One-time use, digital camera exchange system
A camera exchange system is provided comprising a plurality of one-time use, digital cameras and a refurbishing station for refurbishing used, returned cameras. Each camera has a supply of print media, a printer for printing an image onto said print media, a cutter for severing a printed image from said supply of print media, a counter for counting the number of cutting operations of said cutter, and an authentication means. The refurbishing station replenishes the supply of print media of each of the returned cameras and resets the counter in response to the authentication means authenticating that the refurbishing station is authorised to effect refurbishing of the camera.
Latest Patents:
The present application is a continuation of U.S. application Ser. No. 09/662,617 filed on Sep. 15, 2000, the entire contents of which are herein incorporated by reference.
FIELD OF THE INVENTIONThis invention relates to a recyclable, one-time use, print on demand, digital camera. More particularly, the invention relates to a camera exchange system and to a method of exchanging cameras of the type described.
BACKGROUND TO THE INVENTIONOne-time use cameras, making use of conventional photographic film, are becoming increasingly popular. A customer purchases the camera, exposes the film in the camera and returns the entire camera to a processing centre to have the exposed film processed. As far as the customer is concerned, the camera is, in that sense, a disposable camera. At the processing centre, the film is removed from the camera in darkroom conditions and is processed. The camera casing and remaining parts are, where possible, recycled.
We have also proposed the use of printing technology in a digital camera for more upmarket cameras and, in this regard, reference is made to our co-pending U.S. application Ser. No. 09/113,060 filed Jul. 10, 1998 and entitled “Digital instant printing camera with image processing capability” (Docket Number ART01), the contents of which are specifically incorporated herein by reference.
The type of camera proposed in Ser. No. 09/113,060 is, as indicated, directed at the higher end of the market to compete with existing digital cameras.
We have also proposed, in our co-pending U.S. application Ser. No. 09/113,102 filed Jul. 10, 1998 and entitled “A low cost disposable digital instant printing camera” (Docket Number IR01), the contents of which are also specifically incorporated herein by reference, a low cost, one-time use digital camera.
While it is believed that this low-cost camera, on its own, is of considerable commercial value, due to the high quality and instant printing of images which can be obtained, a camera exchange system and method are contemplated so that the camera of our co-pending application Ser. No. 09/113,102 can compete in price with existing disposable, photographic-film cameras.
SUMMARY OF THE INVENTIONAccording to a first aspect of the invention, there is provided a camera exchange system which includes
a plurality of one-time use digital cameras, each camera including an authentication means; and
at least one refurbishing station for refurbishing used, returned cameras by replenishing consumables of each of said returned cameras, the authentication means of each camera authenticating whether or not said at least one refurbishing station is authorised to effect refurbishing of said camera.
Each camera may retail at a price of X currency units, each camera costing approximately Y currency units to manufacture where Y is less than 0.5×. In this specification the term “currency unit” is to be understood as US$1, ±1, AU$1, Japanese Yen100, Italian Lire1000, or the like.
The system may include at least one collection depot where a user can return a used one of the cameras for a refund and a plurality of refurbishing stations operated by a manufacturer for receiving the used cameras from said at least one collection depot, each station being able to be authenticated by said used camera, to replenish the consumables of said used camera to enable a refurbished camera to be re-sold at X currency units, and the cost to said manufacture to refurbish the camera being Z currency units. The refund may be approximately 0.25× and Z may be approximately 0.03×.
The consumables which are replenished may include ink, a supply of paper and batteries of the power supply.
Also, at the time that the camera is refurbished, its outer casing may be removed and recycled. All the internal components of the camera are supported on a chassis which may be inserted into a new, recycled casing after replenishing of the consumables and resetting of a picture counter of the camera. A sleeve is placed about the re-cased camera.
A selling price of either one of a new and a refurbished camera by the manufacturer may be approximately 0.5×.
It is envisaged that, for a return for refund rate of approximately 90% of the cameras, a total gross margin as a percentage of sales exceeding 75% is achievable.
To ensure that the low cost cameras compete with disposable photographic film cameras, a cost to the user of each photo processed by the camera may be less than 0.05× if the user returns a used camera for refund.
According to a second aspect of the invention, there is provided a method of exchanging cameras which includes the steps of:
providing a plurality of one-time use digital cameras, each camera containing consumables which are consumed by use of the camera;
receiving returned, used cameras to be refurbished by replenishment of the consumables to provide refurbished cameras; and
authenticating, via each of said returned cameras, that a refurbishing station at which said camera is refurbished is authorised to effect refurbishing of said camera.
The method may include rendering a camera refurbished by an unauthorised refurbishing station inoperative. Further, the method may include carrying out a test routine after refurbishing to determine if the refurbished camera is operative. The test routine for testing a refurbished camera may automatically test that the camera is operative.
The method may include
selling each camera at a retail price of approximately X currency units, each camera costing approximately Y currency units to manufacture where Y is less than 0.5×;
refunding an amount for the return of a used camera; and
refurbishing each returned, used camera at a cost to a refurbisher of Z currency units.
The method may include refunding an amount of approximately 0.25× for the return of a used camera and Z may be approximately 0.03×.
The method may then include supplying refurbished cameras to a retailer at a cost of approximately 0.5× currency units.
BRIEF DESCRIPTION OF THE DRAWINGSThe invention is now described by way of example with reference to the accompanying drawings in which:
Referring initially to
In the exchange system, old cameras are collected, as shown at step 14 at collection depots.
By “old cameras” is meant a camera which has been used by a user to take a predetermined number of pictures. As indicated, the camera 12 is a digital, instant printing camera. Typically, the camera 12 has a supply of print media 16 (
In accordance with the camera exchange system of the invention, a camera 12, when new has a manufacturing cost of Y currency units. For ease of explanation, the currency unit used in this description will be the US dollar. At present rates, the manufacturing cost of the camera is estimated to be slightly less than $10.00 and, more particularly, in the region of about $9.50. Specifically, a costing analysis reveals that the manufacturing cost of such a camera is in the region of $9.48.
New cameras are supplied to retailers by the manufacturer at a cost of approximately $10.00 so that the return to the manufacturer, in respect of new cameras, will be of the order of about 0.5%.
Also, the camera is retailed by the retailer at a cost of $20.00. When the camera 12 has been used, the old or used camera 12 is returned to the collection depot where a refund of $5.00 is made to the person returning the camera. As a result, the net price to the consumer is $15.00. For a twenty five exposure camera 12, the cost to the consumer for each photo is of the order of $0.60. This equates almost exactly to the present cost of a developed, printed photo taken using a conventional film camera.
Due to the cost of the camera to the consumer, factoring in the refund, and the cost per photo, the consumer, effectively, obtains a digital, instant printing camera at a price similar to that of a disposable, one-time use conventional film camera and the cost of each image or exposure of the digital camera 12 is of the same order as that of the conventional camera.
It will, of course, be appreciated that due to the fact that the camera 12 is a digital camera, it is not necessary for the camera 12 to be returned for processing. Accordingly, an incentive needs to be given for the used cameras 12 to be returned; hence the refund. It is felt that, should adult consumers not bother to return the cameras, it is still likely that children or low income members of the community would return the cameras to obtain the refund.
When the used camera 12 is returned, the camera 12 is refurbished and replenished. The refurbished camera is re-packaged and returned to the retailer.
The approximate cost to the manufacturer of refurbishing a camera 12 is as follows:—
The manufacturer supplies such a refurbished camera to the retailer at a similar wholesale cost to a new camera, i.e. US$110.00 so that the gross margin to the manufacturer on refill is of the order of US$9.33.
Further, it is envisaged that, in due course, the ratio of used cameras which are recycled and returned into the market to new cameras will be of the order of 9:1 assuming an estimated camera return-for-refund rate of 90%. Should this figure be obtained, it is estimated that the total gross margin as a percentage of sales which the manufacturer will achieve will be in the order of 77%.
Due to this rate of return, the business model can weather significant retail price pressure and maintain profitability.
An interesting conclusion is that digital printing cameras can be provided having a lower retail price than non-printing digital cameras.
With reference to FIGS. 2 to 8 of the drawings, a brief description of the refurbishing of the camera will be described following the steps of
The camera 12 has a casing 18 made up of a front shell 20 and a rear shell or lid 22. The casing 18 has a coated paper sleeve 24 covering a major part thereof. Further, in a conventional fashion, the camera 12 has a viewfinder 26, an imaging lens 28 and an “exposure” taking button 30.
In the recycling of the camera 12, the casing 18 is removed (step 32 in
Once the casing 18 has been removed, a chassis 38 of the camera is exposed. The chassis 38 carries all internal components of the camera. For a more detailed description of these components, reference is made to our co-pending U.S. application Ser. No. 09/113,102 referred to above.
The supply of print media 16 is in the form of a roll of coated paper carried on a former 40. It will be appreciated that, once the twenty-five exposures have been made, all that will remain in the used camera 12 is the former 40. An end member 42 of the chassis is removed to enable the former 40 to be removed. The former 40 houses batteries 44 for the camera 12 therein to render the camera 12 compact. Accordingly, when the end member 42 of the chassis 38 has been removed, access can be gained to the used batteries 44 which are replaced by fresh batteries.
Hence, once the end member 42 has been removed and the former 40 and batteries 44 of the old camera 12 have been removed, a new print media supply 16 and batteries 44 are loaded on to the chassis 38 and are retained in position by the end member 42. This is shown at step 46 in
The chassis 38 supports an ink cartridge 48 thereon. An exploded view of the ink cartridge 48 is shown in greater detail in
The cartridge 48 further includes a cover member 54 which mates with the carrier 50 to define three chambers 56, 58 and 60. Each chamber 56, 58 and 60 carries a different color ink therein so that full color printing can be achieved by the print head chip 52. Each chamber 56, 58 and 60 houses a damping means in the form of a sponge 62, 64 and 66, respectively, therein for damping movement of ink within the chambers 56, 58 and 60.
An end wall 68 of the carrier 50 has labyrinthine openings 70 defined therein. These openings 70 are exposed by removal of a seal 72 when it is desired to refill the chambers 56, 58 and 60. Accordingly, to refill the chambers 56, 58 and 60, a plug 74 is removed. The plug 74 has three prongs 76. Each prong 76 closes off an inlet port to one of the chambers 56, 58 and 60. Accordingly, ink is charged into each of the chambers. For example, cyan ink may be received in the chamber 56, magenta ink may be received in the chamber 58 and yellow ink may be received in the chamber 60. Once the chambers 56, 58 and 60 have been charged with new ink, the plug 74 is replaced and a new seal 72 is applied to cover the openings 70.
The refilling of the ink cartridge is shown at step 78 in
The caseless camera, as shown in
The part of the image processing chip 82 which includes the authentication program is a flash memory. The flash memory is used to store a 128 bit authentication code. This provides higher security than storage of the authentication code in ROM as reverse engineering can be made essentially impossible. The flash memory is completely covered by third level metal, making the data almost impossible to extract using scanning probe microscopes or electron beams. The authentication code is stored in the chip when manufactured. At least two other flash bits are required for the authentication process: a bit which locks out re-programming of the authentication code and a bit which indicates that the camera has been refilled by an authenticated refill station.
This data are used by a central processing unit of the chip 82 to effect encrypted authentication of the refill station.
The authentication station communicates with the chip 82 via a standard joint test action group (JTAG) interface. This interface also is provided for the testing routine.
To ensure that the cameras are only refilled with quality print media and ink at a properly authorised refill station, the camera 12 authenticates the refill station rather than vice versa. The secure protocol is communicated to the refill station during the automated test procedure via the interface when the new ink is inserted into the cartridge 48.
Authentication
Existing solutions to the problem of authenticating consumables have typically relied on physical patents on packaging. However this does not stop home refill operations or clone manufacture in countries with weak industrial property protection. Consequently a much higher level of protection is required. It is not enough to provide an authentication method that is secret, relying on a home-brew security method that has not been scrutinized by security experts. Security systems such as Netscape's original proprietary system and the GSM Fraud Prevention Network used by cellular phones are examples where design secrecy caused the vulnerability of the security. Both security systems were broken by conventional means that would have been detected if the companies had followed an open design process. The solution is to provide authentication by means that have withstood the scrutiny of experts. A number of protocols that can be used for consumables authentication. We only use security methods that are publicly described, using known behaviors in this new way. For all protocols, the security of the scheme relies on a secret key, not a secret algorithm. All the protocols rely on a time-variant challenge (i.e. the challenge is different each time), where the response depends on the challenge and the secret. The challenge involves a random number so that any observer will not be able to gather useful information about a subsequent identification. Two protocols are presented for each of Presence Only Authentication and Consumable Lifetime Authentication. Although the protocols differ in the number of Authentication Chips required for the authentication process, in all cases the System authenticates the consumable. Certain protocols will work with either one or two chips, while other protocols only work with two chips. Whether one chip or two Authentication Chips are used the System is still responsible for making the authentication decision.
Single Chip Authentication
When only one Authentication chip 53 is used for the authentication protocol, a single chip (referred to as ChipA) is responsible for proving to a system (referred to as System) that it is authentic. At the start of the protocol, System is unsure of ChipA's authenticity. System undertakes a challenge-response protocol with ChipA, and thus determines ChipA's authenticity. In all protocols the authenticity of the consumable is directly based on the authenticity of the chip, i.e. if ChipA is considered authentic, then the consumable is considered authentic. The data flow can be seen in
Double Chip Authentication
In other protocols, two Authentication Chips are required as shown in
Presence Only Authentication (Insecure State Data)
For this level of consumable authentication we are only concerned about validating the presence of the Authentication chip 53. Although the Authentication Chip can contain state information, the transmission of that state information would not be considered secure. Two protocols are presented. Protocol 1 requires 2 Authentication Chips, while Protocol 2 can be implemented using either 1 or 2 Authentication Chips.
Protocol 1
Protocol 1 is a double chip protocol (two Authentication Chips are required). Each Authentication Chip contains the following values:
-
- K Key for FK[X]. Must be secret.
- R Current random number. Does not have to be secret, but must be seeded with a different initial value for each chip instance. Changes with each invocation of the Random function.
Each Authentication Chip contains the following logical functions: - Random[ ] Returns R, and advances R to next in sequence.
- F[X] Returns FK[X], the result of applying a one-way function F to X based upon the secret key K.
The protocol is as follows: - System requests Random[ ] from ChipT;
- ChipT returns R to System;
- System requests F[R] from both ChipT and ChipA;
- ChipT returns FKT[R] to System;
- ChipA returns FKA[R] to System;
- System compares FKT[R] with FKA[R]. If they are equal, then ChipA is considered valid. If not, then ChipA is considered invalid.
The data flow can be seen inFIG. 169 . The System does not have to comprehend FK[R] messages. It must merely check that the responses from ChipA and ChipT are the same. The System therefore does not require the key. The security of Protocol 1 lies in two places: - The security of F[X]. Only Authentication chips contain the secret key, so anything that can produce an F[X] from an X that matches the F[X] generated by a trusted Authentication chip 53 (ChipT) must be authentic.
- The domain of R generated by all Authentication chips must be large and non-deterministic. If the domain of R generated by all Authentication chips is small, then there is no need for a clone manufacturer to crack the key. Instead, the clone manufacturer could incorporate a ROM in their chip that had a record of all of the responses from a genuine chip to the codes sent by the system. The Random function does not strictly have to be in the Authentication Chip, since System can potentially generate the same random number sequence. However it simplifies the design of System and ensures the security of the random number generator will be the same for all implementations that use the Authentication Chip, reducing possible error in system implementation.
Protocol 1 has several advantages: - K is not revealed during the authentication process
- Given X, a clone chip cannot generate FK[X] without K or access to a real Authentication Chip.
- System is easy to design, especially in low cost systems such as ink-jet printers, as no encryption or decryption is required by System itself.
- A wide range of keyed one-way functions exists, including symmetric cryptography, random number sequences, and message authentication codes.
- One-way functions require fewer gates and are easier to verify than asymmetric algorithms).
- Secure key size for a keyed one-way function does not have to be as large as for an asymmetric (public key) algorithm. A minimum of 128 bits can provide appropriate security if F[X] is a symmetric cryptographic function.
However there are problems with this protocol: - It is susceptible to chosen text attack. An attacker can plug the chip into their own system, generate chosen Rs, and observe the output. In order to find the key, an attacker can also search for an R that will generate a specific F[M] since multiple Authentication chips can be tested in parallel.
- Depending on the one-way function chosen, key generation can be complicated. The method of selecting a good key depends on the algorithm being used. Certain keys are weak for a given algorithm.
- The choice of the keyed one-way functions itself is non-trivial. Some require licensing due to patent protection.
A man-in-the middle could take action on a plaintext message M before passing it on to ChipA—it would be preferable if the man-in-the-middle did not see M until after ChipA had seen it. It would be even more preferable if a man-in-the-middle didn't see M at all. If F is symmetric encryption, because of the key size needed for adequate security, the chips could not be exported from the USA since they could be used as strong encryption devices. If Protocol 1 is implemented with F as an asymmetric encryption algorithm, there is no advantage over the symmetric case—the keys needs to be longer and the encryption algorithm is more expensive in silicon. Protocol 1 must be implemented with 2 Authentication Chips in order to keep the key secure. This means that each System requires an Authentication Chip and each consumable requires an Authentication Chip.
Paper, from the supply 16, is wound about a platten 86 (
Should the chip 82 determine that the refurbishing station is an authorised station, the counter 96 is reset as shown at step 98 in
Due to the digital processing of images sensed by the image sensor 28 of the camera 12, it is possible for special effects to be imparted to those images. Accordingly, special types of cameras may be made available, such as for the production of sepia colored photographs, multiple passport type photographs, photographs relating to special events such as weddings, special sporting events, or the like. This modification of the standard image is effected by the image processing chip 82. Such special types of cameras are identifiable as such by means of an appropriately marked sleeve 24. When, however, the cameras are refurbished, the image processing chip 82 is reset to a standard type as shown at step 100 by the refurbishing station.
The refurbishing and replenishing of the camera is then completed and the final step involves the insertion of the new chassis 38, with its components, into a new front cover 20 of the casing 12 and the attachment of a rear cover or lid 22. The lid 22 clips to the front cover 20 and is also bonded thereto so that should an attempt be made to open the casing 18, this will result in the destruction of the casing 18.
A new sleeve 24 is applied to the casing 18. The sleeve 24 is held in position by a slot surround 102.
The steps of attaching a new case 18 and applying the label or sleeve 24 are shown at 104 and 106, respectively, in
The refurbished camera 12 is packed (step 108 in
Accordingly, a camera exchange system and method of exchanging cameras are provided which enables instant printing, digital cameras to compete with conventional film, one-time use cameras both in so far as costs of the cameras and costs of each exposure are concerned. Further, by authenticating the refilling station, quality control can be maintained to ensure that the quality of exposures obtained by consumers is of a satisfactory quality.
It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the invention as shown in the specific embodiments without departing from the spirit or scope of the invention as broadly described. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.
Claims
1. A camera exchange system comprising:
- a plurality of one-time use, digital cameras, each camera having: a supply of print media; a printer for printing an image onto said print media; a cutter for severing a printed image from said supply of print media; a counter for counting the number of cutting operations of said cutter; and an authentication means; and
- at least one refurbishing station for refurbishing used, returned cameras by replenishing at least said supply of print media of each of said returned cameras and by resetting said counter in response to said authentication means authenticating that said refurbishing station is authorised to effect refurbishing of said camera.
2. The system of claim 1 in which each camera retails at a price of X currency, each camera costing approximately Y currency units to manufacture, where Y is less than 0.5×.
3. The system of claim 2 comprising:
- at least one collection depot where a user can return a used said camera for a refund; and
- a plurality of refurbishing stations operated by a manufacturer for receiving the used cameras from said at least one collection depot, each station being able to be authenticated by said used camera, to replenish the supply of print media of said used camera to enable a refurbished camera to be re-sold at X currency units, and the cost to said manufacturer to refurbish the camera being Z currency units.
4. The system of claim 3 in which the refund is approximately 0.25×.
5. The system of claim 3 in which Z is approximately 0.03×.
6. The system of claim 1 in which a selling price of either one of a new and a refurbished camera by the manufacturer is approximately 0.5×.
7. The system of claim 1 in which, for a return for refund rate of approximately 90% of the cameras, a total gross margin as a percentage of sales exceeding 75% is achieved.
8. The system of claim 1 in which a cost to the user of each photo processed by the camera is less than 0.05× if the user returns a used camera for refund.
Type: Application
Filed: Oct 13, 2005
Publication Date: Apr 20, 2006
Applicant:
Inventor: Kia Silverbrook (Balmain)
Application Number: 11/248,421
International Classification: H04N 5/225 (20060101);