The present invention is directed to configuring embedded hardware controllers of devices that include a native scanning or image-reading elements, and in particular to configuring devices including scanning or image-reading elements on networks using encrypted barcodes scanned by the devices that contain all information necessary to complete the network configuration.
Configuring embedded devices, such as office equipment, to work on local or wide area networks can be complex, and may require manual installation or the help of IT staff. The need to configure new devices on networks often drives enhanced operator control panels (OCPs) at higher cost with larger screens and with more complex input capabilities (touch screens or full keyboards) than is required for normal device functionality, which may only need a small LCD display with a few buttons. Often networkable device configuration is so complex the user requires assistance of IT professionals. Manual installation typically requires a user to select a wireless SSID network from a network list displayed on the device, or a computer connected to the device. Once the user has selected the SSID network that they would like to connect to, the user must then select the wireless security protocol for that network. Lastly, the user enters the password for the selected network in order to configure the device for use on the network. This manual installation may be performed through a user interface on the device itself, when available, or through a computer connected to the device.
There remains a need for network security and low-cost, compact network devices. What is needed is an efficient mechanism to properly configure the embedded network controller hardware of devices that natively include a scanning or imaging element without extensive manual intervention and input.
The present invention is directed to systems and methods for configuring network devices having native scanning or imaging elements. The network configuration information necessary for the device is encoded into a scannable image, such as a barcode, which may then be read by the scanning or imaging element of the device. A processor in the embedded device, or in a computer or server in communication with the device, processes the information from the scannable image and extracts the configuration data. The processor then executes a configuration process using the extracted data, thereby programming network controller hardware in the device to work correctly on desired networks. This provides a simplification of the configuration process of the specified class of devices to work on a wide variety of network infrastructures without the use of a complex and expensive embedded OCP interfaces or the direct intervention of high paid IT personnel.
The present invention is directed to a system and method for configuring devices including a scanner or imaging element on a network. The scanner or imaging device may be an integral part of the device, or may be added to devices not typically having a scanner or imaging element of the purposes of providing simplified network configuration of the device as described herein. For example, the device may be document scanners, all-in-one printers, copiers and devices with 2-D imagers like cameras.
The system includes computing components configured to execute a software application on a local processor or as a WEB application hosted by the device manufacturer. The application collects the required network configuration information for the device as computer-readable text, such as ASCII text, Unicode text, or other text formats such as XML, HTML or any format able to be decoded by a computer. In order to obtain the network configuration information, the application may utilize the Network Name (SSID) and security settings of the network stored in a computer, or the SSID may be entered by the user. The network password may be manually entered by a user, or may be previously entered and stored in a file on a computer, where it may accessed and included in the computer-readable text information. As noted above, the network configuration information may be collected as ASCII text.
As seen in
The device being added to the network is configured to scan, or image, and digitize the printed scannable image. The scanning process results in a digital image of the scannable image containing the network configuration data, which may be encrypted and encoded. The digital image is then decoded by the device's embedded processor, resulting in encrypted ASCII text. The encrypted ASCII text is then decrypted using the same private key encryption that was used by the application to encrypt it. Once decrypted, the device will have access to the required configuration data necessary to program its network controller, such as an Ethernet controller, to enable it to function on the network as intended.
The system and method allow for configuring a device to work on a network with a configuration process that can be done remotely from the device. The configuration process may be implemented by a user with a very easy to use and intuitive application presented to the user on an interface. The user interface may include an input and an output, such as a full keyboard or large touch screen with large color LCD display. The user interface allows the configuration data collection process to be user friendly, yet does not add unnecessary cost to the embedded device.
As noted above, the configuration application may be run remotely from the device itself. This allows, but does not require, a centralized expert like an IT professional to do the configuration for users not comfortable with even the simplified process described herein. This also would allow such an expert to securely send the configuration to one or more end users as an e-mail attachment or other electronic message. The electronic message would comprise a scannable image, such as text, recognizable by the device through optical character recognition (OCR), or a scannable bar code or other readable coded image. A recipient of the electronic message could print a hard copy of the configuration information using a printer or similar device. The hard copy printout could then be scanned or imaged using the scanner or imaging elements of the device being added to the network.
An extension of this concept includes the application of scannable image encoding of scanner batch setup data or profile information. The scannable image may comprise encoded Profile information for a given device, including the desired printer color and dots-per-inch settings, as well as scanner image crop and deskew processing, scanner file output type, and scanner file output location settings. The scannable image may also comprise scanner batch setup information, including scanner image crop and deskew processing, scanner file output type, and scanner file output location settings limited to the batch of scanned documents currently being processed. Sheets containing this profile information or batch setup data could be authored at the user's personal computer or workstation in a simple text editor or with a Windows application with pull downs and check boxes. The text may then be fed into conversion software creating the scannable image. This image can subsequently be printed on a sheet of paper or cardstock. This Profile Sheet could then be the first document in a batch to be scanned on a network scanner, or other device with a scanner or imaging element desired to be added to a network. The scanning device may be configured to assume a profile sheet is present. If the device is so configured, the device may alert the user if the first document scanned is not a profile sheet, or it may assume a default setup. The scanning device may also be configured to a “disable” mode, where the device treats profile sheets as though they are ordinary documents (i.e., scanning the sheet and outputting the scanned image to the output location set for the device). Finally, sheets containing scannable images could also be included intermingled within the batch to change configuration or network destination and scanning parameters within a batch. The scannable image profile sheet would minimally contain the User ID and optionally other data previously described as scanning profile information such as Resolution, Color, Binary, Grayscale, or Auto Orient, which is being changed from the standard user scanning profile associated with their user ID retrieved from the network following a successful login.
As seen in
At step 306, if the user does not have a valid Easy2Setup scannable image 208 available, the user proceeds to step 2a (401,
At step 313, the data contained within the scannable image is now available to the Office Equipment 202's microcontroller as a series of key-value pairs. The Office Equipment microcontroller at step 314 uses these key-value pairs to program network controller hardware to operate on a network as specified. At step 315, processing is complete and Office Equipment 202 is configured to operate on network 209.
If a valid Easy2Setup scannable image is not available, the process checks to see if the user wants to abort the process 403. If yes, then the abort flag is set to “Yes” and processing proceeds to step 1a (305). If the user does not wish to abort, the Easy2Setup scannable image creation program 404 is started. Easy2Setup scannable image creation program 404 may be served from Office Equipment 202, another server on network 209, another server not on network 209, or may be a client application on user's workstation 205 or mobile workstation 207. Program 404 presents electronic forms 405 on the user's processing device to collect network setup data required to configure Office Equipment 202 to a specific wired or wireless network. At step 406, the user enters the data as key-value pairs and submits the completed form to the Program. The program performs range and context checks against the data entered at step 407.
If the data entered is incorrect, the process asks the user at step 414 if an abort is desired. If so, the abort flag is set to “Yes” and processing proceeds to step 1a (305). If not, processing proceeds to step 405 for user to reenter form data.
If the checks against the data at step 407 show that the data entered is correct, then the data may be encrypted at step 408 using private key encryption or other forms of encryption. Alternatively, no encryption need be performed at step 408. After encryption (if performed) the data is be encoded into a scannable image at step 409. For example, the data may be encoded as a standard 2-D barcode, a 1-D barcode, QR code, Matrix barcode, or any other readable coded image. The scannable image is then 410 saved to an archive, and processing may return to step 2a (401) and provided to storage medium 411.