Printing management system

ABSTRACT

A remote proofing system ( 10 ) on an information network ( 400 ) includes a networked controller ( 20 ) configured to be a master proofing controller and at least one remote proof printer ( 30, 90, 300, 310, 320, 330 ). The master proofing controller monitors at least one monitored information folder ( 13 ) maintained on the information network, associating a set of associated printer instructions ( 15 ) with the at least one monitored information folder, and instructing the at least one remote proof printer to print according to the set of associated printer instructions the contents of a proof printing file set when the proof printing file set is deposited in the at least one monitored information folder. Further embodiments of the remote proofing system allow for performing print proofing through an information firewall ( 800 ) via layered authorization from the operator of the remote proof printer; and multiple and partially overlapping remote proofing systems on the same information network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of prior U.S. patent application Ser.No. 11/687,277, filed Mar. 16, 2007, now U.S. Publication No.2008/0225328, which is hereby incorporated herein by reference in itsentirety.

FIELD OF THE INVENTION

The present invention relates to a remote proof printing system andmethod. In particular, the present invention relates to a system andmethod to obtain printing proofs remotely by using proof printersdistributed on an information network.

BACKGROUND OF THE INVENTION

It is common to provide a sample of an image to a customer for approvalprior to printing a large number of copies of the image using a highvolume output device such as a printing press. The printed sample imageis known as a “proof,” which is used to ensure that the customer issatisfied with, among other things, the content and color of the image.Proofs are not printed on high volume output devices because high volumeoutput devices are expensive to set up and not cost effective to printproofs. Accordingly, it has become a practice in the printing industryto use digital color printers, also called “proofers,” to print proofssince they are cost effective and may be color adjusted and confirmed.Proofers render color prints of images that have been encoded in theform of digital data, which includes code values indicating the colorsto be printed. When the proofer generates a printed output of an image,it is intended that the image rendered on the printed output willexhibit the exact colors that will ultimately be rendered by the highvolume output device.

Prior to printing, a calibration device, such as a spectrophotometer,may be used to measure the colors of color patches in a test image, eachcolor patch in the test image having an associated “color target” value.The measured color of each color patch is converted into a color codevalue and then compared against the original “color target” valueassociated with that patch. This is used to verify that the proofer iscorrectly rendering the digital information as the correct intendedcolors.

Color management adjustments are used to modify the operation of theproofer so that the image printed by the proofer will have the sameappearance as that printed by the high volume output device. A firststep in color management is to determine how the high volume outputdevice converts color code values into printed colors. This determiningstep is known as “characterization” of the high volume printing device.A second step is to similarly determine how the proofer device convertscolor code values into printed colors. This is known as“characterization” of the proofer device. The proofer characterizationgenerally depends on the specific proofer, the ink, and the media usedon that particular proofer. In both of these cases, the result of such acharacterization step is known as a “color profile.” In order to makethe proof, one needs to use both the proofer color profile and the colorprofile of the high volume printing device, together with a number ofcolor settings, in order to achieve the desired match. Achieving thecorrect color output requires that a specific combination of profile(s),color settings, printer, ink, and media all be used in combination.

With the advent of information networking as a basis of communication inthe field of industrial printing, the need to perform remote proofingover networks has increased. The need for the color profile and othersuch information for a proof printer, while already complex in the caseof a single printer and its computer controller, becomes much moredemanding and subject to error in the case of remote proofing. Thesituation is rendered even more complex when proofing printers areplaced on a network comprising a plurality of proof printers and aplurality of master proofing controllers. Complexities involved inremote proofing include the proofer-specific behavior and the managementthereof over distance and through security mechanisms and arrangements,such as information network firewalls.

Consequently, there is a need for a method and system that allows one ormore master proofing controllers to conduct remote proofing over aninformation network with one or more remote proof printers that arecapable of one or more printer settings, wherein the one or more masterproofing controllers may obtain verification that the one or more remoteproof printers are rendering correct colors.

SUMMARY OF THE INVENTION

The present invention provides a method and system that allows one ormore networked controllers, configured to be master proofingcontrollers, to conduct remote proofing over an information network withone or more remote proof printers that are capable of one or moreprinter settings, where the one or more master proofing controllers mayobtain verification that the one or more remote proof printers arerendering correct colors.

The present invention provides a system and method of use for a remoteproofing system, comprising a number of networked controllers, one ofwhich is configured to be a master proofing controller, at least oneremote proof printer and an information network, wherein the masterproofing controller, the other networked controllers and the at leastone remote proof printer are coupled to the information network. Themaster proofing controller is configured to monitor at least onemonitored information folder (MIF). The master proofing controller canbe configured to monitor at least one monitored information folder group(MIFG), the monitored information folder group MIFG comprising aplurality of monitored information folders (MIF). The master proofingcontroller optionally displays a collection of printer instructions(PIs) associated with members of the monitored information folder group(MIFG). The master proofing controller can designate one member of themonitored information folder group (MIFG) as a master monitoredinformation folder (MMIF) and can modify printer instructions (PIs)associated with the members of the MIFG to be the same as printerinstructions (PIs) associated with the MMIF. The remote proofing systemcan further comprise a spectrophotometer coupled to the remote proofprinter for providing spectral data to the remote proof printer for themaster proofing controller.

The master proofing controller and the remote proof printer can beseparated from each other by an information firewall through which themaster proofing controller instructs the remote proof printer based on amultilevel authorization obtained from an authority controlling theremote proof printer or the firewall or both. The master proofingcontroller is configured to accept a software token for theauthorization via e-mail, file transfer protocol or hypertext transferprotocol.

Further embodiments of the remote proofing system allow for performingprint proofing through an information firewall via layered authorizationfrom the operator of the remote proof printer. Yet further embodimentsallow for multiple and partially overlapping remote proofing systems onthe same information network.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be more readily understood from the detaileddescription of exemplary embodiments presented below considered inconjunction with the attached drawing:

FIG. 1 is a block diagram of a remote proofing system operating over aninformation network;

FIG. 2 is a flow chart of the operation of the monitored informationfolders of the remote proofing system;

FIG. 3 is a functional diagram of the remote proofing system operation;

FIG. 4 is a flow chart of the process for setting a master monitoredinformation folder;

FIG. 5 is a block diagram of a first remote proofing system operating asan authorized subset over the information network with a firewall;

FIG. 6 is a block diagram of a first and a second remote proofing systemoperating as authorized subsets, respectively, over the informationnetwork with a firewall; and

FIG. 7 is a block diagram of first and second remote proofing systems,the first remote proofing system having a networked controller that isconfigured to be a master proofing controller for the second remoteproofing system.

It is to be understood that the attached drawings are for purposes ofillustrating the concepts of the invention.

DETAILED DESCRIPTION OF THE INVENTION

Referring to FIG. 1, a remote proofing system includes networkedcontroller 20 configured to be a master proofing controller (hereinaftermaster proofing controller 20 or MPC 20) and at least one remote proofprinter 30, 90, 300, 310, 320, 330 on information network 400. Proofprinter 30, 90, 300, 310, 320, 330 may have associated with it aspectrophotometer to evaluate the colors that it renders. Referring toFIG. 2, the configuring 11 of a networked controller to be a MPC is donein software, for example, by a user configuring their own informationnetwork with the network controller. Information network 400 may be alocal network or a wide area network and may employ communication overInternet segment 70 and may employ one or more information firewall 80,800 to secure information and control access across Internet segment 70.Information network 400 may further include one or more furthernetworked controller 50, 150, 200, 550. The one or more networkedcontroller 50, 150, 200, 550 is configurable as a master proofingcontroller. Networked controllers 50,150, 200, 550 and master proofingcontroller 20 are a type of controlling device, including, but notlimited to, a personal computer employing a computer operating system,including, but not limited to, Windows (including variants), Linux,Macintosh, UNIX and DOS. Information network 400 may further includeproof printers that are local to the networked controllers. By way ofexample, proof printers 310, 320 are local to networked controller 150,but may be accessible to master proofing controller 20 over informationnetwork 400. The term “remote proof printer” is used to describe a proofprinter that is not local to master proofing controller 20 and which isaccessible on information network 400, either through being connecteddirectly to information network 400 or by being accessible through anetworked controller such as network controller 150.

A remote proof printer may be accessible to the master proofingcontroller 20 through a networked controller. For example, remote proofprinter 330 is accessible to master proofing controller 20 throughnetworked controller 550. A remote proof printer, for example, remoteproof printers 30, 90, 300, may reside directly on information network400. A remote proof printer may topologically be connected directly toinformation network 400, as is the case for remote proof printer 30, 90,300, but access to it may nevertheless be controlled by a networkedcontroller, such as, for example 50, 150, 200, 550. However, while onenetworked controller may control a plurality of remote proof printers,the remote proof printers being either directly connected to it orconnected directly to information network 400, every remote proofprinter is controlled by a maximum of one networked controller, whichnetworked controller is capable of granting other networked controllersand master proofing controllers access to the remote proof printersunder its control. For example, networked controller 150 may grant othernetwork controllers and master proofing controller 20 access to remoteproof printers 310 and 320. In a further example, network controller 50may control access to remote proof printers 90 and 300 (when it controlsthem) and may grant such access to other networked controllers andmaster proofing controller 20. There may be a local proof printer 40 indirect non-networked communication with the at least one master proofingcontroller 20. Printers 30, 40, 90, 300, 310, 320, 330 may use any typeof printer protocol, such as AppleTalk, LPR, Internet Printing Protocolor the like.

While networked controllers 50, 150, 200, 550 and master proofingcontroller 20 may have their own information storage devices, thenetwork may have one or more network information storage device 60,including, but not limited to, a network hard disk drive

Any of the controllers, printers and information storage devices oninformation network 400 may have their own restrictions imposed inregard to what source they accept information from or grant access to.For example, there may be access restrictions in regard to which masterproofing controller 20 and controllers 50, 150, 200, 550 may print toproof printers 30, 90, 300, 310, 320, 330 and local proof printer 40;which controllers 50, 150, 200, 550 or master proofing controller 20 mayaccess storage devices 60 and which controllers 50, 150, 200, 550 ormaster proofing controller 20 may access data on other controllers (notshown).

Master proofing controller 20 is capable of establishing 12 andmonitoring 13 at least one monitored information folder (MIF), alsoknown in the industry as a “hot folder.” The at least one MIF ismonitored by master proofing controller 20 and may reside in masterproofing controller 20, in any one of the networked controllers 50, 150,200, 550 or on any network information storage device 60. The term“monitoring” is used to describe the monitoring action by the masterproofing controller 20 of the MIF, irrespective of whether masterproofing controller 20 does so directly or whether it does so viaanother networked controller 50, 150, 200, 550. The term “monitoring”further includes not only monitoring the MIF for the purposes ofdetermining whether (FIG. 2) a proof printer file set (PPFS) has beendeposited 14 in the MIF where, upon detection, the PPFS is routed 21 toits respective proof printer, but also monitoring the status 22 of theactual printing process, including, but not limited to, file processing,printer progress and spectrophotometer measurement results from proofprinter 30, 90, 300, 310, 320 330. For example, referring to the blockdiagram of FIG. 3, master proofing controller 20 is monitoring one ormore of MIF2. The at least one MIF2 may reside in master proofingcontroller 20, in any one of networked controller 50, 150, 200, 550 orin network information storage 60. The term “monitoring” is used todescribe the monitoring action by the master proofing controller 20 ofany one or more of the MIF2, irrespective of whether master proofingcontroller 20 does so directly or whether it does so by using anothernetworked controller 50, 150, 200, 550. The term “monitoring” furtherincludes not only monitoring one or more of the MIF2 for the purposes ofdetermining whether PPFS 7 has been deposited into one of the MIF2, butalso monitoring the status of the actual printing process, including,but not limited to, file processing, printer progress andspectrophotometer measurement results from proof printer 30, 90, 300,310, 320 330.

Information network 400 may employ any suitable informationcommunication medium and any suitable information communicationprotocol, subject to the condition that the information communicationmedium and information communication protocol allow master proofingcontroller 20 to monitor at least one MIF2 and allow master proofingcontroller 20 to print on any remote proof printer 30, 90, 300, 310,320,330, whether directly or via another networked controller 550, as is thecase with remote proof printer 330. Suitable information communicationmedia include, but are not limited to, wired, radio, microwave,satellite and optical media. Suitable forms for wired informationcommunication media include, but are not limited to, Ethernet, Coaxialcable, twisted pair and telephone. Suitable information communicationprotocols include, but are not limited to, TCP/IP and IPX.

A set of printer instruction (PI) is associated with each MIF. The setof printer instructions may include, but are not limited to, mediaconfigurations, color profiles, layouts for the information to beprinted and file processing instructions. Media configurations mayinclude, but are not limited to, paper selection, ink type selection,resolution, screening tables, inking levels, inking limits, grey balanceand spectrophotometer information. For example, referring to the blockdiagram in FIG. 3, a set of printer instruction (PI) 4 is associatedwith each MIF2.

Proof printer 30, 90, 300, 310, 320, 330 may have associated with it aspectrophotometer to evaluate the colors that it renders. In such case,referring to FIG. 3, proof printer 30, 90, 300, 310, 320, 330, transmitsto master proofing controller 20 the results of a color evaluationperformed by proof printer 30, 90, 300, 310, 320, 330 over informationnetwork 400 for a proof that it has printed. In the case of remote proofprinters 310, 320, the results may be transmitted by networkedcontroller 150 and in the case of remote proof printer 330 the resultsmay be transmitted by networked controller 550.

Referring to FIG. 2 and FIG. 3, master proofing controller 20 maymonitor 13 one or more MIFs on information network 400, (Option I)associate 15 a set of printer instructions with a member of the one ormore MIFs, associate 16 a subset of the MIFs to form a monitoredinformation folder group (MIFG), designate 17 one MIF of the MIFG to bea master MIF (MMIF), change 18 the printer instructions associated withthe MIF in the MIFG to be the same as the printer instructionsassociated with the MMIF, and optionally display 19 one or more of theprinter instructions associated with the members of the MIFG in the formof a table or array. Thereafter, Option II is followed. For example,referring to FIG. 3, master proofing controller 20 may monitor one ormore MIF2 on information network 400, associate a set of printerinstructions 4C with a member of the one or more MIF2, here MIF2C,associate a subset of the MIF2 to form a monitored information foldergroup (MIFG), MIFG3, designate one MIF, MIF2C, of the MIFG3 to be amaster MIF (MMIF), change the printer instructions 4D associated withthe MIF2D in the MIFG3 to be the same as the printer instructions (PI)4C associated with the MMIF, here, MIF2C, and optionally display one ormore of the printer instructions associated with the members of theMIFG3 in the form of a table or array.

When a PPFS containing information to be printed as an image isdeposited into a MIF monitored by a master proofing controller, themaster proofing controller detects and routes the PPFS to the proofprinter corresponding to the MIF. For example, referring to FIG. 2 andFIG. 3, when PPFS7 containing information to be printed as an image isdeposited into a MIF2A monitored 13 by master proofing controller 20,master proofing controller 20 detects 14 and (Option II) routes 21 thePPFS7 to the proof printer corresponding to the MIF2A.

Referring to FIG. 1, where master proofing controller 20 is to print toremote proofing printer 30, there is no requirement to pass throughfirewall 80, 800 and access for master proofing controller 20 to remoteproofing printer 30 is provided by an authority in control of theproofing controller that operates the remote proofing printer 30, viaeither networked controller 150 or networked controller 20.

With firewalls 80, 800 in place, master proofing controller 20 must be“authorized” by the authority in control of firewall 800 and by theauthority in control of master proofing controllers in control ofprinter 90, 300, 330 in order to print to remote proof printer 90, 300,330. An authority in control of master proofing controller 20 must firstsend an “authorization request” to the authority in control of remoteproof printer 90, 300, 330, to get authorization to communicate throughfirewall 800 and print to proof printer 90, 300, 330, respectively. Toauthorize master proofing controller 20, an authority in control ofremote proof printer 90, 300, 330 will send a “grant” back to masterproofing controller 20. Now, the authority in control of master proofingcontroller 20 may “accept” or “deny” the grant message. If the authorityin control of master proofing controller 20 accepts the grant message,master proofing controller 20 may print to proof printer 90, 300, 330.If the authority in control of master proofing controller 20 denies thegrant message, master proofing controller 20 will not be able to printto proof printer 90, 300, 330. The access request to the authorities incontrol of firewall 800 and of remote proof printer 90, 300, 330 isperformed by conventional methods known in the art, such as, forexample, e-mail.

The authorization request, grant and accept may be performed, such as,for example, on the basis of a software token or software key exchangebetween an authority in control of master proofing controller 20 and anauthority in control of firewall 800 and an authority in control ofremote proof printer 90, 300, 330. The authorization procedure maycomprise of a plurality of levels of authorization, dictated by theauthority in control of remote proofing printer 90, 300, 330, each levelof authorization allowing master proofing controller 20 access to adifferent subset of functions for remote proof printer 90, 300, 330. Forexample, at a lowest level of authorization, only work originating fromthe particular master proofing controller 20 is visible to the authorityin control of master proofing controller 20, whereas at the highestlevel of authorization, all work on proof printer 90, 300, 330 isvisible to the authority in control of master proofing controller 20.The authorization mechanisms may be obtained by any one or moreauthorization mechanism delivery system (AMDS), including, but notlimited to, electronic mail, file transfer protocol (ftp), and hypertexttransfer protocol (http and https).

In FIG. 5, which is an extension of the prior Figures, remote proofingsystem 10 includes master proofing controller 20 in communication withan authorized subset of network devices on information network 400. Theauthorized subset of network devices includes at least one remote proofprinter 30, 90, 330, and at least one networked controller 50, 550.Master proofing controller 20 is specifically authorized by the methoddescribed above to have access to only remote proofing system 10. Theconfiguring of a networked controller to be a master proofing controller20 is done in software, as described above. Remote proofing system 10includes only one master proofing controller in the form of masterproofing controller 20. All of the networked controllers 20, 50, 550 inremote proofing system 10 are programmed with the same remote proofingsystem software, but, at any one time, only one networked controller maybe configured to be a master proofing controller which, in the exampleof FIG. 5, is master proofing controller 20.

Information network 400 may include a network controller that isconfigured to be master proofing controller 900, which is not a part ofthe authorized subset of network devices to which master proofingcontroller 20 has access and is thereby not a part of remote proofingsystem 10.

In FIG. 6, which is an extension of prior FIG. 1 and FIG. 5, informationnetwork 400 may contain a plurality of remote proofing systems. By wayof example, FIG. 6 shows the specific case of two remote proofingsystems 10 and 100. Remote proofing system 10 is the same remoteproofing system 10 as in FIG. 5, while remote proofing system 100includes networked controller 900 configured to be master proofingcontroller (hereinafter master proofing controller 900) in communicationwith its own authorized subset of network devices on information network400. Master proofing controller 900 is specifically authorized to haveaccess to only its authorized subset of network devices.

In this embodiment, the two remote proofing systems 10, 100 are shown asoverlapping in part. Remote proofing systems 10, 100 share remote proofprinters 30, 90, networked controller 50, network storage device 60,internet segment 70 and firewalls 80, 800; however, only remote proofingsystem 100 has authorized access to remote proof printer 300, 310, 320and their associated MIFs, and networked controller 150 and only remoteproofing system 10 has access to local proof printer 40 in directnon-networked communication with master proofing controller 20,networked controller 550, and remote proof printer 330. Each remoteproofing system 10, 100 has its own distinct master proofing controller20, 900, respectively, each of master proofing controller 20 and masterproofing controller 900 thereby being an unshared master proofingcontroller.

Remote proofing system 10 and 100 both include remote proof printer 30and 90. Therefore, master proofing controllers 20 and 900 both haveauthorized access to remote proof printer 30 and 90. Remote proofprinters 30 and 90 have different associated MIFs in remote proofingsystem 10 and remote proofing system 100. Additionally, master proofingcontroller 20 may store its MIF for remote proof printer 30, 90 on adifferent information storage device from the information storage deviceon which master proofing controller 900 is storing its MIF for remoteproof printer 30, 90.

As already explained above, the authorization procedure may comprise ofa plurality of levels of authorization, dictated by the authority incontrol of remote proofing printer 30, 90, each level of authorizationallowing master proofing controller 20, 900 access to a different subsetof functions for remote proof printer 30, 90. For example, at a lowestlevel of authorization, only work originating from master proofingcontroller 20 may be visible to the operator of master proofingcontroller 20 and only work originating from master proofing controller900 is visible to the operator of master proofing controller 900,whereas, at the highest level of authorization, all work on printer 30,90 may be visible to the operators of both master proofing controllers20, 900. Each proofer may grant a unique access level to each masterproofing controller it grants access to.

In yet a further embodiment of the present invention, shown in FIG. 4,which is an extension of FIGS. 1, 5 and 6, networked controller 900,being common to both remote proofing system 500 and remote proofingsystem 100, is a networked controller within remote proofing system 500and it is also the unique master proofing controller 900 for remoteproofing system 100. All other elements of remote proofing system 500are the same as those of remote proofing system 10 in the embodimentshown in FIG. 6. The configuring of a networked controller 900 of remoteproofing system 500 to be a master proofing controller 900 for remoteproofing system 100 is done in software, as already described here.

In a further aspect of the present invention, see FIG. 6 and FIG. 7, asan alternative to monitoring a MIF, MPC 900 establishes a connectionwith a digital front end (DFE) that is installed and operating onnetworked controller 50 located on the same side of firewall 800 as MPC900. MPC 900 then monitors the DFE on networked controller 50 for a PPFSthat is forthcoming from the DFE. The term “digital front end” (DFE) isused here to describe a software package operating on a computerworkstation and which comprises at least a raster image processor (RIP).Suitable examples of a DFE include Prinergy from Eastman Kodak ofRochester, N.Y., Apogee from Agfa-Gevaert of Mortsel, Belgium andPrinect MetaDimension from Heidelberg Drückmaschinen of Heidelberg,Germany. Networked controller 50, being a workstation with a DFEimplemented on it, is a part of both remote proofing system 10 andremote proofing system 100, but only MPC 900 can establish a connectionwith the DFE on networked controller 50 and monitor it for a PPFS. Allother aspects of the apparatus of FIG. 6 and FIG. 7 remain the same asin the case of the use of a MIF or MIFG, and the steps of FIG. 2 andFIG. 4 proceed as with an MIF, with the PPFS in this case beingforthcoming from the DFE instead of from a MIF. The steps of FIG. 3,however, do not apply to the case of MPCs monitoring DFEs and nogrouping of DFEs is performed.

It is to be understood that the embodiments contained herein are merelyillustrative of the present invention and that many variations of theabove-described embodiments may be devised by one skilled in the artwithout departing from the scope of the invention. It is thereforeintended that all such variations be included within the scope of thefollowing claims and their equivalents.

PARTS LIST

-   10 remote proofing system-   11 configure network controller-   12 MPC establishes monitored information folder (MIF)-   13 MPC monitors MIF-   14 determine if proof printer file set (PPFS) deposited in MIF-   15 associate set of printer instructions (PI) with member of MIF-   16 associate subset of MIF to form monitored information folder    group (MIFG)-   18 change PI associated with MIF to MIFG to be same as PI associated    with MMIF-   19 optionally display PI associated with MIFG-   20 master proofing controller (MPC)-   21 PPFS routed to respective proof printer-   22 monitor status of printing process-   30 proof printer-   40 proof printer-   50 networked controller-   60 information storage device-   70 Internet segment-   80 information firewall-   90 proof printer-   100 remote proofing system-   150 networked controller-   200 networked controller-   300 proof printer-   310 proof printer-   320 proof printer-   330 proof printer-   400 information network-   500 remote proofing system-   550 networked controller-   800 information firewall-   900 master proofing controller

1. A remote proofing system, comprising: a master proofing controller; at least one remote proof printer accessible through a network controller; an information network; wherein the master proofing controller and the network controller are coupled to the information network and both controllers are configured to monitor different monitored information folders (MIFs) and wherein each MIF can be separately configured with printing instructions to be applied to jobs submitted thereto; wherein the master proofing controller and the network controller are separated from each other by an information firewall; and wherein a proof job submitted to any of the different monitored MIFs is reproduced by the remote proof printer according to the printing instructions configured in the associated controller.
 2. The remote proofing system according to claim 1, further comprising a spectrophotometer coupled to the at least one remote proof printer for providing spectral data to the at least one remote proof printer for the master proofing controller.
 3. The remote proofing system according to claim 1, wherein the master proofing controller is configured to monitor at least one monitored information folder group (MIFG), the monitored information folder group MIFG comprising a plurality of monitored information folders (MIF).
 4. The remote proofing system according to claim 3, wherein the master proofing controller optionally displays a collection of printer instructions (PIs) associated with members of the at least one monitored information folder group (MIFG).
 5. The remote proofing system according to claim 3, wherein the master proofing controller designates one member of the at least one monitored information folder group (MIFG) as a master monitored information folder (MMIF).
 6. The remote proofing system according to claim 5, wherein the master proofing controller modifies printer instructions (PIs) associated with the members of the MIFG to be the same as printer instructions (PIs) associated with the MMIF.
 7. The remote proofing system according to claim 1, wherein the master proofing controller instructs the at least one remote proof printer through the information firewall based on an authorization obtained from an authority.
 8. The remote proofing system according to claim 7, wherein the authority controls one or more of the information firewall, the network controller and the at least one remote proof printer.
 9. The remote proofing system according to claim 8, wherein the master proofing controller is configured to accept a software token for the authorization. 