As described above as prior art, when a printing device shared by a plurality of users is used to output a confidential print, a confidential facsimile, and other print data, the user has to go to the printer many times and enter the user's ID and password to check for the presence or absence of print data addressed for the user. When mail is used to make a notification that print data has arrived, the user also has to go to the printer to output the print data. Even when biological information is used instead of entering the ID and password, the user still has to go to the printer to log in, making the printing device inconvenient.
This type of problem is attributable to the necessity of the user moving between the printing device and the desk thereof many times to check for the presence or absence of print data addressed for the user or to output print data. Since the printing device is shared by a plurality of users, the printing device is installed on, for example, a passageway through which the plurality of users often pass so that they can access the printing device easily. For example, when moving to attend a conference or the like, the user often passes in front of the printing device.
Accordingly, the present invention addresses the particularity of office environments as described above so that when a user passes in front of the printing device, the printing device automatically takes a picture of the user and compares the picture with a database to identify the user; if there is print data addressed for the user, the user is notified of a message including the distinguishing information about the user and the user can output the print data on the spot. The user does not need to voluntarily go to the printing device and operate it to check for the presence or absence of print data addressed for the user.
Specifically, distinguishing information about users who use the printing device, such as users' IDs and users' names, is recorded in a recording section or the like in the server or the printing device in connection with image information such as face images and the amount of physical characteristics. A photographing camera or the like for taking pictures of persons who pass near the printing device is mounted in or connected to the printing device. The photographing camera randomly takes pictures of persons who pass in front of the printing device. Image information about a user photographed is compared with the image information registered in advance to identify the user who passed in front of the printing device. If there is print data addressed for the identified user, such as a confidential print or confidential facsimile, a message including the distinguishing information about the user is output from a speaker to call the user's attention so that the user outputs print data on the spot.
Accordingly, the user can know the presence or absence of print data addressed for the user without awareness, that is, independently of the user's intention, so the user does not need to take the trouble to go to the printing device many times so as to check for the presence or absence of print data or to go to the printing device to output the print data after being notified that there is print data. This can greatly enhance convenience for users.
To describe the above embodiment of the present invention in more detail, a printing device, printing system, print control method, and print control program according to an embodiment of the present invention will be described with reference to
As shown in
The printing device 20 in this embodiment is installed on a passageway 70 or in another place in an office through which a plurality of users pass, as shown in
There are no restrictions on the type, size, and shape of the photographing camera 30, but the photographing camera 30 is preferably mounted in a place where a face can be photographed easily to overlook the circumference of the printing device 20 and to take a face image suitable for authentication. For example, it is preferable to attach a supporting rod to the printing device 20, mount the photographing camera 30 on the supporting rod, and perform photography at a position equal to or slightly higher than the height of the face to eliminate effects by illumination and other factors. When a user passing near the printing device 20 is photographed, if another user is also photographed on the background, user authentication will become difficult. Therefore, the background is preferably made approximately uniform by installing a partition or the like on the side opposite to the printing device 20 with respect to the passageway 70.
The photographing camera 30 can be mounted in an arbitrary place. As shown in
In the arrangement shown in
Some users may be reluctant to be photographed when the presence of the photographing camera 30 is conspicuous. Accordingly, as shown in
Next, the structure of the printing device 20 described above will be specifically described with reference to
The CPU 21 functions as an authentication section for identifying a user by comparing the user's image information captured by the photographing camera 30 with the image information recorded on the HDD 27, and also function as a notification controller for causing the notifying section 24 to output a message including the user's information (such as the user's ID and user's name) if there is print data addressed for the identified user. The authentication section and notifying section may be included in the printing device 20 as hardware components. Alternatively, these sections may be configured as a print control program that causes the computer to function as the authentication section and notifying section and operates on the printing device 20.
The structure shown in
Next, a procedure for outputting print data addressed for the identified user will be described with reference to the flowchart shown in
First, in step S101, distinguishing information (users'ID and users' name) about users is registered in connection with image information about the users (including face images and the amount of physical characteristics), as a database as shown in
A face image to be registered may be a front face image, as shown in
When, in step S102, confidential print data is sent from the terminal 50 with a user's ID, user's name, and password specified, the communication section 29 in the printing device 20 receives print data addressed for an identified user over the communication network 60 and records the print data in the RAM 26 or on the HDD 27 in connection with the user's ID, user's name, and password, in step S103. The above print data is defined as a job that comprises image data as well as an encrypted user's ID, user's name, and password; the image data is sent to the printing device 20 together with the user's ID, user's name, and password entered by use of a printer driver in the terminal 50, as the print data.
When a user on the passageway 70 passes near the printing device 20, the photographing camera 30 takes a picture of the face of the user at random in step S104. The authentication section of the printing device 20 compares the photographed face image with the face images registered in the database in advance to identify the user in step S105. Although a specific method for identifying a user will be described below, known image processing technology can also be used for user identification and the present invention is not limited to the method below.
Specifically, a face area in the photographed image is first detected. Then, the face image is cut out and normalization is performed. For example, a photographed image not including the user and a photographed image including the user are compared to remove the background. The face is identified from contours, hues (flesh colors portion), and the like of the image resulting from removing the background, and the face image is cut out. In general, the face areas in face images that have been cut out in this way include variations in size, inclination, and lightness, so normalization is performed to compensate for these variations.
Next, information that represents characteristics of the face by use of digits or equations is extracted as the amount of face characteristics (the amount of physical characteristics). The amount of physical characteristics is geometric characteristics including the shapes of parts on the face and relations between relative positions, or pattern distribution characteristics including colors on the face surface and a color intensity distribution. For the geometric characteristics, for example, the eyes, nose, mouth, ears, eyebrows, etc. are identified from positional relations on the face image and then contour lines and characteristic points (positions of the eye tails, both points of the mouth, the top of the jaw, etc.) representing the structure and shape of the face are extracted so as to obtain distances and angles among characteristic points as well as curvatures of the contour lines.
User comparison processing is then performed. A face image having the characteristic amount most analogous to the characteristic amount of the extracted face is found from the database registered in step S101 according to a face comparison algorithm such as the eigenface method, constrained mutual subspace method, local feature analysis (LFA) method, projection elastic graph matching method, or neutral network method. The user is then identified according to the distinguishing information registered in connection with the selected face image. The face characteristic amount may be extracted by the procedure described above and registered in the database, instead of registering the face image. In this case, it suffices to compare the characteristic amount extracted from the photographed face image with the characteristic amount registered in the database and identify the user according to the distinguishing information registered in connection with the selected characteristic amount.
If the user cannot be identified in step S106, that is, a face image having a characteristic amount analogous to the extracted face characteristic amount is not registered (producing a “No” result), the processing returns to step S104 and a next user is photographed. If the user can be identified in step S106, that is, a face image having a characteristic amount analogous to the extracted face characteristic amount is registered (producing a “Yes” result), the processing proceeds to step S107 and checks whether there is a confidential print addressed for the user. Since jobs (image data) in the printing device 20 are stored in connection with users' IDs as shown in
If no confidential print has arrived in step S108 (producing a “No” result), the processing returns to step S104 and a next user is photographed. If it is confirmed that a confidential print has arrived in step S108 (producing a “Yes” result), the processing proceeds to step S109, in which the notification controller in the printing device 20 uses the notifying section 24, such as a speaker, to output a message, including the user's ID and user's name, that says, for example, “there is a confidential print addressed for AAA” when there is a confidential print addressed for a user having a user's ID AAA.
As another notifying method, a user's ID or user's name may be output. When, however, only a few users pass near the printing device 20, it is sufficient to give a prescribed alarm or chime to notify the relevant user that there is a confidential print addressed for the user. When a sound is made toward the user for notification by using a directional speaker, the user can be reliably notified that there is a confidential print. Other possible notifying methods include blowing air to the user, turning on and off a light emitting means such as an LED or lamp, and giving a display or vibration by using a function of the user's card, mobile telephone, or another possession.
The user then enters the user's ID and password by operating the operation section 22 on the printing device 20 in order to output the confidential print addressed for the user in step S110. When the confidential print is output, the photographing camera 30 photographs the user near the printing device 20, so the authentication section can determine whether the user matches the user for which the confidential print is addressed. Accordingly, it is also possible for the user to output the confidential print without having to enter the user's ID and password. Operation by the user can be simplified and thereby convenience is further improved.
In step S103, the print data has been recorded in the RAM 26 or on the HDD 27 in connection with the user's ID, user's name, and password. Instead, the print data may be output and the resulting printed matter may be stored in advance in the storing section 28, such as a user-specific tray, provided in the printing device 20. In step S110, the confidential print stored in the tray of the user may be ejected when the user enters the user's ID and password by operating the operation section 22 on the printing device 20.
Thus, when the photographing camera 30 is integrated into or provided separately and connected to the printing device 20 mounted on the passageway 70 through which users frequently pass and distinguishing information for each user using the printing device 20 is registered in connection with image information, a user passing near the printing device 20 is identified by photographing the user with the photographing camera 30 and comparing captured image information with the image information recorded in advance. If there is a confidential print addressed for the identified user, the user is notified of a message including the distinguishing information about the user. Accordingly, the user does not need to go to the printing device 20 and enter the user's ID and password to check whether there is a confidential print or to take trouble to go to the printing device 20 to print the confidential print. The user can simply know that there is print data addressed for the user, and can output the print data on the spot.
Although, in the above embodiment, a case in which the photographing camera 30 is used has been described, the present invention is not limited to the embodiment. If information necessary for user authentication is obtained, any device other than a camera may be used.
If, for example, the user always carries an employee IC card in which a radio frequency identification (RFID) tag (preferably, a microwave RFID tag with which communication is possible at a distance several meters apart) or another authentication medium is included, a reading section, such as an RFID reader or RFID reader and writer, may be provided instead of the photographing camera and users may be authenticated according to authentication information recorded in the IC chip of the RFID tag. In this case, distinguishing information and authentication information are registered on a one-to-one basis for each user who uses the printing device 20, and the antenna of the RFID reader or RFID reader/writer is mounted on the passageway 70 or a wall or a gate antenna is mounted on the passageway 70. When resonance is caused between this antenna and the antenna disposed on the RFID tag, the authentication information recorded in the IC chip of the RFID tag is read by means of electromagnetic induction or electromagnetic coupling, enabling the user to be identified.
The present invention is applicable to an arbitrary printing device, a system including the printing device, a print control method used by the printing device or the system, and a print control program operating in the printing device or the system.
According to the printing device, printing system, print control method, and print control program in this aspect, effects described below are provided.
A first effect is to reliably notify a particular user of print data such as a confidential print or confidential facsimile addressed for the particular user, if any, without a special operation having to be done.
This is because distinguishing information is registered in advance in connection with image information or authentication information for each user who uses the printing device, a photographing section for photographing a user near the printing device or a reading section for reading authentication information from an authentication medium possessed by the user near the printing device is integrated into or provided separately and connected to the printing device, and the printing device includes, as hardware or software components, an authentication section for identifying the user by comparing image information obtained through photographing or the read authentication information with the image information or authentication information registered in advance as well as a notification controller for causing a notifying section to make a notification of a message including the distinguishing information about the user when there is a job yet to be output for the identified user; thereby the user can know that there is print data destined for the user just by passing in front of the printing device.
A second effect is to enable a user to output print data, such as a confidential print or confidential facsimile, addressed for the user immediately.
This is because, in the structure described above, the user is notified that there is print data addressed for the user when the user passes in front of the printing device and thus the user can output the print data on the spot. Another reason is that a user authenticated by the authentication section is permitted to output the print data without entering the user's ID and password.
| Number | Date | Country | Kind |
|---|---|---|---|
| JP2006-185894 | Jul 2006 | JP | national |