Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data safety printing control method based on virtual printer technology

A virtual printer and data security technology, applied in computer security devices, digital data protection, electrical digital data processing, etc., can solve the problems of no interlock security mechanism, data leaks, and the inability to monitor or monitor the printing process. Printing information and data monitoring are vulnerable to illegal attacks and the effect of improving security control performance

Inactive Publication Date: 2017-06-06
周利平
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The name is "a method and system for printing monitoring". At present, the printing control system relies too much on Windows applications, and there is no interlocking security mechanism with the printing driver layer, that is, it does not participate in the middle printing process control, even if the background monitoring program intercepts illegal printing. operation, the printing work can only be forcibly terminated after the printing event occurs, and the monitoring or monitoring of the printing process cannot be realized, which may easily cause data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The invention adopts the underlying development technology of the operating system kernel, and realizes the safe printing control of any format file output under the idea of ​​print buffer pool monitoring, print buffer pool file analysis, print buffer pool file conversion, and print buffer pool file control. During specific implementation, technicians can set a custom print file storage format according to specific needs, and a custom encryption algorithm can be used in the process of printing files, which can greatly enhance the flexibility and security of the system.

[0018] The security printing platform adopts the system kernel driver layer development technology, which is the security printing monitoring mechanism diagram of the present invention. The security printing monitoring driver is embedded in the system kernel layer to ensure that any printing work that responds to the operating system must first pass through the security printing monitoring driver. Only a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data safety printing control method based on a virtual printer technology. The method comprises the following steps of (1), by the adoption of the virtual printer technology, monitoring a printing pool list in real time, realizing the monitoring of a printing task initiated by a virtual printer, and capturing a printing pool document generated by the printing task; (2), analyzing the obtained printing pool document; (3), carrying out the conversion of a user-defined document format on the analyzed printing pool document; and (4), controlling the document in the printing pool and starting the actual printing operation. According to the method, during a printing process, if any of the steps is subjected to illegal attacks, data cannot be printed, and the data leakage can be prevented. Therefore, by the adoption of the method, the safety control performance of printing is greatly improved, and the problems that information can be printed from an application layer and the data monitoring is easily subjected to illegal attacks are further solved.

Description

technical field [0001] The present invention relates to the fields of computer software system, geographic information system (GIS), computer aided design (CAD), computer cartography (CAC), information security, printing security, etc., and particularly relates to a method for secure printing control of a printer. Background technique [0002] At present, in the field of traditional printing security control technology, the printing data flow information is mainly monitored from the system application layer. [0003] However, the print monitoring module is only responsible for monitoring and does not participate in any printing control process. Traditional printing security control cannot ensure that data is always under security protection throughout the entire life cycle. [0004] In order to solve the above problems, a new method is needed, which can realize the [0005] The real-time monitoring method of printing tasks irrelevant to brand, model, and connection mode, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/608
Inventor 周利平
Owner 周利平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products