If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
I would like to know if any one has had any success in creating a clone of the ricoh postscript chips?
if it is at all possible it would save some time and money.
thanks
$hit Happens - Deal with it and move on.....................................sigpic....................................Lock & Load
I would like to know if any one has had any success in creating a clone of the ricoh postscript chips?
if it is at all possible it would save some time and money.
thanks
As these cards are several hundred dollars a pop, they make sure you can't do it. I've read on here that many have tried with no success. I suppose eventually someone will come up with a work around, but I've not heard of one as of yet.
It seems not possible - somehow the memory cards are flagged in a certain way that even a bit-true image of the accessible content doesn't do the job. Besides it's like making business with piracy software/warez - something one shouldn't consider. It's one thing to mod PCU's or maintanance plans to save money - there's no law against this but making a business based of piracy software is delicate.
A little poking about reveals there is a 'protected area' reserved on SD cards that is used to implement CPRM data protection. With CPRM protected cards there is a mutual authentication between the card and the host device. The specification allows for the 'on-the-fly' encryption / decryption of the card contents, but I wonder if there can simply be a flag bit or key stored there too. One would need a CPRM-enabled reader and the appropriate drivers to do anything with the protected area. On Ricoh option cards the contents do not appear to be encrypted, the contents seem to be readable. You can make a bit-for-bit copy but it will not work as there will be some kind of authentication issue with the cloned card, which leads me to the possibility of a flag bit or key stored in the protected area.
It may be possible with the right hardware, software and knowledge, but it isn't meant to be easy. My own thoughts have been to take an 'image' of a new card and use it to restore damaged / corrupted cards in the field. Doing so would only be ensuring what the client did pay for continues to work. It then only becomes a small step to enabling features a client didn't pay for, and profiting on the side for doing so. Very slippery slope here and I'm sure many who have asked have less than pure intent for wanting to do so.
Comment