Methods and apparatus for secure document printing
First Claim
Patent Images
7-1. The method of claim 1, wherein the first set of computer program instructions comprises a PostScript procedure.
9 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are provided for securely printing a print job on a networked printer. An application program running on a networked computer instructs the printer to generate and exchange cryptographic keys. The application program then encrypts the print job using the keys, and then communicates the encrypted print job to the printer. The printer decrypts the received print job and prints the document.
41 Citations
20 Claims
-
7-1. The method of claim 1, wherein the first set of computer program instructions comprises a PostScript procedure.
-
8-2. The method of claim 1, wherein the second set of computer program instructions also is adapted to cause the printer to modify a file read operation.
-
11. A method for securely communicating print data from a client computer to a networked printer, the method comprising:
-
providing a first set of computer program instructions from the client computer to the printer, the first set of computer program instructions causing the printer to generate a first cryptographic key;
generating a second cryptographic key at the client computer;
encrypting the print data using the second cryptographic key;
providing a second set of computer program instructions from the client computer to the printer, the second set of computer program instructions causing the printer to decrypt the encrypted print data. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for securely printing print data from a client computer to a networked printer, the method comprising:
-
generating a public and private cryptographic key pair at the client computer;
providing a key exchange program from the client computer to the printer, the key exchange program generating a public and private cryptographic key pair at the printer and exchanging the public key of the printer with the public key of the client computer;
providing a decryption program from the client computer to the printer, the decryption program modifying a file read operation at the printer;
encrypting the print data at the client computer and communicating the encrypted print data to the printer;
implementing the modified file read operation at the printer to decrypt the encrypted print data. - View Dependent Claims (18, 19, 20)
-
Specification