Targeted secure printing
First Claim
1. A method for secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the method comprising:
- an encrypting step of twice encrypting the data using a first key and a second key, the first key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the second key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and
a transmitting step of transmitting the twice-encrypted data to the intended image output device.
1 Assignment
0 Petitions
Accused Products
Abstract
Secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient. The data is encrypted using a first key. The first key is then encrypted using a second key and a third key. The second key is a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device. The third key is a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image. The encrypted data and the twice-encrypted first key are transmitted to the intended image output device. The twice-encrypted first key is then decrypted by using the private keys of the second and first key pairs, respectively, which are primarily in the sole possession of the intended recipient device and the intended image output device, respectively. The data is then decrypted and printed at an image output device.
-
Citations
123 Claims
-
1. A method for secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the method comprising:
-
an encrypting step of twice encrypting the data using a first key and a second key, the first key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the second key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and a transmitting step of transmitting the twice-encrypted data to the intended image output device.
-
-
2. A method for secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the method comprising:
-
a first encrypting step of encrypting the data using a first key; a second encrypting step of twice encrypting the first key using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and a transmitting step of transmitting the encrypted data and the twice-encrypted first key to the intended image output device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the method comprising:
-
a first encrypting step of encrypting the data using a first key; a second encrypting step of twice encrypting the first key using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; a generating step of generating a header containing the twice-encrypted first key; a first transmitting step of transmitting the header to the intended image output device; a receiving step of receiving a request from the intended image output device for the encrypted data; and a second transmitting step of transmitting the encrypted data to the intended image output device. - View Dependent Claims (14, 15)
-
-
16. A method for generating an image from twice-encrypted data transmitted to an intended image output device, wherein the twice-encrypted data can be used to generate the image at the intended image output device in the presence of an intended recipient, the method comprising:
-
a receiving step of receiving twice-encrypted data; a decrypting step of twice decrypting the twice-encrypted data using a first key and a second key, the first key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the second key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; and an image generating step of generating an image from the decrypted data.
-
-
17. A method for generating an image from data transmitted to an intended image output device, wherein the data can be used to generate the image at the intended image output device in the presence of an intended recipient, the method comprising:
-
a receiving step of receiving encrypted data and a twice-encrypted first key; a first decrypting step of twice decrypting the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; a second decrypting step of decrypting the encrypted data using the decrypted first key; and an image generating step of generating an image from the decrypted data. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for generating an image from data transmitted to an intended image output device, wherein the data can be used to generate the image at the intended image output device in the presence of an intended recipient, the method comprising:
-
a receiving step of receiving a header containing a twice-encrypted first key; a sending step of sending a request for encrypted data corresponding to the header; a receiving step of receiving encrypted data corresponding to the header; a first decrypting step of twice decrypting the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; a second decrypting step of decrypting the encrypted data using the decrypted first key; and an image generating step of generating an image from the decrypted data. - View Dependent Claims (30, 31)
-
-
32. An apparatus for secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device for receipt by an intended recipient, the apparatus comprising:
-
a memory including a region for storing executable process steps and data for the image; and a processor for executing the executable process steps; wherein the executable process steps include (a) an encrypting step of twice encrypting the data using a first key and a second key, the first key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the second key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and
(b) a transmitting step of transmitting the twice-encrypted data to the intended image output device.
-
-
33. An apparatus for secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the apparatus comprising:
-
a memory including a region for storing executable process steps and data for the image; and a processor for executing the executable process steps; wherein the executable process steps include (a) a first encrypting step of encrypting the data using a first key;
(b) a second encrypting step of twice encrypting the first key using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and
(c) a transmitting step of transmitting the encrypted data and the twice-encrypted first key to the intended image output device. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. An apparatus for secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the apparatus comprising:
-
a memory including a region for storing executable process steps and data for the image; and a processor for executing the executable process steps; wherein the executable process steps include (a) a first encrypting step of encrypting the data using a first key;
(b) a second encrypting step of twice encrypting the first key using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image;
(c) a generating step of generating a header containing the twice-encrypted first key;
(d) a first transmitting step of transmitting the header to the intended image output device;
(e) a receiving step of receiving a request from the intended image output device for the encrypted data; and
(f) a second transmitting step of transmitting the encrypted data to the intended image output device. - View Dependent Claims (46, 47)
-
-
48. An image output device for generating an image from data transmitted to the image output device, wherein the data can be used to generate the image at the image output device in the presence of an intended recipient, the image output device comprising:
-
a receiver for receiving twice-encrypted data; an image generator for generating an image from image data; a memory including a region for storing executable process steps and data; and a processor for executing the executable process steps, wherein the executable process steps include;
(a) a decrypting step of twice decrypting the twice-encrypted data using a first key and a second key, the first key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the second key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; and
(b) an image generating step of generating an image from the decrypted data.
-
-
49. An image output device for generating an image from data transmitted to the image output device, wherein the data can be used to generate the image at the image output device in the presence of an intended recipient, the image output device comprising:
-
a receiver for receiving encrypted data and an twice-encrypted first key; an image generator for generating an image from image data; a memory including a region for storing executable process steps and data; and a processor for executing the executable process steps, wherein the executable process steps include;
(a) a first decrypting step of decrypting the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device;
(b) a second decrypting step of decrypting the encrypted data using the decrypted first key; and
(c) an image generating step of generating an image from the decrypted data using the image generator. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
-
61. An image output device for generating an image from data transmitted to the image output device, wherein the data can be used to generate the image at the image output device in the presence of an intended recipient, the image output device comprising:
-
a receiver for receiving a header containing a twice-encrypted first key; an image generator for generating an image from image data; a memory including a region for storing executable process steps and data; and a processor for executing the executable process steps, wherein the executable process steps include;
(a) a sending step of sending a request for encrypted data corresponding to the header;
(b) a receiving step of receiving encrypted data corresponding to the header;
(c) a first decrypting step of twice decrypting the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device;
(d) a second decrypting step of decrypting the encrypted data using the decrypted first key; and
(e) an image generating step of generating an image from the decrypted data. - View Dependent Claims (62, 63)
-
-
64. A computer-readable medium which stores computer-executable process steps which securely transmit data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the computer-executable process steps comprising:
-
a data generating step to generate data for an image; an encrypting step to twice encrypt the data using a first key and a second key, the first key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the second key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and a transmitting step to transmit the twice-encrypted data to the intended image output device.
-
-
65. A computer-readable medium which stores computer-executable process steps which securely transmit data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the computer-executable process steps comprising:
-
a data generating step to generate data for an image; a first encrypting step to encrypt the data using a first key; a second encrypting step to encrypt the first key twice using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and a transmitting step to transmit the encrypted data and the twice-encrypted first key to the intended image output device. - View Dependent Claims (66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
-
-
76. A computer-readable medium which stores computer-executable process steps which securely transmit data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient, the computer-executable process steps comprising:
-
a data generating step to generate data for an image; a first encrypting step to encrypt the data using a first key; a second encrypting step to twice encrypt the first key using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; a generating step to generate a header containing the twice-encrypted first key; a first transmitting step to transmit the header to the intended image output device; a receiving step to receive a request from the intended image output device for the encrypted data; and a second transmitting step to transmit the encrypted data to the intended image output device. - View Dependent Claims (77, 78)
-
-
79. A computer-readable medium which stores computer-executable process steps for generating an image from twice-encrypted data transmitted to an intended image output device, wherein the twice-encrypted data can be used to generate the image at the intended image output device in the presence of an intended recipient, the computer-executable process steps comprising:
-
a receiving step to receive twice-encrypted data; a decrypting step to twice decrypt the twice-encrypted data using a first key and a second key, the first key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the second key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; and an image generating step to generate an image from the decrypted data.
-
-
80. A computer-readable medium which stores computer-executable process steps for generating an image from data transmitted to an intended image output device, wherein the data can be used to generate the image at the intended image output device in the presence of an intended recipient, the computer-executable process steps comprising:
-
a receiving step to receive encrypted data and a twice-encrypted first key; a first decrypting step to twice decrypt the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; a second decrypting step to decrypt the encrypted data using the decrypted first key; and an image generating step to generate an image from the decrypted data. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91)
-
-
92. A computer-readable medium which stores computer-executable process steps for generating an image from data transmitted to an intended image output device, wherein the data can be used to generate the image at the intended image output device in the presence of an intended recipient, the computer-executable process steps comprising:
-
a receiving step to receive a header containing a twice-encrypted first key; a sending step to send a request for encrypted data corresponding to the header; a receiving step to receive encrypted data corresponding to the header; a first decrypting step to twice decrypt the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; a second decrypting step to decrypt the encrypted data using the decrypted first key; and an image generating step to generate an image from the decrypted data. - View Dependent Claims (93, 94)
-
-
95. A printer driver which securely transmits data to an intended printer, wherein the data can be used to generate an image at the intended printer in the presence of an intended recipient, the printer driver comprising:
-
data generating code for generating data for an image; encrypting code for twice encrypting the data using a first key and a second key, the first key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the second key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and transmitting code for transmitting the twice-encrypted data to the intended image output device.
-
-
96. A printer driver which securely transmits data to an intended printer, wherein the data can be used to generate an image at the intended printer in the presence of an intended recipient, the printer driver comprising:
-
data generating code for generating data for an image; first encrypting code for encrypting the data using a first key; second encrypting code for twice encrypting the first key using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; and transmitting code for transmitting the encrypted data and the twice-encrypted first key to the intended printer. - View Dependent Claims (97, 98, 99, 100, 101, 102, 103, 104)
-
-
105. A printer driver which securely transmits data to an intended printer, wherein the data can be used to generate an image at the intended printer in the presence of an intended recipient, the printer driver comprising:
-
data generating code for generating data for an image; first encrypting code for encrypting the data using a first key; second encrypting code for twice encrypting the first key using a second key and a third key, the second key being a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device, and the third key being a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image; generating code for generating a header containing the twice-encrypted first key; first transmitting code for transmitting the header to the intended image output device; receiving code for receiving a request from the intended image output device for the encrypted data; and second transmitting code for transmitting the encrypted data to the intended image output device. - View Dependent Claims (106, 107)
-
-
108. Computer-executable process steps stored on a computer-readable medium, the computer-executable process steps for generating an image from twice-encrypted data transmitted to an intended image output device, wherein the twice-encrypted data can be used to generate the image at the intended image output device in the presence of an intended recipient, said computer-executable process steps comprising:
-
receiving code to receive twice-encrypted data; decrypting code to twice decrypt the twice-encrypted data using a first key and a second key, the first key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the second key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; and an image generating code to generate an image from the decrypted data.
-
-
109. Computer-executable process steps stored on a computer-readable medium, the computer-executable process steps for generating an image from twice-encrypted data transmitted to an intended image output device, wherein the twice-encrypted data can be used to generate the image at the intended image output device in the presence of an intended recipient, said computer-executable process steps comprising:
-
receiving code to receive encrypted data and a twice-encrypted first key; first decrypting code to twice decrypt the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; second decrypting code to decrypt the encrypted data using the decrypted first key; and image generating code to generate an image from the decrypted data. - View Dependent Claims (110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120)
-
-
121. Computer-executable process steps stored on a computer-readable medium, the computer-executable process steps for generating an image from data transmitted to an intended image output device, wherein the data can be used to generate the image at the intended image output device in the presence of an intended recipient, the computer-executable process steps comprising:
-
receiving code to receive a header containing a twice-encrypted first key; sending code to send a request for encrypted data corresponding to the header; receiving code to receive encrypted data corresponding to the header; first decrypting code to twice decrypt the twice-encrypted first key using a second key and a third key, the second key being a private key of a first private key/public key pair, the private key of the first private key/public key pair being primarily in the sole possession of the intended recipient of the image, and the third key being a private key of a second private key/public key pair, the private key of the second private key/public key pair being primarily in the sole possession of the intended image output device; second decrypting code to decrypt the encrypted data using the decrypted first key; and image generating code to generate an image from the decrypted data. - View Dependent Claims (122, 123)
-
Specification