The present invention generally relates to printers, and more particularly to controlling printer macro usage based on printer identification information.
Printer macros (also referred to as electronic forms or eforms) are typically stored in a file system or working memory (RAM) of a printer, and can be executed by the printer to perform a variety of functions. For example, one common use of a printer macro is to place a company logo on each page of a printed document. Macros are typically invoked by a printer in response to a request in a print job that specifies an identifier for the desired printer macro. By storing information for commonly used functions in the printer in the form of a macro, the information need not be transmitted to the printer for each print job.
A problem exists of users illegally copying printer macros from one printer file system to another printer file system. Printer macros are typically stored on a disk or dual in-line memory modules (DIMM's) within a printer. As printers adopt removable storage media, such as Compact Flash®, for storing printer resources, such as macros or eforms, it becomes increasingly important to protect these resources from unauthorized distribution and use. In general, most printer architectures dictate that data stored on Compact Flash® is to be stored on a proprietary file system, such as the LynxOS® file system, in order to be usable by printer firmware. As such, printer resources that were once provided with some level of protection by virtue of being stored in a proprietary data format on a storage medium whose low-level data organization was also proprietary, become as unprotected on a removable storage medium as files stored on client computer file systems.
One form of the present invention provides a method of controlling usage of printer macros stored in a printer. The method includes detecting a request for use of a first one of the printer macros by a print job. Printer identification information contained in the first printer macro is compared to a printer identifier stored in the printer. Usage of the first printer macro by the printer is controlled based on the comparison.
In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. The following detailed description, therefore, is not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims.
In one embodiment, print engine 108 is a laser print engine, and includes conventional laser printer elements (not shown) for forming an image on media, such as a laser, a rotating polygonal-mirror to deflect the laser beam, a photoconductive drum, toner dispensers, media handlers, as well as other conventional elements known to those of ordinary skill in the art. It is to be understood that other types of printers and their associated elements can be utilized by the present invention.
In one embodiment, memory 110 includes multiple types of memory, including both volatile and non-volatile memory, such as random access memory (RAM), read-only memory (ROM), and flash memory. In one form of the invention, memory 110 stores a file system 112, a printer identifier (e.g., printer serial number) 116, and firmware 118. A plurality of printer macros 114A-114C (collectively referred to as printer macros 114) are stored in file system 112, and are available for use by a print application in a computer (not shown) coupled to the printer 100. Macros 114 are also referred to as electronic forms or “eforms.” Each of the printer macros 114 includes a unique identifier and a set of printer commands. A print job may request that one or more of the macros 114 be used in the job by specifying the unique identifiers of the desired macros 114 in the request. In one embodiment, macros 114 are stored on a removable storage medium, such as Compact Flash®, which may be removed from printer 100 and placed in another printer or other device.
Firmware 118 includes a plurality of firmware modules 120-132, which include instructions that are executed by processor 106. In one embodiment, the firmware modules include user interface 120, device state tracker 122, job manager 124, engine manager 126, file system manager 128, macro license manager 130, and encryption manager 132.
User interface 120 handles receipt and processing of user input information that is input on a front panel (not shown) of printer 100, and handles the display of information to the user. Device state tracker 122 retrieves status information from various hardware components (e.g., sensors) in printer 100 in response to received status inquiries (e.g., how much toner is left in the toner cartridge), and forwards status information to the requesting component. Job manager 124 parses and processes data streams that printer 100 receives from various input/output connections (e.g., I/O interface 102), and invokes other software components as appropriate to complete print jobs. Engine manager 126 controls and provides an interface to print engine 108. File system manager 128 controls and provides an interface to file system 112. File system manager 128 receives file system requests from other software components, converts the requests into an appropriate language to manipulate the file system 112, and returns appropriate data to the requesting component. Macro license manager 130 performs various printer macro security functions, as described in further detail below. Encryption manager 132 performs encryption and decryption functions, as described in further detail below.
In one embodiment, printer 100 provides security for those printer macros 114 that are stored on the local file system 112 by checking for a printer serial number in a requested printer macro 114. In one form of the invention, when a print job requests that one of the printer macros 114 be used, the requested printer macro 114 is validated for use by the presence of a printer serial number in the printer macro 114. In one embodiment, if the printer macro data 114 does not contain a serial number that matches the serial number 116 of printer 100, the print job is rejected.
In one form of the invention, if a printer macro 114 does not include a printer serial number, printer 100 writes its serial number 116 to the printer macro 114. In one embodiment, printer macros 114 are configured to include multiple printer serial numbers based on the licensing agreement established between the customer and the printer macro provider. In one form of the invention, each printer macro 114 includes a field that specifies the maximum number of printer serial numbers that can be stored in the printer macro 114. In one embodiment, printer 100 does not attempt to add its printer serial number 116 to a printer macro 114 when the maximum number of serial numbers has already been attained.
Printer macro security functions are described in further detail below with reference to
Printer macro 300 is shown in a table that includes two columns 302A and 302B, and twenty-two rows 304A-304V (collectively referred to as rows 304). Each row 304 includes a PCL5® command, or text, in column 302A, and a corresponding description in column 302B. The PCL5® commands in macro 300 include some of the printer macro commands 200 shown in
Row 304B of macro 300 includes the command “ESC&f0X,” which identifies the start of the macro definition. Row 304V includes the command “ESC&f1X,” which identifies the end of the macro definition. Rows 304C-304U include commands and text for causing the printer 100 to print a company logo (i.e., ABC Corp.'s logo) on a printed page. The illustrated command sequence to perform this function of printing a logo will be understood by persons of ordinary skill in the art. The specific commands used to print a logo are not relevant to the provision of macro security according to one embodiment, and are, therefore, not described in further detail herein.
In one embodiment, each of the printer macros 114 in the printer file system 112 (shown in
In step 812, macro license manager 130 compares the printer serial number 116 to the serial number in the macro security data field 606B-1 of the requested printer macro 114, and determines if the values match. If the values match, in step 810, macro license manager 130 informs Job manager 124 that the requested printer macro 114 can be used in the print job. If the values do not match, in step 816, macro license manager 130 informs job manager 124 that the requested printer macro 114 cannot be used in the print job. In one embodiment, if the job manager 124 receives an indication that a requested printer macro 114 cannot be used in a print job, the job manager 124 rejects the print job and invokes user interface 120 to inform the user that the print job cannot be completed.
If it is determined in step 804 that the requested printer macro 114 does not include a printer serial number in the macro security data field 606B-1, the method moves to step 808. In step 808, macro license manager 130 issues a query for the serial number 116 of printer 100, and the serial number 116 is provided to macro license manager 130 by device state tracker 122 in response to the query. In step 814, macro license manager 130 writes the printer serial number 116 to the macro security data field 606B-1 of the requested printer macro 114, and saves the modified printer macro 114 back to the file system 112. In step 818, macro license manager 130 informs job manager 124 that the requested printer macro 114 can be used in the print job.
Sophisticated users may attempt to copy a printer macro 114 from one printer to another, and modify the serial number 116 in the macro security data field 606B-1 of the printer macro 114. In one embodiment, the serial number data in the macro security data field 606B-1 is encrypted with a unique key by encryption manager 132 to protect the printer macro 114 from serial number manipulation attempts. Encryption manager 132 is invoked by macro license manager 130 to decrypt the serial number data in the macro security data field 606B-1 prior to making the serial number comparison in step 812 of method 800.
In one form of the invention, sub-field 904A is a maximum printer count (MaxPtrCount) sub-field, which begins at byte offset zero, and consumes two bytes. In one embodiment, sub-fields 904B-904E are printer serial number (PtrSerialNum) sub-fields that each begin at an even byte offset and consume two bytes. In one form of the invention, the printer serial number sub-fields 904B-904E are used to store printer identification information (e.g., printer serial number(s)). In one embodiment, the maximum printer count sub-field 904A includes a value that indicates the maximum number of printer serial numbers that can be written to sub-fields 904B-904E. The number of printer serial number sub-fields 904B-904E may vary from macro to macro, depending upon the number of licenses purchased for each macro.
If it is determined in step 1004 that the requested printer macro 114 does not include a printer serial number in the macro security data field 606B-2, the method moves to step 1008. In step 1008, macro license manager 130 issues a query for the serial number 116 of printer 100, and the serial number 116 is provided to macro license manager 130 by device state tracker 122 in response to the query. In step 1014, macro license manager 130 writes the printer serial number 116 to the macro security data field 606B-2 in the requested printer macro 114, and saves the modified printer macro 114 back to the file system 112. In step 1020, macro license manager 130 informs job manager 124 that the requested printer macro 114 can be used in the print job.
If it is determined in step 1004 that a serial number is present in the requested printer macro 114, in step 1006, macro license manager 130 issues a query for the serial number 116 of printer 100, and the serial number 116 is provided to macro license manager 130 by device state tracker 122 in response to the query. In step 1012, macro license manager 130 compares the printer serial number 116 to the serial number(s) in the macro security data field 606B-2 of the requested printer macro 114, and determines if there is a match. If there is a match, in step 1010, macro license manager 130 informs job manager 124 that the requested printer macro 114 can be used in the print job. If there is not a match, in step 1018, macro license manager 130 determines whether the number of printer serial numbers in the macro security data field 606B-2 is less than the value specified in the maximum printer count sub-field 904A. If the number of printer serial numbers in the macro security data field 606B-2 is not less than the value specified in sub-field 904A, in step 1016, macro license manager 130 informs job manager 124 that the requested printer macro 114 cannot be used in the print job. In one embodiment, if the job manager 124 receives an indication that a requested printer macro 114 cannot be used in a print job, the job manager 124 rejects the print job and invokes user interface 120 to inform the user that the print job cannot be completed.
If it is determined in step 1018 that the number of printer serial numbers in macro security data field 606B-2 is less than the value specified in sub-field 904A, the method moves to step 1022. In step 1022, macro license manager 130 writes the printer serial number 116 to the macro security data field 606B-2 in the requested printer macro 114, and saves the modified printer macro 114 back to the file system 112. In step 1024, macro license manager 130 informs job manager 124 that the requested printer macro 114 can be used in the print job.
In one embodiment, the serial number data in macro security data field 606B-2 and the maximum number of printers data in sub-field 904A are both encrypted with a unique key by encryption manager 132 to protect the printer macro 114 from manipulation attempts. Encryption manager 132 is then invoked by macro license manager 130 to decrypt the data prior to making the comparisons in step 1012 and 1018 of method 1000.
It will be understood by a person of ordinary skill in the art that functions performed by printer 100 may be implemented in hardware, software, firmware, or any combination thereof. The implementation may be via a microprocessor, programmable logic device, or state machine. Components of the present invention may reside in software on one or more computer-readable mediums. The term computer-readable medium as used herein is defined to include any kind of memory, volatile or non-volatile, such as floppy disks, hard disks, CD-ROMs, flash memory, read-only memory (ROM), and random access memory.
One form of the present invention provides a security mechanism to deter printer macro licensing violations, which involves incorporating a serial number of a printer into a printer macro's data structure. One form of the invention provides printer macro security by making a change to conventional printer firmware, and to conventional printer macro data structures. One embodiment of the present invention provides a printer macro security mechanism that is contained within a printer device. In one embodiment, printer macro entities are modified to allow for the storage of a printer serial number(s). One embodiment of the invention helps to prevent use of illegal copies of printer macros by “serializing” a printer macro to the first printer that used the printer macro, thereby configuring the printer macro to be used only on that one printer. In another embodiment, printer macros are “serialized” to a plurality of printers, so that the printer macros are useable on that plurality of printers, but not on other printers.
Although specific embodiments have been illustrated and described herein for purposes of description of the preferred embodiment, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent implementations may be substituted for the specific embodiments shown and described without departing from the scope of the present invention. Those with skill in the mechanical, electro-mechanical, electrical, and computer arts will readily appreciate that the present invention may be implemented in a very wide variety of embodiments. This application is intended to cover any adaptations or variations of the preferred embodiments discussed herein. Therefore, it is manifestly intended that this invention be limited only by the claims and the equivalents thereof.
Number | Name | Date | Kind |
---|---|---|---|
4612532 | Bacon et al. | Sep 1986 | A |
4883291 | Robertson | Nov 1989 | A |
5034770 | O'Connell | Jul 1991 | A |
5239621 | Brown, III et al. | Aug 1993 | A |
5390297 | Barber et al. | Feb 1995 | A |
5522028 | Nagata et al. | May 1996 | A |
5533174 | Flowers, Jr. et al. | Jul 1996 | A |
5542050 | Onozawa | Jul 1996 | A |
5550932 | Blaylock et al. | Aug 1996 | A |
5729666 | Konsella et al. | Mar 1998 | A |
5933584 | Maniwa | Aug 1999 | A |
6184880 | Okada | Feb 2001 | B1 |
6252671 | Peng et al. | Jun 2001 | B1 |
6379058 | Petteruti et al. | Apr 2002 | B1 |
6381030 | Udagawa et al. | Apr 2002 | B1 |
6426798 | Yeung | Jul 2002 | B1 |
6727997 | Miller | Apr 2004 | B1 |
6856317 | Konsella et al. | Feb 2005 | B2 |
6974917 | Hattori et al. | Dec 2005 | B2 |
7098898 | Hattori et al. | Aug 2006 | B2 |
7117180 | Stefik et al. | Oct 2006 | B1 |
20020136578 | Johnson et al. | Sep 2002 | A1 |
20020181001 | Klosterman et al. | Dec 2002 | A1 |
20030009483 | Reese | Jan 2003 | A1 |
20030023764 | Reese et al. | Jan 2003 | A1 |
20040041840 | Green et al. | Mar 2004 | A1 |
20040075856 | Lay et al. | Apr 2004 | A1 |
20040134370 | Katamoto et al. | Jul 2004 | A1 |
20040141190 | Akashi | Jul 2004 | A1 |
20040184043 | Hirosugi et al. | Sep 2004 | A1 |
20040207627 | Konsella et al. | Oct 2004 | A1 |
20040254955 | Reese et al. | Dec 2004 | A1 |
20040254987 | Konsella et al. | Dec 2004 | A1 |
20050021970 | Reese et al. | Jan 2005 | A1 |
20050062996 | Yamanaka | Mar 2005 | A1 |
20050094173 | Engelman et al. | May 2005 | A1 |
20060069824 | Hodder | Mar 2006 | A1 |
Number | Date | Country |
---|---|---|
0480593 | Apr 1992 | EP |
64-082128 | Mar 1989 | JP |
04191063 | Jul 1992 | JP |
05-224914 | Sep 1993 | JP |
10-240474 | Sep 1998 | JP |
2001-309099 | Nov 2001 | JP |
2002-312053 | Oct 2002 | JP |
Number | Date | Country | |
---|---|---|---|
20040179215 A1 | Sep 2004 | US |