WO2013062531A1 - Impression cryptée - Google Patents
Impression cryptée Download PDFInfo
- Publication number
- WO2013062531A1 WO2013062531A1 PCT/US2011/057704 US2011057704W WO2013062531A1 WO 2013062531 A1 WO2013062531 A1 WO 2013062531A1 US 2011057704 W US2011057704 W US 2011057704W WO 2013062531 A1 WO2013062531 A1 WO 2013062531A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- encrypted
- printer
- decrypted
- printed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1238—Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1285—Remote printer device, e.g. being remote from client or server
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/4406—Restricting access, e.g. according to user identity
- H04N1/4426—Restricting access, e.g. according to user identity involving separate means, e.g. a server, a magnetic card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/4406—Restricting access, e.g. according to user identity
- H04N1/444—Restricting access, e.g. according to user identity to a particular document or image or part thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
Definitions
- cloud computing a network of remote servers hosted on the Internet are used to store, manage, and process data.
- a network of remote servers is often referred to as a cloud.
- Printers accessible by a cloud may include printers with native support for connecting to cloud print services. Other printers accessible by the cloud may be accessible through connection to personal computers or other computing devices connected to the cloud.
- the printer to computing device connection may be, for example, a direct connection, such as via universal serial bus (USB) connection or may be through a network such as a WiFi network or an Ethernet network.
- USB universal serial bus
- Documents printed via cloud computing may be printed on printers that are geographically distance from a document provider or even an intended recipient. If printed documents are not quickly retrieved by the intended recipient or are intercepted by an unintended party, the printed documents might be copied and disseminated well beyond the intended recipient. If the printed documents include sensitive or proprietary information, such
- Figure 1 is a simplified block diagram of a system that provides encrypted printing in accordance with an implementation.
- Figure 2 is a simplified flowchart that describes encryption of a document before the document is printed in accordance with an implementation.
- Figure 3 is a simplified flowchart that describes decryption of a document before the document is printed in accordance with an implementation.
- FIG. 1 is a simplified block diagram showing a cloud 20 composed of a network of remote servers, hosted on the Internet, that are used to store, manage, and process data.
- An interface 21 provides an on-ramp from a document provider 12 to cloud 20 and provides an off-ramp from cloud 20 to document provider 12.
- An interface 25 provides an off-ramp from cloud 20 to a printer 14 and an on ⁇ ramp from printer 14 to cloud 20.
- a user 1 1 is shown to have potential interactions with document provider 12, printer 14 and an electronic print (e-print) center 13.
- job management services 22 located on and implemented by one or more servers, are job management services 22, imaging services 23 and rendering services 24.
- FIG. 2 is a simplified flowchart that describes encryption of a document before the document is printed.
- a user coordinates with a document provider 12.
- the coordination can include notification from document provider 12 to user 1 1 that a printed document is forth coming.
- document provider 12 may be a bank or some other institution whom user 1 1 has registered with using the session initiation protocol (SIP).
- SIP session initiation protocol
- document provider 12 might agree to send the encrypted SIP pin to user 1 1 within a document to be printed out on a printer identified by user 1 1 , e.g., printer 14.
- the coordination can be accomplished by user 1 1 authorizing document provider 12 to print an encrypted document on printer 14. For example, this can be done through user 1 1 registering with e- print center 13 to take ownership of printer 14 and whitelisting document provider 12 so that document provider 12 is permitted to print an encrypted document on printer 14.
- printer 14 is set in an encrypted print mode. This can be done, for example, as a result of user 1 1 , directly or through e-print center 13, claiming printer 14 and setting printer 14 in encrypted mode.
- printer 14 can be set in an encrypted print mode by document provider 12, or by some other entity.
- printer 14 might routinely enter encrypted mode when printing documents received from document provider 12 if, for example, document provider 12 was identified as a service provider that required encrypted printing.
- document provider 12 submits a print job that includes the document to be encrypted and printed.
- Cloud 20 receives the print job via interface 21 , which serves as an in-ramp to cloud 20.
- Cloud 20 could also receive documents from document provider 12 by other means, for example, by encapsulation within an e-mail.
- interface 21 pushes the print job to job management services 22.
- job management services 22 pushes the print job to imaging services 23.
- image services 23 encrypts the document to produce an encrypted document.
- the document can be encrypted using any standard or non-standard encryption technique.
- the encrypted document is sent from imaging services 23 to rendering services 24.
- Rendering services 24 renders the encrypted document to produce a rendered encrypted document.
- cloud interface 25 acting as an off ramp, pulls the rendered encrypted document.
- the print job, including the rendered encrypted document is sent from interface 25 to printer 14.
- printer 14 prints the rendered encrypted document to produce a printed encrypted document.
- Figure 3 is a simplified flowchart that describes decryption of a printed encrypted document in order to produce an unencrypted document that is printed.
- a scanner to scan the printed encrypted document.
- the scanner is incorporated as part of printer 14.
- user 12 is verified as having authorization to receive a print out of the original decrypted version of the scanned encrypted document. For example this is done by user 12 logging in to e-print center 13 or printer 14 and then presenting a required authorization that certifies user 12 has
- the log-in may be performed, for example, by the user using a console of printer 14. Alternatively, the log-in may be performed via an interface for e-print center 13.
- e-print center 13 can check an internal database that contains electronic copies of printed out encrypted documents along with a list of those authorized to obtain a decrypted document. E-print center 13 can then compare the scanned encrypted document with electronic copies of encrypted documents stored in the internal database to obtain the list of those authorized to obtain the original document. E-print center 13 can thereby identify user 12 as authorized to print out an unencrypted version of the scanned encrypted document. [0023] Alternatively, e-print center 13 can use other ways to identify user 12 as authorized to obtain the original of the scanned encrypted document.
- e-print center 13 can check information encoded on the scanned document to identify the document and based on stored records for the document determine which users are authorized to print out an unencrypted version of the document.
- e-print center 13 could use other stored data to determine whether user 12 is authorized to print out an unencrypted version of the document.
- the choice of encryption scheme could provide security against an unauthorized user inappropriately obtaining a decrypted version of a document.
- This could be implemented, for example, if user identification is used as part of an encryption key to encrypt a document. In such a case decryption would only be successful when the correct user identification is supplied for the decryption. In such a case, the log-in would be sufficient to identify user 12 as owner of the document.
- printer 14 submits a print job that includes the encrypted document that is to be decrypted and printed.
- Cloud 20 receives the print job via interface 25, which serves as an in-ramp to cloud 20.
- interface 25 pushes the print job to job management services 22.
- job management services 22 pushes the print job to imaging services 23.
- image services 23 decrypts the encrypted document to produce a decrypted document.
- the decrypted document is sent from imaging services 23 to rendering services 24.
- Rendering services 24 renders the decrypted document to produce a rendered decrypted document.
- cloud interface 25 acting as an off ramp, pulls the rendered decrypted document.
- the print job including the rendered decrypted document, is sent from interface 25 to printer 14.
- printer 14 prints the rendered decrypted document to produce a printed decrypted document.
- document provider 12 is notified that the decrypted document has been printed. This notification is sent, for example, by e-print center 13 or printer 14. Sending the notification is not necessarily implemented for all embodiments, but can be an additional security measure, for example, when printing confidential information from a service provider such as a bank, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
La présente invention concerne le cryptage (36) d'un document pour produire un document crypté. Le document crypté est imprimé (40) pour produire un document crypté imprimé. Le document crypté imprimé est numérisé (51). Lors de la vérification de droits d'accès d'utilisateur au document, le document crypté imprimé numérisé est décrypté (56) pour recréer le document. Le document recréé est imprimé (60).
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2011/057704 WO2013062531A1 (fr) | 2011-10-25 | 2011-10-25 | Impression cryptée |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US2011/057704 WO2013062531A1 (fr) | 2011-10-25 | 2011-10-25 | Impression cryptée |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013062531A1 true WO2013062531A1 (fr) | 2013-05-02 |
Family
ID=48168205
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2011/057704 Ceased WO2013062531A1 (fr) | 2011-10-25 | 2011-10-25 | Impression cryptée |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2013062531A1 (fr) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015005922A1 (fr) * | 2013-07-11 | 2015-01-15 | Hewlett-Packard Development Company, L.P. | Impression de documents composites |
| US9916464B2 (en) | 2014-02-03 | 2018-03-13 | Hewlett-Packard Development Company, L.P. | Replacement text for textual content to be printed |
| US11176434B2 (en) | 2017-07-17 | 2021-11-16 | Hewlett-Packard Development Company, L.P. | Encrypted printing |
| US11290617B2 (en) | 2017-04-20 | 2022-03-29 | Hewlett-Packard Development Company, L.P. | Document security |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6862583B1 (en) * | 1999-10-04 | 2005-03-01 | Canon Kabushiki Kaisha | Authenticated secure printing |
| US20050154884A1 (en) * | 2003-11-27 | 2005-07-14 | Oce-Technologies B.V. | Secure data transmission in a network system of image processing devices |
| US20100302579A1 (en) * | 2009-06-01 | 2010-12-02 | Jayasimha Nuggehalli | Printing and scanning with cloud storage |
-
2011
- 2011-10-25 WO PCT/US2011/057704 patent/WO2013062531A1/fr not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6862583B1 (en) * | 1999-10-04 | 2005-03-01 | Canon Kabushiki Kaisha | Authenticated secure printing |
| US20050154884A1 (en) * | 2003-11-27 | 2005-07-14 | Oce-Technologies B.V. | Secure data transmission in a network system of image processing devices |
| US20100302579A1 (en) * | 2009-06-01 | 2010-12-02 | Jayasimha Nuggehalli | Printing and scanning with cloud storage |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015005922A1 (fr) * | 2013-07-11 | 2015-01-15 | Hewlett-Packard Development Company, L.P. | Impression de documents composites |
| CN105283832A (zh) * | 2013-07-11 | 2016-01-27 | 惠普发展公司,有限责任合伙企业 | 打印复合文档 |
| US9645775B2 (en) | 2013-07-11 | 2017-05-09 | Hewlett-Packard Development Company, L.P. | Printing composite documents |
| CN105283832B (zh) * | 2013-07-11 | 2018-09-18 | 惠普发展公司,有限责任合伙企业 | 打印复合文档 |
| US9916464B2 (en) | 2014-02-03 | 2018-03-13 | Hewlett-Packard Development Company, L.P. | Replacement text for textual content to be printed |
| US11290617B2 (en) | 2017-04-20 | 2022-03-29 | Hewlett-Packard Development Company, L.P. | Document security |
| US11176434B2 (en) | 2017-07-17 | 2021-11-16 | Hewlett-Packard Development Company, L.P. | Encrypted printing |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU780201B2 (en) | Remote printing of secure and/or authenticated documents | |
| US7606769B2 (en) | System and method for embedding user authentication information in encrypted data | |
| US8896858B2 (en) | Method for enforcing document privacy through third party systems | |
| US8245306B2 (en) | Digital rights management printing system | |
| CN101370069B (zh) | 图像加密/解密系统 | |
| US8924709B2 (en) | Print release with end to end encryption and print tracking | |
| US6977745B2 (en) | Method and apparatus for the secure printing of a document | |
| US20040190714A1 (en) | Data security in an information processing device | |
| JP5251752B2 (ja) | ユーザー及び印刷データの認証を用いてロック印刷データを印刷する方法 | |
| EP2323065A1 (fr) | Procédé et dispositif d'autorisation de partage entre support amovible sécurisé (srm) | |
| US20070283157A1 (en) | System and method for enabling secure communications from a shared multifunction peripheral device | |
| JP2003134327A (ja) | 画像読取装置およびプログラム | |
| WO2013062531A1 (fr) | Impression cryptée | |
| US7587045B2 (en) | System and method for securing document transmittal | |
| US20080198410A1 (en) | Print Management Device and Print Management Method | |
| JP2008301480A (ja) | Cacセキュリティ及びドキュメントセキュリティの向上 | |
| CN1967558A (zh) | 图像处理系统,信息处理设备,计算机可读记录介质以及信息处理方法 | |
| KR20170053459A (ko) | 정보 보호를 위한 파일 암복호화 방법 | |
| JP4396377B2 (ja) | 印刷制御システム、サーバ装置 | |
| JP2004152262A (ja) | ドキュメント印刷プログラム、ドキュメント保護プログラムおよびドキュメント保護システム | |
| US20120176651A1 (en) | Secure Watermarking of Print Jobs Using a Smartcard | |
| JP2006050535A (ja) | スキャナ装置、情報処理装置、画像データ暗号化方法、画像データ表示方法、画像データ暗号化プログラム及び画像データ表示プログラム | |
| US20090070581A1 (en) | System and method for centralized user identification for networked document processing devices | |
| JP6885150B2 (ja) | ファイル共有システム、ファイル共有装置、ファイル共有方法、及びファイル共有用プログラム | |
| JP5135239B2 (ja) | 画像形成システムおよびサーバ装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11874623 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 11874623 Country of ref document: EP Kind code of ref document: A1 |