Approach for securely processing an electronic document
First Claim
1. A method for determining whether a security configuration state of a document-processing device has changed, comprising:
- receiving, at a security server from the document-processing device over a communications network, first security state data that describes a first security configuration state of the document-processing device, wherein the first security state data includes one or more security settings that indicate whether one or more security features are selected for a first security state of the document-processing device, wherein the security server is separate from the document processing device and one or more other document-processing devices and communicates with the document-processing device and the one or more other document-processing devices over the communications network;
receiving, at the security server from the document-processing device over the communications network, second security state data that describes a second security configuration state of the document-processing device, wherein the second security state data is received subsequent to the receipt of the first security state data and wherein the second security state data includes one or more security settings that indicate whether the one or more security features are selected for a second security state of the document-processing device;
the security server comparing the first security state data with the second security state data to determine whether the first security state and the second security state correspond to the same security state of the document-processing device; and
communicating, to a requestor, a message indicating whether the security configuration state of the document-processing device has changed from the first configuration state based on the comparison of the first security state data with the second security state data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for processing an electronic document in a secure manner is provided. A client may verify that the configuration state of a standalone document-processing device has not changed since a prior configuration state by issuing a request to a security server. The security server may process the request to determine whether the configuration state of the standalone document-processing device has changed since the document-processing device was registered with the security server. The security server may also verify that actions performed on the document-processing device. A storage medium of a document-processing device may be protected against unauthorized removal of the storage medium by storing, separate from the storage medium, a password required to access the storage medium, and when the document-processing device is powered on, the password is provided to the storage medium.
32 Citations
15 Claims
-
1. A method for determining whether a security configuration state of a document-processing device has changed, comprising:
-
receiving, at a security server from the document-processing device over a communications network, first security state data that describes a first security configuration state of the document-processing device, wherein the first security state data includes one or more security settings that indicate whether one or more security features are selected for a first security state of the document-processing device, wherein the security server is separate from the document processing device and one or more other document-processing devices and communicates with the document-processing device and the one or more other document-processing devices over the communications network; receiving, at the security server from the document-processing device over the communications network, second security state data that describes a second security configuration state of the document-processing device, wherein the second security state data is received subsequent to the receipt of the first security state data and wherein the second security state data includes one or more security settings that indicate whether the one or more security features are selected for a second security state of the document-processing device; the security server comparing the first security state data with the second security state data to determine whether the first security state and the second security state correspond to the same security state of the document-processing device; and communicating, to a requestor, a message indicating whether the security configuration state of the document-processing device has changed from the first configuration state based on the comparison of the first security state data with the second security state data. - View Dependent Claims (2, 3, 4)
-
-
5. A method for verifying activity on a document-processing device, comprising:
-
receiving, at the document-processing device, a request to process a document and user identification data, wherein the request to process the document specifies one or more actions to be performed on the document and the user identification data specifies one or more users associated with the request to process the document; the document-processing device transmitting the request to process the document, the user identification data and an electronic copy of the document to a security server over a communications network, wherein the security server is separate from the document-processing device; the security server generating and storing, based upon the request to process the document and the user identification data, activity data that identifies the one or more users associated with the request and the one or more actions specified in the request to process the document; and in response to the security server receiving a request to verify activity on the document-processing device, the security server generating, based upon the activity data, a response that indicates at least the one or more users associated with the request and the one or more actions specified in the request to process the document; and the security server transmitting the response to a sender of the request to verify whether or not the activity occurred at the document-processing device.
-
-
6. A non-transitory computer-readable medium storing instructions for determining whether a security configuration state of a document-processing device has changed, wherein processing of the instructions by one or more processors causes:
-
receiving, at a security server from the document-processing device over a communications network, first security state data that describes a first security configuration state of the document-processing device, wherein the first security state data includes one or more security settings that indicate whether one or more security features are selected for a first security state of the document-processing device, wherein the security server is separate from the document processing device and one or more other document-processing devices and communicates with the document-processing device and the one or more other document-processing devices over the communications network; receiving, at the security server from the document-processing device over the communications network, second security state data that describes a second security configuration state of the document-processing device, wherein the second security state data is received subsequent to the receipt of the first security state data and wherein the second security state data includes one or more security settings that indicate whether the one or more security features are selected for a second security state of the document-processing device; the security server comparing the first security state data with the second security state data to determine whether the first security state and the second security state correspond to the same security state of the document-processing device; and communicating, to a requestor, a message indicating whether the security configuration state of the document-processing device has changed from the first configuration state based on the comparison of the first security state data with the second security state data. - View Dependent Claims (7, 8, 9)
-
-
10. A non-transitory computer-readable medium storing instructions for verifying activity on a document-processing device, wherein processing of the instructions by one or more processors causes:
-
receiving, at the document-processing device, a request to process a document and user identification data, wherein the request to process the document specifies one or more actions to be performed on the document and the user identification data specifies one or more users associated with the request to process the document; the document-processing device transmitting the request to process the document, the user identification data and an electronic copy of the document to a security server over a communications network, wherein the security server is separate from the document-processing device; the security server generating and storing, based upon the request to process the document and the user identification data, activity data that identifies the one or more users associated with the request and the one or more actions specified in the request to process the document; and in response to the security server receiving a request to verify activity on the document-processing device, the security server generating, based upon the activity data, a response that indicates at least the one or more users associated with the request and the one or more actions specified in the request to process the document; and the security server transmitting the response to a sender of the request to verify whether or not the activity occurred at the document-processing device.
-
-
11. An apparatus for determining whether a security configuration state of a document-processing device has changed, comprising:
-
one or more processors; and a machine-readable medium carrying one or more sequences of instructions, which when executed by the one or more processors, causes; receiving, at a security server from the document-processing device over a communications network, first security state data that describes a first security configuration state of the document-processing device, wherein the first security state data includes one or more security settings that indicate whether one or more security features are selected for a first security state of the document-processing device, wherein the security server is separate from the document processing device and one or more other document-processing devices and communicates with the document-processing device and the one or more other document-processing devices over the communications network; receiving, at the security server from the document-processing device over the communications network, second security state data that describes a second security configuration state of the document-processing device, wherein the second security state data is received subsequent to the receipt of the first security state data and wherein the second security state data includes one or more security settings that indicate whether the one or more security features are selected for a second security state of the document-processing device; the security server comparing the first security state data with the second security state data to determine whether the first security state and the second security state correspond to the same security state of the document-processing device; and communicating, to a requestor, a message indicating whether the security configuration state of the document-processing device has changed from the first configuration state based on the comparison of the first security state data with the second security state data. - View Dependent Claims (12, 13, 14)
-
-
15. An apparatus for verifying activity on a document-processing device, comprising:
-
one or more processors; and a non-transitory computer-readable medium storing instructions, which when processed by the one or more processors, causes; receiving, at the document-processing device, a request to process a document and user identification data, wherein the request to process the document specifies one or more actions to be performed on the document and the user identification data specifies one or more users associated with the request to process the document; the document-processing device transmitting the request to process the document, the user identification data and an electronic copy of the document to a security server over a communications network, wherein the security server is separate from the document-processing device; the security server generating and storing, based upon the request to process the document and the user identification data, activity data that identifies the one or more users associated with the request and the one or more actions specified in the request to process the document; and in response to the security server receiving a request to verify activity on the document-processing device, the security server generating, based upon the activity data, a response that indicates at least the one or more users associated with the request and the one or more actions specified in the request to process the document; and the security server transmitting the response to a sender of the request to verify whether or not the activity occurred at the document-processing device.
-
Specification