Secure printing to a web-based imaging print service
First Claim
1. From a user'"'"'s browser, a secure method of image production in a web-based imaging environment, said method comprising the steps of:
- accessing a destination web service;
downloading into said browser web content associated with said accessed destination web service;
downloading into said browser a public encryption key associated with said accessed destination web service;
retrieving image data under control of said browser;
using said downloaded public encryption key, encrypting said retrieved image data;
transmitting said encrypted image data to said accessed destination web service; and
decrypting said encrypted image data by said accessed destination web service using a private encryption key counterpart of said public encryption key, said private encryption key being accessible exclusively to said accessed destination web service.
2 Assignments
0 Petitions
Accused Products
Abstract
Web content is downloaded into a browser from a destination service representing e.g., a printer concurrently with the printer'"'"'s public encryption key. Image data is encrypted by the web content using conventional public key cryptographic techniques and is then sent to the printer, which contains the private key counterpart of the printer'"'"'s public key. The encrypted image data is then decrypted using the printer'"'"'s private key. Since the printer has exclusive control of the private key, secure printing is performed. Each time the browser accesses a different printer, new web content and a new public encryption key are downloaded. The user remains in control of the process, since for each printer accessed the web content and the printer'"'"'s public encryption key are both downloaded into and operable from the user'"'"'s browser. In some variations, this capability is applied broadly to web services in addition to printing.
-
Citations
22 Claims
-
1. From a user'"'"'s browser, a secure method of image production in a web-based imaging environment, said method comprising the steps of:
-
accessing a destination web service;
downloading into said browser web content associated with said accessed destination web service;
downloading into said browser a public encryption key associated with said accessed destination web service;
retrieving image data under control of said browser;
using said downloaded public encryption key, encrypting said retrieved image data;
transmitting said encrypted image data to said accessed destination web service; and
decrypting said encrypted image data by said accessed destination web service using a private encryption key counterpart of said public encryption key, said private encryption key being accessible exclusively to said accessed destination web service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer for providing secure image production in a web-based imaging environment, said computer operable to:
-
access a destination web service;
download web content from said destination web service;
download a public encryption key associated with said destination web service;
encrypt imaging data using said public encryption key;
transmit said encrypted imaging data to said destination web service; and
direct said destination web service to decrypt said encrypted imaging data using a private encryption key counterpart of said public encryption key, said private encryption key being accessible exclusively to said destination web service. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system for providing secure image production in a web-based imaging environment, said system comprising:
-
a user'"'"'s browser operable to encrypt image data using a first encryption key and to transmit said encrypted image data;
a destination web service representing a production device, said web service operable to download said first encryption key into said user'"'"'s browser, said destination web service further operable to receive said transmitted encrypted image data and to decrypt said received encrypted image data using a private encryption key counterpart of said first encryption key; and
a data path interconnecting said user'"'"'s browser with said destination web service. - View Dependent Claims (19, 20, 21, 22)
-
Specification