US20190303062A1 - Print job route based on context data - Google Patents
Print job route based on context data Download PDFInfo
- Publication number
- US20190303062A1 US20190303062A1 US15/942,146 US201815942146A US2019303062A1 US 20190303062 A1 US20190303062 A1 US 20190303062A1 US 201815942146 A US201815942146 A US 201815942146A US 2019303062 A1 US2019303062 A1 US 2019303062A1
- Authority
- US
- United States
- Prior art keywords
- computing device
- printing device
- network
- print job
- printing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1285—Remote printer device, e.g. being remote from client or server
- G06F3/1287—Remote printer device, e.g. being remote from client or server via internet
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1229—Printer resources management or printer maintenance, e.g. device status, power levels
- G06F3/1231—Device related settings, e.g. IP address, Name, Identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1236—Connection management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1238—Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1292—Mobile client, e.g. wireless printing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Definitions
- Print documents are often used to present information.
- printed documents continue to be used despite the availability of electronic alternatives as they are more easily handled and read by users. Accordingly, the generation of printed documents remains an important tool for the presentation and handling of information.
- Printers are known and have been used to generate documents based on information received via a network.
- FIG. 1 is a block diagram of an example apparatus
- FIG. 2 is a flowchart of an example of a method
- FIG. 3 is a block diagram of another example apparatus
- FIG. 4 is a schematic view of an implementation of the apparatus of FIG. 1 ;
- FIG. 5 is a schematic view of another implementation of the apparatus of FIG. 1 .
- Print documents may be widely accepted and may often be more convenient to use.
- printed documents are easy to distribute, store, and be used as a medium for disseminating information.
- printed documents may serve as contingency for electronically stored documents, such as may happen when an electronic device fails, such as with a poor data connection for downloading the document and/or a depleted power source.
- documents are often generated at a printing device based on data received from a computing device. If the user generating the document is not in the vicinity of the printing device, the document may be generated and left at the printing device until collected by the user. It is to be appreciated that this may present a security problem as the document is left unattended for a period of time. This may be especially a concern in an environment where multiple printing devices are provided such that a document may be generating by a printing device in error and the document never picked up by the user.
- a solution to address the security concern is to implement pull printing where a print job is held in a print queue until a user is physically present at the printing device where the document is to be generated.
- the user may be authenticated using various means, such as by entering a personal identification number into the printing device, a username and password, or with an identification card, badge, or biometric authentication method.
- the print job is retrieved or “pulled” from the print queue and the document is generated by the printing device.
- pull printing provides additional security to reduce the likelihood of a document to be obtained by an unauthorized party
- pull printing may be an impediment to productivity as users spend additional time authenticating as well as waiting for the document to be generated by the printing device.
- the apparatus 10 may include additional components, such as various additional interfaces and/or input/output devices such as displays to interact with a user or an administrator of the apparatus 10 .
- the apparatus 10 is to receive a print job from the network, such as from a portable computing device, and to transmit the print job to a printing device.
- the apparatus 10 includes a network interface 15 , a memory storage unit 20 , and a processor 25 .
- the processor 25 may be to operate a security evaluation engine 30 and a print engine 35 as well as carry out a set of instructions associated with an operating system.
- the network interface 15 is to communicate with a network such as a wired or wireless network which may include a cellular network.
- the network interface 15 is to receive print data, which may represent a print job, and context data via the network.
- the print data and the context data are associated with a portable computing device.
- the print data may be generated by the portable computing device and received at the network interface 15 via the network.
- the print data may be generated at another device associated with the portable computing device.
- the other device may be a workstation or personal computer of a user that owns the portable computing device, such as a smartphone.
- the context data may be provided by the portable computing device and may provide information such as the location of a user.
- the context data may also be generated and provided by other computing devices, such as a workstation or personal computer.
- the portable computing device may be used to provide the location of the user.
- the context data may change over time and updated context data may be received periodically.
- the portable computing device may be equipped with global positioning system locating services or may be capable of communication with locating devices such as a Bluetooth Low Energy beacon.
- the context data may include a network identifier, such as the identifier of the secure network, to indicate that the portable computing device is connected to a secure network.
- the context data may also include other information about a user such as a security clearance level or an authorization period for a specific network.
- Context data may also include the time of day, business hours, calendar information from the portable computing device, and security metadata associated with the print data.
- the memory storage unit 20 is coupled to the processor 25 and may include a non-transitory machine-readable storage medium that may be any electronic, magnetic, optical, or other physical storage device.
- the memory storage unit 20 stores the print data received at the network interface 15 as well as the context data received at the network interface 15 .
- the non-transitory machine-readable storage medium may include, for example, random access memory (RAM), electrically-erasable programmable read-only memory (EEPROM), flash memory, a storage drive, an optical disc, and the like.
- the memory storage unit 20 may also be encoded with executable instructions to operate the network interface 15 and other hardware in communication with the processor 25 .
- the memory storage unit 20 may be substituted with a cloud based storage system.
- the memory storage unit 20 may also store an operating system that is executable by the processor 25 to provide general functionality to the apparatus 10 , for example, functionality to support various applications such as a user interface to access various features of the apparatus 10 .
- operating systems include WindowsTM, macOSTM, iOSTM, AndroidTM, LinuxTM, and UnixTM.
- the memory storage unit 20 may additionally store applications that are executable by the processor 25 to provide specific functionality to the apparatus 10 , such as those described in greater detail below.
- the memory storage unit 20 also includes a database 100 to store information relating to a plurality of printing devices.
- the database 100 may include a list of the printing devices along with an identifier for each printing device, such as a media access control address, as well as characteristics of each printing device, such as duplex capabilities, color printing capabilities, and other finishing options.
- the database 100 may include information on the location of the printing device and whether the printing device may be part of a secure network.
- Other data included in the database 100 may be additional characteristics of the printing device, such as status of the printing device, printing speed, duty cycle, paper capacity, amount of paper, amount of ink, current print queue status, cost per page, number of pages left on a contract, whether the printing device is on a metered connection (e.g., a cellular connection on which data may have associated cost), and device ownership.
- a metered connection e.g., a cellular connection on which data may have associated cost
- the memory storage unit 20 may also store additional executable instructions for the operation of the apparatus 10 .
- the executable instructions may include a set of instructions for the processor 25 to run in order to operate the security evaluation engine 30 and/or the print engine 35 .
- the processor 25 may include a central processing unit (CPU), a microcontroller, a microprocessor, a processing core, a field-programmable gate array (FPGA), or similar.
- the processor 25 and memory storage unit 20 may cooperate to execute various instructions.
- the processor 25 also maintains and operates a security evaluation engine 30 to determine if a printing device is in a secure environment, such as when the printing device and the portable computing device are connected via a secure network.
- the secure network is not particularly limited and may be determined using the context data received at the network interface 15 .
- the secure network may be wired or wireless.
- the local area network may be an example of a secure network.
- the processor 25 also maintains and operates a print engine 35 to route a print job generated from the print data to a printing device.
- the print engine 35 automatically routes the print job to the printing device when the printing device and the portable computing device are connected via a secure network.
- the secure network may be a private local area network in some examples.
- the secure network may be a direct connection between the portable computing device and the printing device, such as via a Bluetooth connection to indicate that the user and is close enough to the printing device to collect the document after it is generated.
- the print job is stored in a queue.
- the processor 25 may execute instructions stored on the memory storage unit 20 to implement the security evaluation engine 30 and the print engine 35 and to handle and manage the print jobs across a network.
- the security evaluation engine 30 may be substituted with an external engine, such as another server or machine.
- the security evaluation engine 30 may be substituted with an external engine, such as from a software as a service provider specializing in the security management for an organization.
- the print engine 35 may be substituted with an external engine, such as another server or machine.
- Such examples may be common in larger systems where a single server or machine may not be able to process the print jobs and still carry out the functions of the apparatus 10 in a reasonable manner.
- the processor 25 is also to control the network interface 15 .
- the processor 25 may send instructions to the network interface 15 to receive the print data and the context data.
- the processor 25 is to monitor the context data received associated with the portable computing device.
- the processor 25 may periodically send requests to the portable computing device to request an update for the context data.
- the portable computing device may automatically send updates in the context data to the apparatus 10 . It is to be appreciated that such examples may reduce the amount of data transmitted between the portable computing device to conserve energy and prolong battery life. Accordingly, the portable computing device may only send updated context data when a substantial change such as a large change in location or if the portable computing device connects with a different network.
- the threshold for what may be considered a substantial change is not particularly limited and may be set based on various factors.
- the processor 25 is also to select a printing device from the database 100 of printing devices based on the context data received from the portable computing device via the network interface 15 .
- the manner by which the processor 25 selects the printing device is not limited and may include analyzing the context data, such as location data, to determine the nearest printing device to the location of the portable computing device.
- the processor 25 may delay the selection of the printing device until the portable computing device is within a threshold distance of a printing device.
- the processor 25 may present an option on a user interface of the portable computing device in some examples or may further evaluate the context data to make a selection.
- the context data may include a preferred printing device.
- the context data may include behavior patterns of the user or determine a direction the user is moving to select a printing device that is on route and requiring a smaller detour.
- the processor 25 will select a printing device closest to the walking route between the office and the meeting room such that the user makes the smaller detour.
- method 200 may be performed with the apparatus 10 , and specifically by the processor 25 . Indeed, the method 200 may be one way in which apparatus 10 may be configured. Furthermore, the following discussion of method 200 may lead to a further understanding of the processor 25 , and apparatus 10 and its various components. Furthermore, it is to be emphasized, that method 200 need not be performed in the exact sequence as shown, and various blocks may be performed in parallel rather than in sequence, or in a different sequence altogether.
- the processor 25 receives a print job from a computing device via the network interface 15 .
- the manner by which the print job is received from the computing device is not particularly limited.
- the network interface 15 may receive print data from a network containing the print job.
- Block 220 involves the processor 25 to store the print job received at block 210 in the memory storage unit 20 .
- the manner by which the print job is stored by the processor 25 is not particularly limited.
- the print job may be stored in a database or queue of the memory storage unit 20 .
- processor 25 may receive multiple print jobs from multiple computing devices that may be associated with different user accounts.
- the apparatus 10 is a print server, the apparatus 10 may be used to collect all print jobs and manage sending the print jobs to various printing devices for generating documents. Therefore, the memory storage unit 20 may include multiple databases and queues to organize the print jobs that are received via the network.
- block 230 involves the selection of a printing device for the print job.
- the printing device is to be selected from a database of printing devices stored on the memory storage unit 20 .
- the selection is carried out by the processor 25 based on location data received from a portable computing device, which is different from the computing device from which the print job originated. Accordingly, in this example, the print job is received at the processor from one computing device and the location data is received from another computing device.
- the first computing device from which the print job is received may be a workstation or personal computer on which a user performs the majority of work.
- the user may be preparing a document in a word processing program and upon completion of the preparation document, send the document for printing.
- the user also possesses a second portable computing device, such as a smartphone, that is kept on the person.
- location data is provided to the processor 25 from the portable computing device.
- additional locating devices may be used to detect the portable computing device.
- the processor 25 may then selected the nearest printing device to portable computing device and selected that printing device.
- the processor 25 may delay the selection of the printing device until the portable computing device moves within a threshold distance or a predetermined range of a printing device, such as about 15 to 30 feet in a high security environment. In other environments, the range may be increased or decreased to achieve a desired level of security. In other examples, the threshold distance may be dependent on other facts, such as document size, printing device characteristics like printing speed, and/or the speed at which the portable computing device is approaching the printing device. In examples with a variable threshold distances, the apparatus may be tuned such that the user arrives at the printing device as the document printing is completed.
- the processor 25 may present an option to the user of the portable computing device in some examples. In other examples, the processor 25 may further evaluate the context data to make a selection.
- the context data may include a preferred printing device.
- the context data may include behavior patterns of the user or determine a direction the user is moving to select a printing device that is on route and requiring a smaller detour. In this example, if a user is walking from his office to a meeting room, the processor 25 will select a printing device closest to the walking route between the office and the meeting room such that the user makes the smaller detour.
- Block 240 involves an analysis of the link between the printing device and the first computing device from where the print job originated.
- the processor 25 analyzes the link to determine whether the link is secure.
- a link may be considered secure when the network covers a private and/or locked area, such as a floor or portion of a floor in an office building or a private residence.
- SSL Secure Sockets Layer
- An identity of a device may be validated via manufacturer embedded certificates, such as facilitated by a Trusted Platform Module (TPM) chip.
- TPM Trusted Platform Module
- step 250 the processor 25 routes the print job automatically to the printing device selected at block 230 . Since the computing device from which the print job originated and the printing device share a secure link, it is assumed that the computing device and the printing device are within the same secure environment such that documents generated at the printing device remains secure even if the user does not retrieve the documents from the printing device.
- the method 200 proceeds to step 260 and where the processor 25 stores the print job in a queue.
- the queue is maintained in the memory storage unit 20 .
- the queue may be maintained on a separate memory unit or stored externally such as in the cloud.
- the print job may be stored until a different printing device is selected from block 230 .
- the print job may be made available at the printing device connected via an unsecure link through a pull printing process.
- the apparatus 10 a includes a network interface 15 a, a memory storage unit 20 a, and a processor 25 a.
- the processor 25 a may be to operate a security evaluation engine 30 a, a print engine 35 a, and an authentication engine 40 a as well as carry out a set of instructions to operate the apparatus 10 a in general.
- the apparatus 10 a is another example that may be used to carry out the method 200 .
- the network interface 15 a is to communicate with a network, such as a wireless network, to receive a print job from a portable computing device.
- a network such as a wireless network
- the portable computing device is not particularly limited and may be a laptop, smartphone, smartwatch, computer, tablet, or other electronic device capable of generating print jobs.
- the memory storage unit 20 a is coupled to the processor 25 a and may include a non-transitory machine-readable storage medium that may be any electronic, magnetic, optical, or other physical storage device.
- the memory storage unit 20 a stores the print data received at the network interface 15 a from the portable computing device.
- the non-transitory machine-readable storage medium may include, for example, random access memory (RAM), electrically-erasable programmable read-only memory (EEPROM), flash memory, a storage drive, an optical disc, and the like.
- the memory storage unit 20 a may also be encoded with executable instructions to operate the network interface 15 a and other hardware, such as various input and output devices like a monitor, keyboard or pointing device to allow a user or administrator to operate the apparatus 10 a.
- the memory storage unit 20 a may also store an operating system that is executable by the processor 25 a to provide general functionality to the apparatus 10 a, for example, functionality to support various applications such as a user interface to access various features of the apparatus 10 a. Examples of operating systems include WindowsTM, MacOSTM, iOSTM, AndroidTM, LinuxTM, and UnixTM.
- the memory storage unit 20 a may additionally store applications that are executable by the processor 25 a to provide specific functionality to the apparatus 10 a.
- the memory storage unit 20 a includes databases 100 a - 1 and 100 a - 2 (generically, these databases are referred to herein as “database 100 a ” and collectively they are referred to as “databases 100 a ”, this nomenclature is used elsewhere in this description).
- the database 100 a - 1 may be to store information relating to a plurality of printing devices.
- the database 100 a - 1 may include a list of the printing devices along with an identifier for each printing device, such as a media access control address, as well as characteristics of each printing device, such as duplex capabilities, color printing capabilities, and other finishing options.
- the database 100 a - 1 may include information on the location of the printing device and whether the printing device may be considered to be part of a secure network.
- the database 100 a - 2 may be to store information relating to an account of a user.
- the database 100 a - 2 may include context data such as preferences associated with the user of the portable computing device, such as a preferred printing device.
- Other data that may be stored in the database 100 a - 2 may include behavior characteristics of the user such as work hours, job classification and duties, user assignments and projects, the user's trusted Wi-Fi networks, geolocation hotspots (e.g., user's work, home, etc.), printed content preferences (e.g., the user often prints to PDF, often prints Microsoft formatted documents, etc.) and/or whether a user has special accessibility considerations.
- the context data stored in the database 100 a - 2 may be used by the processor 25 a to select the printing device to which the print job is to be sent as well as to determine whether the link between the printing device and the portable computing device is secure. For example, if the portable computing device provides a print job outside of working hours associated with the user of the portable computing device, the processor 25 a may determine that the printing device and the portable computing device no longer form a secure link since the user may not have access to the printing device.
- the memory storage unit 20 a may also store and maintain a print queue 105 a.
- the print queue 105 a may be to store print jobs received via the network interface 15 a.
- the print queue 105 a is not particularly limited and may include multiple queues for multiple printing devices.
- the print queue 105 a may be used to store the print jobs when the link between the portable computing device and the printing device is not secure for subsequent pull printing.
- the memory storage unit 20 a is not particularly limited and that additional databases 100 a may be maintained to store additional data.
- additional databases 100 a may be maintained to store additional data.
- an organization may have printing devices connected via various networks which may have different levels of security protocols. Accordingly, each group of printing devices connected to a single network may have information stored in a separate database 100 a.
- multiple queues 105 a may be provide such that each printing device is associated with a single print queue 105 a.
- the processor 25 a may include a central processing unit (CPU), a microcontroller, a microprocessor, a processing core, a field-programmable gate array (FPGA), or similar.
- the processor 25 a and memory storage unit 20 a may cooperate to execute various instructions.
- the processor 25 a also maintains and operates a security evaluation engine 30 a to determine if the link between the portable computing device and the printing device is secure.
- the processor 25 a also maintains and operates a print engine 35 a to route a print job generated from the print data to a printing device.
- the print engine 35 a automatically routes the print job to the printing device when the printing device and the portable computing device are connected via a secure link.
- the processor 25 a also maintains and operates an authentication engine 40 a to determine authenticate a user on an unsecure printing device to provide for pull printing.
- the authentication engine 40 a may request some input from the user such a personal identification number, a username and password, an identification card, a badge, or a biometric scan.
- the processor 25 a may compare the input from the user with authentication information stored in the memory storage device, such as in the database 100 a - 2 . Once the user has been authenticated, the print engine 35 a releases and routes the print job from the queue 105 a to the unsecure printing device, which may be outside of a secure network.
- the system 500 includes the apparatus 10 , a computing device 505 , such as a desktop computer, a portable computing device 510 , such as a laptop, a smartphone, a smartwatch, a desktop computer, or a tablet, and printing devices 515 - 1 and 515 - 2 .
- a computing device 505 such as a desktop computer
- a portable computing device 510 such as a laptop, a smartphone, a smartwatch, a desktop computer, or a tablet
- printing devices 515 - 1 and 515 - 2 are connected to the same network 550 .
- the network 550 in this example may be a local area network and may be wired, wireless, or a combination of wired and wireless.
- the network 550 may be a secure network for providing a secure connection between devices connected to the network 550 .
- a user of the computing device 505 send a print job to the apparatus 10 via the network 550 while the user is located near the computing device 505 to operate the computing device 505 .
- the computing device 505 is beyond the threshold distance from any of the printing devices 515 .
- the computing device 505 may be located on a different floor from the printing devices 515 .
- the user may move toward the printing device 515 - 1 while carrying the portable computing device 510 .
- the apparatus 10 is notified and recognizes that the portable computing device 510 and the printing device 515 - 1 are connected via a secure link since they are both connected to the network 550 . Accordingly, the apparatus 10 automatically routes the print job to the printing device 515 - 1 such that the generated documents will be available for pickup when the user with the portable computing device 510 arrives at the printing device 515 - 1 .
- the manner by which the portable computing device 510 is recognized to be within the threshold distance or range of the printing device 515 - 1 is not particularly limited.
- the portable computing device may be equipped with global positioning system locating services or may be capable of communication with locating devices such as a Bluetooth Low Energy beacon.
- the signal strength of a wireless network may be used to locate the portable computing device via triangulation techniques.
- the system 500 a includes the apparatus 10 , a computing device 505 a, a portable computing device 510 a, and printing devices 515 a and 520 a.
- the apparatus 10 , the computing device 505 a, and the printing device 515 a are connected to the same network 550 a.
- the apparatus 10 is also connected to an external network 560 a, such as a public network or the Internet, as wells as the portable computing device 510 a and the printing device 520 a.
- the network 550 a in this example may be a local area network and may be wired, wireless, or a combination of wired and wireless.
- the network 550 a may be a secure network for providing a secure connection between devices connected to the network 550 a.
- the network 550 a may be a secured office network.
- the network 560 a may be a public network or the Internet.
- the network 560 a maintains a connection to the apparatus 10 such that the apparatus 10 may still send and receive messages to external devices. This allows a user to leave the secure network area and still be able to communication with the apparatus 10 when the user is away from the office to provide a mechanism for remote working.
- a user of the computing device 505 a send a print job to the apparatus 10 via the network 550 a while the user is located near the computing device 505 a to operate the computing device 505 a.
- the computing device 505 a is beyond the threshold distance from any of the printing device 515 a.
- the computing device 505 a may be located on a different floor from the printing device 515 a.
- the user may have to leave the office building or otherwise leave the area covered by the network 550 a, such as if travelling to a client meeting or home.
- the portable computing device 510 a enters the range of the printing device 520 a, such as a printing device in a remote location capable of communicating with the apparatus 10 , a notification is received at the apparatus 10 that the portable computing device 510 a is within range of an unsecured printing device 520 a since they are no longer connected by what is considered a secure link by the apparatus 10 . Accordingly, the print job stored at the apparatus 10 may be made available to for printing at the printing device 520 using a pull printing process.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
Description
- Printed documents are often used to present information. In particular, printed documents continue to be used despite the availability of electronic alternatives as they are more easily handled and read by users. Accordingly, the generation of printed documents remains an important tool for the presentation and handling of information. Printers are known and have been used to generate documents based on information received via a network.
- Reference will now be made, by way of example only, to the accompanying drawings in which:
-
FIG. 1 is a block diagram of an example apparatus; -
FIG. 2 is a flowchart of an example of a method; -
FIG. 3 is a block diagram of another example apparatus; -
FIG. 4 is a schematic view of an implementation of the apparatus ofFIG. 1 ; and -
FIG. 5 is a schematic view of another implementation of the apparatus ofFIG. 1 . - Printed documents may be widely accepted and may often be more convenient to use. In particular, printed documents are easy to distribute, store, and be used as a medium for disseminating information. In addition, printed documents may serve as contingency for electronically stored documents, such as may happen when an electronic device fails, such as with a poor data connection for downloading the document and/or a depleted power source. When printing documents, documents are often generated at a printing device based on data received from a computing device. If the user generating the document is not in the vicinity of the printing device, the document may be generated and left at the printing device until collected by the user. It is to be appreciated that this may present a security problem as the document is left unattended for a period of time. This may be especially a concern in an environment where multiple printing devices are provided such that a document may be generating by a printing device in error and the document never picked up by the user.
- A solution to address the security concern is to implement pull printing where a print job is held in a print queue until a user is physically present at the printing device where the document is to be generated. Once at the printing device, the user may be authenticated using various means, such as by entering a personal identification number into the printing device, a username and password, or with an identification card, badge, or biometric authentication method. Upon authentication, the print job is retrieved or “pulled” from the print queue and the document is generated by the printing device. Although pull printing provides additional security to reduce the likelihood of a document to be obtained by an unauthorized party, pull printing may be an impediment to productivity as users spend additional time authenticating as well as waiting for the document to be generated by the printing device.
- Referring to
FIG. 1 , an apparatus to handle print jobs across a network is shown at 10. Theapparatus 10 may include additional components, such as various additional interfaces and/or input/output devices such as displays to interact with a user or an administrator of theapparatus 10. Theapparatus 10 is to receive a print job from the network, such as from a portable computing device, and to transmit the print job to a printing device. In the present example, theapparatus 10 includes anetwork interface 15, amemory storage unit 20, and aprocessor 25. Theprocessor 25 may be to operate asecurity evaluation engine 30 and aprint engine 35 as well as carry out a set of instructions associated with an operating system. - The
network interface 15 is to communicate with a network such as a wired or wireless network which may include a cellular network. In the present example, thenetwork interface 15 is to receive print data, which may represent a print job, and context data via the network. The print data and the context data are associated with a portable computing device. For example, the print data may be generated by the portable computing device and received at thenetwork interface 15 via the network. As another example, the print data may be generated at another device associated with the portable computing device. In this example, the other device may be a workstation or personal computer of a user that owns the portable computing device, such as a smartphone. - The context data may be provided by the portable computing device and may provide information such as the location of a user. In other examples, the context data may also be generated and provided by other computing devices, such as a workstation or personal computer. In this example, it is understood that the portable computing device may be used to provide the location of the user. Accordingly, the context data may change over time and updated context data may be received periodically. For example, the portable computing device may be equipped with global positioning system locating services or may be capable of communication with locating devices such as a Bluetooth Low Energy beacon. In another example, the context data may include a network identifier, such as the identifier of the secure network, to indicate that the portable computing device is connected to a secure network. In other examples, the context data may also include other information about a user such as a security clearance level or an authorization period for a specific network. Context data may also include the time of day, business hours, calendar information from the portable computing device, and security metadata associated with the print data.
- The
memory storage unit 20 is coupled to theprocessor 25 and may include a non-transitory machine-readable storage medium that may be any electronic, magnetic, optical, or other physical storage device. In the present example, thememory storage unit 20 stores the print data received at thenetwork interface 15 as well as the context data received at thenetwork interface 15. - In the present example, the non-transitory machine-readable storage medium may include, for example, random access memory (RAM), electrically-erasable programmable read-only memory (EEPROM), flash memory, a storage drive, an optical disc, and the like. The
memory storage unit 20 may also be encoded with executable instructions to operate thenetwork interface 15 and other hardware in communication with theprocessor 25. In other examples, it is to be appreciated that thememory storage unit 20 may be substituted with a cloud based storage system. - The
memory storage unit 20 may also store an operating system that is executable by theprocessor 25 to provide general functionality to theapparatus 10, for example, functionality to support various applications such as a user interface to access various features of theapparatus 10. Examples of operating systems include Windows™, macOS™, iOS™, Android™, Linux™, and Unix™. Thememory storage unit 20 may additionally store applications that are executable by theprocessor 25 to provide specific functionality to theapparatus 10, such as those described in greater detail below. - The
memory storage unit 20 also includes adatabase 100 to store information relating to a plurality of printing devices. For example, thedatabase 100 may include a list of the printing devices along with an identifier for each printing device, such as a media access control address, as well as characteristics of each printing device, such as duplex capabilities, color printing capabilities, and other finishing options. In addition, thedatabase 100 may include information on the location of the printing device and whether the printing device may be part of a secure network. Other data included in thedatabase 100 may be additional characteristics of the printing device, such as status of the printing device, printing speed, duty cycle, paper capacity, amount of paper, amount of ink, current print queue status, cost per page, number of pages left on a contract, whether the printing device is on a metered connection (e.g., a cellular connection on which data may have associated cost), and device ownership. - The
memory storage unit 20 may also store additional executable instructions for the operation of theapparatus 10. In the present example, the executable instructions may include a set of instructions for theprocessor 25 to run in order to operate thesecurity evaluation engine 30 and/or theprint engine 35. - The
processor 25 may include a central processing unit (CPU), a microcontroller, a microprocessor, a processing core, a field-programmable gate array (FPGA), or similar. Theprocessor 25 andmemory storage unit 20 may cooperate to execute various instructions. In this example, theprocessor 25 also maintains and operates asecurity evaluation engine 30 to determine if a printing device is in a secure environment, such as when the printing device and the portable computing device are connected via a secure network. The secure network is not particularly limited and may be determined using the context data received at thenetwork interface 15. In the present example, the secure network may be wired or wireless. For example, the local area network may be an example of a secure network. - The
processor 25 also maintains and operates aprint engine 35 to route a print job generated from the print data to a printing device. In the present example, theprint engine 35 automatically routes the print job to the printing device when the printing device and the portable computing device are connected via a secure network. The secure network may be a private local area network in some examples. In other examples, the secure network may be a direct connection between the portable computing device and the printing device, such as via a Bluetooth connection to indicate that the user and is close enough to the printing device to collect the document after it is generated. In situations when the printing device or outside of the secure network, or when the portable computing device cannot connect to the printing device using the secure network, the print job is stored in a queue. - Accordingly, the
processor 25 may execute instructions stored on thememory storage unit 20 to implement thesecurity evaluation engine 30 and theprint engine 35 and to handle and manage the print jobs across a network. In other examples, thesecurity evaluation engine 30 may be substituted with an external engine, such as another server or machine. In another example, thesecurity evaluation engine 30 may be substituted with an external engine, such as from a software as a service provider specializing in the security management for an organization. Similarly, theprint engine 35 may be substituted with an external engine, such as another server or machine. Such examples may be common in larger systems where a single server or machine may not be able to process the print jobs and still carry out the functions of theapparatus 10 in a reasonable manner. - The
processor 25 is also to control thenetwork interface 15. In particular, theprocessor 25 may send instructions to thenetwork interface 15 to receive the print data and the context data. For example, theprocessor 25 is to monitor the context data received associated with the portable computing device. In particular, theprocessor 25 may periodically send requests to the portable computing device to request an update for the context data. In other examples, the portable computing device may automatically send updates in the context data to theapparatus 10. It is to be appreciated that such examples may reduce the amount of data transmitted between the portable computing device to conserve energy and prolong battery life. Accordingly, the portable computing device may only send updated context data when a substantial change such as a large change in location or if the portable computing device connects with a different network. It is to be appreciated that the threshold for what may be considered a substantial change is not particularly limited and may be set based on various factors. - The
processor 25 is also to select a printing device from thedatabase 100 of printing devices based on the context data received from the portable computing device via thenetwork interface 15. The manner by which theprocessor 25 selects the printing device is not limited and may include analyzing the context data, such as location data, to determine the nearest printing device to the location of the portable computing device. In some examples, theprocessor 25 may delay the selection of the printing device until the portable computing device is within a threshold distance of a printing device. In cases where the portable computing device is within the threshold distance of more than one printing device, theprocessor 25 may present an option on a user interface of the portable computing device in some examples or may further evaluate the context data to make a selection. For example, the context data may include a preferred printing device. In another example, the context data may include behavior patterns of the user or determine a direction the user is moving to select a printing device that is on route and requiring a smaller detour. In this example, if a user is walking from his office to a meeting room, theprocessor 25 will select a printing device closest to the walking route between the office and the meeting room such that the user makes the smaller detour. - Referring to
FIG. 2 , a flowchart of a method to handle print jobs across a network is shown at 200. In order to assist in the explanation ofmethod 200, it will be assumed thatmethod 200 may be performed with theapparatus 10, and specifically by theprocessor 25. Indeed, themethod 200 may be one way in whichapparatus 10 may be configured. Furthermore, the following discussion ofmethod 200 may lead to a further understanding of theprocessor 25, andapparatus 10 and its various components. Furthermore, it is to be emphasized, thatmethod 200 need not be performed in the exact sequence as shown, and various blocks may be performed in parallel rather than in sequence, or in a different sequence altogether. - Beginning at
block 210, theprocessor 25 receives a print job from a computing device via thenetwork interface 15. The manner by which the print job is received from the computing device is not particularly limited. In the present example, thenetwork interface 15 may receive print data from a network containing the print job. -
Block 220 involves theprocessor 25 to store the print job received atblock 210 in thememory storage unit 20. The manner by which the print job is stored by theprocessor 25 is not particularly limited. For example, the print job may be stored in a database or queue of thememory storage unit 20. It is to be appreciated thatprocessor 25 may receive multiple print jobs from multiple computing devices that may be associated with different user accounts. For example, if theapparatus 10 is a print server, theapparatus 10 may be used to collect all print jobs and manage sending the print jobs to various printing devices for generating documents. Therefore, thememory storage unit 20 may include multiple databases and queues to organize the print jobs that are received via the network. - Next, block 230 involves the selection of a printing device for the print job. The printing device is to be selected from a database of printing devices stored on the
memory storage unit 20. In the present example, the selection is carried out by theprocessor 25 based on location data received from a portable computing device, which is different from the computing device from which the print job originated. Accordingly, in this example, the print job is received at the processor from one computing device and the location data is received from another computing device. - In most situations, it is to be understood that the first computing device from which the print job is received may be a workstation or personal computer on which a user performs the majority of work. For example, the user may be preparing a document in a word processing program and upon completion of the preparation document, send the document for printing. The user also possesses a second portable computing device, such as a smartphone, that is kept on the person. When the portable computing device approaches a printing device, location data is provided to the
processor 25 from the portable computing device. In other examples, additional locating devices (not shown) may be used to detect the portable computing device. Theprocessor 25 may then selected the nearest printing device to portable computing device and selected that printing device. - In some examples, such as when the portable computing device is not close to any printing device, the
processor 25 may delay the selection of the printing device until the portable computing device moves within a threshold distance or a predetermined range of a printing device, such as about 15 to 30 feet in a high security environment. In other environments, the range may be increased or decreased to achieve a desired level of security. In other examples, the threshold distance may be dependent on other facts, such as document size, printing device characteristics like printing speed, and/or the speed at which the portable computing device is approaching the printing device. In examples with a variable threshold distances, the apparatus may be tuned such that the user arrives at the printing device as the document printing is completed. - In cases where the portable computing device is within the threshold distance or the predetermined range of more than one printing device, the
processor 25 may present an option to the user of the portable computing device in some examples. In other examples, theprocessor 25 may further evaluate the context data to make a selection. For example, the context data may include a preferred printing device. In another example, the context data may include behavior patterns of the user or determine a direction the user is moving to select a printing device that is on route and requiring a smaller detour. In this example, if a user is walking from his office to a meeting room, theprocessor 25 will select a printing device closest to the walking route between the office and the meeting room such that the user makes the smaller detour. -
Block 240 involves an analysis of the link between the printing device and the first computing device from where the print job originated. In the present example, theprocessor 25 analyzes the link to determine whether the link is secure. For example, a link may be considered secure when the network covers a private and/or locked area, such as a floor or portion of a floor in an office building or a private residence. Secure Sockets Layer (SSL) communications may be used. An identity of a device may be validated via manufacturer embedded certificates, such as facilitated by a Trusted Platform Module (TPM) chip. - Continuing with the present example, if the link is determined to be secure, the
method 200 proceeds to step 250 where theprocessor 25 routes the print job automatically to the printing device selected atblock 230. Since the computing device from which the print job originated and the printing device share a secure link, it is assumed that the computing device and the printing device are within the same secure environment such that documents generated at the printing device remains secure even if the user does not retrieve the documents from the printing device. - If the link is determined to be unsecure, the
method 200 proceeds to step 260 and where theprocessor 25 stores the print job in a queue. In the present example, the queue is maintained in thememory storage unit 20. In other examples, the queue may be maintained on a separate memory unit or stored externally such as in the cloud. In the present example, the print job may be stored until a different printing device is selected fromblock 230. Alternatively, the print job may be made available at the printing device connected via an unsecure link through a pull printing process. - Referring to
FIG. 3 , another example of an apparatus to handle print jobs across a network is shown at 10 a. Like components of theapparatus 10 a bear like reference to their counterparts in theapparatus 10, except followed by the suffix “a”. Theapparatus 10 a includes anetwork interface 15 a, amemory storage unit 20 a, and aprocessor 25 a. Theprocessor 25 a may be to operate asecurity evaluation engine 30 a, a print engine 35 a, and anauthentication engine 40 a as well as carry out a set of instructions to operate theapparatus 10 a in general. Furthermore, theapparatus 10 a is another example that may be used to carry out themethod 200. - The
network interface 15 a is to communicate with a network, such as a wireless network, to receive a print job from a portable computing device. In the present example, the portable computing device is not particularly limited and may be a laptop, smartphone, smartwatch, computer, tablet, or other electronic device capable of generating print jobs. - The
memory storage unit 20 a is coupled to theprocessor 25 a and may include a non-transitory machine-readable storage medium that may be any electronic, magnetic, optical, or other physical storage device. In the present example, thememory storage unit 20 a stores the print data received at thenetwork interface 15 a from the portable computing device. - The non-transitory machine-readable storage medium may include, for example, random access memory (RAM), electrically-erasable programmable read-only memory (EEPROM), flash memory, a storage drive, an optical disc, and the like. The
memory storage unit 20 a may also be encoded with executable instructions to operate thenetwork interface 15 a and other hardware, such as various input and output devices like a monitor, keyboard or pointing device to allow a user or administrator to operate theapparatus 10 a. - The
memory storage unit 20 a may also store an operating system that is executable by theprocessor 25 a to provide general functionality to theapparatus 10 a, for example, functionality to support various applications such as a user interface to access various features of theapparatus 10 a. Examples of operating systems include Windows™, MacOS™, iOS™, Android™, Linux™, and Unix™. Thememory storage unit 20 a may additionally store applications that are executable by theprocessor 25 a to provide specific functionality to theapparatus 10 a. - In the present example, the
memory storage unit 20 a includesdatabases 100 a-1 and 100 a-2 (generically, these databases are referred to herein as “database 100 a” and collectively they are referred to as “databases 100 a”, this nomenclature is used elsewhere in this description). Thedatabase 100 a-1 may be to store information relating to a plurality of printing devices. For example, thedatabase 100 a-1 may include a list of the printing devices along with an identifier for each printing device, such as a media access control address, as well as characteristics of each printing device, such as duplex capabilities, color printing capabilities, and other finishing options. In addition, thedatabase 100 a-1 may include information on the location of the printing device and whether the printing device may be considered to be part of a secure network. Thedatabase 100 a-2 may be to store information relating to an account of a user. For example, thedatabase 100 a-2 may include context data such as preferences associated with the user of the portable computing device, such as a preferred printing device. Other data that may be stored in thedatabase 100 a-2 may include behavior characteristics of the user such as work hours, job classification and duties, user assignments and projects, the user's trusted Wi-Fi networks, geolocation hotspots (e.g., user's work, home, etc.), printed content preferences (e.g., the user often prints to PDF, often prints Microsoft formatted documents, etc.) and/or whether a user has special accessibility considerations. It is to be appreciated that the context data stored in thedatabase 100 a-2 may be used by theprocessor 25 a to select the printing device to which the print job is to be sent as well as to determine whether the link between the printing device and the portable computing device is secure. For example, if the portable computing device provides a print job outside of working hours associated with the user of the portable computing device, theprocessor 25 a may determine that the printing device and the portable computing device no longer form a secure link since the user may not have access to the printing device. - The
memory storage unit 20 a may also store and maintain aprint queue 105 a. In the present example, theprint queue 105 a may be to store print jobs received via thenetwork interface 15 a. Theprint queue 105 a is not particularly limited and may include multiple queues for multiple printing devices. In the present example, theprint queue 105 a may be used to store the print jobs when the link between the portable computing device and the printing device is not secure for subsequent pull printing. - Although the present example illustrates two
databases 100 a and asingle print queue 105 a, it is to be appreciated that thememory storage unit 20 a is not particularly limited and thatadditional databases 100 a may be maintained to store additional data. For example, an organization may have printing devices connected via various networks which may have different levels of security protocols. Accordingly, each group of printing devices connected to a single network may have information stored in aseparate database 100 a. Similarly,multiple queues 105 a may be provide such that each printing device is associated with asingle print queue 105 a. - The
processor 25 a may include a central processing unit (CPU), a microcontroller, a microprocessor, a processing core, a field-programmable gate array (FPGA), or similar. Theprocessor 25 a andmemory storage unit 20 a may cooperate to execute various instructions. In this example, theprocessor 25 a also maintains and operates asecurity evaluation engine 30 a to determine if the link between the portable computing device and the printing device is secure. - The
processor 25 a also maintains and operates a print engine 35 a to route a print job generated from the print data to a printing device. In the present example, the print engine 35 a automatically routes the print job to the printing device when the printing device and the portable computing device are connected via a secure link. - In the present example, the
processor 25 a also maintains and operates anauthentication engine 40 a to determine authenticate a user on an unsecure printing device to provide for pull printing. For example, theauthentication engine 40 a may request some input from the user such a personal identification number, a username and password, an identification card, a badge, or a biometric scan. Theprocessor 25 a may compare the input from the user with authentication information stored in the memory storage device, such as in thedatabase 100 a-2. Once the user has been authenticated, the print engine 35 a releases and routes the print job from thequeue 105 a to the unsecure printing device, which may be outside of a secure network. - Referring to
FIG. 4 , a schematic representation of a network system is generally shown at 500. Thesystem 500 includes theapparatus 10, acomputing device 505, such as a desktop computer, aportable computing device 510, such as a laptop, a smartphone, a smartwatch, a desktop computer, or a tablet, and printing devices 515-1 and 515-2. In this example, theapparatus 10, thecomputing device 505, theportable computing device 510, and the printing devices 515 are connected to thesame network 550. - The
network 550 in this example may be a local area network and may be wired, wireless, or a combination of wired and wireless. In the present example, thenetwork 550 may be a secure network for providing a secure connection between devices connected to thenetwork 550. - In operation, it may be assumed that a user of the
computing device 505 send a print job to theapparatus 10 via thenetwork 550 while the user is located near thecomputing device 505 to operate thecomputing device 505. In this example, thecomputing device 505 is beyond the threshold distance from any of the printing devices 515. For example, thecomputing device 505 may be located on a different floor from the printing devices 515. After sending the print job to theapparatus 10, the user may move toward the printing device 515-1 while carrying theportable computing device 510. Once theportable computing device 510 enters the range of the printing device 515-1, theapparatus 10 is notified and recognizes that theportable computing device 510 and the printing device 515-1 are connected via a secure link since they are both connected to thenetwork 550. Accordingly, theapparatus 10 automatically routes the print job to the printing device 515-1 such that the generated documents will be available for pickup when the user with theportable computing device 510 arrives at the printing device 515-1. - In the present example, the manner by which the
portable computing device 510 is recognized to be within the threshold distance or range of the printing device 515-1 is not particularly limited. For example, the portable computing device may be equipped with global positioning system locating services or may be capable of communication with locating devices such as a Bluetooth Low Energy beacon. In other examples, the signal strength of a wireless network may be used to locate the portable computing device via triangulation techniques. Once theportable computing device 510 or the printing device 515-1 recognizes that each are within range of the other, one of theportable computing device 510 or the printing device 515-1. - Referring to
FIG. 5 , a schematic representation of a network system is generally shown at 500 a. Like components of thesystem 500 a bear like reference to their counterparts in thesystem 500, except followed by the suffix “a”. Thesystem 500 a includes theapparatus 10, acomputing device 505 a, aportable computing device 510 a, andprinting devices apparatus 10, thecomputing device 505 a, and theprinting device 515 a are connected to thesame network 550 a. Theapparatus 10 is also connected to anexternal network 560 a, such as a public network or the Internet, as wells as theportable computing device 510 a and theprinting device 520 a. - The
network 550 a in this example may be a local area network and may be wired, wireless, or a combination of wired and wireless. In the present example, thenetwork 550 a may be a secure network for providing a secure connection between devices connected to thenetwork 550 a. As an example, thenetwork 550 a may be a secured office network. - The
network 560 a may be a public network or the Internet. In this example, thenetwork 560 a maintains a connection to theapparatus 10 such that theapparatus 10 may still send and receive messages to external devices. This allows a user to leave the secure network area and still be able to communication with theapparatus 10 when the user is away from the office to provide a mechanism for remote working. - In operation, it may be assumed that a user of the
computing device 505 a send a print job to theapparatus 10 via thenetwork 550 a while the user is located near thecomputing device 505 a to operate thecomputing device 505 a. In this example, thecomputing device 505 a is beyond the threshold distance from any of theprinting device 515 a. For example, thecomputing device 505 a may be located on a different floor from theprinting device 515 a. After sending the print job to theapparatus 10, the user may have to leave the office building or otherwise leave the area covered by thenetwork 550 a, such as if travelling to a client meeting or home. Once theportable computing device 510 a enters the range of theprinting device 520 a, such as a printing device in a remote location capable of communicating with theapparatus 10, a notification is received at theapparatus 10 that theportable computing device 510 a is within range of anunsecured printing device 520 a since they are no longer connected by what is considered a secure link by theapparatus 10. Accordingly, the print job stored at theapparatus 10 may be made available to for printing at the printing device 520 using a pull printing process. - It should be recognized that features and aspects of the various examples provided above may be combined into further examples that also fall within the scope of the present disclosure.
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/942,146 US10437529B1 (en) | 2018-03-30 | 2018-03-30 | Print job route based on context data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/942,146 US10437529B1 (en) | 2018-03-30 | 2018-03-30 | Print job route based on context data |
Publications (2)
Publication Number | Publication Date |
---|---|
US20190303062A1 true US20190303062A1 (en) | 2019-10-03 |
US10437529B1 US10437529B1 (en) | 2019-10-08 |
Family
ID=68056206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/942,146 Active US10437529B1 (en) | 2018-03-30 | 2018-03-30 | Print job route based on context data |
Country Status (1)
Country | Link |
---|---|
US (1) | US10437529B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021118679A1 (en) * | 2019-12-09 | 2021-06-17 | Hewlett-Packard Development Company, L.P. | Location identification for imaging devices |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4311440B2 (en) | 2006-12-01 | 2009-08-12 | コニカミノルタビジネステクノロジーズ株式会社 | Printing system, printing apparatus, terminal apparatus, print setting method, and print setting program |
CN101901125B (en) * | 2007-04-20 | 2012-05-30 | 夏普株式会社 | Print control apparatus and print apparatus |
US20120127512A1 (en) | 2010-11-19 | 2012-05-24 | Microsoft Corporation | Branch office direct printing |
US8970877B2 (en) * | 2011-03-31 | 2015-03-03 | Hewlett-Packard Development Company, L.P. | Using a generic email address of a server and a sender email address to determine a destination printer for print data |
JP5962146B2 (en) * | 2012-03-30 | 2016-08-03 | ブラザー工業株式会社 | Communication device |
JP2014146202A (en) * | 2013-01-29 | 2014-08-14 | Brother Ind Ltd | Terminal device, system and computer program |
JP6414413B2 (en) * | 2013-09-06 | 2018-10-31 | 株式会社リコー | Document printing system |
WO2015047033A1 (en) | 2013-09-30 | 2015-04-02 | Samsung Electronics Co., Ltd. | System and method for providing cloud printing service |
JP2015109073A (en) * | 2013-10-21 | 2015-06-11 | 株式会社リコー | Image formation system |
US9025192B1 (en) * | 2014-07-25 | 2015-05-05 | Aol Inc. | Systems and methods for dynamic mobile printing based on scheduled events |
US20160085489A1 (en) * | 2014-09-19 | 2016-03-24 | Breezyprint Corporation | System for remote printer pairing |
US9729735B2 (en) * | 2015-08-21 | 2017-08-08 | Xerox Corporation | Intelligent pre-conversion of document formats for predicted printer selection |
US9819674B2 (en) * | 2015-10-29 | 2017-11-14 | Ricoh Company, Ltd. | System, apparatus and method for secure operation of image forming device |
US20170230536A1 (en) * | 2016-02-04 | 2017-08-10 | Ricoh Company, Ltd. | System, apparatus and method for easy access to casual or guest printing |
US20170228198A1 (en) | 2016-02-05 | 2017-08-10 | Hewlett-Packard Development Company, L.P. | Selecting a printer |
US9753684B1 (en) | 2016-03-09 | 2017-09-05 | Seiko Epson Corporation | Printer location aware detection and printing |
-
2018
- 2018-03-30 US US15/942,146 patent/US10437529B1/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021118679A1 (en) * | 2019-12-09 | 2021-06-17 | Hewlett-Packard Development Company, L.P. | Location identification for imaging devices |
Also Published As
Publication number | Publication date |
---|---|
US10437529B1 (en) | 2019-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8154752B2 (en) | Print management system providing documents with plural users identifications | |
US10756917B2 (en) | System and method for network selection and service pairing using historical data mining | |
US8953192B2 (en) | Roving printing in a cloud-based print service using a mobile device | |
EP2148286A2 (en) | Print control mechanism based on printing environment | |
US9069501B2 (en) | Mechanism that allows initiating print without being aware of the printer email address | |
US11917070B2 (en) | Method and system for managing a multiplicity of credentials | |
JP2017004485A (en) | Position verification method, program, and system | |
US10001955B2 (en) | Method of handling a print job submitted to a cloud printing service, and associated user credentials, for processing by an authenticated printing system and system for performing the method | |
KR20140079397A (en) | Roving printing in a cloud-based print service | |
CN103999120A (en) | Sharing user information with proximate devices | |
EP3131002B1 (en) | Information processing apparatus, information processing program, and information processing method | |
US10740043B2 (en) | Print notifications based on context data | |
US11340846B2 (en) | Personalized printer lists | |
US10437529B1 (en) | Print job route based on context data | |
US9326102B2 (en) | Data transmission system, mobile electronic device, and data transmission method via throw gesture | |
JP2016155674A (en) | Delivery management system | |
JP6937562B2 (en) | Service provision server, service provision method and program | |
US9201406B2 (en) | Information processing apparatus, information processing method, and computer-readable recording medium storing a program | |
JP5950209B2 (en) | Print data management apparatus, image forming system, and program | |
JP6942926B2 (en) | Print management device | |
US20210109689A1 (en) | Print caching | |
US20210149615A1 (en) | Release of print jobs based on locations of portable devices | |
US11641422B2 (en) | Systems and methods for integrated third-party callbacks | |
KR101594693B1 (en) | Method of providing a printing service, print management server, and user terminal communicating with the print management server | |
WO2021225595A1 (en) | Computing device location |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HWANG, PETER G.;SIMINGTON, HUNTER JOHN;ST LAURENT, MICHAEL;REEL/FRAME:045401/0913 Effective date: 20180330 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |