CN103152384A - Printer security control design method based on KEY - Google Patents

Printer security control design method based on KEY Download PDF

Info

Publication number
CN103152384A
CN103152384A CN2013100301150A CN201310030115A CN103152384A CN 103152384 A CN103152384 A CN 103152384A CN 2013100301150 A CN2013100301150 A CN 2013100301150A CN 201310030115 A CN201310030115 A CN 201310030115A CN 103152384 A CN103152384 A CN 103152384A
Authority
CN
China
Prior art keywords
key
printer
printing
information
safety verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100301150A
Other languages
Chinese (zh)
Inventor
陈俊华
杨浩玲
章玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Jiangxi Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Jiangxi Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Electric Power Research Institute of State Grid Jiangxi Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN2013100301150A priority Critical patent/CN103152384A/en
Publication of CN103152384A publication Critical patent/CN103152384A/en
Pending legal-status Critical Current

Links

Images

Abstract

A printer security control design method based on KEY takes KEY hardware as a carrier to achieve a function of burning embedded log-on information, password verification information, a safety verification procedure and the like on the KEY disc hardware. The printer security control design method based on the KEY includes: actively detecting all printing events of a printer, recording information such as KEY numbers, login names, printed file names, printing time, printer identification (ID) and manes and the like of the printing events of the printer, limiting the printing events which are not inserted with the safety verification KEY, not permitting to print, and recording actions of the printing events, permitting a user who inserts the safety verification KEY to print, recording insertion time, address and log-on information of the safety verification KEY, and completing printing event password verification by coordinating with the safety verification KEY. According to the printer security control design method based on the KEY, printing information records are effectively picked, all external printing requests are cut off, powerful source evidence and afterwards retrace are provided for safety of paper files spread in a company. The printer security control design method based on the KEY is suitable for security control of printing equipment with various types.

Description

Printer security control method for designing based on KEY
 
technical field
The present invention relates to a kind of printer security control method for designing based on KEY, belong to the computer peripheral equipment field of information security technology.
background technology
Along with informationization technology constantly applies in electrical production, operation, management, printer has become the indispensable necessary article of office.The printer of applying in state net company system at present is varied, existing unit printer, also has in network for many people's the network printer, has also had the all-in-one of the functions such as printing, duplicating, scanning integrated.
In recent years, divulging a secret that illegal printing causes becomes the very important factor that information security is divulged a secret.Since State Grid Corporation of China carries out information security technology supervise and examine work, the use of printer is just paid much attention to, but situation is very pessimistic.In-company computer does not possess special printer rights of using control system, as long as obtained the right to use of computer, just equals to have had the right to use of printer.In the system of carrying out in July, 2011 in the special supervise and examine of computer weak passwurd, the toatl proportion that exists the computer of potential safety hazard to account for the sampling observation computer is up to 87.23%, and the fragility of computer operation authority also just means that the possibility that illegal printing behavior occurs is larger.In addition, computed bad habit, as leave computer and non-locking computer etc., also can increase the possibility that illegal printing behavior occurs, and carry out in this case reviewing of the information leakage behavior difficulty and complicated that can become.
Giving away secrets of printer compared with common information security events, has the advantages that difficulty is reviewed.Printing the enterprises data by printer, cause information-leakage, is more difficult owing to lacking necessary technological means, trace back to the owner.
 
summary of the invention
The objective of the invention is, for the situation of divulging a secret that illegal printing causes at present, the present invention discloses a kind of printer security control method for designing based on KEY.
Technical scheme of the present invention is that the printer security control method for designing that the present invention is based on KEY mainly contains:
1, employing B/S(browser/server) technology realizes the management and displaying directly perceived of printer safe handling information.
Print the management of authority for each employee of information Intranet, only have authorized employee could use printer to print; The right assignment of safe KEY tools is used in realization to printer, make the producer possess the making authority of the safe KEY of printer; Record, the inquiry of realization to the daily record of printing safe KEY and making, for following the tracks of the making situation of the safe KEY of all printings.
2, employing C/S(client/server) a set of printer of mode development uses safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY.
3, all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title.The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior.The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event.
4, take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs.Realize the scrambled record of embedded log-on message; Realize the scrambled record of embedded cryptography authorization information; Realize the establishment of embedded-type security proving program.
The hardware module structure that realization the present invention is based on the printer security control method for designing of KEY comprises:
1, printer uses safe KEY tools subsystem
Adopt C/S model to develop a set of printer and use safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY.
Safe KEY tools subsystem can be operated in any microcomputer with USB (USB) interface.It provides reliability, simplicity and the fail safe of all USB Key cipher tokens, realization is embedded in USB Key dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, make USB Key be registered as printer safe handling KEY, avoided the complexity of read-write equipment to install and expensive expense simultaneously.
2, printer uses the resident Monitor And Control Subsystem of client
Adopt C/S model to develop a set of printer and use the resident monitoring program of desktop client end, this program possesses the auto-update installation function, the all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title.The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior.
The message processing facility of WINDOW for can be in application the variety of event message of supervisory control system, the function that articulates various anti-letter of transfer numbers (HOOK) is provided.Printer uses the resident Monitor And Control Subsystem of client's desktop based on the similar expansion drives interrupts of hook function (HOOK) formula, can articulate one of a plurality of anti-letter of transfer numbers formation on hook and articulate functional-link.The resident Monitor And Control Subsystem of client's desktop is paid close attention to the various message that system produces, and to the user, uses the request of printer and operation are monitored, revise and control, and by the associative operation Log Sender to server.
Monitor And Control Subsystem is limited the printing event of not inserting safety verification KEY, does not allow to print, and records its behavior.The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event.
3, KEY type printer uses safety verification merge module subsystem
Take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs.Realize the scrambled record of embedded log-on message, the scrambled record of embedded cryptography authorization information.
Safety verification merge module based on the Key technology provides a light and handy digital identity checking and the hardware solution of management.Safety verification merge module subsystem is incorporated into dual factors checking, key management and digital signature function in a little USB Key.The merge module subsystem, by the soft hardware equipment of authenticating operation, possesses safe key generation, key storage, protection and digital signature ability, for subscriber authentication and printer applications provide extremely high-caliber fail safe.
The invention has the beneficial effects as follows, the present invention is based on the printer security control method for designing of KEY, take KEY as identification basis, the client of software of take is carrier, take control of authority for basic, has perfectly realized the security control to printing.And realize that in hardware KEY control chip is integrated, fail safe and uniqueness are more secure.The final function that realizes that the mode that adopts software and hardware to combine is developed a set of printer safety control system control printing behavior, recorded the printing event, reviews the source of divulging a secret .really for the user, provide a flexible convenient and office print platform that security performance is high.Thereby not only can reflect comprehensively and print dynamically, effectively extract the type information record, break off all external printing requests, and the paper document spread is provided safely strong source evidence and reviews afterwards.
The present invention is applicable to the security control of various types of printing device.
the accompanying drawing explanation
Fig. 1 is the printer security control design software modular structure figure based on KEY;
Fig. 2 is the printer security control design hardware module structure chart based on KEY.
Embodiment
The printer security control method for designing embodiment that the present invention is based on KEY be take KEY as the identification basis, the client of software of take is carrier, realize that in hardware KEY control chip is integrated, realize the function that the mode that adopts software and hardware to combine is developed a set of printer safety control system control printing behavior, recorded the printing event, reviews the source of divulging a secret.
The embodiment of the present invention relies on following hardware system to realize the printer security control:
1. printer uses safe KEY tools subsystem
Adopt C/S model to develop a set of printer and use safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY.
Safe KEY tools subsystem can be operated in any microcomputer with USB (USB) interface.It provides reliability, simplicity and the fail safe of all USB Key cipher tokens, realization is embedded in USB Key dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, make USB Key be registered as printer safe handling KEY, avoided the complexity of read-write equipment to install and expensive expense simultaneously.
2. printer uses the resident Monitor And Control Subsystem of client
Adopt C/S model to develop a set of printer and use the resident monitoring program of desktop client end, this program possesses the auto-update installation function, the all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title.The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior.
The message processing facility of WINDOW for can be in application the variety of event message of supervisory control system, the function that articulates various anti-letter of transfer numbers (HOOK) is provided.Printer uses the resident Monitor And Control Subsystem of client's desktop based on the similar expansion drives interrupts of hook function (HOOK) formula, can articulate one of a plurality of anti-letter of transfer numbers formation on hook and articulate functional-link.The resident Monitor And Control Subsystem of client's desktop is paid close attention to the various message that system produces, and to the user, uses the request of printer and operation are monitored, revise and control, and by the associative operation Log Sender to server.
Monitor And Control Subsystem is limited the printing event of not inserting safety verification KEY, does not allow to print, and records its behavior.The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event.
3.KEY the type printer uses safety verification merge module subsystem
Take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs.Realize the scrambled record of embedded log-on message, the scrambled record of embedded cryptography authorization information.
Embodiment of the present invention hardware is realized the printer security control by following software module structure:
1. print right management
Print the management of authority for each employee of information Intranet, only have authorized employee could use printer to print, based on hardware USB Key, the user is carried out to authentication, print the management of authority for each user, only have authorized user could use printer to print.USB Key authentication management system not only can realize the high security authentication to the user, and has reduced the requirement to end user environment.After login Windows, if do not inserted USB Key, by authentication, can't use printer, make the user who only has the legal USB of holding Key normally to use printer, protection information safety, offer convenience to operation department.
Realize printing personnel information management, realize that the printing personnel license the management that certain (several) platform is printed.
The right assignment of safe KEY tools is used in realization to printer, make the producer possess the making authority of the safe KEY of printer.
2. print safe KEY and make daily record
Record, the inquiry of realization to the daily record of printing safe KEY and making, for following the tracks of the making situation of the safe KEY of all printings, mainly comprise KEYID, and KEY holder, safe KEY make information inquiry and the statistics such as date, safe KEY producer.
3. printer uses audit strategy
To registrant's printer, use historical strategy of being audited to distribute, as whether started the strategies such as audit, public audit or privately owned audit.
4. printer uses Audit data
Adopt the access behavior of log recording authorized user, be convenient to review, realize the printing behavior by various conditions (as user, printer etc.) inquiry authorized user.
5. printer management
The unified management of realization to relevant Printer Information, realize unified name and unique identification to printer, realizes the uniform authorization to printer, only has the printer through authorizing just to allow to print.

Claims (2)

1. the printer security control method for designing based on KEY, is characterized in that, described method is:
(1) print the management of authority for each employee of information Intranet, only have authorized employee could use printer to print; The right assignment of safe KEY tools is used in realization to printer, make the producer possess the making authority of the safe KEY of printer; Record, the inquiry of realization to the daily record of printing safe KEY and making, for following the tracks of the making situation of the safe KEY of all printings;
(2) adopt C/S model to develop a set of printer and use safe KEY tools program, realization is embedded in the KEY dish by user's registration information, safety verification information, safety verification client desktop TSR in the information of one, makes the KEY dish be registered as printer safe handling KEY;
(3) all printing events of active probe the machine, record the machine and print the information such as No. KEY of event, login name, mimeograph documents title, time-write interval, printer ID and title; The printing event of not inserting safety verification KEY is limited, do not allow to print, and record its behavior; The user who inserts safety verification KEY is allowed to print, and time, address and the log-on message of record security checking KEY insertion, coordinate safety verification KEY to complete the password authentification of printing event;
(4) take KEY hardware as carrier, realize the function on KEY dish hardware by burnings such as embedded log-on message, password authentification information, safety verification programs; Realize the scrambled record of embedded log-on message; Realize the scrambled record of embedded cryptography authorization information; Realize the establishment of embedded-type security proving program.
2. a kind of printer security control method for designing based on KEY according to claim 1, is characterized in that, described method realizes the printer security control by following hardware system:
(1) printer uses safe KEY tools subsystem;
(2) printer uses the resident Monitor And Control Subsystem of client;
(3) KEY type printer uses safety verification merge module subsystem.
CN2013100301150A 2013-01-28 2013-01-28 Printer security control design method based on KEY Pending CN103152384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100301150A CN103152384A (en) 2013-01-28 2013-01-28 Printer security control design method based on KEY

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100301150A CN103152384A (en) 2013-01-28 2013-01-28 Printer security control design method based on KEY

Publications (1)

Publication Number Publication Date
CN103152384A true CN103152384A (en) 2013-06-12

Family

ID=48550243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100301150A Pending CN103152384A (en) 2013-01-28 2013-01-28 Printer security control design method based on KEY

Country Status (1)

Country Link
CN (1) CN103152384A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290015A (en) * 2019-07-24 2019-09-27 无锡华云数据技术服务有限公司 Remote deployment method, apparatus and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068144A (en) * 2007-03-26 2007-11-07 任少华 Group user information communication unified identity certification management system
US20080170261A1 (en) * 2007-01-17 2008-07-17 Brother Kogyo Kabushiki Kaisha Printer, communication system and printing method
CN101277187A (en) * 2007-03-26 2008-10-01 任少华 Management platform for bloc user information communication united identification authentication
CN101763594A (en) * 2009-12-30 2010-06-30 重庆大学 Network-based method for supervising special-control products
CN201681271U (en) * 2010-03-24 2010-12-22 北京立思辰新技术有限公司 Duplicator safety control terminal
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080170261A1 (en) * 2007-01-17 2008-07-17 Brother Kogyo Kabushiki Kaisha Printer, communication system and printing method
CN101068144A (en) * 2007-03-26 2007-11-07 任少华 Group user information communication unified identity certification management system
CN101277187A (en) * 2007-03-26 2008-10-01 任少华 Management platform for bloc user information communication united identification authentication
CN101763594A (en) * 2009-12-30 2010-06-30 重庆大学 Network-based method for supervising special-control products
CN201681271U (en) * 2010-03-24 2010-12-22 北京立思辰新技术有限公司 Duplicator safety control terminal
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290015A (en) * 2019-07-24 2019-09-27 无锡华云数据技术服务有限公司 Remote deployment method, apparatus and storage medium

Similar Documents

Publication Publication Date Title
CN107947922B (en) Digital file management method and system based on block chain technology
CN101311950B (en) Electronic stamp realization method and device
CN101512540B (en) Information processing apparatus and information management method
US8239682B2 (en) Method and system for digital rights management of documents
CN110957025A (en) Medical health information safety management system
CN103632080A (en) Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN100495421C (en) Authentication protection method based on USB device
CN102724044A (en) Electronic evidence verification and preservation method
CN101848207A (en) Information-leakage prevention system based on integrated control management
CN101000648B (en) Automatic encipher system and method for file
CN102567233A (en) Data protection method of USB storage device based on magnetic disc virtual technology
CN102790770B (en) Electronic document concentrated preservation and takeout safety management system and method
CN106533693A (en) Access method and device of railway vehicle monitoring and maintenance system
JP2021166028A (en) NFT access restriction system and NFT access restriction program
CN109960917A (en) A kind of time slot scrambling and device of document
CN105989482A (en) Data encryption method
CN103152384A (en) Printer security control design method based on KEY
CN105205405A (en) Novel electronic file safe management system
CN114240349A (en) Ecological environment supervision method and system based on block chain
CN100525176C (en) Preventing system for information leakage under cooperative work environment and its realizing method
CN106650492A (en) Multi-device file protection method and device based on security catalog
CN112328687A (en) Data storage method and system based on block chain
CN1906558A (en) Authorization code recovering method
TWM583096U (en) Blockchain certificate and asset verification system
US20120005231A1 (en) Document and Potential Evidence Management with Smart Devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130612