CN103152384A - Printer security control design method based on KEY - Google Patents
Printer security control design method based on KEY Download PDFInfo
- Publication number
- CN103152384A CN103152384A CN2013100301150A CN201310030115A CN103152384A CN 103152384 A CN103152384 A CN 103152384A CN 2013100301150 A CN2013100301150 A CN 2013100301150A CN 201310030115 A CN201310030115 A CN 201310030115A CN 103152384 A CN103152384 A CN 103152384A
- Authority
- CN
- China
- Prior art keywords
- key
- printer
- printing
- information
- safety verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
A printer security control design method based on KEY takes KEY hardware as a carrier to achieve a function of burning embedded log-on information, password verification information, a safety verification procedure and the like on the KEY disc hardware. The printer security control design method based on the KEY includes: actively detecting all printing events of a printer, recording information such as KEY numbers, login names, printed file names, printing time, printer identification (ID) and manes and the like of the printing events of the printer, limiting the printing events which are not inserted with the safety verification KEY, not permitting to print, and recording actions of the printing events, permitting a user who inserts the safety verification KEY to print, recording insertion time, address and log-on information of the safety verification KEY, and completing printing event password verification by coordinating with the safety verification KEY. According to the printer security control design method based on the KEY, printing information records are effectively picked, all external printing requests are cut off, powerful source evidence and afterwards retrace are provided for safety of paper files spread in a company. The printer security control design method based on the KEY is suitable for security control of printing equipment with various types.
Description
technical field
The present invention relates to a kind of printer security control method for designing based on KEY, belong to the computer peripheral equipment field of information security technology.
background technology
Along with informationization technology constantly applies in electrical production, operation, management, printer has become the indispensable necessary article of office.The printer of applying in state net company system at present is varied, existing unit printer, also has in network for many people's the network printer, has also had the all-in-one of the functions such as printing, duplicating, scanning integrated.
In recent years, divulging a secret that illegal printing causes becomes the very important factor that information security is divulged a secret.Since State Grid Corporation of China carries out information security technology supervise and examine work, the use of printer is just paid much attention to, but situation is very pessimistic.In-company computer does not possess special printer rights of using control system, as long as obtained the right to use of computer, just equals to have had the right to use of printer.In the system of carrying out in July, 2011 in the special supervise and examine of computer weak passwurd, the toatl proportion that exists the computer of potential safety hazard to account for the sampling observation computer is up to 87.23%, and the fragility of computer operation authority also just means that the possibility that illegal printing behavior occurs is larger.In addition, computed bad habit, as leave computer and non-locking computer etc., also can increase the possibility that illegal printing behavior occurs, and carry out in this case reviewing of the information leakage behavior difficulty and complicated that can become.
Giving away secrets of printer compared with common information security events, has the advantages that difficulty is reviewed.Printing the enterprises data by printer, cause information-leakage, is more difficult owing to lacking necessary technological means, trace back to the owner.
summary of the invention
The objective of the invention is, for the situation of divulging a secret that illegal printing causes at present, the present invention discloses a kind of printer security control method for designing based on KEY.
Technical scheme of the present invention is that the printer security control method for designing that the present invention is based on KEY mainly contains:
1, employing B/S(browser/server) technology realizes the management and displaying directly perceived of printer safe handling information.
Print the management of authority for each employee of information Intranet, only have authorized employee could use printer to print; The right assignment of safe KEY tools is used in realization to printer, make the producer possess the making authority of the safe KEY of printer; Record, the inquiry of realization to the daily record of printing safe KEY and making, for following the tracks of the making situation of the safe KEY of all printings.
2, employing C/S(client/server) a set of printer of mode development uses safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY.
3, all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title.The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior.The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event.
4, take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs.Realize the scrambled record of embedded log-on message; Realize the scrambled record of embedded cryptography authorization information; Realize the establishment of embedded-type security proving program.
The hardware module structure that realization the present invention is based on the printer security control method for designing of KEY comprises:
1, printer uses safe KEY tools subsystem
Adopt C/S model to develop a set of printer and use safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY.
Safe KEY tools subsystem can be operated in any microcomputer with USB (USB) interface.It provides reliability, simplicity and the fail safe of all USB Key cipher tokens, realization is embedded in USB Key dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, make USB Key be registered as printer safe handling KEY, avoided the complexity of read-write equipment to install and expensive expense simultaneously.
2, printer uses the resident Monitor And Control Subsystem of client
Adopt C/S model to develop a set of printer and use the resident monitoring program of desktop client end, this program possesses the auto-update installation function, the all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title.The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior.
The message processing facility of WINDOW for can be in application the variety of event message of supervisory control system, the function that articulates various anti-letter of transfer numbers (HOOK) is provided.Printer uses the resident Monitor And Control Subsystem of client's desktop based on the similar expansion drives interrupts of hook function (HOOK) formula, can articulate one of a plurality of anti-letter of transfer numbers formation on hook and articulate functional-link.The resident Monitor And Control Subsystem of client's desktop is paid close attention to the various message that system produces, and to the user, uses the request of printer and operation are monitored, revise and control, and by the associative operation Log Sender to server.
Monitor And Control Subsystem is limited the printing event of not inserting safety verification KEY, does not allow to print, and records its behavior.The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event.
3, KEY type printer uses safety verification merge module subsystem
Take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs.Realize the scrambled record of embedded log-on message, the scrambled record of embedded cryptography authorization information.
Safety verification merge module based on the Key technology provides a light and handy digital identity checking and the hardware solution of management.Safety verification merge module subsystem is incorporated into dual factors checking, key management and digital signature function in a little USB Key.The merge module subsystem, by the soft hardware equipment of authenticating operation, possesses safe key generation, key storage, protection and digital signature ability, for subscriber authentication and printer applications provide extremely high-caliber fail safe.
The invention has the beneficial effects as follows, the present invention is based on the printer security control method for designing of KEY, take KEY as identification basis, the client of software of take is carrier, take control of authority for basic, has perfectly realized the security control to printing.And realize that in hardware KEY control chip is integrated, fail safe and uniqueness are more secure.The final function that realizes that the mode that adopts software and hardware to combine is developed a set of printer safety control system control printing behavior, recorded the printing event, reviews the source of divulging a secret
.really for the user, provide a flexible convenient and office print platform that security performance is high.Thereby not only can reflect comprehensively and print dynamically, effectively extract the type information record, break off all external printing requests, and the paper document spread is provided safely strong source evidence and reviews afterwards.
The present invention is applicable to the security control of various types of printing device.
the accompanying drawing explanation
Fig. 1 is the printer security control design software modular structure figure based on KEY;
Fig. 2 is the printer security control design hardware module structure chart based on KEY.
Embodiment
The printer security control method for designing embodiment that the present invention is based on KEY be take KEY as the identification basis, the client of software of take is carrier, realize that in hardware KEY control chip is integrated, realize the function that the mode that adopts software and hardware to combine is developed a set of printer safety control system control printing behavior, recorded the printing event, reviews the source of divulging a secret.
The embodiment of the present invention relies on following hardware system to realize the printer security control:
1. printer uses safe KEY tools subsystem
Adopt C/S model to develop a set of printer and use safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY.
Safe KEY tools subsystem can be operated in any microcomputer with USB (USB) interface.It provides reliability, simplicity and the fail safe of all USB Key cipher tokens, realization is embedded in USB Key dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, make USB Key be registered as printer safe handling KEY, avoided the complexity of read-write equipment to install and expensive expense simultaneously.
2. printer uses the resident Monitor And Control Subsystem of client
Adopt C/S model to develop a set of printer and use the resident monitoring program of desktop client end, this program possesses the auto-update installation function, the all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title.The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior.
The message processing facility of WINDOW for can be in application the variety of event message of supervisory control system, the function that articulates various anti-letter of transfer numbers (HOOK) is provided.Printer uses the resident Monitor And Control Subsystem of client's desktop based on the similar expansion drives interrupts of hook function (HOOK) formula, can articulate one of a plurality of anti-letter of transfer numbers formation on hook and articulate functional-link.The resident Monitor And Control Subsystem of client's desktop is paid close attention to the various message that system produces, and to the user, uses the request of printer and operation are monitored, revise and control, and by the associative operation Log Sender to server.
Monitor And Control Subsystem is limited the printing event of not inserting safety verification KEY, does not allow to print, and records its behavior.The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event.
3.KEY the type printer uses safety verification merge module subsystem
Take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs.Realize the scrambled record of embedded log-on message, the scrambled record of embedded cryptography authorization information.
Embodiment of the present invention hardware is realized the printer security control by following software module structure:
1. print right management
Print the management of authority for each employee of information Intranet, only have authorized employee could use printer to print, based on hardware USB Key, the user is carried out to authentication, print the management of authority for each user, only have authorized user could use printer to print.USB Key authentication management system not only can realize the high security authentication to the user, and has reduced the requirement to end user environment.After login Windows, if do not inserted USB Key, by authentication, can't use printer, make the user who only has the legal USB of holding Key normally to use printer, protection information safety, offer convenience to operation department.
Realize printing personnel information management, realize that the printing personnel license the management that certain (several) platform is printed.
The right assignment of safe KEY tools is used in realization to printer, make the producer possess the making authority of the safe KEY of printer.
2. print safe KEY and make daily record
Record, the inquiry of realization to the daily record of printing safe KEY and making, for following the tracks of the making situation of the safe KEY of all printings, mainly comprise KEYID, and KEY holder, safe KEY make information inquiry and the statistics such as date, safe KEY producer.
3. printer uses audit strategy
To registrant's printer, use historical strategy of being audited to distribute, as whether started the strategies such as audit, public audit or privately owned audit.
4. printer uses Audit data
Adopt the access behavior of log recording authorized user, be convenient to review, realize the printing behavior by various conditions (as user, printer etc.) inquiry authorized user.
5. printer management
The unified management of realization to relevant Printer Information, realize unified name and unique identification to printer, realizes the uniform authorization to printer, only has the printer through authorizing just to allow to print.
Claims (2)
1. the printer security control method for designing based on KEY, is characterized in that, described method is:
(1) print the management of authority for each employee of information Intranet, only have authorized employee could use printer to print; The right assignment of safe KEY tools is used in realization to printer, make the producer possess the making authority of the safe KEY of printer; Record, the inquiry of realization to the daily record of printing safe KEY and making, for following the tracks of the making situation of the safe KEY of all printings;
(2) adopt C/S model to develop a set of printer and use safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY;
(3) all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title; The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior; The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event;
(4) take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs; Realize the scrambled record of embedded log-on message; Realize the scrambled record of embedded cryptography authorization information; Realize the establishment of embedded-type security proving program.
2. a kind of printer security control method for designing based on KEY according to claim 1, is characterized in that, described method realizes the printer security control by following hardware system:
(1) printer uses safe KEY tools subsystem;
(2) printer uses the resident Monitor And Control Subsystem of client;
(3) KEY type printer uses safety verification merge module subsystem.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100301150A CN103152384A (en) | 2013-01-28 | 2013-01-28 | Printer security control design method based on KEY |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100301150A CN103152384A (en) | 2013-01-28 | 2013-01-28 | Printer security control design method based on KEY |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103152384A true CN103152384A (en) | 2013-06-12 |
Family
ID=48550243
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013100301150A Pending CN103152384A (en) | 2013-01-28 | 2013-01-28 | Printer security control design method based on KEY |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103152384A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110290015A (en) * | 2019-07-24 | 2019-09-27 | 无锡华云数据技术服务有限公司 | Remote deployment method, apparatus and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101068144A (en) * | 2007-03-26 | 2007-11-07 | 任少华 | Group user information communication unified identity certification management system |
US20080170261A1 (en) * | 2007-01-17 | 2008-07-17 | Brother Kogyo Kabushiki Kaisha | Printer, communication system and printing method |
CN101277187A (en) * | 2007-03-26 | 2008-10-01 | 任少华 | Management platform for bloc user information communication united identification authentication |
CN101763594A (en) * | 2009-12-30 | 2010-06-30 | 重庆大学 | Network-based method for supervising special-control products |
CN201681271U (en) * | 2010-03-24 | 2010-12-22 | 北京立思辰新技术有限公司 | Duplicator safety control terminal |
CN102541482A (en) * | 2010-12-27 | 2012-07-04 | 北大方正集团有限公司 | Method and system for document printing control and document tracing |
-
2013
- 2013-01-28 CN CN2013100301150A patent/CN103152384A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080170261A1 (en) * | 2007-01-17 | 2008-07-17 | Brother Kogyo Kabushiki Kaisha | Printer, communication system and printing method |
CN101068144A (en) * | 2007-03-26 | 2007-11-07 | 任少华 | Group user information communication unified identity certification management system |
CN101277187A (en) * | 2007-03-26 | 2008-10-01 | 任少华 | Management platform for bloc user information communication united identification authentication |
CN101763594A (en) * | 2009-12-30 | 2010-06-30 | 重庆大学 | Network-based method for supervising special-control products |
CN201681271U (en) * | 2010-03-24 | 2010-12-22 | 北京立思辰新技术有限公司 | Duplicator safety control terminal |
CN102541482A (en) * | 2010-12-27 | 2012-07-04 | 北大方正集团有限公司 | Method and system for document printing control and document tracing |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110290015A (en) * | 2019-07-24 | 2019-09-27 | 无锡华云数据技术服务有限公司 | Remote deployment method, apparatus and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107947922B (en) | Digital file management method and system based on block chain technology | |
CN101311950B (en) | Electronic stamp realization method and device | |
CN101512540B (en) | Information processing apparatus and information management method | |
US8239682B2 (en) | Method and system for digital rights management of documents | |
CN110957025A (en) | Medical health information safety management system | |
CN103632080A (en) | Mobile data application safety protection system and mobile data application safety protection method based on USBKey | |
CN100495421C (en) | Authentication protection method based on USB device | |
CN102724044A (en) | Electronic evidence verification and preservation method | |
CN101848207A (en) | Information-leakage prevention system based on integrated control management | |
CN101000648B (en) | Automatic encipher system and method for file | |
CN102567233A (en) | Data protection method of USB storage device based on magnetic disc virtual technology | |
CN102790770B (en) | Electronic document concentrated preservation and takeout safety management system and method | |
CN106533693A (en) | Access method and device of railway vehicle monitoring and maintenance system | |
JP2021166028A (en) | NFT access restriction system and NFT access restriction program | |
CN109960917A (en) | A kind of time slot scrambling and device of document | |
CN105989482A (en) | Data encryption method | |
CN103152384A (en) | Printer security control design method based on KEY | |
CN105205405A (en) | Novel electronic file safe management system | |
CN114240349A (en) | Ecological environment supervision method and system based on block chain | |
CN100525176C (en) | Preventing system for information leakage under cooperative work environment and its realizing method | |
CN106650492A (en) | Multi-device file protection method and device based on security catalog | |
CN112328687A (en) | Data storage method and system based on block chain | |
CN1906558A (en) | Authorization code recovering method | |
TWM583096U (en) | Blockchain certificate and asset verification system | |
US20120005231A1 (en) | Document and Potential Evidence Management with Smart Devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130612 |