[0018] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that unless specifically stated otherwise, the relative arrangement of components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention.
[0019] At the same time, it should be understood that, for ease of description, the sizes of the various parts shown in the drawings are not drawn according to actual proportional relationships.
[0020] The following description of at least one exemplary embodiment is actually only illustrative, and in no way serves as any limitation to the present invention and its application or use.
[0021] The technologies, methods, and equipment known to those of ordinary skill in the relevant fields may not be discussed in detail, but where appropriate, the technologies, methods, and equipment should be regarded as part of the specification.
[0022] It should be noted that similar reference numerals and letters indicate similar items in the following drawings, so once an item is defined in one drawing, it does not need to be further discussed in the subsequent drawings.
[0023] The embodiments of the present invention can be applied to computer systems/servers, which can operate with numerous other general-purpose or special-purpose computing system environments or configurations. Examples of well-known computing systems, environments and/or configurations suitable for use with computer systems/servers include, but are not limited to: personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, based Microprocessor systems, set-top boxes, programmable consumer electronics, network personal computers, small computer systems, large computer systems, and distributed cloud computing technology environments including any of the above systems, etc.
[0024] The computer system/server may be described in the general context of computer system executable instructions (such as program modules) executed by the computer system. Generally, program modules may include routines, programs, object programs, components, logic, data structures, etc., which perform specific tasks or implement specific abstract data types. The computer system/server can be implemented in a distributed cloud computing environment. In the distributed cloud computing environment, tasks are executed by remote processing equipment linked through a communication network. In a distributed cloud computing environment, program modules may be located on storage media of local or remote computing systems including storage devices.
[0025] figure 1 It is a schematic flow chart of an embodiment of a user authority management method for network printing according to the present invention, such as figure 1 Shown:
[0026] Step 101: Establish a printing authority control table, set printers allowed to be used by the user and a threshold for the number of printed pages. The threshold for the number of printed pages is, for example, 1,000 pages.
[0027] Step 102: A print request sent by a client device is received, and the print request carries authentication information. The client device can be a PC, a mobile phone, a tablet computer, etc., which can send a print web page to the client setting, and the user enters authentication information in the printed page.
[0028] Step 103: It is judged whether the authentication of the authentication information is successful, and if so, the printer and the threshold of the number of printed pages corresponding to the user are determined. The printer can be a network printer, connected to the printer via Ethernet.
[0029] Step 104: Receive the print file sent by the user, and determine whether the number of printed pages is greater than the threshold of the number of printed pages.
[0030] Step 105: If the number of printed pages is less than the threshold of printed pages, control the printer to print the file, subtract the number of printed pages from the threshold of printed pages to generate a new threshold of printed pages, and store the new threshold of printing business in the printing authority control table in. If the number of printed pages is greater than the threshold for the number of printed pages, a message that the number of printed pages exceeds the set value is sent to the client device.
[0031] figure 2 It is a schematic diagram of the process of encrypting and decrypting printed files in an embodiment of the user authority management method for network printing according to the present invention, such as figure 2 Shown:
[0032] Step 201: If the authentication information is successfully authenticated, the password information corresponding to the user is determined, and the password information is sent to the client device.
[0033] Step 202: Receive an encrypted print file encrypted by the client device using the password information.
[0034] Step 203: Use the password information to decrypt the encrypted print file to obtain the original print file.
[0035] Step 204: Send the original print file to the printer for printing.
[0036] In one embodiment, after the authentication information is successfully authenticated, the shared key is generated. Send the shared key to the client device, receive the encrypted print file in which the client device uses the shared key to perform symmetric encryption, and use the shared key to perform asymmetric decryption processing on the encrypted print file to obtain the original print file. The methods used for symmetric encryption and symmetric decryption include: DES algorithm, 3DES algorithm, etc.
[0037] After the authentication information is successfully authenticated, a public key/private key pair can also be generated. Send the public key of the public/private key pair to the client device, receive the encrypted print file that the client device uses the public key to encrypt and encrypt the encrypted print file, use the private key to decrypt the encrypted print file asymmetrically to obtain the original print file. The methods used for asymmetric encryption and asymmetric decryption include: RSA algorithm, knapsack algorithm, etc.
[0038] After the authentication information is successfully authenticated, the printer corresponding to the user and the verification code information corresponding to the printer are obtained. The verification code information may be a set of numbers and so on. When sending the original print file to the printer for printing, add the verification code information and the original print file to the print job and send it. The printer judges whether the verification code information is consistent with the printing verification code stored by itself, and if it is consistent, it executes the printing task. If they are inconsistent, the printer returns a message that the printer verification failed.
[0039] If the execution of the print task is successful, the printer sends a print success signal, sends a print success message to the client device, and sends the encrypted print file to the print authority management server. The print authority management server uses the private key to perform asymmetric decryption processing on the encrypted print file to obtain the original print file. The printing authority management server generates a printing log and stores it in the log library. The printing log includes: user information, printing time, original printing files, etc. Can provide print log query service.
[0040] Provide a user setting page to the client device, and send the print configuration information set by the user through the user setting page to the print authority management server. The print setting information includes: user name, authentication information, selected printer information, and print page threshold. The print authority management server establishes a print account corresponding to the user and a print authority control table based on the print configuration information.
[0041] The collected verification information input by the user is sent to the printing authority management server for user authentication, so that the printing authority management server determines the printing account corresponding to the user, and determines the printing authority based on the printing account. Receive the verification result sent by the print authority management server, and determine whether the user can perform the corresponding operation based on the verification result.
[0042] When the user needs to configure and manage the printer, the user's identity needs to be verified. The print authority management server pre-establishes a print account and print authority corresponding to the user. Identity verification information includes: user name, password, voiceprint, fingerprint, facial features, etc. Printing permissions include which printers can be used, whether printers can be managed, etc. The user authentication method can be password authentication, fingerprint authentication, facial recognition, voiceprint recognition, etc.
[0043] For example, the client device collects the user's fingerprint, performs numerical processing on the collected fingerprint according to a preset fingerprint algorithm, and obtains and sends the fingerprint characteristic information. The fingerprint feature information is sent to the print authority management server, and the print authority management server compares the stored user fingerprint feature information with the fingerprint feature information. If the comparison is successful, the print account corresponding to the user is determined, based on the print account and The printing authority determines the printer corresponding to this user and the threshold for the number of printed pages.
[0044] The user name and password entered by the user on the print page are sent to the print authority management server, and the print authority management server compares the stored user name and password with the user name and password. If the comparison is successful, the user is determined to correspond Based on the printing account and printing authority, determine the printer corresponding to this user and the threshold of the number of printed pages.
[0045] Obtain the location information of the client device and the location information of the printer. The client device can be equipped with a GPS module, and the user can obtain its own GPS location information. The printer can pre-set the installation location and store the installation location information of the printer, and the printer can also be equipped with a GPS module to obtain its own GPS location information. For example, the GPS modules in the client devices and printer devices upload their own GPS location information.
[0046] Determine whether the client device is in the print permission area according to the location information. The print permission area may be an area where the distance from the printer is less than a preset distance threshold, and the distance threshold may be 10 meters or the like. If it is determined that the distance between the client device and the printer is less than a preset threshold, such as 10 meters, the original print file is sent to the printer for printing.
[0047] In the user authority management method for network printing provided in the above embodiment, after the user is successfully authenticated, the printer and the threshold of the number of printed pages corresponding to the user are determined, the printing is controlled based on the threshold of the number of printed pages, and the password information is sent For the client device, use the password information to decrypt the encrypted print file encrypted by the client device using the password information, and send it to the printer to perform the printing task; the printer judges whether the verification code information is consistent with the verification code stored by itself, if it is consistent , Then execute the printing task; it can set a print quantity threshold for printing and provide a printing security control mechanism. By implementing print encryption and confirming the user’s identity before the encrypted document is printed, the defect of the risk of leakage after the document is printed is eliminated, and the defect Due to the potential safety hazards caused by the plaintext transmission of the files to be printed, network printing can be centrally controlled, making the network printing function more convenient and reliable.
[0048] The method and system of the present invention may be implemented in many ways. For example, the method and system of the present invention can be implemented by software, hardware, firmware or any combination of software, hardware, and firmware. The above-mentioned order of the steps for the method is for illustration only, and the steps of the method of the present invention are not limited to the order specifically described above, unless otherwise specifically stated. In addition, in some embodiments, the present invention can also be implemented as a program recorded in a recording medium, and these programs include machine-readable instructions for implementing the method according to the present invention. Thus, the present invention also covers a recording medium storing a program for executing the method according to the present invention.
[0049] The description of the present invention is given for the sake of example and description, rather than being exhaustive or limiting the present invention to the disclosed form. Many modifications and changes are obvious to those of ordinary skill in the art. The embodiments are selected and described in order to better illustrate the principles and practical applications of the present invention, and to enable those of ordinary skill in the art to understand the present invention so as to design various embodiments with various modifications suitable for specific purposes.