Security printing and unlocking mechanism for high security printers

ABSTRACT

A printer is provided with a smart card encoding device that is externally accessible. The smart card is a key with an integrated circuit including a memory that will retain a discrete password and other digital information. The password on the smart card key must be compared to a password stored in the printer memory before printing operations will be permitted. The digital information in the smart card key memory can include marks or graphics that would indicate that the cards being printed by the printer are secured cards and authorized cards. The information will be printed from the smart card key memory only when the passwords match so that the discrete information on the smart card key can be used for driving the printer for printing this information. The printer is made into a high security printer by permitting the overriding of the password only upon the generating of identical numbers from separated algorithms, one in the printer memory and one at a secure location. An algorithm input is a dynamically changing parameter of the printer, such as the number of print head passes, or the number of cards printed so the algorithmically generated numbers are unique.

CROSS REFERENCE TO RELATED APPLICATION

[0001] Based on provisional application Serial No. 60/077,136, filedMar. 6, 1998 and on provisional application Ser. No. 60/082,772, filedApr. 23, 1998.

BACKGROUND OF THE INTENTION

[0002] The present invention relates to using a smart card key for highsecurity printers and insuring access only when a unique password isprovided as well as printing markings from information stored in thesmart card key memory.

[0003] Smart cards, which are identification cards made from thetraditional poly vinyl chloride/polyester cards having an integratedcircuit embedded in the card, allowing for information to be stored inthe card itself, are widely used. Typically the integrated circuitconsists of either a memory or a microprocessor with memory. In orderfor a smart card to be encoded in the printer, the printer must have asmart card encoder.

[0004] One of the problems inherent in identification card printers isthat anyone with access to the files or even to a inexpensive commercialdrafting software program can recreate the identification card and printforgeries. This problem is particularly acute in locations where theprinter, software, files, and other computer hardware are set up in asingle area.

SUMMARY OF THE INVENTION

[0005] The present invention relates to maintaining security of aprinter and its user by having a secure smart card key. The printer is,as shown, an identification card printer and has an externallyaccessible smart card encoder that can be used for initializing a smartcard that forms a key. A further use of the externally accessible smartcard encoder is to read the smart card and allow or prevent access. Itis also possible to encode smart cards inside the printer, if sodesired, by placing a second encoding device in the internal printingpath of the printer.

[0006] Because a smart card can have a large amount of memory storage,both a digital image (such as a security mark for cards to be printed)and passwords can be stored in the smart card memory. The printers alsocan have large capacity Electrically Erasable Programmable Read OnlyMemory (EEPROM), as well as read only memory (ROM).

[0007] The first password usage of the smart card key is to enableprinting by a selected identification card printer. The second passwordusage is to enable printing a specialized print panel for a securitymark using a stored digital image in the smart card key memory. Theability to enable password protected printing only is provided initiallyin a computer program for the printer drive computer which convertscomputer images into digital data for printing cards. The computerprogram or software includes user interface items for setting passwords,duplicating smart cards, and loading images onto smart card memory. Inaddition, the selected password would also be stored in the associatedidentification card printer memory.

[0008] A match between the password in printer memory and the passwordin the smart card key memory is required to enable printing as the basicsecurity feature. Thus, the smart card would act as the only key toallow the printer to print. The ability to store a digitalrepresentation of a security mark to be printed onto an identificationcard being printed by the card printer controlled by the smart card keyprevents unauthorized use of the security mark, since accessibility tothe mark is limited to the holder of the smart card key with the correctpassword.

[0009] Another aspect of the invention is an algorithmic unlockingmechanism available to users of the smart card key having a highsecurity password feature, in case they ever lost the encoded smart cardkey or forgot the password. High security as used herein means that thepassword cannot be easily changed or bypassed. Printers are now equippedwith a counter mechanism to count the number of passes that theprinthead has made during the operation of the printer, or provide otherchanging counts. This number can be accessed and displayed on thedisplay of the printer or the number can be printed on an I.D. card inthe printer. The counter is a conventional system used in a wide varietyof devices. In addition, other changing parameters in a printer can beused for a count, for example, a count of the number of cards printed inthe printer can be recorded and used for this invention.

[0010] After a selected procedure by the owner of the printer, whichverifies ownership of the high security printer, an algorithm is appliedto the number generated by the counting mechanism. The algorithm isselected to produce an unlocking number unique to each number of theprinter head pass count, a range of printer head pass counts or numberof cards printed, as recorded by the counter in that printer. This canbe done automatically by the printer if a smart card key used does nothave an acceptable password. The count is based on a dynamic parameterunique to that particular printer. A duplicate algorithm to the one inprinter memory is kept at a secure location, for example at the premisesof the printer manufacturer. The printer manufacturer, after verifyingthe identity of the owner through a personal identification number, willuse the algorithm to generate a one time usable unlocking number.

[0011] The owner is then issued this one time usable unlocking numbergenerated from the algorithm at the secure location, which is enteredthrough the host computer in place of the password from the smart cardkey. The printer will apply or compare the unlocking number generated inprinter memory with the number generated from the secure location. Ifthe algorithmically generated number entered by the user matches thealgorithmic unlocking number generated in the printer, then the printerwill accept and perform the current command given to the printer, suchas a command to create a new smart card key or to disable the securityfeature entirely, or to change the password.

[0012] Although the printer memory stores the algorithmic unlockingcode, the stored code cannot be used to unlock the printer without theseparate algorithmic application, using the same algorithm, but kept atsite unrelated to the user, thus protecting the security of the printer.The security value is that the pass count number (or other uniquenumber) from the counter mechanism of the printer is one that the userhas no control over, is constantly changing, and cannot be manipulated.

[0013] Once the printer has continued to print and the number ofprinthead passes counted and stored in printer memory has changed, thepreviously generated unlocking number will no longer match the numberproduced by the algorithm in the EEPROM of the printer after the changeand therefore, the old number will not allow the printer to function.

BRIEF DESCRIPTION OF THE DRAWINGS

[0014]FIG. 1 is a schematic block diagram representation of a highsecurity printer having a smart card key input as attached to a hostcomputer;

[0015]FIG. 2 is a perspective part schematic view of a typical printerhaving an encoding device on the exterior of and used with the presentinvention;

[0016]FIG. 3 is a sectional view illustrating schematically a removablememory card key, as shown a smart card, in the encoding device;

[0017]FIG. 4 is a plan view of the smart card key showing an integratedcircuit exposed on one side thereof;

[0018]FIG. 5 is a plan view of a typical identification card printedfrom a printer using the high security arrangement of the presentinvention;

[0019]FIG. 6 is an overall flow diagram of operations carried out toaccomplish the purposes of the present invention;

[0020]FIG. 7 is a flow diagram for enabling printing of a security markon an identification card based on a digital image stored in the smartcard key; and

[0021]FIG. 8 is a flow diagram of an off-site verification procedure forthe high security printer of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0022] Smart card encoding is well known in the identification cardprinter industry. Identification card printers such as the FARGO CheetahII printer sold by Fargo Electronics of Eden Prairie, Minn. have thecapability of encoding smart cards. However, the Cheetah II printerencodes smart cards internally rather than having the encoder externallyaccessible. As shown herein the smart card is removable and is thususable as a key for operating a device that is controlled to performsome operation, such as a printer.

[0023] In FIG. 1, the general layout of usable, typical components isshown. A computer 100 is connected to a controllable device having amemory, as shown a printer 30, and is used for the initial andsubsequent programming. A monitor 102 can be used for the display menusfrom a software program for encoding a removable memory device key, asshown a smart card key 10, through the input slot on the printer for anencoder 13 as will be explained. Operator inputs from a keyboard 104 areused for selecting the functions, and a power supply 106 is used forpowering both the computer 100 and the printer 30. The software for thecontrol of the security features of the present invention is installedin the computer in a normal manner, including a CD to provide thenecessary programming for enabling smart card key 10 and providing aselected password that is entered in the smart card key memory 10A. Aswill be shown, the smart card key is slid into a slot 12 (FIG. 2) inprinter 30 and the smart card key 10 contains an embedded integratedcircuit 50 (FIG. 4) chip that has integrated circuit contacts accessiblefrom the exterior. The contacts will complete circuits from the printeror computer to the memory on the chip.

[0024] The removable memory device, as shown a smart card with externalcontacts 10, can be a contactless smart card, a radio frequency (RF)identification card, a PCMCIA card, or a compact “flash module” (usedcurrently in digital photography) or any other type of removable memorydevice. Thus, the encoding device does not need contacts if acontactless removable memory device key is used. This description willshow a contact arrangement with for the smart card key.

[0025] The computer 100 will be used to select a particular printer 30that is being used, and in which the card key 10 is inserted. Theinitializing menu from the program will have prompts that will include aprompt for entering a password selected by the user, and for example upto an eight character password using any standard alphanumeric keyboardcharacters is entered. Once the password is entered, it can be confirmedby typing it again into a “confirm” password box presented by the menu.

[0026] If the smart card key 10 is being used with multiple printers, itcan be encoded appropriately with just the password for identification,but if the smart card key 10 is used with only one printer, it willreceive and retain in memory the printer serial number, along with theencoded password to a specific smart card key, making all other accesscards or key cards created in other printers invalid. If more than oneprinter is utilized, then each printer can be enabled with the samepassword.

[0027] Once the password has been entered into the computer 100, it willbe passed through the printer memory indicated at 30A, from driversoftware 16 to the card 10, and imprinted in an electrically erasableprogrammable read only memory (EEPROM) 10A of the chip 50 on the smartcard key 10.

[0028] Once the smart card key has been programmed with a password, itcan only be changed under certain selected circumstances or conditions,and these are controlled as desired from the computer 100, but requireinformation separate from the computer to be operated. Generally it willbe necessary to have the card 10 in the printer 30 and then connected tothe computer 100 for changing the password and only when the correctpassword match between the card memory 10A and printer memory, unlessthe unlocking algorithmic procedure to be described is followed.

[0029] Additionally, if desired, the card printer 30 can be used toprint a security image or mark onto cards that are being printed using aspecial ribbon layer. The printing of the security mark is controlledfrom a digital image program that is entered in the EEPROM 10A of thesmart card key 10. This digital image can be entered from the softwareprogram of computer 100 for inputting information into the EEPROM 10A,and the image, such as that shown at 122 in FIG. 5 on an identificationcard 120 printed on printer 30, can only be viewed when the card istilted slightly for reflecting light. These security mark images can bemade to glow when viewed under an ultraviolet light. The image 122 canbe put any place on a card that is to be printed as desired. The storingof the security mark or image in the smart card key memory only insuresthat such image or mark will only be printed when the correct smart cardkey is used, since the printer 30 will not operate until the password onthat key 10 matches the printer password.

[0030] The digital input to print such an image, and other securityfeatures are in the EEPROM 10A on the card only. After entry of theinformation, the inputted digital file for the image is deletedautomatically or manually.

[0031] The printer driver software 16 can be imbedded in amicroprocessor in the printer if desired, and the use of the card 10 forenabling a printer 30 can be done with the printer 30 standing alone,and powered. The printer 30 will normally be used with the computer 100,but the printer includes memory of its own (both ROM and EEPROM). Oncethe password is entered into the printer memory, the printer memory willperform the needed functions.

[0032] Upon receiving a “print” command, the printer memory determineswhether or not the security feature has been enabled on the controlleddevice, as shown the printer 30. If the security feature has beenenabled, then the removable memory device card, as shown smart card key10, must be present in slot 12, and if so, then the memory in theprinter will interrogate the card 10 to determine the password in memoryon the card and compare it with the password that is in the printermemory. Only if the password matches, will the printer operation beundertaken. FIG. 3 depicts a smart card 10 that is provided with anintegrated circuit chip 50 having a password in memory.

[0033] A smart card key 10 is placed into slot 12 in printer 30. Theencoder 13 used to initialize and read the smart card key 10 is thusexternally accessible as shown in FIG. 2. The control panel 11 of theprinter 30 has an LCD display 14 and command buttons 15. The smart cardkey memory chip 50 can be read through external or export contacts 52.The contacts 52 are engaged by spring loaded contacts 13A in the encoderslot. The coupling to the smart card key memory 10A is made as the cardis “clicked” into place. Insertion of the smart card key 10 with theintegrated circuit facing the correct way through the slot 12 allowscontacts to complete circuits to the memory on chip 50, which is encodedelectronically.

[0034] The contacts 52 are used for initially placing information intothe integrated circuit memory of chip 50 as well as reading storedinformation. The commands are generated in the computer 100 or printer30 in a normal manner, and for printing can be processed through theprinter memory.

[0035] Commands are presented in a flow chart in FIG. 6. Each particularprinter, in order to interface with any software program run on acomputer must have a printer driver 16 to provide the link up to thecomputer. The driver 16 forming part of computer 100 provides theoperator with a menu of choices, as shown, disable password 17, enablepassword 18, change password 19, duplicate password 20, and set upsecurity shield 21. The operator will choose which menu option isutilized to download corresponding information to the smart card key 10in a conventional routine.

[0036] In order to initially provide a smart card key memory with adigital image of a security mark, such as a logo stored digitally in thememory of the smart card, the operator must choose the “set up securityshield ” menu step 21. The driver program 16 in the computer controllingthe printer then requests position information at step 26 and gives theoperator options for positioning the shield or mark at step 27. Thepositioning is information about the location of the security mark onthe identification card 120 in FIG. 5 that is printed in the printer 30.

[0037]FIG. 5 shows a printed Identification Card 120 with a digitalimage or security mark 122 that can be printed in various locations onthe identification card. These locations can be varied by changing thelocation in software located in the computer 100 attached to the printer30. The number of digital images can also be varied by changing thenumber of digital images created in software located in the computerattached to the printer.

[0038] From a graphics software application in computer 100, where thedigital image of a mark has been constructed, the operator selects the“select security shield ” step 37 from the printer setup in the graphicapplication and then chooses print step 38 from the graphicsapplication. The print command step 38 will start the process totransmit both the digital image and the location information to thesmart card key 10 memory, rather than commanding the printer to print,when the security shield mode at step 37 has been selected.

[0039] Next, the image seal is processed into the appropriate format atstep 28, and then transmit the digital image and settings at step 29 tothe printer 30. The printer 30 then transmits the image and settings atstep 31 to the smart card key integrated circuit memory 10A via thesmart card key encoder 13.

[0040] It would be possible for a skilled practitioner to create aseparate program specifically written to enable the transfer of thedigital image data and location data within the teachings of the presentinvention.

[0041] To enable (create) a password or to make changes in the password,other menu options are used at the computer 100, as provided by softwarein the computer. The password information is to be stored in the memoryon the same smart card key 10 as that used for storing the digital imageto be printed by printer 30 as just described. In order to place apassword onto the smart card, key 10, the “enable password” menu option18 must be chosen. The computer driver program then prompts the operatorto enter the selected password at step 22 and confirm the password atstep 23 as was previously mentioned.

[0042] The operator then has the option to make the smart card specificto a single printer by choosing the “yes” option of the printer specificcard prompt at step 39. The printer 30 has an Electrical ErasableProgrammable Read Only Memory (EEPROM) that contains a serial number forthat printer that can also be encoded into the smart card key memorythrough encoder 13. Once encoded to the key memory, the printer serialnumber would be compared in the same manner as the passwords, whichwould prevent the printer 30 from printing unless both the password andthe serial number matched. The password from the smart card key 10 isthen transmitted as a send command 32 to the printer 30 where theprinter memory decodes the message at step 33, verifies the password,step 34, and executes the command message at step 35 if the printer isenabled by the correct password.

[0043] To change the password, the operator must insert the smart cardkey 10 into the encoder 13, then select the “change password” menuoption 19 from the software in the computer 100. The current passwordmust be entered as shown by step 36. The operator is prompted to enterthe new password as at step 24 and confirm the new password as at step25. The new password is then transmitted as a send command at step 32 tothe printer 30 where the printer decodes the message at step 33,verifies the password, step 34, and executes the command message step35.

[0044] To duplicate the password as shown at menu option 20, theoperator must insert the originally encoded smart card key 10 into theencoder 13, then select the “duplicate password” menu option 20. Thecurrent password must be entered at step 22A to verify that operation isauthorized and the change can be made. The password is then transmittedas a send command at step 32 to the printer 30 where the printer memorydecodes the message at step 33, and verifies the password at step 34.Then the printer driver prompts the operator to remove the originalsmart card key 10 and place a new smart card key 10 into the encoder 13.The printer 30 then executes the command message at step 35. The changescan be made only if the original password on the smart card key 10 hasbeen entered.

[0045] To disable the password, the operator must insert the smart cardkey 10 into the encoder 13, then select the “disable password” menuoption 17 at the computer 100. The current password must be entered atstep 22B and the password to be disabled is then transmitted as a sendcommand 32 to the printer 30 where the printer decodes the message atstep 33, verifies the password at step 34, and executes the commandmessage at step 35.

[0046] It would be clear to a skilled practitioner in the art that thesecommands could be structured in a variety of permutations. Any of thoseknown permutations may be used as long as security is maintained.

[0047] Once the smart card key 10 has been encoded, the password encodedon the smart card key 10 can be stored in the printer EEPROM 30B. TheEEPROM 30B on the printer 30 also contains the unique serial number forthat printer. When an operator has encoded the smart card key 10 andwants to print, the operator reinserts the smart card key 10 into theencoder 13. The printer 30 then copies the information contained in theintegrated circuit memory of the Smart Card to the printer's RandomAccessible Memory (RAM) 30A. The printer RAM 30A then compares thepassword and, if the option of making the smart card key 10 specific toone printer has been chosen, the RAM compares the serial number on smartcard key 10 to the password and serial number retained in the printerEEPROM 30B. If the passwords in both memory locations (card and printer)match, then the printer 30 will enable the print commands to proceed.The printer will continue to allow the print commands until the smartcard key 10 is removed from encoder 13. Once the smart card key 10 isremoved from the encoder 13, the same process has to be repeated for theprinter 30 to start printing again.

[0048] When an operator has encoded the smart card key 10 with a digitalimage such as a logo and wants to print identification cards thatcontain the logo such as that shown at 120 in FIG. 5, the operator mustreinsert the smart card key 10 into the encoder 13. The printer 30 thencopies the information contained in the integrated circuit memory on thesmart card key 10 to the printer's Random Accessible Memory (RAM) 30C.The printer memory then compares the passwords and, if included, theserial number from card key 10 to the passwords and serial numberretained in the printer EEPROM. If correct, the printer stores thedigital image and the location information transmitted from the smartcard key 10 in the RAM memory. The printer is programmed to check to seeif the ribbon with the specialized security mark panel is loaded intothe printer 30, and if the correct ribbon is loaded, and if thepasswords in both memory locations match, the printer will commence theprint cycle. The printer will continue to allow the print commands untilthe smart card key 10 is removed from encoder 13. Once the smart cardkey 10 is removed from the encoder, the same process would need berepeated for the printer 30 to start printing again.

[0049] A practitioner skilled in the art would be able to discern thatsaving the password in the computer or not saving the password at alland requiring the operator to enter the password each time that theoperator used the printer 30 could accomplish the same increase insecurity of the printer 30 within the scope of the present invention.

[0050] A counting device or counter 30D (FIG. 1) is added to either acircuit board in the printer or to the print head mechanism itself forcounting the number of passes of the print head 30E during printing orcounting the number of cards. An electronic counting device or counterin printer memory would be the preferred embodiment but other countingdevices such as a mechanical counting device could be used for recordinga changing event as printing progresses.

[0051] In every instance where the printer is given a command, theprocess shown in FIG. 7 occurs. The command step 40 is given to theprinter 30. The printer 30 memory determines if the printer is securityenabled at step 41. If the answer is no at step 42, (no security checkis needed) the printer 30 proceeds with the command as at 43. If theanswer is yes at step 44, then the printer 30 determines if the smartcard key 10 is inserted into the slot 12 of the encoder 13 and if thecorrect password is encoded onto the smart card key at step 45. If theanswer is yes at 46, the printer memory then determines if the userpassword is needed at step 47 and matches the password in the printerEEPROM 30B. If the password is not needed as at step 48, the printerproceeds with the command given, step 49. If the password is needed andmatches, then the printer proceeds with the command at step 51.

[0052] If the printer memory determines that the smart card key 10 isnot inserted into the slot 12 or if the incorrect password is encodedonto the smart card key memory, at 45, or if the user password is neededas at step 47 and the password on key 10 does not match the password inthe printer EEPROM, then the printer 30 automatically runs an internalcheck of the print head pass count at step 54 using the counter.

[0053] The printer algorithmically processes the print head pass countat step 45 using an algorithm stored in printer memory to get a uniqueinternal unlocking code number. The printer memory then compares theinternal unlocking code number to the user entered password on the key10 at step 56.

[0054] This separate code number can also be derived from a duplicatealgorithm kept apart from the printer, which also uses count of theevents counted by the printer. If there is a match at step 57 betweenthe internal unlocking code number and the user entered password (orunlocking number), then the printer will proceed with the command atstep 58. if there is not a match at step 59 between the printer internalunlocking code number and the user entered password, then the printerwill abort the command at step 60 and remain locked.

[0055] In the event that a user loses the encoded smart card key ormisplaces their password, the unlocking process in FIG. 10 is followed.As part of the present invention, users encoding the smart card key orenabling the password protection features of the printer contact anoff-site verification location and can send a Personal IdentificationNumber (PIN) . PIN numbers are commonly used in such applications as ATMmachines and for credit cards. PIN applications are well known in theart. Once a PIN number has been established, the user would have toverify the PIN number at step 61 or give some unrefutable evidence thatthe user is entitled to use that printer before any assistance inunlocking the printer would be given. When the user identificationprocess is completed, the user is given a command from the off-sitelocation that allows the print head pass count (or other count) to bedisplayed on a display 14 or printed on an identification card in theprinter, at step 62. The print head pass count is then displayed at step63 either on the LCD display 14 or on the identification card. The userrelays the count selected to the off-site location at step 64. Theoff-site location is anticipated to be the headquarters of the printermanufacturer. The print head pass count is then put through the samealgorithm as at step 55 which is contained in the printer. The resultingunlocking number at step 56 is then given back to the printer operator65. The printer operator then enters the unlocking number in place ofthe user password which starts the internal printer process as describedabove.

[0056] In summary, for unlocking a printer in case of a lost card, thememory in the printer contains an algorithm, which is a numbergenerating algorithm that will provide a discrete output number basedupon an input number the value of which outside the control the operatorof the printer, such as a count of the number of print passes or cardsprinted, which count can be done with an internal counter in theprinter. These numbers can be shown on a display on the printer, upon acommand from the operator (which command also may be known only to themanufacturer) and using the algorithm and the variable number, theprinter can generate a dynamically changing security number or password.

[0057] If the password on the smart card key does not match the passwordin printer memory, the memory in the printer can provide thealgorithmically generated password automatically to see if it matches anoverride password. The override can be inputted from the computer 100,if desired, and if the algorithmically generated number in the printeris matched, then the printer can be operated, and can be used without apassword or a new smart card key can be encoded with a new password thatis generated.

[0058] The algorithm used is discrete for each particular count, andthis permits a party that has lost a smart card key or password to callto the manufacturer, (or other off-site locations) who has the algorithmin memory identified by the printer serial number, and uponidentification of the user, the user can provide the count that is usedas an algorithm input, and the off-site manufacturer then can run thealgorithm with that discrete count inputted and provide a number thatcan be used as a separate auxiliary security unlock. This number can beput into a smart card key that would be provided to the user, or can begenerated in the computer 100 for comparison with the algorithmicallygenerated number from the printer memory using the same algorithm asthat used by the manufacturer. A match then also will disable thesecurity system for operation and for encoding and accepting a newpassword on a new removable memory device or smart card key.

[0059] The algorithm can be a normal number generating algorithm basedupon an input number that varies or changes as the printer is used.

[0060] The removable memory device or card can be provided with apassword in memory so it is a key to permit operation of a printer oranother controllable device that performs operations. The removablememory device or card is a key to operating the controllable device andpermits operation only when the card is associated with the externallyaccessible encoder and a password match is made.

[0061] Although the present invention has been described with referenceto preferred embodiments, workers skilled in the art will recognize thatchanges may be made in form and detail without departing from the spiritand scope of the invention.

What is claimed is:
 1. A method of providing a security key for acontrollable device having internal memory comprising providing anexternally accessible encoder on the controllable device coupled to thecontrollable device memory, providing a removable memory device having aprogrammable memory, programming a password into the memory of thecontrollable device and from the encoder into the memory of theremovable memory device, and removing the removable memory device fromthe encoder for use as a key for the controllable device.
 2. The methodof claim 1 including programming the memory of the removable memorydevice with control functions for operations of the controllable devicein addition to the password.
 3. The method of claim 1, wherein saidremovable memory device comprises a smart card key used in connectionwith an encoder of a printer for unlocking the printer to permitoperation.
 4. A process of controlling printing of a digital image to beprinted onto a substrate in a printer comprising creating the digitalimage on a drive computer for the printer, transmitting the digitalimage to an encoding device coupled to the printer, encoding the digitalimage onto a removable memory carrying device having an integratedcircuit memory for receiving and holding the digital image.
 5. Theprocess of claim 4 further comprising providing the removable memorydevice to a printer input and reading the digital image from theremovable memory device into a printer memory as a print command.
 6. Theprocess of claim 4 further including providing a password in a memory ofthe printer coupled to the encoding device, which matches a password onthe removable memory device, and permitting the digital image to beprinted only when the password in the memory of the printer matches thepassword on the removable memory device.
 7. The process of claim 4further comprising deleting the digital image from the drive computer tocreate a unique digital image encoded onto the removable memory device.8. The process of claim 5 including providing a password in a memory inthe printer coupled to the encoding device, which matches a password onthe removable memory device for enabling the printer and matching withthe password in the memory of the printer and the password on theremovable memory device prior to enabling the printer.
 9. The process ofclaim 7 including providing a serial number in the memory of theprinter, and encoding the serial number into the removable memorydevice, for comparison and matching serial numbers before enabling theprinter.
 10. The process of claim 4 including encoding an algorithm intothe memory of the printer, using the algorithm for generating a numberas a function of an input of a discrete number, the number generated bythe algorithm providing a secondary password for comparison with inputsto the printer memory.
 11. The process of claim 10 and providing thesame algorithm as in the printer memory at an off-site location,counting a discrete dynamically changing parameter in the printer asprinting operations proceed, using the counter output for an input tothe algorithm in the printer memory and in the same algorithm off-siteto provide matching numbers based upon dynamically changing conditionsof the printer.
 12. The process of claim 4 including memory in theprinter to identify presence of a removable memory device in theencoding device.
 13. A process for unlocking a password protected secureprinter comprising providing a printer that contains memory forcomparing an internal password with an externally inputted passwordstored in printer memory that generates a number as a function of aninput number, providing the same algorithm in a memory at a locationsecured from said printer, counting events of the printer that changedynamically as printing operations occur, determining the count of suchevents, and generating numbers separately using the algorithm in theprinter and the algorithm at the location secure from the printer, andcomparing such numbers as passwords for unlocking printer operationswhen a match occurs.
 14. The process of claim 13 further including adrive computer for the printer, inputting the number generated at thealgorithm secure from the printer into the computer for comparison withthe number generated by the printer memory for determining if printingoperations should proceed.
 15. The process of claim 13 and generating anumber from the algorithm in the printer memory whenever a print commandis provided to the printer and the printer remains unenabled.
 16. Theprocess of claim 13, wherein the number provided as an input to both ofthe algorithms is a number representing printing head passes made by theprinter head at a selected time.
 17. The process of claim 13, whereinthe number provided as an input to both of the algorithms is a numberrepresenting items printed by the printer at a selected time.
 18. Theprocess of providing unique printing information keyed to a removablememory device key including providing a printer having memorycapabilities and an encoding device coupled to the printer memory forencoding from an integrated circuit on a removable memory device key,using a host computer to input digital information onto the removablememory device key to provide commands to the printer, providing apassword in the printer memory and on the removable memory device key,and printing the digital information from the removable memory devicekey only when the password on the removable memory device key and in theprinter memory match.
 19. A removable memory device key for a printercomprising a device having a programmable memory thereon, an encoder forencoding a password on the memory device, the password being used inconnection with the printer for permitting operations of the printerwhen the password matches a password in the printer.
 20. A printerhaving a memory therein and being operable in response to an unlockingcode contained in the printer memory comprising a password, an encoderon said printer, having a portion that is externally accessible, and aremovable memory device for associating with said encoding device, saidremovable memeory device carrying a programmable memory for receivingthe password and subsequently for controlling printer operation onlywhen the memory device is accessed to the encoder and the password inthe printer memory is matched to the password of the removable memorydevice.
 21. The printer of claim 20, wherein the printer has an accessslot, and the device accesses the encoder by insertion into the slot.