CN101872402A - Safe printing method - Google Patents
Safe printing method Download PDFInfo
- Publication number
- CN101872402A CN101872402A CN201010184988A CN201010184988A CN101872402A CN 101872402 A CN101872402 A CN 101872402A CN 201010184988 A CN201010184988 A CN 201010184988A CN 201010184988 A CN201010184988 A CN 201010184988A CN 101872402 A CN101872402 A CN 101872402A
- Authority
- CN
- China
- Prior art keywords
- printer
- hash
- file
- printed
- control end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
The invention discloses a safe printing method, which belongs to the technical field of computers. The method comprises the following steps that: (a) a user selects a file to be printed at a user side; (b) a control end acquires a printing password through a set acquisition method; (c) the control end converts the printing password into a secret key by a set converting method and uses the secret key to encrypt the file to be printed by a set encryption algorithm; (d) the control end transmits the encrypted file to be printed to a printer; (e) the user inputs the printing password on the printer; and (f) the printer obtains the file to be printed according to a decryption process which corresponds to the encryption process in the step c and prints. The invention can be used for printers in all fields to realize safe printing.
Description
Technical field
The present invention relates to printer, relate in particular to a kind of password authentication that passes through, and generate the safe printing method that password is encrypted by password.Belong to field of computer technology.
Background technology
Current printer is networking, for the computing machine in the network provides print service, becomes " network printer " in a sense.Communication at printer and intercomputer did not have the safety encipher function originally, therefore when computing machine need be printed the document that requires encryption, existed and was stolen content by the network other-end, caused the risk of divulging a secret.
More existing patents have proposed to solve by authentification of user or employing cipher mode the secure print problem of printer in the prior art, these methods adopt public and private key system mostly, this system requires to obtain the support of printer, and the algorithm complexity, is unfavorable for administration configuration.If do not adopt public and private key system, then there is the problem that how secret key safety of computer encipher document is passed to printer.
Summary of the invention
The objective of the invention is to overcome problems of the prior art, propose a kind of public and private key system that do not adopt, realize the method that document security is printed by the user password authentication information.
The inventive method comprises the following steps:
A) user selects file to be printed at user side;
B) control end obtains print pin by the acquisition methods of setting;
C) control end converts print pin to key by the conversion method of setting, and uses this secret key encryption file to be printed by the cryptographic algorithm of setting;
D) control end transfers to printer with the file to be printed of encrypting;
E) user imports described print pin on printer;
F) printer is according to obtaining described file to be printed with the corresponding decrypting process of the described ciphering process of step c) and printing.
As shown in Figure 1, the control end that the present invention relates to is connected with printer with user side respectively.Need to prove that described control end, user side are abstract concept of function, is not entitative concept, and its specific implementation can realize in identical or different hardware unit.Such as, control end can be the driver of printer, user side can be co-located in same computing machine with control end, control end also can with printer in same computing machine, certainly control end also may reside in the computing machine of a platform independent and is exclusively used in large-scale printing control.
Preferably, in the methods of the invention, control end is encrypted an authorization information simultaneously in the process of encrypting file to be printed, and the authorization information that will encrypt transfers to printer in the lump; Then in step f), printer deciphering earlier obtains described authorization information, confirm that described authorization information is errorless after, the file to be printed of encrypting is decrypted process, obtain expressly the back and print.The decryption method and the key that can guarantee to be used to decipher file to be printed by this proof procedure are correct certainly, in order to avoid decryption error and cause misprint.
Preferably, in the methods of the invention, all described key is done cyclical variation when control end is encrypted and during the printer deciphering by the rule change of setting.That is to say that even for same file to be printed, the key that uses in the encryption and decryption process is identical before and after also not being, but does cyclical variation.Described rule change can be: file content (such as the 64K) back of encrypting or deciphering pre-sizing increases or reduces a fixed value (such as 1) on the original cipher key basis; Described rule change also can be: time durations (such as the 1 second) back of encrypting or deciphering predetermined length increases or reduces a fixed value (such as 2) on the original cipher key basis.In addition, also can be other periodicity even aperiodicity changing methods commonly used, such as with the cryptographic hash of last key as back one key, perhaps only the part of last key is made change process, as long as this rule change be simultaneously control end and print to hold known to, and these two ends all have changing capability and get final product.
Preferably, in the methods of the invention, described acquisition methods can be: user's input or generation at random.That is to say that in the step b), control end can require the user to import print pin, perhaps generate a print pin (need present to the user certainly) at random because the user need import printer with this password when printing.
Preferably, in the methods of the invention, described conversion method is: print pin is made a Hash, and a cryptographic hash is made the secondary Hash, obtain the secondary cryptographic hash, described key is described secondary cryptographic hash.That is to say that the key that really is used to encrypt file to be printed is not above-mentioned print pin, but the variant of print pin after conversion.Routine at this point, the available following formula of the relation between key and the print pin is represented visually: key=HASH (HASH (print pin)), wherein " HASH () " expression is carried out the Hash operation to the content in the bracket, calculates cryptographic hash in other words.
Preferably, in the methods of the invention, described cryptographic algorithm is the symmetric encipherment algorithm (such as the SMS4 cryptographic algorithm) that meets Chinese Password Management regulation, can certainly be other cryptographic algorithm, such as 3-DES or AES.
Preferably, the present invention carries out in the following manner:
A) user selects file to be printed at user side;
B) control end obtains print pin by the acquisition methods of setting; Control end is determined print job ID (such as generating in regular turn) simultaneously;
C) control end converts print pin to key by the conversion method of setting, and encrypts file to be printed according to this key by the cryptographic algorithm of setting;
This conversion method is specifically: print pin is made a Hash, print job ID is made a Hash; A cryptographic hash of print pin and the cryptographic hash sum of print job ID are made the secondary Hash; And, obtaining cryptographic hash three times to three Hash of secondary cryptographic hash work, described key is described three cryptographic hash; Therefore, key, the available following formula of relation between print pin and the print job ID three is represented visually: key=HASH (HASH (HASH (print pin)+HASH (print job ID))), wherein " HASH () " expression is carried out the Hash operation to the content in the bracket, calculates cryptographic hash in other words;
D) control end transfers to printer with the file to be printed of encrypting; Simultaneously control end with print job ID plaintext transmission to printer;
E) user imports described print pin and print job ID on printer, and printer can be according to this print job ID inquiry corresponding document (such as the file to be printed after encrypting);
F) printer is according to obtaining described file to be printed with the corresponding decrypting process of the described ciphering process of step c) (generative process that also comprises key certainly) and printing.
Hash algorithm of the present invention can adopt conventional algorithm, such as SHA-256, and SHR-512 etc.
Compare with prior art, advantage of the present invention is:
Two kinds of security means of combining encryption algorithm and authentification of user, the secure print of realization document.When guaranteeing the file printout security, abandoned complicated public and private key system, simple and easily realization.
Description of drawings
Fig. 1 is the functional module structure synoptic diagram of the print system that the present invention relates to;
Fig. 2 is the structural representation of the print system that relates to of the embodiment of the invention.
Embodiment
A kind of safe printing method that meets Chinese commercial cipher (discussing close) regulation is described below.
The print system that this Method of printing relates to as shown in Figure 2, total system is made up of computing machine and remote printer, installed printer drives in the computing machine, comprises the SM3 computing module, SMS4 computing module and random number generator; Printer also comprises SM3 and SMS4 computing module, also comprises a numeric keypad.
One. the printer driver part of computer end:
1. the printed driver of installing on computers can meet the symmetric encipherment algorithm SMS4 that close regulation is discussed by country, and HASH algorithm SM3 also has the random number generating algorithm.Printer driver also can be passed through relevant interface, meets the cryptographic algorithm equipment of discussing close regulation (as by TCM service module interface---TSM, call credible password module---TCM chip) in the using system and finishes above-mentioned functions.
2. when printing, the user selects to want the document of encrypted print, and driver generates the ID of a numeric string as this document print job at random, and points out user ID information on screen, allows the user import a numeric string as print pin then.
3. printed driver is with the HASH value of SM3 algorithm computation print pin, then the HASH value of usefulness SM3 algorithm computation operation ID equally.
Driver the HASH value addition of the HASH value of password and ID after, the result is carried out HASH twice, for the second time the result of HASH encrypts by the SMS4 cryptographic algorithm as key and wants typescripts.
5. driver sends the document printing for the treatment of of operation ID and encryption to printer, and the preceding 1K byte of encrypt file of passing to printer is as printing control information, and wherein preceding 4 bytes are authorization informations, such as the title SMS4 of cryptographic algorithm.
6. the every in other words transmission of every encryption 64K content, key value adds 1, as new key.
Two. printer section
1. a keypad is arranged on the printer, can input digit and/or letter.Can only input digit if keyboard is less, then print pin also must be that pure digi-tal is formed.
2. printer can meet the symmetric encipherment algorithm SMS4 and the HASH algorithm SM3 of the close regulation of the merchant of country.
3. the user imports the ID and the print pin of document print job on keypad, and printer is according to the file to be printed of this ID inquiry and location encryption.
4. printer carries out HASH with the SM3 algorithm to the password of user input and calculates, and with the SM3 algorithm operation ID is carried out HASH equally then and calculates, and will carry out HASH twice after the addition of two HASH values again, the second time HASH the result as decruption key.
5. printer elder generation decryption verification information if the plaintext that obtains is SMS4, illustrates that key is correct, then continues the deciphering file to be printed, and directly prints, otherwise the prompting user re-enters operation ID and password.
Claims (10)
1. a safe printing method is characterized in that, comprises the following steps:
A) user selects file to be printed at user side;
B) control end obtains print pin by the acquisition methods of setting;
C) control end converts print pin to key by the conversion method of setting, and uses this secret key encryption file to be printed by the cryptographic algorithm of setting;
D) control end transfers to printer with the file to be printed of encrypting;
E) user imports described print pin on printer;
F) printer is according to obtaining described file to be printed with the corresponding decrypting process of the described ciphering process of step c) and printing.
2. safe printing method as claimed in claim 1 is characterized in that, control end is encrypted an authorization information simultaneously in the process of encrypting file to be printed, and the authorization information that will encrypt transfers to printer in the lump; In step f), printer earlier deciphering obtains described authorization information, confirm that described authorization information is errorless after, the file to be printed of encrypting is decrypted process, obtain expressly the back and print.
3. safe printing method as claimed in claim 1 is characterized in that, all by the rule change of setting described key is done cyclical variation when control end is encrypted and during the printer deciphering.
4. safe printing method as claimed in claim 3 is characterized in that, described rule change is: after encrypting or decipher the file content of pre-sizing, increase or reduce a fixed value on the original cipher key basis.
5. safe printing method as claimed in claim 3 is characterized in that, described rule change is: behind the time durations of encryption or deciphering predetermined length, increase or reduce a fixed value on the original cipher key basis.
6. safe printing method as claimed in claim 1 is characterized in that, described acquisition methods is: user's input or generation at random.
7. safe printing method as claimed in claim 1 is characterized in that, described conversion method is: print pin is made a Hash, and a cryptographic hash is made the secondary Hash, obtain the secondary cryptographic hash, described key is described secondary cryptographic hash.
8. safe printing method as claimed in claim 1 is characterized in that, described cryptographic algorithm is: the symmetric encipherment algorithm that meets Chinese Password Management regulation.
9. safe printing method as claimed in claim 1 is characterized in that, described cryptographic algorithm is: SMS4 cryptographic algorithm, 3-DES cryptographic algorithm or AES cryptographic algorithm.
10. safe printing method as claimed in claim 1 is characterized in that,
Step b) also comprises: control end is determined print job ID;
The described conversion method of step c) is: print pin is made a Hash, print job ID is made a Hash; A cryptographic hash of print pin and the cryptographic hash sum of print job ID are made the secondary Hash; And, obtaining cryptographic hash three times to three Hash of secondary cryptographic hash work, described key is described three cryptographic hash;
Step d) also comprises: control end with print job ID plaintext transmission to printer;
Step e) also comprises: the user imports described print job ID on printer, and printer is according to this print job ID inquiry corresponding document.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010184988A CN101872402A (en) | 2010-05-26 | 2010-05-26 | Safe printing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010184988A CN101872402A (en) | 2010-05-26 | 2010-05-26 | Safe printing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101872402A true CN101872402A (en) | 2010-10-27 |
Family
ID=42997259
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010184988A Pending CN101872402A (en) | 2010-05-26 | 2010-05-26 | Safe printing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101872402A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102707918A (en) * | 2011-02-25 | 2012-10-03 | 柯尼卡美能达商用科技株式会社 | Printing system, printing method, terminal, and printing instruction method |
CN102810136A (en) * | 2011-06-01 | 2012-12-05 | 鸿富锦精密工业(深圳)有限公司 | Printing equipment and security printing method |
CN102916945A (en) * | 2012-09-25 | 2013-02-06 | 广州市乐得瑞科技有限公司 | Method used for dynamically and safely encrypting communication protocol of printer |
CN103544440A (en) * | 2012-07-16 | 2014-01-29 | 东友科技股份有限公司 | Confidentiality printing method |
CN103777912A (en) * | 2014-01-27 | 2014-05-07 | 珠海赛纳打印科技股份有限公司 | Imaging equipment as well as safe imaging method and imaging system thereof |
CN104462901A (en) * | 2014-12-10 | 2015-03-25 | 北京海泰方圆科技有限公司 | Method and system for safe printing management |
CN105471902A (en) * | 2015-12-29 | 2016-04-06 | 深圳市瑞铭无限科技有限公司 | Data encryption method and system based on issued encryption algorithm |
CN105930115A (en) * | 2016-04-25 | 2016-09-07 | 杭州旗捷科技有限公司 | Key data reduction consumable chip and stored data protection method |
CN106302386A (en) * | 2016-07-25 | 2017-01-04 | 深圳信息职业技术学院 | A kind of method promoting IPv6 protocol data bag safety |
CN106445429A (en) * | 2016-11-23 | 2017-02-22 | 宜春小马快印科技有限公司 | Safe printing method and system |
WO2017125940A1 (en) * | 2016-01-22 | 2017-07-27 | Hewlett-Packard Development Company, L.P. | Providing printed confidential documents |
CN107402728A (en) * | 2016-05-19 | 2017-11-28 | 北大方正集团有限公司 | A kind of file printing method and system |
JP2018176686A (en) * | 2017-04-21 | 2018-11-15 | 京セラドキュメントソリューションズ株式会社 | Image forming apparatus |
CN109428879A (en) * | 2017-09-05 | 2019-03-05 | 北京立思辰计算机技术有限公司 | A kind of printing safety control system and method |
CN109421392A (en) * | 2017-09-05 | 2019-03-05 | 北京立思辰计算机技术有限公司 | A kind of printer encryption control system |
CN109508153A (en) * | 2017-09-14 | 2019-03-22 | 北京立思辰计算机技术有限公司 | A kind of data transmission method of printer |
CN110135176A (en) * | 2019-04-26 | 2019-08-16 | 深圳市金城保密技术有限公司 | A kind of encryption method of print data transmission |
CN110363016A (en) * | 2019-07-15 | 2019-10-22 | 宜春宜联打印设备有限公司 | A kind of printing encryption method and device, Method of printing and printing device |
CN112230868A (en) * | 2020-10-21 | 2021-01-15 | 湖南长城信息金融设备有限责任公司 | Safety copying machine and copying control method based on safety chip |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1632738A (en) * | 2003-12-23 | 2005-06-29 | 联想(北京)有限公司 | Print control method for ensuring data transmission security |
CN1642171A (en) * | 2003-11-27 | 2005-07-20 | 奥西-技术有限公司 | Secure data transmission in a network system of image processing devices |
-
2010
- 2010-05-26 CN CN201010184988A patent/CN101872402A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1642171A (en) * | 2003-11-27 | 2005-07-20 | 奥西-技术有限公司 | Secure data transmission in a network system of image processing devices |
CN1632738A (en) * | 2003-12-23 | 2005-06-29 | 联想(北京)有限公司 | Print control method for ensuring data transmission security |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102707918A (en) * | 2011-02-25 | 2012-10-03 | 柯尼卡美能达商用科技株式会社 | Printing system, printing method, terminal, and printing instruction method |
CN102707918B (en) * | 2011-02-25 | 2016-08-03 | 柯尼卡美能达商用科技株式会社 | Print system, printing process, termination and print order method |
US8948383B2 (en) | 2011-02-25 | 2015-02-03 | Konica Minolta Business Technologies, Inc. | Printing system, printing method, terminal, and computer-readable storage medium for computer program |
CN102810136B (en) * | 2011-06-01 | 2015-09-02 | 鸿富锦精密工业(深圳)有限公司 | Safe printing method |
CN102810136A (en) * | 2011-06-01 | 2012-12-05 | 鸿富锦精密工业(深圳)有限公司 | Printing equipment and security printing method |
CN103544440A (en) * | 2012-07-16 | 2014-01-29 | 东友科技股份有限公司 | Confidentiality printing method |
CN103544440B (en) * | 2012-07-16 | 2016-04-20 | 东友科技股份有限公司 | Secure printing method |
CN102916945B (en) * | 2012-09-25 | 2014-02-05 | 广州市乐得瑞科技有限公司 | Method used for dynamically and safely encrypting communication protocol of printer |
CN102916945A (en) * | 2012-09-25 | 2013-02-06 | 广州市乐得瑞科技有限公司 | Method used for dynamically and safely encrypting communication protocol of printer |
WO2015109939A1 (en) * | 2014-01-27 | 2015-07-30 | 珠海赛纳打印科技股份有限公司 | Imaging device, secure imaging method thereof and imaging system |
CN103777912A (en) * | 2014-01-27 | 2014-05-07 | 珠海赛纳打印科技股份有限公司 | Imaging equipment as well as safe imaging method and imaging system thereof |
CN103777912B (en) * | 2014-01-27 | 2017-08-25 | 珠海赛纳打印科技股份有限公司 | A kind of imaging device and its safe imaging method, imaging system |
CN104462901A (en) * | 2014-12-10 | 2015-03-25 | 北京海泰方圆科技有限公司 | Method and system for safe printing management |
CN105471902A (en) * | 2015-12-29 | 2016-04-06 | 深圳市瑞铭无限科技有限公司 | Data encryption method and system based on issued encryption algorithm |
US10742832B2 (en) | 2016-01-22 | 2020-08-11 | Hewlett-Packard Development Company, L.P. | Providing printed confidential documents |
WO2017125940A1 (en) * | 2016-01-22 | 2017-07-27 | Hewlett-Packard Development Company, L.P. | Providing printed confidential documents |
CN105930115B (en) * | 2016-04-25 | 2018-11-16 | 杭州旗捷科技有限公司 | A kind of critical data reduction consumable chip and storing data guard method |
CN105930115A (en) * | 2016-04-25 | 2016-09-07 | 杭州旗捷科技有限公司 | Key data reduction consumable chip and stored data protection method |
CN107402728A (en) * | 2016-05-19 | 2017-11-28 | 北大方正集团有限公司 | A kind of file printing method and system |
CN106302386A (en) * | 2016-07-25 | 2017-01-04 | 深圳信息职业技术学院 | A kind of method promoting IPv6 protocol data bag safety |
CN106445429A (en) * | 2016-11-23 | 2017-02-22 | 宜春小马快印科技有限公司 | Safe printing method and system |
JP2018176686A (en) * | 2017-04-21 | 2018-11-15 | 京セラドキュメントソリューションズ株式会社 | Image forming apparatus |
CN109428879A (en) * | 2017-09-05 | 2019-03-05 | 北京立思辰计算机技术有限公司 | A kind of printing safety control system and method |
CN109421392A (en) * | 2017-09-05 | 2019-03-05 | 北京立思辰计算机技术有限公司 | A kind of printer encryption control system |
CN109508153A (en) * | 2017-09-14 | 2019-03-22 | 北京立思辰计算机技术有限公司 | A kind of data transmission method of printer |
CN110135176A (en) * | 2019-04-26 | 2019-08-16 | 深圳市金城保密技术有限公司 | A kind of encryption method of print data transmission |
CN110363016A (en) * | 2019-07-15 | 2019-10-22 | 宜春宜联打印设备有限公司 | A kind of printing encryption method and device, Method of printing and printing device |
CN112230868A (en) * | 2020-10-21 | 2021-01-15 | 湖南长城信息金融设备有限责任公司 | Safety copying machine and copying control method based on safety chip |
CN112230868B (en) * | 2020-10-21 | 2023-04-11 | 长城信息股份有限公司 | Safety copying machine and copying control method based on safety chip |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101872402A (en) | Safe printing method | |
CA2590989C (en) | Protocol and method for client-server mutual authentication using event-based otp | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN101115060B (en) | Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system | |
CN102185694A (en) | Electronic file encrypting method and system based on fingerprint information | |
CN101123495A (en) | A data encryption, decryption system and method | |
CN103618607A (en) | Method for data security transmission and key exchange | |
CN106452762A (en) | Identity-based high-efficiency data transmission method in vehicular ad hoc network | |
CN102333093A (en) | Data encryption transmission method and system | |
CN110958219A (en) | SM2 proxy re-encryption method and device for medical cloud shared data | |
CN105743645A (en) | PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method | |
CN105337733A (en) | Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification | |
CN112653719A (en) | Automobile information safety storage method and device, electronic equipment and storage medium | |
CN101931623B (en) | Safety communication method suitable for remote control with limited capability at controlled end | |
CN101938353B (en) | Method for remotely resetting personal identification number (PIN) of key device | |
CN108809936A (en) | A kind of intelligent mobile terminal auth method and its realization system based on Hybrid Encryption algorithm | |
JP5324813B2 (en) | Key generation apparatus, certificate generation apparatus, service provision system, key generation method, certificate generation method, service provision method, and program | |
CN116846556A (en) | SM 9-based data condition proxy re-encryption method, system and equipment | |
CN102404120A (en) | Encryption method and encryption system for electronic documents | |
CN101651538A (en) | Method for safe transmission of data based on creditable password module | |
CN110363016A (en) | A kind of printing encryption method and device, Method of printing and printing device | |
CN113468582A (en) | Anti-quantum computing encryption communication method | |
CN102882675A (en) | Password encryption method for social network sites | |
KR101281103B1 (en) | A printer security device and the method based on ticket authentication | |
CN101883096B (en) | Method, device and system for safely transferring data between electronic signature tools |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20101027 |