Method and apparatus for non-volatile memory usage in an ink jet printer

Information

  • Patent Grant
  • 6773083
  • Patent Number
    6,773,083
  • Date Filed
    Wednesday, August 29, 2001
    23 years ago
  • Date Issued
    Tuesday, August 10, 2004
    20 years ago
Abstract
A method of storing usage information in an ink jet printer includes storing low priority usage information in a first memory field. First high priority usage information is stored in a second memory field. Second high priority usage information is stored in a third memory field. The second high priority usage information is substantially identical to the first high priority usage information.
Description




BACKGROUND OF THE INVENTION




1. Field of the Invention




The present invention relates to ink jet printers, and, more particularly, to memory usage in ink jet printers.




2. Description of the Related Art




Non-volatile memory modules are used in ink jet printers to store data such as ink usage information. Non-volatile memory modules generally retain their contents over a loss of power. However, there is nothing to prevent corruption of the data contents of the non-volatile memory if a loss of power occurs while data is being written into the non-volatile memory. Such a data corruption can be catastrophic; for example, a loss of ink usage information could destroy the printhead by firing a “dry” printhead. Another possibility is that a loss of the ink tank installation date could incorrectly expire a supply item earlier than it should, thus increasing the cost of supplies.




A window of opportunity exists for the corruption of memory module data, because much of the data exists in the form of multiples of discrete data values. If a power loss occurs in the middle of writing this data, data corruption will occur. For example, assume that the ink usage is stored in two bytes in the memory module. If a power loss occurs after the first byte has been written, but before the second byte has been written, the ink usage information has been corrupted.




What is needed in the art is a method of minimizing the damage to memory contents in the event that a power loss occurs during a data write operation.




SUMMARY OF THE INVENTION




The present invention provides a write fault tolerant non-volatile memory usage algorithm.




The invention comprises, in one form thereof, a method of storing usage information in an ink jet printer. Low priority usage information is stored in a first memory field. First high priority usage information is stored in a second memory field. Second high priority usage information is stored in a third memory field. The second high priority usage information is substantially identical to the first high priority usage information.




The invention comprises, in another form thereof, an ink jet printer including a memory module having a first field containing low priority usage information, a second field containing first high priority usage information, and a third field containing second high priority usage information substantially identical to the first high priority usage information.




An advantage of the present invention is that, in the event of a loss of power, usage information in a non-volatile memory is not corrupted.











BRIEF DESCRIPTION OF THE DRAWINGS




The above-mentioned and other features and advantages of this invention, and the manner of attaining them, will become more apparent and the invention will be better understood by reference to the following description of an embodiment of the invention taken in conjunction with the accompanying drawings, wherein:





FIG. 1

is a perspective view of an ink jet printer which can be used in conjunction with the method of the present invention;





FIG. 2

is a flow chart of authenticating non-volatile memory modules according to one embodiment of the method of the present invention; and





FIG. 3

is a flow chart of updating non-volatile memory modules according to one embodiment of the method of the present invention.











Corresponding reference characters indicate corresponding parts throughout the several views. The exemplification set out herein illustrates one preferred embodiment of the invention, in one form, and such exemplification is not to be construed as limiting the scope of the invention in any manner.




DETAILED DESCRIPTION OF THE INVENTION




Referring now to the drawings and particularly to

FIG. 1

, there is shown one embodiment of an ink jet printer


10


utilizing the method of the present invention. Printer


10


includes a non-volatile memory module


12


that records usage information. In the normal operation of printer


10


, supply usage along with other information is stored in module


12


. This usage information is used to track information such as printhead and ink tank life. Module


12


can contain information such as manufacturing related information; thermal, fluidic, and electrical parametrics; usage information—ink level, printhead life; supply item information; diagnostic information: and maintenance parameters.




Module


12


can be contained within the printhead and ink tank chiclets (not shown). Although only one memory module


12


is described herein, it is to be understood that printer


10


can include several memory modules


12


, with each module


12


being associated with a respective printhead and/or ink tank.




The present invention combats corruption of non-volatile memory module information. Memory module


12


is partitioned into four separate fields.




The first field contains data pertaining to the supply item that has been determined at the time of manufacture. This data never needs to be changed by printer


10


, and is set up in non-volatile memory module


12


as read-only. Data of this type generally includes starting ink, ink drop volume, and fire-energy information. That is, the read-only data includes information related to the manufacture of a supply item (tank or printhead) and parametrics associated with the printhead or ink. More particularly, the read-only data can include the starting ink volume, maintenance parameters, energy delivery parameters, ink lot number, fire rate parameters, drop mass parameters, ink identification, manufacturing date, trademark, part number, thermal control parameters, original equipment manufacturer (OEM) identification, serial number, supply item expiration parameters, electrical parameters (voltages, resistances), chip placement information (used for print registration), and usage limits (life).




Because the first field is set up as read-only by memory


12


, data cannot be corrupted by printer


10


if a write addressing error occurs during a power loss. This prevents errors such as an accidental clearing of the starting ink. An error of this nature would immediately expire the supply item upon the next power-up.




The second field contains high priority data that printer


10


uses to record usage information, which if corrupted, would invalidate the supply item. This field is set up to allow read and write access by printer


10


at the time of manufacture, and contains critical supply information such as ink usage or ink level information for the tanks, and printhead life usage or usage information for the printheads. The validity of the data is determined by a checksum byte stored at the end of the field. This checksum is the sum of all the data stored in this field, and is maintained by printer


10


. A new checksum is calculated when printer


10


saves new usage information, and this checksum is used to determine if the information in this field is valid when printer


10


powers up.




The integrity of the data in the second field is maintained by copying its data into a redundant copy, the third field. This third field is also a read-write field and is check-summed in the same manner as the second field. The redundant third field is updated immediately after the primary second field, and is a mirror copy of the second field. This third field provides protection in that both the primary and the redundant data copy fields cannot be corrupted at the same time by a loss of power during a write operation. If printer


10


determines that a corruption of data exists in the second field, printer


10


can use the data from this third field.




The fourth field contains low priority data that printer


10


uses to record usage information that would not be considered catastrophic if corrupted. This fourth field is set up as readable and writable by printer


10


at the time of manufacture. Data of this nature include “number of wet-wipes performed”, “last ink-float read”, thermal parametrics (measured in the printer) installation date, error codes (for failure diagnostics), idle time, maintenance parameters, missing nozzle information, chip placement information (programmed at manufacturing test), ink level parameters (measured in the printer), etc.




The fourth field is validated by a checksum byte that is stored at the end of the field. This checksum is used upon power-up of printer


10


to determine if the contents of the fourth field are valid. If the contents are determined to be invalid, the entire field is cleared, and a new checksum is calculated. Before powering down, and at periodic intervals, the data in this fourth field is stored, and its corresponding checksum calculated and stored.




The following algorithm describes the implementation of these four fields in the printheads and ink tanks of printer


10


. Upon power-up (step S


14


, FIG.


2


), printer


10


authenticates non-volatile memory module


12


(step S


16


). This step is required in order to unlock and read the memory module contents. Printer


10


then reads the read-only static variables stored in the first field (step S


18


). The read is performed a second time if a checksum failure is detected in order to differentiate between true data corruption, and problems (noise) which could occur during the memory read.




Printer


10


proceeds to read the fourth field (step S


20


), the low-priority read-write data. The read is performed a second time if a checksum failure is detected in order to differentiate between true data corruption, and problems (noise) which could occur during the memory read. If a checksum mis-match occurs a second time, the fourth field data is considered invalid, and is cleared.




Printer


10


then reads the second field (step S


22


), i.e., the high priority data field. The second field's checksum is observed. The second field is read a second time if it is determined to have a bad checksum. A decision is made as to which copy of the high priority data is to be used. If the second field's checksum is valid, the second field's data is used (step S


24


).




If the second field's checksum is determined to be invalid a second time, printer


10


reads the third field (step S


26


), i.e., the redundant high priority data field. The third field's checksum is observed. The third field is read a second time if it is determined to have a bad checksum. If the third field's checksum is determined to be valid, the third field's data is used (step S


28


). and the second field's data is corrected upon the next memory write. If the third field's checksum is determined to be invalid, an unrecoverable error has occurred, and the operation stops (step S


30


).




Upon power-down, and periodically during the printer's operation, printer


10


stores usage information to memory module


12


. No data is stored in the first field, as it is read-only.




The fourth field data is observed, and a checksum calculated (step S


34


). The data along with its checksum is written to memory module


12


(step S


36


). This data is immediately read back (step S


38


) and the checksum is used to verify a valid write (step S


40


). This may be repeated again, to ensure the data is correctly written into the fourth field.




The second field high-priority read-write data is then collected and its new checksum calculated (step S


42


). This data is written to the second memory module field (step S


44


), also being read back (step S


46


) and the checksum is used to verify a proper write (step S


48


).




The same data is also written to the third field (step S


50


), the redundant high-priority field. This is to verify that the third field is an exact duplicate of the second field. The data is then read back (step S


52


) and the checksum is used to verify a proper write (step S


54


).




All checksums are calculated one final time (step S


56


) and their validity is confirmed (step S


58


).




This “mirror image” copy of the read-write data, along with the read-only protection of critical manufacturing data provides the fault tolerance necessary to control critical supply elements that are vulnerable to instantaneous power outages.




While this invention has been described as having a preferred design, the present invention can be further modified within the spirit and scope of this disclosure. This application is therefore intended to cover any variations, uses, or adaptations of the invention using its general principles. Further, this application is intended to cover such departures from the present disclosure as come within known or customary practice in the art to which this invention pertains and which fall within the limits of the appended claims.



Claims
  • 1. A method of storing usage information in an ink jet printer, said method comprising:updating said usage information in at least one memory module, said updating including the steps of: storing low priority usage information in a first memory field; storing first high priority usage information in a second memory field; verifying said first high priority usage information has been written properly; and subsequently storing second high priority usage information in a third memory field, said second high priority usage information being substantially identical to said first high priority usage information.
  • 2. The method of claim 1, wherein each of said first memory field, said second memory field and said third memory field can be both read and written to.
  • 3. The method of claim 2, wherein if power is lost to the printer while writing to one of said second memory field and said third memory field, said information in the other of said second memory field and said third memory field is not corrupted.
  • 4. The method of claim 1, wherein said first high priority usage information and said second high priority usage information each include at least one of ink usage and print head life usage.
  • 5. The method of claim 1, wherein said low priority usage information includes at least one of a number of wet-wipes performed and a last ink-float read.
  • 6. The method of claim 1, comprising the further step of storing read-only information in a fourth memory field.
  • 7. The method of claim 6, wherein said read-only information is determined at a time of manufacture of the printer.
  • 8. The method of claim 6, wherein said read-only information includes at least one of starting ink, ink drop volume, and fire energy information.
  • 9. The method of claim 6, comprising the further step of storing at least one checksum byte associated with at said fourth memory field.
  • 10. The method of claim 1, comprising the further step of storing at least one checksum byte associated with at least one of said first memory field, said second memory field and said third memory field.
  • 11. The method of claim 10, wherein data stored in said at least one checksum byte is dependent upon at least one of said low priority usage information, said first high priority usage information and said second high priority usage information.
  • 12. The method of claim 11, comprising the further step of using said at least one checksum byte to determine whether at least one of said low priority usage information, said first high priority usage information and said second high priority usage information is valid when the printer powers up.
  • 13. The method of claim 1, comprising the further step of using said second high priority usage information in lieu of said first high priority usage information if said first high priority usage information is corrupted.
  • 14. The method of claim 1, wherein said at least one memory module is a non-volatile memory module containing said first memory field, said second memory field and said third memory field.
  • 15. The method of claim 14, comprising the further step of authenticating said at least one non-volatile memory module upon power-up of the printer.
  • 16. An ink jet printer, comprising a non-volatile memory module including:a first field containing low priority usage information; a second field containing first high priority usage information; and a third field containing second high priority usage information substantially identical to said first high priority usage information.
  • 17. The ink jet printer of claim 16, wherein said memory module includes a fourth field containing read-only information.
  • 18. The ink jet printer of claim 17, wherein said memory module includes at least one checksum byte associated with said fourth field.
  • 19. The ink jet printer of claim 16, wherein said memory module includes at least one checksum byte associated with at least one of said first field, said second field and said third field.
  • 20. The ink jet printer of claim 19, wherein said at least one checksum byte contains data that is dependent upon at least one of said low priority usage information, said first high priority usage information and said second high priority usage information.
  • 21. The ink jet printer of claim 16, wherein said third field defines a means of preventing said first high priority usage information from being lost if power to the printer is interrupted while said second field is being written to.
  • 22. A method of updating usage information in an ink jet printer, said method comprising the steps of:storing first usage information in a first memory field; verifying said first usage information has been written properly; and subsequently storing second usage information in a second memory field, said second usage information being substantially identical to said first usage information.
US Referenced Citations (38)
Number Name Date Kind
3576982 Duke May 1971 A
4485471 Singh et al. Nov 1984 A
4651307 Toumayan et al. Mar 1987 A
4768169 Perlegos Aug 1988 A
4888686 Sinz et al. Dec 1989 A
4920518 Nakamura et al. Apr 1990 A
4965828 Ergott, Jr. et al. Oct 1990 A
5109360 Inazumi et al. Apr 1992 A
5146431 Eby et al. Sep 1992 A
5195100 Katz et al. Mar 1993 A
5210716 Takada May 1993 A
5379415 Papenberg et al. Jan 1995 A
5434868 Aichelmann, Jr. et al. Jul 1995 A
5475697 Katz et al. Dec 1995 A
5495570 Heugel et al. Feb 1996 A
5502728 Smith, III Mar 1996 A
5553231 Papenberg et al. Sep 1996 A
5553263 Kalish et al. Sep 1996 A
5619642 Nielson et al. Apr 1997 A
5627572 Harrington, III et al. May 1997 A
5644699 Yoshida Jul 1997 A
5659678 Aichelmann, Jr. et al. Aug 1997 A
5832005 Singh Nov 1998 A
5862151 Fagerness Jan 1999 A
5864657 Stiffler Jan 1999 A
5905854 Nielson et al. May 1999 A
5905858 Jeddeloh May 1999 A
5907671 Chen et al. May 1999 A
5917838 Wardrop Jun 1999 A
5935258 Klein Aug 1999 A
5943287 Walton Aug 1999 A
5954828 Lin Sep 1999 A
5978931 Kirihata et al. Nov 1999 A
6002846 Okamoto Dec 1999 A
6016553 Schneider et al. Jan 2000 A
6041422 Deas Mar 2000 A
6154847 Schofield et al. Nov 2000 A
6181614 Aipperspach et al. Jan 2001 B1
Foreign Referenced Citations (2)
Number Date Country
WO 9965695 Dec 1999 WO
WO 9965695 Dec 1999 WO
Non-Patent Literature Citations (4)
Entry
M.Morris Mano, Digital Design 1991, Prentice-Hall, Inc. 2nd ed. ,pp.180-186, 299-302.*
Richard C. Dorf, The Electrical Engineering Handbook 1997, CRC Press, 2nd ed. ,pp. 1805-1813.*
M. Morris Mano, “Digital Design,” 2nd ed., Prentice-Hall (Upper Saddle River, NJ 07458), (Feb. 17, 1991).
Richard C. Dorf, “The Electrical Engineering Handbook,” 2nd ed., CRC Press, (Feb. 17, 1997).