Various features of the embodiments can be more fully appreciated, as the same become better understood with reference to the following detailed description of the embodiments when considered in connection with the accompanying figures, in which:
For simplicity and illustrative purposes, the principles of the present invention are described by referring mainly to exemplary embodiments thereof. However, one of ordinary skill in the art would readily recognize that the same principles are equally applicable to, and can be implemented in, all types of network-capable devices with storage devices, and that any such variations do not depart from the true spirit and scope of the present invention. Moreover, in the following detailed description, references are made to the accompanying figures, which illustrate specific embodiments. Electrical, mechanical, logical and structural changes may be made to the embodiments without departing from the spirit and scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense and the scope of the present invention is defined by the appended claims and their equivalents.
Embodiments generally relate to system and method for allowing users to automatically initiate an operation on a device at a user-specified time. More specifically, an on-demand module executing on a device may be configured to allow a user to program the start time, date and recurrence of the initiation of an existing operation (e.g. an overwrite operation) on the device.
In other embodiments, the on-demand module may be configured to be accessible over a network. More particularly, the device may be network accessible and be accessible to remote users using Simple Network Management Protocol (SNMP) or Hyper Text Transfer Protocol (HTTP) protocols. The device may have a graphical network representation (i.e., icon) that can be viewed by the remote user. The user may activate the device icon to access the on-demand module. The on-demand module may be configured to query the remote user for authentication information. If the remote user provides correct authentication information, the on-demand module may provide a user interface that accepts information to program the user-specified time for the initiation of the operation.
As shown in
The device 110 may be a networked facsimile, photocopier, printer, scanner, or a combination thereof (i.e. a multi-functional device). The device 110A-C may be configured to operate with a non-volatile memory (“NVM”, not shown) whereas device 110D does not include a NVM. The NVM may be a magnetic or optical storage media and including removable disk systems, hard drives, and other storage media systems allowing the device and/or a user to store a job the device uses or is directed to use the stored job. The devices 110A-C may also be configured with, among other programmable functions, an overwrite operation as described in U.S. Pat. No. 6,731,447, commonly assigned Assignee, Xerox Corporation, which is hereby incorporated by reference.
The devices 110A-D may be configured to communicate with the server 105 over the network 115. The network 115 may be implemented as a local area network, wide area network or a combination thereof. The network 115 may be partially secure and/or fully secure. The network 115 may be implemented using network protocols such as IEEE 802.3X, IEEE 802.11X, token ring, or other similar network protocols.
In accordance with some embodiments, the devices 110A-C may be configured to execute an on-demand module 120 for those devices with a NVM. The on-demand module 120 may be configured to allow a user to program the start time, date and recurrence of the initiation of an existing operation (e.g. an overwrite operation) on the device.
In accordance with other embodiments, the server 105 may be configured to access the on-demand module 120 through a server access module 125. The server access module 125 may be configured to access the devices 110A-D using protocols such as SNMP. Each device 110 may have a graphical network representation (i.e., icon) that can be viewed by the user at server 105 using the network management software such as Xerox Device Manager. The user may activate the device icon to access the on-demand module 120 on a selected device 110A-D. The on-demand module 120 may be configured to query the remote user for authentication information. If the remote user provides correct authentication information, the on-demand module 120 may provide a user interface that accepts information to program the user-specified time for the initiation of an operation.
In other embodiments, the server access module 125 may be configured to access the devices 110A-D using protocols such as HTTP. Similar to the SNMP embodiment, each device 110 may have a graphical network representation (i.e., icon) that can be viewed by the user at server 105 using the network management software such as CentreWeb™ Web. The user may activate the device icon to access the on-demand module 120 on a selected device 110A-D. The on-demand module 120 may be configured to query the remote user for authentication information. If the remote user provides correct authentication information, the on-demand module 120 may provide a user interface that accepts information to program the user-specified time for the initiation of an operation as illustrated with respect to
Device 110A includes a user interface 205. The user interface 205 may be a liquid crystal display (LCD) configured to display parameters and/or instructions related to the operation of the device 110A. For example, the user interface 205 may display fields for a user to enter such as number of copies, to collate copies, reduce or enlarge copies, etc., as known to those skilled in the art.
The user interface 205 may be configured to display a security erase interface as depicted in
The number of overwrites field 305 may be a parameter that signifies the number of times the overwrite operation occurs. More particularly, a user may use the scroll buttons 307 to set the value for this field 305 by incrementing/decrementing by one. A range of values for the number of overwrite field may be from one to ten. Accordingly, the on-demand module 120 may be configured to initiate the overwrite operation according to the value set this field 305. Other embodiments may increase or decrease the maximum number of overwrites.
The pattern field 310 may be a parameter that signifies what data the overwrite operation writes over the existing data on the NVM 210. More particularly, a user may scroll through the following values on the pattern field 310 using the scroll buttons 312: “ALL ONES”, “ALL ZEROS”, “RANDOM” or “TABLE.” A selection of “ALL ONES” may indicate all ones will be used to overwrite the existing data on the NVM 210. A selection of “ALL ZEROS” may indicate all zeros will be used to overwrite the existing data on the NVM 210. A selection of “RANDOM” may indicate a random combination of one and zeros will be used to overwrite the existing data on the NVM 210. The on-demand module 120 may then execute overwrites using the selected value in the field 310.
A selection of “TABLE” may indicate that the system administrator set up a table of overwrite patterns for the device 110A. The cycle field 315 may represent the number of times that overwrite operation writes the table of overwrite patterns over the existing data on the NVM 210.
The automatic start field 310 may be a parameter that allows a user to program the overwrite operation to initiate or occur at a selected time. More specifically, a user may use the scroll buttons 322 to scroll through the values of “YES” or “NO”. If the user sets the value of the automatic start field 320 to “NO”, the overwrite operation may commence immediately according to the values set in the number of overwrites field 305, pattern field 310 and cycle field 315 when the user activates the save button 330. If the user sets the value of the automatic start field 320 to “YES”, the on-demand module 120 may be configured to generate the user interface of
As shown in
The date field 405 may be a parameter that represents a day in the future for the start of the overwrite operation. A user may select the start day by using the scroll buttons 412. In some embodiments, the default value for the date field may be the current date. Similar to the time field 405, the server 105 may provide a calendar or the device 110A may have an internal calendar.
The recurrence field 415 may be configured to represent a recurrence value for the start of the overwrite operation. More particularly, a user may scroll through the values, “DAILY”, “WEEKLY” or MONTHLY”, using the scroll buttons 417. If the user selects the “DAILY” value, the on-demand module 120 may be configured to initiate the overwrite operation at the value set in the time field 405. If the user selects the “WEEKLY” value, the on-demand module 120 may be configured to initiate the overwrite operation at day of the week for the value set in the date field 410. If the user selects the “MONTHLY” value, the on-demand module 120 may be configured to initiate the overwrite operation at the day of the month for the value set in the date field 410.
The values set in the above-mentioned fields (405, 410, 415) may be saved to the on-demand module 120 when the user activates the save button 425. Otherwise, the on-demand module 120 may return to the security erase interface 300 when the user activates the cancel button 420.
The schedule image overwrite box 454 also includes a frequency field 460 that allows a user to pick the frequency of the scheduled overwrite. More particularly, the values for this field may be “MONTHLY”, “WEEKLY” or “DAILY”. A user may scroll through these values by using the scroll buttons 462. For user interface 450, the value of “MONTHLY” is set in the frequency field 460. A selection of “WEEKLY in the frequency field 460 may display user interface 470 shown in
Returning to
As shown in
As shown in
Accordingly, the on-demand module 120 may be configured to execute an overwrite operation or schedule the overwrite operation depending on the values set in the fields described with respect to FIGS. 3-4A-D. More specifically, a user may schedule an overwrite operation on a daily, weekly, or monthly basis at a selected time. Alternatively, the user may schedule a single overwrite operation on a specified date and time.
As shown in
In step 510, the on-demand module 120 may detect the initiation of the scheduling for an overwrite operation. More particularly, the on-demand module 120 may be configured to detect that a user has switched the user interface 205 to the security erase interface 400.
The on-demand module 120 may be configured to wait for input from the user, in step 515. More specifically, the on-demand module 120 may wait for the user to set the values in the fields associated with
If the on-demand module 120 detects the user activates the cancel button 335, the on-demand module 120 may return to the idle state of step 505. Otherwise if the on-demand module 120 determines that the user has activated the save button 330, in step 520, the on-demand module 120 may be configured to determine whether the automatic scheduling field 320 has been set to a value of “YES”. If the value is set to “NO”, the on-demand module 120 may be configured to initiate the overwrite operation according to the values set in the fields (305, 310, and/or 315) as previously described with
Otherwise, if the automatic start field 320 is set to “YES” value, in step 525, the on-demand module 120 may be configured to display the scheduling interface 420, in step 535. The on-demand module 120 may be configured to wait for input from the user, in step 540. More specifically, the on-demand module 120 may wait for the user to set the values in the fields associated with
If the user activates the cancel button 420, in step 545, the on-demand module 120 may discard the values set in the fields associated with scheduling interface 400 and return to the security erase interface 300.
If the user activates the save button 425, in step 545, the on-demand module 120 may save the values set in the fields associated with scheduling interface 400 and calculate a temporal start, in step 550. The temporal start may include the start time, date and a recurrence value for the scheduled overwrite operation. Subsequently, the temporal start is stored by the on-demand module 120, in step 555.
As shown in
In step 610, the on-demand module 120 may be configured to check whether the value of the timer matches or exceed the temporal start value. If the timer does not match the temporal start value, the on-demand module 120 may be configured to enter a wait state, in step 620. The wait state provides a delay before requesting the next timer value. The wait state may be a user-specified value.
Otherwise, if the value of the timer matches or exceeds the temporal start value, the on-demand module 120 may be configured to execute the overwrite operation as specified by the user choice of values in the security erase interface 300.
As shown in
In accordance with various embodiments, a system administrator (or another remote user) may activate the icon 705A with an input device such as a mouse. The icon 705A may display a user interface requesting the user to input authentication information. The authentication information may be a user name along with a personal identification number, password or other similar security token. If the authentication information is verified, the on-demand module 120 may be configured to display the security erase interface 300. The scheduling interface 400 may be invoked from the security erase interface 300 as previously described. Accordingly, a remote user may access all devices from a single location to schedule or initiate overwrite operations.
Certain embodiments may be performed as a computer program. The computer program may exist in a variety of forms both active and inactive. For example, the computer program can exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats; firmware program(s); or hardware description language (HDL) files. Any of the above can be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form. Exemplary computer readable storage devices include conventional computer system RAM (random access memory), ROM (read-only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. Exemplary computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running the present invention can be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of executable software program(s) of the computer program on a CD-ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general.
While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art will be able to make various modifications to the described embodiments without departing from the true spirit and scope. The terms and descriptions used herein are set forth by way of illustration only and are not meant as limitations. In particular, although the method has been described by examples, the steps of the method may be performed in a different order than illustrated or simultaneously. Those skilled in the art will recognize that these and other variations are possible within the spirit and scope as defined in the following claims and their equivalents.