The present disclosure relates to network printing systems, and more specifically, to a system and method for restricting and authorizing the use of software printing resources, such as fonts and files, used, among other things, for printing magnetic ink character recognition (MICR) characters and other characters having specialized or proprietary fonts, as well as documents having a proprietary format, design or look.
Printing devices, such as xerographic printers and ink-jet printers, are common. These printers can be used to print documents with magnetic-ink, in order to print MICR characters thereon. MICR characters are numerical characters which are typically printed at the bottom of a check and form an MICR font strip. MICR characters are printed using an ink containing magnetic material, so that when the MICR font strip is scanned by a magnetic read-head, each MICR character creates a unique, identifiable magnetic flux pattern in the read-head.
Since each MICR character (such as the numbers 0-9) has a unique magnetic flux pattern associated therewith, the MICR characters can be read and processed quickly by an automated check-reading and processing system. In the United States, the font typically used for printing MICR characters is “E13B,” while in other countries the font used for printing MICR characters is “CMC7.”
Because MICR characters and other specialized and proprietary fonts are often used to create sensitive documents, such as checks, and print proprietary indicia, such as a corporate logo, security measures are often provided to prevent the creation or printing of fraudulent or unauthorized documents having MICR characters or other characters created using a specialized font. In the context of digital printing, security measures for preventing unauthorized creation or printing of characters having a specialized font, such as the font used to create MICR characters, typically include restricting (a) access to the printing apparatus capable of printing characters with the specialized font, such as MICR characters and/or other characters; and/or (b) restricting access to the magnetic- or metallic-based printing material, such as toner or liquid ink.
For a large-scale work-group network printing system, the network printing system may be used by a large number of networked users for general purposes, such as printing non-sensitive documents. In this situation, security measures typically provide for preventing the unauthorized printing of sensitive documents, i.e., documents having characters with specialized fonts, such as MICR fonts (E13B and CMC7) and other specialized and proprietary fonts, and documents having a particular format, design or look, while allowing the printing of non-sensitive documents.
For example, a large-scale network printing system may provide a plurality of marking devices, such as xerographic development units or ink-jet ink supplies, only one of which includes the magnetic-based marking material for printing sensitive documents. Therefore, security measures provide for restricting access to the marking device having the magnetic-based marking material while allowing access to the non-magnetic based marking material. Access may be restricted, for example, by having an authorized user swipe an authorization card through a scanner/reader and/or by physically locking the network printing system, such as with a lock and key or by providing a firewall, in order to prevent unauthorized use of the magnetic-based marking material.
Another security measure which does not call for adding a scanner/reader or firewall to the network printing system provides for an authorized user to import or download software printing resources, e.g., fonts and files for use in printing MICR characters and other characters having proprietary or specialized fonts, to a processor of the network printing system from a diskette or CD-ROM before performing a print job. The imported printing resources are then deleted from a memory of the processor after the print job is completed to prevent misuse and unauthorized use.
The prior art methods for safeguarding against misuse and unauthorized use of sensitive software printing resources are either costly (adding hardware to the network printing system) and not user-friendly and efficient (importing software printing resources prior to performing a print job). Accordingly, it is an aspect of the present disclosure to provide a system and method for restricting and authorizing the use of software printing resources, especially fonts and files for printing sensitive documents, which overcome the drawbacks of the prior art.
According to the present disclosure, there are provided a system and method for restricting and authorizing the use of software printing resources, especially fonts and files for printing sensitive documents, i.e., documents having characters with specialized fonts, such as MICR fonts (E13B and CMC7) and other specialized and proprietary fonts, and documents having a particular format, design or look. In particular, the software printing resources include bitmap font files which cause a printing apparatus to print characters of a particular font(s). The software printing resources further include software which causes a printing apparatus to print a document having a particular format, design, or look. The software printing resources can also include software which causes the printing apparatus to print encoded indicia, such as DataGlyphs™ developed by the Xerox Corporation.
According to an aspect of the present disclosure, there is provided a method for authorizing access to software printing resources stored within a memory of a network printing system. The method includes receiving by at least one processor of the network printing system user identification information and a request for access to at least one software printing resource of the software printing resources. The method further includes determining whether the user identification information corresponds to an authorized user, and accessing the at least one software printing resource from the memory, if the user identification information corresponds to an authorized user. The method then provides for performing a print job using the at least one software printing resource.
According to another aspect of the disclosure, a network printing system is provided having at least one software printing resource requiring authorization for use thereof. The network printing system further includes at least one processor for executing a set of instructions for determining whether a user is an authorized user of the at least one software printing resource, providing access to the at least one software printing resource via a network connection if it is determined that the user is an authorized user, and performing a print job using the at least one software printing resource.
According to another aspect of the present disclosure, a computer-readable storage medium is provided storing a set of instructions capable of being executed by at least one processor of a network printing system having a memory storing software printing resources. By executing the set of instructions, the at least one processor receives user identification information and a request for access to at least one software printing resource of the software printing resources. A determination is then made whether the user identification information corresponds to an authorized user. If the user identification information corresponds to an authorized user, access is provided to the at least one software printing resource stored within the memory, thereby enabling the performance of a print job using the at least one software printing resource.
Various embodiments of the present disclosure will be described herein below with reference to the figures wherein:
Embodiments of the present disclosure will be described herein below with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail to avoid obscuring the present disclosure in unnecessary detail.
The word “printer” and the term “printing system” as used herein encompass any apparatus and/or system, such as a digital copier, xerographic and reprographic printing systems, bookmaking machine, facsimile machine, multi-function machine, etc. which perform a print outputting function for any purpose.
The system and method of the present disclosure could be utilized for printing sensitive documents, i.e., documents having characters with specialized fonts, such as MICR fonts (E13B and CMC7) and other specialized and proprietary fonts, and documents having a particular format, design or look. Documents which could be printed using the system and method of the present disclosure include but not limited to checks, stock or bond certificates, driver's licenses, identification cards or papers, passports, betting slips, prize or game awards, tickets, or documents that simply require validating signatures to be affixed thereto, such as contractual agreements.
As illustrated in
A processor 40 communicates with one of the computer terminals 10 through a communications port, such as a parallel or USB port. The processor 40 may reside within the printer 14 (as shown in
The processor 40 includes a memory 42, such as EEPROM, RAM and ROM, for storing software and images of processed documents (e.g., images acquired during scanning, printing, copying, etc.). The memory 42 also stores software printing resources in accordance with the present disclosure. It is contemplated that the software printing resources can be stored within a server and/or database of the network printing system 50 in operative communication with the printer 14.
The term “software printing resources” is a term used herein which collectively includes but is not limited to fonts and files for printing sensitive documents, such as bitmap font files which cause a printing apparatus to print characters of a particular font(s); software which causes a printing apparatus to print a document having a particular format, design, or look; and software which causes the printing apparatus to print encoded indicia, such as DataGlyphs™ developed by the Xerox Corporation.
In accordance with the present disclosure, the bitmap font files and other software printing resources are encrypted and stored within the memory 42. The bitmap font files and other software printing resources can also be stored within a server/database and/or font repository in operative communication with the processor 40 through a network connection.
Using bitmaps to print characters in a desired font is generally how page description languages, such as HP-PCL (printer command language) and PostScript, print characters in a desired font. Accordingly, the processor 40 communicates with the computer terminals 10 using “page description language” where each computer terminal 10 outputs a set of characters in ASCII or similar format along with instructions to the processor 40 to render these characters in a particular desired font using at least one software printing resource, such as a bitmap font file. According to the particular font that is desired, one of the bitmap font files is accessed, decrypted and transmitted along video line 30 to imager 20 for printing a particular character(s) using the desired font. Other software printing resources can also be accessed, decrypted and transmitted along video line 30 to imager 20, such as, for example, software tools for printing the document in accordance with a proprietary format.
The memory 42 also stores user data in the form of a look-up table 450 (see
Referring now to
The application software then encrypts the imported software printing resources and stores them within the memory 42 (Step 230). The software printing resources can be encrypted prior to storage in the memory 42 and decrypted for performing a print job as described below using symmetric key encryption or public key encryption. Both encryption/decryption methods are well known in the art.
The network administrator via the graphical user interface can then provide instructions to the processor 40 for continuing the execution of the application software for updating and/or making changes/edits to the look-up table 450, which is further described below with reference to
Finally, the process as shown by
Following the process shown by
At Step 320, the processor 40 determines whether the user identification information, which is received with the request signal as shown in
After the print job is terminated, the print job can be resent to the processor 40 without the requirement of performing the print job with the use of the at least one previously requested software printing resource. Alternatively, the processor 40 performs the print job without requiring the print job to be resent, where the processor 40 substitutes a non-secure software printing resource (a printing resource which does not require the user to be an authorized user) for the at least one requested software printing resource.
If, however, in Step 320, it is determined that the user is an authorized user of at least one stored software printing resource, then at Step 360, the processor 40 determines whether the authorized user has authorization to access the at least one requested software printing resource. The determination is made by determining whether the look-up table correlates the received user identification information with the at least one requested software printing resource. If the user does not have authorization to access the at least one requested software printing resource, the process proceeds to Steps 340 and 350 which are described above.
If, however, in Step 360, it is determined that the user does have authorization to access the at least one requested software printing resource, then at Step 370, the processor 40 accesses the at least one requested software printing resource. At Step 380, the processor 40 then decrypts the at least one accessed software printing resource. Subsequently, at Step 390, the network printing system performs the print job using the at least one accessed software printing resource. After the print job is performed, the at least one accessed software printing resource is encrypted and stored in memory 42 at Step 400.
As shown by
It is contemplated that the user identification information includes biometric information. The biometric information can include fingerprint information, a retinal scan, hand geometry scan, face scan, speech recognition and analysis, signature analysis, etc. It is also contemplated for the user identification information to include text data (e.g., user name and password) and biometric information.
It will be appreciated that various of the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.