Methods and apparatus for secure document printing
First Claim
Patent Images
1. A system comprising:
- a client computer adapted to;
(a) send first and second sets of computer program instructions to a printer, the first set of computer program instructions adapted to cause the printer to generate a first encryption key and a first decryption key, the second set of computer program instructions adapted to enable the printer to decrypt print data;
(b) encrypt print data at the client computer using the first encryption key; and
(c) send the encrypted print data to the printer;
wherein the printer is adapted to send the first encryption key to the client computer, and decrypt the encrypted print data using the first decryption key.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are provided for securely printing a print job on a networked printer. An application program running on a networked computer instructs the printer to generate and exchange cryptographic keys. The application program then encrypts the print job using the keys, and then communicates the encrypted print job to the printer. The printer decrypts the received print job and prints the document.
-
Citations
22 Claims
-
1. A system comprising:
-
a client computer adapted to; (a) send first and second sets of computer program instructions to a printer, the first set of computer program instructions adapted to cause the printer to generate a first encryption key and a first decryption key, the second set of computer program instructions adapted to enable the printer to decrypt print data; (b) encrypt print data at the client computer using the first encryption key; and (c) send the encrypted print data to the printer; wherein the printer is adapted to send the first encryption key to the client computer, and decrypt the encrypted print data using the first decryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a client computer adapted to; (a) send first and second sets of computer program instructions to a printer, the first set of computer program instructions causing the printer to generate a first cryptographic key, the second set of computer program instructions causing the printer to decrypt encrypted print data using a second cryptographic key; (b) use the first cryptographic key to generate the second cryptographic key; (c) encrypt print data using the second cryptographic key; and (d) send the encrypted print data to the printer; wherein the printer is adapted to send the first cryptographic key to the client computer, and use the first cryptographic key to generate the second cryptographic key. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a client computer adapted to; (a) generate a public and private cryptographic key pair; (b) send a key exchange program to a printer, the key exchange program generating a public and private cryptographic key pair at the printer and exchanging the public key of the printer with the public key of the client computer; (c) generate a secret key using the printer'"'"'s public key and the client computer'"'"'s private key; (d) provide a decryption program to the printer, wherein the decryption program is adapted to modify a file read operation at the printer; (e) encrypt print data using the secret key; and (f) send the encrypted print data to the printer; wherein the printer is adapted to generate a copy of the secret key using the client computer'"'"'s public key and the printer'"'"'s private key, and implement the modified file read operation to decrypt the encrypted print data using the secret key. - View Dependent Claims (20, 21, 22)
-
Specification