This application is based on the application No. 2008-125401 filed in Japan, the contents of which are hereby incorporated by reference.
1. Field of the Invention
The present invention relates to an image formation device connected to a network and an image formation system, and more particularly, relates to a technique of performing printing based on print data targeted for secure printing received through the network.
2. Description of the Background Art
In recent years, an image formation device such as a printer, a complex device or an MFP (multifunction peripheral) is connected to a network to construct an image formation system. In this image formation system, the image formation device receives print data through the network from a personal computer (PC), and the like, to execute a print job. In this image formation system, the image formation device is shared among several users. Hence, for the printing of confidential information, etc., a printed matter should not be exposed to outsiders. Thus, a conventionally used image formation device has a confidential print function that is what is called “secure printing”. When print data targeted for secure printing is received, a print job based on this print data is not executed immediately. Instead, the received print data is once stored in an internal storage part. When a user directly operates the image formation device to give instructions in order to generate a printout, the print data stored in the storage part is read to execute a print job.
Even when a user transmits print data targeted for secure printing from a PC and the like to the image formation device, the user may forget to perform operation for generating a printout after the elapse of time after transmission. In this case, the storage part of the image formation device is occupied by the forgotten print data, and confidential information is kept inside the image formation device. In response, the conventionally used image formation device is so configured that, when a print job based on print data targeted for secure printing stored in the storage part is not executed at a point in time after the elapse of a predetermined period of time, the user is informed of this fact so that the generation of a printout is not forgotten, or the print data is automatically deleted from the storage part (see for example Japanese Patent Application Laid-Open No. 2006-321144 or 2006-127429).
A user has conventionally had a problem that, even when the user after being informed of the fact from the image formation device that a print job has not been executed wants to generate a printout immediately, the user if at a place away from the image formation device cannot obtain a printout in situ. By way of example, in order to print a document necessary for a meeting or a business trip, the user has transmitted data of this document as print data targeted for secure printing to the image formation device. However, if the image formation device is used exclusively by another user or used exclusively for another job, or if the image formation device is in an error condition at the time of transmission, the user cannot generate a printout immediately, and may leave the document unprinted. When the user is informed of the fact from the image formation device that a print job has not been executed during the meeting or business trip, the user cannot obtain a printout of the print data in situ even when the user would like to get the printout.
First, the present invention is intended for an image formation device.
According to one aspect of the present invention, the image formation device is connected to a network, and comprises: a storage part for storing therein print data targeted for secure printing received through the network; an authentication part responsible for user authentication; a job execution part for reading the print data targeted for secure printing from the storage part to execute a print job when a user is authenticated by the authentication part; and a job management part for managing the print data targeted for secure printing stored in the storage part. When a print job is not executed at a point in time after the elapse of a predetermined period of time after the receipt of the print data targeted for secure printing, the job management part encrypts the print data using a certain encryption key, and transmits the encrypted print data to an intended storage device connected to the network.
According to this aspect, after the elapse of a predetermined period of time after the receipt of the print data targeted for secure printing, the image formation device encrypts the print data, and transmits the encrypted print data to the intended storage device connected to the network. Thus, the print data is transmitted to another device connected to the network with the security of the print data maintained. After transmission of the print data, by operating another image formation device connected to the network, for example, the print data is retrieved from the device to which the print data has been transmitted to obtain a printout.
Second, the present invention is intended for an image formation system.
According to one aspect of the present invention, the image formation system comprises: a first image formation device connected to a network; a first image formation device connected to the network; a server connected to the network, and including a storage device for storing therein print data transmitted from the first or second image formation device; and an information processing device connected to the network, and transmitting print data targeted for secure printing to the first or second image formation device. The first and second image formation devices each include: a manipulated input part for receiving manipulation from a user, a storage part for storing therein the print data targeted for secure printing received from the information processing device; an authentication part responsible for user authentication; a job execution part for reading the print data targeted for secure printing from the storage part to execute a print job when a user is authenticated by the authentication part; and a job management part for managing the print data targeted for secure printing stored in the storage part. When a print job is not executed at a point in time after the elapse of a predetermined period of time after the receipt of the print data targeted for secure printing, the job management part encrypts the print data using a certain encryption key, and transmits the encrypted print data to the server to store the encrypted print data into the storage device, while transmitting information for making access to a destination to save the encrypted print data through the network to a source of the print data targeted for secure printing. In the first or second image formation device, when instructions to obtain a printout of print data transmitted to the server are received through the manipulated input part, the job management part of the image formation device makes access to the storage device of the server based on the information entered through the manipulated input part to retrieve the encrypted print data, decrypts the encrypted print data using a certain decryption key, and causes the job execution part of the image formation device to execute a print job.
According to this aspect, when a print job is not executed at a point in time after the elapse of a predetermined period of time after the receipt of the print data targeted for secure printing in the first or second image formation device, the print data is transmitted to the server connected to the network to be stored in the storage device therein with the security of the print data maintained. Further, information for making access to a destination to save the print data transmitted from this image formation device is notified. Thus, by operating either the first or second image formation device, the print data is retrieved from the server and a print job is executed to thereby obtain a printout.
It is therefore an object of the present invention to provide an image formation device and an image formation system in which, when a print job based on print data targeted for secure printing received through a network is not executed at a point in time after the elapse of a predetermined period of time, the print data targeted for secure printing is transmitted to another device connected to the network with the security of the print data maintained and a user operates another image formation device connected to the network, thereby obtaining a printout.
Preferred embodiments of the present invention are described in detail below with reference to figures. In the description given below, those elements which are shared in common among the preferred embodiments are represented by the same reference numerals, and these elements are not discussed repeatedly for the same description.
The plurality of image formation devices 10 may be installed in an arbitrary place. In the first preferred embodiment, the image formation device 10a is installed in an office 3 in which a user 5 usually works, and the image formation device 10b is installed in an office 4 separate from the office 3. The image formation device 10 is what is called a complex machine or an MFP, and has several functions as a copier, a FAX, a printer, a scanner, and others. The image formation device 10 is provided with an operation panel 15 on its front, which functions as a manipulated input part for receiving manipulation from a user, and a printer mechanism 29 inside for forming an image on an image formation medium such as a sheet to generate a printout. The printer mechanism 29 executes a print job based on print data received for example from the information processing device 30 through the network 2.
The information processing device 30 is formed from a generally-used personal computer (PC) and the like. The user 5 mainly uses the information processing device 30, normally in a condition where the information processing device 30 is connected to the network 2 in the office 3. A user operates the information processing device 30, so that the information processing device 30 transmits print data to the image formation device 10. At this time, when the user selects secure printing in order to print confidential information, etc., the information processing device 30 generates print data targeted for secure printing, and transmits the same to the image formation device 10. If the information processing device 30 is formed, for example, from a portable notebook PC, the user 5 can carry the information processing device 30 as the user 5 moves. Hence, the user 5 is allowed to carry the information processing device 30 into the office 4, and use the information processing device 30 there after connecting the information processing device 30 to the network 2.
The server 40 is formed from a generally-used computer, and includes therein a storage device 41 such as a hard disk. The server 40 may be installed in an arbitrary place. As an example, the server 40 may be installed in the office 3, or in the office 4. Alternatively, as shown in
In the image formation system 1 of the first preferred embodiment, when the user 5 operates the information processing device 30 for example in the office 3 to transmit print data targeted for secure printing to the image formation device 10a, the image formation device 10a temporarily stores the print data targeted for secure printing inside. When the user 5 operates the operation panel 15 of the image formation device 10a to give instructions for printing within a predetermined period of time, the image formation device 10a reads the print data targeted for secure printing stored therein to execute a print job. When the user 5 does not give instructions for printing within a predetermined period of time, the image formation device 10a transfers the print data targeted for secure printing stored therein to the server 40 through the network 2. So, the server 40 stores the print data targeted for secure printing received from the image formation device 10a into the storage device 41. Along with the transfer of the print data targeted for secure printing to the server 40, the image formation device 10a notifies the user 5 of information for making access to the print data thereby transferred. At this time, when the user 5 has moved from the office 3 to the office 4 as indicated by a dashed line in
The operation panel 15 is formed from a liquid crystal display and the like. The operation panel 15 has a display part 15a for presenting various types of information to a user, and an operation part 15b formed from a touch panel, a plurality of operation buttons arranged around the display part 15a, etc., and which receives the manipulation from the user. The storage part 18 stores therein information on users as user information 19 who are registered with the image formation device 10. The storage part 18 also stores therein print job data 20 targeted for secure printing the image formation device 10 has received from the information processing device 30 through the network 2. The printer section 25 and the sheet feed section 26 constitute the above-discussed printer mechanism 29. When the image formation device 10 generates a printout, the sheet feed section 26 feeds sheets one by one to the printer section 25, and the printer section 25 forms images upon these sheets. The scanner section 27 and the original transport section 28 constitute an image reading part. As an example, the original feed section 28 transports originals one by one to the scanner section 27, and the scanner section 27 read images from these originals. In the first preferred embodiment, the image formation device 10 is illustratively a complex device or an MFP, so the image formation device 10 has the scanner section 27 and the original transport section 28. When the image formation device 10 is dedicated to printing, for example, the scanner section 27 and the original transport section 28 are not provided.
In order to process print data targeted for secure printing, the CPU 10 is operative to function as a user authentication part 12, a job management part 13 and a job execution part 14. The user authentication part 12 performs user authentication when a print job targeted for secure printing is executed. The user authentication part 12 makes reference to the user information 19 stored in advance in the storage part 18.
The job management part 13 stores print data targeted for secure printing received from the information processing device 30 into the storage part 18, and is responsible for the management of print data targeted for secure printing. When print data the image formation device 10 has received from the information processing device 30 through the network 2 is targeted for secure printing, additional information is received together with the print data. When the job management part 13 receives print data targeted for secure printing from the information processing device 30, the job management part 13 obtains the time of receipt from the clock circuit 17, and stores the received print data as print job data 20 in which print data 21 targeted for secure printing, additional information 22 added to the print data 21, and date and time of receipt 23 are linked into the storage part 18.
The job management part 13 manages the print data 21 targeted for secure printing that is being stored in the storage part 18 until a predetermined period of time recorded as the data retention period 22c has elapsed from the date and time of receipt 23. After the predetermined period of time recorded as the data retention period 22c has elapsed after the date and time of receipt 23, the job management part 13 reads the print data 21 targeted for secure printing from the storage part 18, encrypts the print data 21 using the public key 22b contained in the additional information 22, and transfers the print data thereby encrypted to the server 40. Along with this transfer, the job management part 13 reads the electronic mail address 19c of a user from the user information 19, and sends an electronic mail to the user from which the print data 21 targeted for secure printing has been sent, thereby transmitting information on the transfer destination of the print data 21 to the user.
The job execution part 14 controls the printer section 25, the sheet feed section 26, the scanner section 27 and the original transport section 28, thereby controlling the execution of a job designated by the image formation device 10. Especially when a print job is targeted for secure printing, and as long as a user is successfully authenticated by the user authentication part 12, the job execution part 14 reads the print data 21 targeted for secure printing from the storage part 18, and controls the printer mechanism 29 including the printer section 25 and the sheet feed section 26 to execute the print job.
The information processing device 30 includes a display part 31 such as a liquid crystal display, an operation part 32 such as a keyboard, a communication interface 33 for making connection with the network 2, and a CPU 34. The CPU 34 executes a certain program such as a printer driver for outputting print data to the image formation device 10 to thereby function as a print data generation part 35, an additional information generation part 36 and a job transmission part 37. The print data generation part 35 generates the print data 21 from the data of a document such as a confidential document, for example, in a format that is applicable as a print job by the image formation device 10. The additional information generation part 36 generates the additional information 22 discussed above. When a user operates the operation part 32 to select secure printing, information indicating that the print data 21 is targeted for secure printing and information for specifying a user are added to the attribute information 22a. Further, a public key entered by the user is set as the public key 22b of the additional information 22, and a data retention period entered by the user is set as the data retention period 22c of the additional information 22. The job transmission part 37 transmits the print data 21 generated by the print data generation part 35 and the additional information 22 generated by the additional information generation part 36 to the image formation device 10 designated by the user.
The server 40 includes, in addition to the storage device 41 discussed above, a communication interface 42 for making connection with the network 2, and a CPU 43. The CPU 43 executes a certain program for causing the server 40 to function as a pull print server to thereby function as a data management part 44. The data management part 44 stores the print data 21 targeted for secure printing received from the image formation device 10 through the network 2 into the storage device 41. The data management part 44 also puts restrictions on access to the print data 21 stored in the storage device 41. By way of example, the data management part 44 sets a password for protecting a folder containing the print data 21. When a request to access the print data 21 targeted for secure printing stored in the storage device 41 is made through the network 2, the data management part 44 rejects the request unless an input made thereto coincides with the password. When an input made to the data management part 44 coincides with the password, the data management part 44 accepts the request to allow the image formation device 10 connected to the network 2 to retrieve the print data 21 targeted for secure printing from the storage device 41. The password set by the data management part 4 may be a one-time password (temporary password allowing access to a folder containing the print data 21 only once), for example. In this case, even a user without the right to access the server 40 is allowed to temporarily access the server 40 by using the one-time password, so that the user can retrieve the print data 21 targeted for secure printing from the storage device 41 of the server 40.
The operation of the image formation system 1 with the above-mentioned configuration is discussed next. In the case given by way of example in the following, the user 5 operates the information processing device 30 to transmit print data targeted for secure printing to the image formation device 10a. After the elapse of a predetermined period of time, the user 5 operates the image formation device 10b to cause the image formation device 10b to execute a print job.
When the data retention period of the print data 21 has already elapsed, the job management part 13 first reads the print data 21 stored in the storage part 18, and converts the print data 21 to data in a generally applicable format (step S33). Namely, the print data 21 the image formation device 10a has received from the information processing device 30 is in a format specific to the image formation device 10a, and the image formation device 10a is allowed to execute a print job of the print data 21 as it is. So, the print data 21 is converted to data in a generally applicable format that allows another image formation device to generate a printout. By way of example, the print data 21 is converted to raster data in a generally applicable print format, or to PDF data that can be handled by an arbitrary device. The job management part 13 thereby converts the print data 21 to data in a generally applicable format, so that another image formation device is allowed to read the converted print data to execute a print job.
The job management part 13 thereafter encrypts the converted print data in the generally applicable format using the public key 22b contained in the additional information 22 (step S34). This encryption includes process realized by the job management part 13 for prohibiting the print data from being successfully decrypted unless a secret key as a counterpart of the public key 22b is used. When the encryption of the print data is completed, the job management part 13 transmits the encrypted print data to the server 40 (step S35). The attribute information 22a contained in the additional information 22 may be added to the encrypted print data transmitted to the server 40. However, the other pieces of information (public key 22b and data retention period 22c) are not added to the encrypted print data transmitted to the server 40. The job management part 13 thereby encrypts the print data 21 containing confidential information, and transmits the encrypted print data to the server 40. The public key 22b used for the encryption does not leak out to the network 2. Thus, the print data 21 is transmitted to the server 40 with the security of the print data 21 maintained.
After storing the encrypted print data into the certain folder, the data management part 44 generates access information for making access to this folder through the network 2 (step S42). This access information contains account information and a password (such as a one-time password discussed above) for making access (login) to the server 40 through the network 2, the IP address of the server 40, information for specifying the storage device 41, information for specifying the folder in the storage device 41, the file name of the stored print data, information on a device capable of making access to the server 40 through the network 2, and others. The data management part 44 transmits the access information to the image formation device 10a from which the encrypted print data has been sent (step S43).
Turning back to
After the notification of the access information to the user 5, the job management part 13 deletes the print job data 20 from the storage part 18 (step S38). This prevents the print job data 20 for which a print job has not been executed from continuously occupying an available area of the storage part 18 of the image formation device 10a. This also prevents confidential information from being continuously held in the storage part 18 of the image formation device 10a.
Discussed next is a procedure in which, when the user 5 is notified of access information from the image formation device 10a at a place to which the user 5 has moved, the user 5 operates the nearest image formation device 10b to cause the image formation device 10b to execute a print job targeted for secure printing, thereby obtaining the printout 7 in situ.
Thereafter the job management part 13 determines whether or not encrypted print data is stored in the folder to which access has been made (step S53). When encrypted print data is not stored in the folder (when a result of step S53 is NO), no subsequent process is practicable so the process sequence stops here. When encrypted print data is stored in the folder (when a result of step S53 is YES), the job management part 13 retrieves the encrypted print data from the server 40 (step S54). If the folder to which access has been made contains several pieces of encrypted print data, only the print data with a file name coinciding with a file name designated by the user 5 is retrieved.
The job management part 13 displays an entry screen for a secret key for decrypting the encrypted print data on the display part 15a of the operation panel 15 to accept the entry of the secret key through the operation part 15b (step S55). The user 5 enters a secret key as a counterpart of the public key 22b to the image formation device 10b. Then, the job management part 13 decrypts the encrypted print data retrieved from the server 40 using the secret key entered by the user 5 (step S56). As a result, the print data targeted for secure printing is converted to print data in a generally applicable print format such as raster data or PDF data.
When instructions for printing given from the user 5 are received through the operation panel 15 (when a result of step S57 is YES), the job management part 13 brings the job execution part 14 into operation so that the job execution part 14 executes a print job (step S58). The job execution part 14 actuates the printer mechanism 29 to form an image on a sheet based on the decrypted print data to obtain the printout 7.
When the print job is completed, the job management part 13 deletes the print data stored in the image formation device 10b, and deletes the encrypted print data stored in the server 40 (step S59). As a result, confidential information is deleted from the image formation device 10b and the server 40. In the first preferred embodiment, when instructions for printing are not given in step S57 (when a result of step S57 is NO), an inquiry as to the deletion is made to the user 5. When instructions for deletion are given (when a result of step S60 is YES), the job management part 13 deletes the print data stored in the image formation device 10b, and deletes the encrypted print data stored in the server 40 (step S59). Thus, confidential information is deleted from the image formation device 10b and the server 40 without executing a print job.
In the first preferred embodiment, when a print job based on the print data 21 targeted for secure printing the image formation device 10a has received from the information processing device 30 through the network 2 is not executed at a point in time after the elapse of a predetermined period of time, the image formation device 10a encrypts the print data 21 targeted for secure printing using the public key 22b, and transmits the encrypted print data 21 to the server 40 with the security of confidential information maintained. The transmission of the print data 21 causes the image formation device 10a to notify the user 5 of information for making access to the print data stored in the server 40. Thus, the user 5 even if at a place away from the image formation device 10a is allowed to retrieve the encrypted print data from the server 40 by operating the image formation device 10b also connected to the network 2. The user 5 enters a secret key known only to the user 5 to decrypt the encrypted print data at the image formation device 10b, by which the image formation device 10b executes a print job.
Especially in the first preferred embodiment, when encrypted print data is transmitted from the image formation device 10a to the server 40, or when the image formation device 10b receives encrypted print data from the server 40, key information relating to a public key or a secret key never leaks out to the network 2. Thus, the confidentiality of encrypted print data is maintained enough.
In the first preferred embodiment, when the image formation device 10a encrypts the print data 21, the print data 21 is converted to data in a generally applicable format before the encryption. Thus, the image formation device 10b even of a type different from the type of the image formation device 10a is allowed to execute a print job without any problem based on print data obtained by decryption.
In the description given above, after encrypted print data is transmitted from the image formation device 10a to the server 40, a user operates the image formation device 10b to obtain the printout 7. When the user operates the image formation device 10a likewise, the user is also allowed to obtain the printout 7 in situ.
A second preferred embodiment of the present invention is discussed next. In the first preferred embodiment discussed above, a public key is used to encrypt print data, and the encryption by the public key includes process for prohibiting the print data from being decrypted unless a specific secret key is used. However, the amount of print data is generally large. So, the encryption of print data by a public key takes a long time for computation, decreasing the processing efficiency of the image formation device 10. In the second preferred embodiment, in order to reduce a burden of the encryption of print data, a common key applicable both as an encryption key and a decryption key is used to encrypt print data. In the second preferred embodiment, the overall configuration and the structure of each element of the image formation system 1 are the same as those of the first preferred embodiment. Further, process steps performed by the information processing device 30 for transmitting the print data 21 targeted for secure printing to the image formation device 10a, and the contents of data to be transmitted are the same as those in the first preferred embodiment.
In the second preferred embodiment, the image formation device 10a also stores the print data 21 in the storage part 18 that has been received from the information processing device 30 through the network 2. The job management part 13 manages the print data 21 stored in the storage part 18. When the user 5 does not execute a print job within a predetermined period of time, the image formation device 10a performs processing based on the flow diagram of
When the data retention period of the print data 21 has already elapsed, the job management part 13 first reads the print data 21 stored in the storage part 18, and converts the print data 21 to data in a generally applicable format (step S103). This step is the same as step S33 in the flow diagram shown in
The job management part 13 thereafter retrieves the password 19b of the user 5 from the user information 19 stored in the storage part 18, and creates a common key from the password 19b (step S104). As an example, the password 19b retrieved from the user information 19 is subjected to computation according to a certain rule to create a common key that is applicable both for encryption and decryption.
Thereafter the job management part 13 encrypts the converted print data in the generally applicable format using the common key (step S105). When the print data is encrypted using the common key, the encrypted print data can be decrypted using the same common key. Namely, the encryption and decryption using the common key correspond to transformation and inverse transformation in terms of data processing. In the first preferred embodiment, the encryption of print data using a public key requires specific process for prohibiting the print data from being successfully decrypted unless a secret key as a counterpart of the public key is used. The encryption of print data using a common key as in the second preferred embodiment does not require such specific process, leading to improved processing efficiency. As discussed above, the amount of print data to be encrypted is large, so the encryption of print data using a public key is a considerably heavy burden. In contrast, print data is encrypted using a common key in the second preferred embodiment. This considerably reduces a burden of the encryption of print data.
When the encryption of the print data using the common key is completed, the job management part 13 encrypts the common key used for the encryption of the print data using the public key 22b contained in the additional information 22 (step S106). This encryption includes process realized by the job management part 13 for prohibiting the common key from being successfully decrypted unless a secret key as a counterpart of the public key 22b is used. The common key is extremely smaller in data amount than the print data. Thus, the encryption of the common key using the public key 22b requires a shorter period of time, thereby realizing efficient processing.
When the encryption of the common key is completed, the job management part 13 transmits the print data encrypted by the common key, and the common key encrypted by the public key 22b to the server 40 (step S107). The attribute information 22a contained in the additional information 22 may be added to the encrypted print data and the encrypted common key transmitted to the server 40. However, the other pieces of information (public key 22b and data retention period 22c) are not added to the encrypted print data and the encrypted common key transmitted to the server 40. The job management part 13 thereby encrypts the print data 21 containing confidential information using the common key, and transmits the encrypted print data to the server 40. The job management part 13 also encrypts the common key used for the encryption of the print data 21 using the public key 22b, and transmits the encrypted common key to the server 40. The public key 22b used for the encryption of the common key does not leak out to the network 2. Thus, the print data and the common key are transmitted to the server 40 with the security of the print data 21 and the common key maintained.
When the server 40 receives the encrypted print data and the encrypted common key from the image formation device 10a, the server 40 stores them in a certain folder. At this time, the server 40 performs the same process as in the first preferred embodiment (as discussed with reference to the flow diagram of
The image formation device 10a receives the access information from the server 40 (step S108). When the access information is received from the server 40, the job management part 13 notifies the user 5 of the received access information (step S109). This step is the same as step S37 in the flow diagram shown in
Discussed next is a procedure in the second preferred embodiment in which, when the user 5 is notified of the access information from the image formation device 10a at a place to which the user 5 has moved, the user 5 operates the nearest image formation device 10b to cause the image formation device 10b to execute a print job targeted for secure printing, thereby obtaining the printout 7 in situ.
Thereafter the job management part 13 determines whether or not encrypted print data is stored in the folder to which access has been made (step S123). When encrypted print data is not stored in the folder (when a result of step S123 is NO), no subsequent process is practicable so the process sequence stops here. When encrypted print data is stored in the folder (when a result of step S123 is YES), the job management part 13 retrieves the encrypted print data and an encrypted common key from the server 40 (step S124).
The job management part 13 displays an entry screen for a secret key for decrypting the encrypted common key on the display part 15a of the operation panel 15 to accept the entry of the secret key through the operation part 15b (step S125). Then, the user 5 enters a secret key as a counterpart of the public key 22b to the image formation device 10b. The job management part 13 decrypts the encrypted common key retrieved from the server 40 using the secret key entered by the user 5 (step S126). After the decryption of the common key, the encrypted print data is decrypted next using the decrypted common key (step S127). As a result, the print data targeted for secure printing is converted to print data in a generally applicable print format such as raster data or PDF data.
When instructions for printing given from the user 5 are received through the operation panel 15 (when a result of step S128 is YES), the job management part 13 brings the job execution part 14 into operation so that the job execution part 14 executes a print job (step S129). The job execution part 14 actuates the printer mechanism 29 to form an image on a sheet based on the decrypted print data to obtain the printout 7.
When the print job is completed, the job management part 13 deletes the print data and the common key stored in the image formation device 10b, and deletes the encrypted print data and the encrypted common key stored in the server 40 (step S130). As a result, confidential information is deleted from the image formation device 10b and the server 40. In the second preferred embodiment, when instructions for printing are not given in step S128 (when a result of step S128 is NO), an inquiry as to the deletion is also made to the user 5. When instructions for deletion are given (when a result of step S131 is YES), the job management part 13 deletes the print data and the common key stored in the image formation device 10b, and deletes the encrypted print data and the encrypted common key stored in the server 40 (step S130). Thus, confidential information is deleted from the image formation device 10b and the server 40 without executing a print job.
In the second preferred embodiment, the image formation device 10 encrypts print data using a common key that is also used to decrypt the print data. So the encryption of print data does not require specific process, and encryption is efficiently realized even when print data is in large amounts. Thus, the image formation system 1 of the second preferred embodiment improves the processing efficiency of the image formation system 1 as a whole to a greater degree while achieving the same effect as in the first preferred embodiment.
In the second preferred embodiment, a common key is created from the password 19b of the user 5 stored in the image formation device 10a. The common key thereby created is eventually transmitted to the image formation device 10b. Thus, even when the user 5 is not registered with the image formation device 10b, for example, the password 19b is reconstructed from the common key in the image formation device lob. So, user authentication is allowed using the reconstructed password 19b as a temporary password. More specifically, if the user 5 is authenticated at the image formation device 10b by giving instructions for printing through the operation panel 15 in step S128 discussed above, an entry screen for a password is displayed on the operation panel 15, and the execution of a print job is allowed when an entry made thereto coincides with the reconstructed password 19b. Thus, in the second preferred embodiment, the image formation device 10 with which the user 5 is not registered is temporarily used to obtain the printout 7. This further improves the convenience of the image formation system 1.
A third preferred embodiment of the present invention is discussed next. In the above-discussed first and second preferred embodiments, the image formation device 10a transmits print data to the server 40. When the user 5 is notified of access information on the print data generated in the server 40 from the image formation device 10a, the user 5 is required to move to the nearest image formation device 10 to delete the print data from the server 40 even when the user 5 no longer requires the execution of a print job. In the third preferred embodiment, the user 5 operates the information processing device 30 of its own to process print data transmitted to the server 40. In the third preferred embodiment, process steps performed by the information processing device 30 for transmitting the print data 21 targeted for secure printing to the image formation device 10a, and the contents of data to be transmitted are the same as those in the first preferred embodiment.
In the third preferred embodiment, the Web server part 24 is brought into operation after the image formation device 10 transmits print data to the server 40. The Web server part 24 causes the information processing device 30 to display a job handling screen, and receives job handling instructions from the information processing device 30. Job handling instructions the Web server part 24 has received from the information processing device 30 are transmitted to the job management part 13. Then, the job management part 13 deletes the print data stored in the server 40 or perform setting change of the print data based on the job handling instructions. Here, the setting change relates to the change of setting of print data, and includes various changes. As an example, single-sided printing may be changed to double-sided printing.
In the third preferred embodiment, the image formation device 10a also stores the print data 21 in the storage part 18 that has been received from the information processing device 30 through the network 2. The job management part 13 manages the print data 21 stored in the storage part 18. When the user 5 does not execute a print job within a predetermined period of time, the image formation device 10a performs processing based on the flow diagram of
When the data retention period of the print data 21 has already elapsed, the job management part 13 first reads the print data 21 stored in the storage part 18, and converts the print data 21 to data in a generally applicable format (step S203). This step is the same as step S33 in the flow diagram shown in
The job management part 13 thereafter encrypts the converted print data in the generally applicable format using the public key 22b (step S204). Here, like in the first preferred embodiment, the public key 22b is used to encrypt the print data. Alternatively, as discussed in the second preferred embodiment, a common key may be created from a password, and the common key may be used to encrypt the print data. In the third preferred embodiment, in the encryption of the print data, the print data and setting information relating to printing are separated. The print data is encrypted while the setting information is left unencrypted. After the encryption, the job management part 13 transmits the encrypted print data to the server 40 (step S205). At this time, the setting information left unencrypted is transmitted to the server 40 together with the encrypted print data.
Like in the first and second preferred embodiments, the image formation device 10a thereafter obtains access information from the server 40 (step S206). After the access information is received from the server 40, the job management part 13 notifies the received access information to the user 5 (step S207).
Then, the job management part 13 generates Web server information for making access to the Web server part 24 (step S208). This Web server information contains for example a URL for making access to the Web server part 24, an ID and a password for displaying a job handling screen, and the like. The job management part 13 encrypts the Web server information using the public key 22b (step S209), and notifies the user 5 of the encrypted Web server information (step S210). As an example, like in step S207, the notification of the encrypted Web server information is realized by transmitting an electronic mail containing the Web server information to the electronic mail address 19c of the user 5 contained in the user information 19. After the Web server information is notified to the user 5, the job management part 13 deletes the print job data 20 from the storage part 18 (step S211).
When the user 5 who has been notified of the access information from the image formation device 10a by the process discussed above wishes to execute a print job targeted for secure printing, the user 5 moves to the nearest image formation device 10 and operates the same to obtain the printout 7 as discussed in the first and second preferred embodiments.
When the user 5 who has been notified of the Web server information from the image formation device 10a wishes to delete print data or change the setting of the print data, the user 5 first operates the information processing device 30 to decrypt the encrypted Web server information received from the image formation device 10a. Namely, the user 5 enters a secret key to the information processing device 30 to decrypt the encrypted Web server information at the information processing device 30, by which the user 5 is allowed to know a URL for making access to the Web server part 24, an ID and a password for displaying a job handling screen, and the like. The user 5 continues to operate the information processing device 30 to start a generally employed browser program and enters information based on the Web server information, thereby making access from the information processing device 30 to the Web server part 24.
Thereafter the Web server part 24 is placed in a standby mode until job handling is received from the information processing device 30 (step S223). When job handling is received, the Web server part 24 determines whether the job handling relates to the deletion or setting change (step S224). When the job handling relates to the deletion of a print job, the Web server part 24 gives instructions to the job management part 13 to delete the print job. This causes the job management part 13 to make access to the server 40 to delete encrypted print data stored in the storage device 41 (step S225). When the job handling relates to setting change, the Web server part 24 creates another screen for setting change, transmits the same to the information processing device 30 to accept the entry of setting change from the information processing device 30 (step S226). When instructions for setting change are received from the information processing device 30, the Web server part 24 gives instructions to the job management part 13 to change the setting of a print job. Then, the job management part 13 makes access to the server 40, reads unencrypted setting information stored in the storage device 41 together with encrypted print data, and changes the contents of the setting information according to the instructions (step S227).
As a result, without the need to move to the nearest image formation device 10, the user 5 is allowed to delete print data or change the setting of the print data transmitted to the server 40 by operating the information processing device 30 of its own, thereby improving operation performance. Especially when the user 5 no longer requires the execution of a print job, the user 5 is only required to operate the information processing device 30 of its own without moving to the nearest image formation device 10, to thereby immediately delete print data containing confidential information from the server 40.
A fourth preferred embodiment of the present invention is discussed next. In the above-discussed third preferred embodiment, after the image formation device 10a transmits print data to the server 40, the user 5 operates the information processing device 30 to delete the print data or change the setting of the print data stored in the server 40. In the fourth preferred embodiment, before the image formation device 10a transmits print data to the server 40, the user 5 operates the information processing device 30 to transmit or delete the print data, or change the setting of the print data. In the fourth preferred embodiment, the overall configuration and the structure of each element of the image formation system 1 are the same as those of the first preferred embodiment (see
In the fourth preferred embodiment, the Web server part 24 is brought into operation before the image formation device 10 transmits print data to the server 40. The Web server part 24 causes the information processing device 30 to display a job handling screen, and receives job handling instructions from the information processing device 30. Job handling instructions the Web server part 24 has received from the information processing device 30 are transmitted to the job management part 13. Then, the job management part 13 transmits or deletes the print data 21 stored in the storage part 18, or change the setting of the print data 21 based on the job handling instructions.
In the fourth preferred embodiment, the image formation device 10a also stores the print data 21 in the storage part 18 that has been received from the information processing device 30 through the network 2. The job management part 13 manages the print data 21 stored in the storage part 18. When the user 5 does not execute a print job within a predetermined period of time, the image formation device 10a performs processing based on the flow diagram of
When the data retention period of the print data 21 has already elapsed, the job management part 13 generates Web server information for making access to the Web server part 24 (step S303). This Web server information contains for example a URL for making access to the Web server part 24, an ID and a password for displaying a job handling screen, and the like. The job management part 13 encrypts the Web server information using the public key 22b (step S304), and notifies the user 5 of the encrypted Web server information (step S305). As an example, like in step S210 of the third preferred embodiment (
When the user 5 who has been notified of the Web server information from the image formation device 10a by the process discussed above wishes to transmit or delete print data, or change the setting of the print data, the user 5 first operates the information processing device 30 to decrypt the encrypted Web server information received from the image formation device 10a. Namely, the user 5 enters a secret key to the information processing device 30 to decrypt the encrypted Web server information at the information processing device 30, by which the user 5 is allowed to know a URL for making access to the Web server part 24, an ID and a password for displaying a job handling screen, and the like. The user 5 continues to operate the information processing device 30 to start a generally employed browser program and enters information based on the Web server information, thereby making access from the information processing device 30 to the Web server part 24.
Thereafter the Web server part 24 is placed in a standby mode until job handling is received from the information processing device 30 (step S313). When job handling is received, the Web server part 24 determines whether the job handling relates to the transmission of print data (step S314).
When the job handling relates to the transmission of print data (when a result of step S314 is YES), the Web server part 24 gives instructions to the job management part 13 to transmit print data. In response, the job management part 13 reads the print data 21 stored in the storage part 18, and converts the print data 21 to data in a generally applicable format (step S316). This step is the same as step S33 in the flow diagram shown in
The job management part 13 thereafter encrypts the converted print data in the generally applicable format using the public key 22b (step S317). Here, like in the first preferred embodiment, the public key 22b is used to encrypt the print data. Alternatively, as discussed in the second preferred embodiment, a common key may be created from a password, and the common key may be used to encrypt the print data. After the encryption, the job management part 13 transmits the encrypted print data to the server 40 (step S318).
Like in the first and second preferred embodiments, the image formation device 10a thereafter obtains access information from the server 40 (step S319). After the access information is received from the server 40, the job management part 13 notifies the received access information to the user 5 (step S320), and thereafter deletes the print job data 20 from the storage part 18 (step S321). This prevents the print job data 20 for which a print job has not been executed from continuously occupying an available area of the storage part 18 of the image formation device 10a. This also prevents confidential information from being continuously held in the storage part 18 of the image formation device 10a.
When the job handling does not relates to the transmission of print data (when a result of step S314 is NO), the Web server part 24 determines whether the job handling relates to the deletion or setting change of print data (step S330 of
When the job handling relates to the deletion of a print job, the Web server part 24 gives instructions to the job management part 13 to delete the print job. This causes the job management part 13 to delete the print job data 20 containing the print data 21 from the storage part 18 (step S331). When the job handling relates to setting change, the Web server part 24 further creates a screen for setting change, transmits the same to the information processing device 30 to accept the entry of setting change from the information processing device 30 (step S332). When instructions for setting change are received from the information processing device 30, the Web server part 24 gives instructions to the job management part 13 to change the setting of a print job. Then, the job management part 13 reads the setting information of the print data 21 stored in the storage part 18, and changes the contents of the setting information according to the instructions (step S333). In order to transmit this print data 21 to the server 40, job handling may be performed again.
As a result, without the need to move to the nearest image formation device 10, the user 5 is allowed to transmit or delete print data that has been stored in the image formation device 10a for a period longer than a predetermined period after having being transmitted to the image formation device 10a, or change the setting of the print data by operating the information processing device 30 of its own. Especially in the fourth preferred embodiment, the user 5 is allowed to give instructions to transmit print data to the server 40. Namely, when the user 5 wishes to obtain the printout 7 at the nearest image formation device 10b, for example, the user 5 operates the information processing device 30 to transmit print data to the server 40. The user 5 thereafter operates the image formation device 10b based on access information notified from the image formation device 10a, so that the user 5 is allowed to obtain the printout 7 in situ. When the user 5 does not require a printout, the user 5 operates the information processing device 30 of its own to immediately delete print data containing confidential information from the storage part 18 before the print data is transmitted from the image formation device 10a to the server 40.
While the invention has been shown and described in detail, the foregoing description is in all aspects illustrative and not restrictive. It is therefore understood that numerous modifications and variations can be devised without departing from the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2008-125401 | May 2008 | JP | national |