Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Copier Security System

IP.com Disclosure Number: IPCOM000084405D
Original Publication Date: 1975-Nov-01
Included in the Prior Art Database: 2005-Mar-02
Document File: 2 page(s) / 36K

Publishing Venue

IBM

Related People

Bacon, JL: AUTHOR [+2]

Abstract

Components of the copier security system include a plurality of copiers 10, a user identification card reader 12 attached to each copier, a microprocessor 14 with associated memory 16, and output printer 18. Each copier 10 would have a secure document feature such as that described in the IBM Technical Disclosure Bulletin, Vol. 15, No. 9, pages 2736-2737, February, 1973.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 53% of the total text.

Page 1 of 2

Copier Security System

Components of the copier security system include a plurality of copiers 10, a user identification card reader 12 attached to each copier, a microprocessor 14 with associated memory 16, and output printer 18. Each copier 10 would have a secure document feature such as that described in the IBM Technical Disclosure Bulletin, Vol. 15, No. 9, pages 2736-2737, February, 1973.

The secure document feature detects whether the document placed in the copier is a sensitive document under security control. In addition copier 10 could include an Optical Character Recognition (OCR) feature for scanning a given area of the document for document identification number. As an alternative to the OCR feature, the operator might key in the document identification number from a keyboard on the copier.

The microprocessor 14 with its associated memory 16 and printer 18 may be built into the copier 10 or may be a separate processor such as the IBM System
7. If the microprocessor system were built into the copier the printer 18 could be a character generator utilizing the copier as the output printing device.

In operation, a user first inserts his identification card into the card reader 12 and feeds the original document to be copied into the copier 10. Copier 10 passes the user identification information, the document security information and the document identification to microprocessor 14. Microprocessor 14 then searches memory 16 for the user's security clearance. Processor 14 checks to see that the user has the required security clearance for the level of security of the document to be cop...