Methods and apparatus for secure document printing

ABSTRACT

A secure document printing system is provided. A policy server is used to define access rules for a document, and select individual users and/or groups that will have access to the document. The policy server stores the access rules along with a document decryption key. The policy server&#39;s name and address are packed in the document, and then encrypted and sent to a print server which stores it for later access. A recipient is notified that the document resides on a particular print server. The print server retrieves the specified document, contacts the policy server named in the document, and requests the document decryption key and access rules for the user, print server, and document from the policy server which replies with the related decryption key and access rules. The print server decrypts the document and prints the document based on the access rules.

BACKGROUND OF THE INVENTION

[0001] 1. Technical Field

[0002] The invention relates to the printing of documents in a computerenvironment. More particularly, the invention relates to the secureprinting of documents in a networked printer environment.

[0003] 2. Description of the Prior Art

[0004] Referring to FIG. 1, the way users print documents has remainedfairly standard among the years. Not much has changed in the procedureof the user obtaining a document at a computer 101 and sending thedocument across a network or other type of connection 102 to a printer103 for printing. The printer 103 prints the document which the usereventually retrieves.

[0005] With respect to FIG. 2, the user 201 also prints documentsthrough a server 202, such as a document server or print server. When adocument server 202 is used, the user 201 selects a document resident onthe server 202 for printing. The server 202 connects to the printer 203and sends the document to be printed to the printer 203 which prints thedocument.

[0006] A print server 202 acts as an intermediary between the user 201and the printer 203. The print server 202 receives a document from theuser 201, processes or rasterizes the document, and sends it to theprinter 203. The printer 203 receives the processed or rasterizeddocument and prints the document.

[0007] Printing documents in a secure environment has typically beenperformed using the document server approach. A user accesses a documenton the document server and attempts to print it. The document serverchecks to see if the user has permission to print the document and, ifthe user does have permission, sends the document to the appropriateprinter.

[0008] The document permission parameters used by the document serverare set by the document creator or system administrator.

[0009] However, this approach requires that the document server senddocuments to a printer over an open network, leaving the server/printerconnection insecure. Further, the document permission parameters are setfor the entire document without any further granularity, e.g., on a perpage basis.

[0010] It would be advantageous to provide a secure document printingsystem that provides for the secure transportation of documentsthroughout a network. It would further be advantageous to provide asecure document printing system that allows document creators to defineaccess rules for a document on a per page basis.

SUMMARY OF THE INVENTION

[0011] The invention provides a secure document printing system. Thesystem provides a secure document transport and storage mechanism in acomputer network. In addition, the invention provides a system thatallows document creators to define access rules for a document on a perpage basis.

[0012] A preferred embodiment of the invention provides a securetransport and printing environment. A user creates a document using anyapplication program. The invention provides a policy server that theuser logs onto to define access rules for the document. The user selectsindividual users and/or groups that may have access to the document,defines access rules for each user or group, and specifies printingrestrictions for the entire document or certain pages. Access rules thathave been defined for the document are assembled by the policy serverwhich stores them locally along with a document decryption key. Thepolicy server is network accessible to allow the user to change theaccess rules for a document throughout the lifetime of the document.

[0013] The user's computer packages the policy server's name and addressinto the document and encrypts the document. The user selects a printserver provided by the invention and sends the encrypted document to theprint server which stores the encrypted document on its local storagefor later access.

[0014] A receiving user is notified that the document resides on aparticular print server via email, for example. When the receiving userwants to print the document, the receiving user logs onto the printserver. The print server retrieves the specified document, contacts thepolicy server named in the document, and requests the documentdecryption key and access rules for the user, print server, and documentfrom the policy server. The policy server sends the related decryptionkey and access rules to the print server.

[0015] The print server decrypts the document using the decryption keyand then prints the document based on the document or page-level accessrules by sending the printable pages to the printer. If the user orprint server does not have the proper access rights to print thedocument, then the user will be notified that the document is notprintable.

[0016] Another preferred embodiment of the invention provides the printserver functionality in a user's networked computer.

[0017] Yet another preferred embodiment of the invention allows users toreceive encrypted documents from other users. The receiving user sends aprint request to one of the invention's print servers. The print serverretrieves the encrypted document from the receiving user's computer andperforms the functions described above.

BRIEF DESCRIPTION OF THE DRAWINGS

[0018]FIG. 1 is a block schematic diagram showing a prior art approachof printing a document across a network according to the invention;

[0019]FIG. 2 is a block schematic diagram showing a prior art approachof printing a document through a print server according to theinvention;

[0020]FIG. 3 is a block schematic diagram of a preferred embodiment ofthe invention using a policy server and a print server to perform securedocument printing according to the invention;

[0021]FIG. 4 is a block schematic diagram of a preferred embodiment ofthe invention using a receiving user's computer and a policy server toperform secure document printing according to the invention;

[0022]FIG. 5 is a block schematic diagram of a preferred embodiment ofthe invention using a receiving user's computer, a policy server, and aprint server to perform secure document printing according to theinvention;

[0023]FIG. 6 is a block schematic diagram of a task viewpoint of apreferred embodiment of the invention showing the policy server andprint server/receiving user's computer interactions according to theinvention; and

[0024]FIG. 7 is a block schematic diagram of a task viewpoint of apreferred embodiment of the invention showing the interactions between apolicy server, print server, and receiving user's computer according tothe invention.

DETAILED DESCRIPTION OF THE INVENTION

[0025] The invention is embodied in secure document printing system in acomputer environment. A system according to the invention provides asecure document transport and storage mechanism in a computer network.In addition, the invention provides a system that allows documentcreators to define access rules for a document on a per page basis.

[0026] The invention provides a system that allows users to securelytransmit documents to a printer and have full control over who canaccess and print the document at the printer. The document creator isgiven full control over the printing accessibility of each page in thedocument for groups and individual users.

[0027] Other approaches allow users to encrypt documents and send theencrypted documents to a printer. The printer decrypts the documents andprints the entire document. The invention offers a distinct advantageover the prior art by providing an encryption key and access rightsexternal from the printer and independent from the transmission path ofthe actual encrypted file. This offers a more secure environment where adifferent encryption key can be used for each individual document.Additionally, the document creator has the ability to define accessrights for the entire document as well as at the page level.

[0028] Referring to FIG. 3, a preferred embodiment of the invention isshown. A user produces a document on a computer 301. The document can becreated using any application program. The user then logs onto thepolicy server 302 and designates the document to be a secure document.The user then selects individual users and/or groups that may haveaccess to the document. Access rules are defined for each user or groupthat is given access to the document. The user specifies if there areprinting restrictions to the entire document or certain pages. Forexample, if the user has a document that is 100 pages, he can giveaccess to certain pages to certain users.

[0029] The policy server 302 assembles the access rules 306 that havebeen defined for the document and stores them on a local storage devicealong with a document decryption key. Access rules contain informationsuch as: the user list (groups, individuals); the access rules for eachentry in the user list, e.g., cannot print after Dec. 2, 2010, can onlyprint two times, unlimited printing, etc.; and the scope of each rule,e.g., all of the document, specific page of document, range of pages ofdocument. For example, document X has 100 pages, only page five isprintable before Dec. 2, 2010 by user A and can only be printed twotimes. The policy server 302 is network accessible to allow the user tochange the access rules for a document once it leaves the computer 301.The user logs onto the policy server 302 and changes the access rulesfor the document. The invention thereby allows the user to have controlover the print access rules of the document for the lifetime of thedocument.

[0030] The user's computer 301 packages the policy server's name andaddress into the document and encrypts the document. The user selectsthe desired print server 303 and sends the encrypted document 307 to theprint server 303. Print server 303 stores the encrypted document on itslocal storage for later access. The document can also be sent to theprint server 303 on a one-time basis for printing.

[0031] A receiving user is notified that the document resides on aparticular print server 303 via email, for example. When the receivinguser wants to print the document, the receiving user logs onto the printserver 303 through the print server's user interface 304. The printserver 303 either lists the files that are resident on its local storageand allows the receiving user to select the desired document or has thereceiving user type in the name of the document. If the print serverdoes not have the document that the user is interested in, then it maybe resident in another print server in the network.

[0032] The print server 303 retrieves the specified document andcontacts the policy server 302 named in the document. The print server303 requests the document decryption key and access rules for the userand document, e.g. using a document ID, from the policy server 302. Thepolicy server 302 references the document, user, and print server 303IDs to retrieve the decryption key and access rules for the document,and sends the related decryption key and access rules 308 to the printserver 303.

[0033] The print server 303 receives the decryption key and access rulesfrom the policy server 302. The document is decrypted by the printserver 303 using the decryption key. It then prints the document basedon the document or page-level access rules by sending the printablepages to the printer 305. If the user or print server 303 does not havethe proper access rights to print the document, then the user isnotified that the document is not printable.

[0034] With respect to FIG. 4, another embodiment of the inventionprovides a computer 403 that sits in front of a printer 405. Thecomputer 403 accepts all encrypted documents 407 from document creators401 destined for the printer 405. Printing software 404 stores theencrypted document on the computer's 403 local storage for later access.

[0035] A receiving user is notified that the document resides on aparticular computer 403 via email, for example. When the receiving userwants to print the document, the receiving user logs onto the computer403, accessing the printing software 404. The printing software 404either lists the files that are resident on its local storage and allowsthe receiving user to select the desired document or has the receivinguser type in the name of the document.

[0036] The printing software 404 retrieves the specified document andcontacts the policy server 402 across the network, such as the Internet,using the IP address or URL contained in the document. The printingsoftware 404 requests the decryption key and access rules for user anddocument, e.g. using a document ID, from the policy server 402. Thepolicy server 402 references the document, user, and computer 403 IDs toretrieve the decryption key and access rules for the document, and sendsthe related decryption key and access rules 409 across the network 408to the printing software 404.

[0037] The printing software 404 receives the decryption key and accessrules from the policy server 402. The document is decrypted by theprinting software 404 using the decryption key. The printing software404 then prints the document based on the document or page-level accessrule by sending the printable pages to the printer 405. If the user orcomputer 403 does not have the proper access rights to print thedocument, then the user is that the document is not printable.

[0038] This allows any printer to be used. The policy server 402 cankeep track of which computers can print the document and it can alsotrack which printer that the computer is connected to can print thedocument.

[0039] For example, an email with a document attached is sent to a user.The user accesses the email on his PC. The user clicks on the emailattachment and indicates that he wants to print the document. The PCperforms the print server functionality. All of the PC's printoperations are changed to perform the decryption and access rule checksfor any document.

[0040] Referring to FIG. 5, yet another preferred embodiment allows theoriginating user 501 to download an encrypted document 507 to a computer504. The receiving user 504 then logs onto the print server 503 andtells the print server 503 that he wants to print a specific document.The print server 503 retrieves the encrypted document 509 from thecomputer 504 and contacts the policy server 502 named in the document.The print server 503 requests the decryption key and access rules forthe user and document, e.g. using a document ID, from the policy server502. The policy server 502 references the document, user, and printserver 503 IDs to retrieve the decryption key and access rules for thedocument, and sends the related decryption key and access rules 508 tothe print server 503.

[0041] The print server 503 receives the decryption key and access rulesfrom the policy server 502. The document is decrypted by the printserver 503 using the decryption key. It then prints the document basedon the document or page-level access rule by sending the printable pagesto the printer 505. If the user or print server 503 does not have theproper access rights to print the document, then the user is notifiedthat the document is not printable.

[0042] This allows the invention to work in computer and printingsystems anywhere in the world.

[0043] With respect to FIG. 6, a task viewpoint of a preferredembodiment the invention is shown. The user defines the access rules fora document through the Define Access Rules module 604. The Define AccessRules module 604 communicates with the Create Access Rules module 601 tocreate the access rules for the document. The user selects individualusers and/or groups that may have access to the document. He definesaccess rules for each user or group that is given access to thedocument. The user also specifies if there are printing restrictions tothe entire document or certain pages and, if desired, the print serversand/or computers that are allowed to perform the print process. TheCreate Access Rules module 601 stores the document's access rules in itslocal storage 602. The access rules for the document can always bemodified by the user through the Define Access Rules module 604 and theCreate Access Rules module 601 during the lifetime of the document.

[0044] When the user is ready to send the document to another computeror print server, the Deliver Document module 605 encrypts the document,inserts the policy server's name, IP address, or URL address into thedocument, and sends the package to the destination.

[0045] The Receive Encrypted Document module 606 receives encrypteddocuments and places them in local storage 607 for later access andprinting. The receiving user accesses the documents stored on thecomputer or print server through the User Interface module 608. Thereceiving user logs into the User Interface module 608 which eitherdisplays all of the documents that are available to that user, allowingthe user to select the desired document, or has the user enter thedesired document's name. The Get Document Access Rules module 609gathers the document ID from the local storage 607, print server orcomputer name or ID, and user name or ID and requests the access rulesfor the document from the Retrieve Access Rules module 603.

[0046] Access rules and the decryption key for the document areretrieved from local storage 602 by the Retrieve Access Rules module603. The Retrieve Access Rules module 603 extracts the access rules forthe receiving user and the print server or computer, e.g. a print servermay not be in the group of print servers that are allowed to print thedocument, and sends the access rules and decryption key to the GetDocument Access Rules module 609.

[0047] The access rules, decryption key, and document (from the localstorage 607) are sent to the Print Document Pages module 610 by the GetDocument Access Rules module 609. The Print Document Pages module 610prints the document based on the document or page-level access rule bysending the printable pages to a printer. If the user or print server orcomputer does not have the proper access rights to print the document,then the user is notified that the document is not printable by thePrint Document Pages module 610 through the User Interface module 608.

[0048] Referring to FIG. 7, a task viewpoint of another preferredembodiment of the invention with a remote computer as the encrypteddocument receiver is shown. The user defines the access rules for adocument through the Define Access Rules module 704. The Define AccessRules module 704 communicates with the Create Access Rules module 701 tocreate the access rules for the document. The Create Access Rules module701 stores the document's access rules in its local storage 702. Asdescribed above, the access rules for the document can always bemodified by the user through the Define Access Rules module 704 and theCreate Access Rules module 701 for the life of the document.

[0049] When the user is ready to send the document to another user, theDeliver Document module 705 encrypts the document, inserts the policyserver's name, IP address, or URL address into the document, and sendsthe package to the destination.

[0050] The Receive Encrypted Document module 706 or the email program onthe receiving user's computer receives encrypted documents and placesthem in local storage 707 for later access and printing. The receivinguser accesses the documents stored on his computer and requests theprinting of the document through the Print Request module 708. The PrintRequest module 708 may be accessible through the receiving user's emailprogram. The Print Request module 708 sends the print request to the GetDocument Access Rules module 709 on a print server.

[0051] The Get Document Access Rules module 709 retrieves the encrypteddocument and user name or ID from the Print Request module 708 andstores the encrypted document on local storage 711. It then gathers thedocument ID, print server name or ID, and user name or ID and requeststhe access rules for the document from the Retrieve Access Rules module703.

[0052] Access rules and the decryption key for the document areretrieved from local storage 702 by the Retrieve Access Rules module703. The Retrieve Access Rules module 703 extracts the access rules forthe receiving user and the print server, e.g. a print server may not bein the group of print servers that are allowed to print the document,and sends the access rules and decryption key to the Get Document AccessRules module 709.

[0053] The access rules, decryption key, and document (from the localstorage 711) are sent to the Print Document Pages module 710 by the GetDocument Access Rules module 709. The Print Document Pages module 710prints the document based on the document or page-level access rule bysending the printable pages to a printer. If the user or print serverdoes not have the proper access rights to print the document, then theuser is notified that the document is not printable by the PrintDocument Pages module 710 through the Print Request module 708.

[0054] Although the invention is described herein with reference to thepreferred embodiment, one skilled in the art will readily appreciatethat other applications may be substituted for those set forth hereinwithout departing from the spirit and scope of the present invention.Accordingly, the invention should only be limited by the Claims includedbelow.

1. A method for securely transporting and printing a document in anetworked environment, the method comprising: providing a policy server;wherein a user defines a set of access rules for the document throughthe policy server; wherein the policy server stores the access rules anda decryption key for the document; wherein the access rules apply to anyof: the entire document or individual pages of the document; providing aprint server; providing document encryption means for encrypting thedocument; wherein the encryption means attaches the policy server'sname, IP address, or URL address to the document; sending the encrypteddocument to the print server; wherein the print server stores thedocument locally; and providing notification means for notifying areceiving user of the existence of the document on the print server. 2.The method of claim 1, wherein the receiving user logs onto the printserver to print the document.
 3. The method of claim 1, furthercomprising: providing display means on the print server for displayingthe documents accessible to the receiving user; and wherein thereceiving user has the option to name the specific document to beprinted or to select the specific document to be printed from thedocuments displayed by the display means.
 4. The method of claim 3,wherein the print server requests the access rules for the receivinguser and the print server and the decryption key for the document fromthe policy server named in the document in response to the receivinguser's print request.
 5. The method of claim 4, wherein the policyserver retrieves the document's access rules for the receiving user andprint server and the document's decryption key from local storage andsends them to the print server.
 6. The method of claim 5, furthercomprising: providing document decryption means on the print server fordecrypting the document using the document's decryption key from thepolicy server; providing access rule evaluation means on the printserver for evaluating the access rules for the document in relation tothe receiving user and the print server; and wherein the access ruleevaluation means sends the pages of the document that are printable bythe receiving user and print server to a printer for printing.
 7. Themethod of claim 6, further comprising providing notification means fornotifying the receiving user if the document is not printable.
 8. Themethod of claim 1, wherein the access rules apply to any of: anindividual user and a group of users.
 9. The method of claim 1, whereinthe access rules specify the print servers that are allowed to print thedocument.
 10. The method of claim 1, wherein the access rules define anyof: the expiration date and the maximum number of prints.
 11. The methodof claim 1, wherein the access rules for the document are modifiable bythe user through the life of the document.
 12. A method for securelytransporting and printing a document in a networked environment,comprising: providing a policy server; wherein a user defines a set ofaccess rules for the document through the policy server; wherein thepolicy server stores the access rules and a decryption key for thedocument; wherein the access rules apply to any of: the entire documentor individual pages of the document; providing document encryption meansfor encrypting the document; wherein the encryption means attaches anyof the policy server's name, IP address or URL address to the document;sending the encrypted document to a receiving user's computer; whereinthe receiving user's computer stores the document locally; and providingnotification means for notifying the receiving user of the existence ofthe document on the receiving user's computer.
 13. The method of claim12, wherein the receiving user requests that the document be printed,and wherein the receiving user's computer requests the access rules forthe receiving user and the receiving user's computer and the decryptionkey for the document from the policy server named in the document inresponse to the receiving user's print request.
 14. The method of claim13, wherein the policy server retrieves the document's access rules forthe receiving user and receiving user's computer and the document'sdecryption key from local storage and sends them to the receiving user'scomputer.
 15. The method of claim 14, further comprising: providingdocument decryption means on the receiving user's computer fordecrypting the document using the document's decryption key from thepolicy server; providing access rule evaluation means on the receivinguser's computer for evaluating the access rules for the document inrelation to the receiving user and the receiving user's computer; andwherein the access rule evaluation means sends the pages of the documentthat are printable by the receiving user and receiving user's computerto a printer for printing.
 16. The method of claim 15, furthercomprising providing notification means for notifying the receiving userif the document is not printable.
 17. The method of claim 12, whereinthe access rules apply to any of: an individual user and a group ofusers.
 18. The method of claim 12, wherein the access rules specify theprint servers that are allowed to print the document.
 19. The method ofclaim 12, wherein the access rules define any of: the expiration dateand the maximum number of prints.
 20. The method of claim 12, whereinthe access rules for the document are modifiable by the user through thelife of the document.
 21. A method for securely transporting andprinting a document in a networked environment, the method comprising:providing a policy server; wherein a user defines a set of access rulesfor the document through the policy server; wherein the policy serverstores the access rules and a decryption key for the document; whereinthe access rules apply to any of: the entire document or individualpages of the document; providing a print server; providing documentencryption means for encrypting the document; wherein the encryptionmeans attaches the policy server's name, IP address, or URL address tothe document; sending the encrypted document to a receiving user'scomputer; wherein the receiving user's computer stores the documentlocally; and providing notification means for notifying a receiving userof the existence of the document on the receiving user's computer. 22.The method of claim 21, wherein the receiving user requests that thedocument be printed, and wherein the receiving user's computer sends aprint request to the print server.
 23. The method of claim 22, whereinthe print server retrieves the encrypted document from the receivinguser's computer, and wherein the print server requests the access rulesfor the receiving user and the print server and the decryption key forthe document from the policy server named in the document.
 24. Themethod of claim 23, wherein the policy server retrieves the document'saccess rules for the receiving user and print server and the documentsdecryption key from local storage and sends them to the print server.25. The method of claim 24, further comprising: providing documentdecryption means on the print server for decrypting the document usingthe document's decryption key from the policy server; providing accessrule evaluation means on the print server for evaluating the accessrules for the document in relation to the receiving user and the printserver; and wherein the access rule evaluation means sends the pages ofthe document that are printable by the receiving user and print serverto a printer for printing.
 26. The method of claim 25, furthercomprising providing notification means for notifying the receiving userif the document is not printable.
 27. The method of claim 21, whereinthe access rules apply to any of: an individual user and a group ofusers.
 28. The method of claim 21, wherein the access rules specify theprint servers that are allowed to print the document.
 29. The method ofclaim 21, wherein the access rules define any of: the expiration dateand the maximum number of prints.
 30. The method of claim 21, whereinthe access rules for the document are modifiable by the user through thelife of the document.
 31. Apparatus for securely transporting andprinting a document in a networked environment, the apparatuscomprising: a policy server; wherein a user defines a set of accessrules for the document through the policy server; wherein the policyserver stores the access rules and a decryption key for the document;wherein the access rules apply to any of: the entire document orindividual pages of the document; a print server; document encryptionmeans for encrypting the document; wherein the encryption means attachesthe policy server's name, IP address, or URL address to the document;sending the encrypted document to the print server; wherein the printserver stores the document locally; and notification means for notifyinga receiving user of the existence of the document on the print server.32. The apparatus of claim 31, wherein the receiving user logs onto theprint server to print the document.
 33. The apparatus of claim 31,further comprising: display means on the print server for displaying thedocuments accessible to the receiving user; and wherein the receivinguser has the option to name the specific document to be printed or toselect the specific document to be printed from the documents displayedby the display means.
 34. The apparatus of claim 33, wherein the printserver requests the access rules for the receiving user and the printserver and the decryption key for the document from the policy servernamed in the document in response to the receiving user's print request.35. The apparatus of claim 34, wherein the policy server retrieves thedocument's access rules for the receiving user and print server and thedocument's decryption key from local storage and sends them to the printserver.
 36. The apparatus of claim 35, further comprising: documentdecryption means on the print server for decrypting the document usingthe document's decryption key from the policy server; access ruleevaluation means on the print server for evaluating the access rules forthe document in relation to the receiving user and the print server; andwherein the access rule evaluation means sends the pages of the documentthat are printable by the receiving user and print server to a printerfor printing.
 37. The apparatus of claim 36, further comprisingnotification means for notifying the receiving user if the document isnot printable.
 38. The apparatus of claim 31, wherein the access rulesapply to any of: an individual user and a group of users.
 39. Theapparatus of claim 31, wherein the access rules specify the printservers that are allowed to print the document.
 40. The apparatus ofclaim 31, wherein the access rules define any of: the expiration dateand the maximum number of prints.
 41. The apparatus of claim 31, whereinthe access rules for the document are modifiable by the user through thelife of the document.
 42. Apparatus for securely transporting andprinting a document in a networked environment, the apparatuscomprising: a policy server; wherein a user defines a set of accessrules for the document through the policy server; wherein the policyserver stores the access rules and a decryption key for the document;wherein the access rules apply to any of: the entire document orindividual pages of the document; document encryption means forencrypting the document; wherein the encryption means attaches any ofthe policy server's name, IP address or URL address to the document;sending the encrypted document to a receiving user's computer; whereinthe receiving user's computer stores the document locally; andnotification means for notifying the receiving user of the existence ofthe document on the receiving user's computer.
 43. The apparatus ofclaim 42, wherein the receiving user requests that the document beprinted, and wherein the receiving user's computer requests the accessrules for the receiving user and the receiving user's computer and thedecryption key for the document from the policy server named in thedocument in response to the receiving user's print request.
 44. Theapparatus of claim 43, wherein the policy server retrieves thedocument's access rules for the receiving user and receiving user'scomputer and the document's decryption key from local storage and sendsthem to the receiving user's computer.
 45. The apparatus of claim 44,further comprising: document decryption means on the receiving user'scomputer for decrypting the document using the document's decryption keyfrom the policy server; access rule evaluation means on the receivinguser's computer for evaluating the access rules for the document inrelation to the receiving user and the receiving user's computer; andwherein the access rule evaluation means sends the pages of the documentthat are printable by the receiving user and receiving user's computerto a printer for printing.
 46. The apparatus of claim 45, furthercomprising notification means for notifying the receiving user if thedocument is not printable.
 47. The apparatus of claim 42, wherein theaccess rules apply to any of: an individual user and a group of users.48. The apparatus of claim 42, wherein the access rules specify theprint servers that are allowed to print the document.
 49. The apparatusof claim 42, wherein the access rules define any of: the expiration dateand the maximum number of prints.
 50. The apparatus of claim 42, whereinthe access rules for the document are modifiable by the user through thelife of the document.
 51. Apparatus for securely transporting andprinting a document in a networked environment, the apparatuscomprising: a policy server; wherein a user defines a set of accessrules for the document through the policy server; wherein the policyserver stores the access rules and a decryption key for the document;wherein the access rules apply to any of: the entire document orindividual pages of the document; a print server; document encryptionmeans for encrypting the document; wherein the encryption means attachesthe policy server's name, IP address, or URL address to the document;sending the encrypted document to a receiving user's computer; whereinthe receiving user's computer stores the document locally; andnotification means for notifying a receiving user of the existence ofthe document on the receiving user's computer.
 52. The apparatus ofclaim 51, wherein the receiving user requests that the document beprinted, and wherein the receiving user's computer sends a print requestto the print server.
 53. The apparatus of claim 52, wherein the printserver retrieves the encrypted document from the receiving user'scomputer, and wherein the print server requests the access rules for thereceiving user and the print server and the decryption key for thedocument from the policy server named in the document.
 54. The apparatusof claim 53, wherein the policy server retrieves the document's accessrules for the receiving user and print server and the document'sdecryption key from local storage and sends them to the print server.55. The apparatus of claim 54, further comprising: document decryptionmeans on the print server for decrypting the document using thedocument's decryption key from the policy server; access rule evaluationmeans on the print server for evaluating the access rules for thedocument in relation to the receiving user and the print server; andwherein the access rule evaluation means sends the pages of the documentthat are printable by the receiving user and print server to a printerfor printing.
 56. The apparatus of claim 55, further comprisingproviding notification means for notifying the receiving user if thedocument is not printable.
 57. The apparatus of claim 51, wherein theaccess rules apply to any of: an individual user and a group of users.58. The apparatus of claim 51, wherein the access rules specify theprint servers that are allowed to print the document.
 59. The apparatusof claim 51, wherein the access rules define any of: the expiration dateand the maximum number of prints.
 60. The apparatus of claim 51, whereinthe access rules for the document are modifiable by the user through thelife of the document.