US20050200890A1 - Printer and print system - Google Patents
Printer and print system Download PDFInfo
- Publication number
- US20050200890A1 US20050200890A1 US11/114,605 US11460505A US2005200890A1 US 20050200890 A1 US20050200890 A1 US 20050200890A1 US 11460505 A US11460505 A US 11460505A US 2005200890 A1 US2005200890 A1 US 2005200890A1
- Authority
- US
- United States
- Prior art keywords
- printer
- public key
- position information
- printer position
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Definitions
- the present invention relates to a printer and a print system, and particularly relates to a printer and a print system which set a limit to a place where a printer operation can be executed.
- the printer manufacturer wants to limit a place where the lent printer can be used, that is, a place where a proper print operation can be executed to a place of the user to whom the printer is lent.
- the present invention is made in view of the aforementioned problem, and an object of the present invention is to provide a printer and a print system capable of executing a proper print operation only in a place registered in advance.
- a printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information
- a public key generator which generates a public key with a passphrase containing at least the first printer position information
- a public key storage in which the public key generated by the public key generator is stored, the number of times the public key is allowed to be stored being limited to a predetermined number of times;
- a print data receiver which receives print data encrypted with the public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times;
- a public key generator which reads the first printer position information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information
- a print data receiver which receives print data encrypted with the public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times;
- a public key acquisition request receiver which receives a public key acquisition request to request acquisition of a public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information;
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and which generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- a control method of a printer comprises the steps of:
- printer position information to specify a place where the printer is installed from a printer position information acquisition and regarding this printer position information as first printer position information
- the number of times the public key is allowed to be stored being limited to a predetermined number of times
- printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information
- a control method of a printer comprises the steps of:
- printer position information to specify a place where the printer is installed from a printer position information acquisition and regarding this printer position information as first printer position information
- the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times
- printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information
- a control method of a printer comprises the steps of:
- printer position information to specify a place where the printer is installed from a printer position information acquisition and regarding this printer position information as first printer position information
- the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times
- a print system includes a printer and a print client, wherein
- the printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information
- a public key generator which generates a public key with a passphrase containing at least the first printer position information
- a public key storage in which the public key generated by the public key generator is stored, the number of times the public key is allowed to be stored being limited to a predetermined number of times,
- the print client comprises:
- a print data generator which generates print data to be printed by the printer
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer
- the printer further comprises:
- a print data receiver which receives the print data
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a print system includes a printer and a print client, wherein
- the printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times;
- a public key generator which reads the first printer position information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information
- the print client comprises:
- a print data generator which generates print data to be printed by the printer
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer
- the printer further comprises:
- a print data receiver which receives the print data
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a print system includes a printer and a print client, wherein
- the printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times,
- the print client comprises:
- a public key acquisition request transmitter which transmits a public key acquisition request to request acquisition of a public key
- the printer further comprises:
- a public key acquisition request receiver which receives the public key acquisition request
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information;
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- a printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a public key generator which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and generates a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request;
- a print data receiver which receives print data encrypted with the public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- a public key generator which reads the first printer position information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information
- a print data receiver which receives print data encrypted with the public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- a public key acquisition request receiver which receives a public key acquisition request to request acquisition of a public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information;
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- a control method of a printer comprises the steps of:
- printer position information to specify a place where the printer is installed from a printer position information acquisition, regarding this printer position information as first printer position information, and generating a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request;
- printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information
- a control method of a printer comprises the steps of:
- printer position information from a printer position information acquisition to specify a place where the printer is installed, regarding this printer position information as first printer position information, and storing the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information
- a control method of a printer comprises the steps of:
- printer position information to specify a place where the printer is installed from a printer position information acquisition, regarding this printer position information as first printer position information, and storing the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- a print system includes a printer and a print client, wherein
- the printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a public key generator which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and generates a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request;
- the print client comprises:
- a print data generator which generates print data to be printed by the printer
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer
- the printer further comprises:
- a print data receiver which receives the print data encrypted with the public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a print system includes a printer and a print client, wherein
- the printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- a public key generator which reads the first printer posit ion information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information
- the print client comprises:
- a print data generator which generates print data to be printed by the printer
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer
- the printer further comprises:
- a print data receiver which receives print data encrypted with the public key
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information
- a private key generator which generates a private key with a passphrase containing at least the second printer position information
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- a print system includes a printer and a print client, wherein
- the printer comprises:
- printer position information acquisition which acquires printer position information to specify a place where the printer is installed
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request,
- the print client comprises:
- a public key acquisition request transmitter which transmits a public key acquisition request to request acquisition of a public key
- the printer further comprises:
- a public key acquisition request receiver which receives the public key acquisition request
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information;
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- FIG. 1 is a diagram showing an example of the configuration of a print system according to a first embodiment of the present invention
- FIG. 2 is a diagram showing an example of the hardware configuration of a printer according to the first embodiment of the present invention
- FIG. 3 is a diagram showing an example of the configuration of a print client according to the first embodiment of the present invention
- FIG. 4 is a conceptual diagram explaining encryption and decryption of print data with a public key and a private key in the first embodiment of present invention
- FIG. 5 is a flowchart explaining a public key generation process executed by the printer according to the first embodiment of the present invention.
- FIG. 6 is a diagram showing the structure of a public key storage formed in an EEPROM of the printer according to the first embodiment of the present invention
- FIG. 7 is a flowchart explaining a public key request process executed by the print client according to the first embodiment of the present invention.
- FIG. 8 is a diagram showing an example of the structure of a public key table included in the print client according to the first embodiment of the present invention.
- FIG. 9 is a part of a flowchart explaining a public key transmission process executed by the printer according to the first embodiment of the present invention.
- FIG. 10 is a flowchart explaining a print request process executed by the print client according to the first embodiment of the present invention.
- FIG. 11A is a flowchart explaining a print execution process executed by the printer according to the first embodiment of the present invention.
- FIG. 11B is a diagram showing a hardware structure of the print client and the printer when the process according to the first embodiment of the present invention is realized by hardware;
- FIG. 12 is a flowchart explaining a printer position information registration process executed by a printer according to a second embodiment of the present invention.
- FIG. 13 is a diagram showing the structure of a printer position information storage formed in an EEPROM of the printer according to the second embodiment of the present invention.
- FIG. 14 is a part of a flowchart explaining a public key transmission process executed by the printer according to the second embodiment of the present invention (First part);
- FIG. 15A is a part of the flowchart explaining the public key transmission process executed by the printer according to the second embodiment of the present invention (Second part);
- FIG. 15B is a diagram showing a hardware structure of the print client and the printer when the process according to the second embodiment of the present invention is realized by hardware;
- FIG. 16 is a flowchart explaining a public key request process executed by a print client according to a third embodiment of the present invention.
- FIG. 17 is a part of a flowchart explaining a public key transmission process executed by a printer according to the third embodiment of the present invention (First part);
- FIG. 18A is a part of the flowchart explaining the public key transmission process executed by the printer according to the third embodiment of the present invention (Second part);
- FIG. 18B is a diagram showing a hardware structure of the print client and the printer when the process according to the third embodiment of the present invention is realized by hardware;
- FIG. 19A is a flowchart explaining a public key generation process executed by a printer according to a fourth embodiment of the present invention.
- FIG. 19B is a diagram showing a hardware structure of the print client and the printer when the process according to the fourth embodiment of the present invent ion is real i zed by hardware;
- FIG. 20A is a flowchart explaining a printer position information registration process executed by a printer according to a fifth embodiment of the present invention.
- FIG. 20B is a diagram showing a hardware structure of the print client and the printer when the process according to the fifth embodiment of the present invention is realized by hardware;
- FIG. 21 is a flowchart explaining a public key request process executed by a print client according to a sixth embodiment of the present invention.
- FIG. 22 is a part of a flowchart explaining a public key transmission process executed by a printer according to the sixth embodiment of the present invention (First part);
- FIG. 23 is a part of the flowchart explaining the public key transmission process executed by the printer according to the sixth embodiment of the present invention (Second part).
- FIG. 24 is a diagram showing a hardware structure of the print client and the printer when the process according to the sixth embodiment of the present invention is realized by hardware.
- a public key is generated with a passphrase containing at least printer position information which indicates a position where a printer is installed at this point in time, and the public key is stored in the printer.
- the printer reads the stored public key and transmits this public key to the print client.
- the print client transmits print transmitting data generated by encrypting the print data with the acquired public key.
- the printer which has received this print transmitting data generates, at the time of reception, a private key with a passphrase containing at least printer position information at this point in time, and executes a print operation only when the print transmitting data can be decrypted with this private key.
- a proper print operation can be executed only in a place where the public key is registered with the printer. Further details will be given below.
- FIG. 1 is a block diagram showing the hardware configuration of the print system according to this embodiment.
- the print system includes a print client 20 and a printer 30 which are connected by a printer cable 10 .
- the printer 30 is locally connected to the print client 20 .
- the print client 20 and the printer 20 may be connected by wireless or by a network using Ethernet or the like. In this case, plural print clients 20 may be connected to one printer 30 .
- the print client 20 is composed of any of various kinds of computers, for example, called a host computer and a personal computer. In this embodiment, in particular, the print client 20 generates print transmitting data by encrypting print data with a public key and transmits this print transmitting data to the printer 30 via the printer cable 10 .
- the print client 20 is not limited to a computer, and, for example, it may be a digital camera with a necessity to print a taken image, a content server in which print image data is stored as contents, or the like.
- the printer 30 is a printer capable of generating a public key by public key cryptography only one time.
- the generated public key is stored and held in the printer 30 .
- the printer 30 receives the print transmitting data from the print client 20 and decrypts this print transmitting data with a private key generated with a passphrase containing at least printer position information at this point in time.
- the printer 30 executes a print operation based on the print transmitting data, and when the print transmitting data cannot be decrypted, the printer 30 does not execute the print operation based on the print transmitting data.
- the printer 30 is designed so as not to obtain a proper print result from print data which is not encrypted with the public key. More specifically, the printer 30 treats the unencrypted print data as print transmitting data which cannot be decrypted with the private key.
- FIG. 2 is a block diagram explaining the internal configuration of the printer 30 .
- the printer 30 includes a CPU (Central Processing Unit) 40 , a RAM (Random Access Memory) 42 , a ROM (Read Only Memory) 44 , and an EEPROM (Electrically Erasable Programmable ROM) 45 , and they are connected to one another via an internal bus 46 .
- a communication interface 48 is connected to the internal bus 46 , and the printer 30 is connected to the aforementioned printer cable 10 via the communication interface 48 .
- an interface 50 is connected to the internal bus 46 , and a print engine 52 is connected to the interface 50 .
- the EEPROM 45 functions as a rewritable nonvolatile memory device.
- a position detector 54 is connected to the internal bus 46 .
- This position detector 54 has a function of specifying a position where the printer 30 is installed.
- the position detector 54 is constituted, for example, by a GPS (global positioning system), and the latitude, longitude, and altitude of the position where the printer 30 is installed can be specified. It is said that the accuracy of the GPS at the present time is approximately ⁇ 10 m in the latitude, the longitude, and the altitude, respectively.
- the constitution of the position detector 54 is not limited to the constitution using the GPS, and, for example, the position of the printer 30 may be specified by using mobile communication technology including the PHS (Personal Handyphone System).
- PHS Personal Handyphone System
- a hard disk 58 is connected to the internal bus 46 via an interface 56 .
- the hard disk 58 functions as a rewritable nonvolatile memory device.
- FIG. 3 is a block diagram explaining the internal configuration of the print client 20 .
- the print client 20 according to this embodiment includes a computer main unit 60 and a display 62 .
- the computer main unit 60 includes a CPU 64 , a RAM 66 , and a ROM 68 , and they are connected to one another via an internal bus 70 .
- a communication interface 72 is connected to the internal bus 70 , and the print client 20 is connected to the aforementioned printer cable 10 via the communication interface 72 .
- an interface 74 is connected to the internal bus 70 , and a hard disk 76 which is a large capacity storage is connected to the interface 74 .
- the hard disk 76 functions as are writable nonvolatile memory device.
- an interface 78 is connected to the internal bus 70 , and the aforementioned display 62 is connected via a cable 80 which extends from the interface 78 .
- a public key is previously generated and stored in the EEPROM 45 .
- the printer 30 generates this public key with a passphrase containing at least printer position information which indicates a position where the printer 30 is installed by the public key cryptography. Note that, at this time, a private key is not generated or is abandoned even if generated.
- the printer 30 accepts a public key acquisition request from the print client 20 , the printer 30 reads this public key from the EEPROM 45 and transmits this public key to the print client 20 via the printer cable 10 .
- the printer 30 need not necessarily notify the print client 20 of the public key of the printer 30 via the printer cable 10 .
- the user can operate the printer 30 , whereby it is also possible that the user operates a control panel of the printer 30 and acquires the public key of the printer 30 .
- the user may record the public key of the printer 30 on a record medium such as a flexible disk and allow the print client 20 to read this public key.
- the user of the print client 20 generates print data D 05 which is data to be printed and designates the printer 30 for the print client 20 to execute a print operation.
- the print client 20 encrypts the print data D 05 with the public key of the printer 30 , which is previously acquired, to generate print transmitting data D 10 .
- the print data D 05 means original print data needed for a print operation executed by driving the print engine 52 in the printer 30 .
- the print transmitting data D 10 may contain data other than the print data D 05 shown in FIG. 4 .
- the printer 30 which has received the print transmitting data D 10 temporarily stores the received print transmitting data D 10 in the RAM 42 as shown in FIG. 2 .
- the printer 30 then decrypts the encrypted print transmitting data D 10 with a private key. More specifically, the printer 30 generates the private key with a passphrase containing at least printer position information at this point in time by the public key cryptography. By thus generating the private key every time the decryption of the print transmitting data D 10 is tried, when the installation place of the printer 30 is moved, the print transmitting data encrypted with the public key generated before the movement cannot be decrypted by the printer 30 after the movement.
- the printer 30 judges whether the print transmitting data D 10 can be decrypted.
- the printer 30 executes a print operation based on the print data D 05 acquired by decrypting the print transmitting data D 10 , and when the print transmitting data D 10 cannot be decrypted, the printer 30 does not execute the print operation.
- FIG. 5 is a flowchart explaining a public key generation process executed by the printer 30 .
- This public key generation process is realized by making the CPU 40 read and execute a public key generation program stored in the ROM 44 or the hard disk 58 in the printer 30 .
- this public key generation process is activated and executed when the user operates the control panel of the printer 30 to thereby instruct the execution of the public key generation process.
- the printer 30 first judges whether a public key is already stored in the EEPROM 45 (step S 50 ).
- step S 50 Yes
- this public key generation process is completed without a new public key being generated.
- the printer 30 acquires device-specific information on this printer 30 (step S 52 ).
- the device-specific information is identification information specifically assigned to the printer 30 , and it is, for example, a manufacturer's serial number, an MAC address, or the like of the printer 30 .
- the printer 30 acquires printer position information on the printer 30 at this point in time from the position detector (step S 54 ). Thereby, the printer 30 can acquire information on the installation position of the printer 30 at this point in time.
- the printer 30 creates a passphrase with the device-specific information and the printer position information (step S 56 ).
- the passphrase is created by simply joining the printer position information after the device-specific information.
- the passphrase may contain data other than these device-specific information and printer position information.
- FIG. 6 is a diagram showing the structure of a public key storage EP 10 formed in a partial region of the EEPROM 45 . As shown in FIG. 6 , the generated public key is stored and held in the public key storage EP 10 . Note that when a private key is also generated when the public key is generated, this private key is abandoned without being stored.
- FIG. 7 is a flowchart explaining a public key request process executed by the print client 20 .
- This public key request process is realized by making the CPU 64 read and execute a public key request program stored in the ROM 68 or the hard disk 76 in the print client.
- the public key request process is activated and executed when the user makes input to instruct the print client to activate a process of requesting a public key.
- the print client 20 first establishes a connection with the printer 30 (step S 100 ). Subsequently, the print client 20 transmits authentication information to the printer 30 (step S 102 ). In this embodiment, a combination of a print client ID to specify the print client and a password is used as the authentication information. Accordingly, the print client 20 transmits the print client ID and the password to the printer 30 .
- the print client 20 receives an authentication result indicating whether authentication is accepted from the printer 30 , and judges whether the authentication is accepted by the printer 30 based on the authentication result (step S 104 ).
- the print client 20 repeats the aforementioned process from step S 102 .
- step S 104 when the authentication is accepted (step S 104 : Yes), the print client 20 transmits a public key acquisition request to the printer 30 (step S 106 ). Then, the print client 20 judges whether a public key has been received from the printer 30 (step S 108 ). When the public key has not been received from the printer 30 (step S 108 : No), the print client 20 stands by while repeating step S 108 .
- step S 110 when the public key has been received from the printer 30 (step S 108 : Yes), the public key is stored (step S 110 ).
- the print client 20 is provided with a public key table TB 10 on the hard disk 76 , and the acquired public key is stored and held in this public key table TB 10 .
- FIG. 8 is a diagram showing an example of the structure of the public key table TB 10 .
- the public key table TB 10 includes an item TD 10 which stores information to specify printers and an item TD 11 which stores acquired public keys corresponding to the printers.
- the public key table TB 10 can hold public keys concerning plural printers on a printer-by-printer basis. Moreover, by storing the public keys in the public key table TB 10 on the hard disk 76 in this manner, even when the print client 20 is powered off and then powered on again, the public key acquired before the power-on can be read from the hard disk 76 and used as it is.
- the print client 20 then cuts the connection with the printer 30 (step S 112 ).
- the public key request process shown in FIG. 7 is completed.
- FIG. 9 is a flowchart explaining the public key transmission process executed by the printer 30 .
- This public key transmission process is realized by making the CPU 40 read and execute a public key transmission program stored in the ROM 44 or the hard disk 58 in the printer. In this embodiment, this public key transmission process is constantly executed at regular time intervals. Moreover, this public key transmission process is a process corresponding to the aforementioned public key request process.
- the printer 30 is waiting for a connection from the print client 20 , and establishes a connection with the print client 20 when the print client 20 makes a request for the connection (step S 120 ). This corresponds to the aforementioned step S 100 on the print client 20 side. Subsequently, the printer 30 judges whether the authentication information has been received from the print client 20 (step S 122 ). When the authentication information has not been received (step S 122 : No), the printer 30 stands by while repeating the process in step S 122 .
- step S 122 when the authentication information has been received from the print client 20 (step S 122 : Yes), the printer 30 judges whether this authentication information coincides with authentication information which is previously registered with the printer 30 (step S 124 ). Specifically, since the print client ID and the password are transmitted as the authentication information from the print client 20 as described above, the printer 30 judges whether these print client ID and password coincide with a print client ID and a password which are previously registered with the printer 30 .
- step S 124 When these two pieces of authentication information do not coincide (step S 124 : No), the printer 30 transmits the authentication result indicating that the authentication is not accepted to the print client 20 (step S 126 ), and the connection with the print client 20 is completed in later-described step S 136 . On the other hand, when these two pieces of authentication information coincide (step S 124 : Yes), the printer 30 transmits the authentication result indicating that the authentication is accepted to the print client 20 (step S 128 ).
- the printer 30 judges whether the public key acquisition request has been received from the print client 20 (step S 130 ).
- the printer 30 stands by while repeating the process in step S 130 .
- step S 130 When the public key acquisition request has been received (step S 130 : Yes), the printer 30 reads and acquires the public key from the public key storage EP 10 in the EEPROM 45 (step S 132 ). Then, the printer 30 transmits the acquired public key to the print client 20 (step S 134 ). Thereafter, the printer 30 completes the connection with the print client 20 (step S 136 ) and returns to the aforementioned step S 120 .
- FIG. 10 is a flowchart explaining a print request process executed by the print client 20 .
- This print request process is realized by making the CPU 64 read and execute a print request program stored in the ROM 68 or the hard disk 76 of the print client.
- the print request process is activated and executed when the user inputs a print instruction to the print client.
- the print client 20 generates the print data DOS based on a print request from the user (step S 160 ).
- the print data D 05 is data necessary for an actual print operation when the printer 30 is an ordinary printer.
- the print client 20 reads the public key of the printer 30 from the public key table TB 10 on the hard disk 76 (step S 162 ). Subsequently, the print client 20 encrypts the print data D 05 with the public key of the printer 30 to generate the print transmitting data D 10 (step S 164 ). Incidentally, the print transmitting data D 10 may contain data other than the print data Thereafter, the print client 20 establishes a connection with the printer 30 (step S 165 ). The print client 20 then transmits the encrypted print transmitting data D 10 to the printer 30 (step S 166 ).
- the print client 20 judges whether print result information has been received from the printer 30 (step S 168 ).
- step S 168 the print client 20 stands by while repeating the process in step S 168 .
- step S 168 Yes
- the print client 20 judges whether the print result information is a print completion notice (step S 170 ).
- this print result information is the print completion notice (step S 170 : Yes)
- the received print result information is not the print completion notice (step S 170 : No)
- whether the print result information is an undecryptable notice is judged (step S 174 ).
- step S 174 When the print result information is the undecryptable notice (step S 174 : Yes), the print client 20 notifies the user that since the print transmitting data D 10 cannot be decrypted by the printer 30 , the print operation is not executed (step S 176 ). On the other hand, when the print result information is not the undecryptable notice (step S 174 : No), it is thought that some other error occurs, and hence the print client 20 gives notice according to the type of the error to the user (step S 178 ).
- step S 172 After the notice in step S 172 , step S 176 , or step S 178 , the print client 20 cuts the connection with the printer 30 (step S 179 ). Thus, the print request process in the print client 20 is completed.
- FIG. 11A is a flowchart explaining the print execution process executed by the printer 30 .
- This print execution process is realized by making the CPU 40 read and execute a print execution program stored in the ROM 44 or the hard disk 58 in the printer 30 .
- this print execution process is constantly executed at regular time intervals.
- the printer 30 is waiting for a connection from the print client 20 , and establishes a connection with the print client 20 via the printer cable 10 when the print client 20 makes a request for a connection (step S 180 ).
- the printer 30 judges whether the print transmitting data D 10 has been received (step S 182 ). When no print transmitting data D 10 has been received (step S 182 : No), the printer 30 stands by while repeating the process in step S 182 .
- the printer 30 acquires its own device-specific information (step S 184 ). Subsequently, the printer 30 acquires printer position information on the printer 30 at this point in time from the position detector 54 (step 186 ).
- the reason why the printer position information is acquired from the position detector 54 each time as described above is in order that, when the printer 30 is moved to a different place from a place where the public key was registered, a print operation cannot be executed by the printer 30 .
- the printer 30 creates a passphrase with the device-specific information and the printer position information (step S 188 ).
- This method of creating the passphrase needs to be the same method as in step S 56 in the aforementioned public key generation process. This is because if the passphrases are different, a private key capable of decrypting the print transmitting data encrypted with the public key stored in the EEPROM 45 cannot be generated.
- the printer 30 generates a private key with the generated passphrase by the public key cryptography (step S 190 ). If the installation position of the printer 30 is not moved, the passphrase used in this step S 190 is the same as the passphrase used in step S 58 in the aforementioned public key generation process. Therefore, the private key which corresponds to the public key generated in step S 58 is generated. Subsequently, the printer 30 decrypts the received print transmitting data D 10 with the generated private key and acquires the print data D 05 (step S 192 ).
- the printer 30 judges whether the print transmitting data D 10 can be decrypted with the private key (step S 194 ).
- the printer 30 executes a print operation by driving the print engine 52 based on the acquired print data D 05 (step S 196 ). Specifically, the printer 30 performs a language interpretation of the print data D 05 and generates print request data fitting the print engine 52 . Then, by transmitting this print request data to the print engine 52 , print sheets or the like are printed by the print engine 52 .
- the printer 30 transmits the print completion notice that the print operation has been properly completed as the print result information to the print client 20 (step S 198 ).
- step S 194 when it is judged in step S 194 that the print transmitting data D 10 cannot be decrypted (step S 194 : No), the printer 30 transmits the undecryptable notice as the print result information to the print client 20 (step S 200 ).
- step S 198 or step S 200 the printer 30 completes the connection with the print client 20 (step S 202 ). Then, the printer 30 returns to the aforementioned process in step S 180 .
- FIG. 11B is a diagram showing a hardware structure of the print client 20 and the printer 30 when the aforementioned process is realized by hardware.
- the printer 30 includes the position detector 54 which acquires the printer position information to specify a place where the printer 30 is installed. Then, a first printer position information acquisition 100 acquires the printer position information from the position detector 54 and regards the printer position information as first printer position information.
- a public key generator 102 generates a public key with a passphrase containing at least the first printer position information. However, even if a private key is generated when the public key is generated, the private key is abandoned.
- the public key generated by the public key generator 102 is stored in the public key storage 104 .
- the number of times the public key is allowed to be stored in the public key storage 104 is limited to a predetermined number of times (for example, one time).
- a public key acquisition request transmitter 200 of the print client 20 transmits a public key acquisition request to the printer 30 at optional timing in order to request a transmission of a public key.
- a public key acquisition request receiver 110 receives the public key acquisition request.
- a public key transmitter 112 reads the public key stored in the public key storage 104 and transmits the public key to the print client 20 .
- a public key receiver 202 of the print client 20 receives the public key and the public key is stored in a public key storage 204 .
- a print data generator 210 of the print client 20 generates print data.
- a print data transmitter 212 reads the public key from the public key storage 204 , encrypts the print data with the public key, and transmits it to the printer 30 .
- a print data receiver 120 of the printer 30 receives the print data.
- a second printer position information acquisition 122 acquires printer position information from the position detector 54 and regards the printer position information as second printer position information.
- a private key generator 124 generates a private key with a passphrase containing at least the second printer position information.
- a decrypter 126 decrypts the print data received by the print data receiver 120 with the private key.
- a selective print executor 128 executes a print operation based on the print data when the print data is decrypted with the private key, but the selective print executor 128 does not executes a print operation based on the print data when the print data is not decrypted with the private key.
- the printer 30 can generate a public key and register this public key with the EEPROM 45 only one time, so that the installation place where the printer 30 can execute a proper print operation can be limited to a place where the public key is generated. Namely, based on a request from the user, the printer 30 generates a public key with a passphrase containing printer position information at this point in time, and stores the public key in the EEPROM 45 . When the printer 30 transmits a public key to the print client 20 , the printer 30 reads the public key stored in the EEPROM 45 and transmits this public key.
- the print client 20 transmits the print data D 05 to the printer 30 , the print client 20 transmits the print transmitting data D 10 generated by encrypting the print data D 05 with this public key.
- the printer 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, the printer 30 decrypts the print transmitting data D 10 with this private key, and when the print transmitting data D 10 can be decrypted, the printer 30 executes a print operation, and when the print transmitting data D 10 cannot be decrypted, the printer 30 does not execute the print operation.
- the printer position information when the public key is stored in the EEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D 10 cannot be properly decrypted, so that a proper print result cannot be obtained.
- the position where the printer 30 is used can be limited.
- the printer 30 stores printer position information in place of a public key in the EEPROM 45 . Further details will be given below.
- the configuration of a print system according to this embodiment is the same as that in FIG. 1 in the aforementioned first embodiment
- the configuration of the printer 30 is the same as that in FIG. 2 described above
- the configuration of the print client 20 is the same as that in FIG. 3 described above.
- a public key request process, a print request process, and a print execution process according to this embodiment are the same as those in the aforementioned first embodiment.
- a printer position information registration process in place of the public key generation process is executed.
- FIG. 12 is a flowchart explaining the printer position information registration process executed by the printer 30 according to this embodiment.
- This printer position information registration process is realized by making the CPU 40 read and execute a printer position information registration program stored in the ROM 44 or the hard disk 58 in the printer 30 .
- this printer position information registration process is activated and executed when the user operates the control panel of the printer 30 to thereby instruct the execution of the printer position information registration process.
- the printer 30 judges whether printer position information is already stored in the EEPROM 45 (step S 210 ).
- this printer position information registration process is completed.
- step S 210 when any printer position information is not stored in the EEPROM 45 (step S 210 : No), the printer 30 acquires printer position information on the printer 30 at this point in time from the position detector 54 (step S 212 ). Thus, information on the installation position of the printer 30 at this point in time can be acquired.
- FIG. 13 is a diagram showing the structure of a printer position information storage EP 20 formed in a partial region of the EEPROM 45 . As shown in FIG. 13 , the printer 30 stores and holds the acquired printer position information in the printer position information storage EP 20 .
- FIG. 14 and FIG. 15A are flowcharts explaining a public key transmission process according to this embodiment.
- the public key transmission process according to this embodiment is the same as that in the aforementioned first embodiment up to step S 130 .
- the printer 30 acquires device-specific information (step S 218 ).
- the device-specific information is identification information specifically assigned to the printer 30 , and it is, for example, a manufacturer's serial number, an MAC address, or the like of the printer 30 .
- the printer 30 reads the printer position information stored in the printer position information storage EP 20 from the EEPROM 45 (step S 220 ). Namely, in this embodiment, each time the transmission of a public key is requested by the print client 20 , a public key is generated by the public key cryptography, but the printer information used for a passphrase for the public key is fixed. Therefore, each time a public key is generated, the same public key is obtained.
- the printer 30 creates a passphrase with the device-specific information and the printer position information (step S 222 ).
- the passphrase is created by simply joining the printer position information after the device-specific information.
- the passphrase may contain data other than these device-specific information and printer position information.
- the printer 30 generates a public key with the passphrase created in step S 222 by the public key cryptography (step S 224 ). Then, the printer 30 transmits the generated public key to the print client 20 (step S 226 ). Subsequently, the printer 30 completes the connection with the print client 20 (step S 228 ), and returns to step S 120 in FIG. 14 .
- FIG. 15B is a diagram showing a hardware structure of the print client 20 and the printer 30 when the aforementioned process is realized by hardware. A different point from the aforementioned FIG. 11B will be explained.
- the printer 30 includes a printer position information storage 140 in which first printer position information acquired by the first printer position information acquisition 100 is stored. However, the number of times the first printer position information is allowed to be stored in the printer position information storage 140 is limited to a predetermined number of times (for example, one time).
- a public key generator 142 reads the first printer position information from the printer position information storage 140 , and generates a public key with a passphrase containing at least the first printer position information. Then, public key transmitter 144 transmits the public key generated by the public key generator 142 to the print client 20 . However, even if a private key is generated when public key generator 142 generates the public key, the private key is abandoned.
- the printer 30 can register only one piece of printer position information which is contained in a passphrase when the printer 30 generates a public key, so that the installation place where the printer 30 can execute a proper print operation can be limited to a place where the printer position information is registered with the EEPROM 45 .
- the printer 30 registers printer position information at some point in time with the EEPROM 45 .
- the printer 30 reads the printer position information from the EEPROM 45 , generates a public key with a passphase containing the printer position information, and transmits the public key to the print client 20 .
- the print client 20 transmits the print data D 05 to the printer 30 , the print client 20 transmits the print transmitting data D 10 generated by encrypting the print data DOS with this public key.
- the printer 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, the printer 30 decrypts the print transmitting data D 10 with this private key, and when the print transmitting data D 10 can be decrypted, the printer 30 executes a print operation, and when the print transmitting data D 10 cannot be decrypted, the printer 30 does not execute the print operation.
- the printer position information registered with the EEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D 10 cannot be properly decrypted, so that a proper print result cannot be obtained.
- the position where the printer 30 is used can be limited.
- the configuration of a print system according to this embodiment is the same as that in FIG. 1 in the aforementioned first embodiment
- the configuration of the printer 30 is the same as that in FIG. 2 described above
- the configuration of the print client 20 is the same as that in FIG. 3 described above.
- a print request process, a print execution process, and a printer position information registration process according to this embodiment are the same as those in the aforementioned second embodiment.
- FIG. 16 is a flowchart explaining the contents of the public key request process according to this embodiment.
- step S 108 the process from step S 100 to step S 112 is the same as that in the aforementioned second embodiment, but when it is judged in step S 108 that the public key has not been received (step S 108 : No), it is judged whether printer movement information has been received from the printer 30 (step S 300 ). When the printer movement information has not been received (step S 300 : No), the process from step S 108 is repeated.
- step S 300 when the printer movement information has been received (step S 300 : Yes), the user is notified that the public key cannot be generated because the printer 30 has been moved (step S 302 ). Then, the connection with the printer 30 is cut (step S 112 ), and the public key request process is completed.
- FIG. 17 and FIG. 18A are flowcharts explaining the contents of a public key transmission process according to this embodiment.
- the public key transmission process according to this embodiment is the same as that in the aforementioned first embodiment up to step S 130 .
- the printer 30 acquires printer position information stored in the printer position information storage EP 20 (step S 310 ). Subsequently, the printer 30 acquires printer position information on the printer 30 at this point in time from the position detector 54 (step S 312 ).
- the printer 30 judges whether the printer position information acquired from the printer position information storage EP 20 and the printer position information acquired from the position detector 54 coincide with each other (step S 314 ).
- step S 314 No
- step S 328 the connection with the print client 20 is cut (step S 328 ), and the public key transmission process is completed.
- step S 314 when the printer position information acquired from the printer position information storage EP 20 and the printer position information acquired from the position detector 54 coincide (step S 314 : Yes), the printer 30 acquires device-specific information as shown in FIG. 18A (step S 320 ).
- the printer 30 creates a passphrase with the device-specific information and the printer position information acquired in step S 310 or step S 312 (step S 322 ).
- the passphrase is created by simply joining the printer position information after the device-specific information.
- the passphrase may contain data other than these device-specific information and printer position information.
- the printer 30 generates a public key with the passphrase created in step S 322 by the public key cryptography (step S 324 ). Then, the printer 30 transmits the generated public key to the print client 20 (step S 326 ). Subsequently, the printer 30 completes the connection with the print client 20 (step S 328 ), and returns to step S 120 in FIG. 17 .
- FIG. 18B is a diagram showing a hardware structure of the print client 20 and the printer 30 when the aforementioned process is realized by hardware. A different point from the aforementioned FIG. 15B will be explained.
- the public key acquisition request receiver 110 of the printer 30 receives the public key acquisition request
- the second printer position information acquisition 122 acquires second printer position information from the position detector 54 .
- a public key generator 160 compares the first printer position information stored in the printer position information storage 140 and the second printer position information acquired by the second printer position information acquisition 122 . If the first printer position information and the second printer position information coincide, then the public key generator 160 generates a public key with a passphrase containing at least the first printer position information or the second printer position information.
- a public key transmitter 162 transmits the public key generated by the public key generator 160 to the print client 20 .
- the generation of a public key is stopped when the position where printer position information is registered with the printer 30 and the position of the printer 30 when the generation of the public key is tried are different, whereby the position where the printer 30 generates a public key and transmits the public key to the print client 20 can be limited. Hence, the position where the printer 30 can be properly used can be limited.
- a public key is generated with a passphrase containing at least printer position information which indicates a position where a printer is installed at this point in time, and stored in the printer.
- the generation of the public key is executed by the printer only when being requested by a particular person whose inputted public key generation authentication information coincides with registered public key generation authentication information.
- the printer When transmission of a public key is requested by the print client, the printer reads a stored public key and transmits this public key to the print client.
- the print client transmits print transmitting data generated by encrypting the print data with the acquired public key.
- the printer which has received this print transmitting data generates, at the time of reception, a private key with a passphrase containing at least printer position information at this point in time, and executes a print operation only when the print transmitting data can be decrypted with this private key. By doing so, a proper print operation can be executed only in a position where a person with proper authority registered the public key with the printer. Further details will be given below.
- the configuration of the print system according to this embodiment is the same as that in FIG. 1 described above
- the internal configuration of the printer 30 is the same as that in FIG. 2 described above
- the internal configuration of the print client 20 is the same as that in FIG. 3 described above.
- the printer 30 generates a public key based on a request from a person with proper authority and stores the public key in the EEPROM 45 .
- whether an operator is a person with proper authority or not is judged by making the operator input public key generation authentication information from the control panel of the printer 30 .
- this public key generation authentication information is composed of a combination of an ID and a password.
- the public key generation authentication information may be inputted from the print client 20 and transmitted to the printer 30 via the printer cable 10 . Further, when the printer 30 is a network printer, the public key generation authentication information may be transmitted to the printer 30 from a different place via the network. The process thereafter is the same as that in the aforementioned first embodiment.
- FIG. 19A is a flowchart explaining a public key generation process executed by the printer 30 .
- This public key generation process is realized by making the CPU 40 read and execute a public key generation program stored in the ROM 44 or the hard disk 58 in the printer 30 .
- this public key generation process is activated and executed when an operator (for example, a person in charge of maintenance in a manufacturer of the printer 30 ) operates the control panel of the printer 30 to thereby instruct the execution of the public key generation process.
- the printer 30 when the public key generation process is executed, the printer 30 first requests the operator to input public key generation authentication information (step S 446 ).
- the operator inputs an ID and a password as the public key generation authentication information from the control panel of the printer 30 .
- step S 448 judges whether the public key generation authentication information has been inputted.
- step S 448 No
- the printer 30 stands by while repeating the process in step S 448 .
- the printer 30 judges whether the inputted public key generation authentication information coincides with registered public key generation authentication information (step S 450 ).
- the registered public key generation authentication information is previously stored in the ROM 44 , the EEPROM 45 , or the hard disk 58 . Therefore, the printer 30 reads the stored public key generation authentication information, and judges whether the read public key generation authentication information coincides with the public key generation authentication information inputted by the operator. Specifically, whether registered ID and password coincide with the ID and password inputted by the operator is judged.
- step S 450 When these two pieces of public key generation authentication information do not coincide (step S 450 : No), this public key generation process is completed without a new public key being generated.
- the printer 30 acquires device-specific information on this printer 30 (step S 452 ).
- the device-specific information is identification information specifically assigned to the printer 30 , and it is, for example, a manufacturer's serial number, an MAC address, or the like of the printer 30 .
- the printer 30 acquires printer position information on the printer 30 at this point in time from the position detector 54 (step S 454 ). Thereby, the printer 30 can acquire information on the installation position of the printer 30 at this point in time.
- the printer 30 creates a passphrase with the device-specific information and the printer position information (step S 456 ).
- the passphrase is created by simply joining the printer position information after the device-specific information.
- the passphrase may contain data other than these device-specific information and printer position information.
- the printer 30 generates a public key with the passphrase created in step S 456 by the public key cryptography (step S 458 ). Then, the printer 30 stores the generated public key in the EEPROM 45 shown in FIG. 6 (step S 560 ). Note that when a private key is also generated when the public key is generated, the private key is abandoned without being stored.
- a public key request process is the same as that in FIG. 7 described above
- a public key transmission process is the same as that in FIG. 9 described above
- a print request process is the same as that in FIG. 10 described above
- a print execution process is the same as that in FIG. 11A described above.
- FIG. 19B is a diagram showing a hardware structure of the print client 20 and the printer 30 when the aforementioned process is realized by hardware. A different point from the aforementioned FIG. 11B will be explained. If a generation of a public key is requested, an authentication information requester 300 of the printer 30 requests an operator to input authentication information. An authentication judgment section 301 judges whether the inputted authentication information coincides with registered authentication information. If the inputted authentication information and the registered authentication information coincide, the authentication judgment section 301 judges that the operator has proper authority.
- a first printer position information acquisition 302 acquires printer position information from the position detector 54 , and regards the printer position information as first printer position information. Then, a public key generator 304 generates a public key with a passphrase containing at least the first printer position information, and the generated public key is stored in a public key storage 306 .
- the printer 30 can generate a public key and register the public key with the EEPROM 45 only when a person with proper authority provides instructions, whereby the installation place where the printer 30 can execute a proper print operation can be limited.
- the printer 30 when an operator with proper authority requests the printer 30 to generate a public key, the printer 30 generates a public key with a passphrase containing printer position information at this point in time and stores the public key in the EEPROM 45 . On the other hand, in the case of an operator without proper authority, the printer 30 does not generate a public key. When transmitting a public key to the print client 20 , the printer 30 reads the public key stored in the EEPROM 45 and transmits this public key.
- the print client 20 transmits the print data D 05 to the printer 30 , the print client 20 transmits the print transmitting data D 10 generated by encrypting the print data D 05 with this public key.
- the printer 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, the printer 30 decrypts the print transmitting data D 10 with this private key, and when the print transmitting data D 10 can be decrypted, the printer 30 executes a print operation, and when the print transmitting data D 10 cannot be decrypted, the printer 30 does not execute the print operation.
- the printer position information when the public key is stored in the EEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D 10 cannot be properly decrypted, so that a proper print result cannot be obtained.
- the position where the printer 30 can be used can be limited to a place where the person with proper authority instructs the printer 30 to generate the public key.
- the operator can change the public key stored in the EEPROM 45 , and hence, even when the installation place of the printer is changed for good reason by the printer manufacturer or the like, the operator can continue to use the printer 30 . Namely, if the operator with proper authority instructs the printer 30 to generate a public key again in a new installation place of the printer 30 , the new public key is generated based on printer position information on this place and stored in the EEPROM 45 . Accordingly, the printer 30 can be used effectively.
- the printer 30 stores printer position information in place of a public key in the EEPROM 45 . Further details will be given below.
- the configuration of a print system according to this embodiment is the same as that in FIG. 1 in the aforementioned first embodiment
- the configuration of the printer 30 is the same as that in FIG. 2 described above
- the configuration of the print client 20 is the same as that in FIG. 3 described above.
- a public key request process, a print request process, and a print execution process according to this embodiment are the same as those in the aforementioned first embodiment.
- a printer position information registration process in place of the public key generation process in the fourth embodiment is executed.
- FIG. 20A is a flowchart explaining the printer position information registration process executed by the printer 30 according to this embodiment.
- This printer position information registration process is realized by making the CPU 40 read and execute a printer position information registration program stored in the ROM 44 or the hard disk 58 in the printer 30 .
- this printer position information registration process is activated and executed when an operator (for example, a person in charge of maintenance in a manufacturer of the printer 30 ) operates the control panel of the printer 30 to thereby instruct the execution of the printer position information registration process.
- the printer 30 first requests the operator to input printer position information registration authentication information (step S 506 ).
- the operator inputs an ID and a password as the printer position information registration authentication information from the control panel of the printer 30 .
- step S 508 judges whether the printer position information registration authentication information has been inputted.
- step S 508 the printer position information registration authentication information has not been inputted
- step S 508 No
- the printer 30 stands by while repeating the process in step S 508 .
- step S 510 When these two pieces of printer position information registration authentication information do not coincide (step S 510 : No), this printer position information registration process is completed without new printer position information being registered.
- step S 510 when these two pieces of printer position information registration authentication information coincide (step S 510 : Yes), the printer 30 acquires printer position information on this printer 30 at this point in time from the position detector 54 (step S 512 ). Thereby, the printer 30 can acquire information on the installation position of the printer 30 at this point in time.
- the printer 30 stores the acquired printer position information in the EEPROM 45 shown in FIG. 13 (step S 514 ).
- the printer position information registration process according to this embodiment is completed.
- FIG. 20B is a diagram showing a hardware structure of the print client 20 and the printer 30 when the aforementioned process is realized by hardware. A different point from the aforementioned FIG. 19B will be explained. If the authentication judgment section 301 judges that the operator has proper authority, then the first printer position information acquisition 302 acquires printer position information from the position detector 54 and regards the printer position information as first printer position information. The first printer position information is stored in a first printer position information storage 310 .
- a public key generator 312 reads the first printer position information from the first printer position information storage 310 and generates a public key with a passphrase containing at least the first printer position information.
- the public key transmitter 112 transmits the generated public key to the print client 20 .
- the printer 30 stores printer position information at this point in time in the EEPROM 45 , whereby the installation place where the printer 30 can execute a proper print operation can be limited.
- the print client 20 transmits the print data D 05 to the printer 30 , the print client 20 transmits the print transmitting data D 10 generated by encrypting the print data DOS with this public key.
- the printer 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, the printer 30 decrypts the print transmitting data D 10 with this private key, and when the print transmitting data D 10 can be decrypted, the printer 30 executes a print operation, and when the print transmitting data D 10 cannot be decrypted, the printer 30 does not execute the print operation.
- the printer position information stored in the EEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D 10 cannot be properly decrypted, so that a proper print result cannot be obtained.
- the position where the printer 30 can be used can be limited to a place where the person with proper authority registered the printer position information with the printer 30 .
- the operator can change the printer position information stored in the EEPROM 45 , and hence, even when the installation place of the printer 30 is changed for good reason by the printer manufacturer or the like, the operator can continue to use the printer 30 . Namely, if the operator with proper authority instructs the printer 30 to register printer position information again in a new installation place of the printer 30 , printer position information on this place is stored in the EEPROM 45 . Accordingly, the printer can be used effectively.
- the configuration of a print system according to this embodiment is the same as that in FIG. 1 in the aforementioned first embodiment
- the configuration of the printer 30 is the same as that in FIG. 2 described above
- the configuration of the print client 20 is the same as that in FIG. 3 described above.
- a print request process, a print execution process, and a printer position information registration process according to this embodiment are the same as those in the aforementioned fifth embodiment.
- FIG. 21 is a flowchart explaining the contents of the public key request process according to this embodiment.
- step S 108 the process from step S 100 to step S 112 is the same as that in the aforementioned fifth embodiment, but when it is judged in step S 108 that the public key has not been received (step S 108 : No), it is judged whether printer movement information has been received from the printer 30 (step S 600 ). When the printer movement information has not been received (step S 600 : No), the process from step S 108 is repeated.
- step S 600 when the printer movement information has been received (step S 600 : Yes), the user is notified that the public key cannot be generated because the printer 30 has been moved from a place where a person with proper authority registered printer position information (step S 602 ). Then, the connection with the printer 30 is cut (step S 112 ), and the public key request process is completed.
- FIG. 22 and FIG. 23 are flowcharts explaining the contents of a public key transmission process according to this embodiment. As shown in FIG. 22 , the public key transmission process according to this embodiment is the same as that in the aforementioned first embodiment up to step S 130 .
- the printer 30 acquires printer position information stored in the printer position information storage EP 20 (step S 610 ). Subsequently, the printer 30 acquires printer position information on the printer 30 at this point in time from the position detector 54 (step S 612 ).
- the printer 30 judges whether the printer position information acquired from the printer position information storage EP 20 and the printer position information acquired from the position detector 54 coincide with each other (step S 614 ).
- step S 614 No
- step S 628 the connection with the print client 20 is cut (step S 628 ), and the public key transmission process is completed.
- step S 614 when the printer position information acquired from the printer position information storage EP 20 and the printer position information acquired from the position detector 54 coincide (step S 614 : Yes), the printer 30 acquires device-specific information as shown in FIG. 23 (step S 620 ).
- the printer 30 creates a passphrase with the device-specific information and the printer position information acquired in step S 610 or step S 612 (step S 622 ).
- the passphrase is created by simply joining the printer position information after the device-specific information.
- the passphrase may contain data other than these device-specific information and printer position information.
- the printer 30 generates a public key with the passphrase created in step S 622 by the public key cryptography (step S 624 ). Then, the printer 30 transmits the generated public key to the print client 20 (step S 626 ). Subsequently, the printer 30 completes the connection with the print client 20 (step S 628 ), and returns to step S 120 in FIG. 22 .
- FIG. 24B is a diagram showing a hardware structure of the print client 20 and the printer 30 when the aforementioned process is realized by hardware. A different point from the aforementioned FIG. 20B will be explained.
- the public key acquisition request receiver 110 receives the public key acquisition request
- the second printer position information acquisition 122 acquires second printer position information from the position detector 54 .
- a public key generator 320 compares the first printer position information stored in the printer position information storage 310 and the second printer position information acquired by the second printer position information acquisition 122 . If the first printer position information and the second printer position information coincide, then the public key generator 320 generates a public key with a passphrase containing at least the first printer position information or the second printer position information.
- a public key transmitter 122 transmits the public key generated by the public key generator 320 to the print client 20 .
- the generation of a public key is stopped when the position where a person with proper authority registered printer position information with the printer 30 and the position of the printer 30 when the generation of a public key is tried are different, whereby the position where the printer 30 generates a public key and transmits the public key to the print client 20 can be limited. Hence, the position where the printer 30 can be properly used can be limited.
- the operator can change the printer position information stored in the EEPROM 45 , and hence, even when the installation place of the printer 30 is changed for good reason by the printer manufacturer or the like, the operator can continue to use the printer 30 . Namely, if the operator with proper authority instructs the printer 30 to register printer position information again in a new installation place of the printer 30 , printer position information on this place is stored in the EEPROM 45 , and a public key can be generated again. Accordingly, the printer can be used effectively.
- the present invention is not limited to the aforementioned embodiments, and various changes may be made therein.
- the number of times the public key can be stored in the EEPROM 45 is limited to one time, but may be limited to a predetermined number of times such as two times, three times, or the like.
- the number of times the printer position information can be stored in the EEPROM 45 is limited to one time, but may be limited to a predetermined number of times such as two times, three times, or the like.
- the public key generation authentication information indicating whether the operator has proper authority or not is composed of a combination of an ID and a password
- the printer position information registration authentication information indicating whether the operator has proper authority or not is composed of a combination of an ID and a password
- the public key generation authentication information and the printer position information registration authentication information are not limited to the combination of an ID and a password.
- a fingerprint of a person with proper authority is registered, a fingerprint of an operator is read, and when both fingerprints coincide, it is judged that the operator has proper authority.
- the printer is explained as an example of a data receiving device which sets a limit to a position where it can be used, the present invention is not limited to the printer. Moreover, a data transmitting device is not limited to the print client.
- the data transmitting device may be a digital camera for taking images and the data receiving device may be a data server which stores data on the images taken by the digital camera.
- data transmitted from the digital camera is encrypted with a public key received from the data server, and the data server which has received this data generates a private key by the aforementioned method and decrypts the data.
- the data server stores the data, and the received data cannot be decrypted, the data server does not store the data.
- the data transmitting device may be a personal computer and the data receiving device may be a projector which projects image data transmitted from the personal computer.
- data transmitted from the personal computer is encrypted with a public key received from the projector, and the projector which has received this data generates a private key by the aforementioned method and decrypts the data.
- the projector projects the data, and the received data cannot be decrypted, the projector does not project the data.
- the data transmitting device may be a content server for music or the like and the data receiving device may be a playback device for content data such as music transmitted from the content server.
- data transmitted from the content server is encrypted with a public key received from the playback device, and the playback device which has received this data generates a private key by the aforementioned method and decrypts the data.
- the playback device plays back the data, and the received data cannot be decrypted, the playback device does not play back the data.
- a print medium for the printer 30 is a print sheet as an example, but the print medium is not limited to this, and the present invention can be applied to other print media such as an OHP sheet and the like.
- a program it is possible to record a program to execute each process on a record medium such as a flexible disk, a CD-ROM (Compact Disc-Read Only Memory), a ROM, a memory card, or the like and distribute this program in the form of the record medium.
- a record medium such as a flexible disk, a CD-ROM (Compact Disc-Read Only Memory), a ROM, a memory card, or the like and distribute this program in the form of the record medium.
- the aforementioned embodiments can be realized by making the print client 20 and/or the printer 30 read the record medium on which this program is recorded and execute this program.
- the print client 20 and/or the printer 30 sometimes has other programs such as an operating system, other application programs, and the like.
- other programs such as an operating system, other application programs, and the like.
- a command which calls a program to realize a process equal to that in the aforesaid embodiments out of programs in the print client 20 and/or the printer 30 , may be recorded on the record medium.
- Such a program can be distributed not in the form of the record medium but in the form of a carrier wave via a network.
- the program transmitted in the form of the carrier wave over the network is incorporated in the print client 20 and/or the printer 30 , and the aforesaid embodiments can be realized by executing this program.
- the program when being recorded on the record medium or transmitted as the carrier wave over the network, the program is sometimes encrypted or compressed.
- the print client 20 and/or the printer 30 which has read the program from the record medium or the carrier wave needs to execute the program after decrypting or expanding the program.
Abstract
A printer includes a first printer position information acquisition, and a public key generator that generates a public key with a passphrase containing at least the first printer position information. The printer holds the public key in a public key storage. A print data receiver receives print date encrypted with the public key. The printer also includes a second printer position information acquisition, and a private key generator that generates a private key with a passphrase containing at least the second printer position information. A decrypter decrypts the print data received by the print data receiver with the private key. A control method of a printer also is described.
Description
- This application is a continuation of U.S. application Ser. No. 10/722,693, filed on Nov. 24, 2003, the disclosure of which is incorporated herein by reference.
- 1. Field of the Invention
- The present invention relates to a printer and a print system, and particularly relates to a printer and a print system which set a limit to a place where a printer operation can be executed.
- 2. Description of the Related Art
- These days, as a business model using a printer, a model, in which a printer manufacturer lends a printer to a user without charge and the user pays the printer manufacturer only usage fees proportional to the number of sheets the user printed with this printer, is attracting considerable attraction. In such a business model, in addition to a charge proportional to the number of printed sheets, a charge proportional to the period of use, a charge proportional to the amount of ink used, and the like are planned.
- However, in the aforementioned business model, if the user sells the printer borrowed from the printer manufacturer without permission or lends the printer to another person, the printer manufacturer cannot charge for the use of the printer. Therefore, the printer manufacturer wants to limit a place where the lent printer can be used, that is, a place where a proper print operation can be executed to a place of the user to whom the printer is lent.
- Hence, the present invention is made in view of the aforementioned problem, and an object of the present invention is to provide a printer and a print system capable of executing a proper print operation only in a place registered in advance.
- In order to accomplish the aforementioned and other objects, according to one aspect of the present invention, a printer, comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information;
- a public key generator which generates a public key with a passphrase containing at least the first printer position information;
- a public key storage in which the public key generated by the public key generator is stored, the number of times the public key is allowed to be stored being limited to a predetermined number of times;
- a print data receiver which receives print data encrypted with the public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a printer, comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information;
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times;
- a public key generator which reads the first printer position information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information;
- a print data receiver which receives print data encrypted with the public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a printer, comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information;
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times;
- a public key acquisition request receiver which receives a public key acquisition request to request acquisition of a public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information; and
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and which generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- According to another aspect of the present invention, a control method of a printer, comprises the steps of:
- acquiring printer position information to specify a place where the printer is installed from a printer position information acquisition and regarding this printer position information as first printer position information;
- generating a public key with a passphrase containing at least the first printer position information;
- storing the generated public key in a public key storage, the number of times the public key is allowed to be stored being limited to a predetermined number of times;
- receiving print data encrypted with the public key;
- acquiring printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information;
- generating a private key with a passphrase containing at least the second printer position information; and
- decrypting the received print data with the private key.
- According to another aspect of the present invention, a control method of a printer, comprises the steps of:
- acquiring printer position information to specify a place where the printer is installed from a printer position information acquisition and regarding this printer position information as first printer position information;
- storing the first printer position information in a printer position information storage, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times;
- reading the first printer position information from the printer position information storage and generating a public key with a passphrase containing at least the first printer position information;
- receiving print data encrypted with the public key;
- acquiring printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information;
- generating a private key with a passphrase containing at least the second printer position information; and
- decrypting the received print data with the private key.
- According to another aspect of the present invention, a control method of a printer, comprises the steps of:
- acquiring printer position information to specify a place where the printer is installed from a printer position information acquisition and regarding this printer position information as first printer position information;
- storing the first printer position information in a printer position information storage, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times;
- receiving a public key acquisition request to request acquisition of a public key;
- acquiring printer position information from the printer position information acquisition when the public key acquisition request has been received and regarding this printer position information as second printer position information; and
- comparing the first printer position information stored in the printer position information storage and the acquired second printer position information, and generating a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- According to another aspect of the present invention, a print system includes a printer and a print client, wherein
- the printer comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information;
- a public key generator which generates a public key with a passphrase containing at least the first printer position information; and
- a public key storage in which the public key generated by the public key generator is stored, the number of times the public key is allowed to be stored being limited to a predetermined number of times,
- the print client comprises:
- a print data generator which generates print data to be printed by the printer; and
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer, and
- the printer further comprises:
- a print data receiver which receives the print data;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a print system includes a printer and a print client, wherein
- the printer comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information;
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times; and
- a public key generator which reads the first printer position information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information,
- the print client comprises:
- a print data generator which generates print data to be printed by the printer; and
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer, and
- the printer further comprises:
- a print data receiver which receives the print data;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a print system includes a printer and a print client, wherein
- the printer comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition which acquires printer position information from the printer position information acquisition and regards this printer position information as first printer position information; and
- a printer position information storage in which the first printer position information acquired by the first printer position information acquisition is stored, the number of times the first printer position information is allowed to be stored being limited to a predetermined number of times,
- the print client comprises:
- a public key acquisition request transmitter which transmits a public key acquisition request to request acquisition of a public key, and
- the printer further comprises:
- a public key acquisition request receiver which receives the public key acquisition request;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information; and
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- According to another aspect of the present invention, a printer, comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a public key generator which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and generates a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request;
- a public key storage in which the public key generated by the public key generator is stored;
- a print data receiver which receives print data encrypted with the public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a printer, comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- a public key generator which reads the first printer position information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information;
- a print data receiver which receives print data encrypted with the public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a printer, comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- a public key acquisition request receiver which receives a public key acquisition request to request acquisition of a public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information; and
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- According to another aspect of the present invention, a control method of a printer, comprises the steps of:
- acquiring printer position information to specify a place where the printer is installed from a printer position information acquisition, regarding this printer position information as first printer position information, and generating a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request;
- storing the generated public key in a public key storage;
- receiving print data encrypted with the public key;
- acquiring printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information;
- generating a private key with a passphrase containing at least the second printer position information; and
- decrypting the received print data with the private key.
- According to another aspect of the present invention, a control method of a printer, comprises the steps of:
- acquiring printer position information from a printer position information acquisition to specify a place where the printer is installed, regarding this printer position information as first printer position information, and storing the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- reading the first printer position information from the printer position information storage and generating a public key with a passphrase containing at least the first printer position information;
- receiving print data encrypted with the public key;
- acquiring printer position information from the printer position information acquisition when the print data has been received and regarding this printer position information as second printer position information;
- generating a private key with a passphrase containing at least the second printer position information; and
- decrypting the received print data with the private key.
- According to another aspect of the present invention, a control method of a printer, comprises the steps of:
- acquiring printer position information to specify a place where the printer is installed from a printer position information acquisition, regarding this printer position information as first printer position information, and storing the first printer position information in a printer position information storage, when a person with proper authority makes a request;
- receiving a public key acquisition request to request acquisition of a public key;
- acquiring printer position information from the printer position information acquisition when the public key acquisition request has been received and regarding this printer position information as second printer position information; and
- comparing the first printer position information stored in the printer position information storage and the acquired second printer position information, and generating a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
- According to another aspect of the present invention, a print system includes a printer and a print client, wherein
- the printer comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a public key generator which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and generates a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request; and
- a public key storage in which the public key generated by the public key generator is stored, the print client comprises:
- a print data generator which generates print data to be printed by the printer; and
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer, and
- the printer further comprises:
- a print data receiver which receives the print data encrypted with the public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a print system includes a printer and a print client, wherein
- the printer comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed;
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request; and
- a public key generator which reads the first printer posit ion information from the printer position information storage and generates a public key with a passphrase containing at least the first printer position information,
- the print client comprises:
- a print data generator which generates print data to be printed by the printer; and
- a print data transmitter which encrypts the print data with the public key and transmits the encrypted print data to the printer, and
- the printer further comprises:
- a print data receiver which receives print data encrypted with the public key;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the print data has been received and regards this printer position information as second printer position information;
- a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
- a decrypter which decrypts the print data received by the print data receiver with the private key.
- According to another aspect of the present invention, a print system includes a printer and a print client, wherein
- the printer comprises:
- a printer position information acquisition which acquires printer position information to specify a place where the printer is installed; and
- a first printer position information acquisition and storage which acquires printer position information from the printer position information acquisition, regards this printer position information as first printer position information, and stores the first printer position information in a printer position information storage, when a person with proper authority makes a request,
- the print client comprises:
- a public key acquisition request transmitter which transmits a public key acquisition request to request acquisition of a public key, and
- the printer further comprises:
- a public key acquisition request receiver which receives the public key acquisition request;
- a second printer position information acquisition which acquires printer position information from the printer position information acquisition when the public key acquisition receiver has received the public key acquisition request and regards this printer position information as second printer position information; and
- a public key generator which compares the first printer position information stored in the printer position information storage and the second printer position information acquired by the second printer position information acquisition, and generates a public key with a passphrase containing at least the first printer position information or the second printer position information when the first printer position information and the second printer position information coincide.
-
FIG. 1 is a diagram showing an example of the configuration of a print system according to a first embodiment of the present invention; -
FIG. 2 is a diagram showing an example of the hardware configuration of a printer according to the first embodiment of the present invention; -
FIG. 3 is a diagram showing an example of the configuration of a print client according to the first embodiment of the present invention; -
FIG. 4 is a conceptual diagram explaining encryption and decryption of print data with a public key and a private key in the first embodiment of present invention; -
FIG. 5 is a flowchart explaining a public key generation process executed by the printer according to the first embodiment of the present invention; -
FIG. 6 is a diagram showing the structure of a public key storage formed in an EEPROM of the printer according to the first embodiment of the present invention; -
FIG. 7 is a flowchart explaining a public key request process executed by the print client according to the first embodiment of the present invention; -
FIG. 8 is a diagram showing an example of the structure of a public key table included in the print client according to the first embodiment of the present invention; -
FIG. 9 is a part of a flowchart explaining a public key transmission process executed by the printer according to the first embodiment of the present invention; -
FIG. 10 is a flowchart explaining a print request process executed by the print client according to the first embodiment of the present invention; -
FIG. 11A is a flowchart explaining a print execution process executed by the printer according to the first embodiment of the present invention; -
FIG. 11B is a diagram showing a hardware structure of the print client and the printer when the process according to the first embodiment of the present invention is realized by hardware; -
FIG. 12 is a flowchart explaining a printer position information registration process executed by a printer according to a second embodiment of the present invention; -
FIG. 13 is a diagram showing the structure of a printer position information storage formed in an EEPROM of the printer according to the second embodiment of the present invention; -
FIG. 14 is a part of a flowchart explaining a public key transmission process executed by the printer according to the second embodiment of the present invention (First part); -
FIG. 15A is a part of the flowchart explaining the public key transmission process executed by the printer according to the second embodiment of the present invention (Second part); -
FIG. 15B is a diagram showing a hardware structure of the print client and the printer when the process according to the second embodiment of the present invention is realized by hardware; -
FIG. 16 is a flowchart explaining a public key request process executed by a print client according to a third embodiment of the present invention; -
FIG. 17 is a part of a flowchart explaining a public key transmission process executed by a printer according to the third embodiment of the present invention (First part); -
FIG. 18A is a part of the flowchart explaining the public key transmission process executed by the printer according to the third embodiment of the present invention (Second part); -
FIG. 18B is a diagram showing a hardware structure of the print client and the printer when the process according to the third embodiment of the present invention is realized by hardware; -
FIG. 19A is a flowchart explaining a public key generation process executed by a printer according to a fourth embodiment of the present invention; -
FIG. 19B is a diagram showing a hardware structure of the print client and the printer when the process according to the fourth embodiment of the present invent ion is real i zed by hardware; -
FIG. 20A is a flowchart explaining a printer position information registration process executed by a printer according to a fifth embodiment of the present invention; -
FIG. 20B is a diagram showing a hardware structure of the print client and the printer when the process according to the fifth embodiment of the present invention is realized by hardware; -
FIG. 21 is a flowchart explaining a public key request process executed by a print client according to a sixth embodiment of the present invention; -
FIG. 22 is a part of a flowchart explaining a public key transmission process executed by a printer according to the sixth embodiment of the present invention (First part); -
FIG. 23 is a part of the flowchart explaining the public key transmission process executed by the printer according to the sixth embodiment of the present invention (Second part); and -
FIG. 24 is a diagram showing a hardware structure of the print client and the printer when the process according to the sixth embodiment of the present invention is realized by hardware. - In a print system according to the first embodiment, a public key is generated with a passphrase containing at least printer position information which indicates a position where a printer is installed at this point in time, and the public key is stored in the printer. When transmission of a public key is requested by a print client, the printer reads the stored public key and transmits this public key to the print client. When the print client transmits print data to this printer, the print client transmits print transmitting data generated by encrypting the print data with the acquired public key. The printer which has received this print transmitting data generates, at the time of reception, a private key with a passphrase containing at least printer position information at this point in time, and executes a print operation only when the print transmitting data can be decrypted with this private key. In addition, by limiting the number of times of registration of the public key with the printer to one time, a proper print operation can be executed only in a place where the public key is registered with the printer. Further details will be given below.
- First, the configuration of the print system according to this embodiment will be explained based on
FIG. 1 .FIG. 1 is a block diagram showing the hardware configuration of the print system according to this embodiment. - As shown in
FIG. 1 , the print system according to this embodiment includes aprint client 20 and aprinter 30 which are connected by aprinter cable 10. Namely, theprinter 30 is locally connected to theprint client 20. However, theprint client 20 and theprinter 20 may be connected by wireless or by a network using Ethernet or the like. In this case,plural print clients 20 may be connected to oneprinter 30. - The
print client 20 is composed of any of various kinds of computers, for example, called a host computer and a personal computer. In this embodiment, in particular, theprint client 20 generates print transmitting data by encrypting print data with a public key and transmits this print transmitting data to theprinter 30 via theprinter cable 10. Theprint client 20 is not limited to a computer, and, for example, it may be a digital camera with a necessity to print a taken image, a content server in which print image data is stored as contents, or the like. - Further, in this embodiment, the
printer 30 is a printer capable of generating a public key by public key cryptography only one time. The generated public key is stored and held in theprinter 30. Theprinter 30 receives the print transmitting data from theprint client 20 and decrypts this print transmitting data with a private key generated with a passphrase containing at least printer position information at this point in time. When the print transmitting data can be decrypted, theprinter 30 executes a print operation based on the print transmitting data, and when the print transmitting data cannot be decrypted, theprinter 30 does not execute the print operation based on the print transmitting data. - Furthermore, in this embodiment, the
printer 30 is designed so as not to obtain a proper print result from print data which is not encrypted with the public key. More specifically, theprinter 30 treats the unencrypted print data as print transmitting data which cannot be decrypted with the private key. -
FIG. 2 is a block diagram explaining the internal configuration of theprinter 30. As shown inFIG. 2 , theprinter 30 includes a CPU (Central Processing Unit) 40, a RAM (Random Access Memory) 42, a ROM (Read Only Memory) 44, and an EEPROM (Electrically Erasable Programmable ROM) 45, and they are connected to one another via aninternal bus 46. Acommunication interface 48 is connected to theinternal bus 46, and theprinter 30 is connected to theaforementioned printer cable 10 via thecommunication interface 48. In addition, aninterface 50 is connected to theinternal bus 46, and aprint engine 52 is connected to theinterface 50. In this embodiment, theEEPROM 45 functions as a rewritable nonvolatile memory device. - Moreover, a
position detector 54 is connected to theinternal bus 46. Thisposition detector 54 has a function of specifying a position where theprinter 30 is installed. In this embodiment, theposition detector 54 is constituted, for example, by a GPS (global positioning system), and the latitude, longitude, and altitude of the position where theprinter 30 is installed can be specified. It is said that the accuracy of the GPS at the present time is approximately ±10 m in the latitude, the longitude, and the altitude, respectively. - However, the constitution of the
position detector 54 is not limited to the constitution using the GPS, and, for example, the position of theprinter 30 may be specified by using mobile communication technology including the PHS (Personal Handyphone System). - Furthermore, a
hard disk 58 is connected to theinternal bus 46 via aninterface 56. In this embodiment, thehard disk 58 functions as a rewritable nonvolatile memory device. -
FIG. 3 is a block diagram explaining the internal configuration of theprint client 20. As shown inFIG. 3 , theprint client 20 according to this embodiment includes a computermain unit 60 and adisplay 62. - The computer
main unit 60 includes aCPU 64, aRAM 66, and aROM 68, and they are connected to one another via aninternal bus 70. Acommunication interface 72 is connected to theinternal bus 70, and theprint client 20 is connected to theaforementioned printer cable 10 via thecommunication interface 72. - In addition, an
interface 74 is connected to theinternal bus 70, and ahard disk 76 which is a large capacity storage is connected to theinterface 74. In this embodiment, thehard disk 76 functions as are writable nonvolatile memory device. Moreover, aninterface 78 is connected to theinternal bus 70, and theaforementioned display 62 is connected via acable 80 which extends from theinterface 78. - Next, a brief explanation of a process when the
print client 20 performs printing with theprinter 30 in the print system according to this embodiment will be given. - In this embodiment, in the
printer 30, a public key is previously generated and stored in theEEPROM 45. Theprinter 30 generates this public key with a passphrase containing at least printer position information which indicates a position where theprinter 30 is installed by the public key cryptography. Note that, at this time, a private key is not generated or is abandoned even if generated. When theprinter 30 accepts a public key acquisition request from theprint client 20, theprinter 30 reads this public key from theEEPROM 45 and transmits this public key to theprint client 20 via theprinter cable 10. - However, the
printer 30 need not necessarily notify theprint client 20 of the public key of theprinter 30 via theprinter cable 10. For example, if a user of theprint client 20 has proper authority, the user can operate theprinter 30, whereby it is also possible that the user operates a control panel of theprinter 30 and acquires the public key of theprinter 30. In this case, the user may record the public key of theprinter 30 on a record medium such as a flexible disk and allow theprint client 20 to read this public key. - Then, as shown in
FIG. 4 , the user of theprint client 20 generates print data D05 which is data to be printed and designates theprinter 30 for theprint client 20 to execute a print operation. - The
print client 20 encrypts the print data D05 with the public key of theprinter 30, which is previously acquired, to generate print transmitting data D10. Here, the print data D05 means original print data needed for a print operation executed by driving theprint engine 52 in theprinter 30. Incidentally, the print transmitting data D10 may contain data other than the print data D05 shown inFIG. 4 . - The
printer 30 which has received the print transmitting data D10 temporarily stores the received print transmitting data D10 in theRAM 42 as shown inFIG. 2 . Theprinter 30 then decrypts the encrypted print transmitting data D10 with a private key. More specifically, theprinter 30 generates the private key with a passphrase containing at least printer position information at this point in time by the public key cryptography. By thus generating the private key every time the decryption of the print transmitting data D10 is tried, when the installation place of theprinter 30 is moved, the print transmitting data encrypted with the public key generated before the movement cannot be decrypted by theprinter 30 after the movement. - Subsequently, the
printer 30 judges whether the print transmitting data D10 can be decrypted. When the print transmitting data D10 can be decrypted, theprinter 30 executes a print operation based on the print data D05 acquired by decrypting the print transmitting data D10, and when the print transmitting data D10 cannot be decrypted, theprinter 30 does not execute the print operation. - Next, the contents of the aforementioned process will be explained in detail using a flowchart.
FIG. 5 is a flowchart explaining a public key generation process executed by theprinter 30. This public key generation process is realized by making theCPU 40 read and execute a public key generation program stored in theROM 44 or thehard disk 58 in theprinter 30. Moreover, in this embodiment, this public key generation process is activated and executed when the user operates the control panel of theprinter 30 to thereby instruct the execution of the public key generation process. - As shown in
FIG. 5 , when the public key generation process is executed, theprinter 30 first judges whether a public key is already stored in the EEPROM 45 (step S50). When the public key is already stored in the EEPROM 45 (step S50: Yes), this public key generation process is completed without a new public key being generated. - On the other hand, when any public key is not yet stored in the EEPROM 45 (step S50: No), the
printer 30 acquires device-specific information on this printer 30 (step S52). Here, the device-specific information is identification information specifically assigned to theprinter 30, and it is, for example, a manufacturer's serial number, an MAC address, or the like of theprinter 30. - Then, the
printer 30 acquires printer position information on theprinter 30 at this point in time from the position detector (step S54). Thereby, theprinter 30 can acquire information on the installation position of theprinter 30 at this point in time. - Subsequently, the
printer 30 creates a passphrase with the device-specific information and the printer position information (step S56). There are various methods of creating the passphrase. In this embodiment, the passphrase is created by simply joining the printer position information after the device-specific information. Incidentally, the passphrase may contain data other than these device-specific information and printer position information. - Thereafter, the
printer 30 generates a public key with the passphrase created in step S56 by the public key cryptography (step S58). Then, theprinter 30 stores the generated public key in the EEPROM 45 (step S60).FIG. 6 is a diagram showing the structure of a public key storage EP10 formed in a partial region of theEEPROM 45. As shown inFIG. 6 , the generated public key is stored and held in the public key storage EP10. Note that when a private key is also generated when the public key is generated, this private key is abandoned without being stored. - Thus, the public key generation process according to this embodiment is completed.
- Next, processes in the
print client 20 and theprinter 30 when theprint client 20 acquires a public key will be explained. -
FIG. 7 is a flowchart explaining a public key request process executed by theprint client 20. This public key request process is realized by making theCPU 64 read and execute a public key request program stored in theROM 68 or thehard disk 76 in the print client. Moreover, in this embodiment, the public key request process is activated and executed when the user makes input to instruct the print client to activate a process of requesting a public key. - As shown in
FIG. 7 , in the public key request process, theprint client 20 first establishes a connection with the printer 30 (step S100). Subsequently, theprint client 20 transmits authentication information to the printer 30 (step S102). In this embodiment, a combination of a print client ID to specify the print client and a password is used as the authentication information. Accordingly, theprint client 20 transmits the print client ID and the password to theprinter 30. - Following the above step, the
print client 20 receives an authentication result indicating whether authentication is accepted from theprinter 30, and judges whether the authentication is accepted by theprinter 30 based on the authentication result (step S104). When the authentication is not accepted (step S104: No), theprint client 20 repeats the aforementioned process from step S102. - On the other hand, when the authentication is accepted (step S104: Yes), the
print client 20 transmits a public key acquisition request to the printer 30 (step S106). Then, theprint client 20 judges whether a public key has been received from the printer 30 (step S108). When the public key has not been received from the printer 30 (step S108: No), theprint client 20 stands by while repeating step S108. - On the other hand, when the public key has been received from the printer 30 (step S108: Yes), the public key is stored (step S110). In this embodiment, the
print client 20 is provided with a public key table TB10 on thehard disk 76, and the acquired public key is stored and held in this public key table TB10. -
FIG. 8 is a diagram showing an example of the structure of the public key table TB10. As shown inFIG. 8 , the public key table TB10 includes an item TD10 which stores information to specify printers and an item TD11 which stores acquired public keys corresponding to the printers. As described just above, the public key table TB10 can hold public keys concerning plural printers on a printer-by-printer basis. Moreover, by storing the public keys in the public key table TB10 on thehard disk 76 in this manner, even when theprint client 20 is powered off and then powered on again, the public key acquired before the power-on can be read from thehard disk 76 and used as it is. - As shown in
FIG. 7 , theprint client 20 then cuts the connection with the printer 30 (step S112). Thus, the public key request process shown inFIG. 7 is completed. - Next, a public key transmission process executed by the
printer 30 corresponding to the public key request process in theprint client 20 will be explained based onFIG. 9 .FIG. 9 is a flowchart explaining the public key transmission process executed by theprinter 30. This public key transmission process is realized by making theCPU 40 read and execute a public key transmission program stored in theROM 44 or thehard disk 58 in the printer. In this embodiment, this public key transmission process is constantly executed at regular time intervals. Moreover, this public key transmission process is a process corresponding to the aforementioned public key request process. - As shown in
FIG. 9 , theprinter 30 is waiting for a connection from theprint client 20, and establishes a connection with theprint client 20 when theprint client 20 makes a request for the connection (step S120). This corresponds to the aforementioned step S100 on theprint client 20 side. Subsequently, theprinter 30 judges whether the authentication information has been received from the print client 20 (step S122). When the authentication information has not been received (step S122: No), theprinter 30 stands by while repeating the process in step S122. - On the other hand, when the authentication information has been received from the print client 20 (step S122: Yes), the
printer 30 judges whether this authentication information coincides with authentication information which is previously registered with the printer 30 (step S124). Specifically, since the print client ID and the password are transmitted as the authentication information from theprint client 20 as described above, theprinter 30 judges whether these print client ID and password coincide with a print client ID and a password which are previously registered with theprinter 30. - When these two pieces of authentication information do not coincide (step S124: No), the
printer 30 transmits the authentication result indicating that the authentication is not accepted to the print client 20 (step S126), and the connection with theprint client 20 is completed in later-described step S136. On the other hand, when these two pieces of authentication information coincide (step S124: Yes), theprinter 30 transmits the authentication result indicating that the authentication is accepted to the print client 20 (step S128). - Thereafter, the
printer 30 judges whether the public key acquisition request has been received from the print client 20 (step S130). When the public key acquisition request has not been received (step S130: No), theprinter 30 stands by while repeating the process in step S130. - When the public key acquisition request has been received (step S130: Yes), the
printer 30 reads and acquires the public key from the public key storage EP10 in the EEPROM 45 (step S132). Then, theprinter 30 transmits the acquired public key to the print client 20 (step S134). Thereafter, theprinter 30 completes the connection with the print client 20 (step S136) and returns to the aforementioned step S120. - Next, processes in the
print client 20 and theprinter 30 when theprint client 20 wants to perform printing and transmits a print request to theprinter 30 will be explained in detail. -
FIG. 10 is a flowchart explaining a print request process executed by theprint client 20. This print request process is realized by making the CPU64 read and execute a print request program stored in theROM 68 or thehard disk 76 of the print client. The print request process is activated and executed when the user inputs a print instruction to the print client. - As shown in
FIG. 10 , theprint client 20 generates the print data DOS based on a print request from the user (step S160). The print data D05 is data necessary for an actual print operation when theprinter 30 is an ordinary printer. - Then, the
print client 20 reads the public key of theprinter 30 from the public key table TB10 on the hard disk 76 (step S162). Subsequently, theprint client 20 encrypts the print data D05 with the public key of theprinter 30 to generate the print transmitting data D10 (step S164). Incidentally, the print transmitting data D10 may contain data other than the print data Thereafter, theprint client 20 establishes a connection with the printer 30 (step S165). Theprint client 20 then transmits the encrypted print transmitting data D10 to the printer 30 (step S166). - Subsequently, the
print client 20 judges whether print result information has been received from the printer 30 (step S168). When the print result information has not been received (step S168: No), theprint client 20 stands by while repeating the process in step S168. On the other hand, when the print result information has been received (step S168: Yes), theprint client 20 judges whether the print result information is a print completion notice (step S170). - When this print result information is the print completion notice (step S170: Yes), it means that the
printer 30 has properly completed the print operation, and hence theprint client 20 notifies the user that theprinter 30 has completed the print operation (step S172). On the other hand, when the received print result information is not the print completion notice (step S170: No), whether the print result information is an undecryptable notice is judged (step S174). - When the print result information is the undecryptable notice (step S174: Yes), the
print client 20 notifies the user that since the print transmitting data D10 cannot be decrypted by theprinter 30, the print operation is not executed (step S176). On the other hand, when the print result information is not the undecryptable notice (step S174: No), it is thought that some other error occurs, and hence theprint client 20 gives notice according to the type of the error to the user (step S178). - After the notice in step S172, step S176, or step S178, the
print client 20 cuts the connection with the printer 30 (step S179). Thus, the print request process in theprint client 20 is completed. - Next, a print execution process executed by the
printer 30 corresponding to the print request process in theprint client 20 will be explained based onFIG. 11A .FIG. 11A is a flowchart explaining the print execution process executed by theprinter 30. This print execution process is realized by making theCPU 40 read and execute a print execution program stored in theROM 44 or thehard disk 58 in theprinter 30. In this embodiment, this print execution process is constantly executed at regular time intervals. - As shown in
FIG. 11A , theprinter 30 is waiting for a connection from theprint client 20, and establishes a connection with theprint client 20 via theprinter cable 10 when theprint client 20 makes a request for a connection (step S180). After the connection with theprint client 20 has been established, theprinter 30 judges whether the print transmitting data D10 has been received (step S182). When no print transmitting data D10 has been received (step S182: No), theprinter 30 stands by while repeating the process in step S182. - On the other hand, when the print transmitting data D10 has been received (step S182: Yes), the
printer 30 acquires its own device-specific information (step S184). Subsequently, theprinter 30 acquires printer position information on theprinter 30 at this point in time from the position detector 54 (step 186). The reason why the printer position information is acquired from theposition detector 54 each time as described above is in order that, when theprinter 30 is moved to a different place from a place where the public key was registered, a print operation cannot be executed by theprinter 30. - Then, the
printer 30 creates a passphrase with the device-specific information and the printer position information (step S188). This method of creating the passphrase needs to be the same method as in step S56 in the aforementioned public key generation process. This is because if the passphrases are different, a private key capable of decrypting the print transmitting data encrypted with the public key stored in theEEPROM 45 cannot be generated. - Thereafter, the
printer 30 generates a private key with the generated passphrase by the public key cryptography (step S190). If the installation position of theprinter 30 is not moved, the passphrase used in this step S190 is the same as the passphrase used in step S58 in the aforementioned public key generation process. Therefore, the private key which corresponds to the public key generated in step S58 is generated. Subsequently, theprinter 30 decrypts the received print transmitting data D10 with the generated private key and acquires the print data D05 (step S192). - Thereafter, the
printer 30 judges whether the print transmitting data D10 can be decrypted with the private key (step S194). When the print transmitting data D10 can be decrypted (step S194: Yes), theprinter 30 executes a print operation by driving theprint engine 52 based on the acquired print data D05 (step S196). Specifically, theprinter 30 performs a language interpretation of the print data D05 and generates print request data fitting theprint engine 52. Then, by transmitting this print request data to theprint engine 52, print sheets or the like are printed by theprint engine 52. - At a point in time when the print operation has been properly completed, the
printer 30 transmits the print completion notice that the print operation has been properly completed as the print result information to the print client 20 (step S198). - Contrary to this, when it is judged in step S194 that the print transmitting data D10 cannot be decrypted (step S194: No), the
printer 30 transmits the undecryptable notice as the print result information to the print client 20 (step S200). - After step S198 or step S200, the
printer 30 completes the connection with the print client 20 (step S202). Then, theprinter 30 returns to the aforementioned process in step S180. -
FIG. 11B is a diagram showing a hardware structure of theprint client 20 and theprinter 30 when the aforementioned process is realized by hardware. As shown inFIG. 11B , theprinter 30 includes theposition detector 54 which acquires the printer position information to specify a place where theprinter 30 is installed. Then, a first printerposition information acquisition 100 acquires the printer position information from theposition detector 54 and regards the printer position information as first printer position information. Apublic key generator 102 generates a public key with a passphrase containing at least the first printer position information. However, even if a private key is generated when the public key is generated, the private key is abandoned. - The public key generated by the public
key generator 102 is stored in the publickey storage 104. However, the number of times the public key is allowed to be stored in the publickey storage 104 is limited to a predetermined number of times (for example, one time). - According to user's request, a public key
acquisition request transmitter 200 of theprint client 20 transmits a public key acquisition request to theprinter 30 at optional timing in order to request a transmission of a public key. A public keyacquisition request receiver 110 receives the public key acquisition request. Then, a publickey transmitter 112 reads the public key stored in the publickey storage 104 and transmits the public key to theprint client 20. Apublic key receiver 202 of theprint client 20 receives the public key and the public key is stored in a publickey storage 204. - According to user's print request, a
print data generator 210 of theprint client 20 generates print data. Aprint data transmitter 212 reads the public key from the publickey storage 204, encrypts the print data with the public key, and transmits it to theprinter 30. - A
print data receiver 120 of theprinter 30 receives the print data. When the print data is received at theprinter 30, a second printerposition information acquisition 122 acquires printer position information from theposition detector 54 and regards the printer position information as second printer position information. Then, a privatekey generator 124 generates a private key with a passphrase containing at least the second printer position information. Adecrypter 126 decrypts the print data received by theprint data receiver 120 with the private key. Aselective print executor 128 executes a print operation based on the print data when the print data is decrypted with the private key, but theselective print executor 128 does not executes a print operation based on the print data when the print data is not decrypted with the private key. - As stated above, according to the print system of this embodiment, the
printer 30 can generate a public key and register this public key with theEEPROM 45 only one time, so that the installation place where theprinter 30 can execute a proper print operation can be limited to a place where the public key is generated. Namely, based on a request from the user, theprinter 30 generates a public key with a passphrase containing printer position information at this point in time, and stores the public key in theEEPROM 45. When theprinter 30 transmits a public key to theprint client 20, theprinter 30 reads the public key stored in theEEPROM 45 and transmits this public key. - When the
print client 20 transmits the print data D05 to theprinter 30, theprint client 20 transmits the print transmitting data D10 generated by encrypting the print data D05 with this public key. Each time theprinter 30 receives the print transmitting data D10, theprinter 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, theprinter 30 decrypts the print transmitting data D10 with this private key, and when the print transmitting data D10 can be decrypted, theprinter 30 executes a print operation, and when the print transmitting data D10 cannot be decrypted, theprinter 30 does not execute the print operation. Accordingly, if the printer position information when the public key is stored in theEEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D10 cannot be properly decrypted, so that a proper print result cannot be obtained. Thus, the position where theprinter 30 is used can be limited. - In the second embodiment, a modification is made to the aforementioned first embodiment, and the
printer 30 stores printer position information in place of a public key in theEEPROM 45. Further details will be given below. - It should be mentioned that the configuration of a print system according to this embodiment is the same as that in
FIG. 1 in the aforementioned first embodiment, the configuration of theprinter 30 is the same as that inFIG. 2 described above, and that the configuration of theprint client 20 is the same as that inFIG. 3 described above. Moreover, a public key request process, a print request process, and a print execution process according to this embodiment are the same as those in the aforementioned first embodiment. - However, in the
printer 30 according to this embodiment, a printer position information registration process in place of the public key generation process is executed. -
FIG. 12 is a flowchart explaining the printer position information registration process executed by theprinter 30 according to this embodiment. This printer position information registration process is realized by making theCPU 40 read and execute a printer position information registration program stored in theROM 44 or thehard disk 58 in theprinter 30. Moreover, in this embodiment, this printer position information registration process is activated and executed when the user operates the control panel of theprinter 30 to thereby instruct the execution of the printer position information registration process. - As shown in
FIG. 12 , in the printer position information registration process according to this embodiment, theprinter 30 judges whether printer position information is already stored in the EEPROM 45 (step S210). When the printer position information is already stored in the EEPROM 45 (step S210: Yes), this printer position information registration process is completed. - On the other hand, when any printer position information is not stored in the EEPROM 45 (step S210: No), the
printer 30 acquires printer position information on theprinter 30 at this point in time from the position detector 54 (step S212). Thus, information on the installation position of theprinter 30 at this point in time can be acquired. - Then, the
printer 30 stores the acquired printer position information in the EEPROM 45 (step S214).FIG. 13 is a diagram showing the structure of a printer position information storage EP20 formed in a partial region of theEEPROM 45. As shown inFIG. 13 , theprinter 30 stores and holds the acquired printer position information in the printer position information storage EP20. - Thus, the printer position information registration process according to this embodiment is completed.
-
FIG. 14 andFIG. 15A are flowcharts explaining a public key transmission process according to this embodiment. As shown inFIG. 14 , the public key transmission process according to this embodiment is the same as that in the aforementioned first embodiment up to step S130. - After step S130, in the public key transmission process according to this embodiment, the
printer 30 acquires device-specific information (step S218). Here, similarly to the aforementioned first embodiment, the device-specific information is identification information specifically assigned to theprinter 30, and it is, for example, a manufacturer's serial number, an MAC address, or the like of theprinter 30. - Then, as shown in
FIG. 15A , theprinter 30 reads the printer position information stored in the printer position information storage EP20 from the EEPROM 45 (step S220). Namely, in this embodiment, each time the transmission of a public key is requested by theprint client 20, a public key is generated by the public key cryptography, but the printer information used for a passphrase for the public key is fixed. Therefore, each time a public key is generated, the same public key is obtained. - Subsequently, the
printer 30 creates a passphrase with the device-specific information and the printer position information (step S222). There are various methods of creating the passphrase. In this embodiment, the passphrase is created by simply joining the printer position information after the device-specific information. Incidentally, the passphrase may contain data other than these device-specific information and printer position information. - Thereafter, the
printer 30 generates a public key with the passphrase created in step S222 by the public key cryptography (step S224). Then, theprinter 30 transmits the generated public key to the print client 20 (step S226). Subsequently, theprinter 30 completes the connection with the print client 20 (step S228), and returns to step S120 inFIG. 14 . -
FIG. 15B is a diagram showing a hardware structure of theprint client 20 and theprinter 30 when the aforementioned process is realized by hardware. A different point from the aforementionedFIG. 11B will be explained. Theprinter 30 includes a printerposition information storage 140 in which first printer position information acquired by the first printerposition information acquisition 100 is stored. However, the number of times the first printer position information is allowed to be stored in the printerposition information storage 140 is limited to a predetermined number of times (for example, one time). - If the public key
acquisition request receiver 110 receives the public key acquisition request, then a publickey generator 142 reads the first printer position information from the printerposition information storage 140, and generates a public key with a passphrase containing at least the first printer position information. Then, publickey transmitter 144 transmits the public key generated by the publickey generator 142 to theprint client 20. However, even if a private key is generated when publickey generator 142 generates the public key, the private key is abandoned. - As stated above, according to the print system of this embodiment, the
printer 30 can register only one piece of printer position information which is contained in a passphrase when theprinter 30 generates a public key, so that the installation place where theprinter 30 can execute a proper print operation can be limited to a place where the printer position information is registered with theEEPROM 45. Namely, based on a request from the user, theprinter 30 registers printer position information at some point in time with theEEPROM 45. Each time the transmission of a public key is requested by theprint client 20, theprinter 30 reads the printer position information from theEEPROM 45, generates a public key with a passphase containing the printer position information, and transmits the public key to theprint client 20. - When the
print client 20 transmits the print data D05 to theprinter 30, theprint client 20 transmits the print transmitting data D10 generated by encrypting the print data DOS with this public key. Each time theprinter 30 receives the print transmitting data D10, theprinter 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, theprinter 30 decrypts the print transmitting data D10 with this private key, and when the print transmitting data D10 can be decrypted, theprinter 30 executes a print operation, and when the print transmitting data D10 cannot be decrypted, theprinter 30 does not execute the print operation. Accordingly, if the printer position information registered with theEEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D10 cannot be properly decrypted, so that a proper print result cannot be obtained. Thus, the position where theprinter 30 is used can be limited. - In the third embodiment, a modification is made to the aforementioned second embodiment, and the generation of a public key is stopped when the
printer 30 is moved. Further details will be given below. - It should be mentioned that the configuration of a print system according to this embodiment is the same as that in
FIG. 1 in the aforementioned first embodiment, the configuration of theprinter 30 is the same as that inFIG. 2 described above, and that the configuration of theprint client 20 is the same as that inFIG. 3 described above. Moreover, a print request process, a print execution process, and a printer position information registration process according to this embodiment are the same as those in the aforementioned second embodiment. - However, a public key request process according to this embodiment is slightly different from that in the aforementioned second embodiment.
FIG. 16 is a flowchart explaining the contents of the public key request process according to this embodiment. - As shown in
FIG. 16 , the process from step S100 to step S112 is the same as that in the aforementioned second embodiment, but when it is judged in step S108 that the public key has not been received (step S108: No), it is judged whether printer movement information has been received from the printer 30 (step S300). When the printer movement information has not been received (step S300: No), the process from step S108 is repeated. - On the other hand, when the printer movement information has been received (step S300: Yes), the user is notified that the public key cannot be generated because the
printer 30 has been moved (step S302). Then, the connection with theprinter 30 is cut (step S112), and the public key request process is completed. -
FIG. 17 andFIG. 18A are flowcharts explaining the contents of a public key transmission process according to this embodiment. As shown inFIG. 17 , the public key transmission process according to this embodiment is the same as that in the aforementioned first embodiment up to step S130. - After step S130, in the public key transmission process according to this embodiment, the
printer 30 acquires printer position information stored in the printer position information storage EP20 (step S310). Subsequently, theprinter 30 acquires printer position information on theprinter 30 at this point in time from the position detector 54 (step S312). - Then, the
printer 30 judges whether the printer position information acquired from the printer position information storage EP20 and the printer position information acquired from theposition detector 54 coincide with each other (step S314). When these two piece of printer position information do not coincide (step S314: No), this indicates that theprinter 30 is moved, compared with when the printer position information was registered in the printer position information registration process, whereby theprinter 30 transmits the printer movement information to theprint client 20 without generating a public key (step S316). Thereafter, as shown inFIG. 18A , the connection with theprint client 20 is cut (step S328), and the public key transmission process is completed. - On the other hand, as shown in
FIG. 17 , when the printer position information acquired from the printer position information storage EP20 and the printer position information acquired from theposition detector 54 coincide (step S314: Yes), theprinter 30 acquires device-specific information as shown inFIG. 18A (step S320). - Then, the
printer 30 creates a passphrase with the device-specific information and the printer position information acquired in step S310 or step S312 (step S322). There are various methods of creating the passphrase. In this embodiment, the passphrase is created by simply joining the printer position information after the device-specific information. Incidentally, the passphrase may contain data other than these device-specific information and printer position information. - Thereafter, the
printer 30 generates a public key with the passphrase created in step S322 by the public key cryptography (step S324). Then, theprinter 30 transmits the generated public key to the print client 20 (step S326). Subsequently, theprinter 30 completes the connection with the print client 20 (step S328), and returns to step S120 inFIG. 17 . -
FIG. 18B is a diagram showing a hardware structure of theprint client 20 and theprinter 30 when the aforementioned process is realized by hardware. A different point from the aforementionedFIG. 15B will be explained. When the public keyacquisition request receiver 110 of theprinter 30 receives the public key acquisition request, the second printerposition information acquisition 122 acquires second printer position information from theposition detector 54. Then, a publickey generator 160 compares the first printer position information stored in the printerposition information storage 140 and the second printer position information acquired by the second printerposition information acquisition 122. If the first printer position information and the second printer position information coincide, then the publickey generator 160 generates a public key with a passphrase containing at least the first printer position information or the second printer position information. A publickey transmitter 162 transmits the public key generated by the publickey generator 160 to theprint client 20. - As stated above, according to the print system of this embodiment, the generation of a public key is stopped when the position where printer position information is registered with the
printer 30 and the position of theprinter 30 when the generation of the public key is tried are different, whereby the position where theprinter 30 generates a public key and transmits the public key to theprint client 20 can be limited. Hence, the position where theprinter 30 can be properly used can be limited. - In a print system according to the fourth embodiment, a public key is generated with a passphrase containing at least printer position information which indicates a position where a printer is installed at this point in time, and stored in the printer. The generation of the public key is executed by the printer only when being requested by a particular person whose inputted public key generation authentication information coincides with registered public key generation authentication information.
- When transmission of a public key is requested by the print client, the printer reads a stored public key and transmits this public key to the print client. When the print client transmits print data to this printer, the print client transmits print transmitting data generated by encrypting the print data with the acquired public key. The printer which has received this print transmitting data generates, at the time of reception, a private key with a passphrase containing at least printer position information at this point in time, and executes a print operation only when the print transmitting data can be decrypted with this private key. By doing so, a proper print operation can be executed only in a position where a person with proper authority registered the public key with the printer. Further details will be given below.
- It should be mentioned that the configuration of the print system according to this embodiment is the same as that in
FIG. 1 described above, the internal configuration of theprinter 30 is the same as that inFIG. 2 described above, and that the internal configuration of theprint client 20 is the same as that inFIG. 3 described above. - First, a brief explanation of a process when the
print client 20 performs printing with theprinter 30 in the print system according to this embodiment will be given. - In this embodiment, the
printer 30 generates a public key based on a request from a person with proper authority and stores the public key in theEEPROM 45. In this embodiment, whether an operator is a person with proper authority or not is judged by making the operator input public key generation authentication information from the control panel of theprinter 30. Moreover, in this embodiment, this public key generation authentication information is composed of a combination of an ID and a password. The public key generation authentication information may be inputted from theprint client 20 and transmitted to theprinter 30 via theprinter cable 10. Further, when theprinter 30 is a network printer, the public key generation authentication information may be transmitted to theprinter 30 from a different place via the network. The process thereafter is the same as that in the aforementioned first embodiment. - Next, the contents of a process in the print system according to this embodiment will be explained in detail using a flowchart.
FIG. 19A is a flowchart explaining a public key generation process executed by theprinter 30. This public key generation process is realized by making theCPU 40 read and execute a public key generation program stored in theROM 44 or thehard disk 58 in theprinter 30. Moreover, in this embodiment, this public key generation process is activated and executed when an operator (for example, a person in charge of maintenance in a manufacturer of the printer 30) operates the control panel of theprinter 30 to thereby instruct the execution of the public key generation process. - As shown in
FIG. 19A , when the public key generation process is executed, theprinter 30 first requests the operator to input public key generation authentication information (step S446). In this embodiment, the operator inputs an ID and a password as the public key generation authentication information from the control panel of theprinter 30. - Then, the
printer 30 judges whether the public key generation authentication information has been inputted (step S448). When the public key generation authentication information has not been inputted (step S448: No), theprinter 30 stands by while repeating the process in step S448. - On the other hand, when the public key generation authentication information has been inputted (step S448: Yes), the
printer 30 judges whether the inputted public key generation authentication information coincides with registered public key generation authentication information (step S450). In this embodiment, the registered public key generation authentication information is previously stored in theROM 44, theEEPROM 45, or thehard disk 58. Therefore, theprinter 30 reads the stored public key generation authentication information, and judges whether the read public key generation authentication information coincides with the public key generation authentication information inputted by the operator. Specifically, whether registered ID and password coincide with the ID and password inputted by the operator is judged. - When these two pieces of public key generation authentication information do not coincide (step S450: No), this public key generation process is completed without a new public key being generated.
- On the other hand, when these two pieces of public key generation authentication information coincide (step S450: Yes), the
printer 30 acquires device-specific information on this printer 30 (step S452). Here, the device-specific information is identification information specifically assigned to theprinter 30, and it is, for example, a manufacturer's serial number, an MAC address, or the like of theprinter 30. - Then, the
printer 30 acquires printer position information on theprinter 30 at this point in time from the position detector 54 (step S454). Thereby, theprinter 30 can acquire information on the installation position of theprinter 30 at this point in time. - Subsequently, the
printer 30 creates a passphrase with the device-specific information and the printer position information (step S456). There are various methods of creating the passphrase. In this embodiment, the passphrase is created by simply joining the printer position information after the device-specific information. Incidentally, the passphrase may contain data other than these device-specific information and printer position information. - Thereafter, the
printer 30 generates a public key with the passphrase created in step S456 by the public key cryptography (step S458). Then, theprinter 30 stores the generated public key in theEEPROM 45 shown inFIG. 6 (step S560). Note that when a private key is also generated when the public key is generated, the private key is abandoned without being stored. - Thus, the public key generation process according to this embodiment is completed.
- It should be mentioned that in this embodiment, a public key request process is the same as that in
FIG. 7 described above, a public key transmission process is the same as that inFIG. 9 described above, a print request process is the same as that inFIG. 10 described above, and that a print execution process is the same as that inFIG. 11A described above. -
FIG. 19B is a diagram showing a hardware structure of theprint client 20 and theprinter 30 when the aforementioned process is realized by hardware. A different point from the aforementionedFIG. 11B will be explained. If a generation of a public key is requested, an authentication information requester 300 of theprinter 30 requests an operator to input authentication information. Anauthentication judgment section 301 judges whether the inputted authentication information coincides with registered authentication information. If the inputted authentication information and the registered authentication information coincide, theauthentication judgment section 301 judges that the operator has proper authority. - If the operator has the proper authority, a first printer
position information acquisition 302 acquires printer position information from theposition detector 54, and regards the printer position information as first printer position information. Then, a publickey generator 304 generates a public key with a passphrase containing at least the first printer position information, and the generated public key is stored in a publickey storage 306. - As stated above, according to the print system of this embodiment, the
printer 30 can generate a public key and register the public key with theEEPROM 45 only when a person with proper authority provides instructions, whereby the installation place where theprinter 30 can execute a proper print operation can be limited. - More specifically, when an operator with proper authority requests the
printer 30 to generate a public key, theprinter 30 generates a public key with a passphrase containing printer position information at this point in time and stores the public key in theEEPROM 45. On the other hand, in the case of an operator without proper authority, theprinter 30 does not generate a public key. When transmitting a public key to theprint client 20, theprinter 30 reads the public key stored in theEEPROM 45 and transmits this public key. - When the
print client 20 transmits the print data D05 to theprinter 30, theprint client 20 transmits the print transmitting data D10 generated by encrypting the print data D05 with this public key. Each time theprinter 30 receives the print transmitting data D10, theprinter 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, theprinter 30 decrypts the print transmitting data D10 with this private key, and when the print transmitting data D10 can be decrypted, theprinter 30 executes a print operation, and when the print transmitting data D10 cannot be decrypted, theprinter 30 does not execute the print operation. Accordingly, if the printer position information when the public key is stored in theEEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D10 cannot be properly decrypted, so that a proper print result cannot be obtained. Thus, the position where theprinter 30 can be used can be limited to a place where the person with proper authority instructs theprinter 30 to generate the public key. - Moreover, as long as the operator has proper authority, the operator can change the public key stored in the
EEPROM 45, and hence, even when the installation place of the printer is changed for good reason by the printer manufacturer or the like, the operator can continue to use theprinter 30. Namely, if the operator with proper authority instructs theprinter 30 to generate a public key again in a new installation place of theprinter 30, the new public key is generated based on printer position information on this place and stored in theEEPROM 45. Accordingly, theprinter 30 can be used effectively. - In the fifth embodiment, a modification is made to the aforementioned fourth embodiment, and the
printer 30 stores printer position information in place of a public key in theEEPROM 45. Further details will be given below. - It should be mentioned that the configuration of a print system according to this embodiment is the same as that in
FIG. 1 in the aforementioned first embodiment, the configuration of theprinter 30 is the same as that inFIG. 2 described above, and that the configuration of theprint client 20 is the same as that inFIG. 3 described above. Moreover, a public key request process, a print request process, and a print execution process according to this embodiment are the same as those in the aforementioned first embodiment. - However, in the
printer 30 according to this embodiment, a printer position information registration process in place of the public key generation process in the fourth embodiment is executed. -
FIG. 20A is a flowchart explaining the printer position information registration process executed by theprinter 30 according to this embodiment. This printer position information registration process is realized by making theCPU 40 read and execute a printer position information registration program stored in theROM 44 or thehard disk 58 in theprinter 30. Moreover, in this embodiment, this printer position information registration process is activated and executed when an operator (for example, a person in charge of maintenance in a manufacturer of the printer 30) operates the control panel of theprinter 30 to thereby instruct the execution of the printer position information registration process. - As shown in
FIG. 20A , when the public key generation process is executed, theprinter 30 first requests the operator to input printer position information registration authentication information (step S506). In this embodiment, the operator inputs an ID and a password as the printer position information registration authentication information from the control panel of theprinter 30. - Then, the
printer 30 judges whether the printer position information registration authentication information has been inputted (step S508). When the printer position information registration authentication information has not been inputted (step S508: No), theprinter 30 stands by while repeating the process in step S508. - On the other hand, when the printer position information registration authentication information has been inputted (step S508: Yes), the
printer 30 judges whether the inputted printer position information registration authentication information coincides with registered printer position information registration authentication information (step S510). In this embodiment, the registered printer position information registration authentication information is previously stored in theROM 44, theEEPROM 45, or thehard disk 58. Therefore, theprinter 30 reads the stored printer position information registration authentication information, and judges whether the read printer position information registration authentication information coincides with the printer position information registration authentication information inputted by the operator. Specifically, whether registered ID and password coincide with the ID and password inputted by the operator is judged. - When these two pieces of printer position information registration authentication information do not coincide (step S510: No), this printer position information registration process is completed without new printer position information being registered.
- On the other hand, when these two pieces of printer position information registration authentication information coincide (step S510: Yes), the
printer 30 acquires printer position information on thisprinter 30 at this point in time from the position detector 54 (step S512). Thereby, theprinter 30 can acquire information on the installation position of theprinter 30 at this point in time. - Subsequently, the
printer 30 stores the acquired printer position information in theEEPROM 45 shown inFIG. 13 (step S514). Thus, the printer position information registration process according to this embodiment is completed. - It should be mentioned that a public key transmission process according to this embodiment is the same as that in
FIG. 14 andFIG. 15A described above. -
FIG. 20B is a diagram showing a hardware structure of theprint client 20 and theprinter 30 when the aforementioned process is realized by hardware. A different point from the aforementionedFIG. 19B will be explained. If theauthentication judgment section 301 judges that the operator has proper authority, then the first printerposition information acquisition 302 acquires printer position information from theposition detector 54 and regards the printer position information as first printer position information. The first printer position information is stored in a first printerposition information storage 310. - If the public key
acquisition request receiver 110 receives the public key acquisition request, then a publickey generator 312 reads the first printer position information from the first printerposition information storage 310 and generates a public key with a passphrase containing at least the first printer position information. The publickey transmitter 112 transmits the generated public key to theprint client 20. - As stated above, according to the print system of this embodiment, only when a person with proper authority provides instructions, the
printer 30 stores printer position information at this point in time in theEEPROM 45, whereby the installation place where theprinter 30 can execute a proper print operation can be limited. - More specifically, when an operator with proper authority requests the
printer 30 to register new printer position information, theprinter 30 stores printer position at this point in time in theEEPROM 45. On the other hand, in the case of an operator without proper authority, theprinter 30 does not store printer position information in theEEPROM 45. When transmitting a public key to theprint client 20, theprinter 30 generates a public key with a passphrase containing at least the printer position information stored in theEEPROM 45 and transmits this public key. - When the
print client 20 transmits the print data D05 to theprinter 30, theprint client 20 transmits the print transmitting data D10 generated by encrypting the print data DOS with this public key. Each time theprinter 30 receives the print transmitting data D10, theprinter 30 acquires printer position information at that point in time, and generates a private key with a passphrase containing this printer position information. Then, theprinter 30 decrypts the print transmitting data D10 with this private key, and when the print transmitting data D10 can be decrypted, theprinter 30 executes a print operation, and when the print transmitting data D10 cannot be decrypted, theprinter 30 does not execute the print operation. Accordingly, if the printer position information stored in theEEPROM 45 and the printer position information when the private key is generated are different, the received print transmitting data D10 cannot be properly decrypted, so that a proper print result cannot be obtained. Thus, the position where theprinter 30 can be used can be limited to a place where the person with proper authority registered the printer position information with theprinter 30. - Moreover, as long as the operator has proper authority, the operator can change the printer position information stored in the
EEPROM 45, and hence, even when the installation place of theprinter 30 is changed for good reason by the printer manufacturer or the like, the operator can continue to use theprinter 30. Namely, if the operator with proper authority instructs theprinter 30 to register printer position information again in a new installation place of theprinter 30, printer position information on this place is stored in theEEPROM 45. Accordingly, the printer can be used effectively. - In the sixth embodiment, a modification is made to the aforementioned fifth embodiment, and the generation of a public key is stopped when the
printer 30 is moved from a place where a person with proper authority registered printer position information. Further details will be given below. - It should be mentioned that the configuration of a print system according to this embodiment is the same as that in
FIG. 1 in the aforementioned first embodiment, the configuration of theprinter 30 is the same as that inFIG. 2 described above, and that the configuration of theprint client 20 is the same as that inFIG. 3 described above. Moreover, a print request process, a print execution process, and a printer position information registration process according to this embodiment are the same as those in the aforementioned fifth embodiment. - However, a public key request process according to this embodiment is slightly different from that in the aforementioned fifth embodiment.
FIG. 21 is a flowchart explaining the contents of the public key request process according to this embodiment. - As shown in
FIG. 21 , the process from step S100 to step S112 is the same as that in the aforementioned fifth embodiment, but when it is judged in step S108 that the public key has not been received (step S108: No), it is judged whether printer movement information has been received from the printer 30 (step S600). When the printer movement information has not been received (step S600: No), the process from step S108 is repeated. - On the other hand, when the printer movement information has been received (step S600: Yes), the user is notified that the public key cannot be generated because the
printer 30 has been moved from a place where a person with proper authority registered printer position information (step S602). Then, the connection with theprinter 30 is cut (step S112), and the public key request process is completed. -
FIG. 22 andFIG. 23 are flowcharts explaining the contents of a public key transmission process according to this embodiment. As shown inFIG. 22 , the public key transmission process according to this embodiment is the same as that in the aforementioned first embodiment up to step S130. - After step S130, in the public key transmission process according to this embodiment, the
printer 30 acquires printer position information stored in the printer position information storage EP20 (step S610). Subsequently, theprinter 30 acquires printer position information on theprinter 30 at this point in time from the position detector 54 (step S612). - Then, the
printer 30 judges whether the printer position information acquired from the printer position information storage EP20 and the printer position information acquired from theposition detector 54 coincide with each other (step S614). When these two piece of printer position information do not coincide (step S614: No), this indicates that theprinter 30 is moved, compared with when the person with proper authority registered the printer position information in the printer position information registration process, whereby theprinter 30 transmits printer movement information to theprint client 20 without generating a public key (step S616). Thereafter, as shown inFIG. 23 , the connection with theprint client 20 is cut (step S628), and the public key transmission process is completed. - On the other hand, as shown in
FIG. 22 , when the printer position information acquired from the printer position information storage EP20 and the printer position information acquired from theposition detector 54 coincide (step S614: Yes), theprinter 30 acquires device-specific information as shown inFIG. 23 (step S620). - Then, the
printer 30 creates a passphrase with the device-specific information and the printer position information acquired in step S610 or step S612 (step S622). There are various methods of creating the passphrase. In this embodiment, the passphrase is created by simply joining the printer position information after the device-specific information. Incidentally, the passphrase may contain data other than these device-specific information and printer position information. - Thereafter, the
printer 30 generates a public key with the passphrase created in step S622 by the public key cryptography (step S624). Then, theprinter 30 transmits the generated public key to the print client 20 (step S626). Subsequently, theprinter 30 completes the connection with the print client 20 (step S628), and returns to step S120 inFIG. 22 . -
FIG. 24B is a diagram showing a hardware structure of theprint client 20 and theprinter 30 when the aforementioned process is realized by hardware. A different point from the aforementionedFIG. 20B will be explained. If the public keyacquisition request receiver 110 receives the public key acquisition request, then the second printerposition information acquisition 122 acquires second printer position information from theposition detector 54. Then, a publickey generator 320 compares the first printer position information stored in the printerposition information storage 310 and the second printer position information acquired by the second printerposition information acquisition 122. If the first printer position information and the second printer position information coincide, then the publickey generator 320 generates a public key with a passphrase containing at least the first printer position information or the second printer position information. A publickey transmitter 122 transmits the public key generated by the publickey generator 320 to theprint client 20. - As stated above, according to the print system of this embodiment, the generation of a public key is stopped when the position where a person with proper authority registered printer position information with the
printer 30 and the position of theprinter 30 when the generation of a public key is tried are different, whereby the position where theprinter 30 generates a public key and transmits the public key to theprint client 20 can be limited. Hence, the position where theprinter 30 can be properly used can be limited. - Moreover, as long as the operator has proper authority, the operator can change the printer position information stored in the
EEPROM 45, and hence, even when the installation place of theprinter 30 is changed for good reason by the printer manufacturer or the like, the operator can continue to use theprinter 30. Namely, if the operator with proper authority instructs theprinter 30 to register printer position information again in a new installation place of theprinter 30, printer position information on this place is stored in theEEPROM 45, and a public key can be generated again. Accordingly, the printer can be used effectively. - It should be mentioned that the present invention is not limited to the aforementioned embodiments, and various changes may be made therein. For example, in the aforementioned first embodiment, the number of times the public key can be stored in the
EEPROM 45 is limited to one time, but may be limited to a predetermined number of times such as two times, three times, or the like. Similarly, in the second embodiment and the third embodiment, the number of times the printer position information can be stored in theEEPROM 45 is limited to one time, but may be limited to a predetermined number of times such as two times, three times, or the like. - In the aforementioned fourth embodiment, the public key generation authentication information indicating whether the operator has proper authority or not is composed of a combination of an ID and a password, and in the fifth embodiment and the sixth embodiment, the printer position information registration authentication information indicating whether the operator has proper authority or not is composed of a combination of an ID and a password, but the public key generation authentication information and the printer position information registration authentication information are not limited to the combination of an ID and a password. For example, it is also possible that a fingerprint of a person with proper authority is registered, a fingerprint of an operator is read, and when both fingerprints coincide, it is judged that the operator has proper authority.
- Further, in the aforementioned respective embodiments, the printer is explained as an example of a data receiving device which sets a limit to a position where it can be used, the present invention is not limited to the printer. Moreover, a data transmitting device is not limited to the print client.
- For example, in a data transmitting and receiving system, the data transmitting device may be a digital camera for taking images and the data receiving device may be a data server which stores data on the images taken by the digital camera. In this case, data transmitted from the digital camera is encrypted with a public key received from the data server, and the data server which has received this data generates a private key by the aforementioned method and decrypts the data. When the received data can be decrypted, the data server stores the data, and the received data cannot be decrypted, the data server does not store the data.
- Moreover, in the data transmitting and receiving system, the data transmitting device may be a personal computer and the data receiving device may be a projector which projects image data transmitted from the personal computer. In this case, data transmitted from the personal computer is encrypted with a public key received from the projector, and the projector which has received this data generates a private key by the aforementioned method and decrypts the data. When the received data can be decrypted, the projector projects the data, and the received data cannot be decrypted, the projector does not project the data.
- Further, in the data transmitting and receiving system, the data transmitting device may be a content server for music or the like and the data receiving device may be a playback device for content data such as music transmitted from the content server. In this case, data transmitted from the content server is encrypted with a public key received from the playback device, and the playback device which has received this data generates a private key by the aforementioned method and decrypts the data. When the received data can be decrypted, the playback device plays back the data, and the received data cannot be decrypted, the playback device does not play back the data.
- Furthermore, the aforementioned embodiments are explained with the case where a print medium for the
printer 30 is a print sheet as an example, but the print medium is not limited to this, and the present invention can be applied to other print media such as an OHP sheet and the like. - Besides, as for each process explained in the aforementioned embodiments, it is possible to record a program to execute each process on a record medium such as a flexible disk, a CD-ROM (Compact Disc-Read Only Memory), a ROM, a memory card, or the like and distribute this program in the form of the record medium. In this case, the aforementioned embodiments can be realized by making the
print client 20 and/or theprinter 30 read the record medium on which this program is recorded and execute this program. - Moreover, the
print client 20 and/or theprinter 30 sometimes has other programs such as an operating system, other application programs, and the like. In this case, by using these other programs in theprint client 20 and/or theprinter 30, a command, which calls a program to realize a process equal to that in the aforesaid embodiments out of programs in theprint client 20 and/or theprinter 30, may be recorded on the record medium. - Further, such a program can be distributed not in the form of the record medium but in the form of a carrier wave via a network. The program transmitted in the form of the carrier wave over the network is incorporated in the
print client 20 and/or theprinter 30, and the aforesaid embodiments can be realized by executing this program. - Furthermore, when being recorded on the record medium or transmitted as the carrier wave over the network, the program is sometimes encrypted or compressed. In this case, the
print client 20 and/or theprinter 30 which has read the program from the record medium or the carrier wave needs to execute the program after decrypting or expanding the program.
Claims (20)
1. A control method of a printer, comprising the steps of:
acquiring first printer position information to specify a place where the printer is installed from a printer position information acquisition;
generating a public key with a passphrase containing at least the first printer position information;
storing the generated public key in a public key storage, the number of times the public key is allowed to be stored being limited to a predetermined number of times;
receiving print data encrypted with the public key;
acquiring second printer position information from the printer position information acquisition when the print data has been received;
generating a private key with a passphrase containing at least the second printer position information; and
decrypting the received print data with the private key.
2. The control method of the printer according to claim 1 , further comprising the steps of:
receiving a public key acquisition request from a print client;
reading the public key stored in the public key storage; and
transmitting the public key to the print client which has transmitted the public key acquisition request.
3. The control method of the printer according to claim 1 , wherein the predetermined number of times is one time.
4. The control method of the printer according to claim 3 , wherein even if a private key is generated in the step of generating the public key, the private key is abandoned.
5. The control method of the printer according to claim 4 , further comprising the step of executing a print operation based on the print data when the print data is decrypted with the private key but not executing the print operation based on the print data when the print data is not decrypted with the private key.
6. A control method of a printer, comprising the steps of:
acquiring first printer position information to specify a place where the printer is installed from a printer position information acquisition, and generating a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request;
storing the generated public key in a public key storage;
receiving print data encrypted with the public key;
acquiring second printer position information from the printer position information acquisition when the print data has been received;
generating a private key with a passphrase containing at least the second printer position information; and
decrypting the received print data with the private key.
7. The control method of the printer according to claim 6 , further comprising the steps of:
receiving a public key acquisition request from a print client;
reading the public key stored in the public key storage; and
transmitting the public key to the print client which has transmitted the public key acquisition request.
8. The control method of the printer according to claim 6 , further comprising the steps of:
requesting authentication information of an operator; and
when authentication information has been inputted, judging whether the inputted authentication information coincides with registered authentication information and, when these two pieces of authentication information coincide, judging that the operator has proper authority.
9. The control method of the printer according to claim 8 , wherein even if a private key is generated in the step of generating the public key, the private key is abandoned.
10. The control method of the printer according to claim 9 , further comprising the step of executing a print operation based on the print data when the print data is decrypted with the private key but not executing the print operation based on the print data when the print data is not decrypted with the private key.
11. A printer, comprising:
a first printer position information acquisition which acquires first printer position information to specify a place where the printer is installed from a printer position information acquisition;
a public key generator which generates a public key with a passphrase containing at least the first printer position information;
a public key storage in which the public key generated by the public key generator is stored, the number of times the public key is allowed to be stored being limited to a predetermined number of times;
a print data receiver which receives print data encrypted with the public key;
a second printer position information acquisition which acquires second printer position information from the printer position information acquisition when the print data has been received;
a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
a decrypter which decrypts the print data received by the print data receiver with the private key.
12. The printer according to claim 11 , further comprising:
a public key acquisition request receiver which receives a public key acquisition request from a print client; and
a public key transmitter which reads the public key stored in the public key storage and transmits the public key to the print client which has transmitted the public key acquisition request.
13. The printer according to claim 11 , wherein the predetermined number of times is one time.
14. The printer according to claim 13 , wherein even if a private key is generated when the public key generator generates the public key, the private key is abandoned.
15. The printer according to claim 14 , further comprising a selective print executor which executes a print operation based on the print data when the print data is decrypted with the private key and does not execute the print operation based on the print data when the print data is not decrypted with the private key.
16. A printer, comprising:
a public key generator which acquires first printer position information to specify a place where the printer is installed from a printer position information acquisition, and generates a public key with a passphrase containing at least the first printer position information, when a person with proper authority makes a request;
a public key storage in which the public key generated by the public key generator is stored;
a print data receiver which receives print data encrypted with the public key;
a second printer position information acquisition which acquires second printer position information from the printer position information acquisition when the print data has been received;
a private key generator which generates a private key with a passphrase containing at least the second printer position information; and
a decrypter which decrypts the print data received by the print data receiver with the private key.
17. The printer according to claim 16 , further comprising:
a public key acquisition request receiver which receives a public key acquisition request from a print client; and
a public key transmitter which reads the public key stored in the public key storage and transmits the public key to the print client which has transmitted the public key acquisition request.
18. The printer according to claim 16 , further comprising:
an authentication information requester which requests authentication information of an operator; and
an authentication judgment section which, when authentication information has been inputted, judges whether the inputted authentication information coincides with registered authentication information and, when these two pieces of authentication information coincide, judges that the operator has proper authority.
19. The printer according to claim 18 , wherein even if a private key is generated when the public key generator generates the public key, the private key is abandoned.
20. The printer according to claim 19 , further comprising a selective print executor which executes a print operation based on the print data when the print data is decrypted with the private key and does not execute the print operation based on the print data when the print data is not decrypted with the private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/114,605 US20050200890A1 (en) | 2002-11-27 | 2005-04-25 | Printer and print system |
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002-343905 | 2002-11-27 | ||
JP2002343905 | 2002-11-27 | ||
JP2002343873 | 2002-11-27 | ||
JP2002-343873 | 2002-11-27 | ||
JP2003-300445 | 2003-08-25 | ||
JP2003-300458 | 2003-08-25 | ||
JP2003300458A JP4337474B2 (en) | 2002-11-27 | 2003-08-25 | Printer and printing system |
JP2003300445A JP4337473B2 (en) | 2002-11-27 | 2003-08-25 | Printer and printing system |
US10/722,693 US6901863B2 (en) | 2002-11-27 | 2003-11-24 | Printer and print system for executing a proper print operation only in a place registered in advance |
US11/114,605 US20050200890A1 (en) | 2002-11-27 | 2005-04-25 | Printer and print system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/722,693 Continuation US6901863B2 (en) | 2002-11-27 | 2003-11-24 | Printer and print system for executing a proper print operation only in a place registered in advance |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050200890A1 true US20050200890A1 (en) | 2005-09-15 |
Family
ID=32854409
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/722,693 Expired - Lifetime US6901863B2 (en) | 2002-11-27 | 2003-11-24 | Printer and print system for executing a proper print operation only in a place registered in advance |
US11/114,605 Abandoned US20050200890A1 (en) | 2002-11-27 | 2005-04-25 | Printer and print system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/722,693 Expired - Lifetime US6901863B2 (en) | 2002-11-27 | 2003-11-24 | Printer and print system for executing a proper print operation only in a place registered in advance |
Country Status (1)
Country | Link |
---|---|
US (2) | US6901863B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070220257A1 (en) * | 2006-03-06 | 2007-09-20 | Sandisk Il Ltd. | Controlled-Access Recording Generator |
US20090164804A1 (en) * | 2007-12-25 | 2009-06-25 | Sandisk Il Ltd. | Secured storage device |
US20090289944A1 (en) * | 2008-05-20 | 2009-11-26 | Konica Minolta Business Technologies, Inc. | Image processing apparatus, image outputting method, and image outputting program embodied on computer readable medium |
US20100239093A1 (en) * | 2009-03-23 | 2010-09-23 | Ikuya Hotta | Data Transfer System and Data Transfer Method |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3707407B2 (en) | 2001-08-28 | 2005-10-19 | セイコーエプソン株式会社 | Projector that projects password |
US7293071B2 (en) * | 2002-05-27 | 2007-11-06 | Seiko Epson Corporation | Image data transmission system, process and program, image data output device and image display device |
US7296157B2 (en) * | 2002-07-10 | 2007-11-13 | Electronics For Imaging, Inc. | Methods and apparatus for secure document printing |
CN100361823C (en) * | 2002-08-30 | 2008-01-16 | 精工爱普生株式会社 | Printer and print system, data receiving device and data sending/receiving system |
US6901863B2 (en) * | 2002-11-27 | 2005-06-07 | Seiko Epson Corporation | Printer and print system for executing a proper print operation only in a place registered in advance |
JP2004287160A (en) | 2003-03-24 | 2004-10-14 | Seiko Epson Corp | Image display system, projector, image display method, projector control method, image display program, and projector control program |
JP2005208823A (en) | 2004-01-21 | 2005-08-04 | Seiko Epson Corp | Network system for projector |
KR100619022B1 (en) * | 2004-05-25 | 2006-08-31 | 삼성전자주식회사 | System and method for printing document having security function |
JP4845398B2 (en) * | 2005-03-18 | 2011-12-28 | キヤノン株式会社 | Image processing apparatus and control method executed by image processing apparatus |
JP4716319B2 (en) * | 2005-10-04 | 2011-07-06 | 京セラミタ株式会社 | Image forming system and setting value changing program |
JP5040341B2 (en) * | 2006-04-04 | 2012-10-03 | セイコーエプソン株式会社 | Projector system |
EP3284182B1 (en) * | 2015-04-14 | 2020-11-04 | Capital One Services, LLC | Automated bluetooth pairing |
EP3144798B1 (en) * | 2015-09-18 | 2020-12-16 | Canon Kabushiki Kaisha | Image processing apparatus, method of controlling the same, and storage medium |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020146132A1 (en) * | 2001-04-05 | 2002-10-10 | General Instrument Corporation | System for seamlessly updating service keys with automatic recovery |
US20020154332A1 (en) * | 2001-02-20 | 2002-10-24 | Masayuki Inai | Printing system, printer client and service server system |
US20040075860A1 (en) * | 2002-06-17 | 2004-04-22 | Toshihiro Shima | Printer, print system, and print client, and data receiving device, data transmitting and receiving system, and data transmitting device |
US20040107344A1 (en) * | 2001-05-14 | 2004-06-03 | Atsushi Minemura | Electronic device control apparatus |
US6901863B2 (en) * | 2002-11-27 | 2005-06-07 | Seiko Epson Corporation | Printer and print system for executing a proper print operation only in a place registered in advance |
US20050149755A1 (en) * | 2003-10-23 | 2005-07-07 | Toshihiro Shima | Printer and print system |
US20050152543A1 (en) * | 2003-11-04 | 2005-07-14 | Toshihiro Shima | Printer and print system |
US20050163549A1 (en) * | 2002-08-30 | 2005-07-28 | Toshihiro Shima | Printer and print system, and data receiving device and data transmitting and receiving system |
US7124094B1 (en) * | 1999-10-27 | 2006-10-17 | Konica Corporation | Print system, service system, data server, master server, print client system and printer |
US7324233B2 (en) * | 2002-06-17 | 2008-01-29 | Seiko Epson Corporation | Print system and data transmitting and receiving system |
US20080034098A1 (en) * | 2001-10-02 | 2008-02-07 | Seiko Epson Corporation | Communication mediating apparatus for mediating communication over network |
US7336384B2 (en) * | 2002-09-04 | 2008-02-26 | Seiko Epson Corporation | Printer, print client, and print system |
US7352865B2 (en) * | 2002-06-17 | 2008-04-01 | Seiko Epson Corporation | Printer server and print system and data receiving device and data sending/receiving system |
US7369259B2 (en) * | 2002-06-21 | 2008-05-06 | Seiko Epson Corporation | Printer and print system, and data receiving device and data transmitting and receiving system |
US7382882B1 (en) * | 1998-07-03 | 2008-06-03 | Nokia Corporation | Secure session set up based on the wireless application protocol |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3451929B2 (en) | 1998-05-14 | 2003-09-29 | セイコーエプソン株式会社 | Encryption server and communication method using the encryption server |
US6681214B1 (en) * | 1999-06-29 | 2004-01-20 | Assure Systems, Inc. | Secure system for printing authenticating digital signatures |
US6952780B2 (en) * | 2000-01-28 | 2005-10-04 | Safecom A/S | System and method for ensuring secure transfer of a document from a client of a network to a printer |
US20030044009A1 (en) * | 2001-08-31 | 2003-03-06 | Sridhar Dathathraya | System and method for secure communications with network printers |
US6772945B2 (en) * | 2001-10-09 | 2004-08-10 | Hewlett-Packard Development Company, L.P. | Printed card to control printer |
-
2003
- 2003-11-24 US US10/722,693 patent/US6901863B2/en not_active Expired - Lifetime
-
2005
- 2005-04-25 US US11/114,605 patent/US20050200890A1/en not_active Abandoned
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7382882B1 (en) * | 1998-07-03 | 2008-06-03 | Nokia Corporation | Secure session set up based on the wireless application protocol |
US7124094B1 (en) * | 1999-10-27 | 2006-10-17 | Konica Corporation | Print system, service system, data server, master server, print client system and printer |
US20020154332A1 (en) * | 2001-02-20 | 2002-10-24 | Masayuki Inai | Printing system, printer client and service server system |
US20020146132A1 (en) * | 2001-04-05 | 2002-10-10 | General Instrument Corporation | System for seamlessly updating service keys with automatic recovery |
US20040107344A1 (en) * | 2001-05-14 | 2004-06-03 | Atsushi Minemura | Electronic device control apparatus |
US20080034098A1 (en) * | 2001-10-02 | 2008-02-07 | Seiko Epson Corporation | Communication mediating apparatus for mediating communication over network |
US7324233B2 (en) * | 2002-06-17 | 2008-01-29 | Seiko Epson Corporation | Print system and data transmitting and receiving system |
US7352865B2 (en) * | 2002-06-17 | 2008-04-01 | Seiko Epson Corporation | Printer server and print system and data receiving device and data sending/receiving system |
US20040075860A1 (en) * | 2002-06-17 | 2004-04-22 | Toshihiro Shima | Printer, print system, and print client, and data receiving device, data transmitting and receiving system, and data transmitting device |
US7369259B2 (en) * | 2002-06-21 | 2008-05-06 | Seiko Epson Corporation | Printer and print system, and data receiving device and data transmitting and receiving system |
US20050163549A1 (en) * | 2002-08-30 | 2005-07-28 | Toshihiro Shima | Printer and print system, and data receiving device and data transmitting and receiving system |
US7336384B2 (en) * | 2002-09-04 | 2008-02-26 | Seiko Epson Corporation | Printer, print client, and print system |
US6901863B2 (en) * | 2002-11-27 | 2005-06-07 | Seiko Epson Corporation | Printer and print system for executing a proper print operation only in a place registered in advance |
US20050149755A1 (en) * | 2003-10-23 | 2005-07-07 | Toshihiro Shima | Printer and print system |
US20050152543A1 (en) * | 2003-11-04 | 2005-07-14 | Toshihiro Shima | Printer and print system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070220257A1 (en) * | 2006-03-06 | 2007-09-20 | Sandisk Il Ltd. | Controlled-Access Recording Generator |
US20090164804A1 (en) * | 2007-12-25 | 2009-06-25 | Sandisk Il Ltd. | Secured storage device |
US20090289944A1 (en) * | 2008-05-20 | 2009-11-26 | Konica Minolta Business Technologies, Inc. | Image processing apparatus, image outputting method, and image outputting program embodied on computer readable medium |
US8185474B2 (en) * | 2008-05-20 | 2012-05-22 | Konica Minolta Business Technologies, Inc. | Image processing apparatus, image outputting method, and image outputting program embodied on computer readable medium |
US20100239093A1 (en) * | 2009-03-23 | 2010-09-23 | Ikuya Hotta | Data Transfer System and Data Transfer Method |
Also Published As
Publication number | Publication date |
---|---|
US6901863B2 (en) | 2005-06-07 |
US20040161277A1 (en) | 2004-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050200890A1 (en) | Printer and print system | |
US7552324B2 (en) | Printer and print system, and data receiving device and data transmitting and receiving system | |
US7506159B2 (en) | Printer and print system | |
US7324233B2 (en) | Print system and data transmitting and receiving system | |
US7352865B2 (en) | Printer server and print system and data receiving device and data sending/receiving system | |
US7646874B2 (en) | Establishing mutual authentication and secure channels in devices without previous credentials | |
US7382487B2 (en) | Printing system and method restricting functions of printers, usable by each user | |
US20070283170A1 (en) | System and method for secure inter-process data communication | |
US20100023781A1 (en) | Data processing apparatus, data storage device, and data processing method therefor | |
US20050152543A1 (en) | Printer and print system | |
US7336384B2 (en) | Printer, print client, and print system | |
JP2007257527A (en) | Printing system and control method | |
US7369259B2 (en) | Printer and print system, and data receiving device and data transmitting and receiving system | |
US7574498B2 (en) | Device identification information managing system and method for communicably connecting between a network device and a device managing terminal unit that manages the network device | |
JP2006139490A (en) | Print processing system and print processing method, information processing device and information processing method, print server device, print processing method, and program | |
JP4395832B2 (en) | Printer, print client and printing system | |
JP4337474B2 (en) | Printer and printing system | |
JP2005348250A (en) | Image forming device, data encipher method, program, and recording medium | |
JP4345056B2 (en) | Printer and printing system | |
JP4370564B2 (en) | Printer, printing system, and encrypted data processing system based on position information | |
JP4400180B2 (en) | Printer and printing system | |
JP4337473B2 (en) | Printer and printing system | |
JP4269749B2 (en) | Printer and printing system | |
JP4232510B2 (en) | Printer and printing system | |
JP4168394B2 (en) | Printer and printing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |