Printing security monitoring and auditing system based on virtual printing technique

A technology of virtual printing and security monitoring, which is applied in the direction of transmission system, digital output to printing unit, electrical components, etc. It can solve the problems of printing behavior and difficult monitoring of content, so as to provide traceability, prevent malicious tampering, and solve the problem that cannot be prevented The effect of unauthorized printing

Active Publication Date: 2012-06-27
北京京航计算通讯研究所
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a printing security monitoring and auditing system based on virtual printing technology in order to solve the problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Printing security monitoring and auditing system based on virtual printing technique
  • Printing security monitoring and auditing system based on virtual printing technique
  • Printing security monitoring and auditing system based on virtual printing technique

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0019] Such as figure 1 As shown, the printing security monitoring and auditing system based on virtual printing technology provided by the present invention includes a server, at least one ordinary client, at least one approval client, a print controller, and a printer; the ordinary client and the approval client are collectively referred to as Client: All ordinary clients and all approval clients are connected to the server, the print controller is connected to the server, and the printer is connected to the print controller.

[0020] The common client is composed of a single PC and common client software installed in the PC. Common client software includes virtual printer, common client network communication, common client man-machine interface.

[0021] The approval client is composed of a single PC and the approval client software installed in the PC. Approval of client software includes approval of client network communication and approval of client man-machine interface.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information security techniques and provides a printing security monitoring and auditing system based on a virtual printing technique aiming at solving the problems that the printing behavior and the printing content are hard to monitor, unauthorized printing and skip-level printing cannot be prevented and the like in the existing printing management method. The printing security monitoring and auditing system comprises a server, at least one ordinary client, at least one approval client, a printing controller and a printing machine, wherein the clients are divided into the ordinary clients and the approval clients; and all ordinary clients and all approval clients are connected with the server, the printing controller is connected with the server and the printing machine is connected with the printing controller. By adopting the windows virtual printing technique, the optical character recognition (OCR) technique, the equipment intelligent control technique and the like, the printing security monitoring and auditing system realizes the monitoring and management of documents at a full life cycle which comprises printing application, approval, output, recovery, destruction and the like, and can form complete printing logs for review.

Description

technical field [0001] The invention belongs to the technical field of information security and confidentiality, and in particular relates to a printing security monitoring and auditing system based on virtual printing technology. Background technique [0002] With the continuous improvement of the country's security and confidentiality requirements for government, military and other secret-related enterprises and institutions, the importance of security audits of printing behavior and content has become increasingly prominent. According to the relevant requirements of the State Security Bureau, printing security monitoring and auditing mainly involves three aspects: ensuring the security and confidentiality of printing content; monitoring printing behavior and printing content to prevent unauthorized printing behavior and content leakage; being able to audit printing behavior and print content. [0003] However, at present, most secret-related units still adopt traditional...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06G06F3/12
Inventor 石春刚张军锋张永静侯风巍李骁徐钊峰
Owner 北京京航计算通讯研究所
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products