The present invention relates generally to digital transmitters.
Digital transmitters, such as digital senders, digital network copiers, multi-function peripherals, etc., convert printed material, e.g., paper documents, into digital data to be sent to various predefined destinations, e.g., electronic mail (email) addresses, facsimile (fax) destinations (e.g., via LAN fax, Internet fax, etc.), network printers, personal computers, or other data receiving devices. Digital transmitters normally include a scanner for scanning in the printed material for subsequent conversion into digital data by the digital transmitter. One problem is that digital transmitters typically do not provide for guarding against unauthorized sending of data corresponding to the sensitive printed material.
An embodiment of the present invention provides a method of operating a digital transmitter. The method includes detecting a security code and determining whether a user of the digital transmitter has proper security authorization. Sending data corresponding to printed material scanned into the digital transmitter to one or more destination addresses selected by the user when the user has proper security authorization and implementing security measures when the user does not have proper security authorization are also included in the method.
In the following detailed description of the present embodiments, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that process, electrical or mechanical changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims and equivalents thereof.
More specifically, for one embodiment, scanner 110 includes a light source 132 and a sensor 134, such as a charged-coupled device (CCD), connected to a digitizer 136, e.g., an analog-to-digital converter. Light source 132 illuminates printed material 102. The light is reflected off of printed material 102 and is received at sensor 134 that converts the reflected light into an analog electrical signal representative of printed material 102. The electronic signal is transmitted to digitizer 136 that converts the analog electrical signal into a digital electrical signal. The digital electrical signal is then transmitted to controller 120.
For one embodiment, controller 110 includes a memory 138, e.g., a computer-usable storage media that can be fixedly or removably attached to digital transmitter 100. Some examples of computer-usable media include static or dynamic random access memory (SRAM or DRAM), read-only memory (ROM), electrically-erasable programmable ROM (EEPROM or flash memory), magnetic media and optical media, whether permanent or removable. Memory 138 may include more than one type of computer-usable media for storage of differing information types.
In various embodiments, memory 138 stores data of the digital signal received from digitizer 136 for subsequent formatting by controller 120. In one embodiment, memory 138 stores the data prior to transmission of the data to the one or more destination addresses on the data network. For another embodiment, memory 138 contains computer-readable instructions, e.g., drivers, adapted to cause a processor 140 of controller 120 to format the data received from scanner 110 and computer-readable instructions to cause processor 140 to cause digital transmitter 100 to perform various methods, as described below.
For one embodiment, digital transmitter 100 includes a user interface 142, such as a graphical user interface, that includes a display 144. For some embodiments, user interface 142 includes arrow keys 146 for navigating display 144, e.g., by scrolling through menu items of display 144, touch-sensitive icons (not shown) corresponding to the menu items of display 144, etc. The computer-readable instructions cause digital transmitter 100 to perform methods in response to the user selecting menu items of display 144, such as scanning printed material 102. For some embodiments, the user can select menu items corresponding to one or more destination addresses, and digital transmitter 100 will send the data corresponding to printed material 102 to these addresses if authorized. For other embodiments, the user can select one or more destination addresses by inputting the addresses using interface keys 148 of user interface 142.
For some embodiments, printed material 102 includes an indicator, such as a watermark, bar code, or the like, e.g., included on each page of a multi-page printed document. The indicator is scanned into digital transmitter 100 and stored as digital data in memory 138 along with printed material 102. For one embodiment, the indicator includes a security code related to the content of printed material 102 and, for example, an identifier for identifying printed material 102, such as a title of printed material 102 etc. The security code may include one or more numbers or letters or may be alphanumeric. For another embodiment, the security code is used to determine a security authorization of the user that may also be expressed in terms of one or more numbers or letters or may be alphanumeric. For other embodiments, the security code is a security level.
For other embodiments, the computer readable instructions cause memory 138 to supply the appropriate security authorization in response to the user logging on to digital transmitter 100; that is, inputting a user identification code, e.g., user name and/or password. The user identification code can be input using interface keys 148 of user interface 142, from a user card via a card reader 150 of user interface 142, etc. For one embodiment, the computer readable instructions cause a prompt to display on display 144 for prompting the user to input the user identification code, for example, before the user can scan printed material 102. For another embodiment, the prompt is displayed in response to the user placing printed material 102 on scanner 110, the user electing to scan printed material 102 by selecting a menu item of user interface 142, etc. Alternatively, the computer readable instructions can cause display 144 to prompt the user to input the security authorization along with the user identification code using interface keys 148.
For various embodiments, the computer-readable instructions are adapted to cause digital transmitter 100 to perform a method 200, as illustrated by a flowchart in
If it is determined that the user does not have the proper security authorization at block 230, for example, the user's security authorization does not match or exceed the security code, security measures are implemented at block 250. For one embodiment, the security measures include preventing the data from being sent to any of the destination addresses, e.g., by deleting the data. For another embodiment, the security measures include deleting the data or saving the data in memory 138 and sending a security message, indicative of an unauthorized sending attempt, to a destination address of a security monitor 160 for recording security messages. For some embodiments, at least a representative portion of the data is sent to security monitor 160 along with the security message. Security messages may be sent to security monitor 160 with or without notifying the user. Notifying the user of an unauthorized sending attempt may include displaying a message on display 144 or sending an email to the user indicative of the unauthorized sending attempt.
For one embodiment security monitor 160 is located remotely of digital transmitter 100 and is connected to digital transmitter 100 by a data link 162 that may be a hardwired connection or a wireless connection. For another embodiment, security monitor 160 is a computer email box or fax machine of an administrator, such as security personnel or the user's supervisor. For some embodiments security monitor 160 is a voicemail box of the administrator, and the security message sent thereto is an audible message. For another embodiment, security monitor 160 is integrated in digital transmitter 100. For other embodiments, security monitor 160 is accessible through interface 130. For another embodiment, security monitor 160 is a server on a data network.
For other embodiments, the security measures include reviewing the selected destination addresses and sending the data to some of the destination addresses, such as destination addresses approved for the user's security authorization. For one embodiment, approved destinations corresponding to each user's security authorization are stored in memory 138. In these embodiments, a security message may be sent to security monitor 160 that corresponds to attempting to send data to any destinations not approved for the user's security authorization.
For another embodiment, reviewing the selected destination addresses includes looking for a tag on each of the destination addresses indicative of a security authorization for the respective destination address, for example, by comparing the tag to the user's security authorization. When the user's security authorization matches or exceeds the tag of a destination address, the data are sent to that destination address. When the user's security authorization does not match or exceed the tag, a security message may be sent to security monitor 160 indicating that an attempt was made to send data to destinations not approved for the user's security authorization.
For some embodiments, the security code is a keyword or phrase contained within printed material 102, such as text of printed material 102, or a graphical image contained within printed material 102, such as a portion of a drawing or an entire drawing. For these embodiments, data corresponding to scanned printed material 102 is converted into a data file, e.g., by an Optical Character Recognition (OCR) algorithm, a Graphical Image Recognition algorithm, etc. stored in memory 138, that can be searched for the security code (i.e., the keyword or key phrase or key graphical image).
For various embodiments, the computer-readable instructions are adapted to cause digital transmitter 100 to perform a method 300, as illustrated by a flowchart in
For one embodiment, when the security code corresponds to a low security level at decision block 320, digital transmitter issues a security message at block 330. This may include displaying the security message on display 144 and/or sending the security message to the user and/or to security monitor 160. For some embodiments, the security message includes the document title and/or one or more destination addresses for receiving printed material 102. The security message may also include either all or a portion of the printed material. For other embodiments, security monitor records the security message, e.g., for subsequent review by the administrator. Then, at block 340, the data corresponding to printed material 102 is sent to one or more of the destination addresses selected by the user. Specifically, for one embodiment, the data is sent to all of the destination addresses selected by the user. Security messages may be sent to security monitor 160 with or without notifying the user.
For another embodiment, when the security code does not correspond to a low security level at decision block 320, digital transmitter prompts the user to input a security authorization at block 350. The security level corresponding to the security code for printed material 102 is compared to the security authorization of the user at block 360. For some embodiments, if the security authorization matches or exceeds the security level, it is determined that the user has proper security authorization at decision block 370, and at block 340, the data corresponding to printed material 102 is sent to one or more of the destination addresses selected by the user. Specifically, for one embodiment, the data is sent to all of the destination addresses selected by the user. For some embodiments, a security message is sent to security monitor 160 prior to sending the data to the destination addresses. For one embodiment, the security message includes the user's name and an indication that printed material requiring the user's security authorization was sent. The security message may also include the destination addresses, either all or a portion of the printed material, and/or the title of the printed material.
If it is determined that the user does not have the proper security authorization at block 370, for example, the user's security authorization does not match or exceed the security level, security measures are implemented at block 380. For one embodiment, the security measures are as described above for block 250 of
For various embodiments, the security code includes one of the destination addresses selected by the user for receiving printed material 102, and each of the predetermined security codes includes a destination address that corresponds to a predetermined security level. For example, some organizations may wish to restrict sending data corresponding to printed material 102 by destination address rather than the content of the printed material 102. For these embodiments, method 300 is executed for each of the destination addresses. That is, when one of the destination addresses corresponds to a low security level at decision block 320, a security message is issued at block 330, and at block 340, data corresponding to printed material 340 is sent to that destination address. When another of the destination addresses does not correspond to a low security level at block 320, and the user has the proper security authorization at decision block 370, data corresponding to printed material 340 is sent to that destination address at block 340. Otherwise, the security measures are implemented for that destination address at block 380.
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement that is calculated to achieve the same purpose may be substituted for the specific embodiments shown. Many adaptations of the invention will be apparent to those of ordinary skill in the art. Accordingly, this application is intended to cover any adaptations or variations of the invention. It is manifestly intended that this invention be limited only by the following claims and equivalents thereof.