WO2013062531A1 - Encrypted printing - Google Patents

Encrypted printing Download PDF

Info

Publication number
WO2013062531A1
WO2013062531A1 PCT/US2011/057704 US2011057704W WO2013062531A1 WO 2013062531 A1 WO2013062531 A1 WO 2013062531A1 US 2011057704 W US2011057704 W US 2011057704W WO 2013062531 A1 WO2013062531 A1 WO 2013062531A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
encrypted
printer
decrypted
printed
Prior art date
Application number
PCT/US2011/057704
Other languages
French (fr)
Inventor
Saroday Nagaraj SATHYANARAYANA
Original Assignee
Hewlett-Packard Company
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Company filed Critical Hewlett-Packard Company
Priority to PCT/US2011/057704 priority Critical patent/WO2013062531A1/en
Publication of WO2013062531A1 publication Critical patent/WO2013062531A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4426Restricting access, e.g. according to user identity involving separate means, e.g. a server, a magnetic card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/444Restricting access, e.g. according to user identity to a particular document or image or part thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption

Definitions

  • cloud computing a network of remote servers hosted on the Internet are used to store, manage, and process data.
  • a network of remote servers is often referred to as a cloud.
  • Printers accessible by a cloud may include printers with native support for connecting to cloud print services. Other printers accessible by the cloud may be accessible through connection to personal computers or other computing devices connected to the cloud.
  • the printer to computing device connection may be, for example, a direct connection, such as via universal serial bus (USB) connection or may be through a network such as a WiFi network or an Ethernet network.
  • USB universal serial bus
  • Documents printed via cloud computing may be printed on printers that are geographically distance from a document provider or even an intended recipient. If printed documents are not quickly retrieved by the intended recipient or are intercepted by an unintended party, the printed documents might be copied and disseminated well beyond the intended recipient. If the printed documents include sensitive or proprietary information, such
  • Figure 1 is a simplified block diagram of a system that provides encrypted printing in accordance with an implementation.
  • Figure 2 is a simplified flowchart that describes encryption of a document before the document is printed in accordance with an implementation.
  • Figure 3 is a simplified flowchart that describes decryption of a document before the document is printed in accordance with an implementation.
  • FIG. 1 is a simplified block diagram showing a cloud 20 composed of a network of remote servers, hosted on the Internet, that are used to store, manage, and process data.
  • An interface 21 provides an on-ramp from a document provider 12 to cloud 20 and provides an off-ramp from cloud 20 to document provider 12.
  • An interface 25 provides an off-ramp from cloud 20 to a printer 14 and an on ⁇ ramp from printer 14 to cloud 20.
  • a user 1 1 is shown to have potential interactions with document provider 12, printer 14 and an electronic print (e-print) center 13.
  • job management services 22 located on and implemented by one or more servers, are job management services 22, imaging services 23 and rendering services 24.
  • FIG. 2 is a simplified flowchart that describes encryption of a document before the document is printed.
  • a user coordinates with a document provider 12.
  • the coordination can include notification from document provider 12 to user 1 1 that a printed document is forth coming.
  • document provider 12 may be a bank or some other institution whom user 1 1 has registered with using the session initiation protocol (SIP).
  • SIP session initiation protocol
  • document provider 12 might agree to send the encrypted SIP pin to user 1 1 within a document to be printed out on a printer identified by user 1 1 , e.g., printer 14.
  • the coordination can be accomplished by user 1 1 authorizing document provider 12 to print an encrypted document on printer 14. For example, this can be done through user 1 1 registering with e- print center 13 to take ownership of printer 14 and whitelisting document provider 12 so that document provider 12 is permitted to print an encrypted document on printer 14.
  • printer 14 is set in an encrypted print mode. This can be done, for example, as a result of user 1 1 , directly or through e-print center 13, claiming printer 14 and setting printer 14 in encrypted mode.
  • printer 14 can be set in an encrypted print mode by document provider 12, or by some other entity.
  • printer 14 might routinely enter encrypted mode when printing documents received from document provider 12 if, for example, document provider 12 was identified as a service provider that required encrypted printing.
  • document provider 12 submits a print job that includes the document to be encrypted and printed.
  • Cloud 20 receives the print job via interface 21 , which serves as an in-ramp to cloud 20.
  • Cloud 20 could also receive documents from document provider 12 by other means, for example, by encapsulation within an e-mail.
  • interface 21 pushes the print job to job management services 22.
  • job management services 22 pushes the print job to imaging services 23.
  • image services 23 encrypts the document to produce an encrypted document.
  • the document can be encrypted using any standard or non-standard encryption technique.
  • the encrypted document is sent from imaging services 23 to rendering services 24.
  • Rendering services 24 renders the encrypted document to produce a rendered encrypted document.
  • cloud interface 25 acting as an off ramp, pulls the rendered encrypted document.
  • the print job, including the rendered encrypted document is sent from interface 25 to printer 14.
  • printer 14 prints the rendered encrypted document to produce a printed encrypted document.
  • Figure 3 is a simplified flowchart that describes decryption of a printed encrypted document in order to produce an unencrypted document that is printed.
  • a scanner to scan the printed encrypted document.
  • the scanner is incorporated as part of printer 14.
  • user 12 is verified as having authorization to receive a print out of the original decrypted version of the scanned encrypted document. For example this is done by user 12 logging in to e-print center 13 or printer 14 and then presenting a required authorization that certifies user 12 has
  • the log-in may be performed, for example, by the user using a console of printer 14. Alternatively, the log-in may be performed via an interface for e-print center 13.
  • e-print center 13 can check an internal database that contains electronic copies of printed out encrypted documents along with a list of those authorized to obtain a decrypted document. E-print center 13 can then compare the scanned encrypted document with electronic copies of encrypted documents stored in the internal database to obtain the list of those authorized to obtain the original document. E-print center 13 can thereby identify user 12 as authorized to print out an unencrypted version of the scanned encrypted document. [0023] Alternatively, e-print center 13 can use other ways to identify user 12 as authorized to obtain the original of the scanned encrypted document.
  • e-print center 13 can check information encoded on the scanned document to identify the document and based on stored records for the document determine which users are authorized to print out an unencrypted version of the document.
  • e-print center 13 could use other stored data to determine whether user 12 is authorized to print out an unencrypted version of the document.
  • the choice of encryption scheme could provide security against an unauthorized user inappropriately obtaining a decrypted version of a document.
  • This could be implemented, for example, if user identification is used as part of an encryption key to encrypt a document. In such a case decryption would only be successful when the correct user identification is supplied for the decryption. In such a case, the log-in would be sufficient to identify user 12 as owner of the document.
  • printer 14 submits a print job that includes the encrypted document that is to be decrypted and printed.
  • Cloud 20 receives the print job via interface 25, which serves as an in-ramp to cloud 20.
  • interface 25 pushes the print job to job management services 22.
  • job management services 22 pushes the print job to imaging services 23.
  • image services 23 decrypts the encrypted document to produce a decrypted document.
  • the decrypted document is sent from imaging services 23 to rendering services 24.
  • Rendering services 24 renders the decrypted document to produce a rendered decrypted document.
  • cloud interface 25 acting as an off ramp, pulls the rendered decrypted document.
  • the print job including the rendered decrypted document, is sent from interface 25 to printer 14.
  • printer 14 prints the rendered decrypted document to produce a printed decrypted document.
  • document provider 12 is notified that the decrypted document has been printed. This notification is sent, for example, by e-print center 13 or printer 14. Sending the notification is not necessarily implemented for all embodiments, but can be an additional security measure, for example, when printing confidential information from a service provider such as a bank, etc.

Abstract

A document is encrypted (36) to produce an encrypted document. The encrypted document is printed (40) to produce a printed encrypted document. The printed encrypted document is scanned (51). Upon verification of user access rights to the document, the scanned printed encrypted document decrypted (56) to recreate the document. The recreated document is printed (60).

Description

ENCRYPTED PRINTING
BACKGROUND
[0001] In cloud computing, a network of remote servers hosted on the Internet are used to store, manage, and process data. Such a network of remote servers is often referred to as a cloud.
[0002] Printers accessible by a cloud may include printers with native support for connecting to cloud print services. Other printers accessible by the cloud may be accessible through connection to personal computers or other computing devices connected to the cloud. The printer to computing device connection may be, for example, a direct connection, such as via universal serial bus (USB) connection or may be through a network such as a WiFi network or an Ethernet network.
[0003] Documents printed via cloud computing may be printed on printers that are geographically distance from a document provider or even an intended recipient. If printed documents are not quickly retrieved by the intended recipient or are intercepted by an unintended party, the printed documents might be copied and disseminated well beyond the intended recipient. If the printed documents include sensitive or proprietary information, such
unauthorized access to printed documents can result in a significant breach of desired confidentiality.
BRIEF DESCRIPTION OF DRAWINGS
[0004] Figure 1 is a simplified block diagram of a system that provides encrypted printing in accordance with an implementation. [0005] Figure 2 is a simplified flowchart that describes encryption of a document before the document is printed in accordance with an implementation.
[0006] Figure 3 is a simplified flowchart that describes decryption of a document before the document is printed in accordance with an implementation.
DETAILED DESCRIPTION
[0007] Document confidentiality is protected by encrypting a document after printing is initiated. The encrypted version of the document is printed. An intended recipient can obtain a copy of the original document by first scanning the printed encrypted document and providing authentication verifying the recipient's rights to the document. Then the scanned encrypted document is decrypted to obtain the original document, which is then printed out. Below is further described how such an encrypted printing scheme can be implemented in a cloud computing environment. This is meant to be exemplary as the techniques disclosed herein can be used to protect the confidentiality of print jobs in any printing environment.
[0008] Figure 1 is a simplified block diagram showing a cloud 20 composed of a network of remote servers, hosted on the Internet, that are used to store, manage, and process data. An interface 21 provides an on-ramp from a document provider 12 to cloud 20 and provides an off-ramp from cloud 20 to document provider 12. An interface 25 provides an off-ramp from cloud 20 to a printer 14 and an on~ramp from printer 14 to cloud 20.
[0009] A user 1 1 is shown to have potential interactions with document provider 12, printer 14 and an electronic print (e-print) center 13.
[0010] Within cloud 20, located on and implemented by one or more servers, are job management services 22, imaging services 23 and rendering services 24.
[0011] Figure 2 is a simplified flowchart that describes encryption of a document before the document is printed. In a block 31 a user coordinates with a document provider 12. For example, the coordination can include notification from document provider 12 to user 1 1 that a printed document is forth coming. For example, document provider 12 may be a bank or some other institution whom user 1 1 has registered with using the session initiation protocol (SIP). For example, document provider 12 might agree to send the encrypted SIP pin to user 1 1 within a document to be printed out on a printer identified by user 1 1 , e.g., printer 14.
[0012] Additionally, or instead, the coordination can be accomplished by user 1 1 authorizing document provider 12 to print an encrypted document on printer 14. For example, this can be done through user 1 1 registering with e- print center 13 to take ownership of printer 14 and whitelisting document provider 12 so that document provider 12 is permitted to print an encrypted document on printer 14.
[0013] In a block 32, printer 14 is set in an encrypted print mode. This can be done, for example, as a result of user 1 1 , directly or through e-print center 13, claiming printer 14 and setting printer 14 in encrypted mode. Alternatively, printer 14 can be set in an encrypted print mode by document provider 12, or by some other entity. For example, printer 14 might routinely enter encrypted mode when printing documents received from document provider 12 if, for example, document provider 12 was identified as a service provider that required encrypted printing.
[0014] In a block 33, document provider 12 submits a print job that includes the document to be encrypted and printed. Cloud 20 receives the print job via interface 21 , which serves as an in-ramp to cloud 20. Cloud 20 could also receive documents from document provider 12 by other means, for example, by encapsulation within an e-mail.
[0015] In a block 34, interface 21 pushes the print job to job management services 22. In a block 35, job management services 22 pushes the print job to imaging services 23.
[0016] In a block 36, image services 23 encrypts the document to produce an encrypted document. For example, the document can be encrypted using any standard or non-standard encryption technique.
[0017] In a block 37, the encrypted document is sent from imaging services 23 to rendering services 24. Rendering services 24 renders the encrypted document to produce a rendered encrypted document. In a block 38, cloud interface 25, acting as an off ramp, pulls the rendered encrypted document. In a block 39 the print job, including the rendered encrypted document, is sent from interface 25 to printer 14. In a block 40, printer 14 prints the rendered encrypted document to produce a printed encrypted document.
[0018] Figure 3 is a simplified flowchart that describes decryption of a printed encrypted document in order to produce an unencrypted document that is printed.
[0019] In a block 51 , user 12 uses a scanner to scan the printed encrypted document. For example, the scanner is incorporated as part of printer 14.
[0020] In a block 52, user 12 is verified as having authorization to receive a print out of the original decrypted version of the scanned encrypted document. For example this is done by user 12 logging in to e-print center 13 or printer 14 and then presenting a required authorization that certifies user 12 has
permission to have the scanned encrypted document decrypted and printed out. The log-in may be performed, for example, by the user using a console of printer 14. Alternatively, the log-in may be performed via an interface for e-print center 13.
[0021] In some cases, mere identification of the user may be sufficient to establish the user has a right to have a scanned encrypted document printed out in decrypted form. In other cases, it may be desirable to establish a particular user has rights to a particular scanned document, before the document is to be decrypted and printed out. In this case, it is necessary to identify the user and in addition ascertain whether the user has rights to obtain a decrypted print-out of a scanned encrypted document.
[0022] For example, e-print center 13 can check an internal database that contains electronic copies of printed out encrypted documents along with a list of those authorized to obtain a decrypted document. E-print center 13 can then compare the scanned encrypted document with electronic copies of encrypted documents stored in the internal database to obtain the list of those authorized to obtain the original document. E-print center 13 can thereby identify user 12 as authorized to print out an unencrypted version of the scanned encrypted document. [0023] Alternatively, e-print center 13 can use other ways to identify user 12 as authorized to obtain the original of the scanned encrypted document. For example, e-print center 13 can check information encoded on the scanned document to identify the document and based on stored records for the document determine which users are authorized to print out an unencrypted version of the document. Alternatively, e-print center 13 could use other stored data to determine whether user 12 is authorized to print out an unencrypted version of the document.
[0024] Alternatively, the choice of encryption scheme could provide security against an unauthorized user inappropriately obtaining a decrypted version of a document. This could be implemented, for example, if user identification is used as part of an encryption key to encrypt a document. In such a case decryption would only be successful when the correct user identification is supplied for the decryption. In such a case, the log-in would be sufficient to identify user 12 as owner of the document.
[0025] In a block 53, printer 14 submits a print job that includes the encrypted document that is to be decrypted and printed. Cloud 20 receives the print job via interface 25, which serves as an in-ramp to cloud 20.
[0026] In a block 54, interface 25 pushes the print job to job management services 22. In a block 55, job management services 22 pushes the print job to imaging services 23.
[0027] In a block 56, image services 23 decrypts the encrypted document to produce a decrypted document.
[0028] In a block 57, the decrypted document is sent from imaging services 23 to rendering services 24. Rendering services 24 renders the decrypted document to produce a rendered decrypted document. In a block 58, cloud interface 25, acting as an off ramp, pulls the rendered decrypted document.
[0029] In a block 59, the print job, including the rendered decrypted document, is sent from interface 25 to printer 14. In a block 60, printer 14 prints the rendered decrypted document to produce a printed decrypted document. In a block 61 , document provider 12 is notified that the decrypted document has been printed. This notification is sent, for example, by e-print center 13 or printer 14. Sending the notification is not necessarily implemented for all embodiments, but can be an additional security measure, for example, when printing confidential information from a service provider such as a bank, etc.
[0030] The foregoing discussion discloses and describes merely exemplary methods and embodiments. As will be understood by those familiar with the art, the disclosed subject matter may be embodied in other specific forms without departing from the spirit or characteristics thereof. Accordingly, the present disclosure is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.

Claims

CLAIMS What is claimed is:
1 . A printing system comprising:
a first service (23) that encrypts a document to produce an encrypted document;
a second service (24) that renders the encrypted document to produce a rendered encrypted document;
a printer (14) that prints the rendered encrypted document; and, a scanning device (14) that scans the encrypted version of the document to produce a scanned encrypted document;
wherein, upon verification of a user's right to a decrypted version of the document, the first service (23) decrypts the scanned encrypted document to produce a decrypted document, the second service (24) renders the decrypted document to produce a rendered decrypted document and the printer (14) prints the rendered decrypted document.
2. A printing system as in claim 1 wherein the first service (23) and the second service (24) are contained within a cloud (20) composed of remote servers, hosted on the Internet, used to store, manage, and process data
3. A printing system as in claim 1 additionally comprising:
an electronic print center (13) which verifies the users right to the decrypted version of the document.
4. A printing system as in claim 1 wherein the printer (14) verifies the users right to the decrypted version of the document.
5. A printing system as in claim 1 wherein the scanning device (14) is incorporated with the printer (14).
6. A method for printing a document, comprising:
encrypting (36) the document to produce an encrypted document; printing (40) the encrypted document to produce a printed encrypted document;
scanning (51 ) the printed encrypted document; and,
upon verification of user access rights to the document:
decrypting (56) the scanned printed encrypted document to recreate the document, and
printing (60) the recreated document.
7. A method as in claim 6 wherein the encryption of the document and the decryption of the scanned printed encrypted document are performed within a cloud (20) composed of remote servers, hosted on the Internet, used to store, manage, and process data.
8. A method as in claim 6 wherein verification of user access rights is performed by an electronic print center (13).
9. A method as in claim 6 wherein verification of user access rights is performed by a printer (14).
10. A method for using a printing system having a printer (14) and a scanner, the method comprising:
encrypting (36) a document before it is printed out on the printer (14); scanning (51 ) the encrypted document; and
verifying (52) a user's right to a decrypted version of the document and in response to successful verification, decrypting (57) the scanned encrypted document and printing (60) the decrypted document.
1 1 . A method as in claim 10 wherein the encrypting (36) and the decrypting are performed within a cloud (20) composed of remote servers, hosted on the Internet, used to store, manage, and process data
12. A method as in claim 10 wherein the verifying is performed by an electronic print center (13).
13. A method as in claim 10 wherein the verifying is performed by the printer (14).
14. A method as in claim 10 wherein the scanner is incorporated with the printer (14).
PCT/US2011/057704 2011-10-25 2011-10-25 Encrypted printing WO2013062531A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2011/057704 WO2013062531A1 (en) 2011-10-25 2011-10-25 Encrypted printing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2011/057704 WO2013062531A1 (en) 2011-10-25 2011-10-25 Encrypted printing

Publications (1)

Publication Number Publication Date
WO2013062531A1 true WO2013062531A1 (en) 2013-05-02

Family

ID=48168205

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/057704 WO2013062531A1 (en) 2011-10-25 2011-10-25 Encrypted printing

Country Status (1)

Country Link
WO (1) WO2013062531A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015005922A1 (en) * 2013-07-11 2015-01-15 Hewlett-Packard Development Company, L.P. Printing composite documents
US9916464B2 (en) 2014-02-03 2018-03-13 Hewlett-Packard Development Company, L.P. Replacement text for textual content to be printed
US11176434B2 (en) 2017-07-17 2021-11-16 Hewlett-Packard Development Company, L.P. Encrypted printing
US11290617B2 (en) 2017-04-20 2022-03-29 Hewlett-Packard Development Company, L.P. Document security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6862583B1 (en) * 1999-10-04 2005-03-01 Canon Kabushiki Kaisha Authenticated secure printing
US20050154884A1 (en) * 2003-11-27 2005-07-14 Oce-Technologies B.V. Secure data transmission in a network system of image processing devices
US20100302579A1 (en) * 2009-06-01 2010-12-02 Jayasimha Nuggehalli Printing and scanning with cloud storage

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6862583B1 (en) * 1999-10-04 2005-03-01 Canon Kabushiki Kaisha Authenticated secure printing
US20050154884A1 (en) * 2003-11-27 2005-07-14 Oce-Technologies B.V. Secure data transmission in a network system of image processing devices
US20100302579A1 (en) * 2009-06-01 2010-12-02 Jayasimha Nuggehalli Printing and scanning with cloud storage

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015005922A1 (en) * 2013-07-11 2015-01-15 Hewlett-Packard Development Company, L.P. Printing composite documents
CN105283832A (en) * 2013-07-11 2016-01-27 惠普发展公司,有限责任合伙企业 Printing composite documents
US9645775B2 (en) 2013-07-11 2017-05-09 Hewlett-Packard Development Company, L.P. Printing composite documents
CN105283832B (en) * 2013-07-11 2018-09-18 惠普发展公司,有限责任合伙企业 Print compound document
US9916464B2 (en) 2014-02-03 2018-03-13 Hewlett-Packard Development Company, L.P. Replacement text for textual content to be printed
US11290617B2 (en) 2017-04-20 2022-03-29 Hewlett-Packard Development Company, L.P. Document security
US11176434B2 (en) 2017-07-17 2021-11-16 Hewlett-Packard Development Company, L.P. Encrypted printing

Similar Documents

Publication Publication Date Title
AU780201B2 (en) Remote printing of secure and/or authenticated documents
US6385728B1 (en) System, method, and program for providing will-call certificates for guaranteeing authorization for a printer to retrieve a file directly from a file server upon request from a client in a network computer system environment
US7606769B2 (en) System and method for embedding user authentication information in encrypted data
US8245306B2 (en) Digital rights management printing system
CN101087350A (en) System and method for secure handling of scanned documents
US8896858B2 (en) Method for enforcing document privacy through third party systems
US6977745B2 (en) Method and apparatus for the secure printing of a document
US20040190714A1 (en) Data security in an information processing device
US20060269053A1 (en) Network Communication System and Communication Device
US20070283157A1 (en) System and method for enabling secure communications from a shared multifunction peripheral device
US20140189351A1 (en) Print Release with End to End Encryption and Print Tracking
JP5251752B2 (en) Method for printing locked print data using user and print data authentication
US7587045B2 (en) System and method for securing document transmittal
EP2323065A1 (en) Method and device of sharing license between secure removable media
JP2007142930A (en) Image processing apparatus, job log generating method, and program
JP2003134327A (en) Image reading apparatus and program
CN104035733A (en) Distributed print management
WO2013062531A1 (en) Encrypted printing
US20080198410A1 (en) Print Management Device and Print Management Method
JP2006050535A (en) Scanner device, information processing apparatus, image data encryption method, image data display method, image data encryption program and image data display program
JP2008301480A (en) Cac (common access card) security and document security enhancement
JP4836499B2 (en) Network printing system
JP4396377B2 (en) Print control system, server device
US20120176651A1 (en) Secure Watermarking of Print Jobs Using a Smartcard
US20090070581A1 (en) System and method for centralized user identification for networked document processing devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11874623

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11874623

Country of ref document: EP

Kind code of ref document: A1