CN112783452A - Image forming apparatus, image forming method, and image forming system - Google Patents

Image forming apparatus, image forming method, and image forming system Download PDF

Info

Publication number
CN112783452A
CN112783452A CN202110101318.9A CN202110101318A CN112783452A CN 112783452 A CN112783452 A CN 112783452A CN 202110101318 A CN202110101318 A CN 202110101318A CN 112783452 A CN112783452 A CN 112783452A
Authority
CN
China
Prior art keywords
image forming
security level
printed
file
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110101318.9A
Other languages
Chinese (zh)
Inventor
余成柱
李海雄
丁大军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Pantum Electronics Co Ltd
Original Assignee
Zhuhai Pantum Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Pantum Electronics Co Ltd filed Critical Zhuhai Pantum Electronics Co Ltd
Priority to CN202110101318.9A priority Critical patent/CN112783452A/en
Publication of CN112783452A publication Critical patent/CN112783452A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs

Abstract

The application relates to an image forming device and method, and an image forming system, wherein the image forming device comprises a job receiving module, a data analysis module and a credible calculation monitoring module, the job receiving module receives a file to be printed sent by a printing driver, and the file to be printed is associated with a job security level; the data analysis module analyzes data in the file to be printed to obtain job security level associated with the file to be printed; the trusted computing monitoring module is used for monitoring the data analysis module and matching the corresponding image to form a security level according to the job security level associated with the file to be printed analyzed by the data analysis module; wherein the image forming security level is used to determine operation authority information of each image forming processing module of the current image forming apparatus. The image forming device, the image forming method and the image forming system can ensure the safety of operation data and data processing in the image forming device by determining the image forming security level through the verified trusted computing monitoring module.

Description

Image forming apparatus, image forming method, and image forming system
Technical Field
The present invention relates to the field of printing technologies, and in particular, to an image forming apparatus and method, and an image forming system.
Background
With the progress of electronic science and technology, the development of Image forming apparatuses (Image forming apparatuses) is more and more mature, but as a computer peripheral, the Image forming apparatuses are vulnerable to attack by lawless persons (e.g. hackers), and for example, a laser printer (one of various types of Image forming apparatuses) with scanning and/or facsimile functions, the data of scanning or facsimile may carry confidential data of a user, and even on a photosensitive drum of a core part in laser imaging, the confidential data to be printed by the user may be carried; once leaked, the data brings unnecessary trouble to users.
Therefore, it is very important to perform security control for each step from the generation of the print job to the printing of the output document using the image forming apparatus, especially for applications with high security requirements. However, the image forming control program itself and the operation process inside the image forming apparatus may be attacked by malicious programs, and in the prior art, corresponding technical guarantees are lacked for such potential safety hazards, so that the image forming apparatus has a risk of data leakage.
Disclosure of Invention
In order to solve the technical problem that the existing image forming device may have data leakage, the application provides an image forming device, an image forming method and an image forming system, which can determine the image forming security level by combining the security level of a job through a trusted computing monitoring module in the image forming device and determine the operation authority of the image forming device according to the image forming security level; therefore, the safety of the operation data in the image forming device is better ensured, and the trusted computing and monitoring module is verified through experience and is trustworthy, so that the trusted computing and monitoring module determines the image forming density level to further increase the safety of data processing of the image forming device.
The application provides an image forming apparatus, comprising:
the job receiving module is used for receiving a file to be printed issued by a printing driver, and the file to be printed is associated with job security;
the data analysis module is used for analyzing the data in the file to be printed to obtain the job security level associated with the file to be printed;
the trusted computing monitoring module is used for monitoring the data analysis module and matching the corresponding image to form a security level according to the job security level associated with the file to be printed analyzed by the data analysis module;
wherein the image forming security level is used to determine operation authority information of each image forming processing module of the current image forming apparatus.
In one embodiment, the image forming security level includes a plurality of device security levels, each device security level corresponding to a different security function, and the security functions of the image forming device increase as the device security level increases.
In one embodiment, the image forming security level includes an unlimited use level, a limited use level, and a decommissioning level.
In one embodiment, the job security level includes a print driver security level and a file security level.
The present application also provides an image forming method applied to an image forming apparatus, the method including:
receiving a file to be printed issued by a printing driver, wherein the file to be printed is associated with a job security level;
analyzing data in the file to be printed to obtain a job security level associated with the file to be printed;
matching the corresponding image to form a security level according to the security level of the operation related to the analyzed file to be printed;
wherein the image forming security level is used to determine operation authority information of each image forming processing module of the current image forming apparatus.
In one embodiment, the image forming security level includes a plurality of device security levels, each device security level corresponding to a different security function, and the security functions of the image forming device increase as the device security level increases.
In one embodiment, the image forming security level includes an unlimited use level, a limited use level, and a decommissioning level.
In one embodiment, the job security level includes a print driver security level and a file security level.
The present application also provides an image forming system including the image forming apparatus according to any one of the above embodiments.
In one embodiment, the method further comprises a print driver, and the print driver is configured to configure its print driver security level and add the print driver security level and the file security level to the job header information of the file to be printed, so that the file to be printed is associated with the job security level.
The image forming device and method and the image forming system are characterized in that a file to be printed is received from a printing driver, the file to be printed is associated with an operation security level, data in the file to be printed is analyzed, the operation security level associated with the file to be printed is obtained, a trusted computing monitoring module monitors a data analysis module, the corresponding image forming security level is matched according to the operation security level associated with the file to be printed after the data analysis module analyzes, and the image forming security level is used for determining operation authority information of each imaging processing module of the current image forming device. The trusted computing monitoring module can determine the image forming security level according to the job security level of the file to be printed, and further determines the operation authority of the image forming device according to the image forming security level, so that the job security level of the file to be printed can be safely controlled, the security of job data in the image forming device is ensured, and the trusted computing monitoring module is verified through experience and is trustworthy, so that the trusted computing monitoring module determines the image forming security level to further increase the security of data processing of the image forming device.
Drawings
For a clearer explanation of the embodiments or technical solutions of the prior art of the present application, the drawings needed for the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic structural diagram of an image forming apparatus according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an image forming system according to an embodiment of the present application;
fig. 3 is a flowchart of an image forming method according to an embodiment of the present application.
Detailed Description
To facilitate an understanding of the present application, the present application will now be described more fully with reference to the accompanying drawings. Preferred embodiments of the present application are given in the accompanying drawings. This application may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The features in the embodiments and examples described below may be combined with each other without conflict.
Referring to fig. 1, an embodiment of the invention provides an image forming apparatus 100, where the image forming apparatus 100 includes a job receiving module 10, a data analyzing module 20, and a trusted computing monitoring module 30. The job receiving module 10 receives a document to be printed issued by the print driver, and the document to be printed is associated with job security. The data analysis module 20 analyzes the data in the file to be printed to obtain the job security level associated with the file to be printed. The trusted computing monitoring module 30 is configured to monitor the data analysis module 20, and match the job security level associated with the file to be printed after being analyzed by the data analysis module 20 with the corresponding image to form a security level. Wherein the image formation security level is used to determine the operation authority information of each image forming processing module of the current image forming apparatus 100.
The job security level comprises a print driver security level and a file security level.
The print driver is installed in the terminal device. The image forming apparatus 100 may be connected to a terminal device (for example, a PC (Personal Computer)) via a wired network, a wireless network, or a USB connection. The print driver transmits the file to be printed with the job security level associated thereto to the image forming apparatus 100.
Different printing driving security levels correspond to different user identity information, and different user identity information corresponds to different user permission levels. The user identity information includes a user name and a login password.
For example: the authority of the user according to the identity information of the user can be divided into: the system comprises a common employee authority, a group leader level authority and a manager level authority, wherein the file security level of a file to be printed of an employee with the common employee authority is a common level; the file security level of the file to be printed of the employee with the group leader level authority is a first-level security level; the file security level of the employee with the manager level authority is a secondary security level, and the like.
And the printing driver acquires the equipment security level of the terminal equipment and configures the printing driver security level of the printing driver according to the equipment security level. Specifically, a configuration file is stored in the confidential terminal device, the device security level of the terminal device is stored in the configuration file, the device security level limits the user permission for using the terminal device, and the print driver configures the print driver security level of the print driver by acquiring the device security level of the terminal device. When the image forming apparatus 100 recognizes the print driver security level of the file to be printed, the image forming apparatus 100 can know the user authority level of the file to be printed. The non-secret-related terminal equipment does not store the configuration file, so that the equipment secret level of the terminal equipment acquired by the print driver is blank information, and the print driver can configure the own print driver secret level into a universal level, namely the use permission of the terminal equipment is not limited.
The printing driver security level of the printing driver is configured according to the equipment security level of the terminal equipment, so that the printing driver can dynamically configure the printing driver security level of the printing driver, and the equipment security level of the terminal equipment is stored in the configuration file, so that the stability is higher, and the configuration of the printing driver security level is more stable and reliable.
The file to be printed may be an electronic file, the file to be printed may be an original file pre-stored in the terminal device by the user, or may also be intermediate format data obtained by processing the original file through an application program of the terminal device by the user or printable data that can be recognized by the image forming apparatus, where the intermediate format data is a format file between the original file and the printable data that can be recognized by the image forming apparatus, such as: the original file is in a Word format, and at this time, the intermediate format data may be a PDF format file or an XPS format file, or may be other format files that may occur to those skilled in the art, and will not be described herein again.
And the user selects on a display interface selected by the file confidentiality grade of the terminal equipment according to the confidentiality degree of the file to be printed, clicks a corresponding option, responds to the click operation of the user by the print driver, and adds the selected file confidentiality option into the file to be printed through driving rendering so as to configure the file confidentiality grade of the file to be printed. The document security level of the document to be printed may be, for example, a common document to be printed, a confidential document to be printed, and an absolutely confidential document to be printed.
Before configuring the file security level of a file to be printed, a user inputs the identity information of the user on a display interface of a terminal device, a printing driver acquires the identity information of the user through the terminal device so as to acquire the security level of the printing driver, and when configuring the job security level of the file to be printed, the printing driver adds the file security level to the job header information of the file to be printed and adds the printing driver security level to the job header information of the file to be printed so as to associate the file to be printed with the job security level.
The file security level and the print driver security level are added to the job header information of the file to be printed, so that the data analysis module 20 can simultaneously acquire the job security level and the print driver security level by analyzing the file to be printed without respectively analyzing and acquiring, thereby simplifying the analysis operation of the image forming apparatus 100.
The print driver may also encrypt the file to be printed before transmitting the file to be printed associated with the job security level to the image forming apparatus 100, or transmit the file to be printed to the image forming apparatus 100 using a preset network protocol.
The encryption key of the file to be printed can be agreed in advance between the terminal device and the image forming apparatus 100, the file to be printed is encrypted in the terminal device, and the file to be printed is decrypted according to the agreed encryption key after the file to be printed is received by the image forming apparatus 100, so that the security of the file to be printed, which is sent to the image forming apparatus 100 by the terminal device, is improved.
The terminal device and the image forming apparatus 100 may also agree to perform mutual communication by using a network protocol with a higher security level, so that the security of the file to be printed, which is sent to the image forming apparatus 100 by the terminal device, is improved, and information leakage of the file to be printed is avoided.
The image forming apparatus 100 may store the key in the secure chip.
The image forming apparatus 100 is a Multi-Function Printer (MFP) that integrates functions such as printing, copying, scanning, and facsimile. The image forming apparatus 100 includes a plurality of image forming processing modules for controlling image forming processing operations of the image forming apparatus 100. Specifically, the imaging processing module is configured to perform processing operations related to data transceiving, command transceiving, and engine control, for example, how to call an interface unit (including but not limited to a USB port, a wired network port, a wireless network port, and the like) through an application program to transceive data, commands, statuses, and the like, and may also obtain received printing parameters through the application program, and analyze the received printing parameters into commands for controlling the engine mechanism to perform specific functions, such as pickup roller rotation parameters and the like; in addition, for the image forming apparatus 100 having the user authority authentication or encryption/decryption processing function, the image forming processing module is also configured to be able to perform the user authority authentication or encryption/decryption processing function; the interface unit in the image forming apparatus 100 is also capable of receiving print job data and print, scan, and fax commands from the driving apparatus, or transmitting scan, fax data, print, scan, and fax status information, etc. The image forming processing module may include a job receiving module 10, a data parsing module 20, a printing mechanism, a copying mechanism, a scanning mechanism, a facsimile mechanism, and the like.
The image forming apparatus 100 has the trusted computing monitor module 30 installed therein. The area of image forming apparatus 100 that is written once stores the identification information of image forming apparatus 100. The write-once area may be a One Time Programmable (OTP) memory of the image forming apparatus 100, may be a specific area of a secure chip bound to the image forming apparatus 100, and may be another secure storage medium of the image forming apparatus 100. The identification information of the image forming apparatus 100 may be a unique serial number of the image forming apparatus 100, which is unique to the image forming apparatus 100 for distinguishing from other image forming apparatuses 100. The trusted computing monitor module 30 knows what level of security functions are currently employed by the image forming apparatus 100 by obtaining the unique serial number of the image forming apparatus 100 and identifying a particular field in the unique serial number.
The image forming security level of the image forming apparatus 100 may include a plurality of apparatus security levels, and the plurality of apparatus security levels may be an apparatus security level 1, an apparatus security level 2, an apparatus security level 3, …, and an apparatus security level N, where N is an integer greater than or equal to 1. Each device security level corresponds to a different security function, and as the device security level increases, the security functions of the image forming apparatus 100 increase, for example, the lowest device security level has no limit to each function of the image forming apparatus 100, all the security functions of the image forming apparatus 100 are invalid, and the security is the lowest; the highest level of device security limits all functions of the image forming apparatus 100, and all security functions of the image forming apparatus 100 are effective and have the highest security.
The image forming security level of the image forming apparatus 100 may include three device security levels: the device security level 1, the device security level 2, and the device security level 3 are an unlimited use level, a limited use level, and a non-use level, respectively. When the image forming security level of the image forming apparatus 100 is the unlimited use level, each image forming processing module of the image forming apparatus 100 is available, and the image forming apparatus 100 can execute processing jobs of various functions on a document to be printed. When the image forming security level of the image forming apparatus 100 is a limited use level, a part of the image forming processing modules of the image forming apparatus 100 is available, for example, the printing and facsimile functions of the image forming apparatus 100 are available, the scanning function is disabled, the image forming apparatus 100 masks the unsecure network protocol data, a part of the port is disabled, and the image forming apparatus 100 can perform printing and facsimile jobs on a document to be printed. When the image forming security level of the image forming apparatus 100 is the end-of-use level, the image forming processing modules of the image forming apparatus 100 are all disabled, the image forming processing modules of the image forming apparatus 100 cannot execute any job on a document to be printed, even if the port is closed, and the image forming apparatus 100 does not perform data interaction with an external device.
Of course, the image security level of the image forming apparatus 100 is not limited to the above example, and the image security level of the image forming apparatus 100 may also be configured according to specific design requirements, and specifically, different security levels of the apparatus may have different security functions, so that different printing tasks may be completed according to different security levels of the apparatus, and information security is effectively ensured.
Trusted Computing (Trusted Computing) in the Trusted Computing monitoring module 30 is generated for behavior security, and is widely used in computers and communication systems to improve the security of the whole system. Information security includes four aspects: device security, data security, content security, and behavior security. In order to further improve the behavior safety characteristic of the image forming apparatus, the embodiment introduces a trusted computing function; the trusted computing monitoring module 30 mentioned in this embodiment may include, but is not limited to, the following functions: a program (or module) starts/runs a monitoring function (such as a white list policy), a registration function, an access control function, a malicious code protection function, a self-protection function, a terminal upgrade function, an audit function, a monitoring function, and the like. The trusted computing monitoring module 30 may be implemented by hardware (e.g., a secure chip), software (e.g., program code with the above functions), or a combination of hardware and software (e.g., a secure chip and a secure code). Taking the implementation manner of the program code as an example: the trusted computing monitoring module 30 comprises a driver layer supervisor and an application layer supervisor; the image forming device comprises a driver layer supervisor, an application layer supervisor, a trusted computing supervisor and a white list management module, wherein the driver layer supervisor is responsible for supervising driver layer modules of an image forming device operating system (such as a Linux system), the application layer supervisor is responsible for supervising application layer programs of the image forming device, and the trusted computing supervisor only allows drivers and programs in the white list range to run; drivers and programs in the range of the non-white list are not allowed to run; the trusted computing supervisor can record or report the security event behavior generated on the image forming device; therefore, the trusted computing monitoring program can comprehensively monitor the driving layer and the application layer of the image forming device, and can effectively prevent unsafe behaviors of the application program and the equipment driving. Since the trusted computing monitoring module is experience-verified and trustworthy, the trusted computing monitoring module determines the image forming security level, and the data processing security of the image forming device is further improved.
The trusted computing monitor module 30 may obtain dynamic information of the image forming apparatus 100 in real time. The data analysis module 20 analyzes data in a file to be printed to obtain a job security level associated with the file to be printed, and the trusted computing monitoring module 30 divides the file to be printed into different security levels according to the job security level associated with the file to be printed, where the file to be printed may be any one of a first-level file security level, a second-level file security level, a third-level file security level, …, and an N-level file security level, where N is an integer greater than or equal to 1. Each document security level corresponds one-to-one to one image formation security level. The trusted computing monitoring module 30 matches the corresponding image forming security level according to the security level of the file to be printed, so that the image forming apparatus 100 performs print job management and control on the file to be printed. For example, when the document to be printed is a first-level document security level, the corresponding image formation security level is device security level 1, when the document to be printed is a second-level document security level, the corresponding image formation security level is device security level 2, when the document to be printed is a third-level document security level, the corresponding image formation security level is device security level 3, and so on, when the document to be printed is an N-level document security level, the corresponding image formation security level is device security level N. The trusted computing monitoring module 30 executes corresponding security printing control on the file to be printed according to the security function corresponding to the image formation security level.
When the document to be printed is in the first-level document security level, the trusted computing and monitoring module 30 matches the image formation security level corresponding to the first-level document security level to be the device security level 1, and the device security level 1 is the unlimited use level, the trusted computing and monitoring module 30 controls all the imaging processing modules of the image forming apparatus 100 to be available, all the security functions of the image forming apparatus 100 are invalid, and all the imaging processing modules of the image forming apparatus 100 can execute processing jobs of various functions on the document to be printed. When the document to be printed is the security level of the secondary document, the trusted computing and monitoring module 30 matches the image forming security level corresponding to the security level of the secondary document to be the device security level 2, and the device security level 2 is the limited-use level, the trusted computing and monitoring module 30 controls part of the image forming processing modules of the image forming apparatus 100 to be available, for example, the printing and fax functions of the image forming apparatus 100 are available, the scanning function is disabled, the image forming apparatus 100 shields non-secure network protocol data, part of the ports are disabled, and the image forming apparatus 100 can execute printing and fax jobs on the document to be printed. When the document to be printed is at the third-level document security level, the image formation security level corresponding to the third-level document security level matched by the trusted computing and monitoring module 30 is at the device security level 3, and the device security level 3 is at the stop-use level, the trusted computing and monitoring module 30 controls each imaging processing module of the image forming apparatus 100 to be prohibited from using, each imaging processing module of the image forming apparatus 100 cannot execute any job on the document to be printed, even the port is closed, and the image forming apparatus 100 does not perform data interaction with the external device.
The image forming apparatus 100 according to the embodiment of the application receives a to-be-printed document issued by a print driver through the job receiving module 10, the to-be-printed document is associated with a job security level, the data analyzing module 20 analyzes data in the to-be-printed document to obtain the job security level associated with the to-be-printed document, the trusted computing monitoring module 30 monitors the data analyzing module 20, matches a corresponding image forming security level according to the job security level associated with the to-be-printed document analyzed by the data analyzing module 20, and the image forming security level is used for determining operation authority information of each imaging processing module of the current image forming apparatus 100. The trusted computing monitoring module can determine the image forming security level according to the job security level of the file to be printed, and further determine the operation authority of the image forming device 100 according to the image forming security level, so that the job security level of the file to be printed can be safely controlled, the security of job data in the image forming device 100 is ensured, and the trusted computing monitoring module is verified through experience and is trustworthy, so that the trusted computing monitoring module determines the image forming security level to further increase the security of data processing of the image forming device 100.
Referring to fig. 2, an image forming system including the image forming apparatus 100 and the print driver 200 is also provided in the embodiments of the present application.
Referring to fig. 3, an embodiment of the present application further provides an image forming method, which is applied to an image forming apparatus, and the method includes the following steps.
And step S01, receiving the file to be printed from the print driver, wherein the file to be printed is associated with the job security level.
And step S02, analyzing the data in the file to be printed to obtain the job security level associated with the file to be printed.
Step S03, matching the corresponding image according to the job security level associated with the analyzed file to be printed to form a security level; wherein the image forming security level is used to determine operation authority information of each image forming processing module of the current image forming apparatus.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An image forming apparatus, comprising:
the job receiving module is used for receiving a file to be printed issued by a printing driver, and the file to be printed is associated with job security;
the data analysis module is used for analyzing the data in the file to be printed to obtain the job security level associated with the file to be printed;
the trusted computing monitoring module is used for monitoring the data analysis module and matching the corresponding image to form a security level according to the job security level associated with the file to be printed analyzed by the data analysis module;
wherein the image forming security level is used to determine operation authority information of each image forming processing module of the current image forming apparatus.
2. The image forming apparatus according to claim 1, wherein the image forming security level includes a plurality of apparatus security levels, each apparatus security level corresponding to a different security function, and the security function of the image forming apparatus increases as the apparatus security level increases.
3. The image forming apparatus according to claim 2, wherein the image forming security level includes an unlimited use level, a limited use level, and a stop use level.
4. The image forming apparatus according to claim 1, wherein the job security level includes a print driver security level and a document security level.
5. An image forming method applied to an image forming apparatus, the method comprising:
receiving a file to be printed issued by a printing driver, wherein the file to be printed is associated with a job security level;
analyzing data in the file to be printed to obtain a job security level associated with the file to be printed;
matching the corresponding image to form a security level according to the security level of the operation related to the analyzed file to be printed;
wherein the image forming security level is used to determine operation authority information of each image forming processing module of the current image forming apparatus.
6. The image forming method according to claim 5, wherein the image forming security level includes a plurality of device security levels, each device security level corresponding to a different security function, and the security function of the image forming device increases as the device security level increases.
7. The image forming method according to claim 6, wherein the image forming security level includes an unlimited use level, a limited use level, and a stop use level.
8. The image forming method according to claim 5, wherein the job security level includes a print driver security level and a document security level.
9. An image forming system characterized by comprising the image forming apparatus according to any one of claims 1 to 4.
10. The image forming system according to claim 9, further comprising a print driver configured to configure a print driver security level thereof, and add the print driver security level and the file security level to job header information of the document to be printed, so that the document to be printed is associated with a job security level.
CN202110101318.9A 2021-01-26 2021-01-26 Image forming apparatus, image forming method, and image forming system Pending CN112783452A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110101318.9A CN112783452A (en) 2021-01-26 2021-01-26 Image forming apparatus, image forming method, and image forming system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110101318.9A CN112783452A (en) 2021-01-26 2021-01-26 Image forming apparatus, image forming method, and image forming system

Publications (1)

Publication Number Publication Date
CN112783452A true CN112783452A (en) 2021-05-11

Family

ID=75757223

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110101318.9A Pending CN112783452A (en) 2021-01-26 2021-01-26 Image forming apparatus, image forming method, and image forming system

Country Status (1)

Country Link
CN (1) CN112783452A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174210A (en) * 2022-06-30 2022-10-11 珠海奔图电子有限公司 Credible report generation method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003087458A (en) * 2001-09-17 2003-03-20 Sharp Corp Image forming system with security protecting function
CN107562392A (en) * 2017-08-31 2018-01-09 珠海赛纳打印科技股份有限公司 Safe printing method and system
CN108255439A (en) * 2017-12-29 2018-07-06 佛山市幻云科技有限公司 A kind of Secure printing method, device, system and secure printing machine

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003087458A (en) * 2001-09-17 2003-03-20 Sharp Corp Image forming system with security protecting function
CN107562392A (en) * 2017-08-31 2018-01-09 珠海赛纳打印科技股份有限公司 Safe printing method and system
CN108255439A (en) * 2017-12-29 2018-07-06 佛山市幻云科技有限公司 A kind of Secure printing method, device, system and secure printing machine

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174210A (en) * 2022-06-30 2022-10-11 珠海奔图电子有限公司 Credible report generation method and electronic equipment

Similar Documents

Publication Publication Date Title
JP4402146B2 (en) Network device access control method and apparatus, computer program, and computer-readable storage medium
JP5332814B2 (en) Printing apparatus, processing method, and computer program
KR100951599B1 (en) Document security system
US9306980B2 (en) Image processing apparatus that configures settings of information security policy, method of controlling the same, program, and storage medium
US20070115494A1 (en) Image processing system, information processing device, computer readable recording medium, and information processing method
US9088566B2 (en) Information processing system, information processing device, and relay server
KR101296786B1 (en) Apparatus and method for printing control using virtual printer, authentication server and method for authentication thereof
KR20090090281A (en) Printing system, printing method and printer
US20070273924A1 (en) Recording medium storing printing program, printing apparatus, printing method, and computer data signal embodied in carrier wave
KR100914698B1 (en) Printing system and host apparatus
US9300689B2 (en) Apparatus connecting to network, control method for apparatus, and storage medium
US20200068094A1 (en) System and method for managing security settings of a print device using a lockdown mode
CN112783452A (en) Image forming apparatus, image forming method, and image forming system
JP4640311B2 (en) Authentication device, authentication system, authentication method, and program for controlling authentication device
US9372647B2 (en) Image forming apparatus capable of printing image data associated with print right, method of controlling the same, and storage medium
CN112040083B (en) Network control method, image forming apparatus, and image forming system
JP2006350689A (en) Client driver program and computer for controlling image forming apparatus, and method for controlling operation screen for image processing apparatus operation
JP6579735B2 (en) Information processing system, information processing apparatus, information processing system control method, information processing apparatus control method, and program
US10776058B2 (en) Processor that permits or restricts access to data stored in a first area of a memory
JP2006190050A (en) Multitask execution system and multitask execution method
JP7454936B2 (en) Printing system, printing device and printing control method
US20240045977A1 (en) Information processing apparatus, control method for information processing apparatus, and storage medium
JP2007304762A (en) Image file management device, program and method
US11765302B2 (en) Image forming apparatus equipped with an anti-malware function of a permission-list type, image forming method using the same, and non-transitory computer-readable recording medium on which image forming program for the same is recorded
US20240129333A1 (en) Server apparatus, information processing apparatus, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination