+

WO2009046336A2 - Procédés et systèmes d'impression mobile - Google Patents

Procédés et systèmes d'impression mobile Download PDF

Info

Publication number
WO2009046336A2
WO2009046336A2 PCT/US2008/078801 US2008078801W WO2009046336A2 WO 2009046336 A2 WO2009046336 A2 WO 2009046336A2 US 2008078801 W US2008078801 W US 2008078801W WO 2009046336 A2 WO2009046336 A2 WO 2009046336A2
Authority
WO
WIPO (PCT)
Prior art keywords
server
communications device
printer
data
portable communications
Prior art date
Application number
PCT/US2008/078801
Other languages
English (en)
Other versions
WO2009046336A3 (fr
Inventor
Jeffrey Warren Walker
Mark J. Thirman
Peter K. Fichter
Samuel H. Liggero
Original Assignee
Airprint Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/868,280 external-priority patent/US20080084578A1/en
Priority claimed from US11/868,277 external-priority patent/US20080320296A1/en
Priority claimed from US11/868,279 external-priority patent/US20090000969A1/en
Application filed by Airprint Networks, Inc. filed Critical Airprint Networks, Inc.
Publication of WO2009046336A2 publication Critical patent/WO2009046336A2/fr
Publication of WO2009046336A3 publication Critical patent/WO2009046336A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Definitions

  • the invention pertains to telecommunications and remote data memorialization. More particularly, it pertains to methods and apparatus for the provision of telecommunications subscriber services and remote printing.
  • An object of this invention is to provide methods and apparatus for telecommunications service provision data memorialization.
  • a more particular object is to provide such methods and apparatus for the provision of telecommunications subscriber services.
  • a further object is to provide such methods and apparatus as permit the permanent (or semi-permanent) memorialization of output from portable communications devices, such as cellular phones and PDAs.
  • a still further object of the invention is to provide such methods and apparatus as can be implemented on top of a variety of telecommunications networks and/or with a variety of portable communications devices.
  • a still yet further object of the invention is to provide such methods and apparatus as can be implemented at low cost.
  • the invention provides, among other aspects, methods and apparatus for telecommunications and/or network subscriber services and printing that enable portable communication device users (or “subscribers") to print data and transactional content remotely, e.g., without having to dock with a personal computer.
  • Still other related aspects of the invention provide such methods and apparatus which enable disparate content providers the ability to "lock” content into a format compatible with designated remote client application and printer interface applications.
  • Yet other related aspects of the invention provide such methods and apparatus which include content management capabilities that allow control of stored content by subscribers, including, by way of example, storing, printing, reporting, error reporting, and deleting such content.
  • the invention provides, in further aspects, systems and methods for transferring data over a telecommunications network to a remote device (such as a PDA or cellular phone), executing a commercial or other transaction on that device, providing secure and verifiable exchange of data over the network to the device, and printing that data on the device.
  • a remote device such as a PDA or cellular phone
  • Still other related aspects of the invention provide such methods in which data transfer over the network and/or to the remote device is made through a permanent connection (such as a cable or interface connector), a wireless connection (such as Bluetooth, IrDA, WiFi), or otherwise.
  • a permanent connection such as a cable or interface connector
  • a wireless connection such as Bluetooth, IrDA, WiFi
  • the invention provides such systems and methods in which data, once received by at the remote device, is converted from machine readable form to human readable form by the printer, resulting in a permanent paper record of the data to be used by the subscriber.
  • Still other aspects of the invention provide such systems and methods as described above in which such information recorded or generated by the remote device (such as images, voice recording, reports, etc.) and/or the printer are transferred via the remote device, over the telecommunications network, to a central location. That information is then manipulated to alter or enhance the data content and retransmitted (e.g., either automatically or on subscriber request) to the remote device for printing, as described above.
  • information recorded or generated by the remote device such as images, voice recording, reports, etc.
  • the printer are transferred via the remote device, over the telecommunications network, to a central location. That information is then manipulated to alter or enhance the data content and retransmitted (e.g., either automatically or on subscriber request) to the remote device for printing, as described above.
  • the system includes a mobile device (e.g., cell phone or PDA) that establishes secure communication connections with a mobile printer and with a server, e.g., using one or more encryption protocols such as SSL or TLS.
  • the mobile device transmits a request for data (e.g., movie ticket, web page, etc.) to the server via the secure connections.
  • the server obtains the requested data, encrypts it and transmits it to the printer over the secure connections and via the mobile device.
  • the printer decrypts and prints the data.
  • Still further aspects of the invention provide such systems for secure, remote printing, wherein the server encrypts the data with a session key generated by the printer and a private key associated the printer.
  • the printer decrypts the data with that same session key, and a private key associated with the printer.
  • the session key is transmitted from the printer to the mobile device, and from the mobile device to the server.
  • the server obtains the requested data from a source external to the server (e.g., from a content provider), and/or generates that data from content residing on the server, e.g., in a client mailbox.
  • a source external to the server e.g., from a content provider
  • Yet further aspects of the invention provide methods paralleling the operation of the systems described above.
  • the system includes a mobile device (e.g., cell phone or PDA) that establishes communication connections with a mobile printer and with a server.
  • the mobile device executes a monitor application that logs operational performance characteristics of the mobile device itself, the mobile printer, the server, and/or the communication connections.
  • monitor application uses the aforementioned performance characteristics in order to generate, and log, diag- nostic data identifying potential problems with any of the mobile device, printer, server, and/or communication connections.
  • monitor application transmits the aforementioned performance characteristics and/or diagnostics from the mobile device to the server, e.g., for further analysis and treatment by an administrator.
  • monitor application additionally logs print transactions executed by a user.
  • the monitor application displays to a system administrator (or others) a status of logged print transactions.
  • the status of a logged print transaction includes one or more values (such as, by way of non-limiting example, battery level and printer error codes, etc.) associated with any of a pending print transaction, completed print transaction, or a failed print transaction.
  • values such as, by way of non-limiting example, battery level and printer error codes, etc.
  • Yet further aspects of the invention provide methods paralleling the operation of the systems described above.
  • the media cartridge includes an enclosure having a substantially planar shape, wherein each of its length and width dimensions are greater than its height.
  • An opening is disposed along a width-wise edge (e.g., a "front” of the enclosure), and one or more regions are also disposed on opposing length-wise edges (e.g., a "left side” and a "right side” of the enclo- sure). The regions permit a user to exert a force on sheet media (e.g., paper) contained within the enclosure.
  • the regions disposed on opposing length-wise edges permit a user to see and/or grasp the sheet media.
  • the enclosure has a removable cover that is removed prior to insertion of the enclosure into a mobile printer.
  • the removable cover is disposed along the width-wise edge having the aforementioned opening, thereby covering that opening, and at least one of (i) protecting the media during transport and handling and (ii) preventing the media from falling out of the enclosure prior to insertion into the mobile printer.
  • the enclosure is fashioned for insertion into the mobile printer, which extracts the media through the opening disposed along the aforesaid opening.
  • Yet further aspects of the invention provide methods paralleling the operation of the media cartridge described above.
  • FIG. 1 depicts a system according to one practice of the invention.
  • Figure 2 depicts a system for user quality experience monitoring in a mobile printing system according to one practice of the invention
  • Figure 3A - D depict an operation flow for the embodiment depicted in Figure 2;
  • FIGS. 4A - 4D depict a media cartridge according to one practice of the invention.
  • Figure 5 outlines the lifecycle of a single page print in an embodiment of the invention.
  • Figure 1 depicts one embodiment of system according to the invention for provision of telecommunications subscriber services and remote printing. Descriptions of the components of the illustrated embodiment, and their interrelationships, follow. Those skilled in the art will appreciate that other embodiments may have few components or other components, in addition to or instead of those shown here, and that functionality and interrelationship of those components may vary from that described below. Moreover, it will be appreciated that components described below as “programs,” “application” or other software may, in other embodiments, be implemented in hardware and/or firmware and, conversely, that components described below as hardware may, in other embodiments, be partially (or, where applicable, fully) implemented in software and/or firmware.
  • one or more portable communications devices are in communication with one or more content providers over a communications network, which may be owned by a Carrier.
  • a server can also be introduced to interact with the various entities.
  • a printer 15 is provided as well, as discussed further below.
  • the mobile client 10 is a program that executes on a mobile platform such as a cellular phone. The user interacts with the program to access catalog information and print content. It is understood that a mobile client can be provided by an external source or can be loaded into the mobile platform. As well, a mobile client can be embodied on a mobile platform in a form other than an executable program (e.g., a mobile client can be embodied as firmware and/or hardware).
  • the server component 100 is a program that runs on a server computer 15 which is accessible from the Internet by the mobile client 10.
  • the server 100 interacts with the client 10 as well as Content Providers 20 and Carriers 30.
  • the server 100 of Figure 1 has a database component that is used to keep track of user accounts (e.g., the database can be housed in the HAL component 140).
  • the server 100 also has a system management interface 190 that allows an operator to manipulate and configure the server 100.
  • the server computer can also be embodied as two or more discrete processors working in conjunction, and/or can be accessible through other types of communications networks besides the Internet (e.g., direct telecommunications lines or other type of network).
  • a server can be embodied as hardware and/or firmware, or other embodiments as recognized by those of ordinary skill in the art.
  • the server of Figure 1 described herein is described with reference to several functional components. Servers consistent with embodiment of the invention can utilize any subset of these functional components, or add additional functional components.
  • particular subsets of functional components of a server can operate on one or more pieces of hardware and/or firmware, or can be embodied as one or more programs that run on one or more processors.
  • the content provider 20 is an entity which owns content which has inherent value which the user may wish to purchase. Content, for example, may include things like movie tickets, coupons, or other media that can be exchanged for goods, services, or other items of value.
  • the carrier 30 is an entity that owns the network on which the data connection between the mobile client and the server 100 use to communicate. In many cases, the carrier 30 may also own the mobile device that is leased to the user, such as a cellular phone or personal data assistant (PDA).
  • PDA personal data assistant
  • the mobile client 10 is an application that runs on the mobile device. This application is the system's interface to the user.
  • the mobile client 10 can perform any number of functions to facilitate communication with a server 100 and other entities, the system in Figure 1 presenting a particular set of functions. For example, when an item is deposited in the user's mailbox 110, the user is notified in a similar fashion to that of the receipt of voice mail.
  • the method of notification de- p ⁇ nds on the capability of the mobile device. Methods of notification can include things like a message waiting light and other indicating techniques known to those of ordinary skill in the art.
  • the mobile client 10 allows the user to browse and query available catalog items.
  • the user can initiate queries with the mobile client 10 such as: "What movie theaters are close to zip code 12345?"
  • the mobile client then gets back from the server 100 a list of catalog items and presents them to the user.
  • the mobile client 10 also allows the user to select items from the catalog listings to acquire.
  • the acquisition may take the form of a purchase of an item, such as a movie ticket, or a "free" item, such as a coupon.
  • the server may initiate a transaction on behalf of the user that includes transfer of funds.
  • the acquired item shall then be transferred to the client's mailbox 110 for later printing.
  • the mobile client 10 When the user chooses to print an item in the mailbox 110, the mobile client 10 initiates a connection to the server 100 to request the item. The item is then rendered and streamed through the mobile client 10 from the server 100 to the printer 15.
  • the mobile client 10 has access to a camera, the mobile client 10 has the ability to capture images from the camera.
  • the mobile client 10 also enables the user to annotate the picture with text, graphics and borders.
  • a user has completed the capture and annotation, he or she can choose to print the image or send it to another user 40 via multimedia messaging (MMS) or other messaging mechanisms, in which case the image appears in the mailbox 110 of that other user.
  • MMS multimedia messaging
  • the content rendering engine 120 is a portion of the server 100 that transforms content into a form suitable for printing by the user selected printer.
  • the rendering process takes into account several metrics when deciding how to optimally render the content.
  • the data bandwidth used to move data from the client 10 to the server 100 is considered when choosing rendering parameters.
  • the rendering engine 120 can trade off image quality for data size, and thus transmission speed, if required.
  • the color reproduction capabilities of the target printer 15 are also considered when rendering the content. If the printer 15 is a two color, black or white printer, and the content has color components, the rendering engine will dither the source image to suit the capabilities of the target printer 15.
  • the rendering engine 120 also takes into account the color space incompatibilities between the source content and the printer's color capabilities. If the source content has rich color and the printer 15 has limited color reproduction capabilities, the rendering engine 120 will do color mapping to optimize the printed image quality.
  • the parameter choices that the rendering engine 120 makes to scale content to fit the printer's form factor have a direct relationship to color reproduction and bandwidth.
  • the rendering engine 120 makes trade-offs between color and image quality with this bandwidth utilization in mind.
  • the rendering engine 120 can also render non-image content, such as text and graphics. If the source content is in HTML form with embedded images, for example, the rendering engine can render this content with the target printer in mind. To support additional formats, the rendering engine 120 uses a pluggable design which allows plug-ins that support new content formats.
  • the client proxy 130 is a component in the server architecture 100. This component is point of contact for the mobile client application 10. When the mobile client 10 initiates a connection back to the server 100, the client proxy 130 is the component in the server 100 that fields the connection. Client proxies can carry out a number of functionalities associated with the connection between a server and a mobile client, including the particular set of functionalities described herein with respect to Figure 1.
  • the server 100 wishes to notify the client of a message waiting in their mailbox 110, the server 100 does so by way of the client proxy 130.
  • the client proxy 130 will check to see if there are any messages waiting in the user's mailbox 110 when the mobile client 10 connects, and is connected with the server 100. If there are new messages, the client proxy 130 will notify the mobile client 10, which will in turn assert a message waiting indicator.
  • the content sent between the mobile client 10 and the client proxy 130 is compressed to conserve bandwidth.
  • the content is also encrypted for the transaction types that require the transmission of sensitive information.
  • the client proxy 130 will pass along annotated pictures from the mobile client 10 to the nucleus (HAL) 140, which will route the content to another user's mailbox 110 or to the MMS Agent 150, as required.
  • HAL nucleus
  • the HAL component 140 is responsible for maintaining the state of the system, through the use of a database.
  • the database is used to maintain information about the users, such as which particular mailbox is assigned to the user and what the user's fulfillment information is, in the event of content purchase.
  • the HAL component 140 arbitrates communication between the components. If captured photo content is sent from one user to another, for example, the HAL component 140 would handle the transaction.
  • the post office component 110 contains the mailboxes for the users of the system.
  • the post office 110 will initiate message waiting notification to users, by way of the client proxy 130, if the user's mobile client 10 is connected to the server 100.
  • Content Provider Asent
  • the content provider agent 160 is an adapter component that facilitates communication between the server 100 and partner content providers 20.
  • the agent 160 adapts catalog queries from the client proxy 130 to the given Content Provider's Business to Business (B2B) interface.
  • B2B Business to Business
  • This content provider agent 160 allows the content provider specific code to be isolated. As new content providers are added, this component 160 will implement the same interface presented to the rest of the server 100, but the implementation will be tailored to the specific content provider.
  • the content provider agent 160 presents an interface to the system of Figure 1 that allows catalog queries of the content provider 20. This interface allows the client proxy 130 to ask the content provider 20 for lists of catalog items that ultimately get passed back to the mobile client 10 and presented to the user.
  • the content provider agent 160 When the user wishes to acquire an item, the content provider agent 160 presents an interface that allows the execution of the transaction.
  • the catalog item is presented to the interface along with fulfillment information, if the fulfillment is required.
  • an object or list of objects are given to the agent 160 by the content provider 20. These objects represent the content that was acquired from the content provider 20, such as a movie ticket.
  • Metadata is carried with the object.
  • the metadata contains information that is the same for all objects from all content providers 20 and information that is specific to the content provider 20 involved in the given transaction (or to that given transaction itself). Examples of metadata that apply to all content providers 20 are things like the date and time that the object was brought into the system. An example of a content provider-specific (or transaction-specific) information is the expiration date of a coupon.
  • the system can accommodate this requirement. If the content provider 20 wishes to get notification of the state of an object to be "printed," the system can execute a rule that results in a notification. In some models, the content provider 20 may push content to the user, such as location based coupons.
  • the content provider agent 160 can asynchronously receive the content objects mentioned above through this asynchronous receive interface. The objects are then routed to the user's mailbox 110.
  • the provisioning interface 170 is used to create new and delete users.
  • the interface 170 is designed to be flexible enough to support the diverse provisioning requirements that the carriers 30 and content providers 20 may have.
  • the billing interface 170 is used to provide fulfillment for purchased items and usage fees, depending on the business model established with the carriers 30 and content providers 20.
  • the provisioning interface 170 also has the ability to provide usage statistics about individual users and groups of users.
  • the short message service/multimedia messaging (SMS/MMS) agent 150 is responsible for any messaging traffic into and out of the system. This component can field messages from external sources, such as content providers 20. This allows leverage of existing broadcast techniques for pushing content to the users. This interface also allows messages to be sent from the system on behalf of a user.
  • SMS/MMS short message service/multimedia messaging
  • the content finder agent 180 is a component that searches for content based on user preferences.
  • the user may set the agent 180 to look for coupons for coffee shops based on current GPS location.
  • the user may also sign up for coupons of brands or categories of items.
  • the agent 180 will occasionally search for content that meets the criteria.
  • the protocol used between the mobile client 10 and the client proxy 130 is required to be flexible to varying payload types, bandwidth friendly for low bandwidth applications, and secure.
  • the TCP/IP protocol shall be used at the outset.
  • Other transport protocols can be substituted as needed.
  • the data stream is compressed using a ZipStream encode/decode technique.
  • the data stream is also encrypted.
  • the content of the stream uses XML to contain the objects being passed between the mobile client 10 and the client proxy 130.
  • Non-text objects are encoded using MIME tags, similar to those used for e-mail enclosures.
  • Clearly other types of compression and/or encoding/decoding techniques can be substituted when suitable for accommodating the needs of client proxy 130 and mobile client 10 communication.
  • the printer 15 of the illustrated embodiment in Figure 1 utilizes multiple heating elements to cause a reaction in thermally activated media to produce a human readable image of data presented to the printer 15 from a portable communications device.
  • Various embodiments of the above printer are envisioned and presented in more detail below.
  • the printer is connected to a mobile device, such as a cellular phone, via an electrical terminal as well as suitable mechanical means, forming in effect a single instrument.
  • the electrical connector provides a path for transmission of data as well as two way communication controlling functions of the printer, and reporting printer status information to the cell phone, as well as a means for obtaining electrical power from the power source within the cellular phone.
  • the printer is configured with an easily exchanged module, e.g., a face plate, which could be configured to provide a custom electrically connected interface for a plurality of phones.
  • Operational information from the printer may be of value to the user; hence such information is made available to the cellular phone and may be interpreted and displayed by the cellular phone for the benefit of the user.
  • the printer when connected to the cellular phone consists of a number of integral parts, an element with a number of heating elements which respond to data input from the communications source to cause elements to energize.
  • a platen which forms the substrate for these elements, a roller which causes force to be exerted on the platen, a motor and gear elements which respond to an electrical impulse to enact rotation of the roller.
  • a mechanism which causes a single sheet of thermal sensitive or other media e.g., roll media, non-thermal media, etc.
  • a single sheet of thermal sensitive or other media e.g., roll media, non-thermal media, etc.
  • This media movement through the platen/roller interface causes media to be advanced, as the media advances electrical signals from the circuits within the printer, energize one or more heating elements in response to data provided by the cellular phone which cause a reaction resulting in a readable mark on the media.
  • the media is subsequently advanced a specified increment and the process is repeated, this process continues until the entire length of one media sheet has been transported through the platen/roller interface and has been energized to form a readable mark in response to the data transferred by the cellular phone.
  • the printer contains a door or opening accessible to the user for inserting one or multiple sheets of pre cut media into the printer for storage and subsequent printing as described above in response to commands from the cellular phone.
  • the media may be inserted individually, as a group (e.g., in a cassette, as discussed below), or otherwise.
  • the printer is also equipped with an exit slot which allows the media to emerge from the printer and be made available to the user in the form of a permanent record.
  • the printer also contains a number of mechanisms which report the status of media in the printer and to monitor a number of functions, including out of media condition, jammed media condition, and insufficient available power to initiate a complete print cycle. This later would prevent a condition were a print cycle was initiated but insufficient power existed to assure completion of the entire print cycle.
  • An algorithm is incorporated to make prior estimates of print cycle energy requirements.
  • the printer also includes an access so that malfunctions, such as paper jams, or service, such as cleaning the platen, can be accomplished by the user.
  • An alternate embodiment of the above printer provides for a separate power source, such as a battery as an integral component of the printer. This has the advantage of increasing the overall energy capacity of the system, allowing both the cellular phone and printer to operate on independent power sources.
  • the printer could be provided with a recharging means for its internal battery, could operate from a car charger and/or could be configured to share the recharging mechanism provided with the cellular phone, all by way of non-limiting example.
  • Yet another embodiment would include separate power sources for both the cellular phone and the printer, these power sources could be internally shared increasing the power available individually to either the cellular phone or printer to increase individual operational time.
  • Another embodiment of the printer retains the printer physically separate and unique from the cellular phone or other communications device, using wireless communications methods, such as Bluetooth, IrDA, WiFi or similar technology, to communicate data to the printer from the communications device and allow transfer of operational information to transmit between the communications device and printer as well as printer to communications device.
  • wireless communications methods such as Bluetooth, IrDA, WiFi or similar technology
  • Yet another embodiment of the printer is as part of a vehicular communications environment, where, for example, a printer as defined above could form a permanent component within a vehicle.
  • a communications device such as cellular phone or PDA could exchange data with the printer via electrical connector or alternately with a wireless method such as Bluetooth, IrDA, WiFi or similar technology.
  • the power source to operate the printer could be derived from the internal power source of the vehicle, extending the operational capability of the printer.
  • connection mechanism between the mobile client 10 and the printer 15 are increased when the content to be printed has intrinsic value. With normal printing operations, the user can simply try printing the item again. With items of value, the content's value is transferred to paper during to printing operation. If there is an error in this transfer operation and the content is unusable and the system thinks the operation was successful, the value is essentially lost.
  • a secure connection between the printer 15 and the server 100 can hinder an unintended party from recording the content that is being printed out and producing multiple copies of the item of value.
  • connection can be robust enough to guard against "man in the middle” attacks.
  • an entity is "sniffing" the data passing back and forth between the server 100 and the printer 15.
  • the protocol between the printer 15 and the server 100 is then reverse engineered.
  • the mobile client 10 is emulated and then provides the ability to print out multiple copies of the item of value.
  • connection between the printer 15 and the mobile client 10 can also have enhanced reliability. If data corruption in the transmission of the data between the mobile client 10 and the printer 15 occurs, the corruption must be detected and a retransmission requested. If the corruption is not detected, an artifact in the printed output may occur rendering the printed content useless.
  • the printer 15 can also have the ability to notify the mobile client 10 of the success or failure to render the item of value to paper. If the printer 15 encounters an error, the printer 15 can notify the mobile client 10 of the error. The mobile client 10 can then inform the user of the error and allow them to retry the printing operation. The mobile client 10 may also notify the server 100 of the error such that error statistics can be collected. The server 100 could notify the content provider 20, administrator and/or others of errors, if the content provider 20 wishes such error notification.
  • the printer 15 is advantageously very robust in its error detection. Errors such as paper jams, and low battery conditions can be detected and reported to the mobile client.
  • a protocol between the printing module and the server uses an encryption algorithm to ensure security.
  • This encryption algorithm provides security by guarding against "man in the middle” attacks as well as “record and playback” attacks.
  • Encryption algorithms include the variety of those utilized by those of ordinary skill in the art, and which are appropriate for use by a printing module and/or a portable communications device (e.g., algorithms which are overly complex to be used by the devices would not optimal).
  • Encryption of a printable file sent from a portable communications device to a printing module can be performed by the server or by the portable communications device.
  • the printing module can be adapted to decode the printable file before creating the printed media.
  • a printing module includes a processor and/or other appropriate mechanism in communication with a printer for performing one or more of the connection functions described herein.
  • the protocol between the portable communications device and printing module can include a header with the transferred printable file that contains a predetermined packet length value and checksum to ensure reliability. If the packet checksum, determined by the printing module upon transfer of the packet, does not match, the printing module returns a NACK signal which asks the portable communications device to retransmit the packet. When the packet is successfully processed, the printing module returns an ACK which acknowledges the packet.
  • the protocol can also support a final "printed successfully" message or "error X encountered” message back to the portable communications device. This message notifies the personal communications device of the final disposition of the printed content.
  • any one of the functions of this embodiment can be utilized separately in a system or combined with the encryption features previously described.
  • Figure 2 depicts another embodiment of the system according to the invention for monitoring quality of user experience for mobile client/server application.
  • the system oper- ates in the manner discussed above (e.g., as indicated by use of like element designations) as further modified in view of the discussion below.
  • the illustrated embodiment includes, among other things, a mobile device 5, a printer 15, a server 100, a communications link 20, and a LAN/WAN communications link 25, interconnected as shown.
  • the illustrated mobile device 5 comprises a cell phone that is generally configured and operated as described above.
  • illustrated cell phone 5 comprises inter alia a processor 11, memory 12, I/O port 13, and transceiver 14.
  • the mobile device 5 may comprise a cell phone of differing architecture, or comprise other types of portable, electronic devices (e.g., PDA or otherwise).
  • the I/O port 13 wirelessly transmits and receives data between the mobile device 5 and the printer 15 and, in the illustrated embodiment, comprises a wireless port that supports one or more wireless protocols (e.g., Bluetooth, WiFi, etc.). In other embodiments, the I/O port 13 may comprise a conventional wired port (e.g., USB, serial, Firewire, etc.) for communication between the mobile device 5 and the printer 15.
  • a wireless port that supports one or more wireless protocols (e.g., Bluetooth, WiFi, etc.).
  • the I/O port 13 may comprise a conventional wired port (e.g., USB, serial, Firewire, etc.) for communication between the mobile device 5 and the printer 15.
  • the transceiver 14 wirelessly transmits and receives data (encrypted or otherwise) between the mobile device 5 and server 100, although in other embodiments it may also transmit and receive data between the mobile device 5 and printer 15, as well (e.g., in addition to, or instead of, I/O port 13).
  • the illustrated printer 15, generally configured as described above, further comprises an I/O port 16, processor 17, decryption module 19, and RAM 20, as shown.
  • the I/O port 16 wirelessly transmits and receives data between the printer 15 and the mobile device 5 and, in the illustrated embodiment, comprises a wireless port that supports one or more wireless protocols (e.g., Bluetooth, WiFi, etc.). In other embodiments, the I/O port 16 may comprise a conventional wired port (e.g., USB, serial, Firewire, etc.) for communication between the printer 15 and the mobile device 5.
  • the illustrated server 100 generally configured as described above, further includes an encryption module 200.
  • the encryption module 200 is implemented in software, though, in other embodiments, the functionality of the encryption module 200 may be handled otherwise (e.g., in hardware, firmware, combinations of hardware and software, etc.).
  • the illustrated communications link 20 supports secure communication between the mobile device 5 and printer 15, e.g., using a Secure Sockets Layer protocol, Transport Layer Security protocol, or otherwise, and in the illustrated embodiment comprises a wireless connection (e.g., Bluetooth, WiFi, etc.) with 128-bit SSL encryption.
  • the link 20 may comprise a cable (e.g., USB, serial cable, Firewire, or otherwise) connected between the I/O port 13 and the I/O port 16.
  • the illustrated LAN/WAN communications link 25 supports secure communication between the mobile device 5 and server 100, e.g., using a Secure Sockets Layer protocol, Transport Layer Security protocol, or otherwise, and in the illustrated embodiment comprises a wireless (e.g., WiFi) internet connection with 128-bit SSL encryption. In other embodiments, however, the link 25 is a wired connection (e.g., USB, etc.) between the mobile device 5 and server 100, e.g., as discussed above.
  • a wireless connection e.g., USB, etc.
  • Illustrated application 10 comprises a mobile application executing on processor 11, generally configured as described above.
  • the application 10 includes a monitoring program (or “monitor") 6 that monitors and logs indicia of the user's experience with the system (e.g., network speeds, mobile device problems, etc.) and, more particularly, the user's experience in obtaining and printing content on printer 15.
  • monitoring program or "monitor”
  • illustrated monitor 6 includes a network diagnostic module 7, a hardware diagnostic module 8, and a data log 9, though in other embodiments monitor 6 may be configured otherwise.
  • monitor 6 is implemented as a software component of application 10 executing on the mobile device 5, in other embodiments it may be implemented otherwise (e.g., as a stand-alone application executing on the mobile device 5 or server 100, as a hardware module on the server 100, etc.).
  • Illustrated network diagnostic module 7 monitors network accesses by the mobile device 5 and it's components (e.g., application 10), e.g., particularly, in connection with re- quests for user interface pages (e.g., HTML pages) and content to be printed on printer 15, receipt of such content from server 100 (or otherwise), and transmission of that content to the printer 15 from mobile device 5.
  • the module 7 can monitor communications over connection 25 between the mobile device 5 and server 100; the connection 20 between the mobile device 5 and the printer 15; and a network of a wireless carrier (e.g., as described above) used by the mobile device 5, just to name a few.
  • a wireless carrier e.g., as described above
  • the module 7 generates data representing operational characteristics of the connections it monitors, as well as diagnostics representing analysis of that data. For example, the module 7 may determine through monitoring that transmission along all networks and other connections are at expected rates, though, responses from the server 100 are delayed. In such an example, module 7 generates data reflecting current transmission and response rates, as well as diagnostics data indicating responses from server 100 are unexpected delayed. Of course, the module 7 can generate corresponding data when all transmissions and responses up to par, as well.
  • the illustrated hardware diagnostic module 8 (which, in the illustrated embodiment, is implemented in software) monitors the mobile device 5, printer 15, and other hardware involved in the generation of requests for, receipt and transmission of, content for printing on printer 15.
  • the module 8 may monitor server 100, as well as other resources (e.g., external databases, etc.).
  • the module 8 generates data representing operational characteristics of the hardware and other resources it monitors, as well as diagnostics representing analysis of that data.
  • the module 8 may monitor the time required to download data from the server 100 to the printer 15, the time required to load user interface pages from the server to the application 10, and/or the printer battery level. If the module 8 determines that any of these values are sub-par, low or otherwise potentially problematic, it generates data reflecting one or more of the respective values (as well as of the other resources it monitors), as well as diagnostics data identifying it as a potential problem source. Of course, the module 8 can generate corresponding data when all monitored components are operating up to par, as well. Illustrated data log 9 comprises store for data and diagnostics generated by network diagnostic module 7 and the hardware diagnostic module 8.
  • Figure 2 generally operates as above, however it is also configured to permit secure, two-way transmission of data (e.g., image data or otherwise) between any of the mobile device 5, server 100, and printer 15. See Figure 2A.
  • data e.g., image data or otherwise
  • an application 10 user may want to print a movie ticket.
  • transferred data was vulnerable to hacking, e.g., man in the middle attacks that would allow hackers to print multiple movie tickets.
  • the illustrated embodiment securely transmits the data between each of the system components, as detailed below, thereby preventing such attacks.
  • the application 10 receives requests from users to print a file (e.g., a movie ticket, web page, text, or other data).
  • a file e.g., a movie ticket, web page, text, or other data.
  • the system relies on the encryption and decryption of transmitted data.
  • such encryption and decryption is primarily performed by the encryption module 200 of the server 100, and the decryption module 19 of the printer 15. In other embodiments, however, other aspects of the system may perform such functionality (e.g., functionality built into the processor 17, or otherwise).
  • a user may acquire data (or "items") for printing by, e.g., selecting data from a list received from the server 100 and displayed on the mobile device 5.
  • the server via the content provider agent 160, obtains the data from a content provider 20, and stores it, e.g., in the client mailbox 110.
  • the data may generated otherwise (e.g., by the server 100 itself).
  • a secure connection is created between the printer 15 and the server 100, over which the file is transmitted in encrypted form.
  • the secure connection of the illustrated embodiment uses an SSL protocol, but other embodiments may use other encryption protocols.
  • the illustrated embodiment establishes separate secure connections between the mobile device 5 and printer 15 and between the mobile device 5 and the server 100 (where the mobile device 5 serves as a proxy) , other embodiments may establish just a single secure connection between the printer and the server.
  • a secure connection is initiated, for example, by the application 10 sending a request, via the communications link 20, to the printer 15 using a public key encryption algorithm, such as SSL.
  • the encryption module 200 After the file is rendered by the engine 120, the encryption module 200 encrypts it. .
  • the data is encrypted with an encryption, or cipher, technique supported by the 128-bit SSL protocol, but those skilled in the art will appreciate that a variety of encryption techniques may be used, as well, provided they are supported by the protocol used by the communication links 20 and 25.
  • the embodiment described herein utilizes two SSL-encrypted connections (i.e., one from the printer 15 to the mobile device 10 and the other from the mobile device to the server 100), other embodiments may use just one SSL connection (e.g., one from the printer 15 to the server 100). Still other embodiments may use private-key encryption (e.g., based on DES, AES or other private-key encryption technologies) instead of public-key encryption.
  • a single private key-encrypted connection can be established, e.g., from the printer 15 to the server 100 (e.g., via links 20, 25); alternatively, two independent such connections can be established between the printer and mobile device, as well as between the mobile device and the server.
  • One such private key-encrypted embodiment (of the single-connection variety) is described in the Appendix hereto.
  • the server 100 transmits the encrypted, rendered file to the printer 15 via the application 10. More specifically, the encrypted file is sent to the application 10 from the server 100 over the internet connection 25. The application 10 then transmits the encrypted file to the printer 15 over the communications link 20. See Figure 2D. Thus, the phone application 10 effectively acts as a conduit between the server 100 and printer 15.
  • the processor 17 Upon delivery of the encrypted data to the printer 15, e.g., at I/O port 16, the processor 17 retrieves the file, and the decryption module 19 attempts to verify that the data is encrypted correctly. If the file was not encrypted correctly, then the file is rejected, and the connection is terminated. However, if the file is encrypted correctly, then the file is decrypted with the decryption module 19, whereupon the printer 15 prints the decrypted, ren- d ⁇ red image, e.g., movie ticket.
  • the printing mechanism of the illustrated embodiment is discussed above in detail.
  • the monitor 6 monitors the above operations, and reports information associated with those operations to users and/or system administrators, although, in other embodiments, it may report such information to a server, or other entity (e.g., developer, bug reporting database, etc).
  • a server or other entity
  • the monitor 6 may display a message to the user on the mobile device 5 informing him that a print-job (e.g., for a movie ticket) was completed.
  • the data is not printed successfully, e.g., the session keys do not match, then it may display a message to the user informing him that the print-job failed, and/or transmit that failure to a system administrator to address the problem.
  • the monitor 6 analyzes and logs performance characteristics of the hardware in the system (e.g., mobile device 5, printer IS, server 100, etc.), and the various communication connections and networks (e.g., connection 20, connection 25, a wireless carrier network, etc., as described above) associated with the mobile device 5.
  • the network diagnostic module 7 persistently monitors, and analyzes network performance characteristics, including print transactions, although, in other embodiments it may log or analyze such characteristics at specified intervals (e.g., manually, once an hour, once a day, etc.).
  • Such network performance characteristics can include, to name a few, the amount of time required to send a print request from the mobile device 5 to the server 100 over connection 25; a ping response time from the mobile device 5 to the sever 100; an average network response time of a wireless carrier (e.g., TMobile); or, a time required to load a page from the server 100 in the application 10; all by way of non-limiting example.
  • a wireless carrier e.g., TMobile
  • the hardware diagnostic module 8 operates in a similar manner to the module 7. In the illustrated embodiment, it persistently monitors and analyzes performance characteristics of the various hardware devices in the system (e.g., mobile device 5, printer 15, server 100, etc.), but in other embodiments it may monitor other devices, as well (e.g., external databases, etc.), and/or monitor the hardware at specified intervals (e.g., manually, once an hour, once a day, etc.). Such hardware performance characteristics can include, just to name a few, the utilization of the processors 11 and 17, and the throughput of the I/O devices 13 and 16.
  • modules 7 and 8 are monitoring the system hardware and networks, they respectively generate performance data representing performance characteristics of the monitored hardware and networks, and diagnostic data representing an analysis of such performance data (e.g., problems with the network and/or hardware).
  • diagnostic data can include, for example, that the internet connection 25 is transferring information at below average speeds.
  • the modules 7 and 8 store the operational performance and diagnostic data to the data log 9; although in other embodiments, they may store all or portions of that data elsewhere. Once the operational and diagnostic have been logged, that data is transmitted (or "reported"), e.g., via transceiver 14 over connection 25, to a system administrator, or other administrative entity, for further review.
  • the monitor 6 further has the ability to only log and report "problems", i.e., characteristics that are below standard, such as a slow network connection.
  • FIGS 4A - B depict a media cartridge 200 for use in a mobile printing system according to one practice of the invention.
  • the cartridge 200 includes an enclosure 210 and a cover 235, as described below.
  • the enclosure 210 provides a housing in which the media 230 is contained.
  • the enclosure 210 is comprised of a rigid material (e.g., plastic, cardboard, etc.), but in other embodiments it may comprise other materials (e.g., flexible materials, metal, paper, cardboard, or otherwise).
  • the illustrated enclosure 210 generally has a substantially planar shape, i.e., its length and width dimensions are greater than its height dimension. By way of non-limiting example, its dimensions may range from 4"x3"xl" up to 8"x6"4". Other embodiments, however, may have differing planar dimensions.
  • the illustrated enclosure 210 further includes an opening along one of its shorter (width-wise) edges 215, e.g., for inserting and extracting the media 230, and regions 225 and 226 disposed on its shorter (length-wise) edges 227 and 228.
  • the illustrated regions 225 and 226 permit a user to grip the cartridge 200 in such a manner so as to prevent the media 230 from falling out, e.g., during handling, loading and unloading of the cartridge 200.
  • the regions 225 and 226 com- prise gaps that permit a user to directly grasp the enclosure 210 and the media 230 contained therein, although in other embodiments, the regions may be located elsewhere on the enclosure, and/or be comprised otherwise (e.g., flexible membranes, etc.).
  • the illustrated enclosure 210 additionally includes designations instructing the user on proper methods of insertion into the mobile printer 15. Such instructions can include informing the user of which "side" of the enclosure should face up during insertion, and which edge (or "end") of the enclosure 210 should be inserted into the printer 15. In other embodiments, the enclosure 210 may include fewer or other such designations and/or instructions.
  • the illustrated media 230 comprises individual sheets of paper, or other media appropriate for mobile printing, and is substantially contained within the enclosure 210.
  • the media 230 is a stack of sheet paper, or other media, but in other embodiments it may be comprised otherwise.
  • each stack of media 230 may contain ten individual sheets of paper.
  • a portion e.g., 10%
  • a cover 235 is included to protect the media 230, e.g., from dust, dirt or other harmful materials.
  • other embodiments of the invention may fully contain the media 230 within the enclosure 210, e.g., thereby reducing a need for the cover 235.
  • the aforementioned cover 235 is removeably attached to the shorter (width-wise) edge 215 of the enclosure 210. In other embodiments, however, the cover 235 is not included. See Figure 4B.
  • the cover 235 is comprised of similar materials as the enclosure 210 (e.g., cardboard, plastic, paper, etc.), and secures the media 235 within the enclosure 210, e.g., during shipping of the cartridge 200 to retailers, etc.
  • the cover 235 is a single sheet a cardboard that is curved to surround the exposed media 230, and the edges of the cardboard are removably inserted into the opening discussed above. In operation, as discussed below, the cover 235 is removed prior to inserting the enclosure 210 into the printer 15.
  • Figure 4C and Figure 4D depict the media cartridge 200 in operation.
  • a user inserts a single cartridge 200 into the printer 15, although in other embodiments, multiple such cartridges 200 may be inserted (e.g., in high- capacity printers). If the cartridge 200 includes a cover 235, it is removed prior to insertion into the printer 15, e.g., by gripping the cover 235 and pulling away from the enclosure 210.
  • the printer 15 extracts individual sheets of media 230 from the enclosure 210 as required for a given print job (e.g., a request sent from the mobile device 5 or server 100 to print a movie ticket), although in other embodiments, the cartridge 200 itself may transfer the media 230 to the printer 15.
  • the printer 15 extracts the media 230 through the opening disposed along the width-wise edge 215, as described above. See Figure 4C and Figure 4D. Although those figures depict the top sheet of the media being removed from the cartridge first, in alternate embodiments, the bottom sheet of media is removed first. Further discussion of printer operations can be found above.
  • the printer 15 will alert a user in the event that an inserted cartridge 200 is empty and/or failing to properly dispense the media 230.
  • the printer 15 may flash a warning, and/or transmit a warning signal to the mobile device 5, e.g., via communications link 20, for display to the user.
  • a user can remove (or eject) the cartridge 210 and either attempt to fix the problem, or insert a new media cartridge in the manner discussed above.
  • the cartridge 200 may include a code indicating the type of media it contains, e.g., black-and-white paper, color paper, photographic-quality paper, and so forth. That code, which can be in the form of a bar or other optical code, a magnetic code, or otherwise, can be utilized by printer 15 in determining how to print on the media In related embodiments, such a code is placed on individual sheets of media.
  • This overview describes the AirPrint Networks rolling private key encryption algorithm.
  • This encryption algorithm is light weight, intended to be easily implemented in resource constrained devices, such as mobile printers.
  • This algorithm is designed specifically to guard against attacks to the AirPrint system where an intruder might attempt to print multiple copies of a valuable item, such as a movie or event ticket.
  • These attacks may include "man in the middle” attacks, where an attacker might record the data packets going over the communication medium, such as a wireless carrier network, and play those data packets back to the printer, in an attempt to print out an additional copy of the item.
  • the design of the algorithm is such that it has a small code footprint of IOOK bytes, or less.
  • the algorithm is symmetric, in that the same code can be used to encrypt and decrypt the data. In the AirPrint system, the same code resides in the printer and in the server components.
  • AirPrint must convey the algorithm and its operation to printer OEMs to embed into their printers. If the algorithm is complex, it might be difficult to implement and test. There might also be reliability issues when an algorithm is very complex, since it may be difficult to test under a variety of harsh operating environments.
  • the characteristics of the carrier data network were considered when designing the encryption technique. Reducing the round trip traffic between the printer and the server is important. There is a large latency on some networks when opening a connection and moving data. If there are multiple round trips between the printer and the server, the time to complete a transaction might be burdensome to the user.
  • the mobile client (PDA or cell phone), initiates a connection to the printer and opens a session. This session is open for a single printed page.
  • the printer generates a random SessionKey, which is valid only for one page of output. If the page is ultimately printed, or there is an error, the SessionKey is cleared and no longer valid.
  • the printer then uses the agreed-upon Private Key to encrypt the SessionKey.
  • This Private Key is built into the ROM on the printer and into the code that resides on the AirPrint server.
  • This encrypted SessionKey is then returned to the mobile device. Notice that only the encrypted SessionKey is passed over the open network and through the mobile client. Even if an attacker had access to the encrypted SessionKey, it would be of no use, unless they also had the Private Key to decrypt the SessionKey.
  • the mobile client then asks the server for a page to print and passes it the encrypted SessionKey as an argument.
  • the server then uses the Private Key to decrypt the encrypted SessionKey.
  • the result is the original random SessionKey that was generated by the printer.
  • the server then uses this SessionKey to encrypt the page. This page is then sent to the printer, streamed through the mobile client.
  • the printer attempts to decrypt the page using the original SessionKey that was generated as a result of the Open Session request. If the page is decrypted successfully, then the page is printed. If the page did not decrypt correctly, then an error is generated back to the mobile client. Regardless of success or failure, the SessionKey is cleared after the page and is no longer valid. To print a new page, a new session is created, along with a new SessionKey. What is claimed is:

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

L'invention concerne des systèmes et des procédés pour une impression à distance sécurisée comprenant un dispositif mobile (par exemple un téléphone cellulaire ou un assistant personnel) établissant une connexion de communication sécurisée avec une imprimante mobile et un serveur, une telle connexion utilisant un ou plusieurs protocoles de chiffrement (par exemple, SSL, TLS, etc.). Le serveur chiffre les données requises et les transmet à l'imprimante via la connexion sécurisée, puis l'imprimante déchiffre et imprime les données. Le dispositif mobile peut, selon d'autres aspects de l'invention, enregistrer une caractéristique de performance opérationnelle de l'imprimante, du serveur et/ou des connexions de communication situées entre eux. Une cartouche de support peut être prévue et comprend une enceinte de forme sensiblement plane, chacune de sa longueur et de sa largeur étant supérieure à sa hauteur. Une ouverture est disposée le long d'un bord dans le sens de la largeur (par exemple, un côté « avant » de l'enceinte) et une ou plusieurs régions sont également disposées sur les bords opposés dans le sens de la longueur (par exemple, un « côté gauche » et un « côté droit » de l'enceinte). Les régions permettent à un utilisateur de voir et/ou d'exercer une force sur un support en feuille (par exemple, le papier) contenu dans l'enceinte.
PCT/US2008/078801 2007-10-05 2008-10-03 Procédés et systèmes d'impression mobile WO2009046336A2 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US11/868,280 US20080084578A1 (en) 2004-12-07 2007-10-05 Quality of service methods and systems for mobile printing
US11/868,279 2007-10-05
US11/868,277 US20080320296A1 (en) 2004-12-07 2007-10-05 Methods and systems for secure remote mobile printing
US11/868,280 2007-10-05
US11/868,279 US20090000969A1 (en) 2004-12-07 2007-10-05 Media cartridge and method for mobile printing
US11/868,277 2007-10-05

Publications (2)

Publication Number Publication Date
WO2009046336A2 true WO2009046336A2 (fr) 2009-04-09
WO2009046336A3 WO2009046336A3 (fr) 2009-12-30

Family

ID=40526967

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/078801 WO2009046336A2 (fr) 2007-10-05 2008-10-03 Procédés et systèmes d'impression mobile

Country Status (1)

Country Link
WO (1) WO2009046336A2 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126134A (zh) * 2016-06-22 2016-11-16 宜春小马快印科技有限公司 智能打印方法及系统
CN109120667A (zh) * 2017-06-23 2019-01-01 佳能株式会社 图像形成设备及其控制方法
US11366914B2 (en) 2017-04-14 2022-06-21 Hewlett-Packard Development Company, L.P. Authenticating access of service of service entity to application of client device based on whether root certificate corresponding to application is installed in service entity

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4228261B2 (ja) * 2000-08-29 2009-02-25 カシオ計算機株式会社 後位装置、携帯通信端末および情報取得方法
JP3501223B2 (ja) * 2000-12-22 2004-03-02 日本電気株式会社 ネット内印刷システム・方法、及び、課金型ネット内印刷方法
US6922258B2 (en) * 2001-05-30 2005-07-26 Polaroid Corporation Method and apparatus for printing remote images using a mobile device and printer
US20030069915A1 (en) * 2001-10-09 2003-04-10 James Clough Method for authenticating mobile printer users
US7242492B2 (en) * 2002-01-25 2007-07-10 Hewlett-Packard Development Company, L.P. Proxied printing services
US20050035198A1 (en) * 2003-01-23 2005-02-17 Wilensky Craig A. Mobile wireless computer system including devices and methods related thereto
WO2005006732A1 (fr) * 2003-07-11 2005-01-20 Yoshiaki Takida Appareil de telecopie de la prochaine generation de type a terminal internet
US20060080423A1 (en) * 2004-06-07 2006-04-13 James Brewer System and method for a printer access point
EP1878208A2 (fr) * 2004-12-07 2008-01-16 Airprint Networks, Inc. Service d'abonne et micro-imprimante pour impression mobile a distance

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126134A (zh) * 2016-06-22 2016-11-16 宜春小马快印科技有限公司 智能打印方法及系统
CN106126134B (zh) * 2016-06-22 2020-07-21 宜春小马快印科技有限公司 智能打印方法及系统
US11366914B2 (en) 2017-04-14 2022-06-21 Hewlett-Packard Development Company, L.P. Authenticating access of service of service entity to application of client device based on whether root certificate corresponding to application is installed in service entity
CN109120667A (zh) * 2017-06-23 2019-01-01 佳能株式会社 图像形成设备及其控制方法
CN109120667B (zh) * 2017-06-23 2022-04-12 佳能株式会社 图像形成设备及其控制方法

Also Published As

Publication number Publication date
WO2009046336A3 (fr) 2009-12-30

Similar Documents

Publication Publication Date Title
US20080084578A1 (en) Quality of service methods and systems for mobile printing
US20090000969A1 (en) Media cartridge and method for mobile printing
US20080320296A1 (en) Methods and systems for secure remote mobile printing
US9912516B2 (en) Method and apparatus for data file transfer using destination linked directories
US7349543B2 (en) Secure foreign enterprise printing
US20030044009A1 (en) System and method for secure communications with network printers
CN110324351B (zh) 一种网络协同制造中信息互联的系统及方法
US20060164676A1 (en) Subscriber service and micro-printer for remote, mobile printing
WO2009046336A2 (fr) Procédés et systèmes d'impression mobile
CN101247222A (zh) 打印管理装置及打印管理方法
US20020119804A1 (en) Method and apparatus for supplying email information remotely via a mobile device
CN101167302B (zh) 无线设备和应用网关之间的安全消息传送的系统及方法
US7826076B2 (en) System and method for providing secure value-added document network services
CN110490542A (zh) 签章文件生成方法、签章文件传输方法和系统
US20040165723A1 (en) Image processing apparatus, image processing system, and image information transmission method
US6970847B1 (en) Business method for secure document folder distribution
EP1244268A2 (fr) Dispositif et procédé d'application d'information à travers un Firewall
EP1249774B1 (fr) Méthode et système pour exécuter à distance la provision d'information via un dispositif de communication mobile
CN100380360C (zh) 扩印申请处理方法和系统以及程序
JP2007215087A (ja) 拠点監視装置、情報処理装置、画像形成装置監視システム、拠点監視方法、情報処理方法および記憶媒体
TW522686B (en) Method and apparatus for supplying email information remotely via a mobile device
WO2006126579A1 (fr) Systeme et procede de transmission de donnees d’image et terminaux constituant les elements d’emission/reception du systeme
FR3087562A1 (fr) Procede de transmission et conservation de factures ou de tickets de caisse et boitier pour le mettre en oeuvre
EP2202954A2 (fr) Procédé de sécurisation d'un envoi de facsimile et dispositif associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08835278

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08835278

Country of ref document: EP

Kind code of ref document: A2

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载