US20080092231A1 - Image forming apparatus, user authentication system, control program and computer-readable storage medium for operating image forming apparatus - Google Patents
Image forming apparatus, user authentication system, control program and computer-readable storage medium for operating image forming apparatus Download PDFInfo
- Publication number
- US20080092231A1 US20080092231A1 US11/974,872 US97487207A US2008092231A1 US 20080092231 A1 US20080092231 A1 US 20080092231A1 US 97487207 A US97487207 A US 97487207A US 2008092231 A1 US2008092231 A1 US 2008092231A1
- Authority
- US
- United States
- Prior art keywords
- forming apparatus
- image forming
- available
- function
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000000284 extract Substances 0.000 claims abstract description 24
- 230000006870 function Effects 0.000 claims description 167
- 238000004891 communication Methods 0.000 claims description 39
- 239000000344 soap Substances 0.000 claims description 4
- 238000007405 data analysis Methods 0.000 description 41
- 238000000034 method Methods 0.000 description 24
- 230000000875 corresponding effect Effects 0.000 description 16
- 238000004458 analytical method Methods 0.000 description 6
- 230000015654 memory Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000001276 controlling effect Effects 0.000 description 2
- 230000002596 correlated effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
Definitions
- the present invention relates to an image forming apparatus that limits available functions in accordance with users who use the image forming apparatus, a user authentication system, and a control program and computer-readable storage medium for operating an image forming apparatus.
- a copy-machine system has been built in which (i) a multifunction printer (MFP) having a combination of two or more functions such as a print function, a copy function, a scanning function, and a facsimile function and (ii) a control terminal (sever PC) are linked with each other via a network so that the MFP is controlled. Further, some MFPs are provided with a function of limiting users to specific MFP functions.
- MFP multifunction printer
- Patent Document 1 Japanese Unexamined Patent Application Publication No. 509751/2003 (Tokuhyo 2003-509751; published on Mar. 11, 2003) discloses a method of verifying the authenticity of a document by making a comparison between (i) an identifying feature/seal read out by scanning the document and (ii) information stored in a database.
- Patent Document 2 Japanese Unexamined Patent Application Publication No. 14591/2005 (Tokukai 2005-14591; published on Jan. 20, 2005 discloses a system in which a printer receives print data containing user information, sends the user information to a printer control terminal together with an authentication request, and carries out printing in accordance with the print data upon receiving authentication notification from the printer control terminal.
- Patent Documents 1 and 2 can only invalidate all the functions in cases where the disqualification of a user is verified by analyzing authentication data obtained from image data. Further, those techniques give no consideration to a case where the image data contains plural pieces of authentication data.
- the present invention has been made in view of the foregoing problems, and it is an object of the present invention to realize an image forming apparatus that can validate or invalidate each function in accordance with users by analyzing authentication data. Further, it is another object of the present invention to realize an image forming apparatus that makes it possible to appropriately limit functions even in cases where image data contains plural pieces of authentication data.
- an image forming apparatus includes: reading means for reading a document as image data; extracting means for extracting, from the image data, authentication data by which a user is identified; communication means for sending the authentication data to an image forming apparatus control terminal that recognizes a function available to the user identified by the authentication data, and for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- a user authentication system includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives authentication data, extracted from the image forming apparatus, by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- authentication data by which a user is identified is extracted from the image data, and the authentication data thus extracted is sent to an image forming apparatus control terminal that recognizes a function available to the identified uses.
- the image forming apparatus control terminal uses the authentication data to recognize a function available to a user who can be identified. Therefore, upon receiving available-function data indicative of a result of the recognition, the image forming apparatus can choose, in accordance with the available-function data, a function that is available in the image forming apparatus.
- authentication data here refers to any data by which a user can be identified (specified) at the image forming apparatus control terminal. Examples of the authentication data include seal image data obtained by reading a seal.
- the arrangement and the system make it possible to choose an available function in accordance with a user identified by authentication data. This makes it possible to validate or invalidate each function of the image forming apparatus in accordance with a user.
- the document contains authentication data corresponding a holder of the document (e.g., when the document has a seal put thereto as authentication data), even a user who is different from the holder is allowed to use a function of the image forming apparatus on behalf of the holder.
- an image forming apparatus includes: reading means for reading a document as image data; communication means (a) for sending the image data to an image forming apparatus control terminal that extracts, from the image data, authentication data by which a user is identified, and that recognizes a function available to the user identified by the authentication data, and (b) for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- a user authentication system includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives the image data created by the image forming apparatus, that extracts, from the image data, authentication data by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- the image data is sent to the image forming apparatus control terminal.
- the image forming apparatus control terminal extracts, from the image data, authentication data by which a user is identified, and recognizes a function available to the user identified by the extracted authentication data. Therefore, upon receiving available-function data indicative of a result of the recognition, the image forming apparatus can choose, in accordance with the available-function data, a function that is available in the image forming apparatus.
- the arrangement and the system makes it possible to choose an available function in accordance with a user identified by authentication data. This makes it possible to validate or invalidate each function of the image forming apparatus in accordance with a user.
- the document contains authentication data corresponding a holder of the document (e.g., when the document has a seal put thereto as authentication data), even a user who is different from the holder is allowed to use a function of the image forming apparatus on behalf of the holder.
- FIG. 1 is a block diagram showing a structure of a user authentication system including an image forming apparatus according to an embodiment of the present invention.
- FIG. 2 is a flow chart showing a flow of a basic process that is carried out in the authentication system.
- FIG. 3 is a flow chart, showing a flow of a process that branches off from the flow chart of FIG. 2 , which applies to a case where users are not arranged in order of priority.
- FIG. 4 is a flow chart, showing a flow of a process that branches off from the flow chart of FIG. 2 , which applies to a case where users are arranged in order of priority.
- FIGS. 5( a ) through 5 ( d ) are diagrams each showing an example of a user authentication table.
- FIGS. 6( a ) through 6 ( c ) are diagrams each showing an example of authentication data.
- FIGS. 7( a ) through 7 ( d ) are diagrams each showing an example of a document containing authentication data.
- FIG. 1 is a block diagram showing a structure of a main part of the image forming apparatus 100 and a structure of a main part of the control terminal (image forming apparatus control terminal) 110 .
- the present embodiment is such that the image forming apparatus 100 and the control terminal 110 constitute an authentication system 120 .
- the image forming apparatus 100 includes an image reading section (reading means) 101 , a control section (control means) 102 , an image processing section 103 , an operation/display section 104 , and a communication section (communication means) 105 .
- the image reading section 101 is a block that creates image data by reading a document.
- the control section (control means) 102 is a block that exercises control over the operation of each of the components of the image forming apparatus 100 in accordance with a computer program. Further, the control section 102 includes an available-function choosing section (available-function choosing means) 1021 that chooses, in accordance with available-function data received from the control terminal 110 via the communication section 105 , a function that is available in the image forming apparatus 100 .
- available-function data will be described later.
- the image processing section 103 is a block that performs various types of image processing under the control of the control section 102 in response to a user's input sent from the operation/display section 104 or in response to an external input. Further, the image processing section 103 includes an authentication data extracting section 1031 that extracts, from the image data created by the image reading section 101 , authentication data by which a user is identified.
- authentication data here refers to any data that enables the control terminal 110 to identify a user (to specify a user). Examples of the authentication data may include seal image data obtained by reading a seal.
- the operation/display section 104 provides a user with a user interface.
- the operation/display section 104 is a block that displays various screens, various manual operation buttons, and the like; receives operation input signals, sent from a user via the displayed manual operation buttons, which causes the image forming apparatus 100 to be set or to be given operation instructions; and sends the operation input signals to the control section 102 .
- the operation/display section 104 is constituted, for example, by a flat display panel such as a liquid crystal display element.
- the operation/display section 104 is here realized as a touch panel, but may be provided with separate operation and display sections.
- the communication section (communication means) 105 is a block that communicates with the outside, or with the control terminal 110 in particular.
- the communication may take the form of cable communication or wireless communication, and there may be provided a dedicated line for use in communication with the control terminal 110 .
- the communication section 105 exchanges commands with the control terminal 110 , sends the extracted authentication data to the control terminal 110 , and receives the available-function data from the control terminal 110 .
- the control terminal 110 includes a control section 111 , an authentication data saving section 112 , a communication section 117 , and an authentication data analysis section 118 .
- the control section 111 exercises control over the operation of each of the components of the control terminal 110 in accordance with a computer program.
- the communication section 117 is a block that communicates with the outside, or with the image forming apparatus 100 in particular.
- the communication section 117 exchanges commands with the image forming apparatus 100 , receives the authentication data from the image forming apparatus 100 , and sends the available-function data to the image forming apparatus 100 .
- the authentication data analysis section 118 is a block that recognizes, in accordance with the authentication data received by the communication section 117 , a function that is available to a user identified by the authentication data.
- the authentication data saving section 112 contains a user database (user authentication table) 113 that correlates, with each user identified by the authentication data, a function that is available in the image forming apparatus 100 .
- the authentication data analysis section 118 performs the recognition in accordance with the user database 113 and the received authentication data.
- Examples of the function that is available to the user, i.e., of the available function include, but are not limited to, a copy function, a Scan To E-Mail function of sending read image data as an e-mail, a FAX function, and an Internet FAX function of sending mail to which image data has been attached, and may include any function that is available in the image forming apparatus 100 .
- a process that is carried out in the authentication system 120 will be described below with reference to the flow charts respectively shown in FIGS. 2 through 4 .
- users identified by authentication data are not arranged in order of priority.
- Each of the flow charts respectively shown in FIGS. 2 and 3 explains a process of making available a function of the image forming apparatus which function is available to any one of the users, or of making available a function of the image forming apparatus which function is available to all the authenticated users.
- the operation/display section 104 displays a message that encourages reading of a document for use in user authentication.
- a user places the document on the image reading section 101 of the image forming apparatus 100 , and then carries out an input that instructs the image reading section 101 to read the document (e.g., presses a scan button). Then, the image reading section 101 reads the document as image data (S 200 ).
- the image forming apparatus 100 uses the image processing section 103 to extract authentication data from the image data (S 201 ). Then, the authentication data is sent from the communication section 105 to the control terminal 110 (S 202 ).
- the communication section 117 receives the authentication data, and the authentication data analysis section 118 judges whether or not the authentication data includes plural pieces of authentication data (S 203 ).
- the authentication data analysis section 118 judges that the authentication data does not include plural pieces of authentication data (i.e., is a single piece of authentication data) (NO in S 203 )
- the authentication data analysis section 118 analyzes the authentication data (S 204 ). Then, as a result of the analysis of the authentication data, the authentication data analysis section 118 judges whether user information (being herein supposed to be a user name) corresponding to the authentication data is contained in the user database 113 saved in the authentication data saving section 112 (S 205 ).
- the authentication data analysis section 118 judges that such user information is contained in the user database 113 (YES in S 205 ), the authentication data analysis section 118 extracts available-function information corresponding to the user information (S 207 ). This means that the authentication data analysis section 118 recognizes a function that is available to a user identified by the received authentication data.
- the available-function information (information on the available function thus recognized) extracted in S 207 i.e., available data is sent from the communication section 117 of the control terminal 110 to the communication section 105 of the image forming apparatus 100 (S 208 ).
- the authentication data analysis section 118 judges, as a result of the analysis of the authentication data, that no user information corresponding to the authentication data is contained in the user database 113 saved in the authentication data saving section 112 (NO in S 205 ), the authentication data analysis section 118 generates such available data that it is recognized that all the functions of the image forming apparatus 100 are disabled (S 206 ). Then, the data is sent from the communication section 117 of the control terminal 110 to the communication section 105 of the image forming apparatus 100 (S 208 ).
- the available-function choosing section 1021 of the control section 102 analyzes the available data received by the communication section 105 , thereby choosing a function that is available in the image forming apparatus 100 .
- the operation/display section 104 displays a result accordingly (S 209 ).
- the operation/display section 104 displays a result accordingly. Further, if there is an available function, the operation/display section 104 indicates that the function is available.
- the image forming apparatus 100 processes, within a range of available functions, the document read in S 200 .
- the image forming apparatus 100 may permit the user to send the statement of final decision to another apparatus via FAX or Internet FAX, but may prohibit the user from sending the statement of final decision via Scan To E-Mail, which is vulnerable to theft of information, or from duplicating (copying) the statement of final decision.
- the available functions may include print functions such as an N-up function, a double face printing function, and a stapling function.
- the image forming apparatus 100 may prohibit an N-up function and a double face printing function with respect to the important document, and may permit only a color printing function with respect to the important document.
- the authentication data analysis section 118 judges, in S 203 , that the authentication data received by the communication section 117 includes plural pieces of authentication data (YES in S 203 ).
- the authentication data analysis section 118 analyzes each of the plural pieces of authentication data as shown in FIG. 3 (S 210 ). As a result of the analysis, the authentication data analysis section 118 judges whether or not user information corresponding the authentication data is contained in the user database 113 saved in the authentication data saving section 112 (S 211 ). In cases where the authentication data analysis section 118 judges that such user information is contained in the user database 113 (YES in S 211 ), the authentication data analysis section 118 extracts an available function correlated with the user information (S 212 ).
- the authentication data analysis section 118 judges whether or not all the pieces of authentication data have been analyzed (S 213 ). In cases where not all the pieces of authentication data have been analyzed (NO in S 213 ), the process returns to S 210 , in which the authentication data analysis section 118 analyzes the next piece of authentication data.
- the authentication data analysis section 118 judges whether or not there is user information corresponding to any one of the pieces of the authentication data (S 214 ).
- the authentication data analysis section 118 In cases where none of the pieces of authentication data matches user information saved in the user database 113 of the authentication data saving section 112 (NO in S 214 ), the authentication data analysis section 118 generates such available data that it is recognized that all the functions of the image forming apparatus 100 are disabled (S 215 ), and the process proceeds to S 208 of FIG. 2 so that the data is sent to the image forming apparatus 100 .
- the authentication data analysis section 118 judges whether or not the use of a function that is available to any one of the matched users is permitted (S 216 ). In cases where the authentication data analysis section 118 judges that the use of a function that is available to any one of the matched users is permitted (YES in S 216 ), the authentication data analysis section 118 extracts all the functions that are assigned to each user identified by the authentication data (S 217 ). Then, the authentication data analysis section 118 generates such available data that it is recognized that those functions are available, and the process proceeds to S 208 of FIG. 2 so that the data is sent to the image forming apparatus 100 .
- the authentication data analysis section 118 extracts functions that are available to all the users identified by the authentication data (S 218 ). Then, the authentication data analysis section 118 generates such available data that it is recognized that those functions are available, and the process proceeds to S 208 of FIG. 2 so that the data is sent to the image forming apparatus 100 .
- the steps S 200 through S 209 of FIG. 2 are the same as those described above.
- the authentication data analysis section 118 judges, in S 203 , that the authentication data includes plural pieces of authentication data
- the authentication data analysis section 118 analyzes each of the plural pieces of authentication data as shown in FIG. 4 (S 221 ).
- the authentication data analysis section 118 judges whether or not user information corresponding to the authentication data is contained is the user database 113 saved in the authentication data saving section 112 (S 222 ).
- the authentication data analysis section 118 extracts an available function correlated with the user information (S 223 ).
- the authentication data analysis section 118 judges whether or not all the pieces of authentication data have been analyzed (S 224 ). In cases where not all the pieces of authentication data have been analyzed (NO in S 224 ), the process returns to S 221 , in which the authentication data analysis section 118 analyzes the next piece of authentication data.
- the authentication data analysis section 118 judges whether or not there is user information corresponding to any one of the pieces of authentication data (S 225 ).
- the authentication data analysis section 118 In cases where none of the pieces of authentication data matches user information saved in the user database 113 of the authentication data saving section 112 (NO in S 225 ), the authentication data analysis section 118 generates such available data that it is recognized that all the functions of the image forming apparatus 100 are disabled (S 227 ). Then, the process proceeds to S 208 of FIG. 2 so that the data is sent to the image forming apparatus 100 .
- the authentication data analysis section 118 extracts, from user priority recorded in the user database 113 of the authentication data saving section 112 , available-function information corresponding to a user given the highest priority (S 226 ). Then, the authentication data analysis section 118 generates such available data that it is recognized that a function corresponding to a user given the highest priority is available, and the process proceeds to S 208 of FIG. 2 so that the data is sent to the image forming apparatus 100 .
- FIGS. 6( a ) through 6 ( c ) show authentication data corresponding to authentication data of FIGS. 5( a ) through 5 ( c ), respectively.
- the image forming apparatus 100 reads the document of FIG. 7( a )
- the image forming apparatus 100 extracts “TANAKA” SEAL as authentication data, and then chooses “COPY”, “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions with reference to FIGS. 5( a ) and 6 ( a ) through 6 ( c ).
- the image forming apparatus 100 extracts “SATO” SEAL and “YAMADA” SEAL as authentication data.
- the image forming apparatus 100 chooses “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions with reference to FIG. 5( a ) and FIGS. 6( a ) through 6 ( c ).
- the image forming apparatus 100 extracts “SATO” SEAL and “YAMADA” SEAL as authentication data.
- the image forming apparatus 100 chooses “FAX” as an available function with reference to FIG. 5( b ) and FIGS. 6( a ) through 6 ( c ).
- the image forming apparatus 100 extracts “SATO” SEAL and “YAMADA” SEAL as authentication data.
- FIG. 5( c ) and FIGS. 6( a ) through 6 ( c ) show that the user “SATO” is given higher priority than the user “YAMADA”. Therefore, the image forming apparatus 100 chooses “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions.
- the image forming apparatus 100 extracts “PERSON IN CHARGE” as authentication data.
- the image forming apparatus 100 chooses “COPY” as an available function with reference to FIG. 5( d ).
- the image forming apparatus 100 extracts “PERSON IN CHARGE” and “MANAGER” as authentication data.
- FIG. 5( d ) shows that “MANAGER” is given higher priority than “PERSON IN CHARGE”. Therefore, the image forming apparatus 100 chooses “COPY”, “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions.
- the control terminal 110 may extract authentication data from image data created by the image reading section 101 of the image forming apparatus 100 and sent to the control terminal 110 .
- the authentication data analysis section 118 of the control terminal 110 carries out the process of extracting authentication data.
- the present embodiment is not limited in terms of a format of data exchanged between the image forming apparatus 100 and the control terminal 110 .
- An available example of the format is XML or SOAP. Such a format makes it easy to create and analyze data. Further, encrypted data may be sent.
- the image forming apparatus 100 includes, in addition to the components described above, encrypting/decrypting means for encrypting or decrypting data.
- the present embodiment is not limited in terms of a range within which an available function chosen by the available-function choosing section 1021 is used.
- an available function may only be used with respect to a document used for extracting authentication data.
- the operation/display section 104 it is possible to cause the operation/display section 104 to automatically display a display screen that indicates an authentication mode (i.e., a mode dictating that a document containing authentication data be placed on the image reading section).
- each of the blocks of the image forming apparatus 100 may be constituted by hardware logic, or by software with use of a CPU as follows.
- the image forming apparatus 100 has: (i) the CPU (central processing unit) for executing an instruction of control program realizing various functions; (ii) a ROM (read only memory) storing the program; (iii) a RAM (random access memory) for expanding the program; (iv) a storage device (storage medium) such as a memory storing the program and various data; and (v) the like.
- the object of the present invention also can be achieved by (i) providing, for the image forming apparatus 100 , a storage medium storing, in a computer readable manner, a program code (executable program; intermediate code; source program) of the control program for the present system, and (ii) causing a computer (CPU or MPU) to read and execute the program code stored in the storage medium, the program code being the software realizing the aforementioned functions.
- a computer CPU or MPU
- Examples of the storage medium are: (i) tapes such as a magnetic tape and a cassette tape; (ii) magnetic disks such as a floppy® disk and a hard disk; (iii) optical disks such as a compact disk read only memory (CD-ROM), a magnetic optical disk (MO), a mini disk (MD), a digital video disk (DVD), and a CD-Rewritable (CD-R); (iv) cards such as an IC card (inclusive of a memory card) and an optical card; and (v) semiconductor memories such as a mask ROM, an EPROM (electrically programmable read only memory), an EEPROM (electrically erasable programmable read only memory), and a flash ROM.
- CD-ROM compact disk read only memory
- MO magnetic optical disk
- MD mini disk
- DVD digital video disk
- cards such as an IC card (inclusive of a memory card) and an optical card
- semiconductor memories such as a mask ROM, an
- the image forming apparatus 100 may be connectable to the communication network, and the program code may be supplied via the communication network.
- the communication network is not particularly limited. Specific examples thereof are: the Internet, Intranet, Extranet, LAN (local area network), ISDN (integrated services digital network), VAN (value added network), CATV (cable TV) communication network, virtual private network, telephone network, mobile communication network, satellite communication network, and the like.
- the transmission medium constituting the communication network is not particularly limited.
- the present invention can be realized by (i) a carrier wave realized by electronic transmission of the program code, or (ii) a form of a series of data signals.
- an image forming apparatus includes: reading means for reading a document as image data; extracting means for extracting, from the image data, authentication data by which a user is identified; communication means for sending the authentication data to an image forming apparatus control terminal that recognizes a function available to the user identified by the authentication data, and for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- a user authentication system includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives authentication data, extracted from the image forming apparatus, by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- an image forming apparatus includes: reading means for reading a document as image data; communication means (a) for sending the image data to an image forming apparatus control terminal that extracts, from the image data, authentication data by which a user is identified, and that recognizes a function available to the user identified by the authentication data, and (b) for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- a user identification system includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives the image data created by the image forming apparatus, that extracts, from the image data, authentication data by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- the image forming apparatus may be arranged such that: when the image forming apparatus control terminal is able to identify no user by the authentication data, the available-function choosing means decides that all functions of the image forming apparatus are disabled.
- the image forming apparatus control terminal can identify no user by the authentication data, all the functions of the image forming apparatus are disabled (the functions are invalidated). This makes it possible to prevent a user who cannot be identified by the authentication data (e.g., a user who is not registered in the image forming apparatus control terminal) from using the functions of the image forming apparatus. This makes it possible to ensure security in the use of the functions of the image forming apparatus.
- the image forming apparatus may be arranged such that: when the image forming apparatus control terminal is able to identify a plurality of users by the authentication data, the available-function choosing means decides that a function that is available to any one of the users identified by the authentication data is available.
- a function that is available to at least one of the users identified by the authentication data is made available to the other users identified by the authentication data. For example, in cases where User A can use Functions C and D, where User B can use only Function C, and where Users A and B can be identified by the authentication data, User B is allowed to use Function D (even when it is User B who has caused the image forming apparatus to read the document).
- the phrase “to identify a plurality of users by the authentication data” here may mean “to identify, by plural pieces of authentication data, a plurality of users respectively corresponding the plural pieces of authentication data, or may mean “to identify a plurality of users by a single piece of authentication data”. Examples of the latter include the following: In cases where the authentication data indicates Group E, a plurality of users contained in Group E can be identified by the authentication data alone.
- the image forming apparatus may be arranged such that: when the image forming apparatus control terminal is able to identify a plurality of users by the authentication data, the available-function choosing means decides that a function that is available to all the users identified by the authentication data is available.
- the image forming apparatus control terminal can identify a plurality of users by the authentication data, only a function that is available to all the users identified by the authentication data is made available. For example, in cases where User A can use Functions C and D, where User B can use only Function C, and where Users A and B can be identified by the authentication data, User B can be prevented from using Function D when it is User B who has caused the image forming apparatus to read the document.
- the image forming apparatus may be arranged such that: when the image forming apparatus control terminal is able to identify, by the authentication data, a plurality of users arranged in order of priority, the available-function choosing means chooses an available function in accordance with the order of priority of the users identified by the authentication data.
- the available function is chosen in accordance with the order of priority of the users identified by the authentication data. For example, even if only a given function (e.g., a copy function) can be used in cases where User A can be identified by Authentication Data A contained in a document, another function (e.g., a FAX sending function) can be made available in addition to the function when the document contains Authentication Data B corresponding to User B given higher priority than User A.
- a given function e.g., a copy function
- another function e.g., a FAX sending function
- the image forming apparatus may further include control means for exercising control so that the available function chosen by the available-function choosing means is available only to the document read by the reading means.
- the available function chosen by the available-function choosing means is available only to the document read by the reading means. Therefore, even in cases where the authentication data is a seal put on a document and where a user who uses the image forming apparatus is different from a user who has put the seal on the document, the user who has put the seal can be authorized to prevent use of the function for image data other than the document read by the image forming apparatus (to prevent a process from being carried out with respect to image data other than the document).
- the available data may be described with use of XML or SOAP. This makes it easy to create and analyze the available data.
- the image forming apparatus may further include encrypting/decrypting means for encrypting or decrypting data exchanged between the image forming apparatus and the image forming apparatus control terminal.
- the foregoing arrangement makes it possible to send encrypted data, or to decipher received encrypted data by decrypting the data. This makes it possible to prevent falsification and leakage of data.
- the image forming apparatus may be realized by hardware, or may be realized by causing a computer to execute a program.
- a program according to the present invention is a program for causing a computer to operate as each means of an image forming apparatus having any one of the arrangements, and the program is stored in a computer-readable storage medium according to the present invention.
- each function of the image forming apparatus can be validated or invalidated in accordance with a user on the basis of analyzed authentication data.
- an image forming apparatus may be arranged as expressed below. That is, an image forming apparatus according to the present invention may be an image forming apparatus, provided in a system in which the image forming apparatus is communicably connected to an image forming apparatus control terminal for controlling the image forming apparatus, which authenticates each user to a function.
- the image forming apparatus includes: data reading means for reading a document; authentication data extracting means for extracting authentication data from image data created by the data reading means; and authentication data transmitting means for sending, to the image forming apparatus control terminal, the authentication data extracted by the authentication data extracting means.
- the image forming apparatus control terminal includes: available-function choosing means for choosing an available function in accordance with the authentication data; and available-function data transmitting means for sending, to the image forming apparatus, the available function chosen by the available-function choosing means.
- the image forming apparatus further includes available-function choosing means for choosing, in accordance with available-function data received from the available-function transmitting means, a function that is available in the image forming apparatus.
- an image forming apparatus may be an image forming apparatus, provided in a system in which the image forming apparatus is communicably connected to an image forming apparatus control terminal for controlling the image forming apparatus, which authenticates each user to a function.
- the image forming apparatus includes: data reading means for reading a document; and image data transmitting means for transmitting, to the image forming apparatus control terminal, image data created by the data reading means.
- the image forming apparatus control terminal includes: authentication data extracting means for extracting authentication data from the image data received from the image data transmitting means; available-function choosing means for choosing an available function in accordance with the authentication data extracted by the authentication data extracting means; and available-function data transmitting means for sending, to the image forming apparatus, the available function chosen by the available-function choosing means.
- the image forming apparatus further includes available-function choosing means for choosing, in accordance with available-function data received from the available-function transmitting means, a function that is available in the image forming apparatus.
- the image forming apparatus may be arranged such that all functions are invalidated in cases where there are no users who can be authenticated by the authentication data extracted by the authentication data extracting means.
- the image forming apparatus may be arranged such that in cases where there a plurality of users who can be authenticated by the authentication data extracted by the authentication data extracting means, it is determined that a function that is available to any one of the users is available.
- the image forming apparatus may be arranged such that in cases where there a plurality of users who can be authenticated by the authentication data extracted by the authentication data extracting means, it is determined that a function that is available to all the users is available.
- the image forming apparatus may be arranged such that in cases where there a plurality of users who can be authenticated by the authentication data extracted by the authentication data extracting means, an available function is chosen in accordance with an order of priority in which the users are arranged.
- the image forming apparatus may be arranged such that the available function thus chosen is used only for the document read by the data reading means.
- the image forming apparatus may be arranged such that at least part of the available-function data transmitting means uses XML or SOAP.
- the image forming apparatus may be arranged such that the available-function data transmitting means transmits encrypted data.
- the present invention can be applied, for example, to an MFP (Multi Function Printer) having functions such as a printer function, a copier function, a scanner function, and a facsimile function.
- MFP Multi Function Printer
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Facsimiles In General (AREA)
- Storage Device Security (AREA)
- Control Or Security For Electrophotography (AREA)
Abstract
Description
- This Nonprovisional application claims priority under 35 U.S.C. §119(a) on Patent Application No. 283124/2006 filed in Japan on Oct. 17, 2006, the entire contents of which are hereby incorporated by reference.
- The present invention relates to an image forming apparatus that limits available functions in accordance with users who use the image forming apparatus, a user authentication system, and a control program and computer-readable storage medium for operating an image forming apparatus.
- In recent years, a copy-machine system has been built in which (i) a multifunction printer (MFP) having a combination of two or more functions such as a print function, a copy function, a scanning function, and a facsimile function and (ii) a control terminal (sever PC) are linked with each other via a network so that the MFP is controlled. Further, some MFPs are provided with a function of limiting users to specific MFP functions.
- Disclosed in connection with such a limitation imposed on users is a technique of limiting users' operation by using a server PC to analyze authentication data extracted from a document. For example, Patent Document 1 (Japanese Unexamined Patent Application Publication No. 509751/2003 (Tokuhyo 2003-509751; published on Mar. 11, 2003)) discloses a method of verifying the authenticity of a document by making a comparison between (i) an identifying feature/seal read out by scanning the document and (ii) information stored in a database. Further, for example, Patent Document 2 (Japanese Unexamined Patent Application Publication No. 14591/2005 (Tokukai 2005-14591; published on Jan. 20, 2005) discloses a system in which a printer receives print data containing user information, sends the user information to a printer control terminal together with an authentication request, and carries out printing in accordance with the print data upon receiving authentication notification from the printer control terminal.
- However, the techniques respectively disclosed in
Patent Documents - The present invention has been made in view of the foregoing problems, and it is an object of the present invention to realize an image forming apparatus that can validate or invalidate each function in accordance with users by analyzing authentication data. Further, it is another object of the present invention to realize an image forming apparatus that makes it possible to appropriately limit functions even in cases where image data contains plural pieces of authentication data.
- In order to achieve the foregoing objects, an image forming apparatus according to the present invention includes: reading means for reading a document as image data; extracting means for extracting, from the image data, authentication data by which a user is identified; communication means for sending the authentication data to an image forming apparatus control terminal that recognizes a function available to the user identified by the authentication data, and for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- Further, in order to achieve the foregoing objects, a user authentication system according to the present invention includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives authentication data, extracted from the image forming apparatus, by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- According to such an image forming apparatus as arranged above and the system, authentication data by which a user is identified is extracted from the image data, and the authentication data thus extracted is sent to an image forming apparatus control terminal that recognizes a function available to the identified uses. The image forming apparatus control terminal uses the authentication data to recognize a function available to a user who can be identified. Therefore, upon receiving available-function data indicative of a result of the recognition, the image forming apparatus can choose, in accordance with the available-function data, a function that is available in the image forming apparatus. The term “authentication data” here refers to any data by which a user can be identified (specified) at the image forming apparatus control terminal. Examples of the authentication data include seal image data obtained by reading a seal.
- Thus, the arrangement and the system make it possible to choose an available function in accordance with a user identified by authentication data. This makes it possible to validate or invalidate each function of the image forming apparatus in accordance with a user.
- This allows users to use a function of the image forming apparatus only by causing the image forming apparatus to read a document. When the document contains authentication data corresponding a holder of the document (e.g., when the document has a seal put thereto as authentication data), even a user who is different from the holder is allowed to use a function of the image forming apparatus on behalf of the holder.
- Further, in order to achieve the foregoing objects, an image forming apparatus according to the present invention includes: reading means for reading a document as image data; communication means (a) for sending the image data to an image forming apparatus control terminal that extracts, from the image data, authentication data by which a user is identified, and that recognizes a function available to the user identified by the authentication data, and (b) for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- Further, in order to achieve the foregoing objects, a user authentication system according to the present invention includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives the image data created by the image forming apparatus, that extracts, from the image data, authentication data by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- According to such an image forming apparatus as arranged above and the system, the image data is sent to the image forming apparatus control terminal. The image forming apparatus control terminal extracts, from the image data, authentication data by which a user is identified, and recognizes a function available to the user identified by the extracted authentication data. Therefore, upon receiving available-function data indicative of a result of the recognition, the image forming apparatus can choose, in accordance with the available-function data, a function that is available in the image forming apparatus.
- Thus, the arrangement and the system makes it possible to choose an available function in accordance with a user identified by authentication data. This makes it possible to validate or invalidate each function of the image forming apparatus in accordance with a user.
- This allows users to use a function of the image forming apparatus only by causing the image forming apparatus to read a document. When the document contains authentication data corresponding a holder of the document (e.g., when the document has a seal put thereto as authentication data), even a user who is different from the holder is allowed to use a function of the image forming apparatus on behalf of the holder.
- Additional objects, features, and strengths of the present invention will be made clear by the description below. Further, the advantages of the present invention will be evident from the following explanation in reference to the drawings.
-
FIG. 1 is a block diagram showing a structure of a user authentication system including an image forming apparatus according to an embodiment of the present invention. -
FIG. 2 is a flow chart showing a flow of a basic process that is carried out in the authentication system. -
FIG. 3 is a flow chart, showing a flow of a process that branches off from the flow chart ofFIG. 2 , which applies to a case where users are not arranged in order of priority. -
FIG. 4 is a flow chart, showing a flow of a process that branches off from the flow chart ofFIG. 2 , which applies to a case where users are arranged in order of priority. -
FIGS. 5( a) through 5(d) are diagrams each showing an example of a user authentication table. -
FIGS. 6( a) through 6(c) are diagrams each showing an example of authentication data. -
FIGS. 7( a) through 7(d) are diagrams each showing an example of a document containing authentication data. - An embodiment of the present invention will be described below with reference to
FIGS. 1 through 4 . An image forming apparatus according to the present embodiment is a multifunction printer (MFP) that can read documents. Further, the image forming apparatus is controlled by a PC (personal computer) serving as a control terminal.FIG. 1 is a block diagram showing a structure of a main part of theimage forming apparatus 100 and a structure of a main part of the control terminal (image forming apparatus control terminal) 110. As shown inFIG. 1 , the present embodiment is such that theimage forming apparatus 100 and thecontrol terminal 110 constitute anauthentication system 120. - The
image forming apparatus 100 includes an image reading section (reading means) 101, a control section (control means) 102, animage processing section 103, an operation/display section 104, and a communication section (communication means) 105. - The
image reading section 101 is a block that creates image data by reading a document. - The control section (control means) 102 is a block that exercises control over the operation of each of the components of the
image forming apparatus 100 in accordance with a computer program. Further, thecontrol section 102 includes an available-function choosing section (available-function choosing means) 1021 that chooses, in accordance with available-function data received from thecontrol terminal 110 via thecommunication section 105, a function that is available in theimage forming apparatus 100. The available-function data will be described later. - The
image processing section 103 is a block that performs various types of image processing under the control of thecontrol section 102 in response to a user's input sent from the operation/display section 104 or in response to an external input. Further, theimage processing section 103 includes an authenticationdata extracting section 1031 that extracts, from the image data created by theimage reading section 101, authentication data by which a user is identified. The term “authentication data” here refers to any data that enables thecontrol terminal 110 to identify a user (to specify a user). Examples of the authentication data may include seal image data obtained by reading a seal. - The operation/
display section 104 provides a user with a user interface. The operation/display section 104 is a block that displays various screens, various manual operation buttons, and the like; receives operation input signals, sent from a user via the displayed manual operation buttons, which causes theimage forming apparatus 100 to be set or to be given operation instructions; and sends the operation input signals to thecontrol section 102. The operation/display section 104 is constituted, for example, by a flat display panel such as a liquid crystal display element. The operation/display section 104 is here realized as a touch panel, but may be provided with separate operation and display sections. - The communication section (communication means) 105 is a block that communicates with the outside, or with the
control terminal 110 in particular. The communication may take the form of cable communication or wireless communication, and there may be provided a dedicated line for use in communication with thecontrol terminal 110. Here, for example, thecommunication section 105 exchanges commands with thecontrol terminal 110, sends the extracted authentication data to thecontrol terminal 110, and receives the available-function data from thecontrol terminal 110. - The
control terminal 110 includes acontrol section 111, an authenticationdata saving section 112, acommunication section 117, and an authenticationdata analysis section 118. - The
control section 111 exercises control over the operation of each of the components of thecontrol terminal 110 in accordance with a computer program. - The
communication section 117 is a block that communicates with the outside, or with theimage forming apparatus 100 in particular. Thecommunication section 117 exchanges commands with theimage forming apparatus 100, receives the authentication data from theimage forming apparatus 100, and sends the available-function data to theimage forming apparatus 100. - The authentication
data analysis section 118 is a block that recognizes, in accordance with the authentication data received by thecommunication section 117, a function that is available to a user identified by the authentication data. The authenticationdata saving section 112 contains a user database (user authentication table) 113 that correlates, with each user identified by the authentication data, a function that is available in theimage forming apparatus 100. The authenticationdata analysis section 118 performs the recognition in accordance with theuser database 113 and the received authentication data. Examples of the function that is available to the user, i.e., of the available function include, but are not limited to, a copy function, a Scan To E-Mail function of sending read image data as an e-mail, a FAX function, and an Internet FAX function of sending mail to which image data has been attached, and may include any function that is available in theimage forming apparatus 100. - A process that is carried out in the
authentication system 120 will be described below with reference to the flow charts respectively shown inFIGS. 2 through 4 . In each of the flow charts respectively shown inFIGS. 2 and 3 , users identified by authentication data are not arranged in order of priority. Each of the flow charts respectively shown inFIGS. 2 and 3 explains a process of making available a function of the image forming apparatus which function is available to any one of the users, or of making available a function of the image forming apparatus which function is available to all the authenticated users. - First, the operation/
display section 104 displays a message that encourages reading of a document for use in user authentication. A user places the document on theimage reading section 101 of theimage forming apparatus 100, and then carries out an input that instructs theimage reading section 101 to read the document (e.g., presses a scan button). Then, theimage reading section 101 reads the document as image data (S200). Next, theimage forming apparatus 100 uses theimage processing section 103 to extract authentication data from the image data (S201). Then, the authentication data is sent from thecommunication section 105 to the control terminal 110 (S202). - In the
control terminal 110, thecommunication section 117 receives the authentication data, and the authenticationdata analysis section 118 judges whether or not the authentication data includes plural pieces of authentication data (S203). When the authenticationdata analysis section 118 judges that the authentication data does not include plural pieces of authentication data (i.e., is a single piece of authentication data) (NO in S203), the authenticationdata analysis section 118 analyzes the authentication data (S204). Then, as a result of the analysis of the authentication data, the authenticationdata analysis section 118 judges whether user information (being herein supposed to be a user name) corresponding to the authentication data is contained in theuser database 113 saved in the authentication data saving section 112 (S205). In cases where the authenticationdata analysis section 118 judges that such user information is contained in the user database 113 (YES in S205), the authenticationdata analysis section 118 extracts available-function information corresponding to the user information (S207). This means that the authenticationdata analysis section 118 recognizes a function that is available to a user identified by the received authentication data. - Then, the available-function information (information on the available function thus recognized) extracted in S207, i.e., available data is sent from the
communication section 117 of thecontrol terminal 110 to thecommunication section 105 of the image forming apparatus 100 (S208). - In cases where the authentication
data analysis section 118 judges, as a result of the analysis of the authentication data, that no user information corresponding to the authentication data is contained in theuser database 113 saved in the authentication data saving section 112 (NO in S205), the authenticationdata analysis section 118 generates such available data that it is recognized that all the functions of theimage forming apparatus 100 are disabled (S206). Then, the data is sent from thecommunication section 117 of thecontrol terminal 110 to thecommunication section 105 of the image forming apparatus 100 (S208). - Then, in the
image forming apparatus 100, the available-function choosing section 1021 of thecontrol section 102 analyzes the available data received by thecommunication section 105, thereby choosing a function that is available in theimage forming apparatus 100. The operation/display section 104 displays a result accordingly (S209). Here, on receipt of such available data that it is recognized that all the functions are disabled, it is decided that all the functions are disabled. In other words, it is decided that all the functions are invalid. The operation/display section 104 displays a result accordingly. Further, if there is an available function, the operation/display section 104 indicates that the function is available. - After having chosen an available function, the
image forming apparatus 100 processes, within a range of available functions, the document read in S200. For example, in cases where theimage forming apparatus 100 reads a statement of final decision (document) containing “YAMADA” SEAL (authentication data), theimage forming apparatus 100 may permit the user to send the statement of final decision to another apparatus via FAX or Internet FAX, but may prohibit the user from sending the statement of final decision via Scan To E-Mail, which is vulnerable to theft of information, or from duplicating (copying) the statement of final decision. Furthermore, the available functions may include print functions such as an N-up function, a double face printing function, and a stapling function. For example, in cases where theimage forming apparatus 100 reads an important document (document) containing “MANAGER” SEAL (authentication data), theimage forming apparatus 100 may prohibit an N-up function and a double face printing function with respect to the important document, and may permit only a color printing function with respect to the important document. - Alternatively, when the authentication
data analysis section 118 judges, in S203, that the authentication data received by thecommunication section 117 includes plural pieces of authentication data (YES in S203), the authenticationdata analysis section 118 analyzes each of the plural pieces of authentication data as shown inFIG. 3 (S210). As a result of the analysis, the authenticationdata analysis section 118 judges whether or not user information corresponding the authentication data is contained in theuser database 113 saved in the authentication data saving section 112 (S211). In cases where the authenticationdata analysis section 118 judges that such user information is contained in the user database 113 (YES in S211), the authenticationdata analysis section 118 extracts an available function correlated with the user information (S212). In cases where the authenticationdata analysis section 118 judges, as a result of the analysis, that no user information corresponding to the authentication data is contained in theuser database 113 saved in the authentication data saving section 112 (NO in S211), nothing is carried out and the process proceeds to S213. - Then, the authentication
data analysis section 118 judges whether or not all the pieces of authentication data have been analyzed (S213). In cases where not all the pieces of authentication data have been analyzed (NO in S213), the process returns to S210, in which the authenticationdata analysis section 118 analyzes the next piece of authentication data. - In cases where all the pieces of authentication data have been analyzed (YES in S213), the authentication
data analysis section 118 judges whether or not there is user information corresponding to any one of the pieces of the authentication data (S214). - In cases where none of the pieces of authentication data matches user information saved in the
user database 113 of the authentication data saving section 112 (NO in S214), the authenticationdata analysis section 118 generates such available data that it is recognized that all the functions of theimage forming apparatus 100 are disabled (S215), and the process proceeds to S208 ofFIG. 2 so that the data is sent to theimage forming apparatus 100. - In cases where one or more of the pieces of authentication data match user information saved in the
user database 113 of the authentication data saving section 112 (YES in S214), the authenticationdata analysis section 118 judges whether or not the use of a function that is available to any one of the matched users is permitted (S216). In cases where the authenticationdata analysis section 118 judges that the use of a function that is available to any one of the matched users is permitted (YES in S216), the authenticationdata analysis section 118 extracts all the functions that are assigned to each user identified by the authentication data (S217). Then, the authenticationdata analysis section 118 generates such available data that it is recognized that those functions are available, and the process proceeds to S208 ofFIG. 2 so that the data is sent to theimage forming apparatus 100. - If the use of a function that is not available to all the users identified by the authentication data is prohibited (i.e., if the use of a function that is available to all the users is permitted) (NO in S216), the authentication
data analysis section 118 extracts functions that are available to all the users identified by the authentication data (S218). Then, the authenticationdata analysis section 118 generates such available data that it is recognized that those functions are available, and the process proceeds to S208 ofFIG. 2 so that the data is sent to theimage forming apparatus 100. - This is the end of the process that is carried out in the
authentication system 120. - A process that is carried out when authentication data are arranged in order of priority will be described below with reference to the flow charts respectively shown in
FIGS. 2 and 4 . - The steps S200 through S209 of
FIG. 2 are the same as those described above. When the authenticationdata analysis section 118 judges, in S203, that the authentication data includes plural pieces of authentication data, the authenticationdata analysis section 118 analyzes each of the plural pieces of authentication data as shown inFIG. 4 (S221). As a result of the analysis, the authenticationdata analysis section 118 judges whether or not user information corresponding to the authentication data is contained is theuser database 113 saved in the authentication data saving section 112 (S222). In cases where the authenticationdata analysis section 118 judges that such user information is contained in the user database 113 (YES in S222), the authenticationdata analysis section 118 extracts an available function correlated with the user information (S223). In cases where the authenticationdata analysis section 118 judges, as a result of the analysis, that no user information corresponding to the authentication data is contained is theuser database 113 saved in the authentication data saving section 112 (NO in S222), nothing is carried out and the process proceeds to S224. - Then, the authentication
data analysis section 118 judges whether or not all the pieces of authentication data have been analyzed (S224). In cases where not all the pieces of authentication data have been analyzed (NO in S224), the process returns to S221, in which the authenticationdata analysis section 118 analyzes the next piece of authentication data. - In cases where all the pieces of authentication data have been analyzed (YES in S224), the authentication
data analysis section 118 judges whether or not there is user information corresponding to any one of the pieces of authentication data (S225). - In cases where none of the pieces of authentication data matches user information saved in the
user database 113 of the authentication data saving section 112 (NO in S225), the authenticationdata analysis section 118 generates such available data that it is recognized that all the functions of theimage forming apparatus 100 are disabled (S227). Then, the process proceeds to S208 ofFIG. 2 so that the data is sent to theimage forming apparatus 100. - In cases where the authentication data matches user information saved in the
user database 113 of the authentication data saving section 112 (YES in S225), the authenticationdata analysis section 118 extracts, from user priority recorded in theuser database 113 of the authenticationdata saving section 112, available-function information corresponding to a user given the highest priority (S226). Then, the authenticationdata analysis section 118 generates such available data that it is recognized that a function corresponding to a user given the highest priority is available, and the process proceeds to S208 ofFIG. 2 so that the data is sent to theimage forming apparatus 100. - Note that the process described with reference to
FIGS. 2 through 4 is carried in theentire authentication system 120. The steps S200 to S202 and S209 are taken in theimage forming apparatus 100, and the steps S203 to S208, S210 to S218, and S221 to S227 are taken in thecontrol terminal 110. - Specific embodiments using the
authentication system 120 will be described below with reference toFIGS. 5( a) through 7(d). - Assume that the user authentication table (user database) of
FIG. 5( a) is stored in thecontrol terminal 110. Note thatFIGS. 6( a) through 6(c) show authentication data corresponding to authentication data ofFIGS. 5( a) through 5(c), respectively. In cases where theimage forming apparatus 100 reads the document ofFIG. 7( a), theimage forming apparatus 100 extracts “TANAKA” SEAL as authentication data, and then chooses “COPY”, “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions with reference toFIGS. 5( a) and 6(a) through 6(c). - In cases where the user authentication table of
FIG. 5( a) is stored in thecontrol terminal 110 and theimage forming apparatus 100 reads the document ofFIG. 7( b), theimage forming apparatus 100 extracts “SATO” SEAL and “YAMADA” SEAL as authentication data. Here, in cases where there are plural pieces of authentication data, a function that is available to any one of the extracted users is made available. Therefore, theimage forming apparatus 100 chooses “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions with reference toFIG. 5( a) andFIGS. 6( a) through 6(c). - In case where the user authentication table of
FIG. 5( b) is stored in thecontrol terminal 110 and theimage forming apparatus 100 reads the document ofFIG. 7( b), theimage forming apparatus 100 extracts “SATO” SEAL and “YAMADA” SEAL as authentication data. Here, in cases where there are plural pieces of authentication data, a function that is available to all the extracted users is made available. Therefore, theimage forming apparatus 100 chooses “FAX” as an available function with reference toFIG. 5( b) andFIGS. 6( a) through 6(c). - In case where the user authentication table of
FIG. 5( c) is stored in thecontrol terminal 110 and theimage forming apparatus 100 reads the document ofFIG. 7( b), theimage forming apparatus 100 extracts “SATO” SEAL and “YAMADA” SEAL as authentication data.FIG. 5( c) andFIGS. 6( a) through 6(c) show that the user “SATO” is given higher priority than the user “YAMADA”. Therefore, theimage forming apparatus 100 chooses “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions. - In case where the user authentication table of
FIG. 5( d) is stored in thecontrol terminal 110 and theimage forming apparatus 100 reads the document ofFIG. 7( c), theimage forming apparatus 100 extracts “PERSON IN CHARGE” as authentication data. Theimage forming apparatus 100 chooses “COPY” as an available function with reference toFIG. 5( d). - In case where the user authentication table of
FIG. 5( d) is stored in thecontrol terminal 110 and theimage forming apparatus 100 reads the document ofFIG. 7( d), theimage forming apparatus 100 extracts “PERSON IN CHARGE” and “MANAGER” as authentication data.FIG. 5( d) shows that “MANAGER” is given higher priority than “PERSON IN CHARGE”. Therefore, theimage forming apparatus 100 chooses “COPY”, “SCAN TO E-MAIL”, “FAX”, and “INTERNET FAX” as available functions. - The descriptions contained in the present embodiment are not limited to those contained above, and can be appropriately varied within the spirit of the present invention. For example, although the present embodiment is such that the
image forming apparatus 100 extracts authentication data, thecontrol terminal 110 may extract authentication data from image data created by theimage reading section 101 of theimage forming apparatus 100 and sent to thecontrol terminal 110. In this case, the authenticationdata analysis section 118 of thecontrol terminal 110 carries out the process of extracting authentication data. - Further, the present embodiment is not limited in terms of a format of data exchanged between the
image forming apparatus 100 and thecontrol terminal 110. An available example of the format is XML or SOAP. Such a format makes it easy to create and analyze data. Further, encrypted data may be sent. In this case, theimage forming apparatus 100 includes, in addition to the components described above, encrypting/decrypting means for encrypting or decrypting data. - Further, the present embodiment is not limited in terms of a range within which an available function chosen by the available-
function choosing section 1021 is used. However, such an available function may only be used with respect to a document used for extracting authentication data. Moreover, after the function has been performed with respect to the document, it is possible to cause the operation/display section 104 to automatically display a display screen that indicates an authentication mode (i.e., a mode dictating that a document containing authentication data be placed on the image reading section). - Further, each of the blocks of the
image forming apparatus 100, especially thecontrol section 102 and theimage processing section 103, may be constituted by hardware logic, or by software with use of a CPU as follows. - That is, the
image forming apparatus 100 has: (i) the CPU (central processing unit) for executing an instruction of control program realizing various functions; (ii) a ROM (read only memory) storing the program; (iii) a RAM (random access memory) for expanding the program; (iv) a storage device (storage medium) such as a memory storing the program and various data; and (v) the like. The object of the present invention also can be achieved by (i) providing, for theimage forming apparatus 100, a storage medium storing, in a computer readable manner, a program code (executable program; intermediate code; source program) of the control program for the present system, and (ii) causing a computer (CPU or MPU) to read and execute the program code stored in the storage medium, the program code being the software realizing the aforementioned functions. - Examples of the storage medium are: (i) tapes such as a magnetic tape and a cassette tape; (ii) magnetic disks such as a floppy® disk and a hard disk; (iii) optical disks such as a compact disk read only memory (CD-ROM), a magnetic optical disk (MO), a mini disk (MD), a digital video disk (DVD), and a CD-Rewritable (CD-R); (iv) cards such as an IC card (inclusive of a memory card) and an optical card; and (v) semiconductor memories such as a mask ROM, an EPROM (electrically programmable read only memory), an EEPROM (electrically erasable programmable read only memory), and a flash ROM.
- Further, the
image forming apparatus 100 may be connectable to the communication network, and the program code may be supplied via the communication network. The communication network is not particularly limited. Specific examples thereof are: the Internet, Intranet, Extranet, LAN (local area network), ISDN (integrated services digital network), VAN (value added network), CATV (cable TV) communication network, virtual private network, telephone network, mobile communication network, satellite communication network, and the like. Further, the transmission medium constituting the communication network is not particularly limited. Specific examples thereof are: (i) a wired channel using an IEEE 1394, a USB (universal serial bus), a power-line communication, a cable TV line, a telephone line, an ADSL line, or the like; or (ii) a wireless communication using IrDA, infrared rays used for a remote controller, Bluetooth®, IEEE 802.11, HDR (High Data Rate), a mobile phone network, a satellite connection, a terrestrial digital network, or the like. Note that, the present invention can be realized by (i) a carrier wave realized by electronic transmission of the program code, or (ii) a form of a series of data signals. - As described above, an image forming apparatus according to the present invention includes: reading means for reading a document as image data; extracting means for extracting, from the image data, authentication data by which a user is identified; communication means for sending the authentication data to an image forming apparatus control terminal that recognizes a function available to the user identified by the authentication data, and for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- Further, in order to achieve the foregoing objects, a user authentication system according to the present invention includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives authentication data, extracted from the image forming apparatus, by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- Further, an image forming apparatus according to the present invention includes: reading means for reading a document as image data; communication means (a) for sending the image data to an image forming apparatus control terminal that extracts, from the image data, authentication data by which a user is identified, and that recognizes a function available to the user identified by the authentication data, and (b) for receiving, from the image forming apparatus control terminal, available-function data indicative of a result of the recognition; and available-function choosing means for choosing, in accordance with the available-function data thus received, a function that is available in the image forming apparatus.
- Further, a user identification system according to the present invention includes: the image forming apparatus described above; and an image forming apparatus control terminal that receives the image data created by the image forming apparatus, that extracts, from the image data, authentication data by which a user is identified, that recognizes a function available to the user identified by the authentication data, and that sends, to the image forming apparatus, available-function data indicative of a result of the recognition.
- In addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that: when the image forming apparatus control terminal is able to identify no user by the authentication data, the available-function choosing means decides that all functions of the image forming apparatus are disabled.
- According to the foregoing arrangement, in cases where the image forming apparatus control terminal can identify no user by the authentication data, all the functions of the image forming apparatus are disabled (the functions are invalidated). This makes it possible to prevent a user who cannot be identified by the authentication data (e.g., a user who is not registered in the image forming apparatus control terminal) from using the functions of the image forming apparatus. This makes it possible to ensure security in the use of the functions of the image forming apparatus.
- In addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that: when the image forming apparatus control terminal is able to identify a plurality of users by the authentication data, the available-function choosing means decides that a function that is available to any one of the users identified by the authentication data is available.
- According to the foregoing arrangement, when the image forming apparatus control terminal can identify a plurality of users by the authentication data, a function that is available to at least one of the users identified by the authentication data is made available to the other users identified by the authentication data. For example, in cases where User A can use Functions C and D, where User B can use only Function C, and where Users A and B can be identified by the authentication data, User B is allowed to use Function D (even when it is User B who has caused the image forming apparatus to read the document).
- The phrase “to identify a plurality of users by the authentication data” here may mean “to identify, by plural pieces of authentication data, a plurality of users respectively corresponding the plural pieces of authentication data, or may mean “to identify a plurality of users by a single piece of authentication data”. Examples of the latter include the following: In cases where the authentication data indicates Group E, a plurality of users contained in Group E can be identified by the authentication data alone.
- In addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that: when the image forming apparatus control terminal is able to identify a plurality of users by the authentication data, the available-function choosing means decides that a function that is available to all the users identified by the authentication data is available.
- According to the foregoing arrangement, when the image forming apparatus control terminal can identify a plurality of users by the authentication data, only a function that is available to all the users identified by the authentication data is made available. For example, in cases where User A can use Functions C and D, where User B can use only Function C, and where Users A and B can be identified by the authentication data, User B can be prevented from using Function D when it is User B who has caused the image forming apparatus to read the document.
- In addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that: when the image forming apparatus control terminal is able to identify, by the authentication data, a plurality of users arranged in order of priority, the available-function choosing means chooses an available function in accordance with the order of priority of the users identified by the authentication data.
- According to the foregoing arrangement, the available function is chosen in accordance with the order of priority of the users identified by the authentication data. For example, even if only a given function (e.g., a copy function) can be used in cases where User A can be identified by Authentication Data A contained in a document, another function (e.g., a FAX sending function) can be made available in addition to the function when the document contains Authentication Data B corresponding to User B given higher priority than User A.
- In addition to the foregoing arrangement, the image forming apparatus according to the present invention may further include control means for exercising control so that the available function chosen by the available-function choosing means is available only to the document read by the reading means.
- The foregoing arrangement makes it possible that the available function chosen by the available-function choosing means is available only to the document read by the reading means. Therefore, even in cases where the authentication data is a seal put on a document and where a user who uses the image forming apparatus is different from a user who has put the seal on the document, the user who has put the seal can be authorized to prevent use of the function for image data other than the document read by the image forming apparatus (to prevent a process from being carried out with respect to image data other than the document).
- Further, at least part of the available data may be described with use of XML or SOAP. This makes it easy to create and analyze the available data.
- In addition to the foregoing arrangement, the image forming apparatus according to the present invention may further include encrypting/decrypting means for encrypting or decrypting data exchanged between the image forming apparatus and the image forming apparatus control terminal.
- The foregoing arrangement makes it possible to send encrypted data, or to decipher received encrypted data by decrypting the data. This makes it possible to prevent falsification and leakage of data.
- Incidentally, the image forming apparatus may be realized by hardware, or may be realized by causing a computer to execute a program. Specifically, a program according to the present invention is a program for causing a computer to operate as each means of an image forming apparatus having any one of the arrangements, and the program is stored in a computer-readable storage medium according to the present invention.
- When this program is executed by a computer, the computer operates as the image forming apparatus. Therefore, as with the image forming apparatus, each function of the image forming apparatus can be validated or invalidated in accordance with a user on the basis of analyzed authentication data.
- Alternatively, an image forming apparatus according to the present invention may be arranged as expressed below. That is, an image forming apparatus according to the present invention may be an image forming apparatus, provided in a system in which the image forming apparatus is communicably connected to an image forming apparatus control terminal for controlling the image forming apparatus, which authenticates each user to a function. The image forming apparatus includes: data reading means for reading a document; authentication data extracting means for extracting authentication data from image data created by the data reading means; and authentication data transmitting means for sending, to the image forming apparatus control terminal, the authentication data extracted by the authentication data extracting means. The image forming apparatus control terminal includes: available-function choosing means for choosing an available function in accordance with the authentication data; and available-function data transmitting means for sending, to the image forming apparatus, the available function chosen by the available-function choosing means. The image forming apparatus further includes available-function choosing means for choosing, in accordance with available-function data received from the available-function transmitting means, a function that is available in the image forming apparatus.
- Further, an image forming apparatus according to the present invention may be an image forming apparatus, provided in a system in which the image forming apparatus is communicably connected to an image forming apparatus control terminal for controlling the image forming apparatus, which authenticates each user to a function. The image forming apparatus includes: data reading means for reading a document; and image data transmitting means for transmitting, to the image forming apparatus control terminal, image data created by the data reading means. The image forming apparatus control terminal includes: authentication data extracting means for extracting authentication data from the image data received from the image data transmitting means; available-function choosing means for choosing an available function in accordance with the authentication data extracted by the authentication data extracting means; and available-function data transmitting means for sending, to the image forming apparatus, the available function chosen by the available-function choosing means. The image forming apparatus further includes available-function choosing means for choosing, in accordance with available-function data received from the available-function transmitting means, a function that is available in the image forming apparatus.
- Further, in addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that all functions are invalidated in cases where there are no users who can be authenticated by the authentication data extracted by the authentication data extracting means.
- Further, in addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that in cases where there a plurality of users who can be authenticated by the authentication data extracted by the authentication data extracting means, it is determined that a function that is available to any one of the users is available.
- Further, in addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that in cases where there a plurality of users who can be authenticated by the authentication data extracted by the authentication data extracting means, it is determined that a function that is available to all the users is available.
- Further, in addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that in cases where there a plurality of users who can be authenticated by the authentication data extracted by the authentication data extracting means, an available function is chosen in accordance with an order of priority in which the users are arranged.
- Further, in addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that the available function thus chosen is used only for the document read by the data reading means.
- Further, in addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that at least part of the available-function data transmitting means uses XML or SOAP.
- Further, in addition to the foregoing arrangement, the image forming apparatus according to the present invention may be arranged such that the available-function data transmitting means transmits encrypted data.
- The embodiments and concrete examples of implementation discussed in the foregoing detailed explanation serve solely to illustrate the technical details of the present invention, which should not be narrowly interpreted within the limits of such embodiments and concrete examples, but rather may be applied in many variations within the spirit of the present invention, provided such variations do not exceed the scope of the patent claims set forth below.
- Note that the present invention can be applied, for example, to an MFP (Multi Function Printer) having functions such as a printer function, a copier function, a scanner function, and a facsimile function.
Claims (17)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006283124A JP2008102633A (en) | 2006-10-17 | 2006-10-17 | Image forming apparatus, user authentication system, control program for operating image forming apparatus, and computer-readable recording medium |
JP2006/283124 | 2006-10-17 | ||
JP283124/2006 | 2006-10-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080092231A1 true US20080092231A1 (en) | 2008-04-17 |
US8578475B2 US8578475B2 (en) | 2013-11-05 |
Family
ID=39304562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/974,872 Active 2032-01-05 US8578475B2 (en) | 2006-10-17 | 2007-10-16 | Image forming apparatus, user authentication system, control program and computer-readable storage medium for operating image forming apparatus |
Country Status (3)
Country | Link |
---|---|
US (1) | US8578475B2 (en) |
JP (1) | JP2008102633A (en) |
CN (1) | CN101165705B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090248681A1 (en) * | 2008-03-31 | 2009-10-01 | Brother Kogyo Kabushiki Kaisha | Information processing device, content management system, method, and computer readable medium for managing contents |
US20100263044A1 (en) * | 2009-04-09 | 2010-10-14 | Canon Kabushiki Kaisha | Information processing apparatus, control method of information processing apparatus, and storage medium |
US20130036170A1 (en) * | 2011-08-01 | 2013-02-07 | Ricoh Company, Ltd. | Information processing apparatus, information processing method, and storage medium |
US20140029045A1 (en) * | 2009-01-29 | 2014-01-30 | Brother Kogyo Kabushiki Kaisha | Image processing device capable of reading a user-identifying image |
US9286478B2 (en) | 2009-01-29 | 2016-03-15 | Brother Kogyo Kabushiki Kaisha | Image processing device and computer readable storage medium therefor |
US20230360418A1 (en) * | 2020-05-20 | 2023-11-09 | Nanjing University Of Science And Technology | Character offset detection method and system |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5169632B2 (en) * | 2008-08-29 | 2013-03-27 | 富士ゼロックス株式会社 | Image processing apparatus and program |
CN101877754B (en) * | 2009-05-01 | 2012-11-28 | 柯尼卡美能达商用科技株式会社 | Information equipment apparatus |
JP2014211857A (en) * | 2013-04-02 | 2014-11-13 | セイコーエプソン株式会社 | Image processing apparatus, image processing system, and image processing method |
US20150262446A1 (en) * | 2014-03-13 | 2015-09-17 | Daniel Taylor | Currency inspection using mobile device and attachments |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6764000B1 (en) * | 1999-09-08 | 2004-07-20 | Accudent Pty Ltd | Document authentication method and apparatus |
US20050010530A1 (en) * | 2003-07-08 | 2005-01-13 | Konica Minolta Business Technologies, Inc. | Copyright management system |
US20050265744A1 (en) * | 2004-05-27 | 2005-12-01 | Hiroya Uruta | Image forming apparatus and verification control method thereof |
US20060077119A1 (en) * | 2004-10-08 | 2006-04-13 | Sharp Laboratories Of America, Inc. | Methods and systems for receiving content at an imaging device |
US20060218643A1 (en) * | 2005-03-24 | 2006-09-28 | Xerox Corporation | Systems and methods for manipulating rights management data |
US20070019229A1 (en) * | 2005-07-21 | 2007-01-25 | Konica Minolta Business Technologies, Inc. | Image processing system and image processing device implementing a specific image processing function for each user as well as a computer program product for the same |
US20080008318A1 (en) * | 2006-07-10 | 2008-01-10 | Kabushiki Kaisha Toshiba | Image Forming Apparatus and Document Management System |
US7769801B2 (en) * | 2003-09-01 | 2010-08-03 | Konica Minolta Business Technologies, Inc. | Image processing apparatus program product and management server executing prescribed process to a transmitted image |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2272594A (en) * | 1992-11-04 | 1994-05-18 | Ibm | Determining the type of document image |
JPH07244639A (en) | 1994-03-03 | 1995-09-19 | Fujitsu Ltd | Access right management device |
JP2001300130A (en) | 2000-04-26 | 2001-10-30 | Namco Ltd | Game system and individual authentication information distribution system |
JP2002358135A (en) | 2001-06-04 | 2002-12-13 | Mitsubishi Electric Corp | Device and method for managing software use, program for allowing computer to perform its method and computer readable recording medium with its program recorded |
JP2003030726A (en) | 2001-07-17 | 2003-01-31 | Oki Joho Systems:Kk | System, method of automatic sales, its processing server and automatic vending device |
US20030099379A1 (en) * | 2001-11-26 | 2003-05-29 | Monk Bruce C. | Validation and verification apparatus and method |
JP2003242123A (en) | 2002-02-21 | 2003-08-29 | Hitachi Ltd | Collaborative access control method |
JP2004058410A (en) | 2002-07-26 | 2004-02-26 | Oki Electric Ind Co Ltd | Method, system and apparatus for printing secret information |
CN1506904A (en) * | 2002-12-11 | 2004-06-23 | 巍 王 | Method and device for scanning and copying 'image text' safely (and safe use of integral multifunctional machine) |
JP2004280285A (en) | 2003-03-13 | 2004-10-07 | Fuji Electric Holdings Co Ltd | System for identifying person in contract document and method therefor |
JP2005014591A (en) | 2003-06-06 | 2005-01-20 | Seiko Epson Corp | Authentication operation system, authentication printing system, network printer, printer management terminal, printer program and terminal program, and authentication printing method |
JP4622347B2 (en) | 2003-10-08 | 2011-02-02 | セイコーエプソン株式会社 | Output system with use right authentication function, material output device, and use right authentication output method |
US7478421B2 (en) | 2004-02-04 | 2009-01-13 | Toshiba Corporation | System and method for role based access control of a document processing device |
JP2005234665A (en) | 2004-02-17 | 2005-09-02 | Oki Electric Ind Co Ltd | Proof mark check system |
JP4555038B2 (en) | 2004-09-17 | 2010-09-29 | 株式会社リコー | Network system, usage authority determination method, network device, program, and recording medium |
JP2006108922A (en) | 2004-10-01 | 2006-04-20 | Ricoh Co Ltd | Device and method for embedding electronic watermark, device and method for detecting electronic watermark, and program for executing the methods by computer |
JP4004509B2 (en) | 2005-03-15 | 2007-11-07 | シャープ株式会社 | Image reading apparatus, image processing system, and image recording apparatus |
JP2007043702A (en) | 2005-07-29 | 2007-02-15 | Sharp Corp | User authentication method, control method of remote arithmetic unit, image processor, the remote arithmetic unit, and user authentication system |
-
2006
- 2006-10-17 JP JP2006283124A patent/JP2008102633A/en active Pending
-
2007
- 2007-10-16 CN CN2007101802654A patent/CN101165705B/en not_active Expired - Fee Related
- 2007-10-16 US US11/974,872 patent/US8578475B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6764000B1 (en) * | 1999-09-08 | 2004-07-20 | Accudent Pty Ltd | Document authentication method and apparatus |
US7124934B2 (en) * | 1999-09-08 | 2006-10-24 | Accudent Pty Ltd. | Document authentication method and apparatus |
US20050010530A1 (en) * | 2003-07-08 | 2005-01-13 | Konica Minolta Business Technologies, Inc. | Copyright management system |
US7769801B2 (en) * | 2003-09-01 | 2010-08-03 | Konica Minolta Business Technologies, Inc. | Image processing apparatus program product and management server executing prescribed process to a transmitted image |
US20050265744A1 (en) * | 2004-05-27 | 2005-12-01 | Hiroya Uruta | Image forming apparatus and verification control method thereof |
US20060077119A1 (en) * | 2004-10-08 | 2006-04-13 | Sharp Laboratories Of America, Inc. | Methods and systems for receiving content at an imaging device |
US20060218643A1 (en) * | 2005-03-24 | 2006-09-28 | Xerox Corporation | Systems and methods for manipulating rights management data |
US20070019229A1 (en) * | 2005-07-21 | 2007-01-25 | Konica Minolta Business Technologies, Inc. | Image processing system and image processing device implementing a specific image processing function for each user as well as a computer program product for the same |
US20080008318A1 (en) * | 2006-07-10 | 2008-01-10 | Kabushiki Kaisha Toshiba | Image Forming Apparatus and Document Management System |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8560538B2 (en) * | 2008-03-31 | 2013-10-15 | Brother Kogyo Kabushiki Kaisha | Information processing device, content management system, method, and computer readable medium for managing contents |
US20090248681A1 (en) * | 2008-03-31 | 2009-10-01 | Brother Kogyo Kabushiki Kaisha | Information processing device, content management system, method, and computer readable medium for managing contents |
US9286478B2 (en) | 2009-01-29 | 2016-03-15 | Brother Kogyo Kabushiki Kaisha | Image processing device and computer readable storage medium therefor |
US20140029045A1 (en) * | 2009-01-29 | 2014-01-30 | Brother Kogyo Kabushiki Kaisha | Image processing device capable of reading a user-identifying image |
US9071794B2 (en) * | 2009-01-29 | 2015-06-30 | Brother Kogyo Kabushiki Kaisha | Image processing device capable of reading a user-identifying image |
US20100263044A1 (en) * | 2009-04-09 | 2010-10-14 | Canon Kabushiki Kaisha | Information processing apparatus, control method of information processing apparatus, and storage medium |
US20130036170A1 (en) * | 2011-08-01 | 2013-02-07 | Ricoh Company, Ltd. | Information processing apparatus, information processing method, and storage medium |
US9756144B2 (en) * | 2011-08-01 | 2017-09-05 | Ricoh Company, Ltd. | Information processing apparatus, information processing method, and storage medium |
US10579311B2 (en) | 2011-08-01 | 2020-03-03 | Ricoh Company, Ltd. | Information processing apparatus, information processing method, and storage medium |
US11599308B2 (en) | 2011-08-01 | 2023-03-07 | Ricoh Company, Ltd. | Server acquires identification information from a current device among plurality of devices and sends user information corresponding to all users to the current device |
US12099757B2 (en) | 2011-08-01 | 2024-09-24 | Ricoh Company, Ltd. | Server acquires identification information from a current device of devices and sends user list including one or more identifiers corresponding to all users to the current device |
US20230360418A1 (en) * | 2020-05-20 | 2023-11-09 | Nanjing University Of Science And Technology | Character offset detection method and system |
US12033409B2 (en) * | 2020-05-20 | 2024-07-09 | Nanjing University Of Science And Technology | Character offset detection method and system |
Also Published As
Publication number | Publication date |
---|---|
CN101165705B (en) | 2010-06-02 |
CN101165705A (en) | 2008-04-23 |
US8578475B2 (en) | 2013-11-05 |
JP2008102633A (en) | 2008-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8578475B2 (en) | Image forming apparatus, user authentication system, control program and computer-readable storage medium for operating image forming apparatus | |
US7460692B2 (en) | Image forming apparatus | |
US8289546B2 (en) | Control device, image forming apparatus, method of controlling image forming apparatus, and recording medium | |
US7532836B2 (en) | Document management method, document management system, and computer program product | |
US7693990B2 (en) | Multifunction device including command control and authentication, and recording medium storing program for causing computer to function as the same | |
US8601559B2 (en) | Image output authentication system, image output authentication server, and image output authentication method | |
US7847958B2 (en) | Image forming apparatus and control method for preventing unlimited copying of an original document including a storage device | |
US7957022B2 (en) | Information processing apparatus allowing plurality of users to concurrently log in, and method of controlling the same | |
US8427664B2 (en) | Key based electronic file approval management system | |
CN104135588B (en) | Image processing system and image forming method | |
US20060078159A1 (en) | Method and apparatus for embedding electronic watermark, and computer product | |
US8134761B2 (en) | Document processing apparatus, method thereof, and program product for executing the method | |
US20090279118A1 (en) | Printing control system, printing apparatus, and authentication apparatus | |
US20190104233A1 (en) | Image forming apparatus with user authenticating function that authenticates user login | |
US8418224B2 (en) | Information processing apparatus, information processing method, and program | |
JP7131063B2 (en) | Image processing device and its control program | |
JP5971030B2 (en) | Information processing system, cooperation management device, information processing device, information processing system control method, information processing system control program | |
US9027118B2 (en) | Image processing apparatus, control method, and computer-readable storage medium for computer program | |
US20060165263A1 (en) | Person verification apparatus, information processing apparatus and person verification system | |
US20100031350A1 (en) | Ic card authentication apparatus, ic card authentication method, and recording medium having ic card authentication program recorded thereon | |
US20100238500A1 (en) | Conference system and image data management method | |
US20090174901A1 (en) | Image forming device, image forming method, and image forming program | |
JP2014236263A (en) | Image formation apparatus and image formation method | |
JP4513902B2 (en) | Image forming apparatus, job execution system, and job execution method | |
JP2007028202A (en) | Image processing apparatus, program, and recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SHARP KABUSHIKI KAISHA, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AWATA, SATOSHI;REEL/FRAME:020032/0811 Effective date: 20070925 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |