CN102905052A - Scanning method and system and scanner - Google Patents

Scanning method and system and scanner Download PDF

Info

Publication number
CN102905052A
CN102905052A CN2012104308050A CN201210430805A CN102905052A CN 102905052 A CN102905052 A CN 102905052A CN 2012104308050 A CN2012104308050 A CN 2012104308050A CN 201210430805 A CN201210430805 A CN 201210430805A CN 102905052 A CN102905052 A CN 102905052A
Authority
CN
China
Prior art keywords
identifying code
user
scan request
scanner
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104308050A
Other languages
Chinese (zh)
Other versions
CN102905052B (en
Inventor
申如松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qisda Suzhou Co Ltd
Original Assignee
Qisda Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qisda Suzhou Co Ltd filed Critical Qisda Suzhou Co Ltd
Priority to CN201210430805.0A priority Critical patent/CN102905052B/en
Publication of CN102905052A publication Critical patent/CN102905052A/en
Application granted granted Critical
Publication of CN102905052B publication Critical patent/CN102905052B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a scanning method and system and a scanner, wherein the scanning method comprises the steps of: obtaining a scanning request of a host client end and a first verification code generated by the scanning request; after obtaining a second verification code input by a user, under the condition that the first verification code is matched with the second verification code, verifying that the user is an illegal use; after verifying that the user is the illegal user, scanning an original document requested to be scanned by a user to obtain a scanning document; and obtaining a storage address corresponding to the first verification code from a sharing server, and sending the obtained scanning document to the storage address, wherein after the first verification code generated by the scanning request is obtained, the first verification code is sent to the sharing server for creating the correlation relationship of the first verification code and the storage address. According to the invention, after the scanner end is verified to be the illegal user, the document to be scanned can be scanned, and a technical effect of safely and conveniently carrying out network scanning is realized.

Description

Scan method, system and scanner
Technical field
The present invention relates to the scanning field, in particular to a kind of scan method, system and scanner.
Background technology
In the project of some MFP with network function (being all-in-one multifunctional machine), MFP possesses the software and hardware of realizing network sweep, in the method for general network sweep, need to be by the authentication of network during the scanner access subscriber's main station, authentication mainly contains two kinds of methods: a kind of is account and the password of inputting the user at the scanning device end, with the share directory in the calling party main frame, but the method operation is more loaded down with trivial details, even there is not a graphic user interface (Graphical User Interface, GUI) or keyboard input password for the user, with in user name or the disposable MFP of being set in of password or the scanning device to improving one's methods of this authentication, but brought so again the problem that lacks fail safe, and behind user's Modify password, still have the problem of access rights or management inconvenience; Another kind method is in MFP or scanning device, record a specific account and password, some specific catalogues on the addressable subscriber's main station of this password, all documents are scanned in the same file folder, the document of each self-scanning of search during different users is pressed from both sides to this document voluntarily, this method may can not changed for a long time owing to username and password, the problem that also has potential safety hazard, the file of sharing on the server in addition can be checked for different user, also dangerous, this method of operation also has a kind of improving one's methods, input user name at the MFP end exactly, after password and the shared folder path, begin scanning, close sharedly after the been scanned, remove user name, password etc.Therefore, existing on network the method for scanned document have fail safe hidden danger.
Have the problem of fail safe hidden danger for the method for utilizing the network sweep document in the prior art, not yet propose at present effective solution.
Summary of the invention
Have the problem of fail safe hidden danger for the method for utilizing the network sweep document in the correlation technique, not yet propose at present effective solution, for this reason, main purpose of the present invention is to provide a kind of scan method, system and scanner, to address the above problem.
To achieve these goals, according to an aspect of the present invention, provide a kind of scan method, the method comprises: obtain the scan request of host client and the first identifying code that is generated by scan request; After the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user; After authentication of users was validated user, the scanning user asked the original document that scans, to obtain scanned document; Obtain the memory address corresponding with the first identifying code from the share service device, and the scanned document that gets access to is sent to memory address; Wherein, after getting access to the first identifying code that is generated by scan request, the first identifying code is sent to the share service device, to create the incidence relation of the first identifying code and memory address.
Further, obtain the scan request of host client and the step of the first identifying code of being generated by scan request comprises: the scan request of obtaining host client output; Obtain by host client and calculate according to the random code in the scan request, and the first identifying code that generates.
Further, obtain the scan request of host client and the step of the first identifying code of being generated by scan request comprises: the scan request of obtaining host client; Obtain by scanner and calculate according to the random code in the scan request, and the first identifying code that generates.
Further, after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, whether authentication of users: it is consistent with the first identifying code to compare the second identifying code if being that the step of validated user comprises, wherein, in the second identifying code situation consistent with the first identifying code, authentication of users is validated user, in the second identifying code and the inconsistent situation of the first identifying code, authentication of users is the disabled user.
Further, after obtaining the first identifying code that is generated by scan request, method also comprises: start timer and begin timing; When timing time surpasses in the situation of threshold value, by the first identifying code inefficacy of scan request generation; When timing time does not surpass in the situation of threshold value, preserve the first identifying code.
To achieve these goals, according to a further aspect in the invention, provide a kind of scanning system, this system comprises: host client is used for sending scan request; Scanner is connected with host client, comprising: the first deriving means is used for obtaining the scan request of host client and the first identifying code that is generated by scan request; Comparator is connected with the first deriving means, is used for after the second identifying code that gets access to user's input, and in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user; Scanning means is connected with comparator, is used for the scanning user and asks the original document that will scan, to obtain scanned document; The first dispensing device is connected with scanning means, is used for obtaining the memory address corresponding with the first identifying code from the share service device, and the scanned document that gets access to is sent to memory address; The share service device is connected between host client and the scanner, is used for creating the incidence relation of the first identifying code and memory address according to the first identifying code that gets access to.
Further, host client comprises: first processor is used for calculating according to the random code of scan request, to generate the first identifying code; The second dispensing device is connected with first processor, is used for sending the first identifying code to the first deriving means of scan request and generation.
Further, scanner also comprises: the second processor, be connected with the first deriving means, and generate the first identifying code for calculating according to the random code of scan request, and the first identifying code is sent to the first deriving means.
Further, scanner also comprises: timer, be connected with the first deriving means, and be used for after carrying out the first deriving means, beginning timing; The 3rd processor is connected with timer, is used for surpassing in the situation of threshold value at timing time, and the first identifying code that is generated by scan request lost efficacy; Memory is connected with timer, is used for not surpassing in the situation of threshold value at timing time, preserves the first identifying code.
To achieve these goals, according to a further aspect in the invention, provide a kind of scanner, this scanner comprises: deriving means is used for obtaining the scan request of host client and the first identifying code that is generated by scan request; Comparator is used for after the second identifying code that gets access to user's input, and in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user; Scanning means is used for after authentication of users is validated user, and the scanning user asks the original document that will scan, to obtain scanned document; Dispensing device is used for obtaining the memory address corresponding with the first identifying code from the share service device, and the scanned document that gets access to is sent to memory address; Wherein, after getting access to the first identifying code that is generated by scan request, the first identifying code is sent to the share service device, to create the incidence relation of the first identifying code and memory address.
By scan method provided by the invention, system and scanner, the user sends scan request by host client, after the scanner end is verified as validated user, just can scan the document that needs scanning, increased the fail safe of scanning, and after scanner gets access to scanned document, scanner obtains the address of memory scanning document by the share service device, just scanned document is sent to afterwards the memory address that the user sets, rather than directly scanned document is sent to the machine, solved and utilized the method for network sweep document to have the problem of fail safe hidden danger and complex operation in the prior art, and then realized safety, carry out easily the technique effect of network sweep.
Description of drawings
Accompanying drawing described herein is used to provide a further understanding of the present invention, consists of the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not consist of improper restriction of the present invention.In the accompanying drawings:
Fig. 1 is the structural representation according to the scanning system of the embodiment of the invention;
Fig. 2 is the flow chart according to the scan method of the embodiment of the invention;
Fig. 3 is the method flow diagram according to the first embodiment of scan method shown in Figure 2;
Fig. 4 is the method flow diagram according to the second embodiment of scan method shown in Figure 2;
Fig. 5 is the method flow diagram according to the 3rd embodiment of scan method shown in Figure 2; And
Fig. 6 is the structural representation according to the scanner of the embodiment of the invention.
Embodiment
Need to prove that in the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.Describe below with reference to the accompanying drawings and in conjunction with the embodiments the present invention in detail.
Fig. 1 is the structural representation according to the scanning system of the embodiment of the invention.As shown in Figure 1, scanning system comprises host client 1, scanner 3 and share service device 5.Host client 1 is used for sending scan request; Scanner 3 is connected with host client 1, and scanner 3 comprises the first deriving means 31, comparator 33, scanning means 35 and the first dispensing device 37.The first deriving means 31 is used for obtaining the scan request that host client 1 sends and the first identifying code that is generated by scan request.Comparator 33 is connected with the first deriving means 31, is used for after the second identifying code that gets access to user's input, and in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user.Scanning means 35 is connected with comparator 33, is used for the scanning user and asks the original document that will scan, to obtain scanned document.The first dispensing device 37 is connected with scanning means 35, is used for obtaining the memory address corresponding with the first identifying code from share service device 5, and the scanned document that gets access to is sent to memory address.Share service device 5 is connected between host client 1 and the scanner 3, is used for creating the incidence relation of the first identifying code and memory address according to the first identifying code that gets access to.
Adopt scanning system of the present invention, get access to the scan request of host client 1 transmission and the first identifying code that is generated by scan request by the first deriving means 31 in the scanner 3, then the comparator 33 in the scanner 3 is after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user, scanning means by in the scanner 3 35 scanning users ask the original document that will scan afterwards, after getting access to scanned document, the first dispensing device 37 in the scanner 3 obtains the memory address corresponding with the first identifying code from share service device 5, and the scanned document that gets access to sent to memory address, wherein, share service device 5 is connected between host client 1 and the scanner 3, can according to the first identifying code that gets access to, create the incidence relation of the first identifying code and memory address.By scanning system provided by the invention, the user sends scan request by host client 1, after the scanner end is verified as validated user, just can scan the document that users need to be scanned at scanner 3, increased the fail safe of scanning, and after scanner 3 gets access to scanned document, obtain the memory address that the user sets by share service device 5, rather than directly scanned document is sent to the machine, solved and utilized the method for network sweep document to have the problem of fail safe hidden danger in the prior art, and then realized safety, carry out easily the technique effect of network sweep.
Wherein, the first identifying code that the first deriving means 31 gets access to can be that host client 1 generates, and then sends to scanner 3, also can be that scanner 3 generates according to scan request oneself.Host client 1 can be the terminals such as PC, smart mobile phone, and memory address can be the file on the host client 1, also can be specific Email address, high in the clouds memory address or a network printer etc. of user's appointment.Particularly, identifying code can be digital code, and share service device 5 can be the web programs such as EWS.In the above embodiment of the present invention, do not need scanned document is scanned file on the host client 1, send to other places by host client 1 again, need to be at title or the set information of scanner 3 records or input position, high in the clouds, Email address or the network printer yet, scanner 3 is by the first identifying code of share service device 5 establishments and the incidence relation of memory address, can directly obtain the memory address that the user sets, realize safe and simple effect of carrying out network sweep.
Particularly, host client 1 can also comprise: first processor is used for calculating according to the random code of scan request, to generate the first identifying code; The second dispensing device is connected with first processor, is used for sending the first identifying code to the first deriving means 31 of scan request and generation.Wherein, host client 1 can be the terminals such as PC, smart mobile phone.
Particularly, host client 1 is obtained the user sends to host client 1 according to the scanning demand scan request, host client 1 can send to this scan request scanner 3 or host client 1 and calculate according to this scan request and generate the first identifying code, then this scan request and the first identifying code thereof is sent to the first deriving means 31.For example, the user can by the request of mobile phone to a scanned picture of scanner 3 transmissions, also can generate a digital code according to this picture by mobile phone, and send a scanned picture and this digital codes to scanner 3.
According to the abovementioned embodiments of the present invention, the first identifying code can also generate in the following way, and for example scanner 3 can also comprise the second processor, and the second processor is connected with the first deriving means 31, be used for calculating according to the random code of scan request, to generate the first identifying code.
According to above-described embodiment of the application, scanner 3 can also comprise: timer, be connected with the first deriving means 31, and be used for carrying out the 31 rear beginning timing of the first deriving means; Checkout gear is connected with timer, is used for surpassing in the situation of threshold value at timing time, and the first identifying code that is generated by scan request lost efficacy; Memory is connected with timer, is used for not surpassing in the situation of threshold value at timing time, preserves the first identifying code.
Preferably, timer namely starts timer carrying out the 31 rear beginning timing of the first deriving means after obtaining the first identifying code that is generated by scan request.After starting timer, checkout gear surpasses in the situation of threshold value at the timer timing time, so that the first identifying code that is generated by scan request lost efficacy; Do not surpass in the situation of threshold value at the timer timing time, preserve the first identifying code by memory, use for the user rs authentication identity.Wherein, checkout gear for example can be this first identifying code of deletion so that the mode that the first identifying code lost efficacy has multiplely.Threshold value can be set as the user and finish the time that general scan operation needs, and for example, the user finishes scanning needs 180 seconds, can set the threshold to 180 seconds; Threshold value also can be directly according to the signal acquisition of " user finishes scanning " that detect, and the signal indication user who for example detects finishes scanning, and then checkout gear is so that the inefficacy of the first identifying code.Checkout gear surpasses at the timer timing time makes the first identifying code that is generated by scan request lose efficacy in the situation of threshold value, can not be by authentication when then the user uses this first identifying code to carry out authentication next time, thereby can not use scan function, and then guarantee the fail safe of scanning system.
According to above-described embodiment of the application, share service device 5 can comprise: the 6th deriving means is used for obtaining the first identifying code; The 3rd processor is used for according to the first identifying code, creates the incidence relation of the first identifying code and memory address.
Particularly, the 6th deriving means in the share service device 5 obtains the first identifying code that scanner 3 sends, and then creates the incidence relation of this first identifying code and memory address according to the first identifying code that gets access to.Scanner 3 can get access to the memory address of scanned document by the incidence relation of the 3rd processor establishment after getting access to scanned document, then scanned document is sent to this memory address.Scanner 3 can be according to the different different users of the first identifying code identification, then according to the incidence relation of the first identifying code and memory address, the scanned document of different user is sent to different memory addresss, can not only accurately finish scan function, and do not need first scanned document to be stored in host client 1 and then to send to other addresses, need to be in scanner 3 records or input address, high in the clouds yet, the operations such as the title of addresses of items of mail or the network printer or set information, scanned document after scanner 3 can directly will ask to scan according to the user according to this incidence relation sends to the memory address that user's needs send, and has realized network sweep safe and simplely.
Fig. 2 is the flow chart according to the scan method of the embodiment of the invention.The method comprises the steps: as shown in Figure 2
Step S102 obtains the scan request of host client and the first identifying code that is generated by scan request.Wherein, host client can be the terminals such as PC, smart mobile phone.
Step S104, after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user.
Step S106, after authentication of users was validated user, the scanning user asked the original document that will scan, to obtain scanned document.
Step S108 obtains the memory address corresponding with the first identifying code from the share service device, and the scanned document that gets access to is sent to memory address.
Wherein, after getting access to the first identifying code that is generated by scan request, the first identifying code is sent to the share service device, to create the incidence relation of the first identifying code and memory address.
Adopt scan method of the present invention, by the scan request of obtaining the host client transmission and the first identifying code that is generated by scan request, then scanner is after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user, scan afterwards the user and ask the original document that will scan, after getting access to scanned document, scanner obtains the memory address corresponding with the first identifying code from the share service device, and the scanned document that gets access to sent to memory address, wherein, the share service device can create according to the first identifying code that gets access to the incidence relation of the first identifying code and memory address.By scan method provided by the invention, the user sends scan request by host client, after the scanner end is verified as validated user, the document that just can need to scan the scanner scanning user, increased the fail safe of scanning, and after scanner gets access to scanned document, obtain the memory address that the user sets by the share service device, rather than directly scanned document is sent to the machine, solved and utilized the method for network sweep document to have the problem of fail safe hidden danger in the prior art, and then realized safety, carry out easily the technique effect of network sweep.
Wherein, memory address can be the file on the host client, also can be specific Email address, high in the clouds memory address or a network printer etc. of user's appointment.Particularly, identifying code can be digital code, and the share service device can be the web programs such as EWS.In the above embodiment of the present invention, do not need scanned document is scanned file on the host client, send to other places by host client again, need to be at title or the set information of scanner record or input position, high in the clouds, Email address or the network printer yet, scanner is by the first identifying code of share service device establishment and the incidence relation of memory address, can directly obtain the memory address that the user sets, realize safe and simple effect of carrying out network sweep.
According to the embodiment of scan method of the present invention, obtain the scan request of host client and the step of the first identifying code of being generated by scan request can comprise: the scan request of obtaining host client output; Obtain by host client and calculate according to the random code in the scan request, and the first identifying code that generates.
Particularly, host client is obtained the user sends to host client according to the scanning demand scan request, host client can send to this scan request scanner or host client and generate the first identifying code according to this scan request calculating, then this scan request and the first identifying code thereof is sent to scanner.
The step of the first identifying code that according to the abovementioned embodiments of the present invention, obtains the scan request of host client and generated by scan request can comprise: the scan request of obtaining host client; Obtain by scanner and calculate according to the random code in the scan request, and the first identifying code that generates.
Particularly, after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, whether authentication of users: it is consistent with the first identifying code to compare the second identifying code if being that the step of validated user comprises, wherein, in the second identifying code situation consistent with the first identifying code, authentication of users is validated user, in the second identifying code and the inconsistent situation of the first identifying code, authentication of users is the disabled user.
More specifically, after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, whether authentication of users: it is consistent with the first identifying code that host client generates to compare the second identifying code if being that the step of validated user comprises, wherein, in the consistent situation of the first identifying code that the second identifying code and host client generate, authentication of users is validated user; In the inconsistent situation of the first identifying code of the second identifying code and host client generation, authentication of users is the disabled user.
In addition, after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, whether authentication of users: it is consistent with the first identifying code of scanner generation to compare the second identifying code if being that the step of validated user can also comprise, wherein, in the consistent situation of the first identifying code that the second identifying code and scanner generate, authentication of users is validated user; In the inconsistent situation of the first identifying code of the second identifying code and scanner generation, authentication of users is the disabled user.
According to the abovementioned embodiments of the present invention, after obtaining the first identifying code that is generated by scan request, method can also comprise: start timer and begin timing; When timing time surpasses in the situation of threshold value, by the first identifying code inefficacy of scan request generation; When timing time does not surpass in the situation of threshold value, preserve the first identifying code.
Particularly, start timer after obtaining the first identifying code that is generated by scan request, after starting timer, checkout gear surpasses in the situation of threshold value at the timer timing time, so that the first identifying code that is generated by scan request lost efficacy; Do not surpass in the situation of threshold value at the timer timing time, preserve the first identifying code by memory, use for the user rs authentication identity.Wherein, checkout gear is so that during how the mode that the first identifying code lost efficacy have, can be this first identifying code of deletion.Threshold value can be set as the user and finish the time that general scan operation needs, and for example, the user finishes scanning needs 180 seconds, can set the threshold to 180 seconds; Threshold value also can be directly according to the signal acquisition of " user finishes scanning " that detect, and the signal indication user who for example detects finishes scanning, and then checkout gear is so that the inefficacy of the first identifying code.Checkout gear surpasses at the timer timing time makes the first identifying code that is generated by scan request lose efficacy in the situation of threshold value, can not be by authentication when then the user uses this first identifying code to carry out authentication next time, thereby can not use scan function, and then guarantee the fail safe of scanning system.
In above-described embodiment of the application, scan method can realize as follows: host client sends scan request to scanner, host client or scanner generate the first identifying code according to scan request, and set up the incidence relation of the first identifying code memory address corresponding with host client, after the second identifying code that obtains user's input, compare the first identifying code and whether the second identifying code mates, if the first identifying code and the second authentication code matches, then the scanner scanning user asks the original document that scans, and the scanned document that obtains sent to memory address, and after scanning is finished the incidence relation of deletion the first identifying code and memory address.
Fig. 3 is the method flow diagram according to the first embodiment of scan method shown in Figure 2.Fig. 3 shows the first embodiment of the method that web routine accesses such as utilizing EWS (embedded web server) scans to scanner, comprises the steps: in this embodiment
Step S301 opens share service device EWS.Be the operating environment that the user enters the EWS program, by EWS access scan instrument.Wherein, the EWS program is the share service device in above-described embodiment.
Step S302, the machine is processed scan request.Wherein, the machine is host client.
Particularly, the user sends to scanner by the machine with scan request.
Step S303, scanner sends identifying code and is presented in the EWS webpage.
Particularly, step S102 among Fig. 2 can realize by step S302 and S303: in this embodiment, scanner is after getting access to user's scan request, generate identifying code (being the first identifying code in above-described embodiment) according to this scan request, then when the first identifying code is sent to the user, the first identifying code is sent to EWS and be presented in the webpage.
Step S304, share service device EWS share the machine catalogue to scanner temporarily.
Particularly, the EWS program creates the incidence relation of digital code and target memory address according to the first identifying code, and this incidence relation is fed back to scanner, and the machine catalogue namely generates by the incidence relation of the first identifying code establishment digital code and target memory address.
Step S305, the user is the input validation code in scanner GUI.
In this embodiment, step S305 can realize that the coupling authentication of users that passes through the first identifying code and the second identifying code of step S104 is the process of validated user among Fig. 2, particularly, after step S304, the user is on scanner during scanned document, prompting according to scanner, input validation code in scanner GUI (being the graphic user interface of scanner) (identifying code herein is the second identifying code in above-described embodiment), scanner carries out authentication, in the first identifying code situation consistent with the second identifying code, the scanner authentication of users is validated user, begins to scan the user and asks the original document that will scan, and gets access to scanned document.The user during scanned document, inputs the second identifying code on scanner, know namely by scanner after the authentication this sends the document of scanning to which the machine.In the situation of GUI or numerical key, only identify different users by the button sequential scheduling of some button.
Step S306, scanner according to this machine directory scan document to the target memory address corresponding with identifying code.
In this embodiment, step S106 among Fig. 2 and S108 can realize by step S306, particularly, scanner is after authentication of users is validated user, the original document that the scanning user will be scanned gets access to scanned document, then according to obtain the incidence relation that this machine catalogue is the first identifying code and user's memory address from the EWS program, get access to memory address, directly scanned document is stored into this memory address.
Step S307 finishes scanning, and EWS closes the machine catalogue sharing, then closes share service device EWS.
Particularly, finish scanning, EWS closes the machine catalogue sharing, loses efficacy during the first identifying code, and the user can close EWS.The machine catalogue sharing relation, the first identifying code lost efficacy after scanning input was finished, can not be by authentication when then the user uses this first identifying code to carry out authentication next time, thus can not use scan function, and then guaranteed the fail safe of scanning system.
Fig. 4 is the method flow diagram according to the second embodiment of scan method shown in Figure 2.Fig. 4 shows the second embodiment of the method that web routine accesses such as utilizing EWS (embedded web server) scans to scanner, comprises the steps: in this embodiment
Step S401 opens share service device EWS.Be the operating environment that the user enters the EWS program, by EWS access scan instrument.Wherein, the EWS program is the share service device in above-described embodiment.
Step S402, the machine is processed scan request.
Particularly, the user sends to scanner by the machine with scan request.
Step S403, the machine sends identifying code to scanner and is presented in the share service device EWS webpage.
Particularly, step S102 can realize by step S402 and S403 among Fig. 2: in this embodiment, the user will generate the first identifying code according to this scan request when sending scan request by main frame and send to scanner, and the machine is when sending to scanner with the first identifying code, the first identifying code is sent to share service device EWS and is presented in the webpage.
Step S404, share service device EWS share the machine catalogue to scanner temporarily.
Particularly, the EWS program creates the incidence relation of digital code and target memory address according to the first identifying code, and this incidence relation is fed back to scanner, and the machine catalogue namely generates by the incidence relation of the first identifying code establishment digital code and target memory address.
Step S405, the user is the input validation code in scanner GUI.
In this embodiment, step S405 can realize that the coupling authentication of users that passes through the first identifying code and the second identifying code of step S104 is the process of validated user among Fig. 2, particularly, after step S404, the user is on scanner during scanned document, prompting according to scanner, input validation code in scanner GUI (identifying code herein is the second identifying code in above-described embodiment), scanner carries out authentication, in the first identifying code situation consistent with the second identifying code, the scanner authentication of users is validated user, begins to scan the user and asks the original document that will scan, and gets access to scanned document.The user during scanned document, inputs the second identifying code on scanner, know namely by scanner after the authentication this sends the document of scanning to which the machine.In the situation of GUI or numerical key, only identify different users by the button sequential scheduling of some button.
Step S406, scanner according to this machine directory scan document to the target memory address corresponding with identifying code.
In this embodiment, step S106 among Fig. 2 and S108 can realize by step S406, particularly, scanner is after authentication of users is validated user, the original document that the scanning user will be scanned gets access to scanned document, then according to obtain the incidence relation that this machine catalogue is the first identifying code and user's memory address from the EWS program, get access to memory address, directly scanned document is stored into this memory address.
Step S407 finishes scanning, and share service device EWS closes the machine catalogue sharing, then closes share service device EWS.
Particularly, finish scanning, EWS closes the machine catalogue sharing, loses efficacy during the first identifying code, and the user can close EWS.The machine catalogue sharing relation, the first identifying code lost efficacy after scanning input was finished, can not be by authentication when then the user uses this first identifying code to carry out authentication next time, thus can not use scan function, and then guaranteed the fail safe of scanning system.
Fig. 5 is the method flow diagram according to the 3rd embodiment of scan method shown in Figure 2.Fig. 5 shows the third method embodiment that web routine accesses such as utilizing EWS (embedded web server) scans to scanner, comprises the steps: in this embodiment
Step S501 opens share service device EWS.Be the operating environment that the user enters the EWS program, by EWS access scan instrument.Wherein, the EWS program is the share service device in above-described embodiment.
Step S502, the machine is processed scan request.
Particularly, the user sends to scanner by the machine with scan request.
Step S503, the machine sends identifying code to scanner and is presented in the EWS webpage.
Particularly, step S102 can realize by step S502 and S503 among Fig. 2: in this embodiment, to generate identifying code (being the first identifying code in above-described embodiment) according to this scan request when the user sends scan request by main frame and send to scanner, and the first identifying code sent to EWS and be presented in the webpage.
Step S504, share service device EWS share the machine catalogue to scanner temporarily.
Particularly, the EWS program creates the incidence relation of the position, high in the clouds (being the memory address in above-described embodiment) of digital code and user's setting according to the first identifying code, and this incidence relation fed back to scanner, and the machine catalogue namely generates by the incidence relation that the first identifying code creates digital code and target memory address.。
Step S505, the user is the input validation code in scanner GUI.
In this embodiment, step S505 can realize that the coupling authentication of users that passes through the first identifying code and the second identifying code of step S104 is the process of validated user among Fig. 2, particularly, after step S504, the user is on scanner during scanned document, prompting according to scanner, input validation code in scanner GUI (identifying code herein is the second identifying code in above-described embodiment), scanner carries out authentication, in the first identifying code situation consistent with the second identifying code, the scanner authentication of users is validated user, begins to scan the user and asks the original document that will scan, and gets access to scanned document.The user during scanned document, inputs the second identifying code on scanner, know namely by scanner after the authentication this sends the document of scanning to which the machine.In the situation of GUI or numerical key, only identify different users by the button sequential scheduling of some button.
Step S506, scanner according to this machine directory scan document to the high in the clouds position corresponding with identifying code.
In this embodiment, step S106 among Fig. 2 and S108 can realize by step S306, particularly, scanner is after authentication of users is validated user, and the original document that the scanning user will be scanned gets access to scanned document, then, scanner gets access to the target memory address according to obtain the incidence relation that this machine catalogue is the first identifying code and position, high in the clouds from the EWS program, directly scanned document is stored in the position, high in the clouds.Wherein, the position, high in the clouds can also be title or the set information of Email address or the network printer.In this embodiment, do not need scanned document is scanned file on the host client, send to other places by host client again, need to be at title or the set information of scanner record or input position, high in the clouds, Email address or the network printer yet, scanner is by the first identifying code of share service device establishment and the incidence relation of memory address, can directly obtain the memory address that the user sets, realize safe and simple effect of carrying out network sweep.
Step S507 finishes scanning, closes share service device EWS.
Particularly, finish scanning, lost efficacy during the first identifying code, the user can close share service device EWS.The machine catalogue sharing relation, the first identifying code lost efficacy after scanning input was finished, can not be by authentication when then the user uses this first identifying code to carry out authentication next time, thus can not use scan function, and then guaranteed the fail safe of scanning system.
Need to prove, can in the computer system such as one group of computer executable instructions, carry out in the step shown in the flow chart of accompanying drawing, and, although there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
Fig. 6 is the structural representation according to scanner of the present invention.As shown in Figure 6, this scanner comprises: deriving means 10 is used for obtaining the scan request of host client and the first identifying code that is generated by scan request; Comparator 30 is used for after the second identifying code that gets access to user's input, and in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user; Scanning means 50 is used for after authentication of users is validated user, and the scanning user asks the original document that will scan, to obtain scanned document; Dispensing device 70 is used for obtaining the memory address corresponding with the first identifying code from the share service device, and the scanned document that gets access to is sent to memory address; Wherein, after getting access to the first identifying code that is generated by scan request, the first identifying code is sent to the share service device, to create the incidence relation of the first identifying code and memory address.
Adopt scanner of the present invention, get access to the scan request of host client transmission and the first identifying code that is generated by scan request by deriving means, then comparator is after the second identifying code that gets access to user's input, in the situation of the first identifying code and the second authentication code matches, authentication of users is validated user, ask the original document that will scan by scanning means scanning user afterwards, after getting access to scanned document, dispensing device obtains the memory address corresponding with the first identifying code from the share service device, and the scanned document that gets access to sent to memory address, wherein, the share service device is connected between host client and the scanner, can according to the first identifying code that gets access to, create the incidence relation of the first identifying code and memory address.By scanning system provided by the invention, the user sends scan request by host client, after the scanner end is verified as validated user, the document that just can need to scan the scanner scanning user, increased the fail safe of scanning, and after scanner gets access to scanned document, obtain the memory address that the user sets by the share service device, rather than directly scanned document is sent to the machine, solved and utilized the method for network sweep document to have the problem of fail safe hidden danger in the prior art, and then realized safety, carry out easily the technique effect of network sweep.
From above description, can find out, the present invention has realized following technique effect: in the above embodiment of the present invention, utilize the web routine accesses such as share service device EWS (embedded web server) to scanner, send the request that will scan the machine to scanner, scanner sends the first identifying code to the user, or PC sends ground identifying code and request scanning to scanner, the user is on scanner during scanned document, the input validation code, scanner obtains the memory address of user's setting and the document that scans to that address transmission from EWS.In the situation of GUI or numerical key, only by the button sequential scheduling of some button, scanner also can be identified different users, and this first identifying code lost efficacy after the user operates or after a period of time.By scan method provided by the invention and system, the user sends after the scan request by host client, the user at the scanner end by authentication and after scanner gets access to scanned document, scanner obtains the address of memory scanning document from the share service device, and scanned document sent to the memory address that the user sets, yet need in the prior art that scanning document is stored in the machine and then sending to other addresses, the present invention directly is stored in scanned document the memory location that the user needs, and the interim checking of identifying code is so that whole scanning process is all very safe, solved and utilized the method for network sweep document to have the problem of fail safe hidden danger and complex operation in the prior art, and then realized safety, carry out easily the technique effect of network sweep.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and be carried out by calculation element, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a scan method is characterized in that, comprising:
Obtain the scan request of host client and the first identifying code that is generated by described scan request;
After the second identifying code that gets access to user's input, in the situation of described the first identifying code and described the second authentication code matches, verify that described user is validated user;
In checking after described user is validated user, scan described user and ask the original document that scans, to obtain scanned document;
Obtain the memory address corresponding with described the first identifying code from the share service device, and the described scanned document that will get access to sends to described memory address;
Wherein, after getting access to the first identifying code that is generated by described scan request, described the first identifying code is sent to described share service device, to create the incidence relation of described the first identifying code and described memory address.
2. method according to claim 1 is characterized in that, obtains the scan request of host client and the step of the first identifying code of being generated by described scan request comprises:
Obtain the scan request of described host client output;
Obtain by described host client and calculate according to the random code in the described scan request, and described the first identifying code that generates.
3. method according to claim 1 is characterized in that, the step that the described scan request of obtaining host client reaches the first identifying code that is generated by described scan request comprises:
Obtain the scan request of described host client;
Obtain by scanner and calculate according to the random code in the described scan request, and described the first identifying code that generates.
4. according to claim 2 or 3 described methods, it is characterized in that, after the second identifying code that gets access to user's input, in the situation of described the first identifying code and described the second authentication code matches, verify that described user is that the step of validated user comprises:
Whether compare described the second identifying code consistent with described the first identifying code, wherein,
In described the second identifying code situation consistent with described the first identifying code, verify that described user is validated user,
In described the second identifying code and the inconsistent situation of described the first identifying code, verify that described user is the disabled user.
5. method according to claim 1 is characterized in that, after obtaining the first identifying code that is generated by described scan request, described method also comprises:
Start timer and begin timing;
When described timing time surpasses in the situation of threshold value, by the first identifying code inefficacy of described scan request generation;
When described timing time does not surpass in the situation of threshold value, preserve described the first identifying code.
6. a scanning system is characterized in that, comprising:
Host client is used for sending scan request;
Scanner is connected with described host client, comprising:
The first deriving means is used for obtaining the scan request of described host client and the first identifying code that is generated by described scan request;
Comparator is connected with described the first deriving means, is used for after the second identifying code that gets access to user's input, in the situation of described the first identifying code and described the second authentication code matches, verifies that described user is validated user;
Scanning means is connected with described comparator, is used for scanning described user and asks the original document that will scan, to obtain scanned document;
The first dispensing device is connected with described scanning means, be used for obtaining the memory address corresponding with described the first identifying code from the share service device, and the described scanned document that will get access to sends to described memory address;
Described share service device is connected between described host client and the described scanner, is used for creating the incidence relation of described the first identifying code and described memory address according to described the first identifying code that gets access to.
7. system according to claim 6 is characterized in that, described host client comprises:
First processor is used for calculating according to the random code of described scan request, to generate described the first identifying code;
The second dispensing device is connected with described first processor, is used for sending described first identifying code of described scan request and generation to described the first deriving means.
8. system according to claim 6 is characterized in that, described scanner also comprises:
The second processor is connected with described the first deriving means, generates described the first identifying code for calculating according to the random code of described scan request, and described the first identifying code is sent to described the first deriving means.
9. system according to claim 6 is characterized in that, described scanner also comprises:
Timer is connected with described the first deriving means, is used for beginning timing after carrying out described the first deriving means;
The 3rd processor is connected with described timer, is used for surpassing in the situation of threshold value at described timing time, and described the first identifying code that is generated by described scan request lost efficacy;
Memory is connected with described timer, is used for not surpassing in the situation of threshold value at described timing time, preserves described the first identifying code.
10. a scanner is characterized in that, comprising:
Deriving means is used for obtaining the scan request of host client and the first identifying code that is generated by described scan request;
Comparator is used for after the second identifying code that gets access to user's input, in the situation of described the first identifying code and described the second authentication code matches, verifies that described user is validated user;
Scanning means is used for after the described user of checking is validated user, scans described user and asks the original document that will scan, to obtain scanned document;
Dispensing device be used for obtaining the memory address corresponding with described the first identifying code from the share service device, and the described scanned document that will get access to sends to described memory address;
Wherein, after getting access to the first identifying code that is generated by described scan request, described the first identifying code is sent to described share service device, to create the incidence relation of described the first identifying code and described memory address.
CN201210430805.0A 2012-11-01 2012-11-01 Scanning method and system and scanner Expired - Fee Related CN102905052B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210430805.0A CN102905052B (en) 2012-11-01 2012-11-01 Scanning method and system and scanner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210430805.0A CN102905052B (en) 2012-11-01 2012-11-01 Scanning method and system and scanner

Publications (2)

Publication Number Publication Date
CN102905052A true CN102905052A (en) 2013-01-30
CN102905052B CN102905052B (en) 2015-04-08

Family

ID=47577077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210430805.0A Expired - Fee Related CN102905052B (en) 2012-11-01 2012-11-01 Scanning method and system and scanner

Country Status (1)

Country Link
CN (1) CN102905052B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486530A (en) * 2014-12-15 2015-04-01 上海合合信息科技发展有限公司 Image data acquisition and authentication device, authentication method as well as control device and method of image data acquisition and authentication device
CN107369231A (en) * 2017-06-29 2017-11-21 山东千沐云物联科技股份有限公司 A kind of smart lock control method and device
CN108024024A (en) * 2016-11-04 2018-05-11 精工爱普生株式会社 Reading system, managing device, recording medium and reading device
CN111107140A (en) * 2019-12-12 2020-05-05 山东浪潮通软信息科技有限公司 System and method for controlling scanner by web application

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897631A (en) * 2005-07-11 2007-01-17 三星电子株式会社 Multifunctional peripheral equipment with function of adding user totem information and its method
CN1953499A (en) * 2005-10-19 2007-04-25 三星电子株式会社 Image forming system and method, image forming apparatus, authentication information providing device and method
CN101087345A (en) * 2006-06-07 2007-12-12 佳能株式会社 Data processing apparatus, and control method, program, and storage medium thereof
CN101226463A (en) * 2007-01-16 2008-07-23 夏普株式会社 Control apparatus, communication system, control method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897631A (en) * 2005-07-11 2007-01-17 三星电子株式会社 Multifunctional peripheral equipment with function of adding user totem information and its method
CN1953499A (en) * 2005-10-19 2007-04-25 三星电子株式会社 Image forming system and method, image forming apparatus, authentication information providing device and method
CN101087345A (en) * 2006-06-07 2007-12-12 佳能株式会社 Data processing apparatus, and control method, program, and storage medium thereof
CN101226463A (en) * 2007-01-16 2008-07-23 夏普株式会社 Control apparatus, communication system, control method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486530A (en) * 2014-12-15 2015-04-01 上海合合信息科技发展有限公司 Image data acquisition and authentication device, authentication method as well as control device and method of image data acquisition and authentication device
CN108024024A (en) * 2016-11-04 2018-05-11 精工爱普生株式会社 Reading system, managing device, recording medium and reading device
CN107369231A (en) * 2017-06-29 2017-11-21 山东千沐云物联科技股份有限公司 A kind of smart lock control method and device
CN107369231B (en) * 2017-06-29 2023-09-12 山东千沐云物联科技股份有限公司 Intelligent lock control method and device
CN111107140A (en) * 2019-12-12 2020-05-05 山东浪潮通软信息科技有限公司 System and method for controlling scanner by web application

Also Published As

Publication number Publication date
CN102905052B (en) 2015-04-08

Similar Documents

Publication Publication Date Title
CN103986688B (en) Method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus
CN109600306B (en) Method, device and storage medium for creating session
CN103023933B (en) A kind of log-on message Integrated Processing System and method
US9124843B2 (en) Device management system, peripheral device, and method therefor for managing device information of a peripheral device
CN103858379A (en) Authenticating device users
US11075895B2 (en) Cloud operation interface sharing method, related device, and system
EP3306504A1 (en) Multi-user login method, device and storage medium
WO2015014128A1 (en) Authentication method for wearable device, and wearable device
WO2019033840A1 (en) Password authentication method for shared device, shared device, cloud server, and system
KR20180061272A (en) Method and apparatus for data processing between terminals, device and storage medium
CN108337210A (en) Equipment configuration method and device, system
CN102905052B (en) Scanning method and system and scanner
CN107438054A (en) The method and system of menu information control are realized based on public platform
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
US20160205091A1 (en) Information processing system, control method of information processing apparatus, and storage medium
JP2008140040A (en) Authentication processing system, authentication processing method and authentication processing program
CN101242273A (en) Signature data generation method, system and mobile terminal for mobile terminal
WO2018006318A1 (en) Method and system for using intelligent entrance guard on basis of mobile terminal
CN106210267A (en) The management method of contact head image, managing device and server
CN104967525A (en) News sharing method, apparatus and system
CN101854357A (en) Method and system for monitoring network authentication
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
JP6686783B2 (en) Image forming system and printing method
CN105681399B (en) Business card acquisition methods and device
CN105577658B (en) A kind of method and system for network linking transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150408

Termination date: 20151101

EXPY Termination of patent right or utility model