US20140211243A1 - Printing from untrustworthy source - Google Patents
Printing from untrustworthy source Download PDFInfo
- Publication number
- US20140211243A1 US20140211243A1 US13/754,945 US201313754945A US2014211243A1 US 20140211243 A1 US20140211243 A1 US 20140211243A1 US 201313754945 A US201313754945 A US 201313754945A US 2014211243 A1 US2014211243 A1 US 2014211243A1
- Authority
- US
- United States
- Prior art keywords
- configuration
- print request
- processor
- printing device
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1218—Reducing or saving of used resources, e.g. avoiding waste of consumables or improving usage of hardware resources
- G06F3/1219—Reducing or saving of used resources, e.g. avoiding waste of consumables or improving usage of hardware resources with regard to consumables, e.g. ink, toner, paper
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1229—Printer resources management or printer maintenance, e.g. device status, power levels
- G06F3/1231—Device related settings, e.g. IP address, Name, Identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1239—Restricting the usage of resources, e.g. usage or user levels, credit limit, consumables, special fonts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1253—Configuration of print job parameters, e.g. using UI at the client
- G06F3/1254—Automatic configuration, e.g. by driver
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1285—Remote printer device, e.g. being remote from client or server
- G06F3/1289—Remote printer device, e.g. being remote from client or server in server-client-printer device configuration, e.g. the server does not see the printer
Definitions
- Network printers heretofore may be associated with an identifier, such as a unique email address, that may act as a recipient for print content. This print content may then be routed to the printer. Access to printing via the identifier may be restricted using a white listing approach. In this instance, only certain pre-approved users can print via the identifier.
- an identifier such as a unique email address
- FIG. 1 is a block diagram of an example system in accordance with aspects of the present disclosure.
- FIG. 2 is a flow diagram of an example method in accordance with aspects of the present disclosure.
- FIG. 3 is an example screen shot in accordance with aspects of the present disclosure.
- FIG. 4 is a working example in accordance with aspects of the present disclosure.
- a network printing device may be associated with an identifier that allows trustworthy sources to transmit print requests thereto.
- Web enabled network printers have increased the demand for mechanisms that restrict access to such printers.
- users may still be interested in printing content contained in sources considered to be untrustworthy.
- some public content generated from RSS/ATOM feeds, social networking groups, or forums may be of interest.
- a subscriber may be weary of providing these public sources unfettered access to their printing device. If left unchecked, there may be instances of misuse or exploitation. For example, an unscrupulous member of these public sources may send a high volume of content to overload the printing device.
- countless online marketers may send advertisements to the printer as part of their marketing strategy.
- a configuration may be associated with a printing device.
- the print request may also be associated with the configuration such that the request is handled in accordance therewith.
- the owner of a printing device may use the configuration to limit access to a printing device. This allows a user to print content from untrustworthy sources that may be of interest without worrying about the potential for misuse or exploitation.
- FIG. 1 presents a schematic diagram of an illustrative computer apparatus 100 for executing the techniques disclosed herein.
- the computer apparatus 100 may include all the components normally used in connection with a computer. For example, it may have a keyboard and mouse and/or various other types of input devices such as pen-inputs, joysticks, buttons, touch screens, etc., as well as a display, which could include, for instance, a CRT, LCD, plasma screen monitor, TV, projector, etc.
- Computer apparatus 100 may also comprise a network interface (not shown) to communicate with other devices over a network.
- the computer apparatus 100 may also contain a processor 110 , which may be any number of well known processors, such as processors from Intel® Corporation. In another example, processor 110 may be an application specific integrated circuit (“ASIC”).
- Non-transitory computer readable medium (“CRM”) 112 may store instructions that may be retrieved and executed by processor 110 . As will be discussed in more detail below, the instructions may include a generator 114 , a settings module 116 , and a job coordinator 118 .
- non-transitory CRM 112 may be used by or in connection with any instruction execution system that can fetch or obtain the logic from non-transitory CRM 112 and execute the instructions contained therein.
- Non-transitory computer readable media may comprise any one of many physical media such as, for example, electronic, magnetic, optical, electromagnetic, or semiconductor media. More specific examples of suitable non-transitory computer-readable media include, but are not limited to, a portable magnetic computer diskette such as floppy diskettes or hard drives, a read-only memory (“ROM”), an erasable programmable read-only memory, a portable compact disc or other storage devices that may be coupled to computer apparatus 100 directly or indirectly.
- non-transitory CRM 112 may be a random access memory (“RAM”) device or may be divided into multiple memory segments organized as dual in-line memory modules (“DIMMs”).
- RAM random access memory
- DIMMs dual in-line memory modules
- the non-transitory CRM 112 may also include any combination of one or more of the foregoing and/or other devices as well. While only one processor and one non-transitory CRM are shown in FIG. 1 , computer apparatus 100 may actually comprise additional processors and memories that may or may not be stored within the same physical housing or location.
- the instructions residing in non-transitory CRM 112 may comprise any set of instructions to be executed directly (such as machine code) or indirectly (such as scripts) by processor 110 .
- the terms “instructions,” “scripts,” and “applications” may be used interchangeably herein.
- the computer executable instructions may be stored in any computer language or format, such as in object code or modules of source code.
- the instructions may be implemented in the form of hardware, software, or a combination of hardware and software and that the examples herein are merely illustrative.
- the instructions of the generator 114 may instruct processor 110 to generate an identifier and to associate the identifier with the printing device.
- the identifier may be an e-mail address.
- a plurality of identifiers may be generated and associated with the same printing device such that each identifier has its own unique configuration. These identifiers may act as aliases for the printing device.
- Settings module 116 may instruct processor 110 to further associate the identifier with a printing configuration that specifies how the printing device handles a print request.
- a printing configuration that specifies how the printing device handles a print request.
- multiple identifiers may be generated by generator 114 such that each identifier may be associated with its own configuration.
- a configuration may limit the number of pages being printed, the amount of ink to utilize per print request, or may specify a time window during which a print request may be received. Thus, the configuration may allow a user to control what, when, and how content is printed.
- Job coordinator 118 may instruct processor 110 to determine whether a received print request originates from a trustworthy source; if it is determined that the source is not trustworthy, job coordinator 118 may instruct processor 110 to associate the received print request with the identifier. Job coordinator 118 may further instruct processor 110 to determine whether the received print request satisfies a condition indicated in the configuration and to print the content contained therein, if it is determined that the received print request satisfies the condition.
- FIG. 2 illustrates a flow diagram of an example method 200 for managing printing requests from untrustworthy sources.
- FIGS. 3-4 each show a working example in accordance with the techniques disclosed herein. The actions shown in FIGS. 3-4 will be discussed below with regard to the flow diagram of FIG. 2 .
- a printing device may be associated with a configuration.
- each configuration may be further associated with an identifier, such as a unique email address.
- the e-mail address may be published on social networking sites, public discussion forums, or the like.
- the configuration may comprise items that specify a quality and quantity of content to print.
- an example configuration screen 300 illustrates example limitations that may be imposed on the printing device and example conditions a print request may satisfy before printing the content therein.
- One of the example limitations is the number of pages that may be printed per request. In the example configuration screen 300 , the number of pages per request is 2 pages.
- Another example limitation is the maximum number of pages that may be printed from a source associated with the configuration.
- Configuration screen 300 indicates that the maximum number of pages that may be printed by a source is 200 pages.
- the type of data received may be specified.
- Configuration screen 300 indicates that only hyper text markup language (“html”) files and comma delimited (“csv”) files may be received from a source associated with the configuration.
- a user may limit the total ink to use per request and the total ink to use overall for a given source.
- the illustrative screen shot of FIG. 3 shows the ink usage set at 2% per request and a total overall ink usage of 48%.
- configuration screen 300 illustrates keyword settings that may limit the content that is printed to content containing certain keywords.
- the keywords “soccer” and “vegan recipes” are shown as example keywords. Accordingly, a user may print content containing topics of particular interest.
- RSS/ATOM feed 404 public facebook/twitter groups 406 , and discussion forum 408 may be untrustworthy sources. Each of these sources may be associated with identifier 1 - 3 respectively. In the example of FIG. 4 , each identifier is further associated with one configuration 424 . However, it is understood that each identifier may be associated with its own unique configuration. The identifiers may be unique e-mail addresses or aliases that may be made public. Trusted facebook sources 410 and personal drop box 412 may be trusted sources. These trusted sources may be associated with an original identifier 422 . This identifier may be kept private since it provides unlimited access to printer 426 . Content generate by trusted facebook sources 410 and personal drop box 412 may print directly to printing device 426 without limitation.
- the print request may be associated with the configuration, as shown in block 206 .
- the print request may be handled in accordance with the configuration.
- printing device 426 may print content from RSS/ATOM feed 404 , public facebook/twitter groups 406 , and discussion forum 408 in accordance with configuration 424 .
- Configuration 424 may contain the limitations illustrated in FIG. 3 . However, it is understood that the configuration items illustrated in FIG. 3 are non-exhaustive and that other items may be included in the configuration file.
- the foregoing system, method, and non-transitory computer readable medium provide users of network or web enabled printers to control what, when, and how content is printed. Furthermore, the techniques disclosed herein allow users to customize configurations for each source deemed untrustworthy. In this regard, rather than banning all content from certain sources, users may print content from sources they may find interesting while protecting the printer from misuse or exploitation.
Abstract
Disclosed herein are a system, non-transitory computer-readable medium and method for printing. A configuration is associated with a printing device. If a print request is received from an untrustworthy source, the print request is associated with the configuration such that the printing device handles the print request in accordance with the configuration.
Description
- Network printers heretofore may be associated with an identifier, such as a unique email address, that may act as a recipient for print content. This print content may then be routed to the printer. Access to printing via the identifier may be restricted using a white listing approach. In this instance, only certain pre-approved users can print via the identifier.
-
FIG. 1 is a block diagram of an example system in accordance with aspects of the present disclosure. -
FIG. 2 is a flow diagram of an example method in accordance with aspects of the present disclosure. -
FIG. 3 is an example screen shot in accordance with aspects of the present disclosure. -
FIG. 4 is a working example in accordance with aspects of the present disclosure. - As noted above, a network printing device may be associated with an identifier that allows trustworthy sources to transmit print requests thereto. Web enabled network printers have increased the demand for mechanisms that restrict access to such printers. However, users may still be interested in printing content contained in sources considered to be untrustworthy. For example, some public content generated from RSS/ATOM feeds, social networking groups, or forums may be of interest. Nevertheless, a subscriber may be weary of providing these public sources unfettered access to their printing device. If left unchecked, there may be instances of misuse or exploitation. For example, an unscrupulous member of these public sources may send a high volume of content to overload the printing device. Moreover, countless online marketers may send advertisements to the printer as part of their marketing strategy.
- In view of the foregoing, disclosed herein are a system, non-transitory computer readable medium, and method to manage printing requests from untrustworthy sources. In one example, a configuration may be associated with a printing device. In another example, if a print request is received from an untrustworthy source, the print request may also be associated with the configuration such that the request is handled in accordance therewith. Thus, the owner of a printing device may use the configuration to limit access to a printing device. This allows a user to print content from untrustworthy sources that may be of interest without worrying about the potential for misuse or exploitation. The aspects, features and advantages of the present disclosure will be appreciated when considered with reference to the following description of examples and accompanying figures. The following description does not limit the application; rather, the scope of the disclosure is defined by the appended claims and equivalents.
-
FIG. 1 presents a schematic diagram of anillustrative computer apparatus 100 for executing the techniques disclosed herein. Thecomputer apparatus 100 may include all the components normally used in connection with a computer. For example, it may have a keyboard and mouse and/or various other types of input devices such as pen-inputs, joysticks, buttons, touch screens, etc., as well as a display, which could include, for instance, a CRT, LCD, plasma screen monitor, TV, projector, etc.Computer apparatus 100 may also comprise a network interface (not shown) to communicate with other devices over a network. - The
computer apparatus 100 may also contain aprocessor 110, which may be any number of well known processors, such as processors from Intel® Corporation. In another example,processor 110 may be an application specific integrated circuit (“ASIC”). Non-transitory computer readable medium (“CRM”) 112 may store instructions that may be retrieved and executed byprocessor 110. As will be discussed in more detail below, the instructions may include agenerator 114, asettings module 116, and ajob coordinator 118. In one example,non-transitory CRM 112 may be used by or in connection with any instruction execution system that can fetch or obtain the logic fromnon-transitory CRM 112 and execute the instructions contained therein. - Non-transitory computer readable media may comprise any one of many physical media such as, for example, electronic, magnetic, optical, electromagnetic, or semiconductor media. More specific examples of suitable non-transitory computer-readable media include, but are not limited to, a portable magnetic computer diskette such as floppy diskettes or hard drives, a read-only memory (“ROM”), an erasable programmable read-only memory, a portable compact disc or other storage devices that may be coupled to
computer apparatus 100 directly or indirectly. Alternatively,non-transitory CRM 112 may be a random access memory (“RAM”) device or may be divided into multiple memory segments organized as dual in-line memory modules (“DIMMs”). Thenon-transitory CRM 112 may also include any combination of one or more of the foregoing and/or other devices as well. While only one processor and one non-transitory CRM are shown inFIG. 1 ,computer apparatus 100 may actually comprise additional processors and memories that may or may not be stored within the same physical housing or location. - The instructions residing in
non-transitory CRM 112 may comprise any set of instructions to be executed directly (such as machine code) or indirectly (such as scripts) byprocessor 110. In this regard, the terms “instructions,” “scripts,” and “applications” may be used interchangeably herein. The computer executable instructions may be stored in any computer language or format, such as in object code or modules of source code. Furthermore, it is understood that the instructions may be implemented in the form of hardware, software, or a combination of hardware and software and that the examples herein are merely illustrative. - The instructions of the
generator 114 may instructprocessor 110 to generate an identifier and to associate the identifier with the printing device. In one example, the identifier may be an e-mail address. In another example, a plurality of identifiers may be generated and associated with the same printing device such that each identifier has its own unique configuration. These identifiers may act as aliases for the printing device. -
Settings module 116 may instructprocessor 110 to further associate the identifier with a printing configuration that specifies how the printing device handles a print request. As noted above, multiple identifiers may be generated bygenerator 114 such that each identifier may be associated with its own configuration. A configuration may limit the number of pages being printed, the amount of ink to utilize per print request, or may specify a time window during which a print request may be received. Thus, the configuration may allow a user to control what, when, and how content is printed. -
Job coordinator 118 may instructprocessor 110 to determine whether a received print request originates from a trustworthy source; if it is determined that the source is not trustworthy,job coordinator 118 may instructprocessor 110 to associate the received print request with the identifier.Job coordinator 118 may further instructprocessor 110 to determine whether the received print request satisfies a condition indicated in the configuration and to print the content contained therein, if it is determined that the received print request satisfies the condition. - Working examples of the system, method, and non-transitory computer-readable medium are shown in
FIGS. 2-4 . In particular,FIG. 2 illustrates a flow diagram of anexample method 200 for managing printing requests from untrustworthy sources.FIGS. 3-4 each show a working example in accordance with the techniques disclosed herein. The actions shown inFIGS. 3-4 will be discussed below with regard to the flow diagram ofFIG. 2 . - As shown in
block 202 ofFIG. 2 , a printing device may be associated with a configuration. As noted above, each configuration may be further associated with an identifier, such as a unique email address. The e-mail address may be published on social networking sites, public discussion forums, or the like. In one example, the configuration may comprise items that specify a quality and quantity of content to print. - Referring now to
FIG. 3 , anexample configuration screen 300 illustrates example limitations that may be imposed on the printing device and example conditions a print request may satisfy before printing the content therein. One of the example limitations is the number of pages that may be printed per request. In theexample configuration screen 300, the number of pages per request is 2 pages. Another example limitation is the maximum number of pages that may be printed from a source associated with the configuration.Configuration screen 300 indicates that the maximum number of pages that may be printed by a source is 200 pages. In yet a further example, the type of data received may be specified.Configuration screen 300 indicates that only hyper text markup language (“html”) files and comma delimited (“csv”) files may be received from a source associated with the configuration. Moreover, a user may limit the total ink to use per request and the total ink to use overall for a given source. The illustrative screen shot ofFIG. 3 shows the ink usage set at 2% per request and a total overall ink usage of 48%. In addition,configuration screen 300 illustrates keyword settings that may limit the content that is printed to content containing certain keywords. In the example ofFIG. 3 , the keywords “soccer” and “vegan recipes” are shown as example keywords. Accordingly, a user may print content containing topics of particular interest. - Referring back to
FIG. 2 , it may be determined whether the print request originates from a trustworthy source, as shown inblock 204. Referring now toFIG. 4 , RSS/ATOM feed 404, public facebook/twitter groups 406, anddiscussion forum 408 may be untrustworthy sources. Each of these sources may be associated with identifier 1-3 respectively. In the example ofFIG. 4 , each identifier is further associated with oneconfiguration 424. However, it is understood that each identifier may be associated with its own unique configuration. The identifiers may be unique e-mail addresses or aliases that may be made public.Trusted facebook sources 410 andpersonal drop box 412 may be trusted sources. These trusted sources may be associated with anoriginal identifier 422. This identifier may be kept private since it provides unlimited access toprinter 426. Content generate by trustedfacebook sources 410 andpersonal drop box 412 may print directly toprinting device 426 without limitation. - Referring back to
FIG. 2 , if it is determined that the print request originates from an untrustworthy source, the print request may be associated with the configuration, as shown inblock 206. Inblock 208, the print request may be handled in accordance with the configuration. Referring back toFIG. 4 ,printing device 426 may print content from RSS/ATOM feed 404, public facebook/twitter groups 406, anddiscussion forum 408 in accordance withconfiguration 424.Configuration 424 may contain the limitations illustrated inFIG. 3 . However, it is understood that the configuration items illustrated inFIG. 3 are non-exhaustive and that other items may be included in the configuration file. - Advantageously, the foregoing system, method, and non-transitory computer readable medium provide users of network or web enabled printers to control what, when, and how content is printed. Furthermore, the techniques disclosed herein allow users to customize configurations for each source deemed untrustworthy. In this regard, rather than banning all content from certain sources, users may print content from sources they may find interesting while protecting the printer from misuse or exploitation.
- Although the disclosure herein has been described with reference to particular examples, it is to be understood that these examples are merely illustrative of the principles of the disclosure. It is therefore to be understood that numerous modifications may be made to the examples and that other arrangements may be devised without departing from the spirit and scope of the disclosure as defined by the appended claims. Furthermore, while particular processes are shown in a specific order in the appended drawings, such processes are not limited to any particular order unless such order is expressly set forth herein; rather, processes may be performed in a different order or concurrently and steps may be added or omitted.
Claims (18)
1. A system comprising:
a generator which, if executed, instructs at least one processor to generate an identifier and to associate the identifier with a printing device;
a settings module which, if executed, instructs at least one processor to further associate the identifier with a printing configuration that specifies how the printing device handles a print request; and
a job coordinator which, if executed, instructs at least one processor to: determine whether a received print request originates from a trustworthy source; determine whether the received print request satisfies a condition indicated in the configuration; and,
if the source is untrustworthy and the print request satisfies the condition, associate the received print request with the identifier such that the printing device prints the received print request in accordance with the printing configuration.
2. The system of claim 1 , wherein the configuration further to specify a quality and quantity of content to print.
3. (canceled)
4. The system of claim 1 , wherein the condition comprises a data type requirement.
5. The system of claim 1 , wherein the condition requires the content to contain a keyword.
6. The system of claim 1 , wherein the configuration further to indicate an amount of ink to utilize when printing content contained in the print request.
7. A non-transitory computer readable medium, comprising instructions therein which, if executed, instructs at least one processor to:
associate a configuration with a printing device, the configuration containing information that specify how to handle a print request associated with the configuration;
determine whether a received print request originates from a trustworthy source;
determine whether the received print request satisfies a condition indicated in the configuration; and
if the source is untrustworthy and the print request satisfies the condition, associate the received print request with the configuration such that the printing device prints the received print request in accordance with the configuration.
8. The non-transitory computer readable medium of claim 7 , wherein the configuration specifies a quality and quantity of content to print.
9. (canceled)
10. The non-transitory computer readable medium of claim 7 , wherein the condition comprises a data type requirement.
11. The non-transitory computer readable medium of claim 7 , wherein the condition requires the content to contain a keyword.
12. The non-transitory computer readable medium of claim 7 , wherein the configuration further to indicate an amount of ink to utilize when printing content contained in the print request.
13. A method comprising:
associating, using at least one processor, an identifier with a printing device;
associating, using at least one processor, the identifier with a configuration comprising instructions for the printing device when handling a print request associated with the configuration;
determining, using at least one processor, whether a received print request originates from a trustworthy source;
determining, using at least one processor, whether the received print request satisfies a condition indicated in the configuration; and
if the print request originates from an untrustworthy source and the print request satisfies the condition, associating, using at least one processor, the received print request with the configuration such that the printing device prints the received print request in accordance with the configuration.
14. The method of claim 13 , wherein the instructions in the configuration specifies a quality and quantity of content to print.
15. (canceled)
16. The method of claim 13 , wherein the condition comprises a data type requirement.
17. The method of claim 13 , wherein the condition requires the content to contain a keyword.
18. The method of claim 13 , wherein the configuration further comprises an indication of an amount of ink to utilize when printing content contained in the print request.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/754,945 US20140211243A1 (en) | 2013-01-31 | 2013-01-31 | Printing from untrustworthy source |
US14/718,602 US10922032B2 (en) | 2013-01-31 | 2015-05-21 | Printing from an untrustworthy source |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/754,945 US20140211243A1 (en) | 2013-01-31 | 2013-01-31 | Printing from untrustworthy source |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/718,602 Continuation US10922032B2 (en) | 2013-01-31 | 2015-05-21 | Printing from an untrustworthy source |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140211243A1 true US20140211243A1 (en) | 2014-07-31 |
Family
ID=51222619
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/754,945 Abandoned US20140211243A1 (en) | 2013-01-31 | 2013-01-31 | Printing from untrustworthy source |
US14/718,602 Active 2034-12-17 US10922032B2 (en) | 2013-01-31 | 2015-05-21 | Printing from an untrustworthy source |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/718,602 Active 2034-12-17 US10922032B2 (en) | 2013-01-31 | 2015-05-21 | Printing from an untrustworthy source |
Country Status (1)
Country | Link |
---|---|
US (2) | US20140211243A1 (en) |
Family Cites Families (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5555376A (en) | 1993-12-03 | 1996-09-10 | Xerox Corporation | Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request |
US7065497B1 (en) | 1999-06-07 | 2006-06-20 | Hewlett-Packard Development Company, L.P. | Document delivery system for automatically printing a document on a printing device |
US6958824B2 (en) | 2001-01-31 | 2005-10-25 | Hewlett-Packard Development Company, L.P. | System and method for accessing and using a commercial print service |
US6975419B2 (en) | 2001-06-18 | 2005-12-13 | Hewlett-Packard Development Company, L.P. | System and method for mobile printing |
US7321437B2 (en) | 2001-09-28 | 2008-01-22 | Hewlett-Packard Development Company, L.P. | E-mail to job retention |
KR100436757B1 (en) | 2001-10-04 | 2004-06-23 | 삼성전자주식회사 | System for printing specific part of print data stored in printer and method for controlling the same |
EP1306746B1 (en) | 2001-10-25 | 2007-09-05 | Hewlett-Packard Company | Remote network printing |
US7298511B2 (en) | 2002-07-18 | 2007-11-20 | Hewlett-Packard Development Company, L.P. | Document print history |
US7075409B2 (en) | 2003-01-15 | 2006-07-11 | Daimlerchrysler Corporation | Apparatus and method for a valet key based passive security system |
US20040167974A1 (en) | 2003-02-20 | 2004-08-26 | Jeremy Bunn | Exposing mobile-enterprise printers using a universal plug and play proxy |
US7375838B2 (en) | 2003-11-17 | 2008-05-20 | Manyworlds Inc. | Method and system for customized print publication and management |
KR20050063208A (en) | 2003-12-22 | 2005-06-28 | 주식회사 케이티 | E-mail service system receiving less spam mails using temporary e-mail address and method therefor |
US20050198572A1 (en) | 2004-02-12 | 2005-09-08 | International Business Machines Corporation | Method and system of printing isolated sections from documents |
US7672003B2 (en) * | 2004-09-01 | 2010-03-02 | Eric Morgan Dowling | Network scanner for global document creation, transmission and management |
US7814116B2 (en) | 2006-03-16 | 2010-10-12 | Hauser Eduardo A | Method and system for creating customized news digests |
JP4761538B2 (en) | 2006-03-31 | 2011-08-31 | キヤノン株式会社 | Device management system, information processing apparatus, control method therefor, and program |
US8694590B2 (en) | 2006-05-22 | 2014-04-08 | Presto Services, Inc. | Method and system for formatting messages into stylized messages for print out |
US7886000B1 (en) | 2006-06-27 | 2011-02-08 | Confluence Commons, Inc. | Aggregation system for social network sites |
JP4692766B2 (en) | 2006-06-29 | 2011-06-01 | 富士ゼロックス株式会社 | Image processing apparatus, image processing method, and program |
US7729001B2 (en) | 2006-12-07 | 2010-06-01 | Zerox Corporation | Integration of content-based relevant information into print jobs and applications using same |
JP2008302629A (en) * | 2007-06-08 | 2008-12-18 | Konica Minolta Business Technologies Inc | Image formation device, image formation method and image forming program |
US8341734B1 (en) * | 2008-06-27 | 2012-12-25 | Symantec Corporation | Method and system to audit physical copy data leakage |
US9219733B2 (en) | 2008-06-30 | 2015-12-22 | Microsoft Technology Licensing, Llc | Software-based aliasing for accessing multiple shared resources on a single remote host |
JP4810593B2 (en) | 2008-07-17 | 2011-11-09 | シャープ株式会社 | Image forming system |
US8902454B2 (en) | 2009-10-14 | 2014-12-02 | Ricoh Co., Ltd. | Methods for printing from mobile devices |
US9329807B2 (en) | 2009-10-16 | 2016-05-03 | Hewlett-Packard Development Company, L.P. | Method and system to share a printer and print |
JP5507995B2 (en) * | 2009-12-24 | 2014-05-28 | キヤノン株式会社 | Printing system, information processing apparatus, information processing method, and program |
US9036186B2 (en) | 2010-03-01 | 2015-05-19 | Ricoh Company, Ltd. | Method and device for printing a scheduled print job |
JP5724517B2 (en) | 2010-05-25 | 2015-05-27 | 株式会社リコー | Image processing apparatus and image processing method |
US20120084365A1 (en) | 2010-09-30 | 2012-04-05 | Konica Minolta Systems Laboratory Inc. | Delivering resource files to printers using email |
CA2759736C (en) * | 2010-11-30 | 2020-12-29 | Printeron Inc. | System for internet enabled printing |
US20120147199A1 (en) * | 2010-12-14 | 2012-06-14 | The Rhl Group, Inc. | Wireless service with photo print feature |
US8619297B2 (en) * | 2011-01-28 | 2013-12-31 | Hewlett-Packard Development Company, L.P. | Printing using a profile based on printer capabilities |
WO2012112159A1 (en) | 2011-02-17 | 2012-08-23 | Hewlett-Packard Development Company, L.P. | Systems and methods for managing a print job |
US9092167B2 (en) | 2011-04-04 | 2015-07-28 | Hewlett-Packard Development Company, L.P. | Systems and methods for managing a print job |
US9282219B2 (en) | 2011-06-05 | 2016-03-08 | Apple Inc. | Automatic generation of print data for print jobs based on available media attributes |
US20130021643A1 (en) * | 2011-07-18 | 2013-01-24 | Jayasimha Nuggehalli | Document Processing Job Control Via A Mobile Device |
US20130185364A1 (en) | 2012-01-18 | 2013-07-18 | Rajesh Bhatia | Email applications |
US9152355B2 (en) | 2012-07-20 | 2015-10-06 | Pti Marketing Technologies Inc. | System and method for printable document job submission |
-
2013
- 2013-01-31 US US13/754,945 patent/US20140211243A1/en not_active Abandoned
-
2015
- 2015-05-21 US US14/718,602 patent/US10922032B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10922032B2 (en) | 2021-02-16 |
US20150254033A1 (en) | 2015-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107690638B (en) | Reader application and method with personalized feed providing recommendations while maintaining user privacy | |
US11516312B2 (en) | Kubernetes as a distributed operating system for multitenancy/multiuser | |
US8365302B2 (en) | Apparatus, systems and methods for authenticating widget access and widgets | |
WO2012116355A2 (en) | Named object view over multiple files | |
US8630009B2 (en) | Systems and methods for providing content to a peripheral device | |
EP3374857B1 (en) | Dashboard as remote computing services | |
US20150046451A1 (en) | Information processing system, information processing method, and program | |
EP3471010A1 (en) | Generic runtime protection for transactional data | |
US10452244B2 (en) | Systems and methods of optimizing delivery of form factor specific content | |
CN104462283A (en) | Method, device and client for requesting webpage elements in mobile terminal | |
US9836191B2 (en) | Dynamic application generation for a content feed | |
US9081720B2 (en) | Information processing apparatus, setting information management method and recording medium | |
CN106575414B (en) | Contextual platform feature recommendation | |
US20140223275A1 (en) | Method of File Sharing for Portable Mobile Devices | |
US10459992B2 (en) | User interface generation | |
US11042600B1 (en) | System for customizing presentation of a webpage | |
US9697628B2 (en) | On-demand image spriting | |
US9384356B2 (en) | Obscuring internet tendencies | |
US10176153B1 (en) | Generating custom markup content to deter robots | |
US20160294619A1 (en) | Configurable Network Communication Processing System | |
US10922032B2 (en) | Printing from an untrustworthy source | |
CN111817944A (en) | Picture sharing method and device and electronic equipment | |
CN106796557B (en) | Vendor-specific peripheral device class identifier | |
Rad et al. | ‘Click Synthesis’ of 1H‐1, 2, 3‐Triazolyl‐Based Oxiconazole (=(1Z)‐1‐(2, 4‐Dichlorophenyl)‐2‐(1H‐imidazol‐1‐yl) ethanone O‐[(2, 4‐Dichlorophenyl) methyl] oxime) Analogs | |
US20140092435A1 (en) | Applying individual preferences to printed documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SANDEEP, MATTI PRABHU;RAJESH, BHATIA;MISRA, VAIBHAV;SIGNING DATES FROM 20130129 TO 20130130;REEL/FRAME:029728/0090 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PRABHU, SANDEEP MATTI;BHATIA, RAJESH;SIGNING DATES FROM 20140515 TO 20140516;REEL/FRAME:034865/0980 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |