STORAGE DEVICE INCLUDING UPDATE RESTRICTION AREA, REPLACEABLE UNIT INCLUDING STORAGE DEVICE, AND PROCESSING APPARATUS FOR UPDATING DATA STORED IN STORAGE DEVICE
20240169064 ยท 2024-05-23
Inventors
Cpc classification
H04N1/4433
ELECTRICITY
G06F21/64
PHYSICS
H04L9/0894
ELECTRICITY
H04N1/4413
ELECTRICITY
G06F21/57
PHYSICS
H04N1/2307
ELECTRICITY
International classification
G06F21/57
PHYSICS
Abstract
A storage device includes: a control unit configured to determine, when a first command to update first data stored at a first address in a first area of a storage unit to second data is received from an external apparatus, whether or not an update from the first data to the second data is within an update restricted range. In a case where the update to the second data is not within the update restricted range, the control unit is configured to verify a signature received from the external apparatus together with the first command. In a case where a verification is success, the control unit is configured to store the second data at the first address. In a case where a verification is failure, the control unit is configured not to store the second data at the first address.
Claims
1. A storage device comprising: a storage unit; and a control unit configured to determine, when a first command to update first data stored at a first address in a first area of the storage unit to second data is received from an external apparatus, whether or not an update from the first data to the second data is within an update restricted range set for the first area, and store the second data at the first address in a case where the update from the first data to the second data is within the update restricted range set for the first area, wherein, in a case where the update from the first data to the second data is not within the update restricted range set for the first area, the control unit is configured to verify a signature received from the external apparatus together with the first command, and, in a case where a verification result of the signature is verification success, the control unit is configured to store the second data at the first address and, in a case where a verification result of the signature is verification failure, the control unit is configured not to store the second data at the first address.
2. The storage device according to claim 1, wherein in a case where the update from the first data to the second data is not within the update restricted range set for the first area and the signature has not been received from the external apparatus together with the first command, the control unit is configured not to store the second data at the first address.
3. The storage device according to claim 1, wherein the control unit stores the second data.
4. The storage device according to claim 1, wherein the second data is included in the first command.
5. The storage device according to claim 1, further comprising: a verifying unit including a signature verification key, and configured to determine, when the signature and a message is received from the control unit, whether or not the signature is generated from the message using the signature verification key, and notify the control unit of the verification success when determining that the signature is generated from the message, and notify the control unit of the verification failure when determining that the signature is not generated from the message, wherein the control unit is configured to verify the signature by receiving the message from the external apparatus together with the first command and by transmitting the message received from the external apparatus together with the first command and the signature to the verifying unit.
6. The storage device according to claim 5, wherein in a case where the message does not include predetermined data stored at a predetermined address of the storage unit, the control unit is configured not to verify the signature and not to store the second data at the first address.
7. The storage device according to claim 5, wherein in a case where the message does not include a random number transmitted to the external apparatus by the control unit before the first command is received from the external apparatus or a value indicating a number of updates of data stored at the first address, the control unit is configured not to verify the signature and not to store the second data at the first address.
8. The storage device according to claim 1, further comprising: a verifying unit including a signature verification key, and configured to determine, when the signature and a message is received from the control unit, whether or not the signature is generated from the message using the signature verification key, and notify the control unit of the verification success when determining that the signature is generated from the message, and notify the control unit of the verification failure when determining that the signature is not generated from the message, wherein the control unit is configured to verify the signature by generating the message based on predetermined data stored at a predetermined address of the storage unit and by transmitting the message generated based on the predetermined data and the signature to the verifying unit.
9. The storage device according to claim 8, wherein the predetermined data includes specific information of the storage device or a unit using the storage device.
10. The storage device according to claim 8, wherein the control unit is configured to generate the message based on the predetermined data and the second data.
11. The storage device according to claim 8, wherein the control unit is configured to generate the message based on the predetermined data and a random number transmitted to the external apparatus before the first command is received from the external apparatus.
12. The storage device according to claim 11, wherein in a case where the update from the first data to the second data is not within the update restricted range set for the first area and the random number has not been transmitted to the external apparatus before the first command is received from the external apparatus, even if the signature is received together with the first command from the external apparatus, the control unit is configured not to verify the signature and not to store the second data at the first address.
13. The storage device according to claim 11, wherein the control unit is configured to manage a maximum number of data updates outside of the update restricted range set for the first area, and in a case where the update from the first data to the second data is not within the update restricted range set for the first area and a number of updates of the first address has reached the maximum number, even if the signature is received together with the first command from the external apparatus, the control unit is configured not to verify the signature and not to store the second data at the first address.
14. The storage device according to claim 1, wherein in a case where the update from the first data to the second data is not within the update restricted range set for the first area and a verification result of the signature is the verification success, the control unit is configured to store the second data at the first address after storing the first data at a backup address determined from the first address.
15. The storage device according to claim 1, wherein the first area includes one or more areas from among an area provided with the update restriction of only allowing an update to increase a data value, an area with the update restriction of only allowing an update to decrease a data value, an area provided with the update restriction of only allowing a data value to be updated once, and an area provided with the update restriction of not allowing a data value to be updated.
16. The storage device according to claim 15, wherein the control unit is configured to determine, when a second command to update third data stored at a second address in a second area of the storage unit different from the first area to fourth data is received from the external apparatus, whether or not an update from the third data to the fourth data is within an update restricted range set for the second area, and store the fourth data at the second address in a case where the update from the third data to the fourth data is within the update restricted range set for the second area.
17. The storage device according to claim 16, wherein the second area includes one or more areas from among an area provided with the update restriction of only allowing an update to increase a data value, an area with the update restriction of only allowing an update to decrease a data value, an area provided with the update restriction of only allowing a data value to be updated once, and an area provided with the update restriction of not allowing a data value to be updated.
18. The storage device according to claim 15, wherein the control unit is configured to store, when a third command to update fifth data stored at a third address in a third area, to which an update restriction is not set, different from the first area of the storage unit to sixth data is received from the external apparatus, the sixth data at the third address.
19. A replaceable unit configured to be attachable to and detachable from a main body of an image forming apparatus, comprising: a member used in image formation by the image forming apparatus; and a storage device, wherein the storage device includes a storage unit, and a control unit configured to determine, when a first command to update first data stored at a first address in a first area of the storage unit to second data is received from the main body, whether or not an update from the first data to the second data is within an update restricted range set for the first area, and store the second data at the first address in a case where the update from the first data to the second data is within the update restricted range set for the first area, and wherein in a case where the update from the first data to the second data is not within the update restricted range set for the first area, the control unit is configured to verify a signature received from the main body together with the first command, and, in a case where a verification result of the signature is verification success, the control unit is configured to store the second data at the first address and, in a case where a verification result of the signature is verification failure, the control unit is configured not to store the second data at the first address.
20. The replaceable unit according to claim 19, wherein the main body of the image forming apparatus is configured to be unable to generate the signature.
21. A processing apparatus for updating data stored in a storage device provided in a replaceable unit of an apparatus, comprising: a generation unit configured to generate a message in a case of updating first data stored at a first address in a first area, to which an update restriction is set, in the storage device to second data; an obtaining unit configured to obtain a signature generated based on a signature generation key corresponding to a signature verification key included in the storage device and the message; and a transmitting unit configured to transmit the signature to the storage device together with a command to store the second data at the first address.
22. The processing apparatus according to claim 21, wherein the generation unit is configured to obtain predetermined data stored at a predetermined address of the storage device from the storage device and generate the message based on the predetermined data.
23. The processing apparatus according to claim 22, wherein the generation unit is configured to generate the message further based on the second data.
24. The processing apparatus according to claim 22, wherein the generation unit is configured to obtain a random number from the storage device and generate the message further based on the random number.
25. The processing apparatus according to claim 21, wherein the obtaining unit is configured to transmit the message to a server apparatus via a network and obtain the signature from the server apparatus.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
DESCRIPTION OF THE EMBODIMENTS
[0018] Hereinafter, embodiments will be described in detail with reference to the attached drawings. Note, the following embodiments are not intended to limit the scope of the claimed invention. Multiple features are described in the embodiments, but limitation is not made to an invention that requires all such features, and multiple such features may be combined as appropriate.
[0019] Furthermore, in the attached drawings, the same reference numerals are given to the same or similar configurations, and redundant description thereof is omitted.
First Embodiment
[0020]
[0021] A cassette 11 houses a sheet P. When image forming is performed, the sheet P housed in the cassette 11 is conveyed along a conveyance path to a position opposing the photosensitive body 1. A transfer roller 9 outputs a transfer voltage to transfer the image of the photosensitive body 1 onto the sheet P. A cleaning unit 7 removes and collects the toner remaining on the photosensitive body 1 not transferred to the sheet P. A fixing device 8 includes a heating roller 81 and a pressure roller 82 and applies heat and pressure to the sheet P to fix the image to the sheet P. After the image is fixed, the sheet P is discharged to the outside of the image forming apparatus 100. An engine control unit 102 performs the control of the members illustrated in
[0022] A process cartridge 10 (hereinafter, referred to simply as cartridge 10) includes the photosensitive body 1, the charging roller 2, the toner container 4, the developing roller 5, and the cleaning unit 7. Note that the toner container 4 houses toner. The cartridge 10 is a replaceable unit of the image forming apparatus 100 that is configured to be attachable to and detachable from the main body of the image forming apparatus 100. The cartridge 10 further includes a storage device M. The storage device M stores information of the cartridge 10 itself and information relating to the members, that is, the photosensitive body 1, the toner, and the like, housed in the cartridge 10. The information stored in the storage device M will be described below.
[0023]
[0024] A CPU 104 of the engine control unit 102, under the control of the controller 101, controls the members illustrated in
[0025] A storage unit M2 of the storage device M is an electrically rewritable non-volatile memory such as an electrically erasable programmable read-only memory (EEPROM), for example. The access control unit M1, for example, may include a non-volatile memory storing a program and a processor for executing the program. The non-volatile memory of the access control unit M1 may also store control data used by the access control unit M1 in the processing executed by the access control unit M1.
[0026] The access control unit M1 writes data (information) to the storage unit M2 on the basis of a command from the communication unit 109 and reads out data from the storage unit M2. For example, in the case of reading out data stored at a certain address of the storage unit M2, the communication unit 109 transmits a read command to the access control unit M1. The read command includes the read out address (target address) of the data. When a read command is received, the access control unit M1 reads out the data stored at the target address of the storage unit M2 and notifies the communication unit 109. Also, in the case of writing data to a certain address of the storage unit M2 or updating data stored at a certain address of the storage unit M2, the communication unit 109 transmits a write command to the access control unit M1. The write command includes an address (target address) for writing or updating data and write data, that is, updated data. When a write command is received, the access control unit M1 stores the updated data at the target address of the storage unit M2. In this manner, the communication unit 109 functions as an access unit that, under the control of the CPU 104, accesses the storage device M to read out or update the information stored in the storage device M.
[0027] A verifying unit M3 of the storage device M verifies the digital signature (hereinafter, simply referred to as the signature). The verifying unit M3 stores a signature verification key. When the verifying unit M3 receives a message and a signature generated on the basis of the message from the access control unit M1, the verifying unit M3 uses the signature verification key to verify whether or not the signature is generated from the message. When the verifying unit M3 determines that the signature is generated from the message, the verifying unit M3 notifies the access control unit M1 of the verification success. On the other hand, when the verifying unit M3 determines that the signature is not generated from the message, the verifying unit M3 notifies the access control unit M1 of the verification failure. The signature, for example, can be generated using an elliptic curve digital signature algorithm (ECDSA).
[0028] Note that the signature is generated using a signature generation key corresponding to the signature verification key stored in the verifying unit M3. In the present embodiment, the signature generation key is not stored in the image forming apparatus 100. In other words, the image forming apparatus 100 is configured to be unable to generate a signature.
[0029]
[0030] Note that the data update restriction of each area is implemented by the access control unit M1. In other words, the processor of the access control unit M1 executes a program in the non-volatile memory to make data update for the RO area prohibited. Also, the access control unit M1 is configured to allow data to be updated once for the WO area and, once the data has been updated once, to prohibit data update thereafter. Furthermore, the access control unit M1 is configured to prohibit data update in a case where there is an instruction from the communication unit 109 to update the data of the OW area and a post-update data value would contravene the data update restriction of the OW area.
[0031] In the present embodiment, as illustrated in
[0032] Also, usage information relating to the usage state of the members of the cartridge 10 and whether a value increases or decreases according to usage of the cartridge 10 is stored in the OW area. In
[0033] New product information is stored in the WO area. The initial value of the new product information is 0, and the information can only be rewritten to a value other than 0 once. In the present embodiment, the new product information being 0 means that the cartridge 10 is a new product, and the new product information being a value other than 0 means that the cartridge 10 has at least one time been installed into the main body 103 of an image forming apparatus. Accordingly, the CPU 104 of the image forming apparatus 100 is configured to update the data value of the new product information to 1 in a case where the data value of the new product information of the storage device M of the installed cartridge 10 is 0. Note that information that can be updated to any value is stored in the RW area, but this description is omitted as it is not necessary for describing the present embodiment. When the cartridge 10 is manufactured, the respective initial values listed in
[0034] For example, when the cartridge 10 is to be reused, a reuse service provider performs on the cartridge 10 the processes needed for reuse including refilling the toner. The reuse service provider may be the manufacturer of the cartridge 10 or may not be the manufacturer. To use the cartridge 10 after the reuse process, in the image forming apparatus 100, the toner remaining amount T listed in
[0035]
[0036]
[0037] The server 210 stores the signature generation key corresponding to the signature verification key stored in the storage device M of the cartridge 10. In the present embodiment, the signature verification key of the storage device Mis different for each individual cartridge 10. Thus, the server 210 stores the signature generation key associated with the serial number of the cartridge 10. In the present embodiment, a message, from which a signature is generated, is a combination of the updated data and the manufacture date and serial number stored by the storage unit M2. The updated data is data indicating the value to be stored in the storage unit M2 after reuse processing has been performed. The updated data, for example, is input into the processing apparatus R via a non-illustrated user interface of the processing apparatus R by the reuse service provider. Note that, for example, in a case where the updated data is a predetermined value, such as when the post-reuse-process toner remaining amount T is always set to 100%, which is the same as the initial value, input of the value of the updated data is not necessary.
[0038] To cause the server 210 to generate the signature of the message, the CPU 204 first transmits a reuse preparation command to the access control unit M1. When the reuse preparation command is received, the access control unit M1 reads out the manufacture data and the serial number stored in the storage unit M2 and notifies the CPU 204. Note that the reuse preparation command may be a read command for reading out the data stored in the storage unit M2. The CPU 204 transmits a signature generation request signal including the notified manufacture date and serial number and the updated data to the server 210. When a signature generation unit 220 of the server 210 receives the signature generation request signal from the processing apparatus R, the signature generation unit 220 generates a signature based on the manufacture date, serial number, and updated data included in the signature generation request signal and transmits this to the processing apparatus R. In the present embodiment, the signature generation unit 220 determines the signature generation key to use in generating a signature from a plurality of stored signature generation keys based on the serial number. Note that the server 210 may be configured to generate a signature when a signature generation request signal is received from a predetermined processing apparatus R and not generate a signature when a signature generation request signal is received from other processing apparatuses R.
[0039] When the CPU 204 receives the signature from the server 210, the CPU 204 transmits a write command and the signature to the access control unit M1. The write command includes the target address and the updated data. The target address is the address to be updated of the storage unit M2. When the access control unit M1 receives a write command that contravenes the update restriction, the access control unit M1 notifies the verifying unit M3 of the write command, the received signature, and the message on which the signature is based and causes the verifying unit M3 to verify the signature. Note that the access control unit M1 generates a message on the basis of the manufacture date and serial number stored in the storage unit M2 and the updated data included in the write command. The access control unit M1 stores the updated data at the target address in accordance with the write command when a verification successful notification is received from the verifying unit M3. On the other hand, when a verification failure notification is received from the verifying unit M3, the access control unit M1 notifies the CPU 204 without storing the updated data at the target address.
[0040]
[0041] On the other hand, in a case where the updated data is outside the update restricted range, in step S12, the access control unit M1 determines whether the signature has been received together with the write command. In a case where there is no signature, in step S16, the access control unit M1 notifies the CPU 204 of an error and ends the processing of
[0042] In a case where a write command of outside the update restricted range for an update restricted area has been received and a valid signature is received together with the write command, the access control unit M1 removes the update restriction and updates the data according to the write command. With this configuration, after the reuse process, data outside the update restricted range can be updated even in an area of the storage unit M2 set with an update restriction. This allows post-reuse-process replaceable units to be used in the image forming apparatus 100. Also, since the signature generation key for generating a signature is not stored in the image forming apparatus 100, data outside of the update restricted range being updated in the image forming apparatus 100 can be prevented. In other words, only the reuse service provider with access to the signature generation key can update data above the update restriction. This can help prevent the usage information and the like stored in the storage unit M2 deviating from the actual state of the cartridge 10.
[0043] Note that in the present embodiment, for the RO area, the OW area, and the WO area, when a write command is received together with a valid signature, the access control unit M1 updates the data according to the write command even if the data is outside the update restricted range. However, the areas where data can be updated according to the write command even if the data is outside the update restricted range may be either one or two of the RO area, the OW area, and the WO area. For example, the RO area may be configured such that updates are always prohibited irrespective of whether or not there is a valid signature, and the OW area and the WO area may be configured such that the update restriction is removed when there is a valid signature.
[0044] Furthermore, one or more sub-areas of the RO area, the OW area, and the WO area may be configured to remove the update restriction when there is a valid signature, and the other sub-areas may be configured to always maintain the update restriction irrespective of whether or not there is a valid signature. For example, regarding the WO area in
[0045] Accordingly, update restricted areas of step S10 in
[0046] Also, in the present embodiment, the signature verification key stored in the storage device M is different for each individual cartridge 10. However, the signature verification key of the storage device M is not necessarily different for each individual cartridge 10. For example, the signature verification key of the storage device M may be different per type of cartridge 10. In this case, the server 210 stores the signature generation key associated with the type of cartridge 10. Also, in the RO area of the storage unit M2, information indicating the type of the cartridge 10 is stored, or the serial number is configured such that the type of the cartridge 10 can be determined from the serial number. Furthermore, for example, the signature verification key of the storage device M may be the same for all of the cartridges 10. In a case where the signature verification key of the storage device M is the same for all of the storage devices M, the server 210 stores the signature generation key corresponding to the signature verification key which is the same for all of the storage devices M.
[0047] Also, in the present embodiment, when the CPU 204 receives the signature from the server 210, the CPU 204 transmits the signature together with the write command to the access control unit M1, but the message on which the signature is based on is not transmitted to the access control unit M1. This is because the access control unit M1 can generate the message from the updated data included in the write command and the manufacture date and serial number stored at a predetermined address of the storage unit M2. However, the CPU 204 may be configured to transmit the message on which the signature is based to the access control unit M1 together with the write command and the signature. In this case, for example, the access control unit M1 may be configured to compare the serial number included in the received message and the serial number stored in the storage unit M2 and, when the two do not match, notify (step S16 in
[0048] Furthermore, in the present embodiment, the write command includes the updated data. However, in a case where the value of the updated data is always the same such as when the value of the updated data after the reuse process by the reuse service provider is the initial value, the value of the updated data can be pre-stored in the non-volatile memory of the access control unit M1 or the RO area, for example. In this case, the write command does not need to include the updated data. Also, in the present embodiment, the manufacture date and the serial number are used to generate the message. However, a configuration may be used in which other predetermined data stored at a predetermined address of the storage unit M2 is used to generate the message. This predetermined data at least partially includes specific information specific to at least the cartridge 10 or the storage device M.
[0049] Also, in the present embodiment, the access control unit M1 and the verifying unit M3 of the storage device M are different functional blocks, but in another configuration, the access control unit M1 may be provided with the function of the verifying unit M3. In other words, a configuration may be used in which the processor of the access control unit M1 verifies the signature. Also, in the present embodiment, the processing apparatus R obtains the signature from the server 210, but a configuration may be used in which the processing apparatus R generates the signature. In other words, a configuration in which the processing apparatus R includes the function of the server 210 in
Second Embodiment
[0050] Next, a second embodiment will be described, focusing on the points that differ from the first embodiment. In the first embodiment, the signature is generated on the basis of the manufacture date, the serial number, and the updated data. Here, the manufacture date and the serial number are always the same value. Also, the value of the updated data may be usually the initial value. For example, in the case of the toner remaining amount T illustrated in
[0051] Also, the storage unit M2 in general has an upper limit on the number of updates that can be performed. Also, the cartridge 10 may include a component/member that cannot be replaced even with the reuse process. Accordingly, there is a restriction on the number of times the cartridge 10 can be reused. The present embodiment describes a configuration in which the maximum number of times the cartridge 10 can be reused is set to prevent the reuse process being performed greater than the maximum number of times.
[0052] To prevent the data values of the signatures being the same, in the present embodiment, when the access control unit M1 receives a reuse preparation command, the access control unit M1 generates a random number and notifies the CPU 204 of the generated random number together with the manufacture date and the serial number. The CPU 204 can include in the signature generation request signal transmitted to the server 210 the manufacture date, the serial number, and the random number received as a response to the reuse preparation command. The server 210 generates a signature on the basis of the message, which is combination of the manufacture date, the serial number, and the random number, and notifies the CPU 204 of the signature. The CPU 204 notifies the access control unit M1 of the write command and the signature. When the access control unit M1 receives a write command that contravenes the update restriction, the access control unit M1 notifies the verifying unit M3 of the write command, the received signature, and the message on which the signature is based and causes the verifying unit M3 to verify the signature. Note that the access control unit M1 generates a message on the basis of the manufacture date and serial number stored in the storage unit M2 and the random number generated when the reuse preparation command is received and notified to the CPU 204. In this manner, using a random number to generate the signature prevents the data values of the signatures being the same.
[0053] Also, to manage the maximum number of reuses, in the present embodiment, as illustrated in
[0054]
[0055] With the configuration described above, performing the reuse process more than the maximum number of times can be prevented. Also, by using a random number, the data values of the signatures being the same can be prevented. Note that in another possible configuration, instead of a random number or in addition to a random number, the value of the verification counter in
[0056] Note that in the present embodiment, the verification counter is stored in the OW area of the storage unit M2. In this case, the access control unit M1 is configured to prohibit an update outside of the update restricted range for the verification counter irrespective of whether or not there is a signature. Also, a configuration may be used in which the verification counter is stored in the non-volatile memory of the access control unit M1 instead of being stored in the storage unit M2.
[0057] Also, in the present embodiment, the CPU 204 may be configured to transmit the message to the access control unit M1 together with the write command and the signature. In this case, the access control unit M1 may compare the random number instead of or in addition to the serial numbers as described in the first embodiment. In other words, the access control unit M1 may be configured to compare the random number included in the received message and the generated random number and, when the two do not match, notify (step S16 in
Third Embodiment
[0058] Next, a third embodiment will be described, focusing on the points that differ from the embodiments described above. In the embodiments described above, by updating the usage information (the toner remaining amount T and the like) when the reuse process is performed, the pre-reuse-process usage information is lost. In the present embodiment, the pre-reuse-process usage information is backed up in the storage unit M2 as history information, allowing the usage information to be used in determining the cause of a problem should one arise.
[0059] As illustrated in
[0060] Note that in
[0061]
[0062] In a case where the data in a predetermined update restricted area of the storage device M is updated, the generation unit 2042 generates a message for generating the signature. Specifically, in the first embodiment, the message is generated on the basis of the manufacture date, the serial number, and the updated data, and in the second embodiment, the message is generated on the basis of the manufacture date, the serial number, and a random number. Note that the manufacture date, the serial number, and the random number are obtained from the storage device M via the communication unit 209.
[0063] The obtaining unit 2041 obtains the signature generated from the message generated by the generation unit 2042. Specifically, the obtaining unit 2041 obtains the signature by transmitting the message generated by the generation unit 2042 to the server 210 and by receiving the signature from the server 210. Note that in a case where the signature generation key is stored by the processing apparatus R, the obtaining unit 2041 may be configured to generate the signature.
[0064] The communication unit 209 transmits the signature obtained by the obtaining unit 2041 to the storage device M together with the write command. Note that the communication unit 209 can further transmit the message, from which the signature is generated, to the storage device M together with the write command and the signature.
[0065] Note that the processing apparatus R may be configured to always transmit the signature together with the write command irrespective of the area where data update is to be performed. Also, in the case of updating the data of an update restriction area, the processing apparatus R may be configured to transmit the signature together with the write command irrespective of whether or not data update restriction of the update restriction area is removed with a valid signature. Furthermore, the processing apparatus R may be configured to transmit the signature together with the write command only in the case of an area with a set update restriction and its data update restriction being removed with a valid signature when data update is performed.
Other Embodiments
[0066] In the embodiments described above, the storage device M is provided in the cartridge 10 of the electro-photographic image forming apparatus 100. However, the storage device M may be provided in any replaceable unit of the image forming apparatus 100. Also, in the embodiments described above, the electro-photographic image forming apparatus 100 is a monochrome image forming apparatus. However, a color image forming apparatus may be used, or another type of image forming apparatus such as an inkjet type may be used. Furthermore, the apparatus using the replaceable unit provided with the storage device M is not limited to being an image forming apparatus, and any apparatus can be used.
Other Embodiments
[0067] Embodiment(s) of the present invention can also be realized by a computer of a system or apparatus that reads out and executes computer executable instructions (e.g., one or more programs) recorded on a storage medium (which may also be referred to more fully as a non-transitory computer-readable storage medium) to perform the functions of one or more of the above-described embodiment(s) and/or that includes one or more circuits (e.g., application specific integrated circuit (ASIC)) for performing the functions of one or more of the above-described embodiment(s), and by a method performed by the computer of the system or apparatus by, for example, reading out and executing the computer executable instructions from the storage medium to perform the functions of one or more of the above-described embodiment(s) and/or controlling the one or more circuits to perform the functions of one or more of the above-described embodiment(s). The computer may comprise one or more processors (e.g., central processing unit (CPU), micro processing unit (MPU)) and may include a network of separate computers or separate processors to read out and execute the computer executable instructions. The computer executable instructions may be provided to the computer, for example, from a network or the storage medium. The storage medium may include, for example, one or more of a hard disk, a random-access memory (RAM), a read only memory (ROM), a storage of distributed computing systems, an optical disk (such as a compact disc (CD), digital versatile disc (DVD), or Blu-ray Disc (BD)?), a flash memory device, a memory card, and the like.
[0068] While the present invention has been described with reference to exemplary embodiments, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures and functions.
[0069] This application claims the benefit of Japanese Patent Application No. 2022-185747, filed Nov. 21, 2022, which is hereby incorporated by reference herein in its entirety.