CN106445429A - Safe printing method and system - Google Patents
Safe printing method and system Download PDFInfo
- Publication number
- CN106445429A CN106445429A CN201611048074.8A CN201611048074A CN106445429A CN 106445429 A CN106445429 A CN 106445429A CN 201611048074 A CN201611048074 A CN 201611048074A CN 106445429 A CN106445429 A CN 106445429A
- Authority
- CN
- China
- Prior art keywords
- file
- cipher mode
- firmware upgrade
- printer
- printed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1224—Client or server resources management
- G06F3/1225—Software update, e.g. print driver, modules, plug-ins, fonts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1238—Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1279—Controller construction, e.g. aspects of the interface hardware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
The invention discloses a safe printing method. The method comprises the following steps: pushing a printed page to user equipment, wherein the printed page carries a first encryption mode; receiving a printed ciphertext sent from the printed page, wherein the ciphertext is obtained by encrypting a to-be-printed file according to the first encryption mode, and the to-be-printed file is a file selected by a user through the user equipment; decrypting the printed ciphertext according to the first encryption mode to obtain the to-be-printed file; and sending the to-be-printed file to a printer to enable the printer to print the to-be-printed file. The invention also discloses a safe printing system. According to the safe printing method and system disclosed by the invention, by pushing the printed page carrying the first encryption mode to the user equipment, the printed page can encrypt the to-be-printed file according to the first encryption mode, thereby avoiding the problem of potential safety hazards caused by plain text transmission of the to-be-printed file.
Description
Technical field
The present invention relates to printing technique field, more particularly, to a kind of safe printing method and system.
Background technology
At present, printer can be by the APP that installed on mobile terminal come remotely control printer, thus realizing remotely beating
Print, but because APP is very easy to be monitored by hacker, leads to security not good, for overcoming this problem, network communication equipment can be passed through
To connect printer, user can be directly accessed network communication equipment by mobile terminal, and controlling network communication equipment is to printer
Send file to be printed and print command, thus realizing remotely control printer.
Because file to be printed is to be transferred to the network equipment using clear-text way, easily obtained by a hacker, thus causing letter
, there is potential safety hazard in the problems such as breath is revealed.
The above is only used for auxiliary and understands technical scheme, does not represent and recognizes that the above is existing skill
Art.
Content of the invention
Present invention is primarily targeted at providing a kind of safe printing method and system it is intended to solve to wait in prior art to beat
Printed text part adopts the technical problem of potential safety hazard existing for clear-text way transmission.
For achieving the above object, the present invention provides a kind of safe printing method, the method comprising the steps of:
Push printer page to user equipment, in described printer page, carry the first cipher mode;
Receive the printing ciphertext being sent by described printer page, described printing ciphertext is treated by described first cipher mode
Mimeograph documents are encrypted acquisition, and described file to be printed passes through the file selected by described user equipment for user;
According to described first cipher mode, described printing ciphertext is decrypted, obtains described file to be printed;
Described file to be printed is sent to printer, so that described printer prints described file to be printed.
Preferably, before the described push printer page to user equipment, methods described also includes:
Receive the Current hardware identifier that described user equipment sends, according to described Current hardware identifier obtain with described
Corresponding first cipher mode of Current hardware identifier.
Preferably, the described Current hardware identifier receiving described user equipment transmission, identifies according to described Current hardware
Number obtain first cipher mode corresponding with described Current hardware identifier, specifically include:
Receive the Current hardware identifier that described user equipment sends, mapping is searched according to described Current hardware identifier and closes
System, obtains first cipher mode corresponding with described Current hardware identifier, and described mapping relations include:Hardware identification number and plus
Corresponding relation between close mode;
Obtain first cipher mode corresponding with described Current hardware identifier.
Preferably, described to user equipment push printer page, specifically include:
When receiving the page request that described user equipment sends, send to described mobile terminal and push printer page.
Preferably, methods described also includes:
Send firmware upgrade request to server, in described firmware upgrade request, carry the second cipher mode;
Receive the upgrading ciphertext being sent by described server, described upgrading ciphertext is by described second cipher mode to firmware
Upgrade file is encrypted acquisition, and described firmware upgrade file is searched when receiving described firmware upgrade request by described server
Obtain;
According to described second cipher mode, described upgrading ciphertext is decrypted, obtains described firmware upgrade file;
Described firmware upgrade file is sent to printer, so that described printer is carried out according to described firmware upgrade file
Firmware upgrade.
Additionally, for achieving the above object, the present invention also provides a kind of secure printing system, and described system includes:
Page push module, for pushing printer page to user equipment, carries the first encryption in described printer page
Mode;
Print receiver module, for receiving the printing ciphertext being sent by described printer page, described printing ciphertext is by institute
State the first cipher mode and acquisition is encrypted to file to be printed, described file to be printed passes through described user equipment institute for user
The file chosen;
Print deciphering module, for being decrypted to described printing ciphertext according to described first cipher mode, obtain described
File to be printed;
File printout module, for sending described file to be printed to printer, so that the printing of described printer is described
File to be printed.
Preferably, described system also includes:
Mode acquisition module, for receiving the Current hardware identifier that described user equipment sends, according to described currently hard
Part identifier obtains first cipher mode corresponding with described Current hardware identifier.
Preferably, described mode acquisition module, specifically for receiving the Current hardware identifier that described user equipment sends,
Mapping relations are searched according to described Current hardware identifier, obtains first encryption side corresponding with described Current hardware identifier
Formula, described mapping relations include:Corresponding relation between hardware identification number and cipher mode;Obtain and described Current hardware identification
Number corresponding first cipher mode.
Preferably, described page push module, specifically for when receiving the page request that described user equipment sends,
Send to described mobile terminal and push printer page.
Preferably, described system also includes:
Request sending module, for sending firmware upgrade request to server, carries the in described firmware upgrade request
Two cipher modes;
Upgrading receiver module, for receiving the upgrading ciphertext being sent by described server, described upgrading ciphertext is by described
Second cipher mode is encrypted acquisition to firmware upgrade file, and described firmware upgrade file is received described by described server
Search during firmware upgrade request and obtain;
Upgrading deciphering module, for being decrypted to described upgrading ciphertext according to described second cipher mode, obtains described
Firmware upgrade file;
Firmware upgrade module, for sending described firmware upgrade file to printer, so that described printer is according to institute
State firmware upgrade file and carry out firmware upgrade.
The present invention passes through to carry the printer page of the first cipher mode so that printer page can root to user equipment push
According to described first cipher mode, file to be printed is encrypted, thus avoid that plaintext side is passed through due to described file to be printed
The brought security hidden trouble of formula transmission.
Brief description
Fig. 1 is the schematic flow sheet of safe printing method first embodiment of the present invention;
Fig. 2 is the schematic flow sheet of safe printing method second embodiment of the present invention;
Fig. 3 is the schematic flow sheet of safe printing method 3rd embodiment of the present invention;
Fig. 4 is the schematic flow sheet of safe printing method fourth embodiment of the present invention;
Fig. 5 is the high-level schematic functional block diagram of secure printing system first embodiment of the present invention;
Fig. 6 is the high-level schematic functional block diagram of secure printing system second embodiment of the present invention;
Fig. 7 is the high-level schematic functional block diagram of secure printing system 3rd embodiment of the present invention;
Fig. 8 is the high-level schematic functional block diagram of secure printing system fourth embodiment of the present invention.
The realization of the object of the invention, functional characteristics and advantage will be described further in conjunction with the embodiments referring to the drawings.
Specific embodiment
It should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
With reference to Fig. 1, first embodiment of the invention provides a kind of safe printing method, and methods described includes:
S10:Push printer page to user equipment, in described printer page, carry the first cipher mode;
It should be noted that the executive agent of the method for the present embodiment is network communication equipment, described network communication equipment
It is the equipment for realizing network service, for example:Router or hub etc..
It will be appreciated that described user equipment is the terminal device with communication function, such as:Smart mobile phone, flat board electricity
Brain, notebook computer or palm PC PDA etc..
In implementing, described user equipment can pass through WiFi technology access network communication equipment, correspondingly, described net
Printer page also can be pushed to described user equipment by WiFi technology by network communication equipment, and certainly, described user equipment also may be used
By other technologies access network communication equipment, the present embodiment is not any limitation as to this.
It should be understood that described first cipher mode includes:For realizing the information of file encryption, for example:AES
And the information such as encryption key, the present embodiment is not any limitation as to this.
S20:Receive the printing ciphertext being sent by described printer page, described printing ciphertext is by described first cipher mode
File to be printed is encrypted with acquisition, described file to be printed passes through the file selected by described user equipment for user;
It should be noted that after user equipment receives printer page, described printer page can be shown, this
When, user can choose file to be printed by the input module of user equipment.
It will be appreciated that described printing ciphertext is encrypted acquisition by described first cipher mode to file to be printed,
That is, by described first cipher mode, file to be printed is encrypted and can obtain described printing ciphertext.
In implementing, the input module of described user equipment can be the groups such as keyboard, mouse, touch-screen or handwriting pad
Part, the present embodiment is not any limitation as to this.
S30:According to described first cipher mode, described printing ciphertext is decrypted, obtains described file to be printed;
It will be appreciated that acquisition is encrypted to file to be printed by described first cipher mode due to printing ciphertext, therefore
And, according to described first cipher mode, described printing ciphertext can be decrypted.
S40:Described file to be printed is sent to printer, so that described printer prints described file to be printed.
The present embodiment passes through to carry the printer page of the first cipher mode so that printer page can to user equipment push
According to described first cipher mode, file to be printed is encrypted, thus avoid being passed through in plain text due to described file to be printed
Mode transmits brought security hidden trouble.
With reference to Fig. 2, Fig. 2 is the schematic flow sheet of safe printing method second embodiment of the present invention, based on shown in above-mentioned Fig. 1
Embodiment, propose safe printing method of the present invention second embodiment.
In the present embodiment, before step S10, methods described also includes:
S00:Receive the Current hardware identifier that described user equipment sends, according to described Current hardware identifier obtain with
Corresponding first cipher mode of described Current hardware identifier.
If it will be appreciated that the first cipher mode all same entrained by printer page, encryption routine can be led to excessively
Single, in order to improve security further, in the present embodiment, corresponding the can be obtained according to the hardware identification number of user equipment
One cipher mode.
In implementing, the Current hardware identifier that described user equipment sends can be received, according to described Current hardware
Identifier searches mapping relations, obtains first cipher mode corresponding with described Current hardware identifier, described mapping relations bag
Include:Corresponding relation between hardware identification number and cipher mode;Obtain first encryption corresponding with described Current hardware identifier
Mode.
That is, pre-building mapping relations, when receiving Current hardware identifier, first according to described Current hardware
Identifier searches described mapping relations, certainly it is assumed that there is not described Current hardware identifier in described mapping relations, then can be with
Machine generates first cipher mode, then the corresponding relation between the first cipher mode generating and Current hardware identifier is deposited
Enter in described mapping relations.
It should be understood that described hardware identification number is the number for identifying device hardware, it can be MAC Address,
Can be International Mobile Equipment Identity code (International Mobile Equipment Identity, IMEI), certainly,
Also for other similar numbers, the present embodiment, this can be any limitation as.
With reference to Fig. 3, Fig. 3 is the schematic flow sheet of safe printing method 3rd embodiment of the present invention, based on above-mentioned Fig. 1 or 2
Shown embodiment, proposes the 3rd embodiment of safe printing method of the present invention, Fig. 3 is taking based on the embodiment shown in Fig. 1 as a example.
In the present embodiment, step S10 specifically includes:
S10’:When receiving the page request that described user equipment sends, send to described mobile terminal and push printing
The page.
It will be appreciated that to user equipment push printer page when, can from described network communication equipment active to
Family equipment pushes printer page, but which may affect the normal use of user equipment, thus causing Consumer's Experience relatively low,
So, in the present embodiment, can send to described mobile terminal and push when receiving the page request that described user equipment sends
Printer page.
With reference to Fig. 4, Fig. 4 is the schematic flow sheet of safe printing method fourth embodiment of the present invention, based on above-mentioned Fig. 1 or 2
Shown embodiment, proposes the fourth embodiment of safe printing method of the present invention, Fig. 4 is taking based on the embodiment shown in Fig. 1 as a example.
In the present embodiment, methods described also includes:
S50:Send firmware upgrade request to server, in described firmware upgrade request, carry the second cipher mode;
It should be understood that described second cipher mode also includes:For realizing the information of file encryption, for example:Encryption is calculated
The information such as method and encryption key, the present embodiment is not any limitation as to this.
S60:Receive the upgrading ciphertext being sent by described server, described upgrading ciphertext is by described second cipher mode pair
Firmware upgrade file is encrypted acquisition, when described firmware upgrade file receives described firmware upgrade request by described server
Search and obtain;
It will be appreciated that described upgrading ciphertext is encrypted acquisition by described second cipher mode to firmware upgrade file,
That is, by described second cipher mode, firmware upgrade file is encrypted to obtain described printing ciphertext.
It should be noted that described firmware upgrade file is the file for described printer is carried out with firmware upgrade.
In implementing, after having new firmware upgrade file presence, technical staff would generally be by described new consolidating
Part upgrade file is stored in described server, after server receives firmware upgrade request, can search and described firmware
Upgrade request corresponding firmware upgrade file, certainly it is assumed that not finding corresponding firmware upgrade file, is not then subsequently walked
Suddenly.
S70:According to described second cipher mode, described upgrading ciphertext is decrypted, obtains described firmware upgrade file;
It will be appreciated that because upgrading ciphertext is encrypted acquisition by described second cipher mode to firmware upgrade file,
So, according to described second cipher mode, described upgrading ciphertext can be decrypted.
S80:Described firmware upgrade file is sent to printer, so that described printer is according to described firmware upgrade file
Carry out firmware upgrade.
It should be noted that because described printer is sometimes for carrying out firmware upgrade, but firmware upgrade file is assumed to adopt
With plaintext version transmission, be also very easy to be intercepted by hacker, by or in firmware upgrade file setting wooden horse or virus, thus
, there is potential safety hazard in the normal use of impact printer, described firmware upgrade file can be encrypted in the present embodiment, it is to avoid
The potential safety hazard existing during firmware upgrade.
Fig. 5 is the high-level schematic functional block diagram of secure printing system first embodiment of the present invention, with reference to Fig. 5, described system bag
Include:
Page push module 10, for pushing printer page to user equipment, carries first and adds in described printer page
Close mode;
It should be noted that the system of the present embodiment can be deployed on network communication equipment, described network communication equipment is
For realizing the equipment of network service, for example:Router or hub etc..
It will be appreciated that described user equipment is the terminal device with communication function, such as:Smart mobile phone, flat board electricity
Brain, notebook computer or palm PC PDA etc..
In implementing, described user equipment can pass through WiFi technology access network communication equipment, correspondingly, described net
Printer page also can be pushed to described user equipment by WiFi technology by network communication equipment, and certainly, described user equipment also may be used
By other technologies access network communication equipment, the present embodiment is not any limitation as to this.
It should be understood that described first cipher mode includes:For realizing the information of file encryption, for example:AES
And the information such as encryption key, the present embodiment is not any limitation as to this.
Print receiver module 20, for receiving the printing ciphertext that sent by described printer page, described printing ciphertext by
Described first cipher mode is encrypted acquisition to file to be printed, and described file to be printed passes through described user equipment for user
Selected file;
It should be noted that after user equipment receives printer page, described printer page can be shown, this
When, user can choose file to be printed by the input module of user equipment.
It will be appreciated that described printing ciphertext is encrypted acquisition by described first cipher mode to file to be printed,
That is, by described first cipher mode, file to be printed is encrypted and can obtain described printing ciphertext.
In implementing, the input module of described user equipment can be the groups such as keyboard, mouse, touch-screen or handwriting pad
Part, the present embodiment is not any limitation as to this.
Print deciphering module 30, for being decrypted to described printing ciphertext according to described first cipher mode, obtain institute
State file to be printed;
It will be appreciated that acquisition is encrypted to file to be printed by described first cipher mode due to printing ciphertext, therefore
And, according to described first cipher mode, described printing ciphertext can be decrypted.
File printout module 40, for sending described file to be printed to printer, so that described printer prints institute
State file to be printed.
The present embodiment passes through to carry the printer page of the first cipher mode so that printer page can to user equipment push
According to described first cipher mode, file to be printed is encrypted, thus avoid being passed through in plain text due to described file to be printed
Mode transmits brought security hidden trouble.
With reference to Fig. 6, Fig. 6 is the high-level schematic functional block diagram of secure printing system second embodiment of the present invention, based on above-mentioned Fig. 5
Shown embodiment, proposes the second embodiment of secure printing system of the present invention.
In the present embodiment, described system also includes:
Mode acquisition module 00, for receiving the Current hardware identifier that described user equipment sends, according to described current
Hardware identification number obtains first cipher mode corresponding with described Current hardware identifier.
If it will be appreciated that the first cipher mode all same entrained by printer page, encryption routine can be led to excessively
Single, in order to improve security further, in the present embodiment, corresponding the can be obtained according to the hardware identification number of user equipment
One cipher mode.
In implementing, the Current hardware identifier that described user equipment sends can be received, according to described Current hardware
Identifier searches mapping relations, obtains first cipher mode corresponding with described Current hardware identifier, described mapping relations bag
Include:Corresponding relation between hardware identification number and cipher mode;Obtain first encryption corresponding with described Current hardware identifier
Mode.
That is, pre-building mapping relations, when receiving Current hardware identifier, first according to described Current hardware
Identifier searches described mapping relations, certainly it is assumed that there is not described Current hardware identifier in described mapping relations, then can be with
Machine generates first cipher mode, then the corresponding relation between the first cipher mode generating and Current hardware identifier is deposited
Enter in described mapping relations.
It should be understood that described hardware identification number is the number for identifying device hardware, it can be MAC Address,
Can be International Mobile Equipment Identity code (International Mobile Equipment Identity, IMEI), certainly,
Also for other similar numbers, the present embodiment, this can be any limitation as.
With reference to Fig. 7, Fig. 7 is the high-level schematic functional block diagram of secure printing system 3rd embodiment of the present invention, based on above-mentioned Fig. 5
Or the embodiment shown in 6, the 3rd embodiment of secure printing system of the present invention is proposed, Fig. 7 is based on the embodiment shown in Fig. 5 to be
Example.
In the present embodiment, described page push module 10 ', specifically for receiving the page that described user equipment sends
During request, send to described mobile terminal and push printer page.
It will be appreciated that to user equipment push printer page when, can from described network communication equipment active to
Family equipment pushes printer page, but which may affect the normal use of user equipment, thus causing Consumer's Experience relatively low,
So, in the present embodiment, can send to described mobile terminal and push when receiving the page request that described user equipment sends
Printer page.
With reference to Fig. 8, Fig. 8 is the high-level schematic functional block diagram of secure printing system fourth embodiment of the present invention, based on above-mentioned Fig. 5
Or the embodiment shown in 6, the fourth embodiment of secure printing system of the present invention is proposed, Fig. 8 is based on the embodiment shown in Fig. 5 to be
Example.
In the present embodiment, described system also includes:
Request sending module 50, for sending firmware upgrade request to server, carries in described firmware upgrade request
Second cipher mode;
It should be understood that described second cipher mode also includes:For realizing the information of file encryption, for example:Encryption is calculated
The information such as method and encryption key, the present embodiment is not any limitation as to this.
Upgrading receiver module 60, for receiving the upgrading ciphertext being sent by described server, described upgrading ciphertext is by institute
State the second cipher mode and acquisition is encrypted to firmware upgrade file, described firmware upgrade file receives institute by described server
Search when stating firmware upgrade request and obtain;
It will be appreciated that described upgrading ciphertext is encrypted acquisition by described second cipher mode to firmware upgrade file,
That is, by described second cipher mode, firmware upgrade file is encrypted to obtain described printing ciphertext.
It should be noted that described firmware upgrade file is the file for described printer is carried out with firmware upgrade.
In implementing, after having new firmware upgrade file presence, technical staff would generally be by described new consolidating
Part upgrade file is stored in described server, after server receives firmware upgrade request, can search and described firmware
Upgrade request corresponding firmware upgrade file, certainly it is assumed that not finding corresponding firmware upgrade file, does not then recall follow-up mould
Block.
Upgrading deciphering module 70, for being decrypted to described upgrading ciphertext according to described second cipher mode, obtains institute
State firmware upgrade file;
It will be appreciated that because upgrading ciphertext is encrypted acquisition by described second cipher mode to firmware upgrade file,
So, according to described second cipher mode, described upgrading ciphertext can be decrypted.
Firmware upgrade module 80, for described firmware upgrade file is sent to printer so that described printer according to
Described firmware upgrade file carries out firmware upgrade.
It should be noted that because described printer is sometimes for carrying out firmware upgrade, but firmware upgrade file is assumed to adopt
With plaintext version transmission, be also very easy to be intercepted by hacker, by or in firmware upgrade file setting wooden horse or virus, thus
, there is potential safety hazard in the normal use of impact printer, described firmware upgrade file can be encrypted in the present embodiment, it is to avoid
The potential safety hazard existing during firmware upgrade.
It should be noted that herein, term " inclusion ", "comprising" or its any other variant are intended to non-row
The comprising of his property, so that including a series of process of key elements, method, article or system not only include those key elements, and
And also include other key elements of being not expressly set out, or also include intrinsic for this process, method, article or system institute
Key element.In the absence of more restrictions, the key element being limited by sentence "including a ..." is it is not excluded that including being somebody's turn to do
Also there is other identical element in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by the mode of software plus necessary general hardware platform naturally it is also possible to pass through hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Go out partly can embodying in the form of software product of contribution, this computer software product is stored in a storage medium
In (as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal equipment (can be mobile phone, computer, clothes
Business device, air-conditioner, or network equipment etc.) method described in execution each embodiment of the present invention.
These are only the preferred embodiments of the present invention, not thereby limit the present invention the scope of the claims, every using this
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of safe printing method is it is characterised in that the method comprising the steps of:
Push printer page to user equipment, in described printer page, carry the first cipher mode;
Receive the printing ciphertext being sent by described printer page, described printing ciphertext is by described first cipher mode to be printed
File is encrypted acquisition, and described file to be printed passes through the file selected by described user equipment for user;
According to described first cipher mode, described printing ciphertext is decrypted, obtains described file to be printed;
Described file to be printed is sent to printer, so that described printer prints described file to be printed.
2. the method for claim 1 it is characterised in that described to user equipment push printer page before, described side
Method also includes:
Receive the Current hardware identifier that described user equipment sends, obtained according to described Current hardware identifier current with described
Corresponding first cipher mode of hardware identification number.
3. method as claimed in claim 2 is it is characterised in that the Current hardware that the described user equipment of described reception sends identifies
Number, first cipher mode corresponding with described Current hardware identifier is obtained according to described Current hardware identifier, specifically includes:
Receive the Current hardware identifier that described user equipment sends, mapping relations searched according to described Current hardware identifier,
Obtain first cipher mode corresponding with described Current hardware identifier, described mapping relations include:Hardware identification number and encryption
Corresponding relation between mode;
Obtain first cipher mode corresponding with described Current hardware identifier.
4. the method as any one of claims 1 to 3 it is characterised in that described to user equipment push printer page,
Specifically include:
When receiving the page request that described user equipment sends, send to described mobile terminal and push printer page.
5. the method as any one of claims 1 to 3 is it is characterised in that methods described also includes:
Send firmware upgrade request to server, in described firmware upgrade request, carry the second cipher mode;
Receive the upgrading ciphertext being sent by described server, described upgrading ciphertext is by described second cipher mode to firmware upgrade
File is encrypted acquisition, and described firmware upgrade file is searched when receiving described firmware upgrade request by described server and obtained
?;
According to described second cipher mode, described upgrading ciphertext is decrypted, obtains described firmware upgrade file;
Described firmware upgrade file is sent to printer, so that described printer carries out firmware according to described firmware upgrade file
Upgrading.
6. a kind of secure printing system is it is characterised in that described system includes:
Page push module, for pushing printer page to user equipment, carries the first cipher mode in described printer page;
Print receiver module, for receiving the printing ciphertext that sent by described printer page, described printing ciphertext is by described the
One cipher mode is encrypted acquisition to file to be printed, and described file to be printed passes through selected by described user equipment for user
File;
Print deciphering module, for being decrypted to described printing ciphertext according to described first cipher mode, wait described in acquisition to beat
Printed text part;
File printout module, for sending described file to be printed to printer, so that wait to beat described in the printing of described printer
Printed text part.
7. system as claimed in claim 6 is it is characterised in that described system also includes:
Mode acquisition module, for receiving the Current hardware identifier that described user equipment sends, knows according to described Current hardware
Alias obtains first cipher mode corresponding with described Current hardware identifier.
8. system as claimed in claim 7 is it is characterised in that described mode acquisition module, specifically for receiving described user
The Current hardware identifier that equipment sends, searches mapping relations according to described Current hardware identifier, obtains currently hard with described
Corresponding first cipher mode of part identifier, described mapping relations include:Corresponding pass between hardware identification number and cipher mode
System;Obtain first cipher mode corresponding with described Current hardware identifier.
9. the system as any one of claim 6~8 is it is characterised in that described page push module, specifically for
When receiving the page request that described user equipment sends, send to described mobile terminal and push printer page.
10. the system as any one of claim 6~8 is it is characterised in that described system also includes:
Request sending module, for sending firmware upgrade request to server, carries second in described firmware upgrade request and adds
Close mode;
Upgrading receiver module, for receiving the upgrading ciphertext that sent by described server, described upgrading ciphertext is by described second
Cipher mode is encrypted acquisition to firmware upgrade file, and described firmware upgrade file receives described firmware by described server
Search during upgrade request and obtain;
Upgrading deciphering module, for being decrypted to described upgrading ciphertext according to described second cipher mode, obtains described firmware
Upgrade file;
Firmware upgrade module, for sending described firmware upgrade file to printer, so that described printer is according to described solid
Part upgrade file carries out firmware upgrade.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611048074.8A CN106445429A (en) | 2016-11-23 | 2016-11-23 | Safe printing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611048074.8A CN106445429A (en) | 2016-11-23 | 2016-11-23 | Safe printing method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106445429A true CN106445429A (en) | 2017-02-22 |
Family
ID=58218160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611048074.8A Pending CN106445429A (en) | 2016-11-23 | 2016-11-23 | Safe printing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106445429A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107885469A (en) * | 2017-10-10 | 2018-04-06 | 福州汇思博信息技术有限公司 | A kind of Method of printing and printing server |
CN109767516A (en) * | 2018-12-14 | 2019-05-17 | 北京摩拜科技有限公司 | Log setting and Method of printing, setting and printing device and log system |
CN114826789A (en) * | 2022-06-29 | 2022-07-29 | 北京辰光融信技术有限公司 | Printing control method and system for ensuring data safe transmission |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872402A (en) * | 2010-05-26 | 2010-10-27 | 上海北大方正科技电脑***有限公司 | Safe printing method |
CN101977190A (en) * | 2010-10-25 | 2011-02-16 | 北京中科联众科技有限公司 | Digital content encryption transmission method and server side |
CN103842956A (en) * | 2011-09-30 | 2014-06-04 | 英特尔公司 | Secure printing between printer and print client device |
CN104239109A (en) * | 2014-09-30 | 2014-12-24 | 上海瑞猫自动化控制技术有限公司 | Method for on-line management of embedded system firmware |
CN105763325A (en) * | 2016-05-10 | 2016-07-13 | 中国联合网络通信集团有限公司 | Encryption authentication method and device |
-
2016
- 2016-11-23 CN CN201611048074.8A patent/CN106445429A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101872402A (en) * | 2010-05-26 | 2010-10-27 | 上海北大方正科技电脑***有限公司 | Safe printing method |
CN101977190A (en) * | 2010-10-25 | 2011-02-16 | 北京中科联众科技有限公司 | Digital content encryption transmission method and server side |
CN103842956A (en) * | 2011-09-30 | 2014-06-04 | 英特尔公司 | Secure printing between printer and print client device |
CN104239109A (en) * | 2014-09-30 | 2014-12-24 | 上海瑞猫自动化控制技术有限公司 | Method for on-line management of embedded system firmware |
CN105763325A (en) * | 2016-05-10 | 2016-07-13 | 中国联合网络通信集团有限公司 | Encryption authentication method and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107885469A (en) * | 2017-10-10 | 2018-04-06 | 福州汇思博信息技术有限公司 | A kind of Method of printing and printing server |
CN109767516A (en) * | 2018-12-14 | 2019-05-17 | 北京摩拜科技有限公司 | Log setting and Method of printing, setting and printing device and log system |
CN109767516B (en) * | 2018-12-14 | 2021-06-11 | 汉海信息技术(上海)有限公司 | Log setting and printing method, setting and printing apparatus, and log system |
CN114826789A (en) * | 2022-06-29 | 2022-07-29 | 北京辰光融信技术有限公司 | Printing control method and system for ensuring data safe transmission |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10346109B2 (en) | Terminal device and printer | |
US8264731B1 (en) | Printing management system and printing management method | |
CN106657152B (en) | Authentication method, server and access control device | |
US9195420B2 (en) | Secure print job through mobile device ID | |
CN107801165B (en) | Business short message pushing method and device, computer equipment and storage medium | |
CN102946392B (en) | A kind of url data encrypted transmission method and system | |
CN102420821B (en) | Method and system for improving transmission security of file | |
CN110287682A (en) | A kind of login method, apparatus and system | |
US20170078876A1 (en) | Wireless Network Connection Method, Apparatus, And System | |
CN103095457A (en) | Login and verification method for application program | |
KR101296786B1 (en) | Apparatus and method for printing control using virtual printer, authentication server and method for authentication thereof | |
CN106445429A (en) | Safe printing method and system | |
CN105516135A (en) | Method and device used for account login | |
EP3084685A1 (en) | Wireless communication of print content | |
CN105392133A (en) | Method and system for wireless function device to automatically access to wireless access point | |
US20150026783A1 (en) | Wireless authentication system and wireless authentication method | |
US20150009522A1 (en) | Selection of a configuration link to receive activation data | |
CN107113320B (en) | Method, related equipment and system for downloading signed file | |
TWI499253B (en) | Printing device and secure printing method | |
JP6296376B2 (en) | Terminal device and printer | |
JP5074140B2 (en) | Base station apparatus and terminal apparatus | |
KR101535622B1 (en) | Common use printer security system using indivisual authentication, encryption and decryption, and common use printer security method using the same | |
US8560620B2 (en) | Information processing apparatus, control method of E-mail appended document in that information processing apparatus, and storage medium storing program thereof | |
CN106412904B (en) | Method and system for preventing counterfeit user authentication authority | |
CN104469758B (en) | More equipment safety login methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |