System, method and article of manufacture for transition state-based cryptography
    3.
    发明公开
    System, method and article of manufacture for transition state-based cryptography 有权
    系统,方法和产品,用于过渡基于状态的加密

    公开(公告)号:EP1168140A3

    公开(公告)日:2003-02-26

    申请号:EP01305072.9

    申请日:2001-06-11

    申请人: Xerox Corporation

    IPC分类号: G06F1/00

    摘要: A system, method and article of manufacture are provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access (308) is sent to a server utilizing a network upon reaching a state in the application. The request includes a state key associated with the state. A reply (312) is received from the server in response to the request. The reply includes an access key for providing the access if the state key is valid. According to another embodiment of the present invention, a method is provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is received from a client to a server utilizing a network. The state key is verified at the server. A reply is sent from the server in response to the request. The reply includes an access key for providing the access if the state key is verified. In one aspect of the present invention, the request for access is for a subsequent state in the application.

    Systems and method for policy based printing and forgery detection
    4.
    发明公开
    Systems and method for policy based printing and forgery detection 有权
    系统与Verfahren zum regelbasierenden Ausdrucken undFälschungsberurteilung

    公开(公告)号:EP1209897A2

    公开(公告)日:2002-05-29

    申请号:EP01309647.4

    申请日:2001-11-15

    申请人: Xerox Corporation

    IPC分类号: H04N1/32

    摘要: A print management system includes a policy (113) that determines a protection level for a document to be printed. The document is printed using forgery detection and deterrence technologies, such as fragile and robust watermarks, glyphs, and digital signatures, that are appropriate to the level of protection determined by the policy. A plurality of printers (130) are managed by a print management system (112). Each printer (130) can provide a range of protection technologies. The policy determines the protection technologies for the document to be printed. The print management system (112) routes the print job to a printer (130) that can apply the appropriate protections and sets the appropriate parameters in the printer. Copy evidence that can establish that a document is a forgery and/or tracing information that identifies the custodian of the document and restrictions on copying of the document and use of the information in the document are included in the watermark that is printed on the document. A document can be verified as an original or established as a forgery by inspecting the copy evidence and/or tracing information in the watermark.

    摘要翻译: 打印管理系统包括确定要打印的文档的保护等级的策略(113)。 该文件使用伪造检测和威慑技术打印,例如脆弱和鲁棒的水印,字形和数字签名,这些技术适用于由策略确定的保护级别。 多个打印机(130)由打印管理系统(112)管理。 每个打印机(130)可以提供一系列保护技术。 该策略确定要打印的文档的保护技术。 打印管理系统(112)将打印作业路由到可以应用适当保护的打印机(130),并将适当的参数设置在打印机中。 复印证明文件是伪造和/或跟踪信息,标识文件的保管人,复制文件的限制和文档中的信息的使用被包含在打印在文档上的水印中。 文档可以通过检查水印中的复制证据和/或跟踪信息来验证为原件或伪造成伪造。

    System, method and article of manufacture for transition state-based cryptography
    6.
    发明公开
    System, method and article of manufacture for transition state-based cryptography 有权
    系统,Verfahren und Produkt zurzustandsübergangsbasiertenKryptographie

    公开(公告)号:EP1168140A2

    公开(公告)日:2002-01-02

    申请号:EP01305072.9

    申请日:2001-06-11

    申请人: Xerox Corporation

    IPC分类号: G06F1/00

    摘要: A system, method and article of manufacture are provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access (308) is sent to a server utilizing a network upon reaching a state in the application. The request includes a state key associated with the state. A reply (312) is received from the server in response to the request. The reply includes an access key for providing the access if the state key is valid. According to another embodiment of the present invention, a method is provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is received from a client to a server utilizing a network. The state key is verified at the server. A reply is sent from the server in response to the request. The reply includes an access key for providing the access if the state key is verified. In one aspect of the present invention, the request for access is for a subsequent state in the application.

    摘要翻译: 在包括具有与其相关联的状态密钥的至少一个状态的应用中提供了用于过渡状态的密码术的系统,方法和制品。 在达到应用中的状态时,利用网络将访问请求(308)发送到服务器。 请求包括与状态相关联的状态键。 响应于该请求从服务器接收到答复(312)。 如果状态密钥有效,该回复包括用于提供访问的访问密钥。 根据本发明的另一实施例,提供了一种用于包括具有与其相关联的状态密钥的至少一个状态的应用中的基于过渡状态的密码术的方法。 从客户端接收使用网络的服务器的访问请求。 在服务器上验证状态密钥。 响应请求,从服务器发送回复。 如果状态密钥被验证,该回复包括用于提供访问的访问密钥。 在本发明的一个方面,访问请求用于应用中的后续状态。