The invention relates to the field of production printing systems and, in particular, to voiding continuous form media on a printing system when the media is advanced and the media is of a sensitive nature.
Production printing systems utilizing continuous form media typically include a number of post printing stations, through which the continuous form media flows. Such stations may include a cutting station, a folding station, a stapling station, etc. Due to the size and the complexity of the printing system, a large linear media path may exist from the exit of the actual imprinting on the media to the post printing stations. For example, the distance the media may have to travel from the imprinting station to the next station, such as a cutting station, may be as much as 20 or more linear feet. In some cases, the media is advanced at the end of the imprinting process to feed the continuous form paper to the next station. In this case, a large amount of media may travel un-printed at the exit of the imprinting station.
Unlike typical paper, some continuous form media is of a more sensitive nature. For example, the continuous form media may include pre-printed check blanks, government identity cards, insurance cards, etc. When advancing such media at the end of the imprinting station to the post printing stations, a large amount of such sensitive media may remain un-printed upon, and subsequently, pose potential accountability and security problems.
Embodiments described herein provide systems and methods for securely advancing continuous form media including pre-printed sensitive elements. A command is detected for advancing the media without imprinting on the sensitive elements. A security image is identified for voiding the sensitive elements. The security image is then imprinted on the sensitive elements as the media is advanced to void the sensitive elements.
In one embodiment, a printer comprising a print engine and a print controller is disclosed. The print engine is operable to print onto a continuous form media including pre-printed sensitive elements for imprinting. The print controller is operable to detect a command for advancing the media without imprinting on the sensitive elements, to identify a security image for voiding the sensitive elements, and to imprint the security image onto the sensitive elements as the media is advanced to void the sensitive elements.
In another embodiment, a method operable on a printer using continuous form media is disclosed. The media includes pre-printed sensitive elements for imprinting. According to the method, a command is detected at the printer for advancing the media without imprinting on the sensitive elements. A security image is identified for voiding the sensitive elements. The security image is imprinted onto the sensitive elements as the media is advanced to void the sensitive elements.
Other exemplary embodiments may be described below.
Some embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings. The same reference number represents the same element or the same type of element on all drawings.
The figures and the following description illustrate specific exemplary embodiments of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within the scope of the invention. Furthermore, any examples described herein are intended to aid in understanding the principles of the invention, and are to be construed as being without limitation to such specifically recited examples and conditions. As a result, the invention is not limited to the specific embodiments or examples described below, but by the claims and their equivalents.
Printer 102 also includes a print controller 104. Print controller 104 includes a memory 114 operable to store a security image 106. Print controller 104 generally receives print data 110 including information for imprinting on media 116, and rasterizes print data 110 in color and/or in black and white for use by print engine 108 when imprinting the information onto media 116. In
In step 302, print controller 104 detects a command at printer 102 to advance media 116 without imprinting on sensitive elements 112-1 to 112-4 (See
In step 304, print controller 104 identifies a security image 106 for voiding sensitive elements 112-1 to 112-4. Security image 106 may include graphical features, text, or a combination of graphical features and text for rendering sensitive elements 112-1 to 112-4 void after imprinting security image 106. For example, security image 106 may include readable text depicting “cancelled”, “void”, “non-negotiable”, or some other information clearly identifying that sensitive elements 112-1 to 112-4 as being invalid, null, having no legal or binding force, etc. Additionally, security image 106 may include, either alone or in combination with the aforesaid readable text, a pantograph, which is an image that is not visible in the original printed document, but which becomes visible in copies of the original document. When identifying security image 106, print controller 104 may query a lookup table to identify one or more security images associated with media 116. For example, when media 116 is loaded onto printer 102, an operator may select security image 106 from a plurality of security images for voiding sensitive elements 112-1 to 112-4. Further, security image 106 may be pre-programmed within printer 102 for voiding sensitive elements 112-1 to 112-4.
In step 306, print controller 104 directs print engine 108 to imprint security image 106 onto sensitive elements 112-1 to 112-4 as media 116 is advanced to void sensitive elements 112-1 to 112-4.
In step 502, print controller 104 detects a command at printer 102 to advance media 116 without imprinting onto sensitive elements 112-1 to 112-4. In one embodiment, detecting the command comprises detecting a Non Process Run Out (NPRO) command. A NPRO command is known to one skilled in the art for advancing media 116 without imprinting. One example of a NPRO command is a form feed button on a continuous form desktop printer, or a NPRO button or touchscreen input on a production printing system. For example, an operator may utilize user interface (not shown) to generate the NPRO command when initially loading media 116 into printer 102. Further, an operator may utilize the user interface to generate the NPRO command when feeding post-printing stations (not shown) which are down-media from printer 102. Further still, a NPRO command may be initiated by an operator in response to printer 102 finishing a print job which has yet to be stacked or pushed to post-printing stations down-media from printer 102. Regardless, generating a NPRO command at printer 102 is potentially problematic as the NPRO command on a typical printer will advance media 116 without imprinting on sensitive elements 112-1 to 112-4.
In another embodiment, detecting the command comprises detecting a blank logical page within a print job for advancing media 116 without imprinting onto sensitive elements 112-1 to 112-4. For example, a host system (not shown) may generate a print job and subsequently forward the print job as print data 110 to printer 102. Print data 110 may include Page Description Language (PDL) data, such as PostScript data, PDF (Portable Document Format) data, Intelligent Printer Data Stream (IPDS) data, Advanced Function Presentation (AFP) data, Mixed Object: Document Content Architecture (MODCA) data, or other types of PDL data which is received by a print controller 104 and rasterized to convert print data 110 into bitmap data for print engine 108. Such print data 110 may contain blank logical pages which, when processed by printer 102, may result in blank portions of media 116 being advanced. Therefore, when print controller 104 receives the print job including the blank logical page for advancing media 116 without imprinting on sensitive elements 112-1 to 112-4, print controller 104 directs the imprinting of security image 106 onto sensitive elements 112-1 to 112-4.
In step 504, print controller 104 determines if a magnetic colorant (e.g., a magnetic ink, a magnetic toner which may be utilized by a Magnetic Ink Character Recognition (MICR) process) is present (i.e., loaded) at printer 102. In some cases, printer 102 uses magnetic colorants when imprinting onto media 116. When media 116 is imprinted with a magnetic colorant, specialized equipment may be used to read the imprinted information by reading the magnetic colorants. For example, a bank may use a magnetic check reader for automatically processing checks. If no magnetic colorant is detected by print controller 104, then step 506 is performed. If a magnetic colorant is detected by print controller 104, then step 508 is performed. Steps 508 and 510 of identifying security image 106 and imprinting the security image 106 have been previously described with respect to method 300 of
In step 604 of method 600, print controller 104 locates a sensitive element 112-1 to 112-4 within media 116 to be advanced. For example, print controller 104 may locate sensitive element 112-1 within section 112 (See
In step 608, print controller 104 imprints security image 106 onto the located sensitive element as the media is advanced.
In step 902, print controller 104 detects a NPRO command generated by user interface 704 for advancing media 116. Generating a NPRO command at printer 702 is potentially problematic as the NPRO command on a typical printer will advance media 116 without imprinting on checks 802-805.
In step 904, print controller 104 identifies security image 106 for voiding checks 802-805. As discussed previously, security image 106 may include graphical features, text, or a combination of graphical features and text for rendering checks 802-805 void after imprinting security image 106. For example, security image 106 may include readable text depicting “cancelled”, “void”, “non-negotiable”, or some other information clearly identifying that checks 802-805 as being invalid, null, having no legal or binding force, etc. Additionally, security image 106 may include, either alone or in combination with the aforesaid readable text, a pantograph, which is an image that is not visible in the original printed document, but which becomes visible in copies of the original document.
In step 908, print controller 104 directs print engine 108 to imprint security image 106 onto checks 802-805 as media 116 is advanced.
In step 1202, print controller 104 detects a NPRO command generated by user interface 704 for advancing media 116. For example, the NPRO command may be generated to advance identity cards 1102-1105 of
The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium 1406 providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium 1406 can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The medium 1406 can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium 1406 include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
A data processing system suitable for storing and/or executing program code will include at least one processor 1402 coupled directly or indirectly to memory elements 1408 through a system bus 1410. The memory elements 1408 can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code is retrieved from bulk storage during execution.
Input/output or I/O devices 1404 (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems, such as through host systems interfaces 1412, or remote printers or storage devices through intervening private or public networks, such as through print engine interfaces 1414. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
Although specific embodiments were described herein, the scope of the invention is not limited to those specific embodiments. The scope of the invention is defined by the following claims and any equivalents thereof.
Number | Name | Date | Kind |
---|---|---|---|
6324353 | Laussermair et al. | Nov 2001 | B1 |
7400420 | Kageyama et al. | Jul 2008 | B2 |
20030234949 | Kageyama et al. | Dec 2003 | A1 |
20050067497 | Jones et al. | Mar 2005 | A1 |
20060115313 | Shaw, III | Jun 2006 | A1 |
20080037048 | Hopper et al. | Feb 2008 | A1 |
20090279143 | St. Jaques et al. | Nov 2009 | A1 |
20090284782 | Muraka | Nov 2009 | A1 |
20100321738 | Wu et al. | Dec 2010 | A1 |
Number | Date | Country |
---|---|---|
2000158758 | Jun 2000 | JP |
Number | Date | Country | |
---|---|---|---|
20110293345 A1 | Dec 2011 | US |