WO2019041917A1 - Procédé et système d'impression sécurisée - Google Patents
Procédé et système d'impression sécurisée Download PDFInfo
- Publication number
- WO2019041917A1 WO2019041917A1 PCT/CN2018/088661 CN2018088661W WO2019041917A1 WO 2019041917 A1 WO2019041917 A1 WO 2019041917A1 CN 2018088661 W CN2018088661 W CN 2018088661W WO 2019041917 A1 WO2019041917 A1 WO 2019041917A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- printed
- security level
- image forming
- security
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
Definitions
- the present invention relates to the field of printer technologies, and in particular, to a secure printing method and system.
- the invention provides a safe printing method and system, which can meet the printing requirements of different users, and can also ensure the security of file information and improve the printing efficiency of various files.
- An aspect of the present invention provides a secure printing method, including:
- the printing operation is performed on the print file by the determined image forming apparatus.
- determining a file security level of the file to be printed includes:
- determining a file security level of the file to be printed includes:
- determining a file security level of the file to be printed includes:
- the file security level of the file to be printed is determined according to the analysis comparison result.
- the determining, by the image forming apparatus, the image forming apparatus corresponding to the file security level includes:
- Another aspect of the present invention provides a secure printing system including: a server and an image forming apparatus communicatively coupled to the server;
- the server is configured to acquire a file to be printed corresponding to the request to be printed;
- the server is further configured to determine a file security level of the file to be printed
- the server is further configured to determine an image forming apparatus corresponding to the file security level in a plurality of pre-configured image forming apparatuses, and send the to-be-printed file to the image forming apparatus;
- the image forming apparatus is configured to receive the file to be printed and perform a printing operation on the file to be printed.
- server is further configured to:
- server is further configured to:
- server is further configured to:
- the file security level of the file to be printed is determined according to the analysis comparison result.
- server is further configured to:
- the security printing method and system provided by the present invention determines the file security level of the file to be printed, and then determines the image forming apparatus corresponding to the security level of the file. After determining the image forming apparatus, the image forming apparatus performs the file to be printed.
- the printing operation can meet the printing requirements of different users, and can also effectively ensure the security of the file information, and can automatically select and protect the document security level when the image forming apparatus with multiple different security levels is connected with the server.
- the matched image forming apparatus performs printing without the user manually selecting an appropriate image forming apparatus for printing, which brings convenience to the user, and also improves the printing efficiency of various files, thereby ensuring the practicability of the secure printing method. Conducive to the promotion and application of the market.
- FIG. 1 is a schematic flowchart of a secure printing method according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart 1 of determining a file security level of the file to be printed according to an embodiment of the present invention
- FIG. 3 is a second schematic flowchart of determining a file security level of the file to be printed according to an embodiment of the present disclosure
- FIG. 4 is a schematic flowchart 3 of determining a file security level of the file to be printed according to an embodiment of the present disclosure
- FIG. 5 is a schematic flowchart 4 of determining a file security level of the file to be printed according to an embodiment of the present disclosure
- FIG. 6 is a schematic flowchart 5 of determining a file security level of the file to be printed according to an embodiment of the present disclosure
- FIG. 7 is a schematic flowchart 6 of determining a file security level of the file to be printed according to an embodiment of the present disclosure
- FIG. 8 is a schematic flowchart of analyzing and comparing the to-be-printed file with a preset standard print file of different security levels according to an embodiment of the present invention
- FIG. 9 is a schematic flowchart of determining an image forming apparatus corresponding to the file security level in a plurality of image forming apparatuses configured in advance according to an embodiment of the present disclosure
- FIG. 10 is a schematic diagram of a display interface for determining a file security level of the file to be printed according to the level selection information according to an embodiment of the present disclosure
- FIG. 11 is a schematic structural diagram of a secure printing system according to an embodiment of the present invention.
- FIG. 1 is a schematic flowchart of a secure printing method according to an embodiment of the present invention.
- the embodiment provides a secure printing method, which can meet the printing requirements of different users, and can also ensure The security of the file information, specifically, the method includes:
- the execution entity of the step may be a server, and the specific implementation manner of obtaining the file to be printed may be: the user transmits the to-be-printed request and the to-be-printed file corresponding to the to-be-printed request to the server through the user terminal; or, the server is configured according to The print request initiated by the user at the user terminal is used to obtain a file to be printed from the user terminal.
- the file to be printed in this embodiment is an electronic file for facilitating transmission between the server and the image forming apparatus, wherein the electronic file may be an original file generated by the user in advance, or the original file may be passed.
- a format file between the printable data, for example, the original file is in the Word format.
- the intermediate format data may be a PDF file or an XPS format file, and may of course be other format files that can be conceived by those skilled in the art. , will not repeat them here.
- the print file can be analyzed and processed. Specifically, the storage location, the content information, the feature identifier, and the like of the file to be printed can be obtained, and then the storage location, the content information, the feature identifier, and the like are analyzed and processed.
- the file security level of the file to be printed may be determined by analyzing the processing result, or the file security level of the file to be printed may be determined according to the user information of the job to be printed or the user terminal information; wherein the file security level may include: a common level , security level, specific, ordinary level can represent the security level of the file to be printed is general, anyone can print the file to be printed; security level can represent that the print file can be formed by the image after satisfying certain conditions The device prints out.
- the security level can be further divided into different security levels, such as the first level of security, the second level of security, and the like.
- the file security level may also be determined according to a request sent by the user terminal, and specifically includes a common level, a transmission encryption level, a management output level, a security mark level, a security output level, and the like.
- the transmission encryption level specifically refers to the process in which the user terminal sends the file to be printed to the cloud server, and the cloud server sends the received file to be sent to the image forming apparatus, and the file to be printed is encrypted.
- the specific encryption algorithm is a common encryption algorithm that is easily conceivable by those skilled in the art, for example, asymmetric encryption, etc., at this time, an asymmetrically encrypted public key is stored in an image forming apparatus (for example, a printer); specifically, when the user When the user terminal sends a transmission encryption request to the server, the cloud server sends the private key stored in the cloud server to the user terminal based on the received transmission encryption request, and the user terminal encrypts the printed file by using the received asymmetrically encrypted private key.
- an image forming apparatus for example, a printer
- the cloud server sends the received file to be sent to a corresponding image forming apparatus (for example, a printer) for printing;
- the control output level refers to the file to be printed is being When the image forming device outputs, it is necessary to undergo user intervention before the corresponding print can be taken out.
- the file or control image forming apparatus performs a printing operation, the user intervention includes a user authentication or a user opens a paper cassette of an image forming apparatus (eg, a printer), or other means as would be readily apparent to those skilled in the art; specifically, when the user terminal moves to the cloud
- the cloud server determines, according to the received user information, that the security level of the file to be printed is an output management level, that is, the file to be printed needs to be interfered by the user when being output by the image forming apparatus;
- the mark level refers to adding mark information to a file to be printed by using an application installed in the user terminal, or after the image forming apparatus receives the file to be printed, the image forming apparatus adds mark information to the file to be printed, so that subsequent The output document corresponding to the print file may be traced according to the above-mentioned tag information.
- the user terminal sends a security tag request to the cloud server, and the cloud server determines the security level of the file to be printed as a security mark level based on the security tag request sent by the user.
- the full output level means that the file to be printed can be directly printed and output by the image forming apparatus, but due to the geographical position of the image forming apparatus, the printed document is not easily acquired by other unrelated persons, and therefore, directly by the image forming apparatus
- the output document is also secure.
- the user terminal sends a security output request to the cloud server, and the cloud server determines the security level of the file to be printed as a security output level based on the security output request sent by the user. It should be additionally noted that various requests sent by the user terminal to the cloud server are initiated based on the user selecting an actual demand in the user terminal application interface.
- the classification of the file security level is not limited to the above types, and those skilled in the art may also divide the file security level into several levels according to specific design requirements, and details are not described herein again.
- S103 determining an image forming apparatus corresponding to a file security level in a plurality of image forming apparatuses configured in advance;
- the image forming apparatus may be a printer, a copying machine, or a multi-function printer (MFP) having a scanning/printing function, etc.; for convenience of explanation, the following uses a printer as an image forming apparatus as an example.
- a printer corresponding to the file security level may be determined among a plurality of printers pre-stored in the server; that is, the printer may also A plurality of device security levels are included, and a file to be printed with different file security levels has a mapping relationship with a printer of a different device security level, and the cloud server determines an image forming device connected thereto based on the determined security level of the file to be printed.
- the security level specifically, when the file security level of the file to be printed is a normal level or a security level, the security level of the corresponding image forming apparatus is a normal level or a security level, and the file security level of the file to be printed is a common level.
- Transmission encryption Safety class control the output level, security mark level, the safety output level when one of the corresponding image forming apparatus is also common level, transmission encryption level, control the output level, security mark level, one of the safety output level.
- a normal-grade file to be printed corresponds to a normal printer
- a confidentiality level to be printed file corresponds to a secure printer, and the like.
- the security level of the printer may be a general-level printer, a transmission encryption level printer, a control output level printer, a security mark level printer, a security output level printer, etc.
- the transmission encryption level printer refers to when the cloud server is encrypted.
- the control output level printer refers to a printer that needs to perform user intervention to control the printer to print or take out the output document corresponding to the file to be printed
- the security mark printer refers to Printers output after the printer output include printers such as watermarks, barcodes, etc. for tracking and tracing the printed documents
- secure output level printers are printers in a secure environment, such as a password lock or fingerprint lock. In the room, only some people can enter the room where the printer is located, and get the printout document.
- the corresponding printer when the file security level is the normal level, the corresponding printer is a normal level printer; when the file security level is the transmission encryption level, the corresponding printer is the printer control output level for transmitting the encryption level; when the file security level is the security mark level When the file security level is the control output level, the corresponding printer is the control output level printer; when the file security level is the security output level, the corresponding printer is the safe output level printer.
- the server may acquire status information of a plurality of printers corresponding to the file security level, and then automatically send the file to be printed to a certain printer based on the acquired status information of the plurality of printers. For example, the file to be printed is sent to the printer that is idle for printing; in addition, when there are multiple printers of the same security level, one target printer can be determined among the plurality of printers based on the user's selection.
- the classification of the device security level of the image forming apparatus/printer is not limited to the above description, and those skilled in the art may also set the device security level of the image forming apparatus/printer according to specific design requirements. Specifically, Different devices have different security levels and different types of security, so that different printing tasks can be completed according to different security levels of these devices, thereby effectively avoiding information leakage.
- S104 Perform a printing operation on the print file by using the determined image forming apparatus.
- the image forming apparatus After the image forming apparatus corresponding to the file security level is determined, the image forming apparatus can be used to perform a printing operation on the print file, wherein the information in the file to be printed can be effectively ensured when the printing operation is performed on the file to be printed. Sex.
- the secure printing method determines the file security level of the file to be printed, and then determines the image forming apparatus corresponding to the file security level. After determining the image forming apparatus, the image forming apparatus prints the file to be printed.
- the operation can meet the printing requirements of different users, and can also effectively ensure the security of the file information, and can automatically select the security level of the file to be printed when the image forming apparatus with multiple different security levels is connected to the server.
- the most matching image forming apparatus performs printing without the user manually selecting an appropriate image forming apparatus for printing, which brings convenience to the user, and also improves the printing efficiency of various files, thereby ensuring the practicability of the secure printing method. It is conducive to the promotion and application of the market.
- FIG. 2 is a first schematic diagram of a process for determining a file security level of a file to be printed according to an embodiment of the present invention.
- the file security of the file to be printed is determined by the embodiment.
- the specific implementation manner of the level is not limited, and those skilled in the art can set according to specific design requirements.
- the first achievable manner is that determining the file security level of the file to be printed may include:
- the document content of the file to be printed may be filtered, keyword extracted, and the like based on the preset secret information keyword library.
- the keyword may include “confidential”, “meeting record”, and the like. Wait.
- S1022 Determine a file security level of the file to be printed according to the content information.
- the obtained content information may be analyzed and processed based on the preset secret information keyword library, thereby determining a file security level of the file to be printed; specifically, when determining the security level of the file to be printed,
- the security level of the file to be printed may be determined by analyzing the matching degree of the content of the file to be printed and the preset keyword database of the secret information, and comparing the matching degree with one or more preset matching thresholds.
- determining that the security level of the file to be printed is a security level, and when there is no match, determining that the security level of the file to be printed is a common level, and so on, thereby determining the security level of the file to be printed; Or determining a security level of the file to be printed based on a preset secret information keyword library corresponding to the security level of the file to be printed, for example, if the content information includes keywords such as “confidential” and/or “meeting record” , it can be determined that the file security level of the file to be printed is the second security level; When the information includes keywords such as "non-disclosure" and/or "non-transferable”, it may be determined that the file security level of the file to be printed is the first security level; if the information in the content information and the preset secret information keyword When the keywords in the library do not match at all, it can be determined that the security level of the file to be printed is a normal
- the content information in the embodiment and the implementation manner of determining the file security level of the file to be printed according to the content information are not limited to the above-mentioned contents, and those skilled in the art may set according to specific design requirements, and details are not described herein again. .
- the file security level of the file to be printed can be accurately and effectively determined, and the accuracy and reliability of the file security level determination are effectively ensured.
- FIG. 3 is a second schematic diagram of a process for determining a file security level of a file to be printed according to an embodiment of the present invention
- FIG. 10 is a schematic diagram of a display interface for determining a file security level of a file to be printed according to the level selection information according to an embodiment of the present invention
- the second achievable manner is that the file security of the file to be printed is determined.
- Levels can include:
- a display interface for performing file security level selection may be sent to the user, or When the user clicks on the printing operation, a dialog box pops up for the user to select the security level to print the to-be-printed file.
- the display interface may include multiple file security levels (including normal and hierarchical). 1, level 2, etc.), the user can click the corresponding file security level, for example, you can click level 1, and click the confirmation button, that is, the setting operation of the file level to be printed is completed.
- the server can receive the level input by the user. Select the information.
- multiple file security levels including normal, control output, transport encryption, security output, security mark, etc.
- S1024 Determine a file security level of the file to be printed according to the level selection information.
- the file security level corresponding to the level selection information (ie, level 1) can be determined as the file security level of the print file, so that the file security level can be acquired in a timely and effective manner.
- the file security level of the printed file can be determined as the file security level of the print file, so that the file security level can be acquired in a timely and effective manner.
- determining a file security level of a file to be printed may include:
- the storage information is storage location information of the file to be printed on a terminal such as a mobile phone or a computer. Specifically, when the file to be printed stored on the terminal is sent to the cloud server by using the terminal application, the terminal application can obtain the file to be printed. The storage location information stored in the terminal, and the corresponding storage location information is sent to the server, thereby obtaining storage information of the file to be printed.
- S1026 Determine a file security level of the file to be printed according to the storage information.
- the storage location may be analyzed. Specifically, the storage location may be compared with a preset standard storage location to determine a standard storage location corresponding to the storage location. And determining the security level corresponding to the standard storage location as the file security level of the file to be printed; for example, the storage location of the file to be printed 1 and the file to be printed 2 are: Customer Service Department - Location 1, Legal Department - Location 3.
- the security level corresponding to the customer service department-position 1 is the ordinary level, so that it can be determined
- the file security level of the print file 1 is a normal level; and through the analysis of the Legal Department-Location 3, it is determined that the standard storage location corresponding to the storage location is the legal department, and the legal department-position 3 corresponds to the security level of two.
- the level of security is determined so that the file security level of file 1 to be printed is determined to be a secondary security level.
- those skilled in the art can further determine the file security level of the file to be printed by combining different work departments and different folders under the same department; in addition, determining the file to be printed by storing other types of information in the information.
- the specific implementation process of the file security level is similar to the implementation process of determining the file security level of the file to be printed according to the storage location, and details are not described herein again.
- the security level of the file to be printed can be quickly and accurately determined based on the storage location information of the file to be printed in the terminal, and the user does not need to manually determine the security level of the file to be printed, thereby providing convenience to the user.
- FIG. 5 is a schematic flowchart 4 of determining a file security level of a file to be printed according to an embodiment of the present invention.
- the file security level of the file to be printed may include:
- S1027 Acquire identity information of a user who sends a request to send a print
- S1028 Determine a file security level of the file to be printed according to the identity information of the user.
- the process of obtaining the identity information of the user and determining the file security level of the file to be printed according to the identity information of the user may be as follows:
- the cloud server determines the user permission level based on the user name information registered by the user, so as to further determine the security level of the corresponding file to be printed.
- the user terminal application acquires the ID information of the terminal, and sends the ID information of the terminal to the cloud server, and the cloud server is based on the obtained user terminal.
- the ID determines the permission level of the user, thereby further determining the security level of the corresponding file to be printed;
- Method 3 After the user logs in to the cloud server through the application of the terminal, the terminal application sends a print request to the cloud server based on the login user name and the login password, and the print request also includes the ID of the user or the ID of the terminal, and the cloud server is based on The received user ID and terminal ID determine the security level of the file to be printed corresponding to the print request.
- the terminal application sends a print request to the cloud server based on the login user name and the login password, and the print request also includes the ID of the user or the ID of the terminal, and the cloud server is based on The received user ID and terminal ID determine the security level of the file to be printed corresponding to the print request.
- the security level of the files to be printed sent by some client users (PC1, PC2, etc.) to the normal level
- the security level of the files to be printed sent by some other clients is the transmission encryption level.
- it is possible to set a certain file group (for example, a research and development work group) to send a file to be printed as an output management level, and other (sales work group) to send a file to be printed as a normal level.
- the user's privilege can be divided into: ordinary employee privilege, group leader privilege, and manager privilege according to the user's identity information.
- the file security level of the employee's file to be printed is a common level.
- the file security level of the employee's to-be-printed file is a first-level security level, and then the encrypted security printer is used for printing.
- the file security level of the employee with the manager-level authority is secondary security. Levels, which in turn can be printed using a secure, manually controlled, secure printer.
- the file security level of the file to be printed can be determined according to the analysis and identification result, and the printer can be printed by using the printer of different security levels, thereby effectively satisfying the requirement.
- FIG. 6 is a schematic flowchart 5 of determining a file security level of a file to be printed according to an embodiment of the present invention. and referring to FIG. 1 and FIG. 6 , for determining a file security level of a file to be printed, according to the foregoing embodiment.
- the fifth achievable manner is that determining the file security level of the file to be printed may include:
- S10210 Determine a file security level of the file to be printed according to the approval result.
- the file to be printed When the file to be printed is sent to the approver for approval, at least a part of the file to be printed (including: partial information, extracted keyword information or all information, etc.) may be sent to the approver for approval; specifically, the server The file to be printed can be sent to the designated approver for review.
- the auditor is responsible for judging whether the document can be printed and at what security level is printed; determining the security level of the file to be printed based on the approval result, thereby effectively ensuring the file to be printed The accuracy of the file security level is determined.
- FIG. 7 is a schematic flowchart 6 of determining a file security level of a file to be printed according to an embodiment of the present invention
- FIG. 8 is a flowchart of comparing a file to be printed with a preset standard print file of different security levels according to an embodiment of the present invention
- File security levels can include:
- S10212 Determine a security level corresponding to the standard print file that matches the file to be printed as a file security level of the file to be printed.
- the server compares the file to be printed with a standard file in a pre-stored standard file library, where the server stores the standard file and its corresponding security. Print level. When there is a standard file in the standard file library that is the same as the file to be printed, it is determined that the security level of the file to be printed is the security print level corresponding to the aforementioned standard file. Otherwise, the security level of the file to be printed is determined to be Normal print level.
- the security level of the file to be printed is determined, and the user does not need to manually set the security level of the file to be printed, which brings convenience to the user.
- a person skilled in the art can set according to specific design requirements, wherein an implementation manner is that the file to be printed is compared with a standard print file of a different security level set in advance. Includes the following substeps:
- S102111 Acquire a file feature value of a file to be printed
- the cloud server analyzes the file to be printed. Specifically, the file feature value of the file to be printed can be extracted.
- the file feature value may be an MD5 value or a file metadata, where MD5 is an abbreviation of Message-Digest-Algorithm 5; for a file feature value, after the file to be printed is generated, There will be a unique MD5 value or file metadata, so the print file can be analyzed and processed according to the obtained file feature value.
- S102113 Determine a file security level of the file to be printed according to the analysis comparison result.
- the file feature value may be analyzed and processed. Specifically, the file feature value may be compared with the standard file feature value corresponding to the preset standard print file, and further compared with the file feature value.
- the security level of the standard print file corresponding to the matching standard file feature value is determined as the file security level of the file to be printed; the MD5 value is used as the file feature value for example.
- the MD5 value of the file to be printed may be obtained first, and MD5 is obtained.
- the value is compared with the standard MD5 value, wherein the cloud server stores the file name including the standard file, its corresponding standard MD5 value, and the corresponding security print level. For example, when the standard file name is mechanical design description, the standard MD5 is used.
- the corresponding security printing level is the transmission encryption level. If the MD5 value of the file to be printed is exactly 123, then the security printing level corresponding to the standard MD5 value can be determined as the file security level of the file to be printed, further You can send the file to be printed to the printer of the corresponding level for printing .
- the analysis comparison result can be obtained, so that the security level of the file to be printed can be determined according to the analysis and comparison result, without the user manually setting the The security level of the printed file is convenient for the user.
- FIG. 9 is a schematic flowchart of determining an image forming apparatus corresponding to a file security level in a plurality of image forming apparatuses configured in advance according to an embodiment of the present invention. and based on any one of the foregoing embodiments, referring to FIG.
- the specific implementation manner of determining the image forming apparatus corresponding to the file security level in the plurality of image forming apparatuses configured in advance is not limited, and those skilled in the art may set according to specific design requirements, and are more preferable.
- the determining the image forming apparatus corresponding to the file security level in the plurality of image forming apparatuses configured in advance may include:
- S1031 Acquire different levels of security configuration information corresponding to the plurality of image forming apparatuses configured in advance;
- the security configuration information is security capability information related to the image forming apparatus, and the security capability information is used to determine a security level of the image forming apparatus, and the security configuration information may include, but is not limited to, such as whether a card reader or a fingerprint recorder is configured, whether Forcibly adding a tag function, whether there is a decryption function, a security level, whether the carton is locked, whether the printer is in a safe working environment, etc., it can be understood that the security configuration information may also include other others that are easily conceived by those skilled in the art. Information is not exhaustive here.
- the security configuration information of the plurality of image forming apparatuses may be pre-configured on the server, for example, different types of (network) printers are set in a certain enterprise: "secure printer 1", “secure printer 2", “general printer” 1".
- the administrator can centrally install the drivers for the above printers on the server, and the administrator can install the security policy program (server side) on the server and set the corresponding job allocation table.
- the user can log in to the cloud server by using the user terminal to set the security configuration information of the printer connected to the server (such as whether the printer tray has a lock, whether there is a mandatory watermark function, whether the printer is in a safe working environment, whether there is decryption.
- the server divides the printers connected to it into different security levels according to certain rules based on the security configuration information set by the user. For example, the printer can be divided into: a printer that transmits encryption, and an output that is controlled and controlled. Printers, general printers, security mark printers, secure output printers, etc.;
- S1032 Acquire security configuration information matching the file security level, and determine an image forming apparatus corresponding to the file security level by the image forming apparatus corresponding to the security configuration information.
- the security configuration information is analyzed and determined. Specifically, the plurality of security configuration information is searched for whether there is a security configuration matching the file security level. The information, if present, determines the image forming apparatus corresponding to the file security level by the image forming apparatus corresponding to the security configuration information, so that the file to be printed can be sent to the image forming apparatus for printing operation, or when the image
- the server sends a capability information request to the image forming device, and the image forming device receives the capability information request sent by the server, and feeds back basic capability information such as black and white, color, print speed, and the like to the server, such as whether to configure
- the card reader or the fingerprint entry device has security information such as a mandatory tagging function, a decryption function, and a security level.
- the server receives the capability information fed back by the image forming device and saves it, and determines the connection based on the capability information fed back by the image forming device.
- the security level of the printer and based on the determined security level of the file to be printed, automatically sends the file to be printed to the image forming apparatus that matches the security level of the file to be printed, thereby effectively ensuring that the file to be printed is performed.
- the safety and reliability of the printing operation further enhances the practicability of the secure printing method, and the user is not required to manually set the image forming apparatus, thereby providing convenience to the user.
- FIG. 11 is a schematic structural diagram of a secure printing system according to an embodiment of the present invention.
- the embodiment provides a secure printing system, including: a server 100 and an image forming apparatus communicably connected to the server 100. 200;
- a server 100 configured to acquire a file to be printed corresponding to the request to be printed;
- the server 100 is further configured to determine a file security level of the file to be printed
- the server 100 is further configured to determine an image forming apparatus 200 corresponding to a file security level in a plurality of pre-configured image forming apparatuses 200, and send the to-be-printed file to the image forming apparatus 200;
- the image forming apparatus 200 is configured to receive a file to be printed and perform a printing operation on the file to be printed.
- the specific shape and structure of the server 100 and the image forming apparatus 200 are not limited in this embodiment, and those skilled in the art can arbitrarily set them according to the functions of the implementations thereof, and details are not described herein; the server 100 and the image in this embodiment
- the specific implementation process and the implementation effect of the method steps of the device 200 are the same as those of the steps S101-S104 in the foregoing embodiment. For details, refer to the above description, and details are not described herein again.
- the secure printing system determines the file security level of the file to be printed by the server 100, and then determines the image forming apparatus 200 corresponding to the file security level. After the image forming apparatus 200 is determined, the image forming apparatus 200 is utilized. The printing operation is performed on the print file, so that the printing requirements of different users can be satisfied, and the security of the file information can be effectively ensured, and when the image forming apparatus 200 having a plurality of different security levels is connected to the server 100, it can automatically Selecting the image forming apparatus 200 that best matches the security level of the file to be printed for printing, without the user manually selecting an appropriate image forming apparatus 200 for printing, which brings convenience to the user, and also improves the printing efficiency of various files, and further improves the printing efficiency of various files. The practicality of the secure printing system is guaranteed, which is beneficial to the promotion and application of the market.
- the specific implementation manner of the file security level of the file to be printed by the server 100 is not limited in this embodiment, and can be set by a person skilled in the art according to specific design requirements.
- the server 100 determines the file security level of the file to be printed, The first way to achieve this is that the server 100 can be used to perform the following steps:
- the file security level of the file to be printed can be accurately and effectively determined, and the accuracy and reliability of the file security level determination are effectively ensured.
- the specific implementation manner of determining the file security level of the file to be printed by the server 100 is not limited, and those skilled in the art may set according to specific design requirements, where the server When determining the file security level of the file to be printed, the second achievable manner is that the server 100 can be used to perform the following steps:
- level selection information input by the user; determining a file security level of the file to be printed according to the level selection information.
- the specific implementation manner of determining the file security level of the file to be printed by the server 100 is not limited, and those skilled in the art may set according to specific design requirements, where the server When determining the file security level of the file to be printed, a third achievable manner is that the server 100 can be used to perform the following steps:
- the specific implementation manner of determining the file security level of the file to be printed by the server 100 is not limited, and those skilled in the art may set according to specific design requirements, where the server When determining the file security level of the file to be printed, a fourth achievable manner is that the server 100 can be used to perform the following steps:
- the server 100 acquires the identity information of the user, analyzes and identifies the identity information of the user, and determines the file security level of the file to be printed according to the analysis and identification result, and further can print the file to be printed by using the printer of different security levels, thereby effectively It satisfies the different printing needs of different users, and also ensures the security and reliability of the printed file information, further improving the stability and reliability of the use of the secure printing system.
- the specific implementation manner of determining the file security level of the file to be printed by the server 100 is not limited, and those skilled in the art may set according to specific design requirements, where the server When determining the file security level of the file to be printed, the fifth achievable manner is that the server 100 can be used to perform the following steps:
- the specific implementation manner of determining the file security level of the file to be printed by the server 100 is not limited, and those skilled in the art can set according to specific design requirements.
- the server 100 when the server 100 determines the file security level of the file to be printed, the server 100 can be used to perform the following steps:
- the file to be printed is compared with a standard print file of a different security level set in advance; the security level corresponding to the standard print file matching the file to be printed is determined as the file security level of the file to be printed.
- the server 100 when the server 100 analyzes and compares the file to be printed with a standard print file of a different security level set in advance, the server 100 may be configured to perform the following sub-steps:
- the present embodiment determines, for the server 100, a specific implementation of the image forming apparatus 200 corresponding to the file security level in the plurality of image forming apparatuses 200 that are pre-configured.
- the method is not limited, and a person skilled in the art can set according to specific design requirements. More preferably, when the server 100 determines the image forming apparatus 200 corresponding to the file security level in the plurality of image forming apparatuses 200 configured in advance, the method 100
- the server 100 can be used to perform the following steps:
- the security configuration information is analyzed and determined. Specifically, the plurality of security configuration information is searched for whether the file security level matches the file security level.
- the security configuration information if any, determines the image forming apparatus 200 corresponding to the file security level of the image forming apparatus 200 corresponding to the security configuration information, so that the file to be printed can be sent to the image forming apparatus 200.
- the printing operation can effectively ensure the safety and reliability of the printing operation of the file to be printed, and further improve the practicability of the security printing system.
- the disclosed apparatus and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of cells is only a logical function division.
- multiple units or components may be combined or integrated. Go to another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
- the above software functional unit is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform part of the steps of the various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Human Computer Interaction (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
La présente invention concerne un procédé et un système d'impression sécurisée. Le procédé consiste : à acquérir un fichier à imprimer correspondant à une demande d'impression ; à déterminer un niveau de sécurité de fichier du fichier à imprimer ; à déterminer, parmi une pluralité de dispositifs de formation d'image pré-configurés, un dispositif de formation d'image correspondant au niveau de sécurité de fichier ; et à imprimer le fichier à imprimer à l'aide du dispositif de formation d'image déterminé. Le procédé et le système d'impression sécurisée selon la présente invention déterminent un niveau de sécurité de fichier d'un fichier à imprimer, et déterminent ensuite un dispositif de formation d'image correspondant au niveau de sécurité de fichier, puis imprime le fichier à imprimer au moyen du dispositif de formation d'image déterminé, satisfaisant ainsi les besoins en impression de différents utilisateurs, tout en garantissant également la sécurité des informations de fichier, et améliorant l'efficacité lors de l'impression de divers fichiers. L'invention concerne en outre un procédé d'impression sécurisée pratique qui ne nécessite pas la sélection manuelle d'un dispositif de formation d'image, ce qui offre du confort à un utilisateur.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710774689.7A CN107562392A (zh) | 2017-08-31 | 2017-08-31 | 安全打印方法及系统 |
CN201710774689.7 | 2017-08-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019041917A1 true WO2019041917A1 (fr) | 2019-03-07 |
Family
ID=60977615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/088661 WO2019041917A1 (fr) | 2017-08-31 | 2018-05-28 | Procédé et système d'impression sécurisée |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107562392A (fr) |
WO (1) | WO2019041917A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112631529A (zh) * | 2020-12-17 | 2021-04-09 | 深圳市裕展精密科技有限公司 | 文件打印管控方法、打印控制系统及执行装置 |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107562392A (zh) * | 2017-08-31 | 2018-01-09 | 珠海赛纳打印科技股份有限公司 | 安全打印方法及系统 |
CN110147207B (zh) * | 2018-02-11 | 2020-12-29 | 北大方正集团有限公司 | 印刷派发方法、系统、计算机设备及存储介质 |
JP7059087B2 (ja) * | 2018-04-13 | 2022-04-25 | キヤノン株式会社 | 印刷装置、印刷装置の制御方法及びプログラム |
CN108876189A (zh) * | 2018-07-05 | 2018-11-23 | 云城(北京)数据科技有限公司 | 纸面文件管理审计方法、装置及系统 |
CN109299607A (zh) * | 2018-08-24 | 2019-02-01 | 珠海奔图电子有限公司 | 驱动程序安全检测方法、装置和图像形成系统 |
CN111240607B (zh) * | 2018-11-29 | 2024-01-05 | 株式会社理光 | 图像形成系统以及图像形成方法 |
CN110851085A (zh) * | 2019-10-11 | 2020-02-28 | 杭州珐珞斯科技有限公司 | 云打印的方法、服务器、云盒、系统和计算机设备 |
CN110955395A (zh) * | 2019-12-17 | 2020-04-03 | 珠海格力电器股份有限公司 | 打印系统的风险评估方法、装置及存储介质 |
CN111191297B (zh) * | 2019-12-31 | 2023-03-10 | 珠海奔图电子有限公司 | 安全管理信息获取方法、图像形成装置、存储介质 |
CN112783452A (zh) * | 2021-01-26 | 2021-05-11 | 珠海奔图电子有限公司 | 图像形成装置及方法、图像形成系统 |
CN113031885B (zh) * | 2021-03-22 | 2024-04-09 | 珠海奔图电子有限公司 | 文件打印预览方法及装置、文件打印系统 |
CN116186748B (zh) * | 2023-04-28 | 2023-09-22 | 云南佩松荔科技有限公司 | 一种数码印刷机防泄密管理系统及其方法 |
CN116594575B (zh) * | 2023-07-18 | 2023-11-03 | 明度智云(浙江)科技有限公司 | 基于SaaS系统的打印任务调控方法、系统和存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005174085A (ja) * | 2003-12-12 | 2005-06-30 | Fuji Xerox Co Ltd | ファイル管理装置およびファイル管理方法およびファイル管理プログラム |
CN101187964A (zh) * | 2006-11-22 | 2008-05-28 | 株式会社Cec | 安全打印系统和方法 |
CN101187994A (zh) * | 2006-11-17 | 2008-05-28 | 鸿富锦精密工业(深圳)有限公司 | 文件打印管控系统及方法 |
JP2014041513A (ja) * | 2012-08-23 | 2014-03-06 | Ricoh Co Ltd | 印刷システム |
CN107562392A (zh) * | 2017-08-31 | 2018-01-09 | 珠海赛纳打印科技股份有限公司 | 安全打印方法及系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4514201B2 (ja) * | 2004-05-31 | 2010-07-28 | キヤノン株式会社 | 情報処理装置、情報処理装置の制御方法およびプログラム |
JP2008160760A (ja) * | 2006-12-26 | 2008-07-10 | Fuji Xerox Co Ltd | 文書処理システムおよび文書処理指示装置および文書処理プログラム |
JP4909124B2 (ja) * | 2007-03-02 | 2012-04-04 | キヤノン株式会社 | 情報処理装置、情報処理方法及びコンピュータプログラム |
CN102523255B (zh) * | 2011-11-30 | 2015-04-29 | 北京京航计算通讯研究所 | 基于虚拟打印技术的打印安全监控与审计系统 |
US9349008B1 (en) * | 2012-03-13 | 2016-05-24 | Bromium, Inc. | Safe printing |
-
2017
- 2017-08-31 CN CN201710774689.7A patent/CN107562392A/zh active Pending
-
2018
- 2018-05-28 WO PCT/CN2018/088661 patent/WO2019041917A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005174085A (ja) * | 2003-12-12 | 2005-06-30 | Fuji Xerox Co Ltd | ファイル管理装置およびファイル管理方法およびファイル管理プログラム |
CN101187994A (zh) * | 2006-11-17 | 2008-05-28 | 鸿富锦精密工业(深圳)有限公司 | 文件打印管控系统及方法 |
CN101187964A (zh) * | 2006-11-22 | 2008-05-28 | 株式会社Cec | 安全打印系统和方法 |
JP2014041513A (ja) * | 2012-08-23 | 2014-03-06 | Ricoh Co Ltd | 印刷システム |
CN107562392A (zh) * | 2017-08-31 | 2018-01-09 | 珠海赛纳打印科技股份有限公司 | 安全打印方法及系统 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112631529A (zh) * | 2020-12-17 | 2021-04-09 | 深圳市裕展精密科技有限公司 | 文件打印管控方法、打印控制系统及执行装置 |
Also Published As
Publication number | Publication date |
---|---|
CN107562392A (zh) | 2018-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019041917A1 (fr) | Procédé et système d'impression sécurisée | |
CN1756147B (zh) | 通过边缘电子邮件服务器实施权限管理 | |
US8976383B2 (en) | Method and system for document printing management and control, and document source tracking | |
US20190377901A1 (en) | Obfuscating information related to personally identifiable information (pii) | |
JP5833146B2 (ja) | 機密データ漏えい防止装置および方法 | |
US20090292930A1 (en) | System, method and apparatus for assuring authenticity and permissible use of electronic documents | |
US20110219424A1 (en) | Information protection using zones | |
CN102959558A (zh) | 用于文档策略实施的系统和方法 | |
US20090300706A1 (en) | Centrally accessible policy repository | |
JP2020053091A (ja) | 個人番号管理装置、個人番号管理方法、および個人番号管理プログラム | |
US10949146B2 (en) | Document operation compliance | |
JP2009282611A5 (fr) | ||
RU2759210C1 (ru) | Система и способ защиты электронных документов, содержащих конфиденциальную информацию, от несанкционированного доступа | |
US20130297614A1 (en) | Methods for facilitating preservation and retrieval of heterogeneous content and devices thereof | |
US11630924B2 (en) | Sharing data with a particular audience | |
EP2488937A1 (fr) | Procédé et système d'impression | |
CN111708498A (zh) | 文件打印的监控方法与设备 | |
US11418484B2 (en) | Document management system | |
JP2017049811A (ja) | 電子情報管理制御装置、電子情報管理制御プログラム | |
JP2011003042A (ja) | 情報処理装置及びプログラム | |
US20130198244A1 (en) | Systems and methods for monitoring document transmission | |
KR20160059001A (ko) | 문서관리모듈을 기반으로 한 영업비밀 전자문서 관리 시스템 및 방법 | |
JP2005141483A (ja) | 文書提供サーバ装置 | |
US20210303640A1 (en) | Document management system, processing terminal device, and control device | |
US20170242638A1 (en) | System and method for control of printed documents based on classification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18849851 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18849851 Country of ref document: EP Kind code of ref document: A1 |