Various characteristics and advantages of the present invention will become clear from the following description taken in conjunction with the preferred embodiments with reference to the accompanying drawings throughout which like parts are designated by like reference numerals, in which:
With reference to the accompanying drawings, the best mode (embodiment) for implementing the present invention will now be specifically described. While this embodiment will be described in connection with a scanner apparatus as a typical image processing apparatus, an image processing apparatus as a subject matter of the present invention is not limited to such a scanner apparatus, but it is understood that the present invention may also be applied to various other image processing apparatuses, such as a printer and a complex machine. Further, an image processing method or procedure in the following description may be implemented using a program of the present invention.
The scanner apparatus 101 incorporates a scanner section 101a, a printer section 101b, an operator panel section 101c, a storage section (storage medium) 101d, a network communication section 101e and a processing section 101f. Although not illustrated in detail, the scanner section 101a comprises a light source, a prism and a CCD, and has a function of scanning a text document or an image document at a given resolution and converting the scanned document data to electronic data through a given image processing. Although not illustrated in detail, the printer section 101b comprises, for example, an electrophotographic mechanism, and an ink jet mechanism or a thermal transfer mechanism, and has a function of outputting electronic data, such as a print job, onto a surface of a sheet in the form of an image.
For example, the operator panel section 101c is a touch panel type. The operator panel section 101c comprises a mechanism for allowing an operator or user to enter various instructions therethrough, and a device for displaying a message to the user. Although not illustrated in detail, the storage section 101d comprises a hard disk drive (HDD) and a nonvolatile memory, and stores various data and software for the scanner apparatus 101. The network communication section 101e is connected to the network 102 to serve as a means to communicate with other apparatus connected to the network 102, and may be achieved using a network interface card (NIC). Although not illustrated in detail, the processing section 101f may be achieved using a combination of a microprocessor (CPU) and a random access memory (RAM), to perform various controls/processings for the entire scanner apparatus 101.
The processing section 101f is operable to perform various processings as well as controls for respective sections of the scanner apparatus 101. The processing section 101f comprises a common-key generation section f1, an encrypted-image-data generation section f2, an encrypted-common-key information generation section f3, an encrypted-image-data decryption section f4, and a determination section f5. The common-key generation section f1 is operable to generate a common key K corresponding to image data. The encrypted-image-data generation section f2 is operable to encrypt the image data using the common key K to generate encrypted image data.
The encrypted-common-key information generation section f3 is operable to encrypt the common key K using a public key A to generate encrypted-common-key information. The encrypted-image-data decryption section f4 is operable to decrypt the encrypted image data using the common key K to obtain decrypted image data. The determination section f5 is operable to determine whether a specific one of a plurality of individual storage areas (boxes) of the storage section 101d which is targeted for storing the image data generated by the scanner section 101a is associated with a public key A.
In the box management table 202, the item “ID” indicates a serial number of each of the boxes, and this serial number uniquely represents an actual physical position of the box. The item “Name” is a sequence of alphabets (letters) representing the name of a user associated with each of the boxes, i.e. an alphabet sequence associated with a specific user to have a user authenticating function. The item “Password” represents a password associated with each of the boxes, and a password associated with a specific user to have a user authenticating function. The item “Key” represents a public key associated with each of the boxes. The public key is binary data of about 512 to 1024 bites, which holds data, the so-called “electronic certificate”. For example, the box having the “ID”: 001, and the item “Name”: Okamoto, has a password “***” and a public key consisting of a character sequence which starts from “25AD - - - ”.
A common-key encryption algorithm is used in the encryption scheme for encrypting the image data 301 using the common key 302 to obtain encrypted data 305 (encrypted image data). This makes it possible to achieve enhanced processing efficiency in encryption of the image data 301. Further, a symmetric-key encryption algorithm is used in the encryption scheme for encrypting the common key 302 using the common key 302 to obtain encrypted data 306 (encrypted common key data). Thus, the encrypted data 306 of the common key 302 can be decrypted only by the private key 304. Therefore, the encrypted data 305 and the encrypted data 306 can be kept in a paired state so as to provide a high-security environment such that the image data 301 cannot be accessed without using the private key 304.
If the determination in Step S402 is “NO” or it is determined that there is no public key 303 associated with the specific box, image data of the scanned document will be stored in the specific box directly without encryption thereof (Step S403), and this scanning operation will be terminated. When the determination in Step S402 is “YES” or it is determined that there is the public key 303 associated with the specific box, the public key 303 associated with the specific box is displayed on the operator panel section 101c to prompt the user to determine whether the image data should be encrypted (Step S404). Then, user's instruction about encryption of the image data is checked (Step S405). If the user has issued no instruction about encryption of the image data (NO in Step S405), the data of the scanned document will be stored in the specific box directly without encryption thereof (Step S403), and this scanning operation will be terminated.
When the user has issued the instruction about encryption of the image data (YES in Step S405), a common key 302 for the image data 301 obtained by scanning the document is generated by use, for example, of random number generation means (Step S405). Then, the entire image data 301 is encrypted using the generated common key 302 (K), and the encrypted image data 301 is stored (Step S407). Further, the common key 302 is encrypted using the public key 303 (A), and the encrypted common key 302 is stored (Step S408). Then, this scanning operation is terminated.
With reference to
A private key 505 (A′) and a private key 507 (B′) are paired, respectively, with the public key 504 (A) and the public key 506 (B). These private keys 505, 507 are used in a symmetric-key encryption algorithm. The image data is electronic data of image obtained by scanning a document. This image data 508 is encrypted using the common key 509 produced every scanning or during scanning, and resulting encrypted data 510 is stored (save) in the image storage 501. In this embodiment, the common key 509 to be generated every scanning means a common key to be generated every job. Alternatively, the common key may be generated in such a manner as to be differently varied on a page-by-page basis even within a single job.
The common key 509 is encrypted using the public key 504 so as to store resulting encrypted data 511 in the box 502, and encrypted using the public key 506 so as to store resulting encrypted data 513 in the box 503. Further, the box 502 and the box 503 store, respectively, link information 512 and link information 514 each linking to the encrypted data 510 stored in the image storage 501. This is substantially equal to a state in which the encrypted data 510 resulting from encrypting the image data 508 is stored in each of the box 502 and the box 503. This data arrangement allows each of the box 502 and the box 503 to be provided with image data which can be decrypted (decoded) only by the private key 505 and the private key 507. In addition, this advantage can be obtained by storing only one encrypted data 510 obtained by the image data 508, in the image storage 501. This makes it possible to achieve efficient data arrangement. Further, in addition to the link information 512 and the link information 514, document information, such as document title, creation date and document preparer (when the (image) document is a scanned document, a person who has performed the scanning operation) may be stored in the box 502 in association with the encrypted data 511. This makes it possible to eliminate the need for vexatiously decrypting the encrypted data 510 when a user intends to display a list of documents in the box 502, and display the list based on the stored document information.
In the scanner apparatus 601, an image storage 608 stores image data 616 or encrypted data 617 resulting from encrypting the image data 616 using a common key 615 (K). The scanner apparatus 601 discloses a box 604 associated with a public key 605 (A), and a box 609 associated with a public key 610 (A). The common key 615 (K) is encrypted using the public key 605, and resulting encrypted data 607 is stored in the box 604. Further, the box 604 stores link information 618 linking to the encrypted data 617 stored in the image storage 608. This is substantially equal to a state in which the encrypted data 617 resulting from encrypting the image data 616 is stored in the box 604. The client terminal 602 has a private key 606 (A′), and the encrypted data 607 encrypted by the public key 605 can be decrypted using the private key 606 to obtain the common key 615.
The encrypted data 617 resulting from encrypting the image data 616 can disclose to the box 609 according to the following procedure. The client terminal 602 acquires the encrypted data 607 resulting from encrypting the common key 615, and then decrypts the encrypted data 607 using the private key 606 to obtain the common key 615 (Step S611). Further, the client terminal 602 acquires the public key 610 via the network 603, and then encrypts the common key 615 using the public key 610 (Step S612). Then, this encrypted common key 615 is transmitted (sent) to the box 609 (Step S613). Thus, in the box 609, the encrypted common key 615 can be decrypted using a private key (not shown) corresponding to the public key 610 associated with the box 609, and the encrypted data 617 can be decrypted to obtain the image data 616. The above series of steps may be automatically performed according to a script program running in the Web browser. In this manner, a document in a certain box can be disclosed (moved/copied) to another box by handling (transferring) only key data.
In an operation for browsing the image data 616 on the client terminal 602, the user accesses the box 604 from the client terminal 602, and instructs the scanner apparatus 601 to transmit image data 616 (selected based on the document information, as described above). In response to this instruction, the scanner apparatus 601 transmits the encrypted data 607 (encrypted common key 615) and the encrypted data 617 specified based on the link information 618 (encrypted image data) to the client terminal 602 which has issued the instruction. Then, in the client terminal 602, the encrypted data 607 is decrypted using the private key 606 owned by the client terminal 602, to extract the common key 615 therefrom, and the encrypted data 617 is decrypted using the extracted common key 615 so as to acquire/brows the image data 616 (document) in security.
A procedure for printing out the image data 716 (document) based on its instruction issued from the client terminal to the scanner apparatus 701 is performed as follows. The client terminal 702 firstly acquires the encrypted data 707 resulting from encrypting the common key 715, and then decrypts the encrypted data 707 using the private key 706 to obtain the common key 715 (Step S711). Further, the decrypted common key 715 is transmitted to the box 704. Then, the scanner apparatus 701 decrypts the encrypted data 717 using the received common key 715, and the printer section 101b outputs the decrypted image data 716 onto a surface of a sheet (Step S712). In this manner, the image data 716 (electronic document) can be printed out by exchanging only the common key 715 or the encrypted data 707 thereof via the network 703. This makes it possible to protect the image data 716 and increase the processing speed.
As shown in
When an encrypted document in the box A is disclosed from the client terminal 802 to the box B (Step S811) in the same manner as the corresponding step of the procedure illustrated in
When a plurality of transfers are repeatedly performed, electronic signatures may be added in a nesting manner to ensure the transfer history based on the electronic signatures.
Thus, the scanner apparatus 1001 can decrypt any encrypted image data using its own private key M′, without using private keys A′, B′ of the client terminals 1002, 1003. Therefore, the scanner apparatus 1001 allows the client terminals 1002, 1003 to download the pair of encrypted image data and encrypted common key K (Step S1011) and decrypt the data using its own private key in security. Each of the client terminals 1002, 1003 may select a process of requesting to the scanner apparatus 1001 to decrypt image data, and then downloading decrypted image data (Step S1012). Further, in response to receiving an instruction for printing from the client terminal 1002, the scanner apparatus 1001 can extract a common key K using its own private key to perform printing. This makes it possible to ensure security during printing.
As mentioned in the above embodiments, the present invention can provide a secure scanner apparatus or image processing apparatus capable of allowing scanned data to be decrypted only by user's private key, based on a symmetric-key encryption scheme. The present invention can also provide a scanner apparatus or image processing apparatus capable of allowing scanned data to be decrypted using a public key included in a temporary electronic certificate, if a user desires to omit the burden of key setting.
In the image processing apparatus, the image processing method and the image processing program according to the present invention, after the entire image dada is encrypted using the common key, only the common key is encrypted using the public key. This makes it possible to drastically reduce a data processing load as compared with a case of encrypting the entire image data using the public key. In addition, the image data itself can be decrypted (decoded) only by the private key, and therefore the security of the image data can be adequately ensured. Furthermore, as compared with a case of repeatedly performing the decryption and encryption of the entire image data, the processing only for the encrypted common key can be performed with enhanced efficiency, and eventually can contribute to a high level of data encryption. Thus, the present invention allows digital data, such as document data or image data, to be encrypted/decrypted without deterioration in processing speed and processing efficiency.
Although the present invention has been fully described in connection with the preferred embodiments thereof with reference to the accompanying drawings, it is to be noted that various changes and modifications are apparent to those skilled in the art. Such changes and modifications are to be understood as included within the scope of the present invention as defined by the appended claims unless they depart therefrom.
Number | Date | Country | Kind |
---|---|---|---|
2006-119120 | Apr 2006 | JP | national |