TWI258067B - Method of non-contact secure printing, and the network system, the printer and the workstation thereof - Google Patents

Method of non-contact secure printing, and the network system, the printer and the workstation thereof Download PDF

Info

Publication number
TWI258067B
TWI258067B TW94118111A TW94118111A TWI258067B TW I258067 B TWI258067 B TW I258067B TW 94118111 A TW94118111 A TW 94118111A TW 94118111 A TW94118111 A TW 94118111A TW I258067 B TWI258067 B TW I258067B
Authority
TW
Taiwan
Prior art keywords
printer
printing
portable device
item
code
Prior art date
Application number
TW94118111A
Other languages
Chinese (zh)
Other versions
TW200643758A (en
Inventor
Sterling Du
You-Yuh Shyr
Gary Wu
Richard Brayden
Original Assignee
O2Micro Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by O2Micro Inc filed Critical O2Micro Inc
Application granted granted Critical
Publication of TWI258067B publication Critical patent/TWI258067B/en
Publication of TW200643758A publication Critical patent/TW200643758A/en

Links

Landscapes

  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

A network comprises a printer, a plurality of workstations and a portable device. A user can execute or generate a print job on the workstation. The print job will be transferred to the printer through the network. The printer will not print the print job until the user brings portable device into proximity of printer.

Description

!258〇67 九、發明說明: 【發明所屬之技術領域】 方法及其 本發明係關於印表機,制係關於安 網路系統、印表機及工作站。 【先前技術】</ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> <RTIgt; [Prior Art]

(如掃描和複印功能)的多用途裝置。在—個典 工作裱境中,許多人都能無限制的接觸印文』 在印表機上而無人注意的情況常常發生。雖久 ,情形為可接受’然而當這些文件含有敏感、專有^ 息時(統稱機密性資料),就希望避免這種情形發生·;這3 ':下,該無人注意的已列印文件很容易被授權接近 : 未經授權接近該列印文件的人看到。 一 本發明提供—種可獲得安全形卩之方法及其網路系统、 印表機及工作站以滿足此等機密性資料之列印。該方法 =軟體與硬體之結合,當使用者希望在網路印表機上列印』 密性貧料時’刻印讀可被寫人—個安全位置,如網 服㈣硬碟機。當被授權之使用者實際出現在該網路印 旁’該被授權制者鱗印表機的__個外部接觸式ς入 裝置輸個特定身份碼,系統接著將該身份碼與待^ 件的授權碼相比較。若系統驗証該身份碼係對應至該文件 適當接收者’系統即允許列印該文件。藉此,由於網路印夺 機上热人注意的機密性資料可被減到最少,機密性資料得以 94ll8111.doc 5 上258〇67 獲得較好的保護。 入部方法需要在網路印表機上加 變網路印表機,難以適合現=產:接,式輸入裝置需要改 的機械外殼及/或在裝置上增加額外的:: 便谷納這些外部接觸式輸入裴置。 機。因此’需要—種能夠克服上述缺陷的列印系統或印表 【發明内容】 本發明之一目的,係提供一非 列印機密性料。特別言之,該=,機及方法:供 '非接觸式方法與一外部可攜二括杈組’其藉由 裝置的持有者_印該_^=_,喊賴可攜式 為達到上述目的,本發明接批一 該網路進-步包括複數個工作站和表機的網路。 送到=ft列印工作。該列印工作可經由網路傳 機^者絲柯似裝置到印表 性資==明:較佳實施例加以詳述,即列印機密 相反地,本=c限本發明僅為這些實施例。 由隨附之=範包圍:= I疋之本發明的精神與範圍内。 # 941l8Ul.d〇c 6 1258067 面二= 月以T的詳述’將鬧述許多特定細節以全 知識者庫聰明。細,本翻之鎌領域巾具有通常 避免、θn程序、元件和電路在此沒有詳述,以 避免化洧本發明之技術特徵。 【實施方式】 圖1係本發明-實施例之網路系統觸之方塊圖。該網 系、、先100包括一印表機102、複數個個人電腦或使用者工 :站104、1〇6···1〇8以及-個能使各部分相互通訊而交換訊 心及/或指令的伺服器110。該網路系統1〇〇内之各種裝置, 可經由各種通訊協定如網際網路協定(Internet Pr〇t〇c〇1,ιρ) 和傳輸控制協定(Transmission Control Protocol,TCP)而相 互通几。為簡明起見’只顯示二個工作站104、i〇6 i〇8, 但是該網路系統100可以有任何數量的工作站,其可使用印 表機102列印文件。 例如,在一實施例中,該網路系統1〇〇可以是一個區域 網路(local_area network,LAN),且使用者工作站 1〇4、 106...108,伺服器110和印表機102的裝置係耦接到LAN 的中樞而相互通訊。印表機102可以僅有列印功能,及/或可 以是一個還包括其他功能的多用途裝置,如掃描、複印、傳 真和/或電子郵件功能。 根據本發明之一實施例,網路系統1〇〇可配備有一個安 全列印軟體。根據本發明之一實施例,該安全列印軟體被安 裝在工作站104、106···1〇8中。或者,在另一實施例中,胎 94118111.doc 7 :1258067 安全列印軟體被安裝在伺服器110中。該安全列印軟體允許 與印表機102通訊以執行安全列印工作。 圖2係本發明一實施例之印表機1〇2之透視圖。該印表 機102包括一供列印的列印模組222和一電路板22〇,該電 路板220包括一個供控制該列印模組222的控制電路和複數 個插槽204、206、208。插槽204、206、208設計為接收-個特定模組。在一個實施例中,插槽2〇4、2〇6、2〇8為設置 成接收σ己丨思體模組的§己憶體插槽。例如,一記憶體模組可以 Φ 疋一個雙列直插式記憶體模組(dual in-line memory module, DIMM )。3 - ^憶龍組可以是—鮮列細式記憶體模組 • (single in_line mem〇ry module,SIMM)。耦接到該記憶體插 槽的記憶體模組通常具有—個特定尺寸和匹配外形,以使其 與相關插槽緊練合。例如,插槽篇可以是—個一般用於 印表機和桌上型電腦的100個金手指⑽·_)之以應插 槽。这些模組可被單獨安裝、替換或維修。—個記憶體模組 可以包括在-分離電路板上之—或多個隨機存取記憶體 (RAM)晶片。 根據本發明之-實施例,安全模組212配備有非接觸式 ,訊功能,以使當可攜式裝置m在接近印表機撤的特定 範圍内,安全模組212能與可攜式裝置218通訊。安全模組 212製成與-般模組(如記憶體模組)類似的尺寸以便能夠 與插槽施適當配合。網路系統1〇〇之使用者攜帶該可攜式 衣置218。安全板組212還包括一個與該可攜式裝置218通 訊的非接觸式通訊裝置216。 當使用者攜帶可攜式裝置218接近印表機1〇2時,安全 94118111.doc 8 1258067 模組212的非接觸式通訊裝置216檢測到該可攜式裝置 的存在及其身份。安全浙軟體接著可以―授權/識別碼檢測 該可攜式裝置218的身份,且考該可攜式裝置218的身份與 該授權識別碼匹配,則啟動列印機密性資料之列印工作。= 前所述,印表機1〇2具有與可攜式裝置⑽配合的安全模組 212,且安全列印軟體具有安全列印特性。 另外’應理解具有非接觸式通訊裝置216的安全模組212 可輕易在任何其他的印表機之電路板上的插槽上絲、,而使 • 該印表機具備安全列印功能’無需任何其他硬體變更。因 此,安全列印特性可以作為配件市場產品(aftermarketpr〇duct) . 出#,或可根獅定制者之訂單μ售具有安全列印特性 的印表機。故,本發明可避免外部接觸式輸人裝置裝配過程 之複雜性。 在本發明的一個實施例中,安全模組212的非接觸式通 訊裝置216可以是-個可併入標準尺寸記憶體模組(如 DIMM)的射頻(radio frequency,RF)讀取器 216_。當使 參 肖者攜帶可攜式裝置218接近印表機1〇2附近時,射頻讀取 态216a能夠經由與RF信號通訊而識別可攜式裝置及/ 或可攜式裝置218的相關朗碼。該系統的_體碼亦可以被 更新以藉由女全模組212的射頻讀取器2i6a讀取一個識 ,碼」㈣識別碼與-個機密性資料的授權碼相比較, 右该,別碼與該授權碼匹配,則允許列印該機密性資料。除 射頻讀取器216a之外,其他附帶特性也可增加到安全模組 212中。這些特性包括如加密(encrypti〇n)和解密0丨⑽) 特性等的安全特性。 94118111.doc 9 1258067 在本發明的某些實施例中,安全模組212中可放置一個 發送器(transmitter)及/或一接收器(receiver)。可攜式裝置218 包含其他配合裝置(發送器或接收器),俾使安同全模組犯 =可攜式裝置218間不需有裝置間的實體接觸即可進行通 根據本發明另一個貫施例,安全模組212包括發送哭與 接收器二者。安全模組212的發送器在一個已知頻率上^出' 。旬問仏號,可攜式裝置218設置為以-個代表識別資料的回 • 應信號以回應該詢問信號。安全模組212的接收器接著檢測 忒回應信號,並將該回應信號解碼,以判斷可攜式裝置 - 提供的識別資料。安全模組212中還可以包括一個天線,以 協助該詢問信號的發送以及該回應信號的接收。 圖3係本發明一實施例的之安全模組212a及可攜式裝 置218a之方塊圖。如圖2所示之印表機1〇2利用安全模組 212a,使得當可攜式裝置218a被使用者攜帶至印表機ι〇2 之一預定距離内,允許安全模組212a與可攜式裝置218a之 g| 間之進行非接觸式通訊。安全模組212a包括一天線308,如 50 〇hm 天線,一射頻識別(radio frequency identification, RFID )類比前端(anai〇g fr〇nt end,AFE )電路 3 ,一 微控 制器304,如8位元微控制器,以及一可執行多種加密和解 禮功犯的场可程式化閘陣列(field programmable gate array, FPGA) 306,如資料加密標準(Data Encryption Standard, DES )、咼級加密標準(Advanced Encryption Standard,AES ) 以及三重資料加密標準(Triple Des,3DES)。 可攜式裝置218a可以是一個併入一智慧卡並與RFID電 94118111.doc 10 1258067 路302配合的轉發器(transp〇nder)或標籤。可攜式裝置咖 包括-主動或被動標籤。主動標籤具備自己的電源(如—命 池),’並以規則的時間間隔傳輸信號。主動標籤之工作距ς 通常比被動標籤遠。娜賴沒有自己的魏,其係當遇 由RFID電路302的發送器產生的電磁場時被致動而產生— 回應吼號。可攜式裝置218a可以是一個非接觸式智絲卡 或是遵守或相容於包括麵43A &lt; 之 ISO(Intemati〇nal 〇rganization f〇r Standardizati〇n)標準戶 1 展之裝置。 圖3所不的安全模組2i2a可以結合即腳八即電路3〇2 -的RFID識別特性和具加密和解密功能之場可程式化閘陣列 306的安全特性。安全模組212a還可包括一個工作在特定頻 率(如13.56MHZ)的基地站和一個場調變開關。 根據本發明之一實施例之類比前端(AFE)電路3〇2可 以是供13·56ΜΗζ的RFID讀取器系統的一整合類比系統。 因為AFE電路302用途很多,故可用於具有不同副載波頻 ,率(sub-carrier frequency,如包括 212kHz 到 848kHz)的不同 RFID讀取系統,可覆蓋IS014443和IS015693的標準。安 全模組212a遵守或相容於IS015693的標準,因此安全模組 212a在可達約3公尺範圍内能夠檢測到可攜式裝置2i8a。 女全模組212a的RFID電路302可進一步包括一個積體電路 (1C)發送器,其可產生20mW的輸出功率至50 ohm (天 線),且能夠利用各種調變技術,包括振幅位移鍵控 (Amplitude_Shift Keying,ASK )和開關鍵控(〇n_〇ff Keying, OOK)數位調變技術。 94118111.doc 11 1258067 另外’圖4係本發明—實施例之工作站祕之 工作站104b包括一用以吝斗一 6入 鬼圖 生器404。本技術領域呈通常印工作之列印工作產 收、通^ 4者應— μ是在作靠統上執行的倾。當縣全列;= 被產生柃,工作站104b將要求 乍 ⑽相關的授權碼。例如 可攜式裝置 式知基士…… ”以衣置鳩是—個非接觸 广卡乍 具有一個通訊模組402,供經由射韻A multi-purpose device (such as scanning and copying functions). In the context of a code of work, many people have unrestricted access to the printed language. The situation of unattended on the printer often occurs. For a long time, the situation is acceptable. 'However, when these documents contain sensitive and proprietary information (collectively referred to as confidential information), it is hoped that this situation will be avoided. This 3 ':, the unattended printed document It is easy to be authorized to approach: People who are not authorized to access the printed document see it. The present invention provides a method of obtaining a secure form and its network system, printer and workstation to facilitate the printing of such confidential information. This method = the combination of software and hardware, when the user wants to print "dense" on the network printer, the engraving can be written to a safe location, such as a network (4) hard disk drive. When the authorized user actually appears next to the network print, the external contact type input device of the authorized printer scales enters a specific identity code, and the system then selects the identity code and the pending component. The authorization codes are compared. If the system verifies that the identity code corresponds to the appropriate recipient of the file, the system allows printing of the file. In this way, the confidential information that is noticed by the hotspots on the network printer can be minimized, and the confidential information can be better protected by 258〇67 on the 94ll8111.doc 5 . The entry method requires a network printer to be added to the network printer. It is difficult to adapt to the current production: the input device needs to be changed to the mechanical housing and/or additional on the device:: Contact input device. machine. Therefore, there is a need for a printing system or a printing sheet capable of overcoming the above-mentioned drawbacks. SUMMARY OF THE INVENTION One object of the present invention is to provide a non-printing confidential material. In particular, the =, machine and method: for the 'non-contact method and an external portable two-framed group', which is achieved by the holder of the device_印该_^=_ For the above purpose, the present invention advances the network to include a network of a plurality of workstations and a watch machine. Send to = ft print job. The printing work can be carried out via the network transmission device to the printing material == Ming: The preferred embodiment is described in detail, that is, the printing confidentiality is reversed, and the present invention is only the implementation of the present invention. example. Surrounded by the accompanying = 范: = I疋 within the spirit and scope of the present invention. # 941l8Ul.d〇c 6 1258067 Face 2 = Month with the details of T' will be a lot of specific details to the knowledge base of the library. Thin, the field of the field has a general avoidance, θn procedures, components and circuits are not detailed here to avoid degrading the technical features of the present invention. [Embodiment] FIG. 1 is a block diagram of a network system of the present invention-embodiment. The network system, the first 100 includes a printer 102, a plurality of personal computers or user workers: stations 104, 1〇6···1〇8 and - can enable the various parts to communicate with each other to exchange the heart and/or Or the server 110 of the instruction. The various devices in the network system can communicate with each other via various communication protocols such as Internet Protocol (Internet Protocol) and Transmission Control Protocol (TCP). For the sake of simplicity, only two workstations 104, i〇6 i〇8 are shown, but the network system 100 can have any number of workstations that can print documents using the printer 102. For example, in an embodiment, the network system 1 may be a local area network (LAN), and the user workstations 1〇4, 106...108, the server 110, and the printer 102 The devices are coupled to the hub of the LAN to communicate with each other. Printer 102 may have only a printing function and/or may be a multi-purpose device that also includes other functions, such as scanning, copying, faxing, and/or email functions. According to an embodiment of the invention, the network system 1 can be equipped with a secure printing software. According to an embodiment of the invention, the secure printing software is installed in the workstations 104, 106...1. Alternatively, in another embodiment, the tire 94118111.doc 7 : 1258067 security printing software is installed in the server 110. The secure printing software allows communication with the printer 102 to perform secure printing operations. Figure 2 is a perspective view of a printer 1 2 according to an embodiment of the present invention. The printer 102 includes a printing module 222 for printing and a circuit board 22, the circuit board 220 includes a control circuit for controlling the printing module 222 and a plurality of slots 204, 206, 208. . Slots 204, 206, 208 are designed to receive a particular module. In one embodiment, the slots 2〇4, 2〇6, 2〇8 are § recall slots that are configured to receive the sigma module. For example, a memory module can be Φ a dual in-line memory module (DIMM). 3 - ^ Yilong group can be - fresh in-line memory module (single in_line mem〇ry module, SIMM). A memory module coupled to the memory slot typically has a particular size and matching profile to enable it to be tightly coupled to the associated slot. For example, a slot article can be a slot for 100 gold fingers (10)·_) that are typically used for printers and desktops. These modules can be installed, replaced or repaired separately. A memory module can be included on the - separate circuit board - or a plurality of random access memory (RAM) chips. According to the embodiment of the present invention, the security module 212 is equipped with a non-contact type, so that the security module 212 can be connected to the portable device when the portable device m is within a certain range close to the printer. 218 communication. The security module 212 is sized to resemble a conventional module (e.g., a memory module) to enable proper mating with the socket. The portable device 218 is carried by the user of the network system. The security board set 212 also includes a contactless communication device 216 that communicates with the portable device 218. When the user carries the portable device 218 to the printer 1〇2, the contactless communication device 216 of the security module 94118111.doc 8 1258067 detects the presence and identity of the portable device. The security software can then detect the identity of the portable device 218 by using an authorization/identification code, and if the identity of the portable device 218 matches the authorization identification code, the printing of the printed confidentiality information is initiated. = As mentioned earlier, the printer 1〇2 has a security module 212 that cooperates with the portable device (10), and the security printing software has secure printing characteristics. In addition, it should be understood that the security module 212 having the contactless communication device 216 can be easily threaded on the slots of any other printer's circuit board, so that the printer has a secure printing function. Any other hardware changes. Therefore, the safe printing feature can be used as an aftermarket product (aftermarketpr〇duct). #, or the order of the lion's custom maker, to sell a printer with safe printing characteristics. Therefore, the present invention can avoid the complexity of the assembly process of the external contact input device. In one embodiment of the invention, the contactless communication device 216 of the security module 212 can be a radio frequency (RF) reader 216_ that can be incorporated into a standard size memory module (such as a DIMM). When the viewer is brought to the vicinity of the printer 1 2 by the portable device 218, the radio frequency read state 216a can identify the relevant device and/or the associated device 218 via communication with the RF signal. . The _ body code of the system can also be updated to read an identification code by the RF reader 2i6a of the female full module 212, and the (4) identification code is compared with the authorization code of the confidential information, right, not The code matches the authorization code, allowing the confidential information to be printed. In addition to the RF reader 216a, additional features can be added to the security module 212. These features include security features such as encryption (encrypti〇n) and decryption 0丨(10). 94118111.doc 9 1258067 In some embodiments of the invention, a transmitter and/or a receiver may be placed in the security module 212. The portable device 218 includes other matching devices (transmitters or receivers), so that the same module can be used. The portable device 218 can be connected to the portable device 218 without physical contact between the devices. As an example, the security module 212 includes both a send cry and a receiver. The transmitter of the security module 212 is 'on a known frequency'. In the nickname, the portable device 218 is set to represent the response signal of the identification data to return the inquiry signal. The receiver of the security module 212 then detects the 忒 response signal and decodes the response signal to determine the identification data provided by the portable device. The security module 212 can also include an antenna to assist in the transmission of the interrogation signal and the receipt of the response signal. 3 is a block diagram of a security module 212a and a portable device 218a in accordance with an embodiment of the present invention. The printer 1 2 shown in FIG. 2 utilizes the security module 212a such that when the portable device 218a is carried by the user to a predetermined distance of the printer ι 2, the security module 212a and the portable module are allowed to be carried. Non-contact communication between g| of device 218a. The security module 212a includes an antenna 308, such as a 50 〇hm antenna, a radio frequency identification (RFID) analog front end (AFE) circuit 3, and a microcontroller 304, such as 8 bits. A meta-controller, and a field programmable gate array (FPGA) 306 that can perform a variety of encryption and ritual tasks, such as Data Encryption Standard (DES), Advanced Encryption Standard (Advanced) Encryption Standard, AES) and Triple Data Encryption Standard (3DES). The portable device 218a can be a transponder or tag that incorporates a smart card and cooperates with the RFID device 94118111.doc 10 1258067. Portable devices include - active or passive tags. Active tags have their own power source (eg, a lifetime), and transmit signals at regular intervals. The working distance of the active tag is usually farther than the passive tag. Nalai does not have her own Wei, which is activated when the electromagnetic field generated by the transmitter of the RFID circuit 302 is activated - responding to the nickname. The portable device 218a may be a non-contact smart card or a device that complies with or is compatible with the ISO (Intemati〇nal 〇rganization f〇r Standardizati〇n) standard that includes the face 43A &lt; The security module 2i2a shown in Fig. 3 can combine the RFID identification characteristics of the pin 8, that is, the circuit 3〇2, and the security features of the field programmable gate array 306 with encryption and decryption functions. The security module 212a may also include a base station operating at a particular frequency (e.g., 13.56 MHz) and a field modulation switch. An analog front end (AFE) circuit 3〇2 in accordance with an embodiment of the present invention can be an integrated analog system for a 13.56 inch RFID reader system. Because the AFE circuit 302 has many uses, it can be used in different RFID reading systems having different sub-carrier frequencies (including 212 kHz to 848 kHz), covering the standards of IS014443 and IS015693. The security module 212a complies with or is compatible with the standard of IS015693, so the security module 212a is capable of detecting the portable device 2i8a up to about 3 meters. The RFID circuit 302 of the female full module 212a may further include an integrated circuit (1C) transmitter that can generate 20 mW of output power to 50 ohms (antenna) and can utilize various modulation techniques, including amplitude shift keying ( Amplitude_Shift Keying, ASK) and on-key control (〇n_〇ff Keying, OOK) digital modulation technology. 94118111.doc 11 1258067 In addition, FIG. 4 is a workstation of the present invention - the workstation workstation 104b includes a bucket hopper 404. The technical field in the field of printing work in the normal printing work, the pass should be - on the basis of the implementation of the tilt. When the county is full; = is generated, workstation 104b will require 乍 (10) associated authorization code. For example, the portable device type knows Keith... "The clothing is set to be a non-contact. The card has a communication module 402 for the rhyme.

域與可攜式裝置鳩經由射頻信號通訊,並且獲= 该可攜式裝置218b的識別碼。所接收的 又 識別碼將猶為授權碼。嫌權碼將在 祕 碼模組傷巾與安全形卩工雜合,岐安㈣印j = =达咖㈣議。接著,當制麵帶可攜式裝置2⑽ 表機搬附近時,可攜式裝置咖的識別碼將 表機l〇2b接收,並且發送給伺服器11%。伺服器丨丨此之— 比較器412將接收的之識別碼與該安全列印工作的之授 相比較’若接收的識別碼係對應至該授權 ^二 列印工作。這種情況下,沒村赋裝置218bj== ^亥安全列印安全工作。或者,使用者可以輸人或鍵入與可 攜式裝置218識別碼相關的授權碼。 根據本發明的另-實施例,當使用者登入至網路 100,網路系、統1〇〇將識別該使用者。安全軟體有一授權碼 列表’其與被授權使用者的可攜式裝置218的識別碼 聯。當使用者產生-安全列印1作時,該安全列印工作 送到印表機丨〇2。直到錢者攜帶可攜式U⑽接表 機102,且可攜式裝f 218的識別碼與該列表中一個ς 9411811 l.doc 12 1258067 ,才會列印該安全列印工作。換言之,在這種情況下, 機⑽將細1經授叙者雌安全前工作。 =5係本發明—實施例之安全列印方法之流程圖。 田使用網路中—個工作站列印機密性資料時’ &quot;^作站執彳了該列印命令。該J1伽將該機密性資 撫。J /工^直接或經由該網路的一個伺服器傳送給印表 牛驟51= ’、使用者攜帶可攜式裝制印表機附近。在 機iii 非接觸方式(如处信號)與印表 置的_碼將婦送至安全模組。在步 斷兮崔式裝置的識別碼與—個授權碼相比較,以判 气二二丨㈣識別瑪是否與該授權碼一致。若該可攜 ^衣置的朗碼與娜碼不-致,_步驟520停止列印。 右一致’則進行到步驟518允許列印該安全列印工作。 在-個實_中,在步驟5ω,產生— 印 別::二列印工作上。在步驟516,該可攜式裝置的該識 ^ 碼比較’以供判斷是否允許列印該安全列印工 雖然:之前的描述以及_說明了本發明的較佳實施 列’但應轉在並不雜由_之申料 之 :明:神與本質範圍的,可進行各種增加、修改及替 項技術領域具通常知識者應理解,本發明可 =、=、排列、比例、材料、⑽、組件或其他方面之修 改-起使用,尤其適用在特定環境下和特 / 本發明,這些都不雜本發明的實質。因此= 9411811 l.doc 13 1258067 知例在各方面均應僅作為本發明範圍例示性而 說明,本發明之範圍係由附屬的申請專利範圍及_其1^制性的 等物表示,並不偈限於之前的描述。 /、σ去的均 【圖式簡單說明】 圖丨係本發明一實施例之網路系統之方塊圖。 圖2係本發明一實施例之印表機之透視圖。The domain communicates with the portable device via the radio frequency signal and obtains the identification code of the portable device 218b. The received identification code will still be the authorization code. The sinister code will be mixed in the secret module and the safety form, and the 岐安(四)印j ==达咖(四). Then, when the face-band portable device 2 (10) is moved nearby, the identification code of the portable device is received by the watch machine 1〇2b and sent to the server 11%. The server does this - the comparator 412 compares the received identification code with the grant of the secure print job' if the received identification code corresponds to the authorization print job. In this case, no village equipment 218bj == ^ Hai safe printing security work. Alternatively, the user can enter or type in an authorization code associated with the identification code of the portable device 218. In accordance with another embodiment of the present invention, when a user logs into the network 100, the network system will identify the user. The security software has an authorization code list 'which is associated with the identification code of the portable device 218 of the authorized user. When the user produces - Secure Print 1, the secure print job is sent to the printer 丨〇 2. The secure print job will not be printed until the money carrier carries the portable U(10) docking machine 102 and the portable identification code of the 218 and the ς 9411811 l.doc 12 1258067 in the list. In other words, in this case, the machine (10) will work fine before the fine 1 narrator. = 5 is a flow chart of the secure printing method of the present invention - the embodiment. When the field used the network to print confidential information, the station &lt;^ station executed the print order. The J1 gamma will pay for the confidentiality. The J/Work^ is transmitted directly or via a server of the network to the printer 51=, and the user carries the portable printer near the printer. The machine iii non-contact mode (such as the signal) and the printer's _ code will be sent to the security module. The identification code of the step-by-step Cui-type device is compared with the authorization code to determine whether the horse is consistent with the authorization code. If the code of the portable device is not the same as the code, the step 520 stops printing. Right consistent' then proceeds to step 518 to allow printing of the secure print job. In a real _, in step 5ω, the production - printing:: two printing work. In step 516, the identification of the portable device is compared 'for the purpose of determining whether to permit printing of the security printer. Although: the previous description and the description of the preferred embodiment of the present invention, but should be transferred to The invention is not limited to: the scope of the gods and the nature, can be various additions, modifications and alternatives. Those skilled in the art should understand that the invention can be =, =, permutation, proportion, material, (10), Modifications of the components or other aspects, which are used in particular, in particular circumstances and in particular, are not to be construed as a limitation. Therefore, the invention is intended to be illustrative only in all respects, and the scope of the invention is indicated by the scope of the appended claims and the equivalents thereof.偈 is limited to the previous description. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a network system according to an embodiment of the present invention. Figure 2 is a perspective view of a printer according to an embodiment of the present invention.

圖3係本發明一實施例之安全模組及可攜式裝置之方塊 圖4係本發明一實施例之工作站之方塊圖。 ‘ 圖5係本發明一貫施例之安全列印方法之流程圖。 【主要元件符號說明】 100 :網路系統 1〇2 :印表機 102b :印表機 104 =工作站 104b :工作站 106 :工作站 108 =工作站 110 :伺服器 110b ··伺服器 2 04 .插槽 206 :插槽 208 :插槽 212 ··安全模組 94118111.doc 14 1258067 212a :安全模組 216 :非接觸式通訊裝置 216a :射頻讀取器 218 :可攜式裝置 218a :可攜式裝置 218b :可攜式裝置 220 :電路板 222 :列印模組 302 :射頻識別類比前端電路 304 :微控制器 - 306 :場可程式化閘陣列 308 :天線 402 ·•通訊模組 404 :列印工作產生器 406 :授權碼模組 412 :比較器 94118111.doc 153 is a block diagram of a security module and a portable device according to an embodiment of the present invention. FIG. 4 is a block diagram of a workstation according to an embodiment of the present invention. </ RTI> Figure 5 is a flow chart of a secure printing method consistent with the embodiments of the present invention. [Main component symbol description] 100: Network system 1〇2: Printer 102b: Printer 104 = Workstation 104b: Workstation 106: Workstation 108 = Workstation 110: Server 110b · Server 2 04. Slot 206 : slot 208: slot 212 · security module 94118111.doc 14 1258067 212a: security module 216: contactless communication device 216a: radio frequency reader 218: portable device 218a: portable device 218b: Portable device 220: circuit board 222: printing module 302: radio frequency identification analog front end circuit 304: microcontroller - 306: field programmable gate array 308: antenna 402 · • communication module 404: printing work generated 406: Authorization Code Module 412: Comparator 94118111.doc 15

Claims (1)

1258067 、申請專利範圍: 1· 一種安全列印之網路系统,包括·· 至少一工作站,用以產生一列印工作; 一印表機,耦接至該至少一工作站;以及 一可攜式裝置,用以與該印表機通訊;复中 直到該可攜式裝置提供該印表機列印該列印 權時,才列印該列印工作。 &lt;棱 2.如,求項第i項之網路系統,其中該印表 置之間的距離在—個預定距離内,才列 3·如請f項第1項之網路系、统,其中該印表機直到識㈣ 可拓式裝置時,才列印該列印工作。 μ 其中該,_) ^衣置通訊,以便獲得該可才崔式梦署2 一識別碼,以識別該可攜式裝置。 ^ 5_如 奴網路“,其中當該可攜絲置之該 6. 如括月求項帛丨項之網路系統,其中該印表機進—步包 一電路板,具有一插槽;以及 槽’並與該可攜式裝置通訊, 7. Τ二第慧1卡項之網路系統’其中該可攜式裝置為一非 8·如請求項第丨項之網路纽,1 表機之通訊遵守麵43Α與_693^中與^印 94118111.doc U58〇67 9·如請求項第1項之網路系統,進—步包括. :安全列印軟體’㈣朗財攜 作,俾授權該列印工作。 /、及列印工 1〇.=求稱!項之網路系統,其中該可 11. 射頻信號與該印表機通訊。 衣置!由 ‘種安全列印之印表機,包括·· '列印模組,用以列印; 電路板,具有至少n _ 以控制該列印模組;以及 要α印拉組,用 至:中電路板之該插槽,用以與-外 攜式裝置,俾允許該列印模組進 12·如請求項S 11項之印表機,其中兮 可職置通訊’以獲得該可攜二=頻 ,:碼’且若該可攜式裝置之該識別碼與—預 13 =^致時’該印表機允許列印該列扣作疋之授 •如明求項第11項之印表機,其中 炎 接觸式智慧卡。 口同式衣置為一非 第11項之印表機,其中該電路板之該插槽為 一e憶體插槽。 15. =請求=第12項之印表機,進—步包括: 1“ ^乂态,用以比較該識別碼與該預定之授權碼。 16. =晴求項第12項之印表機,進—步包括: =碼核組’用以產生與該識別碼相關之該預定之 孜^權碼。 17· 一種安全列印之方法,包括: 94118111.doc 2 1258067 產生一列印工作; 指定一授權碼至該列印工作; 使該授權碼與一可攜式裝置之一識別碼相關聯,以授 權列印該列印工作; 將該具有該授權碼之列印工作傳送至一印表機;以 及 使該印表機與該可攜式裝置通訊,並識別該可攜式裝 置5當該可攜式裝置被識別為授權時’允許列印該列 印工作。 麵&gt; 18.如請求項第17項之方法,其中該列印工作係經由一網 路傳送至該印表機。 • 19.如請求項第17項之方法,其中該可攜式裝置為一非接 觸式智慧卡。 20. 如請求項第17之方法,其中該可攜式裝置係經由一射 頻(RF)信號與該印表機通訊。 21. 如請求項第17項之方法,其中在識別步驟中進一步包 括: 在該可攜式裝置與該印表機之間建立通訊; • 從該可攜式裝置獲得該識別碼;以及 將從該可攜式裝置獲得之該識別碼與該列印工作之該 授權碼相比較,其中當該識別碼與該授權碼一致時, 該列印工作被授權。 22. 如請求項第21項之方法,其中該列印工作被授權時, 列印該列印工作。 23. —種產生一列印工作至一印表機之安全列印工作站, 包括: 一列印工作產生器,用以產生一列印工作; 94118111.doc 3 1258067 該可攜5:置:以與-外部可攜式裝置、甬 ^€# 碼’並將該列 生上该識刿碼 部印表機,其中…亥㈣媽吻結合後傳送至= 當該可攜式襄置與該印 可攜式裳置被該授權 二預定距離内,且該 該列印工作。 ^該印表機才列印 24.如請求項第23項之工你# ^ -安全模組,用以與該可攜式、中▲亥:表機更包含: 攜式裝置之該識別碼;及 又置通吼,並接收該可 一比較器,用以比較該可攜 印工作之該授權碼;其中 之忒硪別碼與該列 該列印工作經過一網路被傳送至該 機於該可攜式裝置之該識別碼與該列印夂 碼一致時,才列印該列印工作。 μ杈柄 # 94118111.doc 41258067, the scope of patent application: 1. A secure printing network system, comprising: at least one workstation for generating a printing job; a printer coupled to the at least one workstation; and a portable device For communicating with the printer; the printing operation is not printed until the portable device provides the printer to print the printing right. &lt;Edge 2. For example, the network system of item i, wherein the distance between the printers is within a predetermined distance, and is listed in the network system of item 1 of item f. The printer does not print the print job until it recognizes the (4) extension device. μ where, _) ^ clothing communication, in order to obtain the identification code to identify the portable device. ^ 5_如奴网络", where the portable wire is placed in the network system, such as the monthly system of the item, wherein the printer enters a circuit board with a slot And the slot 'and communicate with the portable device, 7. The network system of the second hui 1 card item', wherein the portable device is a non-8·such as the network item of the request item, 1 The communication of the watch machine complies with the face 43Α and _693^中与印印94118111.doc U58〇67 9·If the network system of the first item of the request, the step includes: : security printing software '(4) , 俾 authorize the printing work. /, and print workers 1 〇. = claim! The network system of the item, which can be 11. RF signal communication with the printer. Clothing! by 'safe print The printer includes a printing module for printing; a circuit board having at least n _ to control the printing module; and an alpha printing group for: the insertion of the middle circuit board a slot for the external-carrying device, allowing the printing module to enter the printer of the item S11, wherein the device can be used to obtain the portable two-frequency ,: code 'and if the identification code of the portable device and - pre 13 = ^ when the printer allows printing of the column of the button for the application of the 11th item of the printer The inflammatory contact smart card. The cloak is a non-11th printer, wherein the slot of the circuit board is an e-memory slot. 15. = request = the 12th item The watch machine, the step further includes: 1 " ^ , state, for comparing the identification code with the predetermined authorization code. 16. The printer of item 12 of the second aspect of the invention, wherein: the code group is used to generate the predetermined weight code associated with the identification code. 17. A method of secure printing, comprising: 94118111.doc 2 1258067 generating a print job; designating an authorization code to the print job; associating the authorization code with an identification code of a portable device to authorize Printing the printing job; transmitting the printing operation with the authorization code to a printer; and communicating the printer with the portable device, and identifying the portable device 5 as the portable device When the device is recognized as authorized, it is allowed to print the print job. 18. The method of claim 17, wherein the printing operation is transmitted to the printer via a network. 19. The method of claim 17, wherein the portable device is a non-contact smart card. 20. The method of claim 17, wherein the portable device communicates with the printer via a radio frequency (RF) signal. 21. The method of claim 17, wherein the identifying step further comprises: establishing communication between the portable device and the printer; • obtaining the identification code from the portable device; The identification code obtained by the portable device is compared with the authorization code of the printing operation, wherein the printing operation is authorized when the identification code is consistent with the authorization code. 22. In the method of item 21 of the claim, wherein the printing job is authorized, the printing job is printed. 23. A secure printing workstation that produces a print job to a printer, comprising: a print job generator for generating a print job; 94118111.doc 3 1258067 the portable 5: set: to and from - external Portable device, 甬^€# code' and the column is born to the identification code department printer, wherein... Hai (four) mother kiss combined and transmitted to = when the portable device and the printed portable The authorization is within a predetermined distance of the authorization, and the printing operation is performed. ^The printer is only printed 24. If you request the 23rd item of the request, you can use the #^-security module to communicate with the portable and medium-sized: the watch: And receiving the same, and receiving the comparator for comparing the authorization code of the portable printing work; wherein the screening code and the column of the printing work are transmitted to the machine through a network The printing operation is printed when the identification code of the portable device is consistent with the printing weight. μ杈 handle # 94118111.doc 4
TW94118111A 2004-06-02 2005-06-02 Method of non-contact secure printing, and the network system, the printer and the workstation thereof TWI258067B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US57617104P 2004-06-02 2004-06-02

Publications (2)

Publication Number Publication Date
TWI258067B true TWI258067B (en) 2006-07-11
TW200643758A TW200643758A (en) 2006-12-16

Family

ID=37765154

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94118111A TWI258067B (en) 2004-06-02 2005-06-02 Method of non-contact secure printing, and the network system, the printer and the workstation thereof

Country Status (2)

Country Link
CN (1) CN100468278C (en)
TW (1) TWI258067B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544440A (en) * 2012-07-16 2014-01-29 东友科技股份有限公司 Confidentiality printing method
TWI479429B (en) * 2012-07-16 2015-04-01 Teco Image Sys Co Ltd Security printing method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102810136B (en) * 2011-06-01 2015-09-02 鸿富锦精密工业(深圳)有限公司 Safe printing method
JP5950691B2 (en) 2012-02-09 2016-07-13 シャープ株式会社 Information processing system, information processing apparatus, and communication connection method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544440A (en) * 2012-07-16 2014-01-29 东友科技股份有限公司 Confidentiality printing method
TWI479429B (en) * 2012-07-16 2015-04-01 Teco Image Sys Co Ltd Security printing method
CN103544440B (en) * 2012-07-16 2016-04-20 东友科技股份有限公司 Secure printing method

Also Published As

Publication number Publication date
TW200643758A (en) 2006-12-16
CN1985227A (en) 2007-06-20
CN100468278C (en) 2009-03-11

Similar Documents

Publication Publication Date Title
US20050270567A1 (en) Non-contact secure printing
US8605903B2 (en) System, device, and method for wireless communication, apparatus and method for processing information from contactless IC cards
US9773133B2 (en) RFID tag and reader characteristic determination using group keys
US20170277991A1 (en) Dual transponder radio frequency identification
EP1488653B1 (en) Apparatus, method and system for authentication
EP1170694B1 (en) Identification code management method and system
US7706778B2 (en) System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
US10650202B1 (en) Enhanced RFID tag authentication
EP2038807B1 (en) Method, rfid reader, rfid tag and rfid system for secure communication
EP2392078B1 (en) Smartcard protocol transmitter
CN107886276B (en) Coded information reading terminal with article positioning function
JP2007066316A5 (en)
US9607286B1 (en) RFID tags with brand protection and loss prevention
US20080048036A1 (en) Contactless Ic Chip Reader/Writer
US8831220B2 (en) Processing module operating methods, processing modules, and communications systems
KR101157541B1 (en) The system of issuing a p2p coupon and method thereof
TWI258067B (en) Method of non-contact secure printing, and the network system, the printer and the workstation thereof
EP4042397B1 (en) Methods and apparatuses for removing a security tag
CN102790676A (en) Remote identity identification or security method utilizing mobile phone with near field communication (NFC) function
US9819660B2 (en) Systems and methods for document authentication
EP1713205B1 (en) Controlling connectivity of a wireless smart card reader
RU182969U1 (en) CRYPOGRAPHIC METER READER
Yamada et al. Secure active RFID tag system
JP2003317072A (en) Tag, authenticating device and computer program
JP2003296682A (en) Non-contact ic card system

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees