in the request;
Step S20, after decrypting the server authorization code to be verified, matching the server authorization code with a server authorization code of a pre-generated authorization account to obtain a first matching result;
step S30, after decrypting the printer authorization code to be verified, matching the printer authorization code with a printer authorization code of a pre-generated authorization account to obtain a second matching result;
and S40, if the first matching result and the second matching result indicate that the matching is successful, activating and allowing the user to use the printer.
The printer has various functions such as high-speed printing, batch scanning, print job encryption and the like, and also has various software such as document management software, security printing software, scanning software and the like, and a user can configure corresponding service lives and authorities for the functions and the software, namely the functions can be used or the software can be used only by obtaining authorization. In the process of actually using the printer, the situation that the user continues to use, authorizes to repeatedly install and use or authorizes to mix with different account bodies after the authorization of the software or the function expires may occur, so that the user needs to verify the authorization situation when using the printer.
Taking the imprint management software of the printer or a certain authorization function in the imprint management software as an example, the scheme of the embodiment is described, the user can input the server authorization code to be verified and the printer authorization code to be verified through the interactive interface of the terminal, initiate a request for using the printer, respond to the request and acquire the server authorization code to be verified and the printer authorization code to be verified carried in the request, if the server authorization code to be verified passes verification, the server can be activated, if the printer authorization code to be verified passes verification, the printer can be activated, and after the server and the printer are activated, the user can use the imprint management software of the printer or use a certain authorization function in the imprint management software.
The server authorization code to be verified refers to the authorization code allocated to the user by the server after the user obtains the authorization of the fingerprint management software of the printer, and is generated through the hardware serial number of the server and the related information of the authorization account. The printer authorization code to be verified refers to the authorization code allocated to the user by the printer after the user obtains the authorization of the imprint management software of the printer, and the printer authorization code is generated through the hardware serial number, the network address and the related information of the authorized account of the printer.
After decrypting the server authorization code to be verified, the obtained decryption result comprises the server basic code to be verified and related information of the user, the decryption result is matched with the server authorization code of the authorization account which is generated in advance to obtain a matching result (marked as a first matching result), the server authorization code of the authorization account is generated by encrypting the server hardware basic code of the authorization account and the related information of the authorization account, if the first matching result indicates that the matching is successful, the server authorization code to be verified passes verification, and at the moment, the server is successfully activated. If the first matching result indicates that the matching fails, the server authorization code to be verified is not verified, and the server is not activated at the moment, namely the user is not allowed to use the imprint management software of the printer or a certain authorization function in the imprint management software.
After decrypting the printer authorization code to be verified, the obtained decryption result comprises the hardware serial number, the network address and the related information of the authorization account of the printer, the decryption result is matched with the printer authorization code of the authorization account which is generated in advance to obtain a matching result (recorded as a second matching result), the printer authorization code of the authorization account is generated by encrypting the hardware serial number of the printer, the network address of the printer and the related information of the authorization account, if the second matching result indicates that the matching is successful, the printer authorization code to be verified passes verification, and at the moment, the printer is successfully activated. If the second matching result indicates that the matching fails, the printer authorization code to be verified is not verified, and at the moment, the printer is not activated, namely the user is not allowed to use the imprint management software of the printer or a certain authorization function in the imprint management software.
If the first matching result and the second matching result indicate successful matching, the server and the printer are both activated successfully, at the moment, the user is allowed to use the imprint management software of the printer or a certain authorization function in the imprint management software, and if the first matching result and/or the second matching result indicate that verification is not passed, the server and/or the printer are activated unsuccessfully, at the moment, the user is refused to use the imprint management software of the printer or a certain authorization function in the imprint management software.
Because the authorization may have a certain period and use time, when the user needs to use the imprint management software of the printer or use a certain authorization function in the imprint management software, the situation that the user still continues to use, the user is authorized to repeatedly install and use or different account main bodies are authorized to mix after the authorization is expired can be avoided by verifying the server authorization code to be verified and the printer authorization code to be verified.
In one embodiment, the generation of the server authorization code for authorizing an account includes:
reading a plurality of hardware serial numbers of a server;
After encrypting each hardware serial number of the server, splicing the encryption results to obtain a server hardware basic code of the authorized account;
reading related information of the authorized account;
Combining the server hardware basic code of the authorized account with the related information of the authorized account to generate a first character string to be encrypted;
and encrypting the first character string to be encrypted to obtain the server authorization code of the authorization account.
And reading serial numbers such as a main board serial number, a CPU serial number and a C-disk hard disk serial number of the server, respectively encrypting each hardware serial number of the server by utilizing an MD5 algorithm to obtain an encryption result of each hardware serial number, splicing the encryption results, and converting the encryption result into a full-capital character string serving as a server hardware basic code of an authorized account. And reading related information of the authorized account, wherein the related information of the authorized account comprises at least one of printer authorized service life, main account information, an authorized version number and value added service item information. And combining the server hardware basic code of the authorized account and the related information of the authorized account to generate a standard JSON character string (marked as a first character string to be encrypted), and encrypting the first character string to be encrypted by using an AES algorithm to obtain the server authorization code of the authorized account.
Further, the step of "after decrypting the server authorization code to be verified" matches the server authorization code of the authorization account generated in advance to obtain a first matching result "specifically includes:
decrypting the server authorization code to be verified to obtain a decrypted server basic code to be verified and related information of the user;
Comparing the server basic code to be verified with the server hardware basic code of the authorized account to obtain a first comparison result;
Comparing the related information of the user with the related information of the authorized account to obtain a second comparison result;
And if the first comparison result and the second comparison result both indicate that the comparison is consistent, the first matching result indicates that the matching is successful.
And decrypting the server authorization code to be verified by using an AES algorithm to obtain the decrypted server basic code to be verified and related information (including printer authorization service life, main account information, authorization version number and value added service item information) of the user, wherein a decryption result is a standard JSON character string. And comparing the decrypted server basic code to be verified with the server hardware basic code of the authorized account to obtain a comparison result (marked as a first comparison result), wherein the server hardware basic code of the authorized account can be obtained by splicing a plurality of encrypted hardware serial numbers of the server again. And comparing the related information of the user with the related information of the authorized account to obtain a comparison result (marked as a second comparison result), and if the first comparison result and the second comparison result indicate that the comparison is consistent, the first comparison result indicates that the matching is successful, and the related information of the authorization is written after the matching is successful, so that the server is successfully activated. If the two comparison results are inconsistent, the first matching result indicates that the matching is failed, for example, if the related information of the user is inconsistent with the related information of the authorized account (for example, the authorized service life is inconsistent, the main account information is inconsistent, etc.), the server cannot be activated at this time, so that the situation that the user still continues to use after the authorization expires, the user is authorized to repeatedly install and use or the different account main authorities authorize the mixed printer can be avoided.
In one embodiment, the process of generating the printer authorization code for the authorization account includes:
Reading a hardware serial number and a network address of the printer;
reading related information of the authorized account;
combining the hardware serial number of the printer, the network address and the related information of the authorized account based on a preset combination rule to obtain a second character string to be encrypted;
And encrypting the second character string to be encrypted to obtain the printer authorization code of the authorization account.
Obtaining information such as a main board serial number, a brand model number, a MAC address, an IP address and the like of a printer to generate a marked JSON character string, reading related information (including printer authorization service life, main account information, authorization version number and value added service item information) of an authorization account, and combining and splicing the information into a character string to be encrypted (recorded as a second character string to be encrypted) according to the following rules:
[ motherboard Serial number @ = @ brand model @ = @ MAC address @ = @ IP address @ = @ authorized lifetime @ = @ body account information ]. It should be noted that, the preset combination rule may also be to splice by using other characters, and the splicing order may also be exchanged, where the spliced characters and the sequence are not specifically limited. And encrypting the second character string to be encrypted by using an AES algorithm to obtain the printer authorization code of the authorized account.
Further, the step of "after decrypting the printer authorization code to be verified, matching the printer authorization code of the authorization account generated in advance to obtain a second matching result" specifically includes:
Decrypting the printer authorization code to be verified to obtain a decrypted hardware serial number to be verified, a network address to be verified and related information of the user;
matching the hardware serial number to be verified with the hardware serial number of the printer;
Matching the network address to be verified with the network address of the printer;
Matching the related information of the user with the related information of the authorized account;
and if the matching is successful, the second matching result indicates that the matching is successful.
Decrypting the printer authorization code to be verified by using an AES algorithm to obtain a decrypted hardware serial number to be verified, a network address to be verified and related information of a user, wherein the decryption result is a plaintext rule character string, field information is intercepted through "@ = @" to obtain the hardware serial number to be verified, the network address to be verified and related information of the user, and matching results obtained by respectively matching the main board serial number, the brand model, the MAC address, the IP address, the authorization service life of the user, the main body account information of the user and corresponding information in the printer authorization code of an authorized account are recorded as second matching results, and if the matching is successful, the second matching results indicate that the matching is successful.
If the matching of the hardware serial number to be verified and the hardware serial number of the printer fails, or the matching of the network address to be verified and the network address of the printer fails, or the matching of the related information of the user and the related information of the authorized account fails, the second matching result indicates that the matching fails, for example, if the matching of the serial number of the main board of the printer fails, or the matching of the IP address fails, or the matching of the authorized service life fails, the printer cannot be activated at this time. Therefore, the situation that the user still continues to use after the authorization is expired, the user is authorized to repeatedly install and use or the different account bodies authorize the mixed printer can be avoided.
Referring to FIG. 2, a functional block diagram of a printer authorized for use device 100 according to the present application is shown.
The printer authorized use device 100 of the present application may be installed in an electronic apparatus. Depending on the functions implemented, the printer authorized use device 100 may include an acquisition module 110, a first matching module 120, a second matching module 130, and an activation module 140. The module of the application, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
The obtaining module 110 is configured to respond to a request of a user for using a printer, and obtain a server authorization code to be verified and a printer authorization code to be verified, which are carried in the request;
the first matching module 120 is configured to decrypt the server authorization code to be verified, and then match the decrypted server authorization code with a server authorization code of a pre-generated authorization account to obtain a first matching result;
the second matching module 130 is configured to decrypt the printer authorization code to be verified, and then match the decrypted printer authorization code with a printer authorization code of a pre-generated authorization account to obtain a second matching result;
And the activation module 140 is used for activating and allowing the user to use the printer if the first matching result and the second matching result indicate that the matching is successful.
In one embodiment, the process of generating the server authorization code of the authorization account includes:
reading a plurality of hardware serial numbers of a server;
After encrypting each hardware serial number of the server, splicing the encryption results to obtain a server hardware basic code of the authorized account;
reading related information of the authorized account;
Combining the server hardware basic code of the authorized account with the related information of the authorized account to generate a first character string to be encrypted;
and encrypting the first character string to be encrypted to obtain the server authorization code of the authorization account.
In one embodiment, the process of generating the printer authorization code for the authorization account includes:
Reading a hardware serial number and a network address of the printer;
reading related information of the authorized account;
combining the hardware serial number of the printer, the network address and the related information of the authorized account based on a preset combination rule to obtain a second character string to be encrypted;
And encrypting the second character string to be encrypted to obtain the printer authorization code of the authorization account.
In one embodiment, after decrypting the server authorization code to be verified, matching the server authorization code with a server authorization code of a pre-generated authorization account to obtain a first matching result, including:
decrypting the server authorization code to be verified to obtain a decrypted server basic code to be verified and related information of the user;
Comparing the server basic code to be verified with the server hardware basic code of the authorized account to obtain a first comparison result;
Comparing the related information of the user with the related information of the authorized account to obtain a second comparison result;
And if the first comparison result and the second comparison result both indicate that the comparison is consistent, the first matching result indicates that the matching is successful.
In one embodiment, after decrypting the to-be-verified printer authorization code, matching the to-be-verified printer authorization code with a pre-generated printer authorization code of the authorized account to obtain a second matching result, including:
Decrypting the printer authorization code to be verified to obtain a decrypted hardware serial number to be verified, a network address to be verified and related information of the user;
matching the hardware serial number to be verified with the hardware serial number of the printer;
Matching the network address to be verified with the network address of the printer;
Matching the related information of the user with the related information of the authorized account;
and if the matching is successful, the second matching result indicates that the matching is successful.
In one embodiment, the related information of the authorized account comprises at least one of printer authorized lifetime, main account information, authorized version number and value added service item information.
In one embodiment, the activation module 140 is further configured to:
And if the first matching result and/or the second matching result indicate that the verification is not passed, rejecting the user to use the printer.
Referring to fig. 3, a schematic diagram of a preferred embodiment of the electronic device of the present application is shown.
The electronic device comprises a processor 111, a communication interface 112, a memory 113 and a communication bus 114, wherein the processor 111, the communication interface 112 and the memory 113 are communicated with each other through the communication bus 114;
A memory 113 for storing a computer program, for example, a printer authorized use program;
processor 111 may be, among other things, a central processing unit (Central Processing Unit, CPU), a controller, a microcontroller, a microprocessor, or other data processing chip in some embodiments. The processor 111 is typically used to control the overall operation of the electronic device, such as performing data interaction or communication related control and processing, etc. In this embodiment, the processor 111 is configured to execute a program code or process data stored in the memory 113, for example, a program code for authorizing a printer to use a program.
The communication interface 112 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and the communication interface 112 may also be used to establish communication connections between the electronic device and other electronic devices.
The memory 113 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 113 may be an internal storage unit of the electronic device, such as a hard disk or a memory of the electronic device. In other embodiments, the memory 113 may also be an external storage device of the electronic device, such as a plug-in hard disk equipped with the electronic device, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD), or the like. Of course, the memory 113 may also include both an internal memory unit and an external memory device of the electronic device. In this embodiment, the memory 11 is typically used to store an operating system installed on the electronic device and various types of computer programs, such as program codes of programs authorized for use by the printer. In addition, the memory 113 may also be used to temporarily store various types of data that have been output or are to be output.
Fig. 3 shows only an electronic device having components 111-114, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead.
In one embodiment of the present application, the processor 111 is configured to implement the method for authorizing use of a printer provided in any one of the foregoing method embodiments when executing a program stored in the memory 113, where the method includes:
responding to a request of a user using a printer, and acquiring a server authorization code to be verified and a printer authorization code to be verified, which are carried in the request;
after decrypting the server authorization code to be verified, matching the server authorization code with a server authorization code of a pre-generated authorization account to obtain a first matching result;
After decrypting the printer authorization code to be verified, matching the printer authorization code with a printer authorization code of a pre-generated authorization account to obtain a second matching result;
and if the first matching result and the second matching result indicate that the matching is successful, activating and allowing the user to use the printer.
For a detailed description of the above steps, please refer to the above description of fig. 1 for a flowchart of an embodiment of a method for authorizing printer use.
Furthermore, the embodiment of the application also provides a computer readable storage medium, which can be nonvolatile or volatile. The computer readable storage medium includes a storage data area and a storage program area, the storage program area stores a printer authorized use program, and the printer authorized use program when executed by the processor realizes the following operations:
responding to a request of a user using a printer, and acquiring a server authorization code to be verified and a printer authorization code to be verified, which are carried in the request;
after decrypting the server authorization code to be verified, matching the server authorization code with a server authorization code of a pre-generated authorization account to obtain a first matching result;
After decrypting the printer authorization code to be verified, matching the printer authorization code with a printer authorization code of a pre-generated authorization account to obtain a second matching result;
and if the first matching result and the second matching result indicate that the matching is successful, activating and allowing the user to use the printer.
The embodiment of the computer readable storage medium of the present application is substantially the same as the embodiment of the authorized use method of the printer, and will not be described herein.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus a general purpose hardware platform, or may be implemented by hardware. Based on such understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the related art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the method described in the respective embodiments or some parts of the embodiments.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present application.
It is to be understood that the terminology used herein is for the purpose of describing particular example embodiments only, and is not intended to be limiting. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. The terms "comprises," "comprising," "includes," "including," and "having" are inclusive and therefore specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof. The method steps, processes, and operations described herein are not to be construed as necessarily requiring their performance in the particular order described or illustrated, unless an order of performance is explicitly stated. It should also be appreciated that additional or alternative steps may be used.
The foregoing is only a specific embodiment of the application to enable those skilled in the art to understand or practice the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

CN202411294581.4A2024-09-142024-09-14 Printer authorization use method, device, equipment and storage mediumPendingCN119415049A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202411294581.4ACN119415049A (en)2024-09-142024-09-14 Printer authorization use method, device, equipment and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202411294581.4ACN119415049A (en)2024-09-142024-09-14 Printer authorization use method, device, equipment and storage medium

Publications (1)

Publication NumberPublication Date
CN119415049Atrue CN119415049A (en)2025-02-11

Family

ID=94462536

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202411294581.4APendingCN119415049A (en)2024-09-142024-09-14 Printer authorization use method, device, equipment and storage medium

Country Status (1)

CountryLink
CN (1)CN119415049A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1360690A (en)*1999-05-252002-07-24西尔弗布鲁克研究股份有限公司Network terminal authorization protocol
CN106126134A (en)*2016-06-222016-11-16宜春小马快印科技有限公司Intelligent printing method and system
CN109508153A (en)*2017-09-142019-03-22北京立思辰计算机技术有限公司A kind of data transmission method of printer
CN110275682A (en)*2018-03-152019-09-24阿里巴巴集团控股有限公司Cloud Method of printing, apparatus and system
CN113535102A (en)*2021-09-162021-10-22飞天诚信科技股份有限公司Intelligent Internet of things platform system, working method thereof and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1360690A (en)*1999-05-252002-07-24西尔弗布鲁克研究股份有限公司Network terminal authorization protocol
CN106126134A (en)*2016-06-222016-11-16宜春小马快印科技有限公司Intelligent printing method and system
CN109508153A (en)*2017-09-142019-03-22北京立思辰计算机技术有限公司A kind of data transmission method of printer
CN110275682A (en)*2018-03-152019-09-24阿里巴巴集团控股有限公司Cloud Method of printing, apparatus and system
CN113535102A (en)*2021-09-162021-10-22飞天诚信科技股份有限公司Intelligent Internet of things platform system, working method thereof and computer readable storage medium

Similar Documents

PublicationPublication DateTitle
CN112953707A (en)Key encryption method, decryption method, data encryption method and decryption method
US8086856B2 (en)Disabling on/off capacity on demand
US9256210B2 (en)Safe method for card issuing, card issuing device and system
CN1271448A (en) Portable electronic device for safety communication system and method for parameter initialization
CN115952552B (en)Remote data destruction method, system and equipment
CN114329541B (en) Encryption method, device, equipment and storage medium based on quantum key
CN110096849A (en)A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
US20050175182A1 (en)Encryption key device, encryption device and decryption device
CN112633884B (en)Local private key recovery method and device for transaction main body identity certificate
US7646874B2 (en)Establishing mutual authentication and secure channels in devices without previous credentials
JP5079343B2 (en) Device introduction method to device family by paper receipt
TW201604804A (en)System for verifying data displayed dynamically by mobile and method thereof
CN103592927A (en)Method for binding product server and service function through license
CN116016168B (en)Software function activation method, device, equipment and storage medium
CN108092764B (en)Password management method and equipment and device with storage function
JP2001092718A (en) Security management system, storage medium access method, data distribution device, and portable terminal device
CN104573475A (en)Method and system for authenticating transcoding service program
CN113596052B (en)Data transmission method and system
CN114154443A (en) Chip authorization and verification method, device and electronic device
JP2007034493A (en)Printing system and printing control method
CN119415049A (en) Printer authorization use method, device, equipment and storage medium
CN103336918A (en)Electronic hard disk system authorization method and device
US20060230271A1 (en)Process and method to distribute software product keys electronically to manufacturing entities
US20240004559A1 (en)Restore to factory settings of a mobile data storage device
EP4229825B1 (en)Secure selective rules driven token invalidation

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp