Safty printing using secrete key after being checked
A printer, key technology, applied in key distribution, can solve problems such as multi-processing costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] figure 1 A system diagram of a computing environment in which the invention may be implemented is provided. Such as figure 1 As shown, the computing environment includes a computer 10 , a printer 20 , and a connection 1 . Connection 1 may be a simple local connection between computer 10 and printer 20, such as a serial, USB, Firewire, or other such connection. Alternatively, connection 1 may be a network such as an Ethernet medium consisting of a bus-type physical structure. It should be clear that Connection 1 may also consist of other types of networks, including the Internet.
[0038] Desktop computer 10 is preferably a personal computer or workstation with a Windows operating system such as Microsoft's Windows 2000, Windows ME or Windows XP. As a typical PC-type computer, desktop computer 10 preferably has display 11, keyboard 15, mouse 14, main processing unit 12, hard disk 13, and floppy disk drive and / or other types of storage media (not shown). The contents...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 