US20120278624A1 - Information processing apparatus, print control apparatus, print control system, storage medium of storing computer-readable program, and program - Google Patents
Information processing apparatus, print control apparatus, print control system, storage medium of storing computer-readable program, and program Download PDFInfo
- Publication number
- US20120278624A1 US20120278624A1 US13/546,171 US201213546171A US2012278624A1 US 20120278624 A1 US20120278624 A1 US 20120278624A1 US 201213546171 A US201213546171 A US 201213546171A US 2012278624 A1 US2012278624 A1 US 2012278624A1
- Authority
- US
- United States
- Prior art keywords
- personal identification
- identification code
- random number
- encrypted
- converted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
Definitions
- the present invention relates to an encryption print technique which, in case of transmitting a print job from a host such as a personal computer or the like to a print device such as a printer or the like through a network, encrypts print job data and then transmits the encrypted data to protect the data from wiretap and falsification on the way.
- a job is first encrypted, the encrypted job is transmitted to the printer, and the transmitted job is stored in the printer as it is. Subsequently, a user walks up to the printer and confirms the job stored in the printer, and then the stored job is decoded (or decrypted) and printed for the first time.
- the user has to correctly identify or discriminate only the user's own job from among the stored jobs.
- the stored jobs themselves have been encrypted, it is impossible for the user to use a conventional method of scanning all the stored jobs to extract only the job of which the header portion includes an ID corresponding to a user's own ID.
- FIG. 6 is a schematic diagram conceptually showing such a problem as described above. That is, as shown in FIG. 6 , host PC's (personal computers) 101 and 105 and a device 102 having a print function are mutually connected to others through a network 104 . Here, it is assumed that three encrypted print jobs (jobs 1 to 3 ) in all are transmitted from the host PC's 101 and 105 to the device 102 . In this case, the device 102 holds these encrypted jobs as it is in a job holding area 103 of the device 102 without executing them.
- jobs 1 to 3 three encrypted print jobs
- a problem in this case is how to recognize which of the three jobs 1 to 3 is the user's own job.
- FIG. 7 is a conceptional diagram for simply explaining the method described in the patent document 1. That is, according to the method of the patent document 1, a host PC 201 transmits print data 211 to a device 202 . Then, the device 202 which received the print data 211 generates a personal identification code 212 for uniquely identifying the received print data 211 , and then transmits the generated personal identification code 212 to the host PC 201 . After then, a user who received the personal identification code 212 from the device 202 on the side of the host PC 201 moves to the device 202 and inputs the received personal identification code 212 in the device 202 to identify the user's own job. Subsequently, the user acquires the output result from the user's own job.
- the patent document 1 is silent about job encryption for preventing wiretap. Furthermore, even if a print job has been encrypted, an attacker might attempt to damage print data or falsify the print job.
- an attacker's purpose of falsification of the print job is to attain wasting of paper and the like on the device side by causing the device side to output a large number of meaningless print results. In any case, although it is further necessary to cope with such attack, the patent document 1 is also silent about this.
- An object of the present invention is to solve such conventional problems as described above, eliminate necessity of executing an unsafe procedure that an ID number for identifying a job is notified from a print device to a host, and maintain security in printing.
- Another object of the present invention is to provide an information processing apparatus which comprises:
- a code reception unit adapted to receive a personal identification code input by a user
- a random number generation unit adapted to generate a random number
- a random number encryption unit adapted to encrypt the random number generated by the random number generation unit, by using the personal identification code or a key based on the personal identification code as an encryption key
- a code conversion unit adapted to convert the received personal identification code by using a predetermined function
- a print data encryption unit adapted to encrypt print data by using the random number as an encryption key
- the code conversion unit converts the personal identification code by using a one-way function.
- the code conversion unit generates a hash value of the personal identification code.
- the information processing apparatus further comprises a transmission unit adapted to transmit the encrypted random number, the converted personal identification code and the encrypted print data.
- Another object of the present invention is to provide a print control apparatus which comprises:
- a reception unit adapted to receive an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data
- a code reception unit adapted to receive a second personal identification code input by a user
- a code conversion unit adapted to convert the received second personal identification code by using a predetermined function
- a judgment unit adapted to judge whether or not the converted first personal identification code is the same as the converted second personal identification code
- a random number decryption unit adapted to, in a case where the converted first and second personal identification codes are the same, decrypt the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key;
- a print data decryption unit adapted to, in the case where the converted first and second personal identification codes are the same, decrypt the encrypted print data by using the decrypted random number as a decryption key.
- the code conversion unit converts the second personal identification code by using a one-way function.
- the code conversion unit generates a hash value of the second personal identification code.
- the print control apparatus further comprises a print processing unit adapted to execute a print process of the decrypted print data.
- Another object of the present invention is to provide a print control system which includes an information processing apparatus and a print control apparatus, wherein
- the information processing apparatus comprises:
- the print control apparatus comprises:
- the print control apparatus further comprises a print processing unit adapted to execute a print process of the decrypted print data.
- Another object of the present invention is to provide an information processing method comprising the steps of:
- the information processing method further comprises the step of transmitting the encrypted random number, the converted personal identification code and the encrypted print data.
- Another object of the present invention is to provide a print control method comprising the steps of:
- the print control method further comprises the step of executing a print process of the decrypted print data.
- Another object of the present invention is to provide a computer program for causing a computer to execute an information processing method, comprising:
- a code reception module for receiving a personal identification code input by a user
- a random number generation module for generating a random number
- a random number encryption module for encrypting the generated random number by using the personal identification code or a key based on the personal identification code as an encryption key
- a code conversion module for converting the received personal identification code by using a predetermined function
- a print data encryption module for encrypting print data by using the random number as an encryption key.
- Another object of the present invention is to provide a computer program for causing a computer to execute a print control method, comprising:
- a reception module for receiving an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data
- a code reception module for receiving a second personal identification code input by a user
- a code conversion module for converting the received second personal identification code by using a predetermined function
- a judgment module for judging whether or not the converted first personal identification code is the same as the converted second personal identification code
- a random number decryption module for, in a case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key;
- a print data decryption module for, in the case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted print data by using the decrypted random number as a decryption key.
- Another object of the present invention is to provide a computer-readable storage medium which stores a computer program for causing a computer to execute an information processing method, the computer program comprising:
- a code reception module for receiving a personal identification code input by a user
- a random number generation module for generating a random number
- a random number encryption module for encrypting the generated random number by using the personal identification code or a key based on the personal identification code as an encryption key
- a code conversion module for converting the received personal identification code by using a predetermined function
- a print data encryption module for encrypting print data by using the random number as an encryption key.
- Another object of the present invention is to provide a computer-readable storage medium which stores a computer program for causing a computer to execute a print control method, the computer program comprising:
- a reception module for receiving an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data
- a code reception module for receiving a second personal identification code input by a user
- a code conversion module for converting the received second personal identification code by using a predetermined function
- a judgment module for judging whether or not the converted first personal identification code is the same as the converted second personal identification code
- a random number decryption module for, in a case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key;
- a print data decryption module for, in the case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted print data by using the decrypted random number as a decryption key.
- FIG. 1 is a diagram showing the principle of an encrypted printing method according to the embodiment of the present invention.
- FIG. 2 is a block diagram showing the internal construction of a host PC or the internal construction of a print device, according to the embodiment
- FIG. 3 is a flow chart showing the operation of the host PC according to the embodiment.
- FIG. 4 is a flow chart showing the operation of the print device according to the embodiment.
- FIG. 5 is a diagram showing a memory map, in a storage medium, of software according to the embodiment.
- FIG. 6 is the conceptional diagram showing the job identification problem in the encrypted printing technique.
- FIG. 7 is the conceptional diagram showing one example of the job identification method according to the related background art.
- FIG. 2 is a block diagram showing the internal construction of a general computer.
- a host PC 101 or the controller unit of a print device 102 shown in FIG. 1 ) according to the first embodiment of the present invention has the same construction.
- numeral 300 denotes the entirety of a computer.
- the computer 300 includes a CPU (central processing unit) 301 which executes software (i.e., a computer program) stored in a ROM (read only memory) 302 or a large-scale storage device 311 such as an HD (hard disk) or the like, whereby the CPU 301 totally controls respective devices and units through a connected system bus 304 .
- numeral 312 denotes a timer which is used when the CPU 310 executes the controlling.
- Numeral 303 denotes a RAM (random access memory) which functions as a main memory, a working area and the like for the CPU 301
- numeral 305 denotes an external input controller (or a keyboard controller (KBDC)) which controls inputting of various indications and instructions from various buttons, a keyboard (KBD) 309 and the like provided on the computer 300
- numeral 306 denotes a display controller (DISPC) which controls displaying on a display module (DISPLAY) 310 .
- DISPC display controller
- Numeral 307 denotes a storage device controller (or a disk controller (DKC)) which controls accessing to the large-scale storage device 311 such as the HD or the like.
- DKC disk controller
- Numeral 308 denotes a network interface card (NIC) which bi-directionally exchanges data between the computer 300 and another network, a file server or the like through a LAN 104 .
- NIC network interface card
- FIG. 6 is the schematic diagram showing an example of the construction of the encrypted print system according to the present embodiment. That is, as shown in FIG. 6 , the host PC's 101 and 105 and the device (or a printer) 102 having the print function are mutually connected to others through the network 104 .
- the host PC's 101 and 105 and the device (or a printer) 102 having the print function are mutually connected to others through the network 104 .
- the device 102 holds these encrypted jobs as it is in the job holding area 103 of the device 102 without executing them.
- a user executes a predetermined operation to the device 102 , whereby the encrypted job is decrypted (or decoded) and printed.
- the device 102 includes the controller unit as described above and a not-shown printer engine unit.
- the controller unit and the printer engine unit may be integrated together into the device 102 or may be provided respectively as independent units.
- FIG. 1 is the diagram showing an encryption method of print job data and an identification method of a job, both according to the present embodiment.
- a random number rnd is generated to encrypt the print job, and the generated random number rnd is used as an encryption key for encrypting PDL (page-description language) data.
- the random number rnd is encrypted by using a hash value k of a PIN (personal identification number) code input by the user. Further, the hash value k is calculated, and the calculated hash value k is later used to identify the encrypted job on the side of the device 102 .
- a character string may be used as a PIN in addition to the number.
- the encrypted PDL data is set as a value C
- the hash value of PIN is set as a value k
- the hash value of k is set as a value B
- the value acquired by encrypting the random number rnd by using the hash value k as an encryption key is set as a value A.
- a set of the values A, B and C is transmitted from the side of the host PC 101 to the side of the device 102 .
- the hash value of the PIN input by the user is calculated and the acquired value is set as a value k′.
- the hash value of the value k′ is further calculated and the acquired value is set as a value B′.
- FIG. 3 is a flow chart showing a job encryption procedure on the side of the host PC 101 shown in FIG. 1 .
- the job encryption procedure shown in FIG. 3 is executed by the CPU 301 of the host PC 101 .
- data such as document data, text data, image data or the like to be printed is first converted by a printer driver module into data, i.e., PDL data, having a format capable being read by the printer, and then the converted data are sequentially transferred to the module which executes a procedure shown in FIG. 4 .
- the KBDC 305 is controlled in a step 501 to receive the PIN code which is input by the user through the KBD 309 .
- the random number rnd which is used to encrypt the PDL data in a later step is generated.
- an encryption key k which is used to further encrypt the encryption key which is used to encrypt the job is calculated based on the PIN code received in the step 501 .
- the PIN code is input to a hash function such as MD5 (Message Digest 5), SHA-1 (Secure Hash Algorithm 1) or the like and the hash value acquired as the output of the hash function is used as the encryption key k.
- a hash function such as MD5 (Message Digest 5), SHA-1 (Secure Hash Algorithm 1) or the like and the hash value acquired as the output of the hash function is used as the encryption key k.
- the random number rnd which is used to encrypt the PDL data is encrypted by using the value k calculated in the step 503 as the encryption key, and the calculated value is set as the value A.
- the PIN code itself may be used as the encryption key.
- the hash value of the value k calculated in the step 503 is further calculated, and the calculated value is set as the value B.
- the PDL data for the printing is encrypted by using the random number rnd generated in the step 502 as the encryption key, and the calculated value is set as the value C.
- the value A calculated in the step 504 , the value B calculated in the step 505 and the value C calculated in the step 506 are stored in a lump in the buffer provided in the temporary memory area on the RAM 303 for the purpose of transmission.
- the NIC 308 is controlled to transmit the transmission data provided in the step 507 to the device 102 through the LAN 104 . After the data transmission ends, the buffer on the RAM 303 is released.
- FIG. 4 is the flow chart showing the job identification method and the job decryption (decoding) procedure on the side of the device 102 shown in FIG. 1 .
- the device 102 receives the above transmission data transmitted from the host PC 101 .
- the KBDC 305 is controlled in a step 601 to receive the PIN code which is input by the user through the KBD 309 .
- the hash value k′ of the PIN code received in the step 601 is calculated.
- the hash value of the value k′ calculated in the step 602 is further calculated and the acquired value is set as the value B′.
- the flow advances to a step 605 .
- the value B is extracted from the header portion of the process-target job, and it is then judged whether or not the extracted value B is the same as the value B′ calculated in the step 603 .
- the flow advances to a step 606 .
- the value A is extracted from the header portion of the job, and the decryption (decoding) process is executed by using the value k′ calculated in the step 602 as the decryption key. Then, the acquired value is set as a value rnd′.
- the decryption (decoding) process in the step 606 only has to be executed to the value A by using the PIN code input in the step 601 as the decryption key.
- a subsequent step 607 the encrypted PDL data C is extracted from the job, and the decryption (decoding) process is executed by using the value rnd′ calculated in the step 606 as the decryption key. Then, the acquired value is set as the PDL data to be printed. Therefore, in a subsequent step 608 , a print process is executed to the PDL data acquired in the step 607 .
- step 608 ends, or if it is judged in the step 605 whether or not the extracted value B is not the same as the value B′, the flow returns to the step 604 to continue the process to a next job.
- a program to be executed by the host PC 101 or the device 102 according to the present embodiment may be externally installed and then executed by the host PC 101 or the device 102 .
- the present invention is applicable even in a case where the program is supplied to the host PC 101 or the device 102 through a storage medium such as a CD-ROM, a flash memory, a flexible disk or the like.
- the present invention is also applicable even in a case where an information group including the program is downloaded and supplied from an external storage medium to the host PC 101 or the device 102 through a network of an electronic mail, a personal computer communication or the like.
- FIG. 5 is a diagram showing a memory map of a CD-ROM being one example of the storage medium.
- numeral 9999 denotes an area where directory information has been stored
- numeral 9998 denotes an area where installed programs have been stored
- numeral 9997 denotes an area where control programs of a print client or a network printer have been stored.
- the directory information stored in the area 9999 indicates the area 9998 and the area 9997 .
- the installed program stored in the area 9998 is first loaded to the system and then executed by the CPU 301 .
- the control program of the print client or the network printer is read from the area 9997 where the control programs of the print client or the network printer have been stored, and the content of the ROM 302 is rewritten, or the control program is installed in the large-scale storage device 311 .
- a simple mask ROM cannot be used as the ROM 302 , that is, a rewritable ROM such as a flash ROM or the like should necessarily be used.
- the present embodiment may be applied to a system or an integrated apparatus which consists of plural devices (for example, a host computer, an interface equipment, a reader, etc.), or to an apparatus which comprises a single device.
- the object of the present invention can be achieved in a case where the storage medium storing the program codes of software to achieve the above functions of the present embodiment is supplied to a system or an apparatus and then a computer (or CPU or MPU) in the system or the apparatus reads and executes the program codes stored in the storage medium.
- a flexible disk for example, a flexible disk, a hard disk, an optical disk, a magnetooptical disk, a CR-ROM, a CD-R, a CD-RW, a DVD-ROM, a magnetic tape, a nonvolatile memory card, a ROM, an EEPROM, a silicon disk or the like can be used.
- the present invention includes not only a case where the above functions of the present embodiment are realized by executing the program codes read by the computer, but also a case where an OS (operating system) or the like functioning on the computer executes a part or all of the actual process according to instructions of the program codes, whereby the above functions of the present embodiment are achieved by that process.
- an OS operating system
- the present invention includes not only a case where the above functions of the present embodiment are realized by executing the program codes read by the computer, but also a case where an OS (operating system) or the like functioning on the computer executes a part or all of the actual process according to instructions of the program codes, whereby the above functions of the present embodiment are achieved by that process.
- the above functions of the present embodiment can be achieved in a case where the program code read from the storage medium is once written in a memory provided in a function expansion board inserted in the computer or a function expansion unit connected to the computer, and then a CPU or the like provided in the function expansion board or the function expansion unit executes a part or all of the actual process according to the instructions of the program.
- the present invention is also applicable to a case where, from the storage medium which stores the program codes of software to achieve the above functions of the present embodiment, the program code is delivered to a demander through a communication line in the form of a personal computer communication or the like.
- the value which is acquired by the hash function with respect to the PIN code input by the user is used as the key which is used to further encrypt the encryption key rnd which is used to encrypt the PDL data.
- the present invention is not limited to such a method. That is, to achieve the above functions of the first embodiment, it is possible to use any one-way function which converts the PIN code and by which conformity of the converted values can be confirmed.
- the number of calculation to acquire the hash value is one in the first embodiment.
- the means for receiving the PIN code input by the user, the means for generating the random number, the means for encrypting the generated random number, the means for converting the received PIN code into the value which cannot be easily inferred, and the means for encrypting the print job data are provided on the host side.
- the means for receiving the PIN code input by the user, the means for judging the authenticity of the received encrypted job, the means for calculating the encryption key of the encrypted job, and the means for decrypting the encrypted print job are provided on the device side.
Abstract
An information processing apparatus, which encrypts print data (PDL), receives a personal identification code (PIN) input by a user, generates a random number (rnd), encrypts the generated random number by using the personal identification code or an encryption key generated based on the personal identification code, converts the personal identification code by using a predetermined function, and encrypts print data by using the random number as an encryption key, thereby maintaining security in the printing.
Description
- This is a divisional of U.S. patent application Ser. No. 10/582,218, filed Jun. 8, 2006, and allowed on May 16, 2012.
- The present invention relates to an encryption print technique which, in case of transmitting a print job from a host such as a personal computer or the like to a print device such as a printer or the like through a network, encrypts print job data and then transmits the encrypted data to protect the data from wiretap and falsification on the way.
- In a system that print data is transmitted from a host such as a personal computer or the like to a printer and then printed, there is a potential risk that the print data is wiretapped or falsified on its transmission route.
- Moreover, after the print data is received by the printer, if the received data is automatically printed on a recording medium and the data-printed recording medium is automatically discharged as it always has been in the past, there is a potential risk that an attacker (that is, a person who acts maliciously) might take away an output printed material on the printer.
- To cope with these risks, it is necessary to improve the system. More specifically, in the improved system, a job is first encrypted, the encrypted job is transmitted to the printer, and the transmitted job is stored in the printer as it is. Subsequently, a user walks up to the printer and confirms the job stored in the printer, and then the stored job is decoded (or decrypted) and printed for the first time.
- Incidentally, in a case where the plural jobs are stored and held as a print queue in the printer, the user has to correctly identify or discriminate only the user's own job from among the stored jobs. However, since the stored jobs themselves have been encrypted, it is impossible for the user to use a conventional method of scanning all the stored jobs to extract only the job of which the header portion includes an ID corresponding to a user's own ID.
-
FIG. 6 is a schematic diagram conceptually showing such a problem as described above. That is, as shown inFIG. 6 , host PC's (personal computers) 101 and 105 and adevice 102 having a print function are mutually connected to others through anetwork 104. Here, it is assumed that three encrypted print jobs (jobs 1 to 3) in all are transmitted from the host PC's 101 and 105 to thedevice 102. In this case, thedevice 102 holds these encrypted jobs as it is in ajob holding area 103 of thedevice 102 without executing them. - Here, it is further assumed that a certain user A (not shown) who uses the
host PC 101 walks up to thedevice 102 and directly releases the user's own encrypted print job held therein with a view to start printing. - In this connection, a problem in this case is how to recognize which of the three
jobs 1 to 3 is the user's own job. - More specifically, since the stored jobs have been encrypted, it is impossible to use a method of extracting from among the stored jobs the job of which the user identifier embedded in the header thereof corresponds to the user's ID. On another front, a method of not encrypting only the portion of the user identifier is devised. However, if this method is used, a secret of the fact that the user A executes the printing cannot be maintained, whereby it is undesirable for a security reason.
- As just described, in the case where the plural jobs have been stored and held in the printer, some kind or another method of identifying the job of the relevant user from among the stored jobs is necessary so as to correctly print the relevant job.
- Incidentally, as the related background art concerning identification of the job stored and held in the printer, there is a method as described in, e.g., Japanese Patent Application Laid-Open No. 2001-105690 (hereinafter called a patent document 1).
-
FIG. 7 is a conceptional diagram for simply explaining the method described in thepatent document 1. That is, according to the method of thepatent document 1, ahost PC 201 transmitsprint data 211 to adevice 202. Then, thedevice 202 which received theprint data 211 generates apersonal identification code 212 for uniquely identifying the receivedprint data 211, and then transmits the generatedpersonal identification code 212 to the host PC 201. After then, a user who received thepersonal identification code 212 from thedevice 202 on the side of the host PC 201 moves to thedevice 202 and inputs the receivedpersonal identification code 212 in thedevice 202 to identify the user's own job. Subsequently, the user acquires the output result from the user's own job. - However, in the method of the
patent document 1, it is necessary to execute an unsafe procedure that a number for protecting the encrypted print job is notified from the device side to the host side on the way. - Moreover, the
patent document 1 is silent about job encryption for preventing wiretap. Furthermore, even if a print job has been encrypted, an attacker might attempt to damage print data or falsify the print job. Here, it should be noted that an attacker's purpose of falsification of the print job is to attain wasting of paper and the like on the device side by causing the device side to output a large number of meaningless print results. In any case, although it is further necessary to cope with such attack, thepatent document 1 is also silent about this. - An object of the present invention is to solve such conventional problems as described above, eliminate necessity of executing an unsafe procedure that an ID number for identifying a job is notified from a print device to a host, and maintain security in printing.
- Another object of the present invention is to provide an information processing apparatus which comprises:
- a code reception unit adapted to receive a personal identification code input by a user;
- a random number generation unit adapted to generate a random number;
- a random number encryption unit adapted to encrypt the random number generated by the random number generation unit, by using the personal identification code or a key based on the personal identification code as an encryption key;
- a code conversion unit adapted to convert the received personal identification code by using a predetermined function; and a print data encryption unit adapted to encrypt print data by using the random number as an encryption key.
- Here, for example, it is preferable that the code conversion unit converts the personal identification code by using a one-way function.
- Here, for example, it is preferable that the code conversion unit generates a hash value of the personal identification code.
- Here, for example, it is preferable that the information processing apparatus further comprises a transmission unit adapted to transmit the encrypted random number, the converted personal identification code and the encrypted print data.
- Another object of the present invention is to provide a print control apparatus which comprises:
- a reception unit adapted to receive an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data;
- a code reception unit adapted to receive a second personal identification code input by a user;
- a code conversion unit adapted to convert the received second personal identification code by using a predetermined function;
- a judgment unit adapted to judge whether or not the converted first personal identification code is the same as the converted second personal identification code;
- a random number decryption unit adapted to, in a case where the converted first and second personal identification codes are the same, decrypt the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
- a print data decryption unit adapted to, in the case where the converted first and second personal identification codes are the same, decrypt the encrypted print data by using the decrypted random number as a decryption key.
- Here, for example, it is preferable that the code conversion unit converts the second personal identification code by using a one-way function.
- Here, for example, it is preferable that the code conversion unit generates a hash value of the second personal identification code.
- Here, for example, it is preferable that the print control apparatus further comprises a print processing unit adapted to execute a print process of the decrypted print data.
- Another object of the present invention is to provide a print control system which includes an information processing apparatus and a print control apparatus, wherein
- the information processing apparatus comprises:
-
- a first code reception unit adapted to receive a first personal identification code input by a user;
- a random number generation unit adapted to generate a random number;
- a random number encryption unit adapted to encrypt the generated random number by using the first personal identification code or a key based on the first personal identification code as an encryption key;
- a first code conversion unit adapted to convert the received first personal identification code by using a predetermined function;
- a print data encryption unit adapted to encrypt print data by using the random number as an encryption key; and
- a transmission unit adapted to transmit the encrypted random number, the converted first personal identification code and the encrypted print data to the print control apparatus, and
- the print control apparatus comprises:
-
- a reception unit adapted to receive the encrypted random number, the converted first personal identification code and the encrypted print data from the information processing apparatus;
- a second code reception unit adapted to receive a second personal identification code input by the user;
- a second code conversion unit adapted to convert the received second personal identification code by using a predetermined function;
- a judgment unit adapted to judge whether or not the first personal identification code converted by the first code conversion unit is the same as the second personal identification code converted by the second code conversion unit;
- a random number decryption unit adapted to, in a case where the judgment unit judges that the converted first and second personal identification codes are the same, decrypt the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
- a print data decryption unit adapted to, in the case where the judgment unit judges that the converted first and second personal identification codes are the same, decrypt the encrypted print data by using the decrypted random number as a decryption key.
- Here, for example, it is preferable that the print control apparatus further comprises a print processing unit adapted to execute a print process of the decrypted print data.
- Another object of the present invention is to provide an information processing method comprising the steps of:
- receiving a personal identification code input by a user;
- generating a random number;
- encrypting the generated random number by using the personal identification code or a key based on the personal identification code as an encryption key;
- converting the personal identification code by using a predetermined function; and
- encrypting print data by using the random number as an encryption key.
- Here, for example, it is preferable that the information processing method further comprises the step of transmitting the encrypted random number, the converted personal identification code and the encrypted print data.
- Another object of the present invention is to provide a print control method comprising the steps of:
- receiving an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data;
- receiving a second personal identification code input by a user;
- converting the received second personal identification code by using a predetermined function;
- judging whether or not the converted first personal identification code is the same as the converted second personal identification code;
- in a case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
- in the case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted print data by using the decrypted random number as a decryption key.
- Here, for example, it is preferable that the print control method further comprises the step of executing a print process of the decrypted print data.
- Another object of the present invention is to provide a computer program for causing a computer to execute an information processing method, comprising:
- a code reception module for receiving a personal identification code input by a user;
- a random number generation module for generating a random number;
- a random number encryption module for encrypting the generated random number by using the personal identification code or a key based on the personal identification code as an encryption key;
- a code conversion module for converting the received personal identification code by using a predetermined function; and
- a print data encryption module for encrypting print data by using the random number as an encryption key.
- Another object of the present invention is to provide a computer program for causing a computer to execute a print control method, comprising:
- a reception module for receiving an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data;
- a code reception module for receiving a second personal identification code input by a user;
- a code conversion module for converting the received second personal identification code by using a predetermined function;
- a judgment module for judging whether or not the converted first personal identification code is the same as the converted second personal identification code;
- a random number decryption module for, in a case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
- a print data decryption module for, in the case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted print data by using the decrypted random number as a decryption key.
- Another object of the present invention is to provide a computer-readable storage medium which stores a computer program for causing a computer to execute an information processing method, the computer program comprising:
- a code reception module for receiving a personal identification code input by a user;
- a random number generation module for generating a random number;
- a random number encryption module for encrypting the generated random number by using the personal identification code or a key based on the personal identification code as an encryption key;
- a code conversion module for converting the received personal identification code by using a predetermined function; and
- a print data encryption module for encrypting print data by using the random number as an encryption key.
- Another object of the present invention is to provide a computer-readable storage medium which stores a computer program for causing a computer to execute a print control method, the computer program comprising:
- a reception module for receiving an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data;
- a code reception module for receiving a second personal identification code input by a user;
- a code conversion module for converting the received second personal identification code by using a predetermined function;
- a judgment module for judging whether or not the converted first personal identification code is the same as the converted second personal identification code;
- a random number decryption module for, in a case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
- a print data decryption module for, in the case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted print data by using the decrypted random number as a decryption key.
- The above-described objects and other objects of the present invention will become apparent from the following description in conjunction with the accompanying drawings.
-
FIG. 1 is a diagram showing the principle of an encrypted printing method according to the embodiment of the present invention; -
FIG. 2 is a block diagram showing the internal construction of a host PC or the internal construction of a print device, according to the embodiment; -
FIG. 3 is a flow chart showing the operation of the host PC according to the embodiment; -
FIG. 4 is a flow chart showing the operation of the print device according to the embodiment; -
FIG. 5 is a diagram showing a memory map, in a storage medium, of software according to the embodiment; -
FIG. 6 is the conceptional diagram showing the job identification problem in the encrypted printing technique; and -
FIG. 7 is the conceptional diagram showing one example of the job identification method according to the related background art. -
FIG. 2 is a block diagram showing the internal construction of a general computer. Here, it should be noted that ahost PC 101 or the controller unit of a print device 102 (shown inFIG. 1 ) according to the first embodiment of the present invention has the same construction. - In
FIG. 2 , numeral 300 denotes the entirety of a computer. Here, thecomputer 300 includes a CPU (central processing unit) 301 which executes software (i.e., a computer program) stored in a ROM (read only memory) 302 or a large-scale storage device 311 such as an HD (hard disk) or the like, whereby theCPU 301 totally controls respective devices and units through a connectedsystem bus 304. Moreover, numeral 312 denotes a timer which is used when theCPU 310 executes the controlling. -
Numeral 303 denotes a RAM (random access memory) which functions as a main memory, a working area and the like for theCPU 301, numeral 305 denotes an external input controller (or a keyboard controller (KBDC)) which controls inputting of various indications and instructions from various buttons, a keyboard (KBD) 309 and the like provided on thecomputer 300, and numeral 306 denotes a display controller (DISPC) which controls displaying on a display module (DISPLAY) 310. -
Numeral 307 denotes a storage device controller (or a disk controller (DKC)) which controls accessing to the large-scale storage device 311 such as the HD or the like. -
Numeral 308 denotes a network interface card (NIC) which bi-directionally exchanges data between thecomputer 300 and another network, a file server or the like through aLAN 104. -
FIG. 6 is the schematic diagram showing an example of the construction of the encrypted print system according to the present embodiment. That is, as shown inFIG. 6 , the host PC's 101 and 105 and the device (or a printer) 102 having the print function are mutually connected to others through thenetwork 104. Here, it is assumed that three encrypted print jobs (thejobs 1 to 3) in all are transmitted from the host PC's 101 and/or 105 to thedevice 102. In this case, thedevice 102 holds these encrypted jobs as it is in thejob holding area 103 of thedevice 102 without executing them. After then, a user executes a predetermined operation to thedevice 102, whereby the encrypted job is decrypted (or decoded) and printed. - The
device 102 includes the controller unit as described above and a not-shown printer engine unit. Here, it should be noted that the controller unit and the printer engine unit may be integrated together into thedevice 102 or may be provided respectively as independent units. -
FIG. 1 is the diagram showing an encryption method of print job data and an identification method of a job, both according to the present embodiment. - In the
host PC 101, under the control of the CPU 301 (FIG. 2 ), a random number rnd is generated to encrypt the print job, and the generated random number rnd is used as an encryption key for encrypting PDL (page-description language) data. Here, the random number rnd is encrypted by using a hash value k of a PIN (personal identification number) code input by the user. Further, the hash value k is calculated, and the calculated hash value k is later used to identify the encrypted job on the side of thedevice 102. Incidentally, it should be noted that a character string may be used as a PIN in addition to the number. - Here, it is assumed that the encrypted PDL data is set as a value C, the hash value of PIN is set as a value k, the hash value of k is set as a value B, and the value acquired by encrypting the random number rnd by using the hash value k as an encryption key is set as a value A. With that, a set of the values A, B and C is transmitted from the side of the
host PC 101 to the side of thedevice 102. - Then, in the
device 102 which received the values A, B and C, the hash value of the PIN input by the user is calculated and the acquired value is set as a value k′. Subsequently, the hash value of the value k′ is further calculated and the acquired value is set as a value B′. With that, it is judged whether or not the received job is the job of the user who input the relevant PIN, by judging whether or not the value B being a part of the received data is the same as the calculated value B′. Then, if it is judged that the transmitted job is the job of the user who input the relevant PIN, the received data is decrypted (or decoded) and printed. -
FIG. 3 is a flow chart showing a job encryption procedure on the side of thehost PC 101 shown inFIG. 1 . - It should be noted that the job encryption procedure shown in
FIG. 3 is executed by theCPU 301 of thehost PC 101. Moreover, as a premise of this procedure, it is assumed that data such as document data, text data, image data or the like to be printed is first converted by a printer driver module into data, i.e., PDL data, having a format capable being read by the printer, and then the converted data are sequentially transferred to the module which executes a procedure shown inFIG. 4 . - In case of transmitting the print data, first, the
KBDC 305 is controlled in astep 501 to receive the PIN code which is input by the user through theKBD 309. In asubsequent step 502, the random number rnd which is used to encrypt the PDL data in a later step is generated. In asubsequent step 503, an encryption key k which is used to further encrypt the encryption key which is used to encrypt the job is calculated based on the PIN code received in thestep 501. In the present embodiment, it is assumed that the PIN code is input to a hash function such as MD5 (Message Digest 5), SHA-1 (Secure Hash Algorithm 1) or the like and the hash value acquired as the output of the hash function is used as the encryption key k. Then, in asubsequent step 504, the random number rnd which is used to encrypt the PDL data is encrypted by using the value k calculated in thestep 503 as the encryption key, and the calculated value is set as the value A. Here, it should be noted that the PIN code itself may be used as the encryption key. In asubsequent step 505, the hash value of the value k calculated in thestep 503 is further calculated, and the calculated value is set as the value B. Moreover, in asubsequent step 506, the PDL data for the printing is encrypted by using the random number rnd generated in thestep 502 as the encryption key, and the calculated value is set as the value C. Then, in asubsequent step 507, the value A calculated in thestep 504, the value B calculated in thestep 505 and the value C calculated in thestep 506 are stored in a lump in the buffer provided in the temporary memory area on theRAM 303 for the purpose of transmission. After that, in asubsequent step 508, theNIC 308 is controlled to transmit the transmission data provided in thestep 507 to thedevice 102 through theLAN 104. After the data transmission ends, the buffer on theRAM 303 is released. - Incidentally, in the flow chart of
FIG. 3 , it may reverse the order of the process of thestep 501 and the process of thestep 502. -
FIG. 4 is the flow chart showing the job identification method and the job decryption (decoding) procedure on the side of thedevice 102 shown inFIG. 1 . Here, it should be noted that thedevice 102 receives the above transmission data transmitted from thehost PC 101. - Besides, it should be noted that the procedure shown in the flow chart of
FIG. 4 is executed by theCPU 301 provided in thedevice 102. - In case of identifying and decrypting (decoding) the job, first, the
KBDC 305 is controlled in astep 601 to receive the PIN code which is input by the user through theKBD 309. In asubsequent step 602, the hash value k′ of the PIN code received in thestep 601 is calculated. Then, in asubsequent step 603, the hash value of the value k′ calculated in thestep 602 is further calculated and the acquired value is set as the value B′. Next, in asubsequent step 604, it is judged whether or not the job identification process is executed to all the jobs held in the job holding area 103 (FIG. 6 ) of thedevice 102. - If it is judged that the job identification process is executed to all the jobs, the job decryption (decoding) procedure ends.
- To the contrary, if it is judged that the job identification process is not yet executed to all the jobs, the flow advances to a
step 605. In thestep 605, the value B is extracted from the header portion of the process-target job, and it is then judged whether or not the extracted value B is the same as the value B′ calculated in thestep 603. - If it is judged that the values B and B′ are the same, the flow advances to a
step 606. In thestep 606, the value A is extracted from the header portion of the job, and the decryption (decoding) process is executed by using the value k′ calculated in thestep 602 as the decryption key. Then, the acquired value is set as a value rnd′. - Incidentally, when the value acquired by encrypting the key rnd with use of the PIN code itself is set as the value A in the
step 504 ofFIG. 3 , the decryption (decoding) process in thestep 606 only has to be executed to the value A by using the PIN code input in thestep 601 as the decryption key. - In a
subsequent step 607, the encrypted PDL data C is extracted from the job, and the decryption (decoding) process is executed by using the value rnd′ calculated in thestep 606 as the decryption key. Then, the acquired value is set as the PDL data to be printed. Therefore, in asubsequent step 608, a print process is executed to the PDL data acquired in thestep 607. - If the process in the
step 608 ends, or if it is judged in thestep 605 whether or not the extracted value B is not the same as the value B′, the flow returns to thestep 604 to continue the process to a next job. - Here, it should be noted that a program to be executed by the
host PC 101 or thedevice 102 according to the present embodiment may be externally installed and then executed by thehost PC 101 or thedevice 102. In that case, the present invention is applicable even in a case where the program is supplied to thehost PC 101 or thedevice 102 through a storage medium such as a CD-ROM, a flash memory, a flexible disk or the like. Besides, the present invention is also applicable even in a case where an information group including the program is downloaded and supplied from an external storage medium to thehost PC 101 or thedevice 102 through a network of an electronic mail, a personal computer communication or the like. -
FIG. 5 is a diagram showing a memory map of a CD-ROM being one example of the storage medium. InFIG. 5 , numeral 9999 denotes an area where directory information has been stored, numeral 9998 denotes an area where installed programs have been stored, and numeral 9997 denotes an area where control programs of a print client or a network printer have been stored. Here, it should be noted that the directory information stored in thearea 9999 indicates thearea 9998 and thearea 9997. In a case where the control program of the print client or the network printer is installed into thehost PC 101 or thedevice 102, the installed program stored in thearea 9998 is first loaded to the system and then executed by theCPU 301. Subsequently, by the installed program executed by theCPU 301, the control program of the print client or the network printer is read from thearea 9997 where the control programs of the print client or the network printer have been stored, and the content of theROM 302 is rewritten, or the control program is installed in the large-scale storage device 311. In that case, a simple mask ROM cannot be used as theROM 302, that is, a rewritable ROM such as a flash ROM or the like should necessarily be used. - Incidentally, the present embodiment may be applied to a system or an integrated apparatus which consists of plural devices (for example, a host computer, an interface equipment, a reader, etc.), or to an apparatus which comprises a single device.
- Moreover, it is needless to say that the object of the present invention can be achieved in a case where the storage medium storing the program codes of software to achieve the above functions of the present embodiment is supplied to a system or an apparatus and then a computer (or CPU or MPU) in the system or the apparatus reads and executes the program codes stored in the storage medium.
- In that case, the program codes themselves read from the storage medium achieve the novel functions of the present invention, whereby the storage medium which stores these program codes constitutes the present invention.
- As the storage medium for supplying the program codes, for example, a flexible disk, a hard disk, an optical disk, a magnetooptical disk, a CR-ROM, a CD-R, a CD-RW, a DVD-ROM, a magnetic tape, a nonvolatile memory card, a ROM, an EEPROM, a silicon disk or the like can be used.
- Moreover, the present invention includes not only a case where the above functions of the present embodiment are realized by executing the program codes read by the computer, but also a case where an OS (operating system) or the like functioning on the computer executes a part or all of the actual process according to instructions of the program codes, whereby the above functions of the present embodiment are achieved by that process.
- Furthermore, the above functions of the present embodiment can be achieved in a case where the program code read from the storage medium is once written in a memory provided in a function expansion board inserted in the computer or a function expansion unit connected to the computer, and then a CPU or the like provided in the function expansion board or the function expansion unit executes a part or all of the actual process according to the instructions of the program.
- Incidentally, it is needless to say that the present invention is also applicable to a case where, from the storage medium which stores the program codes of software to achieve the above functions of the present embodiment, the program code is delivered to a demander through a communication line in the form of a personal computer communication or the like.
- Hereinafter, the second embodiment of the present invention will be explained.
- In the above first embodiment, the value which is acquired by the hash function with respect to the PIN code input by the user is used as the key which is used to further encrypt the encryption key rnd which is used to encrypt the PDL data. However, the present invention is not limited to such a method. That is, to achieve the above functions of the first embodiment, it is possible to use any one-way function which converts the PIN code and by which conformity of the converted values can be confirmed.
- For example, the number of calculation to acquire the hash value is one in the first embodiment. However, it is possible to adopt a method of executing the calculation according to the hash function twice. That is, in this method, the output result acquired in the calculation by the hash function is again input to the hash function. In addition, it is possible to adopt a method of first calculating XOR (exclusive OR) of a predetermined number and the PIN code, calculating the hash value of the XOR result, and repeating this operation plural times.
- Of course, in these methods, when the job is identified on the side of the device, it is necessary to adopt the same method of dealing with the PIN code as the method used on the side of the host PC.
- As described above, in the first and second embodiments, the means for receiving the PIN code input by the user, the means for generating the random number, the means for encrypting the generated random number, the means for converting the received PIN code into the value which cannot be easily inferred, and the means for encrypting the print job data are provided on the host side.
- Moreover, the means for receiving the PIN code input by the user, the means for judging the authenticity of the received encrypted job, the means for calculating the encryption key of the encrypted job, and the means for decrypting the encrypted print job are provided on the device side.
- Therefore, it is possible to encrypt and transmit the print data without executing the unsafe procedure that the number for protecting the encrypted print job is notified from the device side to the host side. Moreover, it is possible on the device side to identify the job without executing the above unsafe procedure. In addition, it is possible to eliminate the risk that the print data is falsified on the way. That is, the ID for identifying the job is automatically generated as the random number, and the generated random number is encrypted, whereby high-level security such as falsification detection and the like can be maintained.
- Here, it should be noted that the above first and second embodiments merely show the examples of concretization of the present invention. Thus, by these embodiments, the technical concept of the present invention must not be interpreted limitedly. In other words, widely different embodiments of the present invention can be made without departing from the spirit and scope thereof.
- In conclusion, although the present invention has been described with reference to the preferred embodiments, it is to be understood that the present invention is not limited to these embodiments. That is, the present invention is intended to cover various modifications included within the spirit and scope of the appended claims.
- This application claims priority from Japanese Patent Application No. 2004-053294 filed Feb. 27, 2004, which is hereby incorporated by reference herein.
Claims (7)
1. A print control apparatus comprising:
a reception unit configured to receive an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data;
a code reception unit configured to receive a second personal identification code input by a user;
a code conversion unit configured to convert the received second personal identification code by using a predetermined function;
a judgment unit configured to judge whether or not the converted first personal identification code is the same as the converted second personal identification code;
a random number decryption unit configured to, in a case where the converted first and second personal identification codes are the same, decrypt the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
a print data decryption unit configured to, in the case where the converted first and second personal identification codes are the same, decrypt the encrypted print data by using the decrypted random number as a decryption key.
2. A print control apparatus according to claim 1 , wherein said code conversion unit converts the second personal identification code by using a one-way function.
3. A print control apparatus according to claim 2 , wherein said code conversion unit generates a hash value of the second personal identification code.
4. A print control apparatus according to claim 1 , further comprising a print processing unit configured to execute a print process of the decrypted print data.
5. A print control method comprising the steps of:
receiving an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data;
receiving a second personal identification code input by a user;
converting the received second personal identification code by using a predetermined function;
judging whether or not the converted first personal identification code is the same as the converted second personal identification code;
in a case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
in the case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted print data by using the decrypted random number as a decryption key.
6. A print control method according to claim 5 , further comprising the step of executing a print process of the decrypted print data.
7. A non-transitory computer-readable storage medium which stores a computer-executable program for causing a computer to execute a print control method, said computer program comprising:
a reception module for receiving an encrypted random number, a first personal identification code subjected to predetermined conversion, and encrypted print data;
a code reception module for receiving a second personal identification code input by a user;
a code conversion module for converting the received second personal identification code by using a predetermined function;
a judgment module for judging whether or not the converted first personal identification code is the same as the converted second personal identification code;
a random number decryption module for, in a case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted random number by using the second personal identification code or a key based on the second personal identification code as a decryption key; and
a print data decryption module for, in the case where it is judged that the converted first and second personal identification codes are the same, decrypting the encrypted print data by using the decrypted random number as a decryption key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/546,171 US20120278624A1 (en) | 2004-02-27 | 2012-07-11 | Information processing apparatus, print control apparatus, print control system, storage medium of storing computer-readable program, and program |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-053294 | 2004-02-27 | ||
JP2004053294A JP4290036B2 (en) | 2004-02-27 | 2004-02-27 | Information processing apparatus and print control apparatus |
PCT/JP2005/003253 WO2005083927A1 (en) | 2004-02-27 | 2005-02-22 | Information processing apparatus, print control apparatus, print control system |
US10/582,218 US8239328B2 (en) | 2004-02-27 | 2005-02-22 | Information processing apparatus, print control apparatus, printed control system |
US13/546,171 US20120278624A1 (en) | 2004-02-27 | 2012-07-11 | Information processing apparatus, print control apparatus, print control system, storage medium of storing computer-readable program, and program |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/003253 Division WO2005083927A1 (en) | 2004-02-27 | 2005-02-22 | Information processing apparatus, print control apparatus, print control system |
US11/582,218 Division US7788784B2 (en) | 2006-10-17 | 2006-10-17 | Method of assembling composite structure |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120278624A1 true US20120278624A1 (en) | 2012-11-01 |
Family
ID=34908733
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/582,218 Active 2027-05-17 US8239328B2 (en) | 2004-02-27 | 2005-02-22 | Information processing apparatus, print control apparatus, printed control system |
US13/546,171 Abandoned US20120278624A1 (en) | 2004-02-27 | 2012-07-11 | Information processing apparatus, print control apparatus, print control system, storage medium of storing computer-readable program, and program |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/582,218 Active 2027-05-17 US8239328B2 (en) | 2004-02-27 | 2005-02-22 | Information processing apparatus, print control apparatus, printed control system |
Country Status (3)
Country | Link |
---|---|
US (2) | US8239328B2 (en) |
JP (1) | JP4290036B2 (en) |
WO (1) | WO2005083927A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110314295A1 (en) * | 2010-06-22 | 2011-12-22 | Boris Dolgunov | Storage Device and Method for Communicating a Password between First and Second Storage Devices Using a Double-Encryption Scheme |
US20130297944A1 (en) * | 2007-07-27 | 2013-11-07 | Microsoft Corporation | Integrity protected smart card transaction |
US20170277882A1 (en) * | 2014-09-24 | 2017-09-28 | Nokia Technologies Oy | Controlling a device |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8577684B2 (en) | 2005-07-13 | 2013-11-05 | Intellisist, Inc. | Selective security masking within recorded speech utilizing speech recognition techniques |
US8433915B2 (en) * | 2006-06-28 | 2013-04-30 | Intellisist, Inc. | Selective security masking within recorded speech |
US10193689B2 (en) * | 2010-05-19 | 2019-01-29 | International Business Machines Corporation | Storing access information in a dispersed storage network |
US10911230B2 (en) | 2010-05-19 | 2021-02-02 | Pure Storage, Inc. | Securely activating functionality of a computing device in a dispersed storage network |
US20120284534A1 (en) * | 2011-05-04 | 2012-11-08 | Chien-Kang Yang | Memory Device and Method for Accessing the Same |
US9819798B2 (en) | 2013-03-14 | 2017-11-14 | Intellisist, Inc. | Computer-implemented system and method for efficiently facilitating appointments within a call center via an automatic call distributor |
JP6216662B2 (en) * | 2014-02-28 | 2017-10-18 | 日本電産コパル株式会社 | ENCRYPTED COMMUNICATION DEVICE, ENCRYPTED COMMUNICATION SYSTEM, AND ENCRYPTED COMMUNICATION METHOD |
CN105790954B (en) * | 2016-03-02 | 2019-04-09 | 布比(北京)网络技术有限公司 | A kind of method and system constructing electronic evidence |
US10754978B2 (en) | 2016-07-29 | 2020-08-25 | Intellisist Inc. | Computer-implemented system and method for storing and retrieving sensitive information |
CN109726574A (en) * | 2018-12-29 | 2019-05-07 | 杭州趣链科技有限公司 | A kind of electronic proof system that can not be distorted based on block chain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6360320B2 (en) * | 1997-04-23 | 2002-03-19 | Sony Corporation | Information processing apparatus, information processing method, information processing system and recording medium using an apparatus id and provided license key for authentication of each information to be processed |
US6378070B1 (en) * | 1998-01-09 | 2002-04-23 | Hewlett-Packard Company | Secure printing |
US20040125402A1 (en) * | 2002-09-13 | 2004-07-01 | Yoichi Kanai | Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy |
US20050163549A1 (en) * | 2002-08-30 | 2005-07-28 | Toshihiro Shima | Printer and print system, and data receiving device and data transmitting and receiving system |
US20050235148A1 (en) * | 1998-02-13 | 2005-10-20 | Scheidt Edward M | Access system utilizing multiple factor identification and authentication |
US6996714B1 (en) * | 2001-12-14 | 2006-02-07 | Cisco Technology, Inc. | Wireless authentication protocol |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05167575A (en) | 1991-12-18 | 1993-07-02 | Fujitsu Ltd | Ciphering transmission system |
JPH05327748A (en) | 1992-05-27 | 1993-12-10 | Fujitsu Ltd | Multi-address communication system |
KR970024712A (en) | 1995-10-16 | 1997-05-30 | 이데이 노부유키 | Encryption method and encryption device and recording method and decryption method and decryption device and recording medium |
JPH103256A (en) | 1995-10-16 | 1998-01-06 | Sony Corp | Ciphering method and device therefor, recording method, decoding method and device therefor and recording medium |
US7003667B1 (en) | 1999-10-04 | 2006-02-21 | Canon Kabushiki Kaisha | Targeted secure printing |
JP2001105690A (en) | 1999-10-05 | 2001-04-17 | Sharp Corp | Image-forming apparatus and printing system and method for controlling printing |
AU2001272886A1 (en) * | 2000-10-11 | 2002-04-22 | Trustcopy Pte Ltd. | Remote printing of secure and/or authenticated documents |
US7103182B2 (en) * | 2001-03-19 | 2006-09-05 | Hewlett-Packard Development Company, L.P. | Public encryption of a stored print job |
JP4579452B2 (en) | 2001-05-25 | 2010-11-10 | キヤノン株式会社 | Output system and output system control method |
JP4136433B2 (en) | 2002-04-16 | 2008-08-20 | キヤノン株式会社 | Printing apparatus, information processing apparatus, print server, printing apparatus, printing system control method, and information processing method |
-
2004
- 2004-02-27 JP JP2004053294A patent/JP4290036B2/en not_active Expired - Fee Related
-
2005
- 2005-02-22 WO PCT/JP2005/003253 patent/WO2005083927A1/en active Application Filing
- 2005-02-22 US US10/582,218 patent/US8239328B2/en active Active
-
2012
- 2012-07-11 US US13/546,171 patent/US20120278624A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6360320B2 (en) * | 1997-04-23 | 2002-03-19 | Sony Corporation | Information processing apparatus, information processing method, information processing system and recording medium using an apparatus id and provided license key for authentication of each information to be processed |
US6378070B1 (en) * | 1998-01-09 | 2002-04-23 | Hewlett-Packard Company | Secure printing |
US20050235148A1 (en) * | 1998-02-13 | 2005-10-20 | Scheidt Edward M | Access system utilizing multiple factor identification and authentication |
US6996714B1 (en) * | 2001-12-14 | 2006-02-07 | Cisco Technology, Inc. | Wireless authentication protocol |
US20050163549A1 (en) * | 2002-08-30 | 2005-07-28 | Toshihiro Shima | Printer and print system, and data receiving device and data transmitting and receiving system |
US20040125402A1 (en) * | 2002-09-13 | 2004-07-01 | Yoichi Kanai | Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130297944A1 (en) * | 2007-07-27 | 2013-11-07 | Microsoft Corporation | Integrity protected smart card transaction |
US8966269B2 (en) * | 2007-07-27 | 2015-02-24 | Microsoft Corporation | Integrity protected smart card transaction |
US9075980B2 (en) | 2007-07-27 | 2015-07-07 | Microsoft Technology Licensing, Llc | Integrity protected smart card transaction |
US9305156B2 (en) | 2007-07-27 | 2016-04-05 | Microsoft Technology Licensing, Llc | Integrity protected smart card transaction |
US20110314295A1 (en) * | 2010-06-22 | 2011-12-22 | Boris Dolgunov | Storage Device and Method for Communicating a Password between First and Second Storage Devices Using a Double-Encryption Scheme |
US8694790B2 (en) * | 2010-06-22 | 2014-04-08 | Sandisk Il Ltd. | Storage device and method for communicating a password between first and second storage devices using a double-encryption scheme |
US20170277882A1 (en) * | 2014-09-24 | 2017-09-28 | Nokia Technologies Oy | Controlling a device |
US10642968B2 (en) * | 2014-09-24 | 2020-05-05 | Nokia Technologies Oy | Controlling a device |
Also Published As
Publication number | Publication date |
---|---|
US8239328B2 (en) | 2012-08-07 |
US20070124243A1 (en) | 2007-05-31 |
WO2005083927A1 (en) | 2005-09-09 |
JP2005244727A (en) | 2005-09-08 |
JP4290036B2 (en) | 2009-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8239328B2 (en) | Information processing apparatus, print control apparatus, printed control system | |
US7003667B1 (en) | Targeted secure printing | |
US6862583B1 (en) | Authenticated secure printing | |
US8054970B2 (en) | Image forming apparatus, image forming method, information processing apparatus and information processing method | |
EP1517507A1 (en) | Processing and printing devices, methods, program, and recording medium | |
JP2006287587A (en) | Information processing apparatus and its method | |
JP2001016655A (en) | Portable terminal with security | |
JP2006099724A (en) | Network printing system, printer, facsimile communication system, and facsimile apparatus | |
US20050193200A1 (en) | Image processing apparatus and method, storage medium storing computer-readable program, and program | |
JP4836499B2 (en) | Network printing system | |
JP2006163956A (en) | Security printing system, printer or multifunctional copying apparatus with printer function, ic card and information processing apparatus | |
JP2006304199A (en) | Host computer, printer, method for controlling host computer and printer, computer program, and storage medium | |
KR101116607B1 (en) | Printing apparatus having security funcition and method for the same | |
JP4813998B2 (en) | Printing system, client terminal device, server device, and printing device | |
JP2008102851A (en) | Printing system, printing method, and printing program | |
JP2007180975A (en) | Network print system, print device, facsimile communication system, and facsimile device | |
JP5038015B2 (en) | Image forming system, image forming apparatus, image forming method, image forming program, and recording medium | |
JP2003348079A (en) | Image forming apparatus | |
JP2005259012A (en) | Security print system | |
JP3885882B2 (en) | Image forming apparatus and image forming system | |
JP4018645B2 (en) | Printing apparatus, data processing method, storage medium, program | |
US8817982B2 (en) | Image forming apparatus | |
JP2007181945A (en) | Image forming apparatus, output judging program and output judging method | |
KR100352344B1 (en) | Apparatus and method for preventing disclosure through user-authentication at a printing node | |
JP2007325038A (en) | Image processing apparatus, and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |