Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud printing method, system and storage medium

A cloud printing and printing terminal technology, applied in the field of network information security, can solve the problems that cloud printing cannot bypass security, potential security risks, and unsatisfactory confidentiality effects, and achieve the effects of avoiding leakage, improving security, and improving encryption level.

Active Publication Date: 2021-11-23
北京辰光融信技术有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for some commercial secrets, military-related documents, or documents that require high confidentiality, the current cloud printing method has great security risks
For example, commercial spies or enemy spies use forged printing terminals to intercept print files, attack the cloud to obtain stolen files, and attach viruses when sending print files to printers or the cloud. This is a security issue that cloud printing cannot bypass at present.
Although some printing apps have set some encryption methods, these encryption methods are common encryption methods, and the confidentiality effect is not ideal. This leads to the fact that the current cloud printing is only suitable for some ordinary printing. Most of the current printing methods are still in the confidentiality unit At present, it is urgent to propose a safe and reliable confidential cloud printing method for confidential personnel who have high confidentiality requirements but cannot print on site

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud printing method, system and storage medium
  • Cloud printing method, system and storage medium
  • Cloud printing method, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions of the present application will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0043] In the description of this application, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present application and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, use a spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud printing method, system and storage medium. The method of the present invention enhances the encryption level of the file through the three-party encryption of the cloud, the remote terminal and the printing terminal. The cloud sends the identity information, which is then forwarded to the printing terminal by the cloud. The cloud makes a preliminary judgment on the remote terminal, and then the printing terminal judges the secret level and identity information of the remote terminal to finally determine whether the printing terminal establishes a connection with the remote terminal. In addition, since the remote terminal only corresponds to one printing terminal, if the cloud receives feedback from more than one printing terminal in the process of broadcasting the identity information of the remote terminal, it can timely identify that there is a fake printing terminal in the network where the current printing terminal is located. Improve the security of the print terminal.

Description

technical field [0001] The invention belongs to the field of network information security, and in particular relates to a cloud printing method, system and storage medium in a cloud network. Background technique [0002] With the development of network technology, the printing method of printers has also developed from the original U disk printing or direct connection printing to the current cloud printing method. The cloud printing method directly sends printing files through the Internet, and deploys printing equipment through the cloud, which greatly improves printing efficiency and improves work convenience. [0003] However, for some commercial secrets, military-related documents, or documents that require high confidentiality, the current cloud printing method has great security risks. For example, commercial spies or enemy spies use forged printing terminals to intercept print files, attack the cloud to obtain stolen files, and attach viruses when sending print files...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/12
CPCG06F3/1222G06F3/1238G06F3/1285
Inventor 杨香玉颜志鑫李远
Owner 北京辰光融信技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products