×

Secure printing with authenticated printer key

  • US 7,305,556 B2
  • Filed: 12/05/2001
  • Issued: 12/04/2007
  • Est. Priority Date: 12/05/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for securely storing a public key for encryption of data in a computing device, the method using a user-specific key pair which is securely stored in the computing device, the method comprising:

  • a user authenticating step of authenticating a user who logs into the computing device;

    a registering step of registering the user-specific key pair of the user authenticated by said authenticating step, wherein the user-specific key pair is registered in a secure registry;

    a receiving step of receiving a target public key corresponding to a target device;

    an obtaining step of obtaining the user-specific key pair from the secure registry, wherein the user-specific key pair is obtained from a key function call which is supported by an operating system executing in the computing device and wherein the key function call is provided with user login information for verification of the user'"'"'s authorization to use the computing device;

    a key encrypting step of using a user-specific private key from the user-specific key pair to create a target key verifier based on the target public key;

    a storing step of storing the target key verifier and the target public key in a storage area;

    a retrieving step of retrieving the target key verifier and the target public key from the storage area;

    a recognizing step of recognizing a printing instruction;

    a verification step of applying, in response to recognizing the printing instruction, a user-specific public key from the user-specific key pair to the target key verifier for verifying the authenticity of the target public key, wherein said verification step verifies whether the public key in the storage area and the public key in the secure registry correspond to each other; and

    a data encrypting step of encrypting data with the target public key, in the case that the authenticity of the target public key is verified, thereby creating encrypted data for transmission to the target device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×