Abstract: In today's scenario, most of organization use document processing devices like printers, scanner and fax machines etc., on network. Many confidential and important data and documents are handling by these devices. This may cause document theft or snooping. The miss use and loss of sensitive data may damage the reputation of organization or any employee. Such kind of loss may lead to crime or fraud also. That’s why need of Security should be apply on such equipments. Printing security prevent user from document theft. Most of printer manufacturing companies provide security solutions but 90% people are not aware about security solutions. This unawareness causes the leakage of confidential data. This research highlights the better printing security solutions and makes people aware about that solution. Through these security solution, printing of Secure data will be improve and protect sensitive data. In this security solution, security will be done through password protection. When user will print document, User will get option for security of data. If user chooses security of data then user has to enter user name with password. At the printer side, job will be held on printer till the user unlocks the document through password. With this technique user will not only be aware about security solutions but also user will secure data.
This invention relates to a method for printing document securely on shared resources. It has
following advantages:
Increase information security
Reduce uses of false document
Improve the confidentiality of the document
Increase integrity of the document
Decrease recruitment scam
Decrease bank fraud
Improve economic growth of country
BACKGROUND OF THE INVENTION:
Existing system is that whenever users printing the document, it prints the document without
permission from printer side. While printer is costly and that is why it is used as sharing basis in
office as well as cybercafé. There is too much time to still the document and makes its copies
without permission. So, it is very difficult to provide the information security using CIA model.
Due to this reason number of scams increasing day by day in recruitment system, banking system
and education system also.
Click the Microsoft Office button.
Select Print
Print. The Print dialog box appears.
Select the pages you want to print—either all pages or a range of pages.
Select the number of copies.
Check the Collate box if you are printing multiple copies of a multi-page document.
Select a printer from the drop-down list.
Click OK.
2017 T.Bozhkova et al., suggest the research are described various ways to protect secure
documents, lables and packages, and the different security printing techniques applied today and
the way they will evolve in future. Security end products constitute a wide variety of different
types of documents, packages, labels and cards. The degree to which these need protection from
counterfeiters, forgers and terrorists depends upon how deleterious their illegal procurement and
misuse is to human welfare and financial stability.
M. Yıldırım et all , Suggest a new user-friendly guideline approach to password creation, including
persuasive messages that motivate and influence users to select more secure and memorable text
passwords without overburdening their memory. From a broad understanding of human factorscaused security problems, we offer a reliable solution by encouraging users to create their own
formula to compose passwords. A study has been conducted to evaluate the efficiency of the
proposed password guidelines.
Iskren Spiridonov et all security printer has today is the ability to produce security documents on
nontraditional, nonporous substrates such as plastic and polymer - biaxially oriented
polypropylene. Due to this complexity in its chemical structure documents and banknotes have a
greater abrasion resistance and lower rate of tampering. Our research will aim not only to configure
well known methods of security printing arts, but as well get a deeper view of what is coming up
next and how for example could the RFID marks become an affordable and reliable security
features of our future production.
Shrawan Kumar Sharma et all suggest the use of shared network environment becomes more
common. Due to rapid popularization of such environment, the risk of documents fallings into the
wrong hands is heightened. The proposed print security strategy provides the solution to secure
documents from the unauthorized access and misuse. The proposed approach will be used to
minimize the potential data loss through theft and to make the people awareness of printing threats.
As a resultant we will get that instead of 9%, 90% people will be aware of secure printing strategy
and will use the secure printing.
Luis Bengochea et all, Suggest Using a system such as the one described in this work, a nomadic
employee who fulfils part of his job moved into other companies' offices and needs to obtain a
printed copy of any confidential document relating his company, can make use of a portable device
and a VPN connection in order to locate the document and request a temporal key for accessing
through the Internet a ciphered copy of it. In any multifunction printer, with J2ME support,
available at the office where is located, he can install a small program which function is request,
print and erase the document from the printer's memory in a way that grants that such document
cannot end in the hands of any person without the appropriate authorization, neither accidentally or
spitefully.
Aravind K. Mikkilineni et all , The goals of our work are to securely print and trace documents on
low cost consumer printers such as inkjet and electro photographic (laser) printers. We will
accomplish this through the use of intrinsic and extrinsic features obtained from modeling the
printing process. Specically we show that the banding artifact in the EP print process can be
viewed as an intrinsic feature of the printer used to identify both the model and make of the device.
OBJECTS OF THE INVENTION:
Most of time the user print a confidential document without and security in a network shared
resource printer like in office and an educational institute. The main objective of this innovation to
provide a secure document printing on a network based shared resource. For using this technique
the user can print a safe and secure confidential document with password protection. Also the user
stops the misuse of documentation in used by other people.
SUMMARY OF THE INVENTION
The most important part of the present era organization is the data and information. The data and
information must be secure to save their client. General public does not know its importance and
they do not have their own resources to print. Whenever they share it for their own purpose even,
they do not sign above the data and information with their purpose, while they sign on blank
spaces. So, their documents can be easily copied and can be used for others to fulfill the eligibility
criteria of requirement or loan or admission in any organization.
The existing system of printing the document is not secure especially when printer is a shared
resource. The presented method of printing the document is secure and very user friendly because
whenever users printing their documents it asks them whether document is confidential or not. If
document is confidential then it makes it password protected for the printer devices else printer
prints the document directly. In this manner basic rules of information security can be followed and
also forgery of documents can be decreased to stop the UP scam in requirement of teachers.
BRIEF DESCRIPTION OF THE DIAGRAM
Figure: 1 a Flow Chart of Secure Printing
Figure: 2 a Graphical Representation of Secure printing Techniques
Figure: 3 a Steps of secure print in software
DETAILED DESCRIPTION OF THE INVENTION:
Document printing is a process to covert a softcopy material into a hardcopy or document paper
format. Printer is a most important device to complete this process (softcopy to hard copy) in
computing system. In the present era the printing is use all the fields like offices, education system,
government department, healthcare system industry etc., without any security or any privacy. We
know each and every document is important but no one understand this and use this printing
method.
In present time the people are print document mostly used Microsoft office.
For classical technique of printing is not secure so that we implement a new method of printing for
add on the classical methods.
Secure print techniques Steps
1. Click on the file menu (Figure 1)
2. Select Print on file menu (Figure 2)
3. A dialog box will be open and it will ask user to secure print (Figure 3)
4. Choose yes or no from dialog box.
5. If YES is selected.
6. A password box will be available (Figure 4)
7. Enter pin number in the box provided. Click OK (Figure 5)
8. If NO is selected.
9. Properties window will be open. Click Ok (Figure 6)
Figure 1 The file menu.
Figure 2 Print on file menu
Figure 3 Massage box will ask user to secure print
Figure 4 A user name and password box for secure
Figure 5 Enter user name and password for secure print in the massage box
Figure 6 Input same user id passwords and take print.
We Claims
We claim that,
The proposed method is capable of:
A method for printing the document securely using shared resources by adding additional
steps
a. Printing document based on users’ name and password authentication process if
document is confidential
b. Printing document without protection if document is not confidential
| # | Name | Date |
|---|---|---|
| 1 | 202111009357-ENDORSEMENT BY INVENTORS [15-10-2024(online)].pdf | 2024-10-15 |
| 1 | 202111009357-REQUEST FOR EXAMINATION (FORM-18) [05-03-2021(online)].pdf | 2021-03-05 |
| 2 | 202111009357-REQUEST FOR EARLY PUBLICATION(FORM-9) [05-03-2021(online)].pdf | 2021-03-05 |
| 2 | 202111009357-FORM 3 [15-10-2024(online)].pdf | 2024-10-15 |
| 3 | 202111009357-FORM-9 [05-03-2021(online)].pdf | 2021-03-05 |
| 3 | 202111009357-FORM-5 [15-10-2024(online)].pdf | 2024-10-15 |
| 4 | 202111009357-Written Statement and Evidence [30-07-2022(online)].pdf | 2022-07-30 |
| 4 | 202111009357-FORM 18 [05-03-2021(online)].pdf | 2021-03-05 |
| 5 | 202111009357-FER.pdf | 2022-01-31 |
| 5 | 202111009357-FORM 1 [05-03-2021(online)].pdf | 2021-03-05 |
| 6 | 202111009357-COMPLETE SPECIFICATION [05-03-2021(online)].pdf | 2021-03-05 |
| 6 | 202111009357-DRAWINGS [05-03-2021(online)].pdf | 2021-03-05 |
| 7 | 202111009357-COMPLETE SPECIFICATION [05-03-2021(online)].pdf | 2021-03-05 |
| 7 | 202111009357-DRAWINGS [05-03-2021(online)].pdf | 2021-03-05 |
| 8 | 202111009357-FER.pdf | 2022-01-31 |
| 8 | 202111009357-FORM 1 [05-03-2021(online)].pdf | 2021-03-05 |
| 9 | 202111009357-FORM 18 [05-03-2021(online)].pdf | 2021-03-05 |
| 9 | 202111009357-Written Statement and Evidence [30-07-2022(online)].pdf | 2022-07-30 |
| 10 | 202111009357-FORM-9 [05-03-2021(online)].pdf | 2021-03-05 |
| 10 | 202111009357-FORM-5 [15-10-2024(online)].pdf | 2024-10-15 |
| 11 | 202111009357-REQUEST FOR EARLY PUBLICATION(FORM-9) [05-03-2021(online)].pdf | 2021-03-05 |
| 11 | 202111009357-FORM 3 [15-10-2024(online)].pdf | 2024-10-15 |
| 12 | 202111009357-REQUEST FOR EXAMINATION (FORM-18) [05-03-2021(online)].pdf | 2021-03-05 |
| 12 | 202111009357-ENDORSEMENT BY INVENTORS [15-10-2024(online)].pdf | 2024-10-15 |
| 1 | 202111009357searchE_06-01-2022.pdf |