1. Field of the Invention
The present invention relates to printers, and more particularly to the security of printing documents.
2. Description of the Related Art
A printer may be shared by a plurality of users utilizing a plurality of workstations of a common network. The printer may also be a multi-purpose device incorporating additional functionality such as scanning and copying capabilities. In a typical work place environment, many people may have unrestricted access to the printer, and it is not uncommon for many documents to be left unattended at the printer. While this practice may generally be acceptable in many instances, it is undesirable when such documents may contain sensitive, proprietary, or confidential information. In this situation, such printed documents left unattended may be easily viewed by people with authorized access to the printer but unauthorized access to the printed document.
Secure printing method and products are available to address the printing of secure data. Such methods may utilize a combination of software and hardware. When a user desires to print secure data to the network printer, the print job may be written to a secure location, e.g., a hard drive of a network server. When the authorized user is physically present at the network printer, the authorized user utilizes an external contact input device of the network printer to enter a particular identity code. The system then compares the identity code to an authorized code of the document waiting to print. If the system verifies that the identity code corresponds to the proper recipient of the document, the system permits the document to be printed. Accordingly, secure data is better protected as unattended secure data at a network printer is minimized.
However, current secure printing products and solutions require an external contact input device to be added to the network printer. For example, this may be a keypad, a magnetic stripe reader, a smart card reader, etc. Such external contact input devices require changes to the network printer that are difficult to fit into existing production lines. For example, such changes may require changes to the mechanical housing of the device and/or additional connectors to be added to the device to accommodate such external contact input devices.
Accordingly, there exists a need for a printing system or printer which is able to overcome the above mentioned drawbacks.
It is an object of the present invention to provide a non-contact printer and method for printing secure documents. Specifically, the printer comprises a module for communicating with an external portable device by a non-contact approach to identify the holder of the portable device so as to print the secure document.
In order to achieve the above object, the present invention provides a network having a printer. The network further comprises a plurality of workstations and a portable device. A user can execute or generate a print job on the workstation. The print job will be transferred to the printer through the network. The printer will not print the print job until the user brings the portable device into proximity of printer.
Other objects, advantages, and novel features of the invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawing.
Reference will now be made in detail to the preferred embodiments of the present invention, devices and methods of printing secure documents. While the invention will be described in conjunction with the preferred embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims.
Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be recognized by one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
Referring to
For example, in one embodiment, the network system 100 may be a local-area network (LAN), and the devices, such as user workstation 104, 106 . . . 108, a server 110 and the printer 102, are coupled to a LAN backbone for communicating with each other. The printer 102 may have printing only capabilities and/or the printer may be a multi-purpose device including other functionality as well, such as scanning, copying, fax and/or E-mail capabilities.
The network 100 is equipped with a secure printing software according to an embodiment of the present invention. According to one embodiment of the present invention, the secure printing software is installed in the workstations 104, 106 . . . 108. Alternatively, in another embodiment, the secure printing software is installed in the server 110. The secure printing software allows for communication with the printer 102 to enable secure printing of print job.
Referring to
According to an embodiment of the present invention, a security module 212 is equipped with non-contact communication capabilities to enable the security module 212 to communicate with a portable device 218 when the portable device 218 is within a particular proximity to the printer 102. The security module 212 is sized similarly to a typical module, e.g., a memory module, in order to be able to properly mate with the slot 208. A user of the network 100 may carry the portable device 218. The security module 212 further comprises a non-contact communicating device 216 for communicating with the portable device 218.
When the user brings the portable device 218 into proximity of the printer 102 and hence the non-contact communicating device 216 of the security module 212 detects the presence and identity of the portable device 218. The secure printing software may then check the identity of the portable device 218 with an authorization/identification code and enable printing of the secure data if the identity of the portable device 218 matches the authorized identification code. As mentioned above, the printer 102 having the security module 212 cooperating with the portable device 218 and the secure printing software is provided with a secure printing feature.
Furthermore, it should be understood that the security module 212 with the non-contact communicating device 216 can be readily installed to any other printer through the slot on the circuit board such that the print is equipped with a secure printing feature. No other hardware changes are necessary to equip the printer with a secure printing feature. Therefore, the secure printing feature can be readily sold as an aftermarket product or a printer can be sold with the secure printing feature according to a particular customer order. Complications to the assembly process that occur when external contact input devices are utilized are thereby advantageously avoided.
In one embodiment of the present invention, the non-contact communicating device 216 of the security module 212 is a radio frequency (RF) reader which may be incorporated into a standard sized memory module, e.g., a DIMM. The RF reader 216 is able to identify the portable device 218 and/or an associated code of the portable device 218 by communicating via RF signals when a user brings the portable device 218 into proximity of the printer 102. Firmware code of the system is also updated to read an identification code read by the RF reader 216 of the security module 212, to compare the identification code to an authorized code for a particular secure document, and to permit printing of the secure document if the identification code is matched with the authorized code. Additional features in addition to the RF reader 216 are also added to the security module 212. Such features may include security features such as encryption and decryption features.
In some embodiments of the present invention, either a transmitter or receiver is located in the security module 212. The portable device 218 includes the other cooperating device (transmitter or receiver) so that the communication takes place between the security module 212 and the portable device 218 without physical contact between such devices.
The security module 212 according to another embodiment of the present invention includes both a transmitter and receiver. The transmitter of the security module 212 transmits an interrogation signal at a known frequency. The portable device 218 is configured to respond to the interrogation signal with a response signal representative of identifying data. The receiver of the security module 212 then detects this response signal and decodes the response signal as necessary to determine the identifying data provided by the portable device 218. An antenna is included in the security module 212 to assist with transmission of the interrogation signal and reception of the response signal.
Referring to
The portable device 218a can be a transponder or tag incorporated in a smart card to cooperate with the RFID circuit 302. The portable device 218a includes an active or passive tag. An active tag has its own power source, e.g., a battery, and transmit a signal at regular intervals. An active tag typically works over a greater distance than a passive tag. A passive tag does not have its own power source and instead becomes activated when the passive tag encounters the electromagnetic field generated by a transmitter of the RFID circuit 302. The portable device 218a may be a contactless smart card, or be comply or be compatible with standards developed by the International Organization for Standardization (ISO) including ISO1443A or ISO15693.
The security module 212a shown in
The analog front end (AFE) circuit 302 according to one embodiment of the present invention is an integrated analog system for a 13.56 MHz RFID reader system. 0The AFE circuit 302 is highly versatile so it can be used in different RFID reader systems having different sub-carrier frequencies, e.g., including 212 kHz to 848 kHz hence covering ISO 14443 and ISO 15693 standards. The security module 212a is comply or be compatible with the ISO15693 standard hence enabling the security module 212a to detect the portable device 218a up to a range of about 3 meters. The RFID circuit 302 of the security module 212a may further include an integrated circuit (IC) transmitter that may generate 20 mW of output power into a 50 ohm (antenna) and is capable of utilizing a variety of modulation techniques including Amplitude-Shift Keying (ASK) and ON-OfKeying (OOK) digital modulation techniques.
Furthermore, referring to
According to another embodiment of the present invention, when the user log into the network 100, the network 100 will identify the user. The secure software has a list of the authorization codes which are associated with the identification codes of the portable devices 218 of authorized users. When the user generate a secure print job, the secure print job will be transferred to the printer 102. The secure print job will not be printed until the user brings the portable device 218 into proximity of the print 102 and the identification code of the portable device 218 matches one of the authorization codes in the list. In other words, in this case, the printer 102 will be enabled to print the secure print job by a group of authorized users.
Referring to
In one embodiment, in the step 500, an authorization code which associated with the print job is generated and corresponding to an identification code of a portable device. The authorization code is attached to the print job. In the step 516, the identification code of the portable device is compared with the attached authorization code to allow printing the secure print job.
While the foregoing description and drawings represent the preferred embodiments of the present invention, it will be understood that various additions, modifications and substitutions may be made therein without departing from the spirit and scope of the principles of the present invention as defined in the accompanying claims. One skilled in the art will appreciate that the invention may be used with many modifications of form, structure, arrangement, proportions, materials, elements, and components and otherwise, used in the practice of the invention, which are particularly adapted to specific environments and operative requirements without departing from the principles of the present invention. The presently disclosed embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims and their legal equivalents, and not limited to the foregoing description.
This application claims priority to the co-pending provisional patent application Ser. No. 60/576,171, Attorney Docket Number 02 Micro 04.12P, entitled “Non-Contact Secure Printing,” with filing date Jun. 2, 2004, and assigned to the assignee of the present invention, which is herein incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
60576171 | Jun 2004 | US |