Font Size: a A A

Reserach On The Technology Of Security Printing

Posted on:2012-02-11Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhaoFull Text:PDF
GTID:2218330338463814Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of IT industry, computer networks have become an indispensable element of life. Network-related new technologies and new applications have being endlessly developed. Among them, network printing is the most commonly used in our daily business of the new technologies. Due to the shared nature of network resources, network printing greatly improves the efficiency, while it also brings many risks. The printing security has become the weakest field in information security of enterprise.This thesis summarizes years of work and experience in printing industry, based on experimental environment provided by Hewlett-Packard Company and various third-party hardware and software partners, in-depth studied the printing process of the network security problems including:1) Process based analysis. In this thesis, the process of network printing is divided into three stages and the security issues of each stage are analyzed in more details. The printing aspects in first-stage include anti-screenshot control, generation security of print files, physical security of printing equipments, improvement of printing equipments network security and approval process of printing. The printing aspects in second-stage consist of printing work collection, mobile printing technology and real-time equipment monitoring. The printing aspects involved in the last-stage include the data follow-up and analysis, and anti-counterfeit and encryption technologies.2) Function based analysis. This part gives an overall security printing solution based on the issues analyzed in the three printing stages using existing security printing technologies. All printing security issues in the three stages is classified into five areas, including anti-screenshot security, file generation security, file transfer security, file output security, and output file anti-counterfeit policies.3) Testing and improvement through practical projects. Through daily works, this security printing solution was applied and tested in the actual BMW (China) and Microsoft (China) projects. During the project implementation, the problems could be found and resolved, and the feasibility and reliabilityof the solutions could be improved.The studies of the thesis are expected to provide a successful case that can be referred by the companies in need of security printing solutions.It hopes that this thesis could play a role in better ideas, and bring more experts into the team of studying security printing solutions, so that more companies could realize the importance of security printing.
Keywords/Search Tags:Information security, Security technology, Network printing, Security printing
PDF Full Text Request
Related items