GB2434464A - Making a document available for printing once only - Google Patents

Making a document available for printing once only Download PDF

Info

Publication number
GB2434464A
GB2434464A GB0700948A GB0700948A GB2434464A GB 2434464 A GB2434464 A GB 2434464A GB 0700948 A GB0700948 A GB 0700948A GB 0700948 A GB0700948 A GB 0700948A GB 2434464 A GB2434464 A GB 2434464A
Authority
GB
United Kingdom
Prior art keywords
document
computer
remote computer
document file
print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0700948A
Other versions
GB0700948D0 (en
Inventor
Richard Ironmonger
Christopher Sabin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LEXHAM INSURANCE CONSULTANTS L
Original Assignee
LEXHAM INSURANCE CONSULTANTS L
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LEXHAM INSURANCE CONSULTANTS L filed Critical LEXHAM INSURANCE CONSULTANTS L
Publication of GB0700948D0 publication Critical patent/GB0700948D0/en
Publication of GB2434464A publication Critical patent/GB2434464A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

Methods are provided which enable the on-line supply of a document to be made by an online supplier in the knowledge that only one print of the document is capable of being made by the customer to the transaction. In particular, they are of application to the provision of motor insurance certificates on-line after a policy of insurance has been effected by or on behalf of an insurer. A method is described which includes the steps of receiving an encrypted document file from a host computer (20) at a remote computer (10); decrypting the encrypted document file using a program running on the remote computer to generate a decrypted document file; allowing instructions to be sent to a printer (24) associated with the remote computer to create one print of the document represented by the decrypted document file; and inhibiting the generation of any further instructions to print the document by the remote computer.

Description

<p>Title: Secure Drinting of documents</p>
<p>Field of inventi</p>
<p>This invention concerns printing of documents using data obtained over the internet or a local area network or an intranet. In particular the invention is of application to the provision of motor insurance certificates on-line after a policy of insurance has been effected by or on behalf of an insurer but the invention is not limited to this application.</p>
<p>Background</p>
<p>Some of the larger motor insurance intermediaries (i.e. insurance brokers and agents) offer an on-line quotation and acceptance facility alongside a traditional call centre operation to customers such as introducers (typically motor vehicle dealers).</p>
<p>Hitherto insurers have been reluctant to allow insurance documents, and in particular a certificate of motor insurance, to be printed locally by an introducer such as a motor dealer.</p>
<p>This has meant that although an insurance quotation can be obtained and acceptance and payment can be made on the same day, there has been a delay of at least one and often two or three days before the introducer has received the certificate by post and a new vehicle can be used by the purchaser.</p>
<p>The present invention seeks to maxitnise the benefits of such on-line facilities by enabling an introducer to download an insurance document for immediate use following payment of the premium.</p>
<p>However the invention is not limited to the insurance industry and is of general application in that it will enable the on-line supply of a document to be made by an on-line supplier in the full knowledge that only one print of the document is capable of being made by the customer to the transaction.</p>
<p>Summary of the Invention</p>
<p>The present invention provides a method for making a document available for printing only once comprises the steps of: (a) receiving an encrypted document file from a host computer at a remote computer; (b) decrypting the encrypted document file using a program running on the remote computer to generate a decrypted document file; (c) allowing instructions to be sent to a printer associated with the remote computer to create one print of the document represented by the decrypted document file; and (d) inhibiting the generation of any further instructions to print the document by the remote computer.</p>
<p>The present invention further provides a method for making a document available for printing only once comprises the steps of: (a) assembling data in a host computer to form a document file; (b) encrypting the document file; (c) transmitting the encrypted document file to a remote computer in response to a request received from the remote computer; (d) receiving the encrypted document file at the remote computer; (e) decrypting the encrypted document file using a program executed on the remote computer to generate a decrypted document file; (f) allowing instructions to be sent to a printer associated with the remote computer to create one print of the document represented by the decrypted document file; and (g) inhibiting the generation of any further instructions to print the document by the remote computer.</p>
<p>According to a preferred embodiment, the present invention provides a system and method for making a document available only once to an on-line applicant comprising a first software program running on a server accessible, as by the internet from a remote computer, a second software program running on the remote computer, a local printer to which print instructions can be sent from the local computer to print a document, a database accessible by the server in response to a print document request from the remote computer, the first program operating to assemble data to form a document file from which a document can be printed by the remote computer and printer, and to encrypt the document file for transmission to the remote computer, wherein the second program must be run in order to decrypt the encrypted data and when running displays a preview of at least part of the document on a screen associated with the remote computer together with a Print Document button in the display which can be selected by the applicant using the remote computer keyboard or a mouse command, thereby to send the document file to the local printer to print the document, and the second program includes code which in use inhibits the remote computer from responding to the right click function of a computer mouse connected thereto and to generate a return signal for transmission to the server to delete the encrypted document file from the server, thereby to prevent duplication of the document using the remote computer.</p>
<p>The second program code may also inhibit the remote computer from responding to other print commands such as a print screen command from its keyboard.</p>
<p>The second program code may prevent the remote computer from displaying more than a part of the document on the screen, so that even if the print screen command is or becomes available only part of the document will be printed, if the print screen command is used.</p>
<p>The second program code may also delete the document file from the remote computer memory if the print screen key is pressed, so that the document cannot be printed.</p>
<p>Preferably the return signal generates a flag or other description which inhibits any subsequent assembly of that data to form a document file following a request by any remote computer.</p>
<p>The above described method may be preceded by a telephone call to an operator who has access to the server, whereby the server can be authorised by the operator to accept instructions from the remote computer.</p>
<p>The authorisation may include the allocation of a unique identification code such as a number, which is linked to the data which is to be assembled by the server to create a document file for a particular document and the applicant may be given that unique identification code in the telephone call and is required to include it when calling up the server so that the server is directed to the data relating to the appropriate document when ID data code is received by it, and the applicant is unable to access any other data on the server.</p>
<p>Where the document relates to a financial transaction which itself bears an identification number, such as the number of an insurance policy which has been negotiated, the identification code may comprise or include the transaction identification number.</p>
<p>Preferably the remote computer is allocated or possesses a unique machine identity code and the document data for the desired document is not only linked to the unique transaction identification code but also the unique remote computer identity code so that the particular document file can only be accessed from the remote computer having that unique machine identity code.</p>
<p>Where a financial transaction precedes a print document request from the remote computer to the server, the financial transaction may be completed by telephone, to an associated call centre. The preliminary financial transaction may also be completed at least in part by the applicant using the remote computer and a server, which may be the same server as that which is to be accessed to retrieve the document file for printing the document, wherein a third software program running on the server is accessible by a fourth software program running on the remote computer to create an entry template to be displayed on the remote computer screen, containing questions with provision for answers to be entered by the applicant, which when all have been answered are submitted to the server, and the third program operates inter alia to select data from a database in response to the answers and deliver a screen display response to the remote computer containing either a refusal to continue with the transaction or at least one offer, and an Accept or Reject button in the display by which the applicant can elect to accept the offer or not, and wherein if accepted the fourth program operates to route an acceptance signal to the server, on receipt of which the third program running thereon operates to deliver data comprising a payment invitation template containing further questions, to the remote computer to present the questions to the applicant on the remote computer screen display, and wherein on satisfactory completion of answers to the questions and routing of same to the server by the fourth program, the third program operates to confirm the transaction and create transaction data and a unique identification code for that transaction which are stored in a database of similar transactions and from which data can be collected and assembled to create a document file when requested.</p>
<p>The third and fourth programs may form part of the first and second programs respectively.</p>
<p>Preferably the third program operates to deliver a transaction confirmed template to the remote computer when the payment is confirmed, to advise the applicant of this and to make available to the remote computer the unique identification code for the transaction.</p>
<p>The latter may be merely displayed on the remote computer screen to be noted by the applicant for subsequent use but more preferably the fourth program operates to store the unique identification code in a fourth database, either on the server or on the remote computer, in a manner by which it is associated with other data relating to the transaction, so that the said other data can be called up by the remote computer using the unique code.</p>
<p>The further database may be stored on any or all of the server, another server or the remote computer.</p>
<p>Most preferably one of the screen displays, typically the transaction confirmation template includes document availability buttons in the display by which the user can indicate to the server whether the document is to be made available on-line for printing by a printer linked to the remote computer or is only to be sent by post, and the fourth program operates to transmit an appropriate command to the server in response to the button selected by the user.</p>
<p>Conveniently a default mode operates to elect the documents to be sent by post.</p>
<p>When the print on-line button is selected, the third program preferably operates to load the said first program on the server and the second program on the remote computer to enable the print document routine of the first aspect of the invention to be instigated. Where the first program is run on a different server, the third program preferably operates to link the remote computer to the different server either directly, or via the server which has been employed to complete the transaction.</p>
<p>Where payment is to be effected using a third party payment website, such as PAYPAL, the third program may instead operate to establish a link to the third party website in response to the receipt by the server of an offer acceptance signal, and operates to close the link after the payment transaction is completed and before it operates to deliver the transaction confirmation signal to the remote computer.</p>
<p>The invention also lies in a computer program when stored on a data carrier which when loaded into a computer enables the latter to retrieve and decrypt and print a document file from a server in accordance with the aforementioned method.</p>
<p>The invention also lies in a computer program when stored on a data carrier which when loaded into a server enables the latter to compile and encrypt a document file and store same in a buffer store awaiting retrieval by a remote computer in accordance with the aforementioned method.</p>
<p>The invention also lies in a computer when running either of the aforesaid programs.</p>
<p>The invention also lies in a method of conducting an insurance providing business in accordance with the steps of the aforementioned method.</p>
<p>An embodiment of the invention will now be described in relation to the obtaining of motor insurance and the issue of a certificate of motor insurance to a policy holder, particularly when required for a vehicle which is to be taxed and for which an insurance certificate is necessary before this can be done.</p>
<p>Overview The method described herein allows an introducer to retrieve a motor insurance certificate for a client from an insurer or intermediary such as a insurance broker or agent. The process requires the introducer to request the document to be made available and using a printer connected to a computer under the control of the introducer and loaded with special software and connected to the internet or a local area network or intranet, the insurance document can be displayed on the screen of the introducer's computer and is printable only by selecting a print button which is an integral part of the screen display, no other print command being available to print the displayed document when the said special software is running on the computer.</p>
<p>Where the policy details are stored on a server, the invention involves retrieving relevant data from the data stored on the server for the relevant policy, creating a document file by merging the retrieved data with a template, encrypting the merged data, making the encrypted data available in response to a request from the introducer's computer which uniquely identifies the latter to the server, so that it can be downloaded only to the introducer's computer where it is decrypted and presented on the introducer's computer screen as a document with a print button which when selected allows one and only one copy of the displayed document to be printed using the document file and a printer connected to the introducer's computer.</p>
<p>The document file is not stored on the introducer's computer, so that multiple copies cannot be printed. Once the document file has been used to create the screen display on the remote computer, an instruction is sent by the special software to delete the file from the server, so that the introducer cannot retrieve further copies.</p>
<p>The facility is made available by installing on the introducer's PC a special document viewing program which gives the introducer access to the insurer's or intermediary's server if authorised to do so.</p>
<p>All right-click functions on a mouse connected to the introducer's computer are denied when the program is loaded. This prevents users from viewing the source code of the document and accessing print shortcuts. In addition the Print Screen key on the computer keyboard may be inhibited when the program is loaded, or instead or in addition the program only allows part of the document to be viewed on the screen (typically the upper half) and prevents the computer from being altered to display all of the document on the screen.</p>
<p>In one arrangement the steps leading up to the use of the document viewing program comprise: - 1. Introducer contacts an insurer (or insurance intermediary authonsed to issue policies), on-line or by telephone, for an insurance quotation.</p>
<p>2. They complete a questionnaire providing information regarding the proposed owner/driver and the vehicle.</p>
<p>3. One or more quotations are provided with provision for selecting one if more than one is displayed, and indicating acceptance of the quotation thereby.</p>
<p>4. If accepted, the payment required to bring the selected insurance into effect is paid to the insurer or the intermediary as by a credit or debit card.</p>
<p>5. Data from which policy documents and a certificate of motor insurance can be created is stored on a server.</p>
<p>Steps I and 5 can be performed by telephone, or on-line using an insurer's or intermediary's website, or by a combination of telephone call(s) and website access.</p>
<p>If the introducer is willing to wait for the certificate to be delivered in the post the documents are printed by the insurer or the intermediary and posted. If not and the introducer has the program on his computer which can access the server as by the internet, the introducer may request authorisation to use the program to access the certificate data on the insurer's (or intermediary's) server via the internet, to print out the certificate at the introducer's premises.</p>
<p>If the quotation has been obtained and acceptance given by telephone, and the introducer wishes to print the certificate for immediate use:- 6. The introducer asks for the insurance document data to be made available, via the document viewing program. This may require a separate telephone call, to verify the introducer to the insurer or intermediary. Alternatively other ID such as passwords may be employed.</p>
<p>7. The insurer's or intermediary's computer encrypts the document data and makes this encrypted document file ready on their server to be accessed by the remote computer.</p>
<p>8. When an encrypted document file is created and stored on the server, an entry is stored in a log on the server to keep a record of any insurance policy for which a certificate has been downloaded to be printed by an introducer.</p>
<p>9. If not already running, the introducer loads up the document viewing program on his computer, connects to the internet (or to a local area network or intranet as appropriate), and locates the insurer's or intermediary's website.</p>
<p>10. The introducer's document viewing program retrieves the insurance document by searching the server for an encrypted document file bearing the proposer's name and policy number and the ID of the introducer.</p>
<p>11. On locating the encrypted document file the introducer's program downloads and decrypts the data, deletes the encrypted file and generates a screen display of at least part of the insurance document on the introducer's computer screen display.</p>
<p>12. At the same time the encrypted document file and its ID is deleted from the server so that at that point only the decrypted file exists in the screen memory of the introducer's computer.</p>
<p>13. The introducer checks the document displayed, and if OK, selects the "PRINT" button in the display and prints the document. The introducer's program only allows one copy of each document and the insurer's or intermediary's server is programmed not to accept any subsequent retrieval request for data relating to that document from that or any other introducer.</p>
<p>14. No other computer functions (apart from printing using the screen display "PRINT" button) are available to the introducer when running the document viewer program, and after selecting the print button, it is only possible for the introducer simply to exit the IDV program.</p>
<p>If the quotation, acceptance and payment have been achieved on-line using an insurer's or intermediary's website, the introducer may elect to wait for the documents to be posted.</p>
<p>However, where the introducer has a suitable document viewer program on a computer which can access the server on which the insurance policy data is stored, the introducer can elect to print the certificate immediately. To this end the introducer selects the appropriate button in the display which activates the program on his local computer, which it is assumed is still connected to the insurer's or intermediary's website.</p>
<p>Using the policy ID stored in the local computer (or after this has been entered by the introducer), the insurer's or intermediary's server is requested to locate the relevant policy details from the database associated with the server, to retrieve the insurer's template and merge policy data with the template to form a document file.</p>
<p>The latter is then encrypted by the software running on the insurer's or intermediary's server and stored temporarily on the server.</p>
<p>The introducer's computer under the control of its document viewing program finds the temporarily stored encrypted document file and using its decryption algorithm decrypts the file and stores it in that part of its random access memory used as the screen memory (in which data which is currently displayed on the computer monitor is held).</p>
<p>Once the document file is safely stored in the screen memory of the introducer's computer, a command is sent from the latter to the server to delete the encrypted document file from the server and to display at least part of the document on the screen of the introducer's computer.</p>
<p>On receipt of the print command by selection of the print button in the display, the file is transferred from screen memory to a printer connected to the introducer's computer so that it no longer remains stored in the latter, and the document is printed.</p>
<p>Once printed, no further copies can be produced using the introducer's computer since the document file is no longer in existence.</p>
<p>Preferably the policy data on the insurer's or intermediary's server is flagged after a document file has been formulated therefrom, so that no further document requests from an introducer's computer will download data into the insurer's template for that policy.</p>
<p>Preferably each encrypted print file obtained from the server is in html format with attached image files to complete the document layout. The document images stored on the server can only be viewed, allowing users of the system to access the documents to view and print once, but with no facility to save or edit them.</p>
<p>Typically, the encrypted file will be stored on the introducer's computer for a very short time, typically 1 or 2 seconds, but is immediately deleted as soon as the decrypted version is stored in the screen memory.</p>
<p>The server which holds the encrypted document file is restricted to authonsed users only.</p>
<p>Should an unauthorised party obtain access, before the introducer, they would be unable to view/open a document file due to its being encrypted.</p>
<p>The system proposed by the invention is not email. The encrypted file does not contain an address, it doesn't go through any email servers, which could possibly store information, and it is instant from the time it is made available to be downloaded by the introducer.</p>
<p>The method by which it is sent to the introducer's computer is more of an automated data exchange, as information goes both ways and is deleted. Thus the encrypted file is stored on a server which is then looked for by the document viewing program which is running on the introducer's PC, downloaded once found, and immediately deleted from the server, and preferably the latter is inhibited from creating that document again from an instruction from an introducer's computer.</p>
<p>An embodiment of the invention will now be described by way of example with reference to the accompanying drawings in which: -Figs. 1A and lB show a flow diagram of the steps in the process of obtaining an insurance quotation on-line from an insurer or intermediary and electing to have a certificate of insurance made available on-Line for immediate printing by the introducer; Fig. 2 is a block schematic diagram showing how an introducer's PC and intermediary's server may be configured to allow for secure printing of an insurance certificate by the introducer; and Fig. 3 illustrates a screen display of an insurance certificate with PRINT and QUIT buttons.</p>
<p>Figs. IA and lB set out the steps of the procedure to be followed for obtaining an insurance certificate after accepting an on- line quotation from an insurer or insurance intermediary such as an insurance broker.</p>
<p>Steps 1 to 6 may alternatively be implemented by telephone but increasingly are being taken by an on-line contact with the website of an insurance company or an insurance broker. If a quotation is accepted by the proposer, it can, using an embodiment of the present invention, lead to the printing out of a motor insurance certificate by a motor dealer. This enables the latter to tax (or register and tax.) an untaxed vehicle so that a purchaser can drive the vehicle away the same day as it is purchased.</p>
<p>Step 7 provides for policy documents to be printed by the insurer (or intermediary if authorised to do so) for posting to the insured. But, in accordance with an embodiment of the invention, the dealer can elect to receive insurance documents on-line. If elected, this leads on to step 8 in Fig. 3, and once elected the dealer's PC is now controlled by the document viewing program supplied by the insurer or intermediary, and this sends the appropriate request to the server of the insurer or intennediary.</p>
<p>In Fig. 3 the server is only identified as being that of an insurer but it is to be understood that this temi can include an insurance intermediary such as a broker or agent.</p>
<p>The insurer's server identifies the policy data previously stored in the relevant database and merges this with a software certificate template in steps 10 and ii of Fig. 3.</p>
<p>Each dealer is provided with a unique document viewing program which includes a unique decryption algorithm and on the server, the dealer's ID is Listed in another database with the corresponding encryption algorithm. Step 12 calls for the server to locate the Latter and use it to encrypt the document file created by step 11.</p>
<p>The server stores the encrypted file in a buffer store which can be interrogated by the dealers via their document viewing software. Each stored encrypted file is identifiable by the dealer's ID and the policy number and if these match the request from the dealer's PC, the encrypted file is downloaded to the dealer's PC, where this is stored in the PC memory.</p>
<p>Once the encrypted file has been stored, the document viewing program may transmit a Delete File instruction to the server to delete the original encrypted file from the buffer memory. It then subjects the stored file to the decryption algorithm to produce the original document file. This is shifted into the computer screen memory, and is still in existence in the PC when the encrypted file is deleted.</p>
<p>The document is now viewable in the computer display together with "PRINT" and "QUIT" buttons (in the display), as shown in Fig. 3. If the dealer is satisfied that it is the correct certificate the PRINT" button is selected using a mouse command. This transfers the document file using the document viewing software, to a printer to print out the document.</p>
<p>After being selected the "PRINT" button is automatically rendered inoperable or removed from the display by the document viewing software, so that once the PRINT instruction has been given, the only functionality available to the dealer within the document viewing program is to exit the program.</p>
<p>If the print function fails or the printing of the certificate is incomplete, the dealer cannot thereafter retrieve the document file a second time, and must rely on the documents which will follow in the post one or two days later.</p>
<p>Fig. 4 shows one possible configuration of the dealer's computer and the intermediary's server and associated databases, to allow the running of the document viewing software and operation of the method and system provided by the invention.</p>
<p>Thus, in the dealer's computer 10, the document viewing software loads the decryption engine 12 and provides for screen displays on display 14 to allow the user to call up the a certificate for a given policy. On receiving an encrypted document file from the intermediary's server, via the internet connection, the processor 16 decrypts the data using the decryption engine 12 and loads the decrypted data into the screen memory 18. This results in a Delete File instruction to the processor to ensure that the encrypted data is deleted from the computer memory and if not already sent, causes a Delete File instruction to be sent to the server 20 to remove the encrypted file from the buffer memory 22 in the server 20.</p> <p>The display in 14 includes a "PRINT" button (see Fig. 3) which, if
selected (using a mouse command), transfers the contents of the screen memory to the printer 24 to print out the documents.</p>
<p>The server 22 includes a database of encryption codes 26 each linked to a particular dealer's ID, so that when a request for a document is received by the server processor 28, the relevant encryption algorithm is entered in the encryption engine 30.</p>
<p>The policy ID received from the same dealer calls up the relevant certificate template from the database 32 for merging with policy data from database 34 to create the document file, which is then encrypted by 28 and 30 and stored in buffer store 30, as previously described.</p>
<p>In order to prevent a repeat certificate from being generated, a flag is generated and stored in a supplementary database 36, linked to the policy ID in 34 (or in a separate field in the relevant policy datablock). If a policy is thereby "flagged" a subsequent request for a certificate will not allow the policy data to be merged with a certificate template to form a document file. The intermediary's server also includes a database 38 containing premiums, conditions and exclusions applicable to different vehicles and different drivers which are selected according to the information provided by the dealer and proposer, to enable at least one quotation to be supplied to the dealer's PC. The server also includes a database 40 of different insurer's policy templates to allow policies to be created and printed out to be posted to the insured.</p>

Claims (2)

  1. <p>Claims 1. A method for making a document available for printing only
    once comprises the steps of: (a) receiving an encrypted document file from a host computer at a remote computer; (b) decrypting the encrypted document file using a program running on the remote computer to generate a decrypted document file; (c) allowing instructions to be sent to a printer associated with the remote computer to create one print of the document represented by the decrypted document file; and (d) inhibiting the generation of any further instructions to print the document by the remote computer.</p>
    <p>2. A method for making a document available for printing only once comprises the steps of: (a) assembling data in a host computer to form a document file; (b) encrypting the document file; (c) transmitting the encrypted document file to a remote computer in response to a request received from the remote computer; (d) receiving the encrypted document file at the remote computer; (e) decrypting the encrypted document file using a program executed on the remote computer to generate a decrypted document file; (f) allowing instructions to be sent to a printer associated with the remote computer to create one print of the document represented by the decrypted document file; and (g) inhibiting the generation of any further instructions to print the document by the remote computer.</p>
    <p>3. A method of claim 2 including the step after step (d) of sending a signal from the remote computer to the host computer which causes the encrypted document file to be deleted from the host computer.</p>
    <p>4. A method of claim 2 or claim 3 including the step of generating an identification code associated with a specific document file for inclusion in the request for the document file from the remote computer.</p>
    <p>5. A method of any of claims 2 to 4 wherein a machine identity code is associated with the remote computer and is included in the request for a document file from the remote computer.</p>
    <p>6. A method of any preceding claim including the step of deleting the encrypted document file from the remote computer after it has been decrypted.</p>
    <p>7. A method of any preceding claim including the step of displaying the document represented by the decrypted document file on a display screen associated with the remote computer, wherein displaying the whole of the document simultaneously on the screen is inhibited.</p>
    <p>8. A method of any preceding claim wherein a print button is displayed on a display screen associated with the remote computer and selection of the button by a user causes the instructions to be sent to the printer to print the document.</p>
    <p>9. A method of claim 8 wherein causing the instructions to be sent to the printer to print the document by any means other than selection of the print button is inhibited.</p>
    <p>10. A computer program comprising program instructions for causing a computer to perform the steps associated with the remote computer in a method of any preceding claim.</p>
    <p>11. A computer program comprising program instructions for causing a computer to perform the steps associated with the remote computer in a method of any of claims I to 9 embodied on a record medium, stored in a computer memory, embodied in a read-only memory, or carried on an electrical carrier signal, or other carrier.</p>
    <p>12. A computer programmed to perform the steps associated with the remote computer in a method of any of claims Ito 9.</p>
    <p>13. A computer program comprising program instructions for causing a computer to perform the steps associated with the host computer in a method of any of claims 2 to 5 or claims 6 to 9 when dependent on claim
  2. 2.</p>
    <p>14. A computer program comprising program instructions for causing a computer to perform the steps associated with the host computer in a method of any of claims 2 to 5, or claims 6 to 9 when dependent on claim 2, embodied on a record medium, stored in a computer memory, embodied in a read-only memory, or carried on an electrical carrier signal, or other carrier.</p>
    <p>15. A computer programmed to perform the steps associated with the host computer in a method of any of claims 2 to 5 or claims 6 to 9 when dependent on claim 2.</p>
    <p>16. A method for making a document available for printing only once substantially as described herein with reference to the accompanying drawings.</p>
GB0700948A 2006-01-18 2007-01-18 Making a document available for printing once only Withdrawn GB2434464A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB0600940.1A GB0600940D0 (en) 2006-01-18 2006-01-18 Secure Printing Of Documents

Publications (2)

Publication Number Publication Date
GB0700948D0 GB0700948D0 (en) 2007-02-28
GB2434464A true GB2434464A (en) 2007-07-25

Family

ID=35998199

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB0600940.1A Pending GB0600940D0 (en) 2006-01-18 2006-01-18 Secure Printing Of Documents
GB0700948A Withdrawn GB2434464A (en) 2006-01-18 2007-01-18 Making a document available for printing once only

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB0600940.1A Pending GB0600940D0 (en) 2006-01-18 2006-01-18 Secure Printing Of Documents

Country Status (1)

Country Link
GB (2) GB0600940D0 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8763140B2 (en) 2009-05-20 2014-06-24 Evizone Ip Holdings, Ltd. Secure workflow and data management facility

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0567800A1 (en) * 1992-04-29 1993-11-03 International Business Machines Corporation Data processing system and method to enforce payment of royalties when copying softcopy books
GB2385439A (en) * 2002-02-15 2003-08-20 Hewlett Packard Co Digital rights management printing system
GB2387690A (en) * 2001-01-31 2003-10-22 Hewlett Packard Co A printer capable of decrypting a document file, printing the file and sending a confirmation signal
JP2004078754A (en) * 2002-08-21 2004-03-11 Seiko Instruments Inc Printer and printing system with authentication module
US20060064580A1 (en) * 2004-09-22 2006-03-23 Pitney Bowes Incorporated Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0567800A1 (en) * 1992-04-29 1993-11-03 International Business Machines Corporation Data processing system and method to enforce payment of royalties when copying softcopy books
GB2387690A (en) * 2001-01-31 2003-10-22 Hewlett Packard Co A printer capable of decrypting a document file, printing the file and sending a confirmation signal
GB2385439A (en) * 2002-02-15 2003-08-20 Hewlett Packard Co Digital rights management printing system
JP2004078754A (en) * 2002-08-21 2004-03-11 Seiko Instruments Inc Printer and printing system with authentication module
US20060064580A1 (en) * 2004-09-22 2006-03-23 Pitney Bowes Incorporated Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8763140B2 (en) 2009-05-20 2014-06-24 Evizone Ip Holdings, Ltd. Secure workflow and data management facility

Also Published As

Publication number Publication date
GB0700948D0 (en) 2007-02-28
GB0600940D0 (en) 2006-02-22

Similar Documents

Publication Publication Date Title
US11093652B2 (en) Web-based method and system for applying a legally enforceable signature on an electronic document
US11038677B2 (en) Systems and methods for encryption and authentication
US7673016B2 (en) System, computer program product and method for selecting an application service provider
US7149784B2 (en) System, computer program product and method for exchanging documents with an application service provider at a predetermined time
US7231369B2 (en) Digital contents provision system, server device incorporated in the system, digital contents provision method using the system, and computer program for executing the method
EP1237352B1 (en) A system, method and computer program for managing documents
US8571992B2 (en) Methods and apparatus for title structure and management
KR100936556B1 (en) Insurance server, user terminal, processing method in insurance server, and processing method in user terminal
US20020174010A1 (en) System and method of permissive data flow and application transfer
US8155984B2 (en) Computerized method, apparatus and system for issuing surety bonds
US20090150169A1 (en) Document acquisition and authentication system
KR19980032287A (en) System for the electronic processing and processing of legal documents
US20130047221A1 (en) Method and apparatus for improved information transactions
US20030172035A1 (en) Method and system for managing software licenses
JP2003523582A (en) Method and apparatus for providing financial transaction data via the internet
US20130145426A1 (en) Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access
US20050038683A1 (en) System and method of international patent application
US8699053B2 (en) System and method for mobile printing from a desktop operating system using a portable computing device
US20110225623A1 (en) Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access
US7860801B2 (en) Tools for accessing digital works
WO2009042113A2 (en) Document acquisition &amp; authentication system
GB2434464A (en) Making a document available for printing once only
KR20010112029A (en) a contracting method for a insurance in on-line of internet
JP2002366757A (en) Document data distribution system and method, new invitation/sales/purchase system and method for security
EP1122677A2 (en) A transaction processing system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)