CN102402658A - Classified printing control method based on virtual printing, intelligent card and information system - Google Patents

Classified printing control method based on virtual printing, intelligent card and information system Download PDF

Info

Publication number
CN102402658A
CN102402658A CN2011101285921A CN201110128592A CN102402658A CN 102402658 A CN102402658 A CN 102402658A CN 2011101285921 A CN2011101285921 A CN 2011101285921A CN 201110128592 A CN201110128592 A CN 201110128592A CN 102402658 A CN102402658 A CN 102402658A
Authority
CN
China
Prior art keywords
printing
card
document
print
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101285921A
Other languages
Chinese (zh)
Inventor
李文军
吴翀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING BLUE WAVE JINZHAO TECHNOLOGY Co Ltd
Original Assignee
BEIJING BLUE WAVE JINZHAO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BLUE WAVE JINZHAO TECHNOLOGY Co Ltd filed Critical BEIJING BLUE WAVE JINZHAO TECHNOLOGY Co Ltd
Priority to CN2011101285921A priority Critical patent/CN102402658A/en
Publication of CN102402658A publication Critical patent/CN102402658A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a printing control method based on a virtual printing technology, an intelligent card reading and writing device and a management information system, which is in line with a Chinese classified information system criterion and relevant state secrecy provisions, and realizes the record, review and control of the printing behavior of military classified units. In the method, the virtual printing technology is utilized to intercept a printing job submitted in a computer of a user, the printing job is stored to a database in a digital form and then is submitted to a reviewer for reviewing, and a printing submitter with an IC (integrated circuit) card can complete the printing by reading the card on a card reader after the review is passed. Meanwhile, the system records complete printing logs and printing document contents for reviewing. The method realizes the record, review and control of the printing behavior of the military classified units, so that the printing management of the military classified units meets the requirements of relevant state secrecy laws and regulations, and makes up for the control and regulatory loopholes of the classified document printing.

Description

Concerning security matters print control program based on virtual printing, smart card and infosystem
Technical field
The present invention relates to the military project concerning security matters unit print control program that meets national classified information system specifications and secret relevant regulations realized by virtual printing technology, read-write equipment for smart card, MIS etc.
Background technology
(1) virtual printing technology
The virtual printing technology is emerging in the last few years printing technique; Be included in the virtual printing installed on the operating system and drive and call this virtual printing and drive and realize that document is printed and intercept and capture and the driver and the software systems of format conversion, its be installed on the operating system be not connected with physical printer be used to the Windows printer driver intercepting and capturing print What and convert the specific format document to.
Virtual printing drives and adopts the development technique of operating system aspect to develop and compile; Be installed in after the compiling on the operating system, exist, and can be employed software transfer and print with the form of printed driver; The virtual printing technology is promptly utilized the virtual printer that is installed on the operating system to drive and is printed, and can convert print What into the specific format document; The printing intercepting and capturing and the format conversion of multiple formula document of this technical support and multiple application software (comprising OFFICE document, PDF document, TXT document, picture, webpage, conventional design software, financial software, form software etc.).
(2) read-write equipment for smart card
Read-write equipment for smart card is a kind of read-write equipment that can read or write the IC smart card, this equipment can through technological means such as radio frequency contactless read or write the IC smart card information.The IC smart card is made up of card case and embedded IC-card chip, and embedded IC-card chip provides the non-memory loss property storage space of a constant volume, the information that can store a constant volume.In application of IC cards; Usually with personnel's essential information and related service information stores in the IC-card chip, total at business operation, personnel hold and on read-write equipment for smart card, carry out Card Reader; Read-write equipment for smart card reads the information of necessity from IC-card; And communicate with related system, confirm card holder's identity to reach, obtain the purpose of business information in the card.
Smart card is of a great variety, and for example M1 card, CPU card, China second-generation identity card etc., dissimilar cards have the storage spaces of different sizes, different Card read/write mode, different security ranks, but storage space all is provided, and all have not reproducible characteristic.This has determined the widespread use of smart card in informationization.
(3) MIS
MIS (Management Information System) is a kind of infosystem of forming based on database and application program; System takes as the leading factor with the people; Utilize computer hardware, software, network communication equipment and other office equipment; The mobile phone of the information of carrying out, transmission, processing, storage, renewal and maintenance are the purpose man-machine system with raising service operation benefit, efficient, security.
In the informatization, a large amount of MISs are constructed and implemented in modern times, and system is that digitized information stores is in database with the information translation of original papery; The information flow mode of original artificial circulation is converted into the mode of electronization, networking circulation in MIS; This thoroughly changed information mobile phone, arrangement, circulation, store and utilize mode, improved the efficient and the security of information utilization and storage greatly, be used widely in the service management work in modern times.
Summary of the invention
The present invention is a kind of based on virtual printing technology, read-write equipment for smart card and MIS realization; Meet China's classified information system specifications and national secret relevant regulations, realize military project concerning security matters unit print the print control program of behavior record, audit, control, audit,
What traditional document was printed employing is that the computer expert crosses USB or LPT port connects local printer or the computer expert crosses the mode that Ethernet connects the network printer in the net, as shown in Figure 1.In this printing topology, the document that print will directly send to printer through USB port, LPT port or network and print, and print speed is fast, efficient is high, it is comparatively extensive to use.But; Because the job specification of military project concerning security matters unit has determined in military project concerning security matters unit; The document of printing much all is the design state secret, explicitly calls in the secret relevant laws and regulations of youngster country, and security files is printed must pass through audit; The record of printing will be preserved, and the printing behavior will control effectively.And this printing topology has directly determined to utilize technological means the printing of security files to be examined, write down and effectively control.This give document print job of military project concerning security matters unit brought great risk,
In order to address this problem; We researched and developed a cover based on the virtual printing technology, can only block that read-write equipment and MIS realize; Meet China's classified information system specifications and national secret relevant regulations, realize military project concerning security matters unit print the print control program of behavior record, audit, control, audit,
Method utilizes the virtual printing technology to intercept and capture the print job of submitting on the user computer; And with print job with digitized stored in form to database; And be provided with according in advance audit and print What to be submitted to the person approving examine; After the band person approving passes; Print IC-card that the submitter holds me Card Reader to the corresponding IC card reader of printer, CR Card Reader and through behind the MIS identity verification reads this user's print job this locality and is submitted to printer and prints from database.The colleague; System will write down print log and the document printing content of accomplishing; The security audit person of military project concerning security matters unit login system at any time consults printing submission, audit, print log and the printed contents of completion, the audit work that with convenient and safe auditor to print line is.
Description of drawings
Fig. 1 is an expression traditional prints topological diagram.
Fig. 2 is that expression print control system distributing is printed topological diagram
Fig. 3 is the centralized printing topological diagram of expression print control system.
Fig. 4 is expression one-level audit normal flow figure.
Fig. 5 is an expression one-level audit authorization code process flow diagram.
Fig. 6 is expression secondary audit normal flow figure.
Fig. 7 is an expression secondary audit authorization code process flow diagram.
Fig. 8 is an expression print control system functional diagram.
With reference to the accompanying drawings implementation method of the present invention is described:
1, prints topology
The printing topology of utilizing above-mentioned print control program to realize can be taked various topological structures; A kind of is to utilize the decentralized topology (as shown in Figure 2) of printing control computer control printer, and another kind is to utilize server to agree to print the Centralized Topology of control (shown in figure three).The intelligent card reader of the employing of two kinds of topological structures is different with the printer controlling mechanism.
(1) distributing is printed topology
Utilize in the mode of printing controlling computer control printer; Each printer all is connected on the printing controlling computer of an appointment; Print between controlling computer and the printer and take local connected modes such as USB or LPT; Printer is a local printer printing on the controlling computer, and the cancellation printer is shared.Like this, printer can only can only be controlled by printing controller by printer.Print on the controlling computer except connecting local printer; Also connect the IC-card card reader; The IC-card that the user holds oneself behind the Card Reader, is installed in the software program of printing on the controller and can reads the identity information in the IC-card to the CR, and connects database and carry out authentication.After checking is passed through, this user's document printing read from database to print controller local, and automatically this document printing is committed to printer by software program and prints.
Distributing shown in the figure two is printed in the topology, and printer by the printing controlling computer control of correspondence, is not shared fully, the user submits print job in LAN after, can arrive the printing of swiping the card on the printing controller that meets intensive requirement in the net arbitrarily.
(2) centralized printing control topology
In centralized printing control topology, printer is the network printer, is connected in the Intranet through netting twine.In Intranet, dispose one to many print control server, the driver of all-network printer is installed on the print control server according to the quantity of printer, and with on the print control server.Like this, at all printers of server driven, and the watchdog routine of opening the listens for network port.Intelligent card reader connects into Intranet through netting twine; The meeting behind Card Reader of the intelligent card reader of this network interface is sent to this machine IP address and card number certain network port that pre-sets of server with the form of udp protocol bag; The watchdog routine that operates on the server can receive the network packet from the POS at any time; And judge the position of CR according to the IP address in the packet; Card number authentication personnel identity according in the packet is sent to the pairing network printer of ad-hoc location CR to card holder's document printing at last.
In above-mentioned printing topology, every CR all has fixed IP addresses, and the network printer also has fixed IP addresses, in MIS, needs both corresponding one by one contacts.The print job that the user submits to can realize printing by Card Reader on any CR of Intranet equally.
2, print flow process
In print control system, according to the difference of demand, there are many covers to print the control flow of submitting audit to, totally classify two big types four kinds.Be respectively one-level audit normal flow; And audit authorization code flow process, secondary audit normal flow, secondary audit authorization code flow process; Secondary audit authorization code flow process; One-level audit is with the difference of secondary audit: as long as the document of common grade is promptly printable through person approving's audit, and the High Security Level document is after one-level person approving audit, could print after also will submitting to the secondary person approving of higher level to examine.For example: certain domestic consumer submits a confidential document to, after the leader of department carries out one-level audit, could print after also will submitting the secondary person approving audit of higher level to.For example: certain domestic consumer submits a confidential document to, after the leader of department carries out the one-level audit, also will could print after the leader's of the unit of process the secondary audit.The difference of common flow process and authorization code flow process is: the person approving must onlinely examine in real time and could print in the common flow process; And authorization code flow process person approving can not carry out online audit; The authorization code of oneself is informed printing submission person; Submission person's typing authorization code checking through after can print, the auditor can check the document that authorization code is printed after entering next time system, and carries out one benefit and sign.In print control system, whether can carry out authorization code audit, the intensive requirement of document etc. that whether need carry out secondary audit, secondary audit can be provided with, and four kinds are described below respectively:
(1) one-level audit normal flow
In one-level audit normal flow, the user is limited on oneself the client computer and submits print request to, and fills in the information such as level of confidentiality, reason, whereabouts, mark, person approving of document printing.System can carry out the judgement of level of confidentiality automatically when submitting to; If the high space personnel's of level of confidentiality of the document of submitting to level of confidentiality then can not submit to; If the high space person approving's of level of confidentiality of the document of submitting to level of confidentiality can not be submitted to, meet security stipulation with the submit operation of guaranteeing to print.
After the auditor was submitted in print job, the auditor logined software systems and examines, and audit can be carried out two kinds of operations; A kind of is that a kind of is to reject through audit, promptly printable through examining the back user; Reject the back user and can see and reject reason, this is printed to submit to and stops.
After audit is passed through; The user can arrive Card Reader printing on any printing controller, and behind the Card Reader, system can carry out level of confidentiality automatically and judge; Judge meet the level of confidentiality of the document that will print and printer the time; If the level of confidentiality of document printing is higher than the level of confidentiality of printing controller and printing, then printing can not be accomplished, and the user can meet the printing of swiping the card once more on the printer of extension set protection philosophy to other.
To write down all details of whole process in the process that system submits to, examines, prints in whole printing, security audit person can consult these data at any time and carry out security audit.
One-level audit normal flow is shown in figure four.
(2) one-level audit authorization code flow process
Different with one-level audit normal flow is, after the user submits printing to, can directly import one-level person approving's authorization code, can directly print behind the system verification authorization code.After printing finished, one-level person approving can carry out the benefit of suggestion and sign.
One-level audit authorization code flow process is shown in figure five.
(3) secondary audit normal flow
If in system, print the High Security Level document, then need carry out the secondary audit according to setting.Different with one-level audit is, in the secondary auditing flow, after one-level person approving's audit is passed through, also will submit to two elder sister person approving once more and examine, and after the secondary person approving examined once more and passes through, the user just can print.The secondary person approving can carry out review operations; Also can reject; Reject the back print request and will reject, after the rejecting of one-level person approving street secondary person approving, can select other secondarys person approving to resubmit to the one-level person approving; Also can reject once more, finish to print flow process to the print requester.
Secondary audit normal flow is shown in figure six.
What secondary audit authorization code flow process was different with one-level audit authorization code flow process is, secondary audit needs printing user imports one-level person approving's authorization code, and it is printable to import secondary person approving's authorization code rear by the one-level person approving then.
3, user role and software system function
In print control system, the user is divided into domestic consumer.Five kinds of auditor, system manager, safe and secret member and security audit persons, five kinds of users employable function in system is described below:
(1) domestic consumer
Towards domestic consumer, system submits to print and submits to, prints and recall, print, print functions such as inquiry, password modification, authorization code checking.
(2) auditor
Towards the auditor, system provide print examine, rejects, functions such as inquiry, password are revised, authorization code checking, suggestion benefit label.
(3) system manager
Towards safe and secret member, system provides functions such as division management, personal management, password modification.
(4) safe and secret member
Towards safe and secret member, system provides the role to be provided with, functions such as level of confidentiality setting, person approving's setting, password modification.
(5) security audit person
Towards security audit person, system provides print log inquiry audit, system journal inquiry audit, prints functions such as statistics, password modification.
4, system forms
Print control system is made up of printer, intelligent card reader, print control server, LAN, software systems, and wherein software systems comprise print client, print management end again and print control end.
5, system specifications
Print control system safety requires to design according to the secret relevant laws and regulations of country, meets military project concerning security matters unit and prints the requirement of control related specifications.Specific as follows said:
(1) authentication
System has the perfect authentication technology, and the system identity authenticating safety is guaranteed in the for example checking of user cipher, the checking of IC-card Card Reader, the checking of Mac address binding etc.
(2) three Yuans separations
System is provided with system manager, safe and secret member and security audit person, and three Yuans function is not overlapping, checks and balance, and guarantees the security of system.
(3) cascade protection
System is provided with according to cascade protection thought fully, and the link of the level of confidentiality of every design, system all can be carried out the judgement of level of confidentiality according to the principle of cascade protection, and the operation that does not meet the cascade protection principle will be refused by system.
(4) daily record audit
System will write down complete System Operation Log and print log, and security audit person's these daily records of can auditing are at any time pinpointed the problems and the very first time corrects.
(5) data encryption
The core data of system is encrypted storage in database, the document that print also can be encrypted storage on server, thoroughly guarantees the security of system documentation and core data.

Claims (8)

1. realize based on virtual printing technology, smart card read-write card facilities and administration infosystem for one kind; Meet China's classified information system specifications and national secret relevant regulations; Realize the print control program of military project concerning security matters unit printing behavior record, audit, control, audit, it is characterized in that
Said virtual printing technology; Be included in the virtual printing installed on the operating system and drive and call this virtual printing and drive and realize that document is printed and intercept and capture and the driver and the software systems of format conversion, its be installed on the operating system be not connected with physical printer be used to the Windows printer driver intercepting and capturing print What and convert the specific format document to.
Said read-write equipment for smart card, comprise the software systems of the CR, the Com port on the PC, RJ45 port, 802.11b/g/n interface and drive ports and the CR that read individual extraordinary person's identification intelligent card data.
Said MIS, comprise realize intercepting and submit to print print What that the user submits, with user's print What be automatically converted to set form document, document is uploaded to printing server, print What is submitted to the person approving examines, driving card-reading apparatus and printer prints, three Yuans software systems to functions such as system safeguard of system management on the printing controller.
2. virtual printing technology as claimed in claim 1 is characterized in that,
Said virtual printer drives and adopts operating system aspect development technique to develop and compile;
Said virtual printer is installed on the operating system after driving compiling, exists with the form of printed driver, and can be employed software transfer and print;
Said virtual printing technology is promptly utilized the virtual printer that is installed on the operating system to drive and is printed, and can convert print What into the specific format document;
Document after said virtual printing technology will be changed carries out encryption, and the document after will encrypting is uploaded in the printing server database according to the address that configuration file indicated and preserves;
Said virtual printing technology is to eject dialog box to let the user fill in necessary type information (for example document content, document whereabouts, document security level, printing type, printing type, printing umber, selection person approving etc.) in printing;
The printing intercepting and capturing and the format conversion of multiple format file of said virtual printing technical support and multiple application software (comprising OFFICE document, PDF document, TXT document, picture, webpage, conventional design software, financial software, form software etc.).
3. read-write equipment for smart card as claimed in claim 1 is characterized in that:
Said smart card can write down the information of certain storage space in smart card, essential record is printed user's identity information in this claim, and system can the Card Reader user carry out authentication and mandate behind the CR Card Reader;
Said smart card comprises that type of card (ID card, Ultra light card, MifareOne card, AT88RF020 card, SR176 card, CPU card, ISO14443-4 card, ISO15693 card, SAM card, China second-generation identity card etc.) this method of multiple form can utilize the card that includes but not limited to the above-mentioned type kind authenticating identity in printing control:
Said smart card reader comprises read-write above-mentioned common type smart card and through the smart card read-write hardware device that the Com port on the PC, RJ45 port, 802.11b/g/n interface and driver and software portfolio communicate, can read and write the data in the smart card.
4. MIS as claimed in claim 1 is characterized in that:
Said management information decorum parcel is printed the client software that the client submits printing to; System manager, safe and secret member, security audit person carry out the management end software that system management is safeguarded; Be installed in to print and drive the printing end software of printing behind printer and the card-reading apparatus realization Card Reader on the controller; Be installed in be used on the server support system operation and with the Web.Service of client communication, be installed in the software systems such as database series on the server.Software systems with can only block equipment such as card reader/writer, printer, COM1 or port and communicate, carry out data transfer with database, realize the uploading of data, download, function such as printing.
5. client software as claimed in claim 4 is characterized in that:
Said client software is to drive the software systems that print job is submitted in integrated being used to virtual printing.Comprise with virtual printing drive communicate by letter and obtain conversion afterwards the specific format document printing application program, application program that the user fills in type information, with document printing encrypted applications program, with type information with document printing uploads onto the server and the application program of database; Client software is installed on the PC that submits the terminal user who prints to.
6. management end software as claimed in claim 4 is characterized in that:
Said management end software is included as the application program that the system manager provides Back ground Information management such as organization management, personal information management, Role Information management, the binding of personnel's MAC Address; Being included as safe and secret member provides the management of personnel's level of confidentiality, personnel's Role Management, the said Permission Levels management of personnel, the fabrication of personnel's smart card, personnel person approving management, personnel to examine the application program of functions such as configuration management; The application program of functions such as print log audit, the system journal that being included as the refreshing machine of safety battalion provides audited, the printing statistical information is browsed; The type information that being included as common printing user provides is browsed, the application program of functions such as print state is browsed, Card Reader printing; Be included as the application program of functions such as the one-level person approving provides type information to check, document printing is checked, examine, reject, select the secondary person approving, submit the secondary audit to, information is rejected in the audit of processing secondary; Be included as the application program of functions such as the secondary person approving provides type information to check, document printing is checked, examine, reject.
7. printing end software as claimed in claim 4 is characterized in that:
Said printing end software comprises the smart card read-write card equipment that drives on the controller of printing that is installed in, relevant device port, printer and the application program that communicates with server and the operating system grade service of monitoring application program; Program provides card, authentication, obtains the document that will print, revises the printing type of physical printer and print umber, invokes application according to setting of printing and on physical printer, document printed, reads functions such as printer modes from server, and system service provides with specific OS user account identity or specific territory user account identity and serves self, moves functions such as above-mentioned printing end application program with specific OS user account identity or specific territory user account identity.
8. print control program as claimed in claim 1 is characterized in that:
This method is submitted to the client rs PC installation one of printing to overlap at each and is submitted the client software and a cover virtual printer driving of printing to; The client selects virtual printer when submitting printing to; And the filling document level of confidentiality, select the person approving, revise and print configuration, submit to then; After the submission, the person approving checks type information through the client software system that is installed on the individual PC, and type information comprises submitter, submission time, document text, document security level and relevant setting of printing, and the person approving realizes review operations at client software; After audit is passed through, print intelligence that the submitter holds the individual and snap into and be installed on the smart card reader of printing on the control PC Card Reader and accomplish and print.After printing completion, complete information and text that system log (SYSLOG) is printed.
CN2011101285921A 2011-05-18 2011-05-18 Classified printing control method based on virtual printing, intelligent card and information system Pending CN102402658A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101285921A CN102402658A (en) 2011-05-18 2011-05-18 Classified printing control method based on virtual printing, intelligent card and information system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101285921A CN102402658A (en) 2011-05-18 2011-05-18 Classified printing control method based on virtual printing, intelligent card and information system

Publications (1)

Publication Number Publication Date
CN102402658A true CN102402658A (en) 2012-04-04

Family

ID=45884856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101285921A Pending CN102402658A (en) 2011-05-18 2011-05-18 Classified printing control method based on virtual printing, intelligent card and information system

Country Status (1)

Country Link
CN (1) CN102402658A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794404A (en) * 2015-04-03 2015-07-22 深圳冀东之星科技开发有限公司 Information secure printing monitoring method with intelligent consumable material and system thereof
CN104794403A (en) * 2015-04-03 2015-07-22 深圳冀东之星科技开发有限公司 Secure information monitoring and printing method and system
CN105760767A (en) * 2016-03-04 2016-07-13 东信和平科技股份有限公司 File tracking and safety management method and file tracking and safety management system
CN109034292A (en) * 2018-06-14 2018-12-18 中捷通信有限公司 Card production system is write in a kind of automation
CN109547656A (en) * 2017-09-21 2019-03-29 珠海奔图电子有限公司 Image forming apparatus, safety auditing system, image formation system and method
CN110363016A (en) * 2019-07-15 2019-10-22 宜春宜联打印设备有限公司 A kind of printing encryption method and device, Method of printing and printing device
CN110414924A (en) * 2019-07-02 2019-11-05 大唐淮北发电厂 A kind of intelligent and safe production monitoring card generation system and method
CN111046353A (en) * 2018-10-15 2020-04-21 珠海格力电器股份有限公司 System and method for monitoring document printing authority
CN113791748A (en) * 2021-09-22 2021-12-14 北京鼎普科技股份有限公司 Printing process management and control method, system and storage medium
CN114519360A (en) * 2022-01-29 2022-05-20 金蝶软件(中国)有限公司 Data reading and writing method, login method and device of business system and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479218A (en) * 2002-03-07 2004-03-03 ������������ʽ���� Generation method and equipment of local management example of network printer
CN1556465A (en) * 2003-12-30 2004-12-22 珠海金山软件股份有限公司 Printing control/ system and printing control method
CN101458614A (en) * 2007-12-14 2009-06-17 元镁科技股份有限公司 Output monitoring system, method and computer readable medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1479218A (en) * 2002-03-07 2004-03-03 ������������ʽ���� Generation method and equipment of local management example of network printer
CN1556465A (en) * 2003-12-30 2004-12-22 珠海金山软件股份有限公司 Printing control/ system and printing control method
CN101458614A (en) * 2007-12-14 2009-06-17 元镁科技股份有限公司 Output monitoring system, method and computer readable medium

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794404A (en) * 2015-04-03 2015-07-22 深圳冀东之星科技开发有限公司 Information secure printing monitoring method with intelligent consumable material and system thereof
CN104794403A (en) * 2015-04-03 2015-07-22 深圳冀东之星科技开发有限公司 Secure information monitoring and printing method and system
CN105760767A (en) * 2016-03-04 2016-07-13 东信和平科技股份有限公司 File tracking and safety management method and file tracking and safety management system
CN105760767B (en) * 2016-03-04 2018-12-04 东信和平科技股份有限公司 A kind of method and system of file tracking and safety management
CN109547656B (en) * 2017-09-21 2020-06-12 珠海奔图电子有限公司 Image forming apparatus, security audit system, image forming system and method
CN109547656A (en) * 2017-09-21 2019-03-29 珠海奔图电子有限公司 Image forming apparatus, safety auditing system, image formation system and method
CN109034292B (en) * 2018-06-14 2019-07-23 中捷通信有限公司 Card production system is write in a kind of automation
CN109034292A (en) * 2018-06-14 2018-12-18 中捷通信有限公司 Card production system is write in a kind of automation
CN111046353A (en) * 2018-10-15 2020-04-21 珠海格力电器股份有限公司 System and method for monitoring document printing authority
CN110414924A (en) * 2019-07-02 2019-11-05 大唐淮北发电厂 A kind of intelligent and safe production monitoring card generation system and method
CN110363016A (en) * 2019-07-15 2019-10-22 宜春宜联打印设备有限公司 A kind of printing encryption method and device, Method of printing and printing device
CN113791748A (en) * 2021-09-22 2021-12-14 北京鼎普科技股份有限公司 Printing process management and control method, system and storage medium
CN114519360A (en) * 2022-01-29 2022-05-20 金蝶软件(中国)有限公司 Data reading and writing method, login method and device of business system and computer equipment
CN114519360B (en) * 2022-01-29 2024-03-08 金蝶软件(中国)有限公司 Data read-write method, login method and device of service system and computer equipment

Similar Documents

Publication Publication Date Title
CN102402658A (en) Classified printing control method based on virtual printing, intelligent card and information system
EP3574449B1 (en) Structured text and pattern matching for data loss prevention in object-specific image domain
CN103507450A (en) Method and system for managing seal
CN104579626B (en) A kind of electronic document output management and control system and method based on one-way transmission
CN101425894A (en) Service implementing system and method
CN100397814C (en) Uniform identication method and system based on network
CN101101677A (en) Door guard electronic information automatic register management apparatus and system
CN102609750A (en) Intelligent card provided with input device and output device
CN201237813Y (en) Portable bank teller system
CN104616219A (en) Intelligent ticket service member management method and system
KR101607622B1 (en) Print management server for security of mobile printing environment and control method thereof
CN103761596A (en) Information voucher system and related operation method thereof
CN101317190A (en) System and method for requesting and issuing an authorization document
CN202736110U (en) Stamp management system
US20100223576A1 (en) Electronic data classification system
CN205318553U (en) Data processing device and system and printer
JP2006155535A (en) Personal information search program, personal information management system and personal information management function-equipped information processor
CN101546399A (en) Voucher data management system and method for controlling voucher data management system
CN113064562A (en) Man-machine interaction printing method and system based on block chain
EP3352994B1 (en) Remote mark printing on a security document
JP4082520B2 (en) Personal information search program
CN103839556A (en) Secret-involved burning control method based on burning all-in-one machine, intelligent card and two-dimension code
JP6871296B2 (en) Mediation server, program, and information processing method
CN107396363A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
KR102001070B1 (en) Method for posting up security-enhanced account service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Beijing Blue Wave Jinzhao Technology Co., Ltd.

Document name: Notification that Application Deemed to be Withdrawn

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120404