Authenticated secure printing
First Claim
1. A method for authorized printout of an image in a printing system comprising an information processing device that transmits print data via a network to a print node for printout of the image, comprising the steps of:
- the information processing device transmitting to the print node, via the network, print data identified as requiring user authentication in order to be printed out;
the print node receiving, via the network from the information processing device, the print data identified as requiring user authentication in order to be printed out;
the print node, upon receiving the print data from the information processing device, detecting that the received print data requires user authentication in order to be printed out and in response thereto, the print node performing a key encryption process on the received print data utilizing a unique encryption key maintained within the print node to generate encrypted print data and storing the encrypted print data without printout, wherein the stored encrypted print data includes encryption data corresponding to the key encryption process that is not included with the received print data;
the print node receiving authentication information of an intended recipient to print the encrypted print data; and
in response to receipt of the authentication information, the print node decrypting the encrypted print data and performing an operation for printing the decrypted print data.
1 Assignment
0 Petitions
Accused Products
Abstract
Authorized printout of an image corresponding to print data received at a print node from a network. The authorized printout comprises encrypting print data by a print node and storing the encrypted print data without printout, receiving authentication of an intended recipient to print the print data, and decrypting the encrypted print data by the print node and printing the decrypted print data by an image forming device, responsive to receipt of authentication in the receiving step. The print node may be the image forming device itself or a gateway to multiple image forming devices. The print node encrypts the print data with either a symmetric key or an asymmetric key.
270 Citations
50 Claims
-
1. A method for authorized printout of an image in a printing system comprising an information processing device that transmits print data via a network to a print node for printout of the image, comprising the steps of:
-
the information processing device transmitting to the print node, via the network, print data identified as requiring user authentication in order to be printed out;
the print node receiving, via the network from the information processing device, the print data identified as requiring user authentication in order to be printed out;
the print node, upon receiving the print data from the information processing device, detecting that the received print data requires user authentication in order to be printed out and in response thereto, the print node performing a key encryption process on the received print data utilizing a unique encryption key maintained within the print node to generate encrypted print data and storing the encrypted print data without printout, wherein the stored encrypted print data includes encryption data corresponding to the key encryption process that is not included with the received print data;
the print node receiving authentication information of an intended recipient to print the encrypted print data; and
in response to receipt of the authentication information, the print node decrypting the encrypted print data and performing an operation for printing the decrypted print data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 47)
-
-
13. An apparatus for authorized printout of an image in a printing system comprising an information processing device that transmits print data via a network to the apparatus for printout of the image, comprising:
-
a memory including a region for storing executable process steps and data for the image; and
a processor for executing the executable process steps;
wherein the executable process steps comprise (a) the apparatus receiving, via the network from the information processing device, print data transmitted by the information processing device that is identified as requiring user authentication in order to be printed out;
(b) the apparatus, upon receiving the print data from the information processing device, detecting that the received print data requires user authentication in order to be printed out and in response thereto, the apparatus performing a key encryption process on the received print data utilizing a unique encryption key maintained within the apparatus to generate encrypted print data and storing the encrypted print data without printout, wherein the stored encrypted print data includes encryption data corresponding to the key encryption process that is not included with the received print data;
(c) the apparatus receiving authentication information of an intended recipient to print the encrypted print data; and
(d) in response to receipt of the authentication information, the apparatus decrypting the encrypted print data and performing an operation for printing the decrypted print data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 48)
-
-
25. A computer-readable medium which stores computer-executable process steps for authorized printout of an image in a printing system comprising an information processing device that transmits print data via a network to a print node for printout of the image, the computer-executable process steps comprising:
-
the information processing device transmitting to the print node, via the network, print data identified as requiring user authentication in order to be printed out;
the print node receiving, via the network from the information processing device, the print data identified as requiring user authentication in order to be printed out;
the print node, upon receiving the print data from the information processing device, detecting that the received print data requires user authentication in order to be printed out and in response thereto, the print node performing a key encryption process on the received print data utilizing a unique encryption key maintained within the print node to generate encrypted print data and storing the encrypted print data without printout, wherein the stored encrypted print data includes encryption data corresponding to the key encryption process that is not included with the received print data;
the print node receiving authentication information of an intended recipient to print the encrypted print data; and
in response to receipt of the authentication information, the print node decrypting the encrypted print data and performing an operation for printing the decrypted print data. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 49)
-
-
37. An image forming device for authorized printout of an image, comprising:
-
a receiver for receiving print data transmitted via a network to the image forming device from an information processing device, the print data being identified by the information processing device as requiring user authentication in order to be printed out;
an image generator for generating an image from the received print data;
a memory including a region for storing executable process steps; and
a processor for executing the executable process steps, wherein the executable process steps comprise;
(a) the receiver receiving, via the network from the information processing device, the print data identified as requiring user authentication in order to be printed out;
(b) the image forming device, upon receiving the print data from the information processing device, detecting that the received print data requires user authentication in order to be printed out and in response thereto, the image forming device performing a key encryption process on the received print data utilizing a unique encryption key maintained within the image forming device to generate encrypted print data and storing the encrypted print data without printout, wherein the stored encrypted print data included encryption data corresponding to the key encryption process that is not included with the received print data;
(c) the image forming device receiving authentication information of an intended recipient to print the encrypted print data; and
(d) in response to receipt of the authentication information, the image forming device decrypting the encrypted print data and the image generator performing a process to print the decrypted print data. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 50)
-
Specification