CN101872402A - Safe printing method - Google Patents

Safe printing method Download PDF

Info

Publication number
CN101872402A
CN101872402A CN201010184988A CN201010184988A CN101872402A CN 101872402 A CN101872402 A CN 101872402A CN 201010184988 A CN201010184988 A CN 201010184988A CN 201010184988 A CN201010184988 A CN 201010184988A CN 101872402 A CN101872402 A CN 101872402A
Authority
CN
China
Prior art keywords
printer
hash
file
printed
control end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010184988A
Other languages
Chinese (zh)
Inventor
秦振山
杨文兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Founder Technology Computer System Co Ltd
Original Assignee
Shanghai Founder Technology Computer System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Founder Technology Computer System Co Ltd filed Critical Shanghai Founder Technology Computer System Co Ltd
Priority to CN201010184988A priority Critical patent/CN101872402A/en
Publication of CN101872402A publication Critical patent/CN101872402A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

The invention discloses a safe printing method, which belongs to the technical field of computers. The method comprises the following steps that: (a) a user selects a file to be printed at a user side; (b) a control end acquires a printing password through a set acquisition method; (c) the control end converts the printing password into a secret key by a set converting method and uses the secret key to encrypt the file to be printed by a set encryption algorithm; (d) the control end transmits the encrypted file to be printed to a printer; (e) the user inputs the printing password on the printer; and (f) the printer obtains the file to be printed according to a decryption process which corresponds to the encryption process in the step c and prints. The invention can be used for printers in all fields to realize safe printing.

Description

A kind of safe printing method
Technical field
The present invention relates to printer, relate in particular to a kind of password authentication that passes through, and generate the safe printing method that password is encrypted by password.Belong to field of computer technology.
Background technology
Current printer is networking, for the computing machine in the network provides print service, becomes " network printer " in a sense.Communication at printer and intercomputer did not have the safety encipher function originally, therefore when computing machine need be printed the document that requires encryption, existed and was stolen content by the network other-end, caused the risk of divulging a secret.
More existing patents have proposed to solve by authentification of user or employing cipher mode the secure print problem of printer in the prior art, these methods adopt public and private key system mostly, this system requires to obtain the support of printer, and the algorithm complexity, is unfavorable for administration configuration.If do not adopt public and private key system, then there is the problem that how secret key safety of computer encipher document is passed to printer.
Summary of the invention
The objective of the invention is to overcome problems of the prior art, propose a kind of public and private key system that do not adopt, realize the method that document security is printed by the user password authentication information.
The inventive method comprises the following steps:
A) user selects file to be printed at user side;
B) control end obtains print pin by the acquisition methods of setting;
C) control end converts print pin to key by the conversion method of setting, and uses this secret key encryption file to be printed by the cryptographic algorithm of setting;
D) control end transfers to printer with the file to be printed of encrypting;
E) user imports described print pin on printer;
F) printer is according to obtaining described file to be printed with the corresponding decrypting process of the described ciphering process of step c) and printing.
As shown in Figure 1, the control end that the present invention relates to is connected with printer with user side respectively.Need to prove that described control end, user side are abstract concept of function, is not entitative concept, and its specific implementation can realize in identical or different hardware unit.Such as, control end can be the driver of printer, user side can be co-located in same computing machine with control end, control end also can with printer in same computing machine, certainly control end also may reside in the computing machine of a platform independent and is exclusively used in large-scale printing control.
Preferably, in the methods of the invention, control end is encrypted an authorization information simultaneously in the process of encrypting file to be printed, and the authorization information that will encrypt transfers to printer in the lump; Then in step f), printer deciphering earlier obtains described authorization information, confirm that described authorization information is errorless after, the file to be printed of encrypting is decrypted process, obtain expressly the back and print.The decryption method and the key that can guarantee to be used to decipher file to be printed by this proof procedure are correct certainly, in order to avoid decryption error and cause misprint.
Preferably, in the methods of the invention, all described key is done cyclical variation when control end is encrypted and during the printer deciphering by the rule change of setting.That is to say that even for same file to be printed, the key that uses in the encryption and decryption process is identical before and after also not being, but does cyclical variation.Described rule change can be: file content (such as the 64K) back of encrypting or deciphering pre-sizing increases or reduces a fixed value (such as 1) on the original cipher key basis; Described rule change also can be: time durations (such as the 1 second) back of encrypting or deciphering predetermined length increases or reduces a fixed value (such as 2) on the original cipher key basis.In addition, also can be other periodicity even aperiodicity changing methods commonly used, such as with the cryptographic hash of last key as back one key, perhaps only the part of last key is made change process, as long as this rule change be simultaneously control end and print to hold known to, and these two ends all have changing capability and get final product.
Preferably, in the methods of the invention, described acquisition methods can be: user's input or generation at random.That is to say that in the step b), control end can require the user to import print pin, perhaps generate a print pin (need present to the user certainly) at random because the user need import printer with this password when printing.
Preferably, in the methods of the invention, described conversion method is: print pin is made a Hash, and a cryptographic hash is made the secondary Hash, obtain the secondary cryptographic hash, described key is described secondary cryptographic hash.That is to say that the key that really is used to encrypt file to be printed is not above-mentioned print pin, but the variant of print pin after conversion.Routine at this point, the available following formula of the relation between key and the print pin is represented visually: key=HASH (HASH (print pin)), wherein " HASH () " expression is carried out the Hash operation to the content in the bracket, calculates cryptographic hash in other words.
Preferably, in the methods of the invention, described cryptographic algorithm is the symmetric encipherment algorithm (such as the SMS4 cryptographic algorithm) that meets Chinese Password Management regulation, can certainly be other cryptographic algorithm, such as 3-DES or AES.
Preferably, the present invention carries out in the following manner:
A) user selects file to be printed at user side;
B) control end obtains print pin by the acquisition methods of setting; Control end is determined print job ID (such as generating in regular turn) simultaneously;
C) control end converts print pin to key by the conversion method of setting, and encrypts file to be printed according to this key by the cryptographic algorithm of setting;
This conversion method is specifically: print pin is made a Hash, print job ID is made a Hash; A cryptographic hash of print pin and the cryptographic hash sum of print job ID are made the secondary Hash; And, obtaining cryptographic hash three times to three Hash of secondary cryptographic hash work, described key is described three cryptographic hash; Therefore, key, the available following formula of relation between print pin and the print job ID three is represented visually: key=HASH (HASH (HASH (print pin)+HASH (print job ID))), wherein " HASH () " expression is carried out the Hash operation to the content in the bracket, calculates cryptographic hash in other words;
D) control end transfers to printer with the file to be printed of encrypting; Simultaneously control end with print job ID plaintext transmission to printer;
E) user imports described print pin and print job ID on printer, and printer can be according to this print job ID inquiry corresponding document (such as the file to be printed after encrypting);
F) printer is according to obtaining described file to be printed with the corresponding decrypting process of the described ciphering process of step c) (generative process that also comprises key certainly) and printing.
Hash algorithm of the present invention can adopt conventional algorithm, such as SHA-256, and SHR-512 etc.
Compare with prior art, advantage of the present invention is:
Two kinds of security means of combining encryption algorithm and authentification of user, the secure print of realization document.When guaranteeing the file printout security, abandoned complicated public and private key system, simple and easily realization.
Description of drawings
Fig. 1 is the functional module structure synoptic diagram of the print system that the present invention relates to;
Fig. 2 is the structural representation of the print system that relates to of the embodiment of the invention.
Embodiment
A kind of safe printing method that meets Chinese commercial cipher (discussing close) regulation is described below.
The print system that this Method of printing relates to as shown in Figure 2, total system is made up of computing machine and remote printer, installed printer drives in the computing machine, comprises the SM3 computing module, SMS4 computing module and random number generator; Printer also comprises SM3 and SMS4 computing module, also comprises a numeric keypad.
One. the printer driver part of computer end:
1. the printed driver of installing on computers can meet the symmetric encipherment algorithm SMS4 that close regulation is discussed by country, and HASH algorithm SM3 also has the random number generating algorithm.Printer driver also can be passed through relevant interface, meets the cryptographic algorithm equipment of discussing close regulation (as by TCM service module interface---TSM, call credible password module---TCM chip) in the using system and finishes above-mentioned functions.
2. when printing, the user selects to want the document of encrypted print, and driver generates the ID of a numeric string as this document print job at random, and points out user ID information on screen, allows the user import a numeric string as print pin then.
3. printed driver is with the HASH value of SM3 algorithm computation print pin, then the HASH value of usefulness SM3 algorithm computation operation ID equally.
Driver the HASH value addition of the HASH value of password and ID after, the result is carried out HASH twice, for the second time the result of HASH encrypts by the SMS4 cryptographic algorithm as key and wants typescripts.
5. driver sends the document printing for the treatment of of operation ID and encryption to printer, and the preceding 1K byte of encrypt file of passing to printer is as printing control information, and wherein preceding 4 bytes are authorization informations, such as the title SMS4 of cryptographic algorithm.
6. the every in other words transmission of every encryption 64K content, key value adds 1, as new key.
Two. printer section
1. a keypad is arranged on the printer, can input digit and/or letter.Can only input digit if keyboard is less, then print pin also must be that pure digi-tal is formed.
2. printer can meet the symmetric encipherment algorithm SMS4 and the HASH algorithm SM3 of the close regulation of the merchant of country.
3. the user imports the ID and the print pin of document print job on keypad, and printer is according to the file to be printed of this ID inquiry and location encryption.
4. printer carries out HASH with the SM3 algorithm to the password of user input and calculates, and with the SM3 algorithm operation ID is carried out HASH equally then and calculates, and will carry out HASH twice after the addition of two HASH values again, the second time HASH the result as decruption key.
5. printer elder generation decryption verification information if the plaintext that obtains is SMS4, illustrates that key is correct, then continues the deciphering file to be printed, and directly prints, otherwise the prompting user re-enters operation ID and password.

Claims (10)

1. a safe printing method is characterized in that, comprises the following steps:
A) user selects file to be printed at user side;
B) control end obtains print pin by the acquisition methods of setting;
C) control end converts print pin to key by the conversion method of setting, and uses this secret key encryption file to be printed by the cryptographic algorithm of setting;
D) control end transfers to printer with the file to be printed of encrypting;
E) user imports described print pin on printer;
F) printer is according to obtaining described file to be printed with the corresponding decrypting process of the described ciphering process of step c) and printing.
2. safe printing method as claimed in claim 1 is characterized in that, control end is encrypted an authorization information simultaneously in the process of encrypting file to be printed, and the authorization information that will encrypt transfers to printer in the lump; In step f), printer earlier deciphering obtains described authorization information, confirm that described authorization information is errorless after, the file to be printed of encrypting is decrypted process, obtain expressly the back and print.
3. safe printing method as claimed in claim 1 is characterized in that, all by the rule change of setting described key is done cyclical variation when control end is encrypted and during the printer deciphering.
4. safe printing method as claimed in claim 3 is characterized in that, described rule change is: after encrypting or decipher the file content of pre-sizing, increase or reduce a fixed value on the original cipher key basis.
5. safe printing method as claimed in claim 3 is characterized in that, described rule change is: behind the time durations of encryption or deciphering predetermined length, increase or reduce a fixed value on the original cipher key basis.
6. safe printing method as claimed in claim 1 is characterized in that, described acquisition methods is: user's input or generation at random.
7. safe printing method as claimed in claim 1 is characterized in that, described conversion method is: print pin is made a Hash, and a cryptographic hash is made the secondary Hash, obtain the secondary cryptographic hash, described key is described secondary cryptographic hash.
8. safe printing method as claimed in claim 1 is characterized in that, described cryptographic algorithm is: the symmetric encipherment algorithm that meets Chinese Password Management regulation.
9. safe printing method as claimed in claim 1 is characterized in that, described cryptographic algorithm is: SMS4 cryptographic algorithm, 3-DES cryptographic algorithm or AES cryptographic algorithm.
10. safe printing method as claimed in claim 1 is characterized in that,
Step b) also comprises: control end is determined print job ID;
The described conversion method of step c) is: print pin is made a Hash, print job ID is made a Hash; A cryptographic hash of print pin and the cryptographic hash sum of print job ID are made the secondary Hash; And, obtaining cryptographic hash three times to three Hash of secondary cryptographic hash work, described key is described three cryptographic hash;
Step d) also comprises: control end with print job ID plaintext transmission to printer;
Step e) also comprises: the user imports described print job ID on printer, and printer is according to this print job ID inquiry corresponding document.
CN201010184988A 2010-05-26 2010-05-26 Safe printing method Pending CN101872402A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010184988A CN101872402A (en) 2010-05-26 2010-05-26 Safe printing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010184988A CN101872402A (en) 2010-05-26 2010-05-26 Safe printing method

Publications (1)

Publication Number Publication Date
CN101872402A true CN101872402A (en) 2010-10-27

Family

ID=42997259

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010184988A Pending CN101872402A (en) 2010-05-26 2010-05-26 Safe printing method

Country Status (1)

Country Link
CN (1) CN101872402A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102707918A (en) * 2011-02-25 2012-10-03 柯尼卡美能达商用科技株式会社 Printing system, printing method, terminal, and printing instruction method
CN102810136A (en) * 2011-06-01 2012-12-05 鸿富锦精密工业(深圳)有限公司 Printing equipment and security printing method
CN102916945A (en) * 2012-09-25 2013-02-06 广州市乐得瑞科技有限公司 Method used for dynamically and safely encrypting communication protocol of printer
CN103544440A (en) * 2012-07-16 2014-01-29 东友科技股份有限公司 Confidentiality printing method
CN103777912A (en) * 2014-01-27 2014-05-07 珠海赛纳打印科技股份有限公司 Imaging equipment as well as safe imaging method and imaging system thereof
CN104462901A (en) * 2014-12-10 2015-03-25 北京海泰方圆科技有限公司 Method and system for safe printing management
CN105471902A (en) * 2015-12-29 2016-04-06 深圳市瑞铭无限科技有限公司 Data encryption method and system based on issued encryption algorithm
CN105930115A (en) * 2016-04-25 2016-09-07 杭州旗捷科技有限公司 Key data reduction consumable chip and stored data protection method
CN106302386A (en) * 2016-07-25 2017-01-04 深圳信息职业技术学院 A kind of method promoting IPv6 protocol data bag safety
CN106445429A (en) * 2016-11-23 2017-02-22 宜春小马快印科技有限公司 Safe printing method and system
WO2017125940A1 (en) * 2016-01-22 2017-07-27 Hewlett-Packard Development Company, L.P. Providing printed confidential documents
CN107402728A (en) * 2016-05-19 2017-11-28 北大方正集团有限公司 A kind of file printing method and system
JP2018176686A (en) * 2017-04-21 2018-11-15 京セラドキュメントソリューションズ株式会社 Image forming apparatus
CN109428879A (en) * 2017-09-05 2019-03-05 北京立思辰计算机技术有限公司 A kind of printing safety control system and method
CN109421392A (en) * 2017-09-05 2019-03-05 北京立思辰计算机技术有限公司 A kind of printer encryption control system
CN109508153A (en) * 2017-09-14 2019-03-22 北京立思辰计算机技术有限公司 A kind of data transmission method of printer
CN110135176A (en) * 2019-04-26 2019-08-16 深圳市金城保密技术有限公司 A kind of encryption method of print data transmission
CN110363016A (en) * 2019-07-15 2019-10-22 宜春宜联打印设备有限公司 A kind of printing encryption method and device, Method of printing and printing device
CN112230868A (en) * 2020-10-21 2021-01-15 湖南长城信息金融设备有限责任公司 Safety copying machine and copying control method based on safety chip

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1632738A (en) * 2003-12-23 2005-06-29 联想(北京)有限公司 Print control method for ensuring data transmission security
CN1642171A (en) * 2003-11-27 2005-07-20 奥西-技术有限公司 Secure data transmission in a network system of image processing devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1642171A (en) * 2003-11-27 2005-07-20 奥西-技术有限公司 Secure data transmission in a network system of image processing devices
CN1632738A (en) * 2003-12-23 2005-06-29 联想(北京)有限公司 Print control method for ensuring data transmission security

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102707918A (en) * 2011-02-25 2012-10-03 柯尼卡美能达商用科技株式会社 Printing system, printing method, terminal, and printing instruction method
CN102707918B (en) * 2011-02-25 2016-08-03 柯尼卡美能达商用科技株式会社 Print system, printing process, termination and print order method
US8948383B2 (en) 2011-02-25 2015-02-03 Konica Minolta Business Technologies, Inc. Printing system, printing method, terminal, and computer-readable storage medium for computer program
CN102810136B (en) * 2011-06-01 2015-09-02 鸿富锦精密工业(深圳)有限公司 Safe printing method
CN102810136A (en) * 2011-06-01 2012-12-05 鸿富锦精密工业(深圳)有限公司 Printing equipment and security printing method
CN103544440A (en) * 2012-07-16 2014-01-29 东友科技股份有限公司 Confidentiality printing method
CN103544440B (en) * 2012-07-16 2016-04-20 东友科技股份有限公司 Secure printing method
CN102916945B (en) * 2012-09-25 2014-02-05 广州市乐得瑞科技有限公司 Method used for dynamically and safely encrypting communication protocol of printer
CN102916945A (en) * 2012-09-25 2013-02-06 广州市乐得瑞科技有限公司 Method used for dynamically and safely encrypting communication protocol of printer
WO2015109939A1 (en) * 2014-01-27 2015-07-30 珠海赛纳打印科技股份有限公司 Imaging device, secure imaging method thereof and imaging system
CN103777912A (en) * 2014-01-27 2014-05-07 珠海赛纳打印科技股份有限公司 Imaging equipment as well as safe imaging method and imaging system thereof
CN103777912B (en) * 2014-01-27 2017-08-25 珠海赛纳打印科技股份有限公司 A kind of imaging device and its safe imaging method, imaging system
CN104462901A (en) * 2014-12-10 2015-03-25 北京海泰方圆科技有限公司 Method and system for safe printing management
CN105471902A (en) * 2015-12-29 2016-04-06 深圳市瑞铭无限科技有限公司 Data encryption method and system based on issued encryption algorithm
US10742832B2 (en) 2016-01-22 2020-08-11 Hewlett-Packard Development Company, L.P. Providing printed confidential documents
WO2017125940A1 (en) * 2016-01-22 2017-07-27 Hewlett-Packard Development Company, L.P. Providing printed confidential documents
CN105930115B (en) * 2016-04-25 2018-11-16 杭州旗捷科技有限公司 A kind of critical data reduction consumable chip and storing data guard method
CN105930115A (en) * 2016-04-25 2016-09-07 杭州旗捷科技有限公司 Key data reduction consumable chip and stored data protection method
CN107402728A (en) * 2016-05-19 2017-11-28 北大方正集团有限公司 A kind of file printing method and system
CN106302386A (en) * 2016-07-25 2017-01-04 深圳信息职业技术学院 A kind of method promoting IPv6 protocol data bag safety
CN106445429A (en) * 2016-11-23 2017-02-22 宜春小马快印科技有限公司 Safe printing method and system
JP2018176686A (en) * 2017-04-21 2018-11-15 京セラドキュメントソリューションズ株式会社 Image forming apparatus
CN109428879A (en) * 2017-09-05 2019-03-05 北京立思辰计算机技术有限公司 A kind of printing safety control system and method
CN109421392A (en) * 2017-09-05 2019-03-05 北京立思辰计算机技术有限公司 A kind of printer encryption control system
CN109508153A (en) * 2017-09-14 2019-03-22 北京立思辰计算机技术有限公司 A kind of data transmission method of printer
CN110135176A (en) * 2019-04-26 2019-08-16 深圳市金城保密技术有限公司 A kind of encryption method of print data transmission
CN110363016A (en) * 2019-07-15 2019-10-22 宜春宜联打印设备有限公司 A kind of printing encryption method and device, Method of printing and printing device
CN112230868A (en) * 2020-10-21 2021-01-15 湖南长城信息金融设备有限责任公司 Safety copying machine and copying control method based on safety chip
CN112230868B (en) * 2020-10-21 2023-04-11 长城信息股份有限公司 Safety copying machine and copying control method based on safety chip

Similar Documents

Publication Publication Date Title
CN101872402A (en) Safe printing method
CA2590989C (en) Protocol and method for client-server mutual authentication using event-based otp
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN101115060B (en) Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system
CN102185694A (en) Electronic file encrypting method and system based on fingerprint information
CN101123495A (en) A data encryption, decryption system and method
CN103618607A (en) Method for data security transmission and key exchange
CN106452762A (en) Identity-based high-efficiency data transmission method in vehicular ad hoc network
CN102333093A (en) Data encryption transmission method and system
CN110958219A (en) SM2 proxy re-encryption method and device for medical cloud shared data
CN105743645A (en) PUF (Physical Unclonable Function)-based stream key generation device and method and data encryption and decryption method
CN105337733A (en) Two-dimensional code locking control method based on combination of synchronous-asynchronous secret key verification
CN112653719A (en) Automobile information safety storage method and device, electronic equipment and storage medium
CN101931623B (en) Safety communication method suitable for remote control with limited capability at controlled end
CN101938353B (en) Method for remotely resetting personal identification number (PIN) of key device
CN108809936A (en) A kind of intelligent mobile terminal auth method and its realization system based on Hybrid Encryption algorithm
JP5324813B2 (en) Key generation apparatus, certificate generation apparatus, service provision system, key generation method, certificate generation method, service provision method, and program
CN116846556A (en) SM 9-based data condition proxy re-encryption method, system and equipment
CN102404120A (en) Encryption method and encryption system for electronic documents
CN101651538A (en) Method for safe transmission of data based on creditable password module
CN110363016A (en) A kind of printing encryption method and device, Method of printing and printing device
CN113468582A (en) Anti-quantum computing encryption communication method
CN102882675A (en) Password encryption method for social network sites
KR101281103B1 (en) A printer security device and the method based on ticket authentication
CN101883096B (en) Method, device and system for safely transferring data between electronic signature tools

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20101027