![]() Imaging apparatus equipped with secure printing function and method for controlling the same
专利摘要:
IMAGE FORMING APPARATUS EQUIPPED WITH SECURE PRINT FUNCTION, METHOD FOR CONTROL OF THE SAME AND STORAGE MEDIA. The present invention relates to an imaging device capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to the device's functions. When a user instructs the machine to perform any of the operations related to a secure print job which is a print job performed using a secure print function, when the machine is operated in a role-based authentication mode, if determines whether a user-selected function from a plurality of functions that includes at least the secure print function for printing data in response to input of a password requires user authentication or not. When the secure print function is specified as the user-selected function and it is determined that the user-selected function does not require user authentication, the user is allowed to use the secure print function even if the user is not authenticated . 公开号:BR102014002275B1 申请号:R102014002275-9 申请日:2014-01-29 公开日:2022-01-25 发明作者:Nobuhiko Maki 申请人:Canon Kabushiki Kaisha; IPC主号:
专利说明:
Background of the Invention Field of Invention [0001] The present invention relates to an image forming apparatus equipped with a secure printing function, a method for controlling the same and a storage means. Description of Related Technique [0002] Generally, a system is known in which print data transmitted from an external device, such as a PC (Personal Computer), is reserved in an imaging device, and the reserved print data is printed in accordance with a user operation performed on an operating panel of the imaging apparatus. This print is often referred to as the reserve print. [0003] In this reserve print, the reserved print data can be printed when the user enters a password or performs user authentication on an operation screen of the imaging apparatus. [0004] This backup print is particularly effective in delivering a print that the user does not want others to see when the imaging apparatus is a shared printer connected to a network. [0005] As an example of the conventional technique related to reserve printing, a method has been proposed in which a print job to which a password is added is transmitted from a PC to an imaging apparatus, and printing is executed when the same password as the one added to the print job is entered from the imaging apparatus operation panel (Japanese Patent Publication Open for Public Inspection number 2000-76028). [0006] Although printing using reserve printing method is sometimes referred to as secure printing, confidential printing, private printing, authentication printing, and so on, in the present invention it is expressed as a secure printing job. [0007] Specifically, secure print job, as a general rule, is a run job, so that printing starts when a correct password is entered by a user from a console section of the training apparatus and print job security is ensured by placing password-based restrictions on printing. In this case, however, password-based restrictions on printing cannot be placed on a normal print job that is not a secure print job. [0008] Furthermore, as another method to ensure the security of a print job, a method was proposed to control access to a print job, managing print jobs in association with the user information of users who are managed by the imaging device. [0009] In this method, before transmitting a print job from an external device, the user adds a user name to the print job. Then user authentication is performed by the user entering the username and password into the imaging apparatus or by the user holding an IC card over a card reader of the imaging apparatus. [0010] Then, the imaging apparatus extracts, from all print jobs, the one that has a username added to it that matches the username authenticated by the imaging apparatus, and allows the user only perform operations for the extracted print jobs. [0011] According to this method, it is possible to prevent someone's print job, which includes not only a secure print job, but also a normal print job, from being manipulated in an unauthorized manner by others and therefore , you can ensure the security of all print jobs. [0012] Furthermore, some of the imaging devices that perform user authentication are equipped with a function to also authenticate users that are not managed by the imaging device, such as guest users. This function is provided for users who wish to temporarily use the imaging apparatus. [0013] This function makes it possible to temporarily enable, for example, in a case where the imaging apparatus is equipped with a plurality of functions, such as a copy function, a scan function and a print function, a person as a guest from outside the use of the copy function in order to copy a document as a guest user. [0014] In the event that a user is authenticated as a guest user, the imaging apparatus cannot identify the user and therefore limits the handling of a print job from the point of view of preventing data leakage. information. That is, in general, the imaging device does not allow a guest user to manipulate a print job. [0015] Particularly, in controlling access to a print job according to authentication of a user by the imaging device, the conventional technique described above presents the following problem: [0016] Among the imaging apparatus that provide a plurality of functions such as a copy function, a scan function and a print function, there is one which is equipped with a switching function if authentication is required. user or not on a role-by-role basis. [0017] Examples of the function mentioned above include a role-based authentication function that configures the plurality of functions, for example, in such a way that the copy function is allowed to be used without user authentication, whereas the function scan essentially requires user authentication. [0018] The role-based authentication function is provided for the purpose of a user generally managed by the imaging apparatus to save the time and effort of performing an authentication operation, when the user uses a function of the imaging apparatus , which is determined, from a management point of view, does not essentially require user authentication. That is, the role-based authentication function is different in purpose from the case where the guest user mentioned above uses the imaging apparatus. [0019] Although the purpose is different, too, in a case where user authentication is not performed using the role-based authentication function, the imaging apparatus cannot identify a user, similarly to the case mentioned above from the guest user. [0020] On the other hand, from a security point of view, a print job requires access control to be performed on a user-by-user basis and therefore requires the identification of a user. [0021] Therefore, it is required to make user authentication essential for a print job handling function, and this makes it possible to spare the user the need to perform an authentication operation. Summary of the Invention [0022] The present invention provides an imaging apparatus that is capable of flexibly controlling whether or not to perform user authentication when a user performs operations related to various functions of the imaging apparatus, a method for controlling of the same and a storage medium. [0023] In a first aspect of the present invention, there has been provided an imaging apparatus including a login unit configured to allow a user to connect to the imaging apparatus, characterized by a determining unit configured to determine, in a case where the imaging apparatus operates in a role-based authentication mode, whether a user-selected role from a plurality of roles requires user authentication or not, the plurality of roles that includes at least one role secure print function to print data in response to input of a password, and a permission unit set to, in a case where the secure print function is specified as the user-selected function and is determined by the unit of determination that the User-selected function does not require user authentication, allow user to use secure print function even if user is not authentic enticed. [0024] In a second aspect of the present invention, there has been provided a method for controlling an imaging apparatus including a login unit configured to allow a user to connect to the imaging apparatus, characterized by determining, in a case where the imaging apparatus operates in a role-based authentication mode, whether a user-selected role from a plurality of roles requires user authentication or not, the plurality of roles that includes at least one role of secure print to print data in response to input of a password, and allow, in a case where the secure print function is specified as the user-selected function and it is determined by said determination that the user-selected function does not require the user authentication, the user uses the secure print function even if the user is not authenticated. [0025] In a third aspect of the present invention, there has been provided a non-transient computer-readable storage medium that stores a computer-executable program for executing a method for controlling an imaging apparatus including a login unit configured to allow a user to connect to the imaging apparatus, wherein the method is characterized by determining, in a case where the imaging apparatus operates in a role-based authentication mode, whether a user-selected function from a plurality of functions requires user authentication or not, the plurality of functions which includes at least the secure print function to print data in response to an input of a password, and allow, in a case where the secure print function is specified as the user-selected role and is determined by said determination that the user-selected role does not require user authentication, the user to use the secure print function even if the user is not authenticated. [0026] According to the present invention, it is possible to provide an image forming apparatus that is capable of flexibly controlling whether to perform user authentication or not when a user performs operations related to various functions of the image forming apparatus. image, a method for controlling it and a storage medium. [0027] Additional features of the present invention will become apparent from the following description of exemplary embodiments with reference to the accompanying drawings. Brief Description of Drawings [0028] Figure 1 is a schematic diagram of an imaging system that includes an imaging apparatus, in accordance with a first embodiment of the present invention. [0029] Figures 2A and 2B are diagrams showing an example of a configuration screen displayed on a PC display section that appears in Figure 1. [0030] Figure 3 is a flowchart of a print job transmission process performed by a CPU that appears in Figure 1. [0031] Figure 4 is a flowchart of a print job receiving process performed by a CPU of the imaging apparatus. [0032] Figures 5A and 5B are diagrams showing examples of a login reception screen displayed in a console section that appears in Figure 1. [0033] Figure 6 is a diagram showing an example of a splash screen displayed in the console section. [0034] Figures 7A to 7C are diagrams showing examples of a secure print manipulation screen displayed in the console section. [0035] Figure 8 is a flowchart of an access control process executed by the CPU. [0036] Figures 9A and 9B are flowcharts of variations of the access control process in Figure 8. [0037] Figures 10A and 10B are diagrams showing examples of the secure print manipulation screen displayed as a result of the process in Figure 9B. [0038] Figure 11 is a diagram showing an example of a splash screen displayed on a console section of an imaging apparatus, in accordance with a second embodiment of the present invention. [0039] Figures 12A to 12C are diagrams showing examples of the secure print manipulation screen displayed in the console section. [0040] Figure 13 is a flowchart of a display control process performed by a CPU of the imaging apparatus. [0041] Figures 14A to 14C are diagrams showing examples of a job history screen displayed in the console section. [0042] Figure 15 is a flowchart of a variation of the display control process in Figure 13. Description of Modalities [0043] The present invention will now be described in detail below with reference to the accompanying drawings showing embodiments thereof. [0044] Figure 1 is a schematic diagram of an imaging system 1 that includes an imaging apparatus, in accordance with the first embodiment of the present invention. [0045] Referring to Figure 1, the imaging system 1 comprises the imaging apparatus, denoted by reference numeral 1000, and a PC 21, which are connected to each other by a network 101. [0046] A control unit 200 of the imaging apparatus 1000 is connected to a scanning section 201 which is an image input device, a printer section 202 configured to print an image on a record sheet, the network 101 and a public communication line 204 to thereby input and output image data and device information. [0047] In addition, the control unit 200 includes a CPU 205, a RAM 206, a ROM 207, an HDD 208, a console section interface 209, a network interface 211, a modem 212, a SRAM 213 and a RTC 214, which are connected to a system bus 215. [0048] The CPU 205 is a processor that controls the overall operation of the imaging apparatus 1000. The RAM 206 is a system working memory used for the operation of the CPU 205 and also functions as a memory for temporarily storing image data, user information, passwords, and so on. [0049] ROM 207 is a boot ROM that stores a boot program for imaging apparatus 1000. HDD 208 is a hard disk drive, and stores system software, application programs, image data, and so on. The HDD 208 additionally stores programs for executing processes, described hereinafter. [0050] Console section interface 209 provides the interface with a console section 210 that has a touch panel, and outputs image data to console section 210, which will be displayed on console section 210. Furthermore, the console section interface 209 transfers information to the CPU 205, which is entered by a user from the console section 210 to the imaging apparatus 1000. [0051] Network interface 211 is connected to network 101 to input and output information to and from external devices. Modem 212 is connected to public communication line 204 to input and output information to and from external devices. SRAM 213 is a volatile storage device that can operate at a high speed. In the present embodiment, however, the SRAM 213 is configured to be equivalent to a non-volatile storage device by making use of a backup power supply. [0052] The RTC 214 is a real time clock, and continues to count the current time even in a state where the control unit 200 is not powered on. [0053] Control unit 200 additionally includes a RIP section 218, a device interface 219, a raster image processor 220, a printer image processor 221, a encryption processor 222, and a decryption processor 223, which are connected to each other by a picture bus 217. The picture bus 217 and the system bus 215 are connected by a picture bus interface 216 which is a bus bridge that converts the data structure. Image bus 217 is a PCI bus. [0054] RIP section 218 is a raster image processor that converts a PDL code into a bitmap image. Device interface 219 connects control unit 200 to scan section 201 and printer section 202 to perform synchronous-asynchronous or asynchronous-synchronous conversion of image data. [0055] The raster image processor 220 performs correction, manipulation and editing of image data entered from the raster section 201. The printer image processor 221 performs correction, upsampling, etc. of image data to be printed. Encryption processor 222 performs processing to encrypt input data that includes image data. The decryption processor 223 performs processing to decrypt the encrypted data. [0056] On the other hand, PC 21 comprises a CPU 20, a printer driver 22, a PC operation section 23, a PC display section 24 and a PC communication section 25. The CPU 20 controls the full operation of the PC 21. The printer driver 22 is a driver for controlling the imaging apparatus 1000. The PC operation section 23 comprises a keyboard, a mouse, and so on. PC Display Section 24 is a screen for displaying information to a user. PC communication section 25 is a NIC (network interface controller) to connect to network 101. [0057] With the configuration described above, the imaging apparatus 1000 executes a print job to print an image on a registration sheet, and a user can perform the operations related to the print job. Furthermore, a print job is executed in accordance with an instruction from the PC 21, and an expression “send a print job” means “to transmit, from the PC 21, the print data to instruct the imaging apparatus 1000 to perform a print job”. [0058] Next, the transmission of a print job from PC 21 will be described. When sending a print job, a user configures the settings in the PC operation section 23. [0059] Figures 2A and 2B are diagrams showing an example of a configuration screen displayed in the PC display section 24 that appears in Figure 1. [0060] Figure 2A shows a printer driver setup screen and Figure 2B shows a secure print setup screen. [0061] In these setting screens, a secure print job can be set. A secure print job is a job that allows a user to perform operations related to the print job, which includes an operation to start printing, on condition that the user is authenticated as the owner of the job by entering a correct password from the console section 210 of imaging apparatus 1000. Setting up a secure print job is done in order to maintain the security of a print job by limiting the print run by a password. Thus, the image forming apparatus 1000 has a secure printing function that allows, when a user intends to perform operations related to a print job to print an image on a record sheet, the user can perform operations related to the print job on condition that the user is authenticated as the owner of the print job. [0062] As shown in Figure 2A, in the printer driver configuration screen, denoted by the numeral reference 301, it is possible to make settings on the print, which include whether or not to use secure printing, a sheet size, the number of copies, and whether or not to include a stamp. To activate the secure print setting, the user enters a checkmark in a secure print use checkbox 302, and presses an OK button 303. To cancel the setup operation, the user presses a cancel button 304. [0063] As shown in Figure 2B, in the secure print setup screen, denoted by reference numeral 321, a username entry form 322 and a password entry form 323 are displayed. Note that the PC user information 21 that is used by the user can be set to a default value in the form of username input 322. Furthermore, the printer driver 22 can set a default value in the form of password input 323 To finalize the settings on the secure print setup screen, the user presses an OK button 324. To abort the setup operation, the user presses a cancel button 325. [0064] PC 21 sends a print job, according to the settings made in the configuration screens described above. [0065] Figure 3 is a flowchart of a print job transmission process performed by CPU 20 that appears in Figure 1. [0066] Referring to Figure 3, PC operation section 23 receives an instruction from the user to display the printer driver setup screen, and displays the printer driver setup screen 301 in the display section of PC 24 (step S201). [0067] Next, PC operation section 23 acquires the settings of a print job, which appear on the 301 printer driver setting screen, which were performed by user operations (step S202), and configures the settings. related to the print job based on the purchased settings. [0068] Then the printer driver 22 acquires a setting in the use secure print checkbox 302 (step S203). [0069] Then the printer driver 22 determines whether or not the secure print setting has been enabled based on the setting acquired in the secure print usage checkbox 302 (step S204). [0070] If it is determined in step S204 that the secure print setting has not been enabled (NOT in step S204), the printer driver 22 sends the print job as a normal print job which is not a secure print job to the imaging apparatus 1000 (step S208), followed by termination of the present process. [0071] On the other hand, if it is determined in step S204 that secure print setting has been enabled (YES in step S204), printer driver 22 displays secure print setting screen 321 in PC display section 24, and prompts the user to enter settings for a secure print job (step S205). [0072] Printer driver 22 acquires the secure print job settings entered by the user on the secure print setup screen 321 (step S206). [0073] Printer driver 22 then generates a secure print job by adding a username and password to the image data (step S207). Then, printer driver 22 sends the print job as the secure print job to imaging apparatus 1000 (step S208), followed by termination of the present process. [0074] Although the username is used in step S207, not only the username but also other identifying information, such as a domain name of PC 21 used by the user, can be added to the information. [0075] Figure 4 is a flowchart of a print job receiving process performed by the CPU 205 of the imaging apparatus 1000 appearing in Figure 1. [0076] Referring to Figure 4, CPU 205 receives a print job sent from PC 21 (step S401), stores the received print job on HDD 208, and determines whether the received print job is a secure printing or not (step S402). [0077] If it is determined at step S402 that the received print job is not a secure print job (NOT at step S402), CPU 205 executes the received print job (step S404), followed by termination of the present process. [0078] On the other hand, if it is determined in step S402 that the incoming print job is a secure print job (YES in step S402), the CPU 205 reserves the print job (step S403), followed by the completion of the process gift. “Reserving a print job” means, in other words, “suspend the execution of the print job”. [0079] In the following, a description will be provided of a user interface displayed on the console section 210 in an access control process to control operations to start the imaging apparatus 1000 which makes a secure print job run, and so on. [0080] Figures 5A and 5B are diagrams showing examples of a login reception screen displayed on console section 210 that appears in Figure 1. [0081] Figure 5A shows the login reception screen, denoted by reference numeral 6001, displayed in a case where guest login is provided. On the other hand, Figure 5B shows the login reception screen, denoted by reference numeral 11001, displayed in a case where guest login is not provided. [0082] Referring to Figures 5A and 5B, a username input field 6002 is a field for entering your own username by the user. A 6003 password input field is a field for entering a user password. [0083] A login button 6004 is used to make the imaging apparatus 1000 perform authentication in order to connect to the imaging apparatus 1000 after the user has entered the user name and password. By pressing this button, a user authentication process is performed. [0084] Furthermore, a guest login button 6005 that appears in Figure 5A is used by a user that is not managed by the imaging apparatus 1000, to connect to the imaging apparatus 1000 as a guest user (or unknown user). In contrast to the guest user, a user who is managed by the imaging apparatus 1000 is sometimes expressed as a general user in the following description. Thus, users of imaging apparatus 1000 include general users whose usernames are managed by imaging apparatus 1000 and guest users whose usernames are not managed by imaging apparatus 1000. [0085] Also, unlike the 6001 login reception screen, the 6005 guest login button is not displayed on the 11001 login reception screen shown in Figure 5B. [0086] Figure 6 is a diagram showing an example of a splash screen displayed in console section 210 that appears in Figure 1. [0087] Referring to Figure 6, the home screen, denoted by reference numeral 7001, is used by the user to make use of various functions equipped on the imaging apparatus 1000, such as a copy function, a scan and transmit, a scan and store function, a function that uses stored file, a secure print function and a receive tray function. A secure print button 7002 on the home screen 7001 is for handling a secure print job. [0088] Figures 7A and 7C are diagrams showing examples of a secure print manipulation screen displayed in console section 210 that appears in Figure 1. [0089] Referring to Figures 7A through 7C, a job list 8002 on the secure print handling screen, denoted by the numeral reference 8001, is an area for displaying a list of secure print jobs. An 8005 job selection box is for selecting a secure print job. [0090] An 8003 print button is to start printing for a selected secure print job. A cancel button 8004 is for canceling printing of the selected secure print job. [0091] The user can select a secure print job to be handled by entering a check mark in the job selection box 8005, and instruct the imaging apparatus 1000 to start or cancel printing by pressing the print button. print 8003 or cancel button 8004, respectively. [0092] Figure 7A shows an example of the secure print manipulation screen in which some of the job names are masked with asterisks. [0093] In Figure 7A, for secure print jobs that have the username “User 1”, the job names are displayed. [0094] On the other hand, for secure print jobs that have the usernames “User 2” and “User 3”, which are not “User 1”, the job names are masked with asterisks. [0095] Furthermore, if the user selects a job that has the username “User 2” or “User 3” by entering a checkmark in the 8005 job selection box in the 8001 secure print handling screen shown in Figure 7A, the print button 8003 and the cancel button 8004 are displayed in gray and therefore the user cannot perform either print or cancel manipulation operations. [0096] Figure 7B shows an example of the secure print manipulation screen where all job names are masked with asterisks. [0097] Even when the user selects any of the jobs by entering a checkmark in the 8005 job selection box in the 8001 secure print handling screen shown in Figure 7B, the print button 8003 and cancel button 8004 are displayed in gray and, therefore, the user does not perform manipulation operations for printing or cancellation. [0098] Also, in Figure 7A, when the user presses the print button 8003 or the cancel button 8004, a password entry screen, not shown, for the secure print job is displayed. [0099] User enters the password added to the print job on the password entry screen to complete the job manipulation. However, unless the input password matches the password added to the print job, handling the instructed job is not performed. [00100] Figure 7C shows an example of the secure print manipulation screen where none of the job names are masked. [00101] Even when the user selects any of the jobs by entering a check mark in the 8005 job selection box in the 8001 secure print manipulation screen shown in Figure 7C, the print button 8003 and cancel button 8004 do not are displayed in gray and therefore the user is allowed to perform manipulation operations for printing and canceling. [00102] Figure 8 is a flowchart of an access control process performed by CPU 205 that appears in Figure 1. [00103] The access control process in Figure 8 is executed when the imaging apparatus 1000 is started. Furthermore, an operating mode in which the access control process is performed includes a login mode and a role-based authentication mode. [00104] Login mode is a mode in which imaging apparatus 1000 always performs user authentication before the user is allowed to use imaging apparatus 1000. Furthermore, in login mode, the apparatus 1000 has a function of authenticating even a user who is not managed by the imaging apparatus 1000, as a guest user. [00105] On the other hand, role-based authentication mode is a mode of operation in which whether or not user authentication is required can be determined for each of the various functions equipped on the imaging apparatus 1000 before a user to use the 1000 image forming apparatus. The various functions include a copy function, a print job handling function, a scan and transmission function for scanning and transmitting an image, and a detailed information display function for view detailed information about the history of performed print jobs. [00106] In role-based authentication mode, for example, it is possible to set the copy function as a function that does not require user authentication and is allowed to be used by any user without performing user authentication, and set the print job handling function as a function that requires user authentication, and is allowed to be used only in a case where the user is authenticated. [00107] Referring to Figure 8, the CPU 205 determines whether or not the operating mode is role-based authentication mode (step S501). If it is determined in step S501 that the operating mode is not role-based authentication mode but login mode (NOT in step S501), the CPU 205 performs a boot process in login mode (step S502) . [00108] When the login mode boot process is complete, the CPU 205 displays the login reception screen 6001, described with reference to Figure 5A in console section 210 (step S503). In this step, the user performs login after entering a username and password from the 6001 login reception screen, or performs login as a guest user. [00109] If login authentication has failed (NOT at step S504), CPU 205 returns to step S503, provided login authentication is successful, allowing user to connect (YES at step S504), CPU 205 displays splash screen 7001, described with reference to Figure 6, in console section 210 (step S505). [00110] Next, if the user presses secure print button 7002 on home screen 7001 to handle a secure print job (YES in one step S506), CPU 205 displays secure print handling screen 8001, described with reference to Figure 7A or 7B, in console section 210 (step S507). [00111] On the other hand, if the secure print button 7002 has not been pressed in step S506 (NOT in step S506), the CPU 205 determines whether or not any other button has been pressed (step S506A). If no buttons have been pressed (NO in step S506A), the CPU 205 returns to step S506, provided that if one of the other buttons has been pressed (YES in step S506A), the CPU 205 allows the user to perform data processing. a function that corresponds to the pressed button (step S506B). [00112] When the secure print handling screen is displayed in step S507, the CPU 205 determines whether or not the currently logged in user is a guest user (step S508). If it is determined in step S508 that the currently logged in user is a general user (NOT in step S508), the CPU 205 allows the currently logged in user to perform only one operation related to their own secure print job (step S509), followed by the termination of the present process. As described above, in the present embodiment, when a user is authenticated as a general user, the user is allowed to perform the operation related to the general user's secure print job, provided that when a user is authenticated as a guest user, as described hereinafter in this document, the user is prevented from performing any of the operations related to all secure print jobs. [00113] In this process, depending on whether or not a username of the currently logged-in user matches a username added to a secure print job, control is performed to switch the job list display method and determine whether or not to allow the currently logged in user to perform an operation related to the secure print job. [00114] That is, when the currently logged in user has the username of “User 1”, the secure print handling screen 8001 shown in Figure 7A is displayed in the console section 210. [00115] On the other hand, if it is determined in step S508 that the currently logged in user is a guest user (YES in step S508), CPU 205 prevents the user from handling any of all secure print jobs (step S510), followed by the termination of the present process. In this step, the secure print handling screen 8001 shown in Figure 7B is displayed in the console section 210. [00116] Referring again to step S501, if it is determined in step S501 that the operating mode is role-based authentication mode (YES in step S501), the CPU 205 performs the boot process in authentication-based mode in function (step S511). [00117] When the role-based authentication mode boot process is complete, the CPU 205 displays splash screen 7001, described with reference to Figure 6 in console section 210 (step S512). [00118] Next, when the user presses the secure print button 7002 to handle a secure print job on the home screen 7001 (YES in a step S513), the CPU 205 determines whether a secure print handling function is set or not to allow it to be used without user authentication in role-based authentication mode (step S514). The “secure print handle function” is intended to mean a function to provide operations related to a secure print job, such as a handle operation to perform printing of the secure print job and a handle operation to cancel the secure print job. secure printing. [00119] If it is determined in step S514 that the secure print handling function is set to not require user authentication (YES in step S514), CPU 205 displays secure print handling screen 8001, described with reference to Figure 7C, in console section 210 (step S515). [00120] The CPU 205 then allows the user to handle all secure print jobs (step S516), followed by termination of the present process. [00121] In Figure 7C, none of the “job names” of all secure print jobs are masked, so the user is allowed to perform manipulation operations for printing and canceling for all jobs. However, since a password has been added to each secure print job, unless the user enters a correct password, none of the manipulation operations for printing and canceling are actually completed. [00122] Therefore, a user who does not know the password cannot perform any manipulation operations and therefore the security level is prevented from being lowered. [00123] Furthermore, for operations related to normal print jobs other than secure print jobs, access control is performed so that a currently logged in user is allowed to perform only one operation related to his own print job. Therefore, it is possible to maintain security. [00124] On the other hand, if it is determined in step S514 that the secure print handling function is not set to be allowed to be used without user authentication (NOT in step S514), CPU 205 displays the reception screen login 11001, described with reference to Figure 5B, in console section 210 (step S517). In this step, the user performs the login by entering the username and password from the 6001 login reception screen. [00125] Furthermore, the guest login button is not displayed on the login reception screen 11001. This is because the imaging apparatus 1000 does not provide a login function to be used by a guest user in authentication based mode. in function. [00126] If login authentication failed (NOT in step S518), CPU 205 returns to step S517, provided login authentication was successful, allowing user to connect to imaging apparatus 1000 (YES at step S518), CPU 205 displays secure print handling screen 8001, described with reference to Figure 7A, in console section 210 (step S519). [00127] Then, CPU 205 allows the currently logged in user to perform only the operation related to their own secure print job (step S520), followed by termination of the present process. [00128] According to the access control process in Figure 8, even in a case where access control is performed to allow a user who has been logged in according to user authentication to perform only one operation related to a currently logged in user's print job, when the secure print handling function is set to not require user authentication in the role-based authentication mode, control is performed to allow the user to handle a secure print job. [00129] Therefore, when user handles secure print job, user is allowed to handle secure print job without performing login operation, which makes it possible to improve operability and usability. [00130] On the other hand, for a normal print job that is not limited by a password, access control is performed so that a user who has logged in according to user authentication is allowed to perform just an operation of handling your own print job and therefore security is maintained. [00131] Furthermore, as shown in step S514, according to the present embodiment, it is possible to flexibly control whether or not authentication should be performed when a user performs operations related to various functions equipped in the image formation device , according to the configuration where each function is allowed or not to be used without authentication. [00132] In addition, as shown in steps S514 to S520, in the present embodiment, when it is determined that an operation related to a secure print job is set to require authentication, the operation related to the secure print job of a general user is performed, as long as the operation related to a guest user's secure print job is not allowed to be used. [00133] Figures 9A and 9B are flowcharts of variations of the access control process in Figure 8. [00134] In the variation of the access control process of Figure 8, shown in Figure 9A, it is pre-conditioned that the configuration for switching where a user should or should not be allowed to perform the manipulation of secure print jobs was also made to a user who has logged in as a guest user. [00135] The variation of the access control process in Figure 8, shown in Figure 9A, differs from the access control process in Figure 8 after the affirmative answer to the question of step S508 and therefore Figure 9A only shows different steps that follow step S508. [00136] Referring to Figure 9A, the CPU 205 determines whether or not the configuration of secure print jobs is such that secure print jobs are allowed to be handled also by a guest user (step S1201). [00137] If it is determined in step S1201 that the configuration of secure print jobs is such that secure print jobs are allowed to be handled also by a guest user (YES in step S1201), CPU 205 allows the user to perform handling only guest user secure print jobs (step S1202), followed by the present process. Thus, in the present embodiment, when a user is authenticated as a general user, the user is allowed to perform an operation related to a secure print job of the general user, and when a user is authenticated as a guest user, it is allowed to user to perform operations related to secure print jobs only in a case where the setup of secure print jobs is such that secure print jobs are allowed to be handled also by a guest user. [00138] This causes the secure print handling screen described with reference to Figure 7C to be displayed on the console section 210, thereby allowing the guest user to also perform the operation related to the secure print job. [00139] On the other hand, if it is determined in step S1201 that the configuration of secure print jobs is not such that secure print jobs are allowed to be handled also by a guest user (NOT in step S1201), the CPU 205 prevents the user from handling any of all secure print jobs (step S1203), followed by termination of the present process. [00140] This causes the secure print handling screen described with reference to Figure 7B to be displayed in console section 210, thereby preventing the user from handling any of all secure print jobs. [00141] According to the variation of the access control process of Figure 8, shown in Figure 9A, it is possible to make settings that allow even a guest user to handle secure print jobs. [00142] Next, the variation of the access control process of Figure 8, shown in Figure 9B, will be described. In the variation of the access control process of Figure 8, shown in Figure 9B, the secure print jobs that are allowed to be handled are switched depending on whether the operating mode is in login mode or role-based authentication mode. . [00143] Secure print jobs that are allowed to be handled are switched depending on whether the operation mode is login mode or role-based authentication mode, because different use cases are expected which are different in use purpose as a precondition, i.e. a case where a guest user uses the secure print function in login mode and a case where the user uses the secure print function without user authentication in authentication mode based on occupation. [00144] For example, it is generally assumed that the guest user in login mode is not a user who uses the imaging apparatus 1000 on a daily basis, but a user who temporarily uses it as a guest . [00145] On the other hand, the function to allow a user to use the imaging apparatus 1000 without user authentication in the role-based authentication mode is generally assumed to be used by a user who wants to use the imaging apparatus. 1000 image formation in an easy and abbreviated way on a daily basis without authentication. [00146] The variation of the access control process of Figure 8, shown in Figure 9B, differs from the access control process in Figure 8 after the affirmative answer to the question of step S508, and in step S516 and in the subsequent steps and, therefore, Figure 9B only shows the different steps. This variation is the same as Figure 9A in the processing where the CPU 205 proceeds from step S508 to step S1201, and when the answer to the question in step S1201 is negative, the CPU 205 proceeds to step S1203 and therefore the description starts after the affirmative answer to question in step S1201. [00147] The access control process variation of Figure 8, shown in Figure 9B, is determined such that for each of the secure print jobs reserved on the imaging apparatus 1000, if a username indicative of an owner of each job, which is added to the job, does or does not correspond to any username of one or more users managed by the imaging apparatus 1000. [00148] According to this determination made such for each of the secure print jobs, if a user who is an owner of a secure print job is not a user managed by the imaging apparatus 1000, the secure print job is referred to as an unknown user print job, provided that if the user is the general user, then the secure print job is naturally referred to as a general user print job. [00149] Based on this, the CPU 205 determines whether or not the secure print job is an unknown user print job (step S1301). [00150] If it is determined in step S1301 that the secure print job is an unknown user print job (YES in step S1301), it is decided that the secure print job is an unknown user print job that is logged in as a guest user, and allows the user to handle the secure print job (step S1303), followed by terminating the present process. [00151] On the other hand, if it is determined in step S1301 that the secure print job is not an unknown user print job (NOT in step S1301), this indicates that an unknown user who has logged in as a guest user is about to handle a general user print job, and therefore the CPU 205 prevents handling of the secure print job (step S1302), followed by termination of the present process. [00152] Next, in the steps of Figure 9B, the access control process that follows step S515 will be described. [00153] First, similar to step S1301, the CPU 205 determines whether or not the secure print job is an unknown user print job (step S1304). [00154] If it is determined in step S1304 that the secure print job is an unknown user print job (YES in step S1304), the secure print job is not a general user print job, which is adjusted to be allowed to be used without authentication, so that the general user can easily use the secure print function in the role-based authentication mode, and therefore the CPU prevents the user from handling the secure print job (step S1306 ), followed by the termination of the present process. [00155] On the other hand, if it is determined in step S1304 that the secure print job is not an unknown user print job (NOT in step S1304), then the secure print job is a general user print job , which is set to be allowed to be used without authentication, in order for the general user to easily use the secure print function in the role-based authentication mode, and therefore the CPU 205 allows the user to handle the job of secure print (step S1305), followed by termination of the present process. [00156] Figures 10A and 10B are diagrams showing examples of the secure print manipulation screen displayed as a result of varying the access control process from Figure 8, shown in Figure 9B. [00157] Figure 10A shows an example of the secure print manipulation screen displayed on console section 210, as a result of processing according to steps S1301 and step S1302 or processing according to step S1303. [00158] Referring to Figure 10A, the usernames “User 1”, “User 2” and “User 3” are assumed to be the usernames of general users, and the username “User 4” is a username of an unknown user. [00159] In this case, as shown in the 8001 secure print handling screen, the secure print jobs that have the usernames “User 1”, “User 2” and “User 3” are the general user print jobs , and all job names of these print jobs are masked with asterisks. [00160] Furthermore, if an unknown user selects these print jobs, the unknown user is prevented from performing manipulation operations for printing and canceling. [00161] On the other hand, it is decided that the secure print job that has the username “User 4” is a print job of an unknown user, and if the user who logged in as a guest user selects this job printing, the user is allowed to perform manipulation operations for printing and canceling. [00162] As described above, the job names of general user secure print jobs managed by the imaging apparatus 1000, i.e. users who use the imaging apparatus 1000 on a daily basis are masked to a user guest who temporarily uses the imaging apparatus in login mode, and the guest user is prevented from manipulating the jobs, and so it is possible to achieve the effect of preventing information from being leaked to an unknown user. [00163] Furthermore, Figure 10B shows an example of the secure print handling screen displayed on console section 210 as a result of processing according to steps S1304 and S1305, or processing according to step S1306. [00164] Also, in Figure 10B, it is assumed that the usernames “User 1”, “User 2” and “User 3” are the usernames of general users, and the username “User 4” is a username of an unknown user. [00165] In this case, as shown in the 8001 secure print handling screen, the secure print jobs of user names “User 1”, “User 2” and “User 3” are general user print jobs, and if a general user selects his own job from these print jobs, the general user is allowed to perform manipulation operations for printing and canceling. [00166] On the other hand, the secure print job of username “User 4” is an unknown user print job, and the job name is masked with asterisks, and if a general user selects this print job, As shown in the example illustrated in Figure 10B, the general user is prevented from performing manipulation operations for printing and canceling. [00167] As described above, even in a case where the secure print handling function is used without authentication in the role-based authentication mode, only the secure print jobs of a general user, i.e. a user who uses the imaging apparatus 1000 on a daily basis, they are allowed to be manipulated and therefore it is possible to obtain the advantageous effect of preventing unauthorized use by an unknown user. [00168] Next, a description will be provided of the second embodiment of the present invention. The present embodiment differs from the first embodiment in the display control process for controlling the content displayed on the secure print manipulation screen 8001 of the imaging apparatus 1000, more particularly, the user interface displayed on the console section 210, and is the same in the other hardware configuration and in the software configuration, except the processes described in detail hereinafter, as those of the first embodiment, and therefore component elements that correspond to those of the first embodiment are denoted by the same numeral references , and description of these will be omitted. Hereafter in the present document, the following description will be given of the different points. [00169] Figure 11 is a diagram showing an example of the splash screen displayed in console section 210 that appears in Figure 1. [00170] Referring to Figure 11, the 7001 home screen has a 7005 work history display button recently added to the home screen described with reference to Figure 6. When pressing the 7005 work history display button, the work history of print jobs is displayed. This history will be described hereinafter in this document. In addition, the following description is provided of an example where a 7004 scan and transmit button is used. The Scan and Transmit button 7004 is a button used to select a function to scan an original that uses the scan section 201 and transmit the data to a destination. [00171] Figures 12A to 12C are diagrams showing examples of the secure print manipulation screen displayed in console section 210 that appears in Figure 1. [00172] Figure 12A shows an example of displaying a list of all reserved secure print jobs on imaging apparatus 1000. Cancel button 8004 is displayed in gray and the user is prevented from pressing it. [00173] Figure 12B shows an example of displaying the list of all reserved secure print jobs on the imaging apparatus 1000. Figure 12B differs from Figure 12A in that the cancel button 8004 is not displayed in gray and allows the user to press the same. [00174] Figure 12C shows an example of displaying a list of only secure print jobs out of all secure print jobs reserved on imaging apparatus 1000, each of which has a username added to the secure print job. secure print, which matches the username of a currently logged in user. [00175] In Figure 12C, only the secure print jobs of the user who logged in using the username “User 1” are displayed by way of example. [00176] In addition, a button to display all 8006 jobs is provided in the secure print handling screen shown in Figure 12C. The 8006 all jobs display button is a button used to display the list of all secure print jobs, and when the user presses the 8006 all jobs display button, the display screen is changed to the screen shown in Figure 12A, and the list of all secure print jobs reserved on imaging apparatus 1000 is displayed. Note that in this case, however, the currently logged in user is allowed to perform a manipulation operation to only cancel their own secure print job. [00177] Figure 13 is a flowchart of a display control process performed by CPU 205 that appears in Figure 1. [00178] Note that in the display control process in Figure 13, it is assumed that the secure print function of the imaging apparatus 1000 is set to be allowed to be used without user authentication, and the scan function and transmission is set to require user authentication. [00179] Referring to Figure 13, CPU 205 displays splash screen 7001 described with reference to Figure 11 in console section 210 (step S1401). [00180] Next, the CPU 205 determines whether or not the user has pressed any of the function buttons (step S1402). Note that the function buttons referred to in the present process are limited to the secure print button 7002 and the scan and transmit button 7004, and the description of cases in which other function buttons are pressed is omitted. [00181] The CPU 205 then determines if the user has pressed the secure print button 7002 (step S1403). If it is determined in step S1403 that the user has pressed secure print button 7002 (YES in step S1403), the CPU 205 displays the secure print handling screen 8001 described with reference to any of Figures 12A through 12C in the console section 210 (step S1404). [00182] As mentioned above, the secure print function is set to be allowed to be used without user authentication according to the settings of the role-based authentication mode, so there is no need to display the login screen to authenticate a user via the imaging apparatus 1000. [00183] Also, although Figures 12A to 12C show the screen where the secure print job list has already been displayed in the 8002 job list, the secure print jobs to be displayed in the 8002 job list are determined in the following steps . [00184] Next, the CPU 205 determines whether or not the user has been authenticated by the imaging apparatus 1000, and is currently logged in (step S1405). [00185] If it is determined in step S1405 that the user is not currently logged in (NOT in step S1405), the CPU 205 displays the secure print handling screen described with reference to Figure 12A (step S1406), and returns to step S1401. As described above, in the present modality, when it is determined that the operations related to a secure print job are set to not require authentication and, also, the user has not been authenticated (NO in step S1405), the user is allowed to perform one of the operations related to the secure print job in addition to the cancel operation to delete the secure print job displayed on the secure print handling screen. [00186] The secure print handling screen allows the user to select their job whose password the user knows to perform the print. Furthermore, in Figure 12A, the cancel button 8004 cannot be pressed, as mentioned above, and therefore it is also possible to prevent others' jobs from being carelessly cancelled. [00187] On the other hand, if it is determined in step S1405 that the user is currently logged in (YES in step S1405), the CPU 205 determines whether the currently logged in user is an administrator or not (step S1407). Note that the administrator is a person who is in charge of managing the imaging apparatus 1000, and is authenticated by the imaging apparatus 1000 as the administrator in a different manner from other users. [00188] If it is determined in step S1407 that the currently logged in user is an administrator (YES in step S1407), the CPU 205 displays the secure print handling screen described with reference to Figure 12B (step S1408), and returns to step S1401. [00189] In the secure print handling screen shown in Figure 12B, it allows the administrator to perform the cancel operation for all secure print jobs, and can delete secure print jobs unnecessarily reserved in the imaging device 1000. [00190] On the other hand, if it is determined in step S1407 that the currently logged in user is not an administrator (NOT in step S1407), CPU 205 displays the secure print handling screen described with reference to Figure 12C (step S1409) , and returns to step S1401. [00191] As shown in Figure 12C, the currently logged in user who is not an administrator is allowed to immediately handle the print job without time and effort of searching their print jobs. Thus, in the present modality, when it is determined that the operations related to the secure print job are adjusted to not require authentication and, also, the user is authenticated as an administrator, the user is allowed to perform the operations related to all secure print jobs. On the other hand, when the user is not authenticated as an administrator, the user is only allowed to perform operations related to a user's secure print job. [00192] Referring again to step S1403, if it is determined in step S1403 that the user has not pressed secure print button 7002, but scan and transmit button 7004 (NOT in step S1403), the CPU 205 displays the login reception screen 11001 described with reference to Figure 5B (step S1410). [00193] The 11001 login reception screen is displayed in this step because the “scan and transmit” function is set as a function that requires user authentication according to the role-based authentication function settings. [00194] When user enters a username and password from login reception screen 11001 to perform login, and if login authentication failed (NOT in step S1411), CPU 205 returns to step S1410, provided login authentication is successful, allowing the user to log in (YES at step S1411), CPU 205 displays a scan operation screen, not shown, in console section 210 (step S1412), and returns to step S1401. [00195] Although in the process in Figure 13, the CPU 205 returns to step S1401 after executing step S1412, if the user does not explicitly perform a log out operation, the login state is maintained. [00196] Therefore, if the user intends to handle a secure print job in a state where the user login is maintained as mentioned above, the CPU 205 proceeds from step S1405 to step S1407. [00197] Furthermore, determining where to proceed from step S1407 depends on determining whether the user who logged into the imaging apparatus 1000 is an administrator in processing user authentication or not in steps S1410 and S1411. [00198] In the display control process in Figure 13, the method of displaying secure print jobs and controlling access to them for manipulation are appropriately switched and controlled depending on whether the user is currently logged in or not, and additionally if the currently logged in user is an administrator or not. This makes it possible to improve operability and usability. [00199] Although in the display control process in Figure 13, the display method of secure print jobs, and so on, has been described, the method can be applied to any other print job as long as it is a print job that includes user information for a user who issued the print job (print job owner). [00200] Next, a description will be given of the display of job history information. First, the user interface displayed in console section 210 will be described. [00201] Figures 14A to 14C are diagrams showing examples of a job history screen displayed on console section 210 that appears in Figure 1. [00202] The job history screen, denoted by reference numeral 10001, shown in Figures 14A to 14C displays the history information of jobs recorded on the HDD 208 of the imaging apparatus 1000. [00203] Referring to Figures 14A to 14C, a work history list 10002 is an area for displaying a list of work history records. [00204] A work history checkbox 10005 is for selecting a work history record. A detailed information button 10007 is for displaying detailed information from a job history record. Detailed information includes the number of pages, the number of sheets printed, a sheet size, color/mono, a document name, and so on, for each job. [00205] User can refer to the detailed history information by selecting a desired work history record by entering a checkmark in the work history selection box 10005 and pressing the detailed information button 10007. [00206] Figure 14A displays the job history screen 10001 in which the list of all job history records is displayed, however the job names of all job history records are masked with asterisks and additionally , the detailed information button 10007 is always grayed out to prevent the user from pressing it. [00207] Figure 14B displays the job history screen 10001 in which the list of all job history records and job names is displayed and additionally the detailed information button 10007 is always displayed to allow the user to refer to the detailed information. [00208] Figure 14C displays the job history screen 10001 in which the list of all job history records is displayed, however, the job names displayed are only those of the extracted job history records, each of which has a username that matches the username of the currently logged in user. [00209] That is, the job name of a job history record that does not have a username that matches the username of the currently logged in user is masked with asterisks. Figure 14C shows an example where only the work history records of the user who logged in using the username “User 1” are extracted, and the work names of the extracted history records are displayed. [00210] Furthermore, the detailed information button 10007 is allowed to be pressed only when a job history record that has a username that matches the username of the currently logged-in user is selected by entering a checkmark in the job history checkbox 10005. [00211] Assuming that the imaging apparatus 1000 is configured as above, a process for controlling the display of the job history screen will be described. [00212] Figure 15 is a flowchart of a variation of the display control process in Figure 13. [00213] The display control process in Figure 15 is to control the display method of detailed information from the work history information. Furthermore, the display control process in Figure 15 is performed when the user presses the work history display button 7005 as a function button in step S1403 in Figure 13 and hence the steps following step S1403 will be described . [00214] Referring to Figure 15, first, CPU 205 displays job history screen 10001, described with reference to Figures 14A to 14C, in console section 210 (step S1501). In this step, it is assumed that a job history display function is set to be allowed to be used without user authentication according to the role-based authentication mode settings. [00215] Next, the CPU 205 determines whether the detailed information is unconditionally allowed to be displayed or not (step S1502). In this determination, a setting in a checkbox provided in advance, in association with the work history display permission, is used. This check box is provided in advance as one of the configuration items for configuring various settings of the imaging apparatus 1000, and generally, an administrator connects to the imaging apparatus 1000 by performing or changing the setting in the check box. [00216] If it is determined in step S1502 that detailed information is unconditionally allowed to be displayed (YES in step S1502), the CPU 205 displays the job history screen 10001 described with reference to Figure 14B (step S1506), and returns up to step S1401. [00217] On the other hand, if it is determined in step S1502 that detailed information is not unconditionally allowed to be displayed (NOT in step S1502), the CPU 205 determines whether the user is currently logged in (step S1503). [00218] If it is determined in step S1503 that the user is not currently logged in (NOT in step S1503), CPU 205 displays job history screen 10001 described with reference to Figure 14A (step S1504), and returns to step S1401. As described above, in the present embodiment, it is determined whether the detailed information is always allowed to be displayed or not, and if it is determined that the detailed information is not always allowed to be displayed and, also, the user is not authenticated, the information details of all print jobs performed are prevented from being displayed. [00219] As described above, in a case where a user has not logged in to the imaging apparatus 1000, the work history screen 10001 in Figure 14A is displayed, so that it is possible to prevent unidentified users from being negligently allowed to refer to detailed work history information. However, the job history list is displayed and therefore the user can get minimal information such as a result (OK/NG) of his own job. [00220] On the other hand, if it is determined in step S1503 that the user is currently logged in (YES in step S1503), the CPU 205 determines whether the currently logged in user is an administrator or not (step S1505). [00221] If it is determined in step S1505 that the currently logged in user is an administrator (YES in step S1505), CPU 205 displays job history screen 10001 described with reference to Figure 14B (step S1506), and returns to step S1401. As discussed above in the present document, the work history screen 10001 in Figure 14B is a screen on which the detailed information of all work history records is allowed to be displayed. [00222] On the other hand, if it is determined in step S1505 that the currently logged in user is not an administrator (NOT in step S1505), CPU 205 displays job history screen 10001 described with reference to Figure 14C (step S1507) . As discussed above in the present document, job history screen 10001 in Figure 14C is a screen in which only job history records, each having a username that corresponds to the username of the currently logged in user, are displayed. extracted and the job names of the extracted jobs are displayed. Thus, in the present modality, it is determined whether the detailed information is always allowed to be displayed or not, and if it is determined that the detailed information is not always allowed to be displayed and, also, the user is authenticated as an administrator, the Detailed history information of all executed print jobs is allowed to be displayed. On the other hand, if the user is not authenticated as an administrator, only the detailed history information of the user's executed print jobs is allowed to be displayed. [00223] Thus, in a state where the user has logged in to the imaging apparatus 1000, it is possible to allow the user to refer only to the job history information of the currently logged in user. [00224] As described above, the job history display method is appropriately switched according to whether the user is currently logged in or not, and additionally whether the currently logged in user is an administrator or not, as described in the process shown in Figure 15. This makes it possible to prevent information from being leaked from the work history without compromising usability. [00225] Furthermore, although in the processes in Figures 13 and 15, such as for the login operation of a user of the imaging apparatus 1000, the login is performed, for example, when the user selects a function that requires authentication of user, another method of operation for user authentication may be provided. As another method of operation for user authentication, for example, a function button can be added to the home screen 7001 for use in explicitly performing a login operation. [00226] Aspects of the present invention may also be realized by a computer a system or apparatus (or devices, such as a CPU or MPU) that reads and executes a program recorded in a memory device to perform the functions of the modalities. described above, and by one method, the steps thereof are performed by a computer of a system or apparatus, for example, when reading and executing a program recorded in a memory device to perform the functions of the above-described modalities. For this purpose, the program is provided to the computer, for example, over a network or from recording media of various types that serve as the memory device (for example, computer readable medium). [00227] While the present invention has been described with reference to exemplary embodiments, it should be understood that the invention is not limited to the described exemplary embodiments. The scope of the following claims shall conform to the broadest interpretation to encompass all such modifications and equivalent structures and functions. [00228] This application claims the benefit of Japanese patent application number 2013-015647, filed January 30, 2013, which is incorporated herein by reference in its entirety.
权利要求:
Claims (14) [0001] 1. An imaging apparatus comprising: an authentication unit configured to perform user information authentication process inclusion to authenticate an operational user as a registered user; a storage unit configured to store print data including user information associated with the registered user; a display unit configured to display information to the operational user; an imaging unit configured to perform imaging based on the print data; and a control unit configured to control the authentication unit, the storage unit, the display unit and the imaging unit, wherein the authentication unit is capable of authenticating the operating user as a specified user, the unit storage unit is capable of storing print data associated with the specified user, and the display unit is capable of displaying information related to the print data, characterized by the fact that: the control unit performs: a process to make the imaging apparatus performs imaging on the basis of the print data selected by the operational user, in accordance with a print instruction of the operational user; a process for deleting print data selected by the operational user from the storage unit in accordance with a delete instruction from the operational user; a first process for controlling the display unit to display, to the operating user authenticated as the specified user, but not an administrator, by the authentication unit, print data information associated with the specified user (SIM for S1405, S1408, S1409 ); a second process for controlling the display unit to display, to the unauthenticated operational user as the user specified by the authentication unit, all print data information stored in the storage unit in a state where the delete process is prevented (NO for S1405, S1406); and a third method for controlling the display unit to display, to the authenticated operational user not only as the specified user, but also as the administrator by the authentication unit, all print data information stored in the storage unit in a state in which where the delete process is allowed (YES for S1405, NO for S1407), and where the control unit receives the print instruction for the print data associated with the specified user and receives the delete instruction for the print data associated with the specified user, during the first process (S1409), the control unit receives the print instruction for the print data and does not receive the delete instruction for the print data during the second process (S1406), and the Control unit receives the print instruction for the print data and receives the delete instruction for the print data during the third process. [0002] 2. The imaging apparatus according to claim 1, characterized in that the imaging apparatus has a plurality of functions including a printing function of enabling the imaging apparatus to perform the image information. in accordance with the operating user's print instruction, wherein the imaging apparatus is operated in a first mode in which all functions among the plurality of functions are permitted to be used by the operating user authenticated by the authentication unit, and in a second mode in which a function other than the print function among the plurality of functions is allowed to be used by the operating user authenticated by the authentication unit, and in which the control unit executes the second process in the second mode. [0003] 3. Imaging apparatus according to claim 1, characterized in that the control unit performs a third process for controlling the display unit to display, for the operating unit authenticated as an administered user other than the specified user by the authentication unit, print data information stored in the storage unit including the print data associated with the specified user, and the control unit receives the print instruction for the print data associated with the specified user and receives the instruction to delete for the print data associated with the specified user, during the third process. [0004] 4. Imaging apparatus according to claim 1, characterized in that the control unit performs a fourth process to control the display unit to display, to the operating user other than the registered user, information from the data of print data not associated with the registered user from among the print data stored in the storage unit, and the control unit receives the print instruction for the print data not associated with the registered user during the fourth process. [0005] 5. A method of controlling an imaging apparatus used for an imaging system, wherein the imaging system comprises: an authentication unit configured to perform an authentication process to authenticate an operational user as a registered user ; a storage unit configured to store print data including user information associated with the registered user; a display unit configured to display information to the operational user; and an imaging unit configured to perform imaging based on the print data; wherein the authentication unit is capable of authenticating the operating user as a specified user, the storage unit is capable of storing print data associated with the specified user, and the display unit is capable of displaying information related to the print data , the control method characterized in that it performs: the control unit performs: a process for causing the imaging apparatus to perform imaging on the basis of the print data selected by the operating user, in accordance with an instruction operating user print; a process for deleting print data selected by the operational user from the storage unit in accordance with a delete instruction from the operational user; a first method of controlling the display unit to display, to the operating user authenticated as the specified user, but not as an administrator, by the authentication unit, print data information associated with the specified user; and a second process for controlling the display unit to display, to the unauthenticated operational user as the user specified by the authentication unit, all print data information stored on the storage unit in a state where the delete process is prevented; and a third method for controlling the display unit to display, to the authenticated operational user not only as the specified user, but also as the administrator, by the authentication unit, all print data information stored on the storage unit in a state where the delete process is allowed (YES for S1405, NO for S1407), and where the print instruction for the print data associated with the specified user is received and the delete instruction for the print data associated with the specified user. specified user is received, during the first process, the print instruction for the print data associated with the specified user is received and the delete instruction for the print data associated with the specified user is not received, during the second process, and the print instruction for the print data is received and the delete instruction for the print data is received, during the third the process. [0006] 6. Imaging apparatus which is capable of performing a printing function without user authentication, comprising: a storage unit configured to store a plurality of print jobs, to each of which user information is added; an operating unit configured to display the plurality of print jobs stored in the storage unit when the print function is selected; a printing unit configured to print an image of the print job selected from the plurality of print jobs displayed on the operating unit; and a control unit configured to authenticate a user using the imaging apparatus and allow the operation unit to display the authenticated user's print job, characterized by the fact that: in a case where the user using the apparatus image formation is identified when the print function is selected, the control unit allows the operation unit to display the print job having user information added to it corresponding to the user, and in a case where the user using the imaging device is not identified when the print function is selected, the control unit allows the operation unit to display the print jobs stored in the storage unit. [0007] 7. Image formation device, according to claim 6, characterized in that the control unit allows the operation unit to display all print jobs stored in the storage unit, as long as the user is an administrator himself whether the user using the imaging device is identified when the print function is selected. [0008] 8. Imaging apparatus according to claim 6, characterized in that, in a case where the user using the imaging apparatus is not identified when the print function is selected, the control unit allows the operation unit to display all print jobs stored on the storage unit and inhibits an operation to cancel the displayed print jobs. [0009] 9. Image formation device, according to claim 6, characterized in that the control unit is capable of allowing the operation unit to display print job history information, and the control unit allows the operating unit only display the user's print job among the print job history information in a case where the user using the imaging device is identified when allowing the operating unit to display the job history information and allows the operation unit to display the history information of print jobs with the history information masked in a case where the user using the imaging apparatus is not identified when allowing the operation unit to display the print job history information. [0010] An imaging apparatus according to claim 6, further characterized in that it comprises a receiving unit configured to receive the print job, having user information added thereto, from an external apparatus via a network. [0011] 11. Image formation device, according to claim 10, characterized in that the user information is information identifying a user who instructs to transmit the print job through the external device. [0012] 12. The imaging apparatus according to claim 6, characterized in that the imaging apparatus operates in either of a role-based authentication mode and a login mode. [0013] 13. An imaging apparatus according to claim 12, characterized in that the printing function is set to require or not user authentication when the imaging apparatus operates in the role-based authentication mode. [0014] 14. A method of controlling an imaging apparatus which is capable of performing a print function without user authentication, the method comprising: storing a plurality of print jobs, to each of which user information is added; displaying the plurality of print jobs stored in the storage unit when the print function is selected; printing an image of the print job selected from the plurality of print jobs displayed; and authenticating a user using the imaging apparatus and displaying the authenticated user's print job, characterized by: displaying, in a case where the user using the imaging apparatus is identified when the printing function is selected , the print job having user information added to it corresponding to the user, and display, in a case where the user using the imaging apparatus is not identified when the print function is selected, the print jobs stored in the storage unit.
类似技术:
公开号 | 公开日 | 专利标题 BR102014002275B1|2022-01-25|Imaging apparatus equipped with secure printing function and method for controlling the same US9538045B2|2017-01-03|Printing apparatus, control method therefor, and computer-readable medium US9813589B2|2017-11-07|Printing apparatus, printing apparatus control method, and program US9246911B2|2016-01-26|Authentication apparatus, authentication system, authentication method, and recording medium having authentication program recorded thereon BR102014003361A2|2015-12-08|printing apparatus, printing method, and storage medium KR20160035981A|2016-04-01|Image forming apparatus, and method for controlling image forming apparatus BR102012020395B1|2021-01-05|control apparatus and control method CN107797774A|2018-03-13|Information processor and method JP6552341B2|2019-07-31|IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND PROGRAM CN104811580B|2018-06-22|The image processing apparatus and its control method of the data of storage can effectively be deleted US9705876B2|2017-07-11|Image forming apparatus capable of reducing security risk, method of controlling image forming apparatus, system including image forming apparatus, and storage medium JP2007183743A|2007-07-19|Information processor, operation control method, program and storage medium JP2012234439A|2012-11-29|Image processing apparatus, data management method therefor, and program JP2015155159A|2015-08-27|Image processing system, image processing method JP6025797B2|2016-11-16|Image forming apparatus, method for controlling the apparatus, and program JP2012003730A|2012-01-05|Printing apparatus, security printing method, printing program, printing system, and printer driver JP6351786B2|2018-07-04|Image forming apparatus, control method therefor, and program RU2575407C2|2016-02-20|Imaging device having secure printing function, method of controlling said device and storage medium JP2013242705A|2013-12-05|Display system, display device, information apparatus and computer program JP2010152483A|2010-07-08|Print control program, print control device, and printing system JP6400144B2|2018-10-03|Printing apparatus, printing apparatus control method, and program JP2014059721A|2014-04-03|Log-in management device, image processor, log-in management method, and log-in management program JP2021184234A|2021-12-02|Printing system and program JP2011180785A|2011-09-15|Printing control system, printing control apparatus, control method, program, and storage medium
同族专利:
公开号 | 公开日 US20160171355A1|2016-06-16| EP2763073B1|2017-10-25| US9299018B2|2016-03-29| KR20170115014A|2017-10-16| BR102014002275A8|2021-08-31| EP3296911A1|2018-03-21| CN103970491A|2014-08-06| PH12014000034A1|2015-08-03| JP6128863B2|2017-05-17| SG2014004469A|2014-08-28| US20140211240A1|2014-07-31| US10083382B2|2018-09-25| KR20140097976A|2014-08-07| MY170939A|2019-09-19| JP2014144619A|2014-08-14| RU2014102942A|2015-08-10| BR102014002275A2|2015-12-08| CN103970491B|2017-05-24| EP2763073A1|2014-08-06| KR101861144B1|2018-05-25| KR20160073952A|2016-06-27|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US7444394B2|1997-02-03|2008-10-28|Canon Kabushiki Kaisha|Network data base control device and method thereof| AU710166B2|1997-02-19|1999-09-16|Fuji Photo Film Co., Ltd.|Edited image printing system and method| JPH11227267A|1998-02-16|1999-08-24|Canon Inc|Image forming equipment and control method therefor| JP2000076028A|1998-08-28|2000-03-14|Hitachi Koki Co Ltd|Print controller| JP4387687B2|2002-04-26|2009-12-16|キヤノン株式会社|Image processing apparatus, control method, and program| US7254831B2|2002-12-04|2007-08-07|Microsoft Corporation|Sharing a sign-in among software applications having secured features| JP3840244B2|2003-11-12|2006-11-01|キヤノン株式会社|Printing apparatus, job processing method, storage medium, program| JP4576132B2|2004-02-25|2010-11-04|株式会社リコー|Authentication method and authentication apparatus| JP2005300605A|2004-04-06|2005-10-27|Canon Inc|Image processing device, information processing system and its control method| JP2005328322A|2004-05-14|2005-11-24|Ricoh Co Ltd|Image output device| JP2005324450A|2004-05-14|2005-11-24|Canon Inc|Image forming apparatus, information processing apparatus, job displaying and controlling method, storage medium storing computer-readable program and program| JP4898101B2|2004-07-02|2012-03-14|株式会社リコー|Printing apparatus, printing method, printing program, and recording medium| JP2006202269A|2004-12-22|2006-08-03|Canon Inc|Information processor, control method of information processor, program thereof, and storage medium| JP2006243846A|2005-02-28|2006-09-14|Sharp Corp|Data processor and data processing method| JP4754254B2|2005-04-15|2011-08-24|シャープ株式会社|Image output device| US8832047B2|2005-07-27|2014-09-09|Adobe Systems Incorporated|Distributed document version control| JP2007079684A|2005-09-12|2007-03-29|Murata Mach Ltd|Processor| US20070076238A1|2005-09-19|2007-04-05|Kabushiki Kaisha Toshiba|Image forming apparatus and data protection method| JP4826186B2|2005-09-21|2011-11-30|富士ゼロックス株式会社|Device and history display control method| GB2431021A|2005-10-04|2007-04-11|Canon Europa Nv|Login control for multiple applications| US20070081184A1|2005-10-12|2007-04-12|Daos Brenda F|System and method for releasing multiple document processing operations| US20070103712A1|2005-11-04|2007-05-10|Fatima Corona|System and method for limiting access to a shared multi-functional peripheral device based on preset user privileges| CN1979513A|2005-12-01|2007-06-13|佳能株式会社|Printing system, method for controlling a printing system, image forming apparatus, and controller of print system| US8456653B2|2005-12-12|2013-06-04|Canon Kabushiki Kaisha|Data processing apparatus for producing print job data whose authority is managed by external server, and image processing apparatus for printing a print job whose authority is managed by external server| US7249900B1|2006-02-01|2007-07-31|Ricoh Company Limited|Approach for implementing locked printing on printing devices| JP2007241939A|2006-03-13|2007-09-20|Ricoh Co Ltd|Image forming apparatus| JP2007286908A|2006-04-17|2007-11-01|Canon Inc|Management system, its control method, computer program, and storage medium| JP4306690B2|2006-04-29|2009-08-05|コニカミノルタビジネステクノロジーズ株式会社|Image forming apparatus, image processing system, print data output method, and print data output program| JP5002277B2|2007-02-06|2012-08-15|キヤノン株式会社|Job processing apparatus, method for controlling job processing apparatus, storage medium, and program| JP4674595B2|2007-04-18|2011-04-20|村田機械株式会社|Image forming apparatus| JP2009018552A|2007-07-13|2009-01-29|Riso Kagaku Corp|Printer having authentication printing function| JP4706685B2|2007-10-12|2011-06-22|富士ゼロックス株式会社|Information processing apparatus, information processing system, and information processing program| JP5127550B2|2008-04-25|2013-01-23|キヤノン株式会社|Image forming apparatus and user authentication method| JP5235540B2|2008-07-11|2013-07-10|キヤノン株式会社|Information processing system, information processing apparatus, information processing method, and program| JP2010061583A|2008-09-05|2010-03-18|Riso Kagaku Corp|Information processing apparatus| JP2010097539A|2008-10-20|2010-04-30|Oki Data Corp|Image processing apparatus| JP5398231B2|2008-11-04|2014-01-29|キヤノン株式会社|Image processing apparatus, control method therefor, and program| JP2010193253A|2009-02-19|2010-09-02|Seiko Epson Corp|Image processing apparatus and control method thereof| JP2010208052A|2009-03-06|2010-09-24|Ricoh Co Ltd|Image forming apparatus| JP4743297B2|2009-03-16|2011-08-10|コニカミノルタビジネステクノロジーズ株式会社|Image forming apparatus, function expansion method, and user authentication system| US8564811B2|2009-06-01|2013-10-22|Ricoh Company, Ltd.|Method and apparatus for distributing a locked print job| JP5523006B2|2009-08-03|2014-06-18|キヤノン株式会社|Image processing apparatus, job processing method, and program| JP5503950B2|2009-12-03|2014-05-28|株式会社沖データ|Image processing device| JP4900495B2|2010-03-15|2012-03-21|コニカミノルタビジネステクノロジーズ株式会社|Image forming apparatus, print job management method, and computer program| US8810812B2|2010-04-20|2014-08-19|Xerox Corporation|Method and system for consolidating and managing rendering jobs| JP5120443B2|2010-11-26|2013-01-16|コニカミノルタビジネステクノロジーズ株式会社|Document creation system, document creation method, image processing apparatus, and document creation processing program| JP5565308B2|2010-12-28|2014-08-06|ブラザー工業株式会社|Recording system, host device, and control program| JP5867780B2|2011-01-21|2016-02-24|ブラザー工業株式会社|Printing apparatus, print management system, and user authentication program| JP5728275B2|2011-04-05|2015-06-03|キヤノン株式会社|Information processing apparatus and control method thereof| JP5810776B2|2011-09-15|2015-11-11|株式会社リコー|Image processing apparatus and image processing apparatus processing method and program| JP5640971B2|2011-12-28|2014-12-17|コニカミノルタ株式会社|Information moving system, image processing apparatus, information moving method, and information moving program| JP5664876B2|2012-03-21|2015-02-04|コニカミノルタ株式会社|Image forming apparatus, operation control method for the same, and program| JP6128753B2|2012-05-21|2017-05-17|キヤノン株式会社|Printing apparatus, printing apparatus control method, and program|JP5772009B2|2011-01-26|2015-09-02|株式会社リコー|Image processing apparatus, function use control method, function use control program, and recording medium recording the program| JP2014187677A|2013-02-19|2014-10-02|Brother Ind Ltd|Image processing device and image processing system| JP6399730B2|2013-02-20|2018-10-03|キヤノン株式会社|Image forming apparatus and image forming method| JP6065344B2|2013-06-18|2017-01-25|富士ゼロックス株式会社|Image processing apparatus and program| JP5816655B2|2013-06-25|2015-11-18|京セラドキュメントソリューションズ株式会社|Input device, image reading device, and image forming device| JP5909215B2|2013-08-27|2016-04-26|シャープ株式会社|Authentication apparatus and image forming apparatus| JP6372114B2|2014-03-17|2018-08-15|富士ゼロックス株式会社|Image processing device| JP6415209B2|2014-09-24|2018-10-31|キヤノン株式会社|Printing apparatus, printing apparatus control method, and program| JP6375877B2|2014-10-31|2018-08-22|株式会社リコー|Information processing system, information processing method, service utilization apparatus, and program| JP6682183B2|2014-11-14|2020-04-15|キヤノン株式会社|Job processing apparatus, job processing apparatus control method, and computer program| JP5996615B2|2014-11-19|2016-09-21|京セラドキュメントソリューションズ株式会社|Electronic device and electronic device user authentication method| JP6493071B2|2015-07-30|2019-04-03|株式会社リコー|Information processing system, information processing apparatus, information processing method, and program| JP6390544B2|2015-07-31|2018-09-19|京セラドキュメントソリューションズ株式会社|Image forming apparatus| JP6552341B2|2015-08-28|2019-07-31|キヤノン株式会社|IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND PROGRAM| JP6634796B2|2015-11-30|2020-01-22|株式会社リコー|Information processing apparatus, program, and access control method| JP6501077B2|2016-03-25|2019-04-17|京セラドキュメントソリューションズ株式会社|Printing system| JP6747200B2|2016-09-09|2020-08-26|コニカミノルタ株式会社|Image processing system and image processing program| JP6762823B2|2016-09-21|2020-09-30|キヤノン株式会社|Image forming apparatus, control method of image forming apparatus, and program| JP6914706B2|2017-04-12|2021-08-04|キヤノン株式会社|Job processing device, job processing device control method, and program| JP6699627B2|2017-06-06|2020-05-27|京セラドキュメントソリューションズ株式会社|Image forming apparatus and authentication method executed by image forming apparatus| JP2019130747A|2018-01-31|2019-08-08|キヤノン株式会社|Image processing system, control method for image processing system and program| JP6993910B2|2018-03-13|2022-01-14|キヤノン株式会社|Information processing equipment, its control method, and programs| JP2020135605A|2019-02-22|2020-08-31|ブラザー工業株式会社|Information processing program| JP2020154819A|2019-03-20|2020-09-24|富士ゼロックス株式会社|Information processing apparatus, information processing system, and information processing program| JP2021022842A|2019-07-29|2021-02-18|キヤノン株式会社|Image reading device, control method of image reading device, and program| JP6962433B2|2019-12-10|2021-11-05|ブラザー工業株式会社|Program and printer set|
法律状态:
2015-12-08| B03A| Publication of a patent application or of a certificate of addition of invention [chapter 3.1 patent gazette]| 2018-11-13| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2020-02-27| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2021-08-31| B03H| Publication of an application: rectification [chapter 3.8 patent gazette]|Free format text: REFERENTE A RPI 2643 DE 25/08/2021 QUANTO AO ITEM 30. | 2021-12-14| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2022-01-25| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 29/01/2014, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 JP2013-015647|2013-01-30| JP2013015647A|JP6128863B2|2013-01-30|2013-01-30|Image forming apparatus, control method therefor, and program| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|