The entire disclosure of Japanese Patent Application No. 2019-162015, filed on Sep. 5, 2019, is incorporated herein by reference.
The present disclosure relates to an image forming apparatus and a method for setting the same, and, more particularly, to an image forming apparatus and a method for setting the same, which can prevent information leakage.
In recent years, an apparatus provided with a voice controller is developed with the growth of voice recognition technologies. However, when the user uses the voice control to set sensitive information, such as a password, to the apparatus, the sensitive information may be leaked to people around the user. Thus, Japanese Laid-Open Patent Publication No. 2007-79852 discloses an apparatus provided with a voice controller which disables the voice control and switches to another operation unit for a user to set sensitive information to the apparatus.
Moreover, Japanese Laid-Open Patent Publication No. 2015-80120 discloses an apparatus in which when a user attempts to operate the apparatus with voice control with respect to a setting item that is set as sensitive information, the sensitive information stored in the apparatus is translated from the current set value into another set value, a translation table of the current set value and the translated set value is displayed on the apparatus, and the user uses the translated set value to operate the apparatus with voice control.
The technology disclosed in Japanese Laid-Open Patent Publication No. 2007-79852 fails to prevent the sensitive information from being leaked when the user accidentally input the sensitive information vocally after the operation unit has switched to an operation unit, other than the voice control. The technology disclosed in Japanese Laid-Open Patent Publication No. 2015-80120 fails to prevent the sensitive information from being leaked when the user accidentally input the set value (the sensitive information) vocally before the translation, rather than the translated set value.
According to one or more embodiments of the present invention, an image forming apparatus operable with voice control comprises: an operation unit (i.e., operation panel) that receives an operation through a user's action; a voice input unit (i.e., voice receiver) that receives input of voice (i.e., voice input); a voice identification unit (i.e., voice identification device) that identifies the voice received by the voice input unit; a voice controller that receives an operation through a user's voice, in accordance with identification information identified by the voice identification unit, the identification information being included in the voice; a storage that stores the identification information identified by the voice identification unit; and a controller (i.e., system controller) that controls the image forming apparatus, in accordance with the operation received by the operation unit or the voice controller, wherein the controller: determines whether items to be set in the image forming apparatus include a sensitive item which includes sensitive information; determines whether setting information, received by the operation unit for the item that is determined to be the sensitive item, matches the identification information stored in the storage; and requests the user to change the setting information when the setting information matches the identification information.
According to one or more embodiments, an image forming apparatus operable with voice control, includes: an operation unit that receives an operation through a user's action; a voice input unit that receives input of voice; a voice identification unit that identifies the voice received by the voice input unit; a voice controller that receives an operation through a user's voice, in accordance with identification information identified by the voice identification unit, the identification information being included in the voice; a storage that stores the identification information identified by the voice identification unit; and a controller that controls the image forming apparatus, in accordance with the operation received by the operation unit or the voice controller, wherein the controller: determines whether items to be set in the image forming apparatus include a sensitive item which includes sensitive information; when the operation unit receives setting information for the item determined to be the sensitive item, authenticates the setting information whether the setting information matches pre-set information of the sensitive item; determines whether the authenticated setting information matches the identification information stored in the storage; and requests the user to change the pre-set information of the sensitive item when the setting information matches the identification information.
According to one or more embodiments, a method for setting an image forming apparatus, the image forming apparatus including: an operation unit that receives an operation through a user's action; a voice input unit that receives input of voice; a voice identification unit that identifies the voice received by the voice input unit; a voice controller that receives an operation through a user's voice, in accordance with identification information identified by the voice identification unit, the identification information being included in the voice; a storage that stores the identification information identified by the voice identification unit; and a controller that controls the image forming apparatus in accordance with the operation received by the operation unit or the voice controller, the method includes: determining whether items to be set in the image forming apparatus include a sensitive item which includes sensitive information; determining whether setting information received by the operation unit for the item that is determined to be the sensitive item, matches the identification information stored in the storage; and requesting the user to change the setting information when the setting information matches the identification information.
According to one or more embodiments, a method for setting an image forming apparatus, the image forming apparatus including: an operation unit that receives an operation through a user's action; a voice input unit that receives input of voice; a voice identification unit that identifies the voice received by the voice input unit; a voice controller that receives an operation using a user's voice, in accordance with identification information identified by the voice identification unit, the identification information being included in the voice; a storage that stores the identification information identified by the voice identification unit; and a controller that controls the image forming apparatus in accordance with the operation received by the operation unit or the voice controller, the method includes: determining whether items to be set in the image forming apparatus include a sensitive item which includes sensitive information; when the operation unit receives setting information for the item determined to be the sensitive item, authenticating the setting information whether the setting information matches pre-set information of the sensitive item; determining whether the authenticated setting information matches the identification information stored in the storage; and requesting the user to change the setting information when the setting information matches the identification information.
The foregoing and other objects, features, aspects and advantages of one or more embodiments of the present invention will become more apparent from the following detailed description of the present invention when taken in conjunction with the accompanying drawings.
The advantages and features provided by one or more embodiments of the present invention will become more fully understood from the detailed description given herein below and the appended drawings which are given by way of illustration only, and thus are not intended as a definition of the limits of the present invention.
Hereinafter, embodiments of the present invention will be described with reference to the drawings. However, the scope of the present invention is not limited to the disclosed embodiments.
Embodiment 1 will be described, with reference to the accompanying drawings. Note that like reference signs are used to refer to like or corresponding parts, and the descriptions of such parts are not repeated.
Document reading unit 110 includes photoelectric conversion elements, such as a charge coupled device (CCD), and optically reads a document which is fed from an automatic document feeder, and outputs an image of the document in the form of electronic data.
Image forming unit 120 performs the xerographic printing process on the image output from document reading unit 110 or an image transmitted from a smartphone, to form the image on a recording medium, such as a paper supplied from a paper feed unit, thereby visualizing the image. For color printing, image forming unit 120 forms the image using four color toners (yellow, magenta, cyan, black). Note that image forming unit 120 may perform the inkjet printing process. Control panel (i.e., operation display panel) 160 includes a display unit and an operation unit.
MFP 100 also includes an operation unit 20 (i.e., operation panel), a system controller 30, a memory device 40, a job processing unit (i.e., job processor) 50, an image processing unit (image processor) 60, a network interface (IF) 70, a device IF 71, a user interface (UI) controller 80, a scanner controller 81, and a printer controller 82. Furthermore, in addition to the general MFP configurations, MFP 100 includes a voice input unit (i.e., voice receiver) 10, a voice identification unit 11 (i.e., voice identification device), and a voice controller 12. As such, upon receipt of input of user voice by voice input unit 10, MFP 100 can identify the voice by voice identification unit 11, and receive an operation of control panel 160 corresponding to the identified voice by voice controller 12. Voice controller 12 transmits to system controller 30 an operational signal corresponding to the user operation received by voice controller 12.
Operation unit 20 receives a user operation on the operation screen of control panel 160, and transmits an operational signal corresponding to the operation to system controller 30. Based on the operational signal, system controller 30 controls MFP 100. System controller 30 includes a central processing unit (CPU) for executing a program for each control. The functionaries of system controller 30 for processing sensitive information are now described with reference to the drawing.
Memory device 40 includes a ROM (Read-Only Memory), a RAM (Random Access Memory), a nonvolatile memory, etc. The ROM stores programs executed by the CPU of system controller 30, and data which is used to execute the programs. The RAM is used as a work area when the CPU executes the programs. The RAM also stores read data (image data) which is continuously sent from document reading unit 110, identification information identified by voice identification unit 11, etc. The nonvolatile memory stores information that is pre-set to the sensitive item, job information, information about a box containing multiple documents, etc. in MFP 100
Job processing unit 50 processes the job received through network IF 70 or the like into information that can be processed by document reading unit 110, image forming unit 120, etc.
Network IF 70 is an interface for connecting MFP 100 to a network. System controller 30 communicates, via network IF 70, with a computer or smartphone connected to the network, and transmits/receives data to/from the computer or smartphone. Network IF 70 is, for example, connectable to another device (e.g., smartphone) to receive job data to print from the other device. Network IF 70 is also capable of communication with a computer connected to the Internet via the network. Note that network IF 70 may perform wireless LAN communications.
Device IF 71 is a connector for connecting devices, such as voice input unit 10, document reading unit 110, image forming unit 120, and control panel 160, and system controller 30. UI controller 80 controls control panel 160. Scanner controller 81 controls document reading unit 110. Printer controller 82 controls image forming unit 120.
Note that the medium storing the programs that are executed by the CPU of system controller 30 is not limited to a CD-ROM, and may be a semiconductor memory, such as, an optical disc (MO (Magnetic Optical Disc)/MD (Mini Disc)/DVD (Digital Versatile Disc)), an IC card, an optical card, a mask ROM, an EPROM (Erasable Programmable ROM), or an EEPROM (Electrically EPROM).
The programs that are executed by the CPU of system controller 30 are not limited to the programs recorded in CD-ROMs. The programs may be stored in an auxiliary storage (e.g., HDD), loaded into a RAM, and executed. In this case, another computer that is connected to the network via network IF 70 may rewrite the programs stored in the auxiliary storage of MFP 100 or add and write a new program to the auxiliary storage. Furthermore, MFP 100 may download a program from the other computer connected to the network via network IF 70, and store that program into the auxiliary storage. Examples of the programs, as used herein, include not only programs that are executable directly by the CPU of system controller 30, but also source programs, compressed programs, and encrypted programs.
Next, a process for preventing leakage of the sensitive information in MFP 100 according to the present embodiment are now described in detail. Upon receipt of user voice input through voice input unit 10 (e.g., a microphone), MFP 100 identifies the voice by voice identification unit 11, and receives the voice, by voice controller 12, as an instruction for operating the operation screen of control panel 160. Moreover, system controller 30 stores the identification information, identified by voice identification unit 11, into memory device 40. Note that the identification information stored in memory device 40 will be referred to as a voice identification memory. Each time the screen of control panel 160 transitions to another screen, operation unit 20 displays an operation screen generated by UI controller 80. A sensitive information flag is previously enabled for a setting item that requires entry of sensitive information (e.g., a password), among setting items which are displayed on the operation screen. Here, the sensitive information is information that is disclosed only to a specific user, including a password, a destination, setting information, etc. UI controller 80 confirms each setting item on the operation screen as to whether the sensitive information flag of the setting item is enabled, thereby determining whether this item is a setting item which requires entry of the sensitive information. MPU 100 may also allow the administrator to enable or disable the sensitive information flag for each setting item.
If the operation screen includes a setting item (sensitive item) having sensitive information set thereto (YES in step S103), system controller 30 performs a voice identification memory process of storing a voice identification memory into memory device 40 (step S104). The process in step S104 is now described in more detail.
Returning to
System controller 30 authenticates the entered password in step S107, and determines whether the authentication is successful (step S108). If the authentication is failed (NO in step S108), system controller 30 displays information indicating that the authentication is failed on a screen of control panel 160 (step S109), and returns the process to step S102. If the authentication is successful (YES in step S108), system controller 30 determines whether the sensitive information, requested to be set from the user, is to be used again (step S110). If the sensitive information is to be used again (YES in step S110), system controller 30 checks the voice identification memory stored in memory device 40, whether the voice identification memory contains the setting information received by operation unit 20 from the user (step S111).
System controller 30 checks the voice identification memory stored in memory device 40 in step S111 to determine whether the setting information, received by operation unit 20 from the user, matches the voice identification memory (step S112). If the setting information does not match the voice identification memory (NO in step S112), system controller 30 discards the voice identification memory stored in memory device 40 (step S113). System controller 30 discards the voice identification memory stored in memory device 40 also when the sensitive information is not to be used again (NO in step S105). Specifically, for a password that can be used one time only, such as a one-time password, system controller 30 skips the processes in steps S111 through S112, and discards the voice identification memory stored in memory device 40.
If the setting information matches the voice identification memory (YES in step S112), system controller 30 requests the user to change the setting information, for example, change the registered password (step S114).
After the process in step S114, system controller 30 returns the process to step S102. After discarding the voice identification memory stored in memory device 40 in step S113, system controller 30 sets the setting item (step S115). If a screen of the setting item is a login screen as shown in
As an example of the setting item that requires the user to use the registered sensitive information, the user authentication using the user's password is described, with respect to
Returning to step S106, if the setting item does not require the use of registered sensitive information (NO in step S106), system controller 30 skips steps S107 through step S109, displays the setting item that does not require the use of registered sensitive information on the screen of control panel 160, and performs the process of step S110. Examples of the setting item that does not require the use of registered sensitive information include an item for which the user sets a password on a user registration screen.
If the password entered in the setting field matches the voice identification memory (YES in step S112), system controller 30 requests the user to change the setting information, for example, change the password to be set (step S114).
After discarding the voice identification memory stored in memory device 40 in step S113, system controller 30 sets the setting item (step S115). If a screen of the setting item is a user registration screen as shown in
As described above, the image forming apparatus (MFP 100) according to the present embodiment is an image forming apparatus operable with voice control, and includes: operation unit 20 which receives an operation through a user's action; voice input unit 10 which receives input of voice; voice identification unit 11 which identifies the voice received by the voice input unit 10; voice controller 12 which receives an operation through a user's voice, in accordance with identification information identified by voice identification unit 11, the identification information being included in the voice; memory device 40 which stores the identification information identified by voice identification unit 11; and system controller 30 which controls the image forming apparatus, according to the operation received by operation unit 20 or voice controller 12. System controller 30 includes: sensitivity determination unit 31 which determines whether items to be set in the image forming apparatus include a sensitive item which includes the sensitive information; determination unit 32 which determines whether setting information, received by operation unit 20 for the item that is determined to be the sensitive item by sensitivity determination unit 31, matches the identification information stored in memory device 40; and change request unit 33 which requests the user to change the setting information if determination unit 32 determines that the setting information matches the identification information. With this, the image forming apparatus according to the present embodiment can prevent the sensitive information spoken through the voice control from being leaked when setting the sensitive item which contains the sensitive information.
In the image forming apparatus (MFP 100) according to the present embodiment, system controller 30 includes: sensitivity determination unit 31 which determines whether items to be set in the image forming apparatus include a sensitive item which includes the sensitive information; an authentication unit which, when operation unit 20 receives setting information for the item that is determined to be the sensitive item by sensitivity determination unit 31, authenticates the setting information whether the setting information matches pre-set information of the sensitive item; determination unit 32 which determines whether the setting information authenticated by the authentication unit matches the identification information stored in memory device 40; and change request unit 33 which requests the user to change the pre-set information of the sensitive item if determination unit 32 determines that the setting information matches the identification information. With this, the image forming apparatus according to the present embodiment can prevent the sensitive information spoken through voice control from being leaked when authenticating the sensitive item which contains the sensitive information.
A method for setting the image forming apparatus (MFP 100) according to the present embodiment includes: determining whether items to be set in the image forming apparatus include a sensitive item which includes the sensitive information; determining whether the setting information, received by operation unit 20 for the sensitive item, matches the identification information stored in memory device 40; and requesting the user to change the setting information if the setting information matches the identification information. With this, the image forming apparatus according to the present embodiment can prevent leakage of the sensitive information spoken through voice control by the method for setting the sensitive item which includes the sensitive information.
Moreover, the method for setting the image forming apparatus (MFP 100) according to the present embodiment includes: determining whether items to be set in the image forming apparatus include a sensitive item which includes the sensitive information; authenticating setting information, received by operation unit 20 for the item that is determined to be the sensitive item, whether the setting information matches pre-set information of the sensitive item; determining whether the authenticated setting information matches the identification information stored in memory device 40; and if the setting information matches the identification information, requesting the user to change the setting information. With this, the image forming apparatus according to the present embodiment can prevent leakage of the sensitive information spoken through voice control, by the method for setting the sensitive item which includes the sensitive information.
In MFP 100, a user operates a job or document. When the user enters a password that is previously added to a job or document, as the user utters the password, another person can hear that voice. Thus, the password, which is sensitive information, may be leaked. Of course, if the job or document is discarded after various operations, the password will not be used again. Thus, the password will not be misused even if the sensitive information is leaked when it is entered. Thus, when the user operates a job with password or a document with password, MFP 100 determines whether the job or document is to be accumulated within MFP 100, together with the password, and, if that's the case, checks the voice identification memory.
Here, the document includes all the data subjected to image processing by an image processing unit 60 included in MFP 100, such as scanned data, image data, text data, and various app data. The document with password refers to a document that has a job command added thereto, which job command restricts access to the document with password. Furthermore, the job refers to a job that has a job command added thereto, which job command performs various operations on the above document. The job with password refers to the above job that has a job command added thereto, which job command restricts access to the job with password.
Next, a process for executing a job in MFP 100 is now described.
System controller 30 determines whether there is a job operation request from the user with respect to the job accumulated in memory device 40 (step S303). If no job operation request is present (NO in step S303), system controller 30 returns the process to step S301. If a job operation request is present (YES in step S303), system controller 30 displays a list of jobs on a control panel 160 (step S304).
MFP 100 temporarily accumulates a job which is received from outside through network IF 70. If the user selects a job and instructs MFP 100 to execute the job, job processing unit 50 parses a job command added to the job, and executes the job in accordance with the job command. Note that examples of the job received from outside of MFP 100 include a job received via a printer driver installed in an external terminal, a job received from an external fax machine via a telephone line, a job received via an external mail server or a mail server function within MFP 100, a job received via a Web application running on a browser on an external terminal, and a job saved to an external memory, such as a USB memory attached to MFP 100.
After parsing the job command of the job accumulated in memory device 40, system controller 30 determines whether a password is set to the job (step S307). If a password is set to the job (YES in step S307), system controller 30 displays a password entry screen on control panel 160 (step S308).
For example, as a password is entered in a password entry field (see
If the password is to be used again (YES in step S314), system controller 30 checks whether the voice identification memory stored in memory device 40 contains the password (the setting information) entered by the user on operation unit 20 (step S316). System controller 30 checks the voice identification memory in step S316, and determines whether the password entered by the user on operation unit 20 matches the voice identification memory stored in memory device 40 (step S317). If the password matches the voice identification memory (YES in step S317), system controller 30 requests the user to change the setting information, that is, change the job password (step S318).
System controller 30 requests the user to change the job password in step S318, and determines whether the job password is changed (step S319). If the job password remains unchanged (NO in step S319), system controller 30 returns the process to step S318. If the job password is changed (YES in step S319), system controller 30 changes the job command that contains the job password (step S320). After the job command is changed, or if the password entered by the user on operation unit 20 does not match the voice identification memory (NO in step S317), system controller 30 discards the voice identification memory stored in memory device 40 (step S321).
After discarding the voice identification memory stored in memory device 40 in step S321, if no password is set (NO in step S307) or if the password entered by the user does not match the voice identification memory (NO in step S317), system controller 30 executes the job (step S322).
If the job command of the job selected by the user has a password added thereto, system controller 30 requests the user to enter the job password (step S311). If the user enters the correct password, system controller 30 executes the job (step S322). If the user enters a wrong password, system controller 30 requests the user to re-enter a password, without executing the job. Note that if the user enters the correct password, system controller 30 parses, by job processing unit 50, the job command added to that job, and stores the job in memory device 40 together with the password, or externally transmits the job together with the password. In such a case, before executing the job, system controller 30 confirms whether the password is recorded in the voice identification memory. If a corresponding record is present, system controller 30 determines that this password is leaked, and requests the user to change the password (step S318). As the user sets a new password, system controller 30 adds the new password to the job command and executes the job.
As described above, the image forming apparatus (MFP 100) according to Embodiment 2 includes: job receive unit 51 which receives a job protected by a password which is sensitive information; password request unit 52 which requests a user to enter a password to execute the job received by job receive unit 51; job execution unit 53 which executes the job when setting information, received by operation unit 20 according to password request unit 52, matches the password; and memory device 40 (a job accumulating unit) which accumulates the job executed by job execution unit 53. System controller 30 further includes an accumulation determination unit 35 which determines whether the job is to be accumulated into memory device 40 after the job is executed by job execution unit 53. If accumulation determination unit 35 determines that the job is to be accumulated in memory device 40, determination unit 32 determines whether the password matches the identification information stored in memory device 40. If determination unit 32 determines that the password, entered by the user, matches the identification information, change request unit 33 requests the user to change the password. With this, the image forming apparatus (MFP 100) according to Embodiment 2 can prevent leakage of the sensitive information spoken through voice control when the job is password protected (the job has a job command having a password added thereto).
Note that the job received by job receive unit 51 may be a print job received from a terminal via a printer driver or a fax job received from an external FAX machine. The job received by job receive unit 51 may also be a job received from a terminal through an email, a job received via an application running on a terminal, or a job received via an external memory connected to the image forming apparatus.
A document processing performed by an MFP 100 according to Embodiment 3 is now described.
System controller 30 determines whether the user is requesting to display the document saved in the box (step S403). If a document display request is absent (NO in step S403), system controller 30 returns the process to step S401. If a document display request is present (YES in step S403), system controller 30 displays a document list on control panel 160 (step S404).
In MFP 100, as the user selects a document from the list of documents saved in the box, and specifies various operations, such as printing, transmitting, FAX transmitting, copying or moving the document to another box, editing, or deleting the document, the specified operation is added as a job command to the document data. As the user instructs MFP 100 to execute the job, an operation specified for the document is performed according to the job command.
Next, as a result of parsing the job command of the saved document, system controller 30 determines whether a password is set to the document (step S407). If no password is set to the document (NO in step S407), system controller 30 ends the process. If a password is set to the document (YES in step S407), system controller 30 displays a password entry screen on control panel 160 (step S408).
As a password is entered in the password entry field, for example, as shown in
If the password is to be used again (YES in step S416), system controller 30 checks whether the voice identification memory stored in memory device 40 contains the password (the setting information) received by operation unit 20 from the user (step S417). System controller 30 checks the voice identification memory stored in memory device 40 in step S417, and determines whether the password received by operation unit 20 from the user matches the voice identification memory (step S418). If the password matches the voice identification memory (YES in step S418), system controller 30 requests the user to change the setting information, that is, change the document password (step S419).
System controller 30 requests the user to change the document password in step S419, and determines whether the document password is changed (step S420). If the document password remains unchanged (NO in step S420), system controller 30 returns the process to step S419. If the document password is changed (YES in step S420), system controller 30 changes the job command that includes the document password (step S421). After the job command is changed, if the password does not match the voice identification memory (NO in step S418) or if the password is not to be used again (NO in step S416), system controller 30 discards the voice identification memory stored in memory device 40 (step S422).
After discarding the voice identification memory stored in memory device 40 in step S422, system controller 30 executes the job (step S423). When executing a job for a document, which has a password that is invisible to people, such as a two-dimensional code or a barcode, embedded therein, system controller 30 reads the document by document reading unit 110, and saves it to a read box. Alternatively, when executing a job with the destination specified for a document having a password embedded therein, system controller 30 requests the user to enter the password. In other words, system controller 30 also serves as a password detection unit for detecting a password from scanned data obtained by scanning a document having the password embedded therein.
As described above, the image forming apparatus (MFP 100) according to Embodiment 3 includes job processing unit 50 (a command additional unit). When the document data of the job accumulated in memory device 40 (box) is password protected, password request unit 52 requests the user to enter a password. If the setting information, received by operation unit 20 according to password request unit 52, matches the password, job processing unit 50 adds a job command to the document data. After the job execution unit executes the job in accordance with the job command added by job processing unit 50, accumulation determination unit 35 determines whether the document data is to be accumulated in memory device 40. If the document data is determined to be accumulated in memory device 40 and determination unit 32 determines that the password matches the identification information, change request unit 33 requests the user to change the password. In this way, the image forming apparatus (MFP 100) according to Embodiment 3 can prevent leakage of the sensitive information spoken through voice control for a password protected document (a document to which a job command having a password is added).
The image forming apparatus (MFP 100) may include job processing unit 50 (the command additional unit) which adds a password-protected job command to scanned data obtained by scanning a paper. Before job execution unit 53 executes the job in accordance with the job command added by job processing unit 50, if the password matches the identification information, change request unit 33 may request the user to change the password.
The image forming apparatus (MFP 100) may include system controller 30 (a password detection unit) and job processing unit 50 (the command additional unit). System controller 30 detects a password from scanned data obtained by scanning a document having the password embedded therein. If system controller 30 detects the password, password request unit 52 requests the user to enter the password. If the setting information, received by operation unit 20 according to password request unit 52, matches the password, job processing unit 50 (a command additional unit) adds a job command to the scanned data. If the detected password matches the identification information, system controller 30 halts the execution of the job, and discards the scanned data. In other words, after determined that the user entered the correct password and before the job is executed, MFP 100 checks the voice identification memory. If a voice identification memory matching the password for the paper is recorded, MFP 100 determines that the spoken sensitive information may be leaked, halts the job, and discards the scanned data, thereby preventing unauthorized use of the spoken password that is leaked.
<Variation>
The above-described embodiments fail to consider the case of failing to accurately identify, by voice identification unit 11, the voice input by the user, due to poor user utterance or surrounding noise. However, the present invention is not limited thereto. Considering the above case, MFP 100 may compare the voice identification memory with user input value. If the match percentage between the two is greater than or equal to a predetermined threshold, MFP 100 may determine that the user has uttered the sensitive information, and request the user to change the settings.
In the above-described embodiments, if there is a large number of voice identification memory data to compare, the comparison process takes time. Thus, the voice identification memory data is stored in memory device 40, which is recorded since the display of the operation screen which contains an item for which the sensitive information is set, until the sensitive information is set. However, the present invention is not limited thereto. MFP 100 may constantly store the voice identification memory data in memory device 40 while the power is on. MFP 100 may also store the voice identification memory data in memory device 40, which is recorded from the start of a user operation until the end of the user operation. MFP 100 may further use the voice identification memory for comparison, which is recorded since the cursor is moved to an item and input of the sensitive information to the item is enabled until the sensitive information is set to the item. If the user is logged in through user authentication, MFP 100 may use the voice identification memory for the comparison, which is recorded since the user log in until the sensitive information is set to the item, thereby more strictly checking the voice identification memory.
In the above-described embodiments, when MFP 100 has sensed leakage of spoken sensitive information, MFP 100 requests the user, operating MFP 100, to change the settings. However, the user may not have a privilege to change the sensitive information settings. For example, a user password or a box password may be managed so that only the administrator is allowed to change the password because if the user is allowed to manage such a password, the password may be lost, for example. Thus, if MFP 100 senses leakage of the spoken sensitive information, MFP 100 confirms whether the user, operating MFP 100, has a privilege to change the sensitive information settings. If the user has no such a privilege, MFP 100 may notify a user who has the privilege of a request to change the settings.
In the above-described embodiments, when MFP 100 senses leakage of the spoken sensitive information and requests the user to change the settings, the user may end the operation without changing the settings. For example, if the storage encryption word or the storage lock password is leaked, a malicious user can detach the storage from MFP 100 and use the sensitive information to retrieve all the data stored in the storage, which can lead to a critical security incident. Thus, if the settings are not changed by the user, MFP 100 may forcibly change the settings to a given set value that is only known to the administrator to disable the use of the leaked sensitive information. When leakage of the spoken sensitive information is sensed, MFP 100 may be capable of choosing, for each sensitive information to be set to an item, between requesting the user to change the sensitive information and forcibly changing the sensitive information.
In the above-described embodiments, irrespective of whether a person is around MFP 100, MFP 100 requests the user to change the settings when sensed leakage of spoken sensitive information. However, spoken sensitive information will not be leaked if no one is around while the user is operating MFP 100. Thus, MFP 100 may obtain, from an entry-exit management system, information about entry to and exit from a room in which MFP 100 is installed. MFP 100 may request the user to change the settings when MFP 100 confirms that more than one person has entered the room and has sensed leakage of spoken sensitive information.
Although the disclosure has been described with respect to only a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that various other embodiments may be devised without departing from the scope of the present invention. Accordingly, the scope of the invention should be limited only by the attached claims.
Number | Date | Country | Kind |
---|---|---|---|
2019-162015 | Sep 2019 | JP | national |