Secure data transmission in a network system of image processing devices
First Claim
1. A method for securely transmitting digital data relating to a document between a scanner, a printer and a host computer, interconnected by a digital network, the method comprising the steps of:
- at a sending station;
generating a document file through a data source, receiving a session-specific user-defined character string from an operator,automatically forming an encryption key based on the user-defined character string,encrypting the document file to produce an encrypted document file, using the encryption key, while automatically leaving one or more predetermined specifying header items in the document file as unencrypted,forming a transmission file including the encrypted document file, andtransmitting the transmission file towards a receiving station; and
at the receiving station;
storing the received transmission file,receiving the same user-defined character string by from operator,automatically forming a decryption key based on the user-defined character string, anddecrypting the encrypted document file to a decrypted document file, using the decryption key,the method further comprising;
at the sending station;
forming an additional file containing metadata relevant for the document file but excluding any decryption clue, the additional file having a first part and a second part, andencrypting only one of the first and second parts of the additional file, using the same encryption key used for encrypting the document file,wherein in the step of forming the transmission file, the additional file is included in the transmission file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for secure transmission of digital document data between multiple devices are provided. At a sending station, a document file is generated and a user-defined character string is inputted by an operator in the local user interface. Then, the sending station automatically forms an encryption key based on the user-defined character string and encrypts the document file therewith. However, one or more predetermined specifying header items of the file are not encrypted, to facilitate recognition and handling of the file. A transmission file, including the encrypted document file, is then transmitted towards a receiving station, where the encrypted document file is decrypted based on the same user-defined character string entered at the sending station, when the latter is entered in the local user interface of the receiving station. Even though the transmission file is encrypted, the unencrypted header items enable file handling, such as routing, and accounting.
-
Citations
22 Claims
-
1. A method for securely transmitting digital data relating to a document between a scanner, a printer and a host computer, interconnected by a digital network, the method comprising the steps of:
-
at a sending station; generating a document file through a data source, receiving a session-specific user-defined character string from an operator, automatically forming an encryption key based on the user-defined character string, encrypting the document file to produce an encrypted document file, using the encryption key, while automatically leaving one or more predetermined specifying header items in the document file as unencrypted, forming a transmission file including the encrypted document file, and transmitting the transmission file towards a receiving station; and at the receiving station; storing the received transmission file, receiving the same user-defined character string by from operator, automatically forming a decryption key based on the user-defined character string, and decrypting the encrypted document file to a decrypted document file, using the decryption key, the method further comprising; at the sending station; forming an additional file containing metadata relevant for the document file but excluding any decryption clue, the additional file having a first part and a second part, and encrypting only one of the first and second parts of the additional file, using the same encryption key used for encrypting the document file, wherein in the step of forming the transmission file, the additional file is included in the transmission file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system including at least two image processing devices, and adapted for secure transmission of digital data relating to a document between the at least two image processing devices, the system comprising:
-
a sending station including; a user interface for inputting a session-specific user-defined character string by an operator, a key former for automatically forming an encryption key based on the user- defined character string, an encryption module for encrypting a document file to produce an encrypted document file, using the encryption key, while automatically leaving one or more predetermined specifying header items in the document file as unencrypted, a file former for forming a transmission file including the encrypted document file, and a transmitter for transmitting the transmission file towards a receiving station; and
a receiving station including;a receiver for receiving the transmission file from the sending station, a storage unit for storing the received transmission file, a user interface for inputting a user-defined character string by an operator, a second key former for automatically forming a decryption key based on the input user-defined character string, and a decryption module for decrypting the encrypted document file to a decrypted document file, using the decryption key, wherein the sending station further includes; a module for forming an additional file containing metadata relevant for the document file but not including any decryption clue, the additional file having a first part and a second part, and wherein the encryption module also encrypts only one of the first and second parts of the additional file using the same encryption key used for encrypting the document file, and the additional file is included in the transmission file. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification