Unlock instant, AI-driven research and patent intelligence for your innovation.

Safty printing using secrete key after being checked

A printer, key technology, applied in key distribution, can solve problems such as multi-processing costs

Inactive Publication Date: 2003-06-11
CANON KK
View PDF1 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Finally, certificates from certificate authorities often contain additional information besides the signing public key, and the processing of this additional information during the verification of the signing public key can result in further processing costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safty printing using secrete key after being checked
  • Safty printing using secrete key after being checked
  • Safty printing using secrete key after being checked

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] figure 1 A system diagram of a computing environment in which the invention may be implemented is provided. Such as figure 1 As shown, the computing environment includes a computer 10 , a printer 20 , and a connection 1 . Connection 1 may be a simple local connection between computer 10 and printer 20, such as a serial, USB, Firewire, or other such connection. Alternatively, connection 1 may be a network such as an Ethernet medium consisting of a bus-type physical structure. It should be clear that Connection 1 may also consist of other types of networks, including the Internet.

[0038] Desktop computer 10 is preferably a personal computer or workstation with a Windows operating system such as Microsoft's Windows 2000, Windows ME or Windows XP. As a typical PC-type computer, desktop computer 10 preferably has display 11, keyboard 15, mouse 14, main processing unit 12, hard disk 13, and floppy disk drive and / or other types of storage media (not shown). The contents...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Securely storing a public key for encryption of data in a computing device by using a user-specific key pair which is securely stored in the computing device, including receiving a target public key corresponding to a target device, obtaining a user-specific key pair from a secure registry, using a user-specific private key from the user-specific key pair to create a target key verifier based on the target public key, storing the target key verifier and the target public key in a storage area, retrieving the target key verifier and the target public key from the storage area, applying a user-specific public key from the user-specific key pair to the target key verifier for verifying the authenticity of the target public key, and encrypting data with the target public key, in the case that the authenticity of the target public key is verified, thereby creating encrypted data for transmission to the target device.

Description

technical field [0001] The present invention relates to secure printing, which is achieved by encrypting print data with a verified printer key, without the need for external authentication authorization. More specifically, the invention relates to using a user-specific private key to generate an encrypted key version of the stored printer's public key. When the printer public key is subsequently required for encryption of print data, the encrypted key version is decrypted with the user-specific public key and then compared to the stored printer public key to verify that the stored printer public key has not been altered or corrupted. [0002] reference [0003] United States Patent Application No. 09 / 411 070, filed October 4, 1999, entitled "Targeted Secure Printing," is incorporated herein by reference. Background technique [0004] In a computing environment, a print job generated by a computer at one location on a network can be printed by an image output device at ano...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F3/12G06F21/60H04L9/08
CPCH04L9/0825G06F21/608H04L9/0894G09C5/00
Inventor 罗伊斯·E·斯利克威廉·张唐·F·珀普雷奈尔·Y·伊娃莫托克雷格·麦扎盖特
Owner CANON KK