×

Approach for securely processing an electronic document

  • US 8,151,363 B2
  • Filed: 09/13/2006
  • Issued: 04/03/2012
  • Est. Priority Date: 07/13/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for determining whether a security configuration state of a document-processing device has changed, comprising:

  • receiving, at a security server from the document-processing device over a communications network, first security state data that describes a first security configuration state of the document-processing device, wherein the first security state data includes one or more security settings that indicate whether one or more security features are selected for a first security state of the document-processing device, wherein the security server is separate from the document processing device and one or more other document-processing devices and communicates with the document-processing device and the one or more other document-processing devices over the communications network;

    receiving, at the security server from the document-processing device over the communications network, second security state data that describes a second security configuration state of the document-processing device, wherein the second security state data is received subsequent to the receipt of the first security state data and wherein the second security state data includes one or more security settings that indicate whether the one or more security features are selected for a second security state of the document-processing device;

    the security server comparing the first security state data with the second security state data to determine whether the first security state and the second security state correspond to the same security state of the document-processing device; and

    communicating, to a requestor, a message indicating whether the security configuration state of the document-processing device has changed from the first configuration state based on the comparison of the first security state data with the second security state data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×