Method and apparatus to enhance the security of data
First Claim
Patent Images
1. A system, comprising:
- an information source configured to form encrypted information from information corresponding to an image using at least a part of data and to form a first hash of the information;
an imaging system configured to generate the data, to form decrypted information from the encrypted information using at least part of the data, to form a second hash from the decrypted information and to form an image on media if the first hash matches the second hash; and
a communication channel through which the encrypted information, the first hash, and at least part of the data move between the information source and the imaging system.
2 Assignments
0 Petitions
Accused Products
Abstract
A method includes generating data with an imaging system in response to a request from an information source and decrypting encrypted information received from the information source, using the imaging system and at least part of the data, to form decrypted information. In addition, the method includes forming a second hash from the decrypted information using the imaging system. Furthermore, the method includes forming an image on media using the decrypted information if the second hash equals a first hash received from the information source.
49 Citations
33 Claims
-
1. A system, comprising:
-
an information source configured to form encrypted information from information corresponding to an image using at least a part of data and to form a first hash of the information;
an imaging system configured to generate the data, to form decrypted information from the encrypted information using at least part of the data, to form a second hash from the decrypted information and to form an image on media if the first hash matches the second hash; and
a communication channel through which the encrypted information, the first hash, and at least part of the data move between the information source and the imaging system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
generating data with an imaging system in response to a request from an information source;
decrypting encrypted information received from the information source, using the imaging system and at least part of the data, to form decrypted information;
forming a second hash from the decrypted information using the imaging system; and
forming an image on media using the decrypted information if the second hash equals a first hash received from the information source. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An imaging device, comprising:
-
an interface arranged to receive encrypted data;
a memory configured to store the encrypted data and decrypted data;
a processing device operatively associated with the memory and configured to form the decrypted data from the encrypted data using a session identifier generated in response to a request to form an image, configured to form a first hash from the decrypted data, and configured to compare the first hash to a second hash formed from data used to form the encrypted data; and
an imaging mechanism coupled to the processing device and configured to form an image on media corresponding to the decrypted data. - View Dependent Claims (20, 21, 22)
-
-
23. A system to form an image using data from an information source, comprising:
-
means for generating a session indicator in response to a request from the information source;
means for decrypting encrypted data received from the information source;
means for generating a second hash;
means for comparing a first hash formed by the information source to the second hash; and
means for forming the image on the media using the data if the first hash equals the second hash.
-
-
24. A system to receive transformed data related to an image from a first computing device, comprising:
-
a second computing device including a memory for storing the transformed data, where the transformed data includes encrypted data and a first hash formed from data used to form the encrypted data, and including a processing device configured to generate decrypted data from the encrypted data using a session indicator generated by the processing device, configured to determine a second hash using the decrypted data; and
an imaging device coupled to the second computing device and configured to form an image on media using the decrypted data sent from the second computing device if the first hash equals the second hash. - View Dependent Claims (25, 26, 27)
-
-
28. A storage device, comprising:
-
a computer readable medium; and
processor executable instructions stored on the computer readable medium and configured to generate data using an imaging system in response to a request from an information source, configured to decrypt encrypted information received from the information source, using the imaging system and at least part of the data, to form decrypted information, configured to form a second hash from the decrypted information using the imaging system, and configured to form an image on media using the decrypted information if the second hash equals a first hash received from the information source. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A printer, comprising:
-
an interface arranged to receive encrypted data;
a memory configured to store the encrypted data and decrypted data;
a processing device operatively associated with the memory and configured to form the decrypted data from the encrypted data, using a random string generated in response to a request to print, by performing an exclusive OR operation between the random string and the encrypted data, where a size of the random string equals a quantity of data used to form the encrypted data, with the processing device configured to form a first hash from the decrypted data, and configured to compare the first hash to a second hash formed from the data; and
an imaging mechanism coupled to the processing device and configured to form an image on media corresponding to the decrypted data.
-
Specification