JP2007214611A - Image processing apparatus - Google Patents

Image processing apparatus Download PDF

Info

Publication number
JP2007214611A
JP2007214611A JP2006029120A JP2006029120A JP2007214611A JP 2007214611 A JP2007214611 A JP 2007214611A JP 2006029120 A JP2006029120 A JP 2006029120A JP 2006029120 A JP2006029120 A JP 2006029120A JP 2007214611 A JP2007214611 A JP 2007214611A
Authority
JP
Japan
Prior art keywords
image
log
unit
processing
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
JP2006029120A
Other languages
Japanese (ja)
Inventor
Kenji Tsutsumi
健次 堤
Original Assignee
Fuji Xerox Co Ltd
富士ゼロックス株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuji Xerox Co Ltd, 富士ゼロックス株式会社 filed Critical Fuji Xerox Co Ltd
Priority to JP2006029120A priority Critical patent/JP2007214611A/en
Publication of JP2007214611A publication Critical patent/JP2007214611A/en
Application status is Withdrawn legal-status Critical

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To prevent information leakage through an image log in an image processing apparatus having an image logging function. <P>SOLUTION: A usage selecting authority of encryption processing is given to a predetermined user in advance (S100). Encryption processing is not permitted for a user having no usage selecting authority of encryption processing (S126). If receiving a job request from a user for whom the usage selecting authority of encryption processing is set, it is inquired whether encryption is executed (S122). When the encryption processing is requested, setting is performed so that the encryption processing can be executed (YES in S122, S124), however, the encryption processing is not permitted without a desire (NO in S122, S126). Setting for encryption in output processing of important documents can prevent even a manager from decoding the image log, and viewing of the important documents through the image log can be restricted. <P>COPYRIGHT: (C)2007,JPO&INPIT

Description

  The present invention relates to an image processing apparatus having an image log function for storing a processing history in an image forming apparatus as an image.

  Today, when image forming apparatuses have high performance and high functionality, information leakage and illegal use due to images output from the image forming apparatuses have become a problem. For example, in a high-function device configured to store scanned document data in a predetermined storage area, document data copied by another person can be output, and the data itself can be stored in another storage medium. And you can take it out. Further, in a high-resolution color image forming apparatus, forgery of securities or banknotes is a problem.

  In response to a request for solving such a problem, for example, a mechanism has been proposed in which the output route can be traced after paper output (see Patent Documents 1 and 2). This mechanism basically saves an input image or output image every time an image output operation to a print medium is performed, and outputs the image such as the date and time of output, user name, location, etc. as necessary. Data related to a job (job environment data) is stored in association with an image, thereby enabling later tracking.

JP-A-6-270477 Japanese Patent Application Laid-Open No. 2004-208048

  For example, the mechanism described in Patent Document 1 shows a basic configuration of such a mechanism, and in order to leave what image was printed as a history (image log), the printed image itself is a history. Is stored in a storage device on the device side. That is, all print data is equally recorded in the storage device. By searching the image history, it is possible to specify the model name, serial number, installation location, and the like of the image forming apparatus that is the output destination of the printed matter that has been problematic due to unauthorized use.

  In the mechanism described in Patent Document 2, in a mechanism having a storage device that stores an image log as a print history as a server (referred to as an image log server), for example, an image log server can be connected when printing out. Also, print output is permitted only when the conditions that enable transfer of documents and environmental information to the server are satisfied, such as when there is free space on the server, and printing is prohibited when the conditions are not met. Yes. When printing out confidential documents, the output confidential data can be specified reliably by permitting print output only when the image data to be output and the environmental information related to the print output can be saved in the image log server. It is possible.

  However, with the mechanisms described in Patent Documents 1 and 2, it is difficult to manage an access policy for an image log at the stage of image log creation and storage. For example, if the image log is stored in a state equivalent to the output image, a situation may occur in which the access policy (security policy) for the original image to be output cannot be made the same as the access policy for the image log. For example, even if the original image to be output is an important document that is not desired to be viewed by others, the log server administrator can view the important document that cannot be normally accessed as an image log.

  Further, in the mechanisms described in Patent Documents 1 and 2, since at least the output image itself is left as a history, an image log can always be collected with the same accuracy as the output image. However, in terms of collection efficiency and storage efficiency, It can happen that it is not efficient.

  Also, if you try to acquire and save an image equivalent to the output image as an image log, it will be necessary to interrupt the acquisition process and storage process in the normal output process, and the throughput depends on when these processes are interrupted. A decrease in (productivity) can occur.

  In addition, when hidden information is embedded in the processing target image, if the output image does not have sufficient accuracy, the hidden information is lost when the image equivalent to the output image is acquired and saved, May cause trouble when searching or browsing.

  Further, in the mechanism described in Patent Document 1, the history of the printed image itself is kept at the same time as the print output without being understood by the user (see paragraph 33 of the same document). It is not always effective to save the image log so that it is not realized.

  Further, in the mechanism described in Patent Document 2, if communication is impossible and the log server is down, output processing is always prohibited.

  The present invention has been made in view of the above circumstances, and it is an object of the present invention to provide a mechanism capable of managing an access policy for an image log at the stage of creating and saving an image log among the problems described above.

  It is still more desirable to provide a mechanism that can solve at least one of the remaining problems.

  The first image processing apparatus according to the present invention includes an image processing unit that processes a processing target image so that the processing target image cannot be estimated at a glance when browsing a stored image log image. The image processed by the image processing unit was saved as an image log image. Rather than storing the image log image at the same level (quality) as the output image, the image cannot be guessed at first glance using the encryption or other image processing (editing) technology. It is intended to prevent information leakage through the image log by storing after processing.

  The second image processing apparatus according to the present invention includes a log disclosure level adjustment processing unit that adjusts a disclosure level (a user level to be disclosed) of a stored image log. Rather than allowing anyone to search and view the stored image log, the user level of the disclosure target can be set so that the disclosure target can be limited according to the importance of the processing target image This is the purpose.

  A third image processing apparatus according to the present invention includes a log disclosure level adjustment processing unit that adjusts a disclosure level of a stored image log, and an image log according to the log disclosure level adjusted by the log disclosure level adjustment processing unit. A log storage destination switching unit for switching the storage destination is provided. When storage destinations with different management levels are prepared, instead of always saving to the same storage destination, it is possible to select the optimal storage destination according to the log disclosure level desired by the user. This is intended to allow the disclosure target person to be limited according to the importance of the image.

  The invention described in the dependent claims defines a further advantageous specific example of the image processing apparatus according to the present invention.

  For example, the fourth image processing apparatus according to the present invention further includes a log creation refusal right setting unit that sets a right to select whether to use the image log function, and the log creation refusal right setting unit sets the selection right. The image log function can now be selected only for users who are using it. Instead of always saving the image log, it is possible to cancel the log saving function according to the user's wish, specifically according to the importance level of the image to be processed. If the function can be canceled, the original purpose is not achieved, so that it is possible to set a user level at which the function can be canceled.

  The fifth image processing apparatus according to the present invention is a processing target according to the log acquisition level adjusted by the log acquisition level adjustment processing unit and the log acquisition level adjustment processing unit that adjusts the acquisition level of the stored image log. An image quality adjustment unit that adjusts the image quality to obtain an image for storage is further provided. The purpose is to improve the storage efficiency by enabling the storage quality to be adjusted according to the log acquisition level desired by the user, rather than always storing the log with the same quality as the output image.

  The sixth image processing apparatus according to the present invention further includes a stored image selection processing unit that selects an input image other than an output image or an intermediate image as an image log image. Rather than always saving the same image as the output image in the log, the log acquisition efficiency and storage efficiency can be improved by making it possible to arbitrarily select the input image or intermediate image according to the user's request. It is the purpose.

  In the seventh image processing apparatus according to the present invention, the save result confirmation unit for confirming whether or not the save destination of the image log to be saved is in a saveable state, and the check result of the save possibility check unit are In the case where it is indicated that it is not in a storable state, a log storage destination switching unit that searches for other storable storage destinations and sets the storage destination as a storage destination is further provided. When the log storage destination is in a state where log storage is not possible due to poor communication or insufficient capacity, the output process is not stopped immediately, but another storage destination that can be stored is searched and stored. This is to prevent the processing from being stopped as much as possible.

  The eighth image processing apparatus according to the present invention further includes a processing timing control unit that adjusts the acquisition and storage timing of the image log according to the processing job and the system configuration. Rather than fixing the timing of log acquisition and storage, the purpose is to improve the throughput by making it possible to arbitrarily adjust according to the processing job and system configuration.

  The ninth image processing apparatus according to the present invention further includes a hidden information processing unit that separates the hidden information embedded in the processed image from the image, and the hidden information separated by the hidden information processing unit Saved as an image log in association with an image. Hidden information that will be lost when the output image of the processing image is saved as a log is saved as separate hidden information from the image, so that the image log can be read out and used for searching and browsing This is the purpose.

  The tenth image processing apparatus according to the present invention further includes a storage notification unit that notifies that the image log is stored. Instead of saving the image log without the user's understanding, it is intended to obtain an effect of preventing unauthorized use by actively notifying that the log is saved or that it is saved.

  According to the first image processing apparatus of the present invention, since the original processing target image is processed into an image that cannot be estimated at first glance using an encryption technique or the like, the image is stored. It is possible to manage the access policy for the image log at the stage of creating and saving the log, and to reliably prevent information leakage through the image log.

  For example, when encrypting and saving logs, encryption is performed using the encryption key possessed by the auditor, so it cannot be decrypted without the decryption key, and in effect only the auditor can decrypt it. Log safety can be increased. By setting the encryption so that the important document is output, even the administrator cannot decrypt the image log and can restrict the browsing of the important document via the image log.

  Also, when encrypting and saving the log, since the encryption is performed using the encryption key that the user has, it cannot be decrypted without the decryption key, and virtually only the person who executed the job can decrypt it. , Can increase the safety of the image log. By setting the encryption so that the important document is output, even the administrator cannot decrypt the image log and can restrict the browsing of the important document via the image log.

  However, in this case, there is a problem that the auditor cannot decrypt the image log. In this case, a user who has the authority to perform encryption is registered by the administrator, and only authorized users can perform encryption. By doing so, it is possible to enhance auditing for untrusted users.

  According to the second image processing apparatus of the present invention, since the log disclosure level can be set, the access policy for the image log is managed at the stage of creating and saving the image log as in the first image processing apparatus. be able to. For example, the disclosure subject can be restricted according to the degree of importance of the processing target image, and the access policy for the original image and the access policy for the image log can be made equal.

  According to the third image processing apparatus of the present invention, the optimum storage destination can be selected according to the log disclosure level desired by the user. It is possible to manage the access policy for the image log at the stage of saving. Since the access policy for the image log can be controlled, the access policy for the original image and the access policy for the image log can be adjusted equally.

  According to the fourth image processing apparatus of the present invention, since it is possible to select whether or not the image log function can be used for a user at a predetermined level, the log storage function is canceled according to the importance of the processing target image. By doing so, information leakage via the image log can be prevented. For example, an important document can be operated such that an image log is not acquired and stored so that information leakage through the image log does not occur.

  According to the fifth image processing apparatus of the present invention, since the storage quality of the image log can be adjusted according to the log acquisition level desired by the user, log storage efficiency can be improved.

  According to the sixth image processing apparatus of the present invention, since an image other than the output image, such as an input image or an intermediate image, can be arbitrarily selected and saved as a log, log acquisition efficiency and storage efficiency can be improved. it can.

  According to the seventh image processing apparatus of the present invention, when the designated log storage destination is in an unusable state, other storage destinations that can be stored are searched and stored. It is possible to prevent the processing from being stopped.

  According to the eighth image processing apparatus of the present invention, the log acquisition / storing timing is adjusted according to the processing job and system configuration, so log acquisition / storing can be performed at a timing that does not cause a decrease in throughput. By doing so, both the image log function and productivity can be achieved.

  According to the ninth image processing apparatus of the present invention, when the hidden information is embedded in the processing coping image, the image and the hidden information are separated and saved separately as logs. Even if hidden information disappears in an image, hidden information stored separately can be read, and the influence of hidden information loss in the image can be eliminated.

  According to the tenth image processing apparatus of the present invention, notification that the image log is to be saved is made, so that the effect of preventing unauthorized use can be obtained.

  Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings.

<System configuration>
FIG. 1 is a diagram illustrating a configuration example of an image forming system (image log system) in which an image forming apparatus and an image log server that stores an image log are connected to a network.

  The image forming system 1 reads an image, performs a printing process based on the read image, or performs a printing process based on print data received from a client terminal, and an image forming apparatus 5 as an image output terminal. A document management device 7 as an image log server having a storage device that stores (records) the operation history of the image forming device 5 as an image log, and management for browsing the image log stored in the document management device 7 A browsing device 8 as a user terminal is connected by a log management NW (NetWork) 9a which is an example of a network 9.

  In the figure, all of the image forming apparatus 5, the document management apparatus 7, and the browsing apparatus 8 are configured as one, but actually, a plurality of them may be arranged. Further, although the document management device 7 and the browsing device 8 are connected by the log management NW 9a, the document management device 7 and the browsing device 8 may be configured integrally as an information processing server by directly connecting them without going through the log management NW 9a.

  In this image forming system 1, a storage device for storing an image log is prepared in the document management device 7 having a server function provided outside the image forming device 5. However, the present invention is not limited to this, and a storage device for storing the image log may be provided in the image forming apparatus 5 or may be provided externally. In addition, the image forming apparatus 5 and the browsing apparatus 8 are configured such that the image log can be viewed on an operation panel of the user interface unit 15 mounted on the apparatus or a display device (for example, CRT or liquid crystal) of a separate user interface apparatus. Can be integrated.

  The image forming apparatus 5 can start a job by a user operation from a user interface device provided in the main body or a start instruction from an image input terminal on a network.

  For example, various image input terminals 3 are connected to the image forming apparatus 5 so that data to be processed is input. For example, the image input terminal 3 creates a digital document (hereinafter simply referred to as a document) DOC and performs processing such as editing, for example, a personal computer 3a, a color scanner 3b, a digital camera 3c, or a hard disk device or optical It can include any number of image input sources such as a data storage device 3d that functions as a document box such as a magnetic disk device or an optical disk device, and further a FAX device 3e. The Web server 3 f on the Internet can also be an image input source for inputting a digital document such as a home page to the image forming apparatus 5.

  For example, the color scanner 3b and the digital camera 3c are connected to the image forming apparatus 5 in accordance with IEEE (Institute of Electrical and Electronics Engineers, Inc .; American Institute of Electrical and Electronics Engineers) 1394 standard and USB (Universal Serial Bus) 2.0 standard.

  Each of the image input terminals 3 incorporates an application program for creating a document DOC. For example, electronic data representing a document DOC prepared on the image input terminal 3 side is described in an image format (for example, JPEG, BMP, PNG, etc.) that can be processed by the image forming apparatus 5.

  Further, for example, a document file created by the personal computer 3a is printed in a page description language (PDL: Page Description Language) in which enlargement, rotation, deformation, etc. of figures, characters, etc. can be freely controlled in order to be printed out by, for example, a printer. The data is sent to the image forming apparatus 5 as described data. The image forming apparatus 5 that has received the PDL data renders the image data for each output unit (one page) before printing, and then outputs the raster data to the image output unit (printer engine unit).

  The image forming apparatus 5 is, for example, a so-called multi-function machine (multifunction machine) having a copying function, a page printer function, and a facsimile transmission / reception function, and is configured as a digital printing apparatus.

  The image forming apparatus 5 roughly includes a controller having an image reading unit 10 that reads a document, an image processing function that performs desired image processing on input image data, and a control function that controls the operation of the entire terminal. An image output unit 30 that forms and outputs a visible image on a predetermined output medium based on image data from the unit 20 and the controller unit 20, and a built-in paper feed tray (three-stage configuration in the figure) or a manual feed tray A paper feed unit 80 that conveys printing paper as an output medium from any of the above to the image output unit 30.

  The image forming apparatus 5 can be connected to the image input terminal 3, the document management apparatus 7, and the browsing apparatus 8 via a connection cable or a network. For example, CSMA / CD (Carrier Sense Multiple Access with Collision Detection) type LAN (Local Area Network; for example, IEEE802.3) or Gigabit (Giga Bit) based LAN (hereinafter collectively referred to as a wired LAN) image input to a personal computer 3a, etc. Connected to terminal 3. The wired LAN can be a wireless LAN.

  Alternatively, it is connected to an image input terminal 3 such as a FAX apparatus 3e via a communication NW 9b such as a public switched telephone network (PSTN) or an ISDN (Integrated Switched Digital Network). Instead of the communication NW 9b, so-called PC-FAX that exchanges facsimiles using other communication media including the Internet may be performed.

  Further, the image forming apparatus 5 can be connected to, for example, an IEEE (Institute of Electrical and Electronics Engineers, Inc.) 1394 standard device or a USB (Universal Serial Bus) 2.0 standard device. Digital image data can be received from these devices. Alternatively, the image forming apparatus 5 can be controlled remotely via these devices.

  With such a configuration, as described above, the image forming apparatus 5 is not limited to the print function of the image read by the image reading unit 10, that is, the copy function, but from the image input terminal 3 such as the personal computer 3a via the connection cable. Based on the so-called print function for printing an image based on the acquired document data, an image file stored in the data storage device 3d, or the like, FAX data acquired via a telephone line or other communication interface, or other image data It also comes with a function to print out.

  The image reading unit 10 also has a platen cover function, a document feeder (ADF (automatic document feeder)) 12 having no circulation function for transporting and discharging a document to a reading position on a reading table (platen glass) (not shown), A user interface (UI) unit 15 having an operation panel unit for displaying guidance information for using the device, predetermined information processing results, management information, and the like and an operation key unit for receiving various instruction inputs from the operator to the device And have. A card reading unit 17 that reads an ID card and other IC cards for user authentication is provided below the operation panel unit 15a and on the front side of the apparatus.

  A user interface device provided with a large user interface or a maintenance screen used in place of or together with the operation panel unit and the operation key unit may be provided.

  The image output unit 30 includes an image forming unit 32 (which may include a double-sided copying unit) and a discharge unit 36 having a plurality of discharge trays for discharging normal transport paper (recorded paper). .

  The image forming unit 32 converts the image represented by the image signal obtained by the image reading apparatus 10 into an electrophotographic type, a thermal type, a thermal transfer type, an ink jet type, or a similar conventional image forming process, A visible image is formed (printed), that is, copied on plain paper or thermal paper. Therefore, the image forming unit 32 includes, for example, a raster output scan (ROS) based print engine for operating the image forming apparatus 5 as a digital printing system.

  The processing substrate incorporated in the image forming apparatus 5 includes not only a processing unit for the image output unit 30 (particularly an image processing unit and a control unit) but also various image processing function units of the controller unit 20 and various types of the image forming apparatus 5 as a whole. A circuit for processing is mounted. For example, the document feeder 12, which is a resource constructed in the image forming apparatus 5, the user interface unit 15, the image reading unit (scanner unit) (not shown) of the image reading unit 10, the image forming unit 32, the discharge unit 36, or the paper feed A circuit for controlling the unit 80 and the like is mounted. A semiconductor storage medium is mounted on the processing board, and for example, processing programs for a copying application, a printer application, a facsimile (FAX) application, or other applications are stored.

  The image reading unit 10 has a function of an image input terminal. For example, an image on a document is read by irradiating light to the document sent to the reading position by using a full width array of CCD solid-state imaging devices. The red, green and blue analog video signals representing the read image are converted into digital signals and sent to the image processing function unit of the controller unit 20.

  When the reading is completed in this way, the image processing function unit of the controller unit 20 performs black (K), yellow (based on the red, green, and blue image data R, G, and B from the image reading unit 10. Y), magenta (M), and cyan (C) on / off binarized toner signals are obtained, and the respective toner signals are output to the image output unit 30.

  In synchronization with reading by the image reading device 10, when a sheet is fed from any of a plurality of (A 4, B 4, A 3) sheet feeding trays to the image output unit 30, image formation of the image output unit 30 is performed. The unit 32 forms a visible image on one side of the paper based on the K, Y, M, and C toner signals sent from the image processing function unit of the controller unit 20.

  In addition, the image forming apparatus 5 has a configuration specific to the present embodiment. Depending on the system configuration for realizing the image log function, the image forming apparatus 5 generates an image log data, and the generated image log is stored in a predetermined storage medium. The storage processing unit 260 to be stored and the image log reading processing for reading the image log from the storage processing unit 260 and performing search processing, displaying the image log itself, the search process, the search result, and the like on a predetermined display device and presenting them to the user The unit 280 may be provided.

  In addition, the image forming apparatus 5 and the browsing apparatus 8 are configured such that the image log can be viewed on an operation panel of the user interface unit 15 mounted on the apparatus or a display device (for example, CRT or liquid crystal) of a separate user interface apparatus. Can be integrated.

  The document management apparatus 7 stores the image log transmitted from the image forming apparatus 5 and sends the stored image log to the browsing apparatus 8 in response to a request from the browsing apparatus 8.

  The browsing device 8 can not only present the image log stored in the document management device 7 to the user, but also perform image origin tracking investigation processing using the image log.

  The browsing device 8 can be connected to a card reader 8a that reads an ID card or other IC card for user authentication.

<Example of basic configuration of image processing apparatus>
FIG. 2 shows a basic configuration of an image processing apparatus such as the image forming apparatus 5, the document management apparatus 7, and the browsing apparatus 8, focusing on a functional part for storing an image log in the document management apparatus 7 and searching an operation history. It is a functional block diagram shown.

  As described above, in realizing the image log function, it is free to place a storage device for storing the image log. Also, an image log is created, and the image log is stored in the storage device and read out. It is also possible to provide various functional parts for browsing.

  In the following description, the entire system will be described as an image processing apparatus that realizes an image log function regardless of where each functional unit is provided.

  As shown in the figure, an image processing apparatus 2 that realizes an image log function includes a control unit 100 that controls the overall operation of the image processing apparatus 2, an instruction receiving unit 110 that receives an operation instruction of the image processing apparatus 2, and an operation A display unit 120 that displays a menu, displays an operation state of the apparatus and various types of information, and a communication interface unit 130 that functions as an interface with a network are provided.

  The image processing apparatus 2 includes an image log processing unit 200 that implements an image log function as a configuration unique to the present embodiment. The image log processing unit 200 includes an image log acquisition unit 240 that generates image log data, and a storage processing unit 260 that stores the generated image log in a predetermined storage medium. When the image forming apparatus 5 has a system configuration in which a storage processing unit 260 for storing an image log is built in, data transfer between the image log acquisition unit 240 and the storage processing unit 260 may be performed via a system bus. You can do it directly.

  The storage processing unit 260 may have different server management levels, such as whether it is compatible with large-capacity image log storage or only small-capacity image log storage. it can.

  Further, the image log processing unit 200 reads the image log from the storage processing unit 260 and performs a search process, and displays the image log itself, a search process, a search result, and the like on a predetermined display device and presents the image log to the user. A processing unit 280 is provided.

  The image log acquisition unit 240 is input image data such as read image data read by the image reading unit 10, print image data received from the image input terminal 3, output image data used for output processing by the image output unit 30, and others. The intermediate image data is used as document image data to be stored in the image history.

  In addition, the image log acquisition unit 240 uses job information for specifying a job to be processed, date and time when an image is output by the image forming apparatus 5, user specifying information for specifying an operator, installation location of the image forming apparatus 5, and used The job environment data relating to the output job of the image, such as device information for specifying the image forming device 5 and the disclosure level of the image log, is acquired. Document image data acquired by the image log acquisition unit 240 and stored in the storage processing unit 260 and job environment data incidental thereto are collectively referred to as an image log.

  The user specifying information is information specific to the user who issued the output job, and may be, for example, the user name itself acquired by using the user authentication function, or the name of the client device that issued the job (image input terminal 3). Information specifying the IP address), the IP (Internet Protocol) address, the login user name, the document name, the name of the apparatus that is the job execution destination, etc.

  As the device information, for example, the manufacturer name, model number, manufacturing number (serial number), or the IP (Internet Protocol) address of the device can be used.

  The image log acquisition unit 240 includes a functional part described below as a configuration unique to the present embodiment. For example, the image log acquisition unit 240 adjusts the disclosure level of the stored image log and the log acquisition level setting unit (an example of the log acquisition level adjustment processing unit) 242 that allows the user to set the acquisition level of the image log. A log disclosure level adjustment unit 243, a saved image selection processing unit 244 for selecting document image data for saving a log, an accuracy adjustment processing unit 245 for adjusting the accuracy of the image selected by the saved image selection processing unit 244, and an image A log storage destination switching unit 246 that switches the log transmission destination storage processing unit 260 is provided.

  When acquiring the document image data for log storage, the stored image selection processing unit 244 determines the storage accuracy, data capacity, and acquisition processing according to the log acquisition level set by the log acquisition level setting unit 242. In consideration of ease, etc., it is determined whether input image data should be used, output image data should be used, or other intermediate image data should be used. By using the selection of the image log to be saved, it is possible to manage the access policy for the image log at the stage of creating and saving the image log.

  For example, when it is necessary to save an image log in a state substantially the same as the output result product by the image output unit 30, it is necessary to use output image data. The unit 244 selects more efficient data from the input image data and the intermediate image data. For example, for a print job, input image data itself such as PDL data is used as document image data for log storage. Compared to the output image data, the amount of stored information is small, and the image log can be stored efficiently.

  Further, the accuracy adjustment processing unit 245 adjusts the quality of the processing target image according to the log acquisition level adjusted by the log acquisition level setting unit 242 serving as the log acquisition level adjustment processing unit, and generates an image for storage. It is an example of a quality adjustment part.

  The accuracy adjustment processing unit 245 adjusts the accuracy of, for example, an image log (particularly document image data) according to the log acquisition level set by the log acquisition level setting unit 242. When it is necessary to save the image log in a highly accurate state, it is possible to save it in a highly accurate state that requires a large capacity. This makes it possible to store the images in a low-precision state.

  For example, the accuracy adjustment processing unit 245 adjusts whether a color image that requires a large capacity or a monochrome image that requires a small capacity, or a high resolution that requires a large capacity, or a small capacity Adjust whether to achieve low resolution. These may be combined. By making it possible to adjust the amount of information in the image log according to the log acquisition level, it is possible to efficiently collect and store the image log.

  In addition, the log disclosure level adjustment unit 243 acquires the disclosure level of the image log so as to adjust the disclosure level of the stored image log, and notifies the log storage destination switching unit 246 of the log disclosure level. The log storage destination switching unit 246 selects a log storage destination (the storage unit 268 of the own device or the document management device 7 that is an external log server) to which the image log is to be transmitted, according to the log disclosure level.

  By doing so, the log storage destination switching unit 246 can switch the storage destination of the image log according to the log disclosure level adjusted by the log disclosure level adjustment unit 243, and the image log creation / storage can be performed. The access policy for the image log can be managed at each stage. For example, the safety level of the image log can be switched by sending the image log to a log server having a different management state according to the log disclosure level.

  Here, log servers having different management states may be, for example, those having different levels of administrators or those having different physical arrangements. For example, the lower management level corresponds to a manager who is designated within the group, and the higher management level corresponds to the management of a department whose role is management at the company level. In addition, examples of different physical arrangements include a living room, a server room, and an external management company.

  The image log acquisition unit 240 encrypts input image data and output image data, and uses the encrypted image data as original image data to be stored in an image history, or encrypts job environment data, It has an encryption processing unit 247 that uses the encrypted job environment data as job environment data to be stored in the history.

  The encryption processing unit 247 is an example of an image processing unit (image conversion unit) that converts document image data stored as an image log into an image in a state different from an input image or an output image. Or an image that is different from the output image, so long as it can manage the access policy for the image log at the stage of creating and saving the image log and improve the security performance.

  For example, when a viewer browses a stored image log, the original processing target image may be in a state that cannot be read (guessed) at a glance, and the image processing (image conversion) mechanism is encrypted. It is not limited to the conversion. However, it is preferable to use the encryption process as the image processing process in consideration of the restoration process and the difficulty of decryption. In particular, the security performance can be further improved by using the public key method.

  In the case of the configuration in which the log acquisition level setting unit 242 is provided, the encryption processing unit 247 is subjected to accuracy adjustment by the image log acquisition unit 240 according to the log acquisition level set by the log acquisition level setting unit 242. The image log (especially original image data) is encrypted. By using cryptographic processing, it is possible to manage the access policy for the image log at the stage of creating and saving the image log.

  The encryption processing unit 247 can adopt, for example, an encryption method that uses a self-generated secret key, or uses a public key infrastructure (PKI) by providing a key reading unit 248 that reads a public key. It is also possible to adopt the encryption method. Since any method is a well-known technique, detailed description is omitted here.

  In addition, the image log acquisition unit 240 performs authentication of a user who desires the specification of the image forming apparatus 5, and encryption using the encryption processing unit 247 for the user specified by the authentication processing unit 250. And an encryption right setting unit (an example of an image processing right setting unit) 252 for setting a process use selection right, that is, an encryption use right.

  The access to the encryption right setting unit 252 can be performed by a first mode in which a general user is not allowed and only a specific person can access to set the use selection authority for encryption processing. For example, if the user manages the key and only the user who executed the job that is the object of the image log can decrypt it, that is, if encryption is allowed indiscriminately, the encrypted image log will be destroyed by destroying the encryption key, etc. However, if the person who manages the audit manages the encryption key, this problem can be solved.

  Further, in the first mode in which only a specific person can set the use selection authority for the encryption process, the encryption right setting unit 252 gives the authority for encryption to the person specified by the authentication processing unit 250. Only in the case of having it, the encryption by the encryption processing unit 247 of the image log acquired by the image log acquisition unit 240 is permitted.

  For example, the person who manages the department or the person who performs the audit takes a method of managing the key. Thus, for example, by the PKI method, the person who performs the audit manages the secret key and encrypts it with the public key, so that the decryption of the image log is limited to the person who performs the audit different from the person who manages the log server. can do.

  Alternatively, it is possible to adopt a second mode in which access to the encryption right setting unit 252 is freely allowed to a general user, and the user can freely set the use selection authority for encryption processing. That is, the encryption key management is left to the general user. In this way, in the case of a system configuration that supports encryption processing, basically (initial setting) is initially set to use the encryption function.

  The user can manage the key so that only the user who executed the job that is the object of the image log can decrypt it, and the access policy for the image log can be managed at the stage of creating and saving the image log. Security performance can be ensured.

  In other words, if the general user is allowed to change whether or not encryption processing can be changed, encryption is performed using the encryption key that the user has, so there is no decryption key corresponding to the encryption key. Therefore, only the user (person) who executed the output job can substantially decrypt the image log, so that the safety of the image log can be improved. As a result, the administrator can solve the problem that a document that cannot be normally accessed can be viewed as an image log. In addition, when analyzing unauthorized use, a search using a stored image log can be performed after decryption by permission of the user (person).

  On the other hand, for example, when outputting an image that does not have the risk of information leakage or unauthorized use due to image log browsing by an administrator, saving the image log by omitting encryption processing speeds up processing and storing information The amount of information (usually the amount of information increases when encrypted) can be reduced. In addition, at the time of analyzing fraudulent use, it is possible to make a search using a stored image log.

  In addition, the image log acquisition unit 240 includes a log creation refusal right setting unit 256 that sets image log creation refusal authority for each user specified by the authentication processing unit 250. The image log acquisition unit 240 is acquired by the image log acquisition unit 240 only when, for example, the user specified by the authentication processing unit 250 is set with the image log creation rejection right through the log creation rejection right setting unit 256. It is possible to select whether or not to use the storage function of the image log storage processing unit 260.

  It should be noted that the user cannot access the log creation refusal right setting unit 256, and it is preferable that only a specific person such as an administrator can access and set the image log creation refusal right. The image log acquisition level can be changed according to the user level. This is because if anyone can set the authority to reject the creation of image logs, unauthorized use after canceling log creation becomes a problem.

  In this way, for example, in the system configuration, basically, the image log storage function is used, and more preferably the encryption function is also used as an initial setting. Search using log can be made possible. The general user who is likely to use illegally is not allowed to change the acquisition level of the image log, so that the image log is surely saved.

  On the other hand, a specific user who has no fear of unauthorized use is given an authority to reject the use of the image log storage function so that image log recording can be canceled according to the user's request. As a result, it is possible to perform operations such as “an important document does not store an image log” at the user's discretion. It is possible to prevent a phenomenon in which an important document is leaked or illegally used via an image log. Also, by omitting log storage, image log collection efficiency and storage efficiency can be increased.

  For example, if the log recording function cannot be canceled, even if the user wishes to omit “log recording of important documents”, it cannot be performed, and if the image log is recorded without being encrypted, it is managed. There is a concern that the image log will be viewed by a person. On the other hand, in this aspect, it is possible to set whether or not to use the log recording function for a reliable user, so that the user himself / herself saves the image log according to the importance level of the document. Because it can be set, the above-mentioned problems can be solved.

  Further, the image log acquisition unit 240 extracts hidden information such as a watermark and embedded information superimposed on the processing target document, and uses a hidden information processing unit 258 as a part of job environment data attached to the document image data. Have. This is a countermeasure for saving an image log in a state in which hidden information is lost due to insufficient processing capability of the apparatus when a document on which hidden information is superimposed is copied or printed.

  The storage processing unit 260 includes a storage control unit 262 that controls image log storage, and one or a plurality of storage units 268 having a hard disk device or a semiconductor storage medium that holds data relating to the image log.

  In addition, the storage processing unit 260 includes a log disclosure level receiving unit 264 that receives the disclosure level of the image log by the notification control unit 288 from the user, a free area in the storage unit 268 and a storage availability checking unit 266 that checks communication availability, and an image A storage notification unit 267 that notifies the user that the log is stored in the storage unit 268;

  When storing the image log in the storage unit 268, when the log disclosure level receiving unit 264 specifies the disclosure level of the image log from the user, the storage control unit 262 displays the information on the disclosure level as job environment data. Include in

  The storage unit 268 is input image data such as read image data read by the image reading unit 10 or print image data received from the image input terminal 3, or an original image such as output image data used for output processing by the image output unit 30. A document data storage area 268a for storing data itself and a job environment data area 268b for storing job environment data related to the output job of the image, such as output date / time, user name, and location, are stored in association with each other. A log database 269.

  The storage unit 268 provided on the image forming apparatus 5 side is based on input image data such as a read image read by the image reading unit 10, print image data acquired via the communication interface unit 130, or input image data. It has an output work area (intermediate data storage area) 268c for temporarily storing job environment data at the time of operation when printing output image data.

  A storage unit 268 provided on the document management apparatus 7 side stores a storage work area (reception data storage area) for temporarily storing image logs (original image data and job environment data) received from the image forming apparatus 5. ) 268d.

  When the storage of the log in the log database 269 of the storage unit 268 provided in the image forming apparatus 5 or the document management apparatus 7 is completed, the storage control unit 262 deletes the data temporarily stored in the work areas 268c and 268d.

  Further, when the storage control unit 262 controls data storage in the storage unit 268, the storage permission / inhibition confirmation unit 266 has a free space that can store document image data and job environment data in the log database 269 of the storage unit 268. It is determined whether or not there is, and the determination result is notified to the storage control unit 262.

  Whether there is no free space, the storage control unit 262 can use another storage unit 268 (may be another device of its own device or another document management device 7). The output processing permission in the image forming apparatus 5 can be controlled according to whether or not the other storage unit 268 can be used. When the image forming apparatus 5 and the document management apparatus 7 are separated, both storage control units 262 cooperate to perform this control.

  Further, when the image forming apparatus 5 and the document management apparatus 7 are separated, the storage permission confirmation unit 266 further determines whether or not communication is possible between the two, and the determination result is displayed. The storage control unit 262 is notified. The storage control unit 262 controls permission of output processing in the image forming apparatus 5 according to whether communication is possible. When communication is not possible, the same countermeasure as when there is no free space in the storage processing unit 260 is performed.

  If there is a need to change the storage processing unit 260 of the image log storage destination because there is no free space or communication is not possible, the user is notified of this and any of the storage processing units 260 that can be used at that time The user may select whether to save the file or cancel the process.

  If the image log can be appropriately stored in the log database 269 of the storage unit 268, the storage control unit 262 notifies the control unit 100 accordingly. In response to this, the control unit 100 permits output processing in the image forming apparatus 5.

  When the output process in the image forming apparatus 5 is prohibited, the storage control unit 262 notifies the control unit 100 to that effect. In response to this, the control unit 100 notifies the user of an error message indicating that the subsequent operation is prohibited by the user interface unit 15.

  The control unit 100 has a processing timing control unit 102. The processing timing control unit 102 determines the timing of image log acquisition processing by the image log acquisition unit 240 in the image log processing unit 200 and image log storage processing to the storage processing unit 260 by the storage control unit 262 according to the requested job service or system. Control according to the configuration.

  In order to acquire and save the image log for the realization of the image log function, it is necessary to interrupt normal processing that does not perform the function and perform these processing, so at what timing are these processing interrupted? As a result, the throughput can be reduced.

  For this reason, the processing timing control unit 102 changes the timing for creating and saving the image log so that the throughput is not lowered as much as possible according to the requested service and the system configuration.

  The image log browsing processing unit 280 includes a log reading unit 282 that reads an image log stored in the storage processing unit 260, and image matching (image search processing) and origin tracking survey using the image log read by the log reading unit 282. Survey processing unit 284 that performs processing, etc., and a predetermined display device that notifies the investigator (operator) of the image log read by the log reading unit 282, the survey result obtained by the survey processing unit 284, and other related information And a notification control unit 288 to be displayed on the (display unit 120).

  When the image log acquisition unit 240 includes the encryption processing unit 247, the image log browsing processing unit 280 includes a decryption unit corresponding to the encryption processing unit 247 between the investigation processing unit 284 and the decryption processing unit 288. It is assumed that there is a configuration having a processing unit 286.

  In addition, the image log browsing processing unit 280 includes an authentication processing unit 290 that performs user authentication of a log browsing user, and a log disclosure level setting unit 292 that can set the disclosure level of the image log by the notification control unit 288. Yes. In the case of this embodiment, the log disclosure level receiving unit 264 and the log disclosure level setting unit 292 on the storage processing unit 260 side constitute a log disclosure level adjustment processing unit that adjusts the disclosure level of the stored image log.

  In the case of a system configuration in which the image forming device 5 and the browsing device 8 are integrated, the authentication processing unit 250 and the authentication processing unit 290 can be configured to share one functional unit. For a log browsing user (for example, a person in charge of investigation or an administrator) who operates the browsing device 8, an image log disclosure level is additionally set in advance at the time of user registration.

  By storing the image log in the storage processing unit 260, it is possible to leave a clue for specifying the image forming apparatus 5. When the illegal printing is performed, the investigation processing unit 284 stores the image log. It is possible to easily identify which image forming apparatus has output the image.

  For example, the investigation processing unit 284 considers how information is leaked, and performs image history search by image matching for the image forming apparatus at the corresponding location. When the image content of the corresponding printed matter is retrieved from the image log, the device used, the time of unauthorized printing, and the user are estimated from the job environment data attached to the image log, and the investigation information is notified to the notification control unit 288. Notify The notification control unit 288 displays the corresponding image log and related investigation information on the display unit 120, for example. Or it prints out.

  The person in charge of the investigation can make a final decision by visually comparing the display information with the printed matter. In tracking the criminal, even if the user information is not attached to the job environment data, by referring to the job information and the output time information, estimating the user of the image forming apparatus, Can be identified.

  Further, when the log disclosure level is set in the image log read by the log reading unit 282, the log disclosure level setting unit 292 stores the image log disclosure level of the log viewing user acquired through the authentication processing unit 290 and the storage. The image log read from the unit 268 is compared with the image log disclosure level extracted from the attached job environment data, and the notification control unit 288 is controlled in accordance with the degree of the disclosure level of both, thereby Controls the presentation level of the image log. As a result, the access policy for the image log can be managed at the stage of creating and saving the image log. For example, it may be possible to browse only at the same level, or it may be possible to browse only below the same level by adopting upward compatibility.

  Also, in the system configuration corresponding to encryption (decryption), the log disclosure level setting unit 292 determines whether to permit decryption by controlling the decryption processing unit 286 according to the disclosure level degree of both. May be determined. In this case, for example, decoding may be permitted only to the same level, or upward compatibility may be adopted so that decoding is permitted only to the same level or lower. Those that do not allow decryption may be browsed without decryption (that is, undecrypted viewing is permitted), or undecrypted viewing itself may be prohibited, that is, the image log is encrypted. When the image data is stored, the image log corresponding to the disclosure level is decrypted and disclosed.

  Thus, the access policy (disclosure level) of the image (document) processed on the image forming apparatus 5 side and the access policy (disclosure level) for the image log presented on the browsing apparatus 8 side are the same or upward compatible. can do. Therefore, for example, when outputting a printed matter using the image forming apparatus 5, if the disclosure level is set so as to prohibit the disclosure of the image log for the administrator, even the administrator can view it. The device 8 cannot browse the image log related to the printout of the document. Information leakage through an image log by an administrator can be prevented.

  On the other hand, for example, when outputting an image that does not cause information leakage or unauthorized use due to image log browsing by an administrator or investigator, the administrator is allowed to disclose it, and other general users are allowed to disclose it. By setting a level that prohibits disclosure, it is possible to perform searches using stored image logs when analyzing unauthorized use by general users.

  The illustrated image processing apparatus 2 is shown as a universal apparatus that can handle all of the various embodiments to be described later. However, the image processing apparatus 2 does not necessarily have to include all of the functional parts described above. There are also unnecessary functional parts.

  The various functional units including the control unit 100 are not limited to being configured by hardware processing circuits, but may be realized by software using an electronic computer (computer) based on a program code that realizes the function. Is also possible.

  Therefore, a program suitable for realizing the image processing apparatus 2 that realizes the image log function by software using an electronic computer (computer) or a computer-readable storage medium storing the program may be extracted as an invention. it can.

  When making a computer execute a series of image log functions by software, a computer (such as an embedded microcomputer) or a CPU (Central Processing Unit) in which a program constituting the software is incorporated in dedicated hardware , A logic circuit, a ROM (Read Only Memory) that is a read-only storage unit, a RAM (Random Access Memory) that is an example of a volatile storage unit that can be written and read at any time, or a nonvolatile storage unit An SOC (System On a Chip) that implements a desired system by mounting functions such as RAM (described as NVRAM) as an example on a single chip, or various types General-purpose personal computer capable of executing various functions by installing programs For example, it is installed from a recording medium.

<Processing example; first embodiment; basic example>
FIG. 3 is a flowchart showing a processing procedure of a basic example of the first embodiment in the image processing apparatus 2. Here, it is assumed that the image forming apparatus 5, the document management apparatus 7, and the browsing apparatus 8 are separate units as shown in FIG. 1, and have a system configuration that is network-connected by the log management NW 9a. To do. The same applies to other embodiments described later.

  The first embodiment focuses on the function of the encryption right setting unit 252 and is acquired by the image log acquisition unit 240 only when the user specified by the authentication processing unit 250 has encryption authority. The feature is that the encryption of the image log is permitted. In particular, the basic example is characterized in that only the system administrator can change the authority setting for enabling or disabling encryption processing.

  First, at the time of user registration, the system administrator uses the encryption right setting unit 252 to select the use selection authority of encryption processing using the encryption processing unit 247 (selection of whether to use encryption processing) for each user. (Authority) is set (S100).

  When an operation is performed in a state where the image forming apparatus 5 is turned on and a predetermined initialization process is completed and operation is possible, a user who wants to use the apparatus accesses the authentication processing unit 250. Then, user authentication is performed by inputting the user ID (S110). The authentication processing unit 250 determines whether or not the user ID input by the user is a user registered in the image forming apparatus 5 (S112). Various well-known methods can be applied to this user authentication method. Here, the detailed explanation is omitted.

  If the user is not a registered user, the authentication processing unit 250 displays an error message to that effect on the screen of the display unit 120 and ends the process (S112—NO, S114).

  On the other hand, in the case of a registered user, the encryption right setting unit 252 determines whether or not the use selection authority for encryption processing is granted to the registered user (S112—YES, S120). . If the user has the authority to select the encryption process, the encryption right setting unit 252 displays a screen for selecting whether or not to encrypt on the display unit 120, inquires the user about which one is desired, and selects the user. An operation corresponding to the result is performed (S120-YES, S122).

  For example, when the user inputs that the user wishes to use encryption processing, the encryption right setting unit 252 permits the encryption processing unit 247 to perform encryption processing (S122—YES, S124). On the other hand, if the user is not permitted to use the encryption process (S120-NO), or if the user inputs that the encryption process is not desired (S122-NO), the encryption process is not performed. The encryption processing unit 247 is controlled (S126).

  Hereinafter, in the same manner as in general processing, for example, the control unit 100 issues a job start instruction such as detecting via the instruction receiving unit 110 that the user has operated the image forming apparatus 5 and pressed the copy button. Upon receipt (S130), the control unit 100 reads the image of the original copied by the image reading unit 10, and uses the processed image (original image data) and the accompanying information (job environment data) as an image log (S132).

  The storage control unit 262 stores the document image data read by the image reading unit 10 in the work area 268c of the storage unit 268, and stores job environment data for the document in the work area 268c (S134). When encryption processing is set (S122-YES, S124), the encrypted image log is stored in the work area 268c.

  Thereafter, the control unit 100 completes the requested output job by causing the image output unit 30 to copy and print an image based on the read original and copy it (S136).

  When the copy output process is completed, the storage control unit 262 reads the image log for saving (original image data and job environment data) stored in the work area 268c, and connects the communication interface unit 130 to the document management apparatus 7. (S140). When the transmission ends normally, the storage control unit 262 deletes the transmitted image log data from the work area 268c (S148).

  The document management apparatus 7 receives the image log from the image forming apparatus 5 via the communication interface unit 130 (S150). The storage control unit 262 associates the received image log (which may be encrypted) with the document data storage area 268a and the job environment data area 268b of the log database 269 separately for the document image data and the job environment data. Save (S158).

  At this time, the saving notification unit 267 does not save the image log without the user's understanding, but notifies the user of a message to save the image log in the user interface unit 15 (S159). . By actively notifying the user that the log is being saved (the image log is being sent) (to be able to know), it is possible to obtain the effect of suppressing unauthorized output such as unauthorized printing of confidential documents and counterfeit printing of banknotes. Can do.

  When there is a request for reading an image log from the browsing device 8, the image log is transmitted to the browsing device 8 (S161).

  When there is a log reading request such as an image log search request or a browsing request in the browsing device 8 (S160-YES), if the image log is encrypted (S162-YES), it corresponds to the encryption key. After decryption using the decryption key (S164), it is used for search and browsing (S166). It goes without saying that a person who does not have a decryption key corresponding to the encryption key cannot decrypt it.

  In the above description, the encryption process is performed on the image forming apparatus 5 side. However, the unprocessed image log and the encryption key are associated with each other and transmitted to the document management apparatus 7 side. The encrypted image log may be stored in the work area 268c after performing the encryption process in step 7.

  By doing so, only the user permitted to use the encryption by the system administrator can encrypt the image log to be output and save it in the document management apparatus 7. By storing it as an image log after encryption, the image log is stored in a different state, not in the same state as the output image.

  When the image log is encrypted and saved, it is usually impossible to decrypt the image log without the decryption key held by the user who performed the output process. In fact, only the person who executed the job can decrypt it. Can be increased.

  In particular, in the case of this example, user information can be managed by the authentication processing unit 250, and there is an authority to select whether or not encryption processing can be used as one of the user information. Only the system administrator can change the authority setting for selecting whether to use the encryption process. Accordingly, there is an advantage that auditing can be strengthened for an unreliable user with respect to the modified example described later.

<Processing Example; First Embodiment; Modification>
FIG. 4 is a flowchart showing a processing procedure of a modification of the image processing apparatus 2 with respect to the first embodiment.

  This modification to the first embodiment differs from the basic example of the first embodiment in that a general user can freely set whether or not to use the encryption process.

  First, the system administrator is not involved in the authority to select whether or not to use the encryption process, and omits the use selection authority setting process (S100) of the encryption process shown in the basic example. Further, the determination process (S120) of whether or not the use selection authority of the encryption process is given to the registered user is also omitted.

  In the case of a registered user at the time of user authentication, the encryption right setting unit 252 displays a screen for selecting whether to encrypt or not on the display unit 120, inquires the user about which one is desired, and responds to the selection result. The operation is performed (S112-YES, S122). The following is the same as the basic example.

  By doing so, the user can freely set whether or not to use the encryption process without involving the system administrator. For example, if even the system administrator does not want to permit substantial document browsing via the image log, the image log to be output is encrypted and stored in the document management device 7 by setting encryption. be able to. Normally, a system administrator who does not have a decryption key cannot decrypt, and therefore cannot view a document via an image log. Without involving the authority setting by the system administrator, it is possible to reliably improve the security performance for the system administrator.

<Example of Processing; Second Embodiment>
FIG. 5 is a flowchart showing a processing procedure of the second embodiment in the image processing apparatus 2. The second embodiment focuses on the function of the key reading unit 248 and is characterized in that a public key method is used as the encryption method. Correspondingly, the encrypted image log is stored in the work area 268c after the encryption processing is performed not on the image forming apparatus 5 side but on the document management apparatus 7 side.

  Here, when the unprocessed image log and the encryption key are associated with each other and transmitted to the document management apparatus 7 side, and the encryption process is performed by the document management apparatus 7, the security of the encryption key becomes a problem. As a technique for solving this problem, the public key method is used in the second embodiment. This will be specifically described below.

  The image forming apparatus 5 is provided with a card reading unit 17 and has an IC card reader function. Of course, the image forming apparatus 5 may be connected to a separate IC card reader. At the time of copying or fax transmission, the user inserts his / her user ID card into the card reading unit 17 to perform user authentication (S210). In this case, the encryption further includes a public key for encryption. The IC card for conversion is also inserted, and the public key is read (S211). Since it is a public key, public key information may be set in the user information read from the user ID card.

  When the copy output process is completed, the storage control unit 262 reads the unprocessed image log (original image data and job environment data) stored in the work area 268 c and passes it to the communication interface unit 130.

  At this time, the key reading unit 248 is set to be encrypted (S222-YES, S224), and was able to read the public key from user management information acquired via, for example, an IC card or the authentication processing unit 250. Sometimes, the public key is passed to the communication interface unit 130. The communication interface unit 130 transmits the public key together with the image log to the document management apparatus 7 (S240). When the transmission ends normally, the storage control unit 262 deletes the transmitted image log data and public key information from the work area 268c (S248).

  By attaching the public key to the image log and sending it to the document management apparatus 7, the document management apparatus 7 sets a mode for performing an encryption process. For example, when the key reading unit 248 cannot read the public key, such as when there is an output instruction without inserting the encryption IC card, the mode without encryption processing is entered.

  The document management apparatus 7 receives the image log and the public key from the image forming apparatus 5 via the communication interface unit 130 (S250). The image log acquisition unit 240 performs image processing such as OCR (Optical Character Reader) on the original image data of the image log as necessary (S252).

  Thereafter, when the public key is attached to the image log, the encryption processing unit 247 encrypts all information of the image log using the public key (S253-YES, S254).

  The storage control unit 262 stores the image log in association with the document data storage area 268a and the job environment data area 268b of the log database 269 separately from the document image data and the job environment data (S258). Of course, when encrypted by the encryption processing unit 247, the encrypted data is stored.

  When there is an image log search request or browsing request at the browsing device 8 (S260-YES), when the image log is encrypted (S262-YES), the authentication processing unit 290 has a public key. When the attached IC card is inserted into the card reader 8a (S263-YES), a decryption key corresponding to the public key is obtained, decrypted using the decryption key (S264), and then retrieved and viewed. (S266).

  According to the mechanism of the second embodiment, since the encryption process can be performed using the public key method, the encryption key is sent from the image forming apparatus 5 to the document management apparatus 7 and the document management apparatus 7 sends it. Even when encryption processing is performed, security performance can be improved. Of course, for system administrators who cannot normally obtain the decryption key, document viewing via the image log can be restricted by presenting an undecrypted image log, thus improving security performance. Can do.

  The public key information set in the IC card is acquired on the device side and used on the log server (document management apparatus 7 in this example). However, the public key information acquired on the device side is used. If it is not sent to the log server, when performing OCR on the log server, the user-specific key cannot be used for subsequent encryption, or the user's public key information used for the log server must be set in advance. Is a problem. However, in the second embodiment, after receiving the image log and the public key, and performing the OCR process on the image log, the image log and the image processing result are encrypted using the public key. It can be encrypted with a user-specific key, and only that user can decrypt it, increasing image log security.

  In view of implementation, it is often more advantageous to perform the OCR function on the server than on the image forming apparatus 5. For example, the OCR function corresponding to the OS (Operating Systems) for servers is enriched and evolves quickly. The server has advantages such as easy use of an expensive CPU. However, in terms of configuration, various methods such as performing OCR on the device side and then encrypting on the device side, or storing the user's public key in advance on the server side, take time and effort. It can be considered.

<Processing Example; Third Embodiment>
FIG. 6 is a flowchart showing a processing procedure of the third embodiment in the image processing apparatus 2. The third embodiment focuses on the functions of the log disclosure level receiving unit 264 and the log disclosure level setting unit 292. When the disclosure level is set in the image log, only the image log corresponding to the disclosure level is set. Is characterized in that it is presented to those who wish to browse.

  When the copy output process is completed, the log disclosure level receiving unit 264 displays a screen for accepting the disclosure level of the image log on the display unit 120, and accepts to which level the disclosure of the image log is permitted (S338). The log disclosure level receiving unit 264 notifies the storage control unit 262 of information on the received disclosure level.

  The storage control unit 262 reads the storage image log (original image data and job environment data) stored in the work area 268c and transmits it to the document management apparatus 7 via the communication interface unit 130 (S340). . At this time, if the disclosure level of the image log is designated other than the default (no disclosure level setting) by the log disclosure level receiving unit 264, the storage control unit 262 includes information on the disclosure level in the job environment data. (S342). When the transmission ends normally, the storage control unit 262 deletes the transmitted image log data from the work area 268c (S348).

  When there is an image log search request or browsing request in the browsing device 8 (S360-YES), if the log disclosure level is set in the image log read by the log reading unit 282 (S361-YES), The log disclosure level setting unit 292 includes the image log disclosure level of the user who wants to view the log acquired via the authentication processing unit 290 and the image log disclosure level extracted from the job environment data attached to the image log read from the storage unit 268. And prepare for the disclosure process according to the disclosure level degree of both (S364).

  For example, in the case of a system configuration corresponding to encryption (decryption), the storage processing unit 260 stores the image log after being encrypted by the encryption processing unit 247 in the storage unit 268, and The log browsing processing unit 280 decrypts and discloses only the image log that is permitted to be decrypted according to the disclosure level.

  According to the mechanism of the third embodiment, since the user can set the image log disclosure level, the disclosure level of the document processed on the image forming apparatus 5 side and the image log presented on the browsing apparatus 8 side can be set. The disclosure level can be the same or upward compatible.

<Processing Example: Fourth Embodiment>
FIG. 7 is a flowchart showing a processing procedure of the fourth embodiment in the image processing apparatus 2. The fourth embodiment focuses on the function of the log creation refusal right setting unit 256, gives a refusal right to create an image log to each user, and the user specified by the authentication processing unit 250 creates an image log. This is characterized in that it is possible to select whether or not to create an image log only when the user has the refusal authority.

  First, at the time of user registration, the system administrator sets a selection authority (log creation refusal authority) as to whether or not image log creation can be rejected for each user by the log creation refusal right setting unit 256 (S400). .

  At the time of user authentication, in the case of a registered user, the image log acquisition unit 240 determines whether or not a log creation refusal authority is given to the registered user (S412-YES, S420). . If the user does not have log creation refusal authority, it is set so that the image log is acquired and stored as usual (S420-NO, S424 to S440).

  On the other hand, if the user has log creation refusal authority, the image log acquisition unit 240 displays a screen for selecting whether or not to create an image log on the display unit 120, and inquires and selects which one is desired. An operation corresponding to the result is performed (S420-YES).

  That is, when log creation is selected, an image log is acquired and stored (S422-YES, S424 to S440), but when log creation is rejected, log acquisition is not performed (S422). -NO, S426, S431-NO).

  According to the mechanism of the fourth embodiment as described above, it is possible to select whether or not to use the image log storage function only for a user who is set with the authority to create an image log. For example, there is a possibility of unauthorized use. If a specific user who does not have the permission to use the image log storage function is given, the user can cancel the image log recording according to his / her wish. For example, it is possible to prevent the important document from being viewed by the administrator via the image log by not storing the image log for the important document.

<Processing Example; Fifth Embodiment; Basic Example>
FIG. 8 is a flowchart showing a processing procedure of a basic example of the fifth embodiment in the image processing apparatus 2. The basic example of the fifth embodiment focuses on the functions of the log acquisition level setting unit 242 and the accuracy adjustment processing unit 245. The log acquisition level setting unit can set an image log acquisition level for each user. It is characterized in that the accuracy adjustment processing unit 245 changes the image log creation accuracy (color / monochrome, resolution, etc.) according to the level acquired by 242.

  In the case of a registered user at the time of authentication processing, the log acquisition level setting unit 242 displays a screen for accepting designation of the log acquisition level for the registered user on the display unit 120, and any acquisition level is desired. (S512-YES, S520).

  In this example, the general user can freely specify the image log acquisition level. However, only the administrator can specify the level without releasing the specification to the general user. Good.

  Upon receiving this acquisition level designation, the accuracy adjustment processing unit 245 of the image log acquisition unit 240 saves the image selected by the storage image selection processing unit 244 according to the log acquisition level received by the log acquisition level setting unit 242 from the user. The image accuracy (image quality) such as the resolution of the image data and the black / white / color is adjusted, and the image after the accuracy adjustment is used as the original image data for storage (S532).

  According to the structure of the basic example of the fifth embodiment as described above, the image log is not always collected and stored with the same accuracy, but the image log acquisition level desired by the user (may be an administrator) is obtained. Accordingly, since the accuracy of the document image data is adjusted and stored, the accuracy can be adjusted in accordance with the degree of accuracy required for log storage. For example, if the image log can be stored in a low-accuracy state, the image log collection efficiency and storage efficiency can be increased by storing the image log in a low-accuracy state that requires a small capacity.

<Processing Example; Fifth Embodiment; Modification>
FIG. 9 is a flowchart illustrating a processing procedure of a modification of the fifth embodiment in the image processing apparatus 2. This modified example of the fifth embodiment focuses on the functions of the log disclosure level adjusting unit 243 and the log storage destination switching unit 246, and enables setting an image log disclosure level for each user. According to the level acquired by the adjustment unit 243, the log storage destination switching unit 246 changes the storage unit 268 of the image log storage destination. When the storage unit 268 is provided in the document management apparatus 7 as a log server, the management level is different.

  In the case of a registered user at the time of authentication processing, the log disclosure level adjustment unit 243 displays a screen for accepting designation of the log disclosure level for the registered user on the display unit 120, and any disclosure level is desired. (S512-YES, S520).

  Here, the general user can freely specify the disclosure level of the image log. However, only the administrator can specify the level without releasing the specification to the general user. Good.

  In response to this disclosure level specification, the log storage destination switching unit 246 of the image log acquisition unit 240 stores the storage unit 268 serving as an image log storage destination according to the log disclosure level received by the log disclosure level adjustment unit 243 from the user. Is selected and set (S533).

  According to the modified example of the fifth embodiment, an image desired by the user (may be an administrator) is not stored in the same storage unit 268 that is set in advance. According to the log disclosure level, the storage unit 268 for storage (which may be built in the own device or the document management device 7) is determined by the log storage destination switching unit 246. The log can be stored by designating an appropriate storage unit 268 according to the disclosure level of the image log to be performed.

  By doing so, the image log can be stored in a server having the same log disclosure level, and the access policy for the image log can be managed at the stage of creating and saving the image log.

<Processing Example; Sixth Embodiment>
FIG. 10 is a flowchart showing a processing procedure of the sixth embodiment in the image processing apparatus 2. The sixth embodiment focuses on the function of the storage availability confirmation unit 266, and can be used at that time when there is no response from the storage unit 268 to store the image log or when there is a shortage of free space. It is characterized in that a subsequent job can be executed by searching for another storage unit 268 and finding a storage unit 268 that can be saved.

  When searching for another storage unit 268, one that can be specified in the image forming apparatus 5 may be specified, or the storage unit 268 of another document management apparatus 7 may be specified.

  In the case of a registered user at the time of authentication processing (S612-YES), the storage permission confirmation unit 266 determines whether a condition for permitting output processing is satisfied. Specifically, first, the storability determination unit 266 determines whether or not there is a free area in the log database 269 of the storage unit 268 that can store the image log, and notifies the storage control unit 262 of the determination result. (S622).

  Further, when the image forming apparatus 5 and the document management apparatus 7 have separate system configurations, the storage permission confirmation unit 266 further determines whether communication between the two is possible, for example, by a response to an inquiry message. The confirmation is made and the confirmation result is notified to the storage control unit 262 (S622). When confirming the response, a response indicating whether or not there is a free space enough to store the image log in the log database 269 of the storage unit 268 on the document management apparatus 7 side is also given.

  In short, in the sixth embodiment, a storage area enough to store an image log is secured in the storage unit 268 built in the apparatus itself, or communication with the document management apparatus 7 as a log server is possible, and a document is stored. A condition for permitting output processing in the image forming apparatus 5 is that a storage area enough to store the image log is secured in the storage unit 268 of the management device 7, that is, that the image log can be transferred to the storage unit 268. It is.

  If the image log cannot be transferred to the storage unit 268, the image log cannot be stored in the currently specified storage unit 268. Therefore, the storage control unit 262 cooperates with the log storage destination switching unit 246, A search is made for another storage unit 268 (stored in the own apparatus or provided in another document management apparatus 7) in which a storage area sufficient to store the image log is secured (S622-NO, S624).

  If the transfer of the image log to the storage unit 268 is possible (YES in S626), for example, the control unit 100 copies the image by operating the image forming apparatus 5 in the same manner as a general process. When the instruction accepting unit 110 detects that the button has been pressed (S630), the control unit 100 reads the image of the document copied by the image reading unit 10, and processes the image (original image data) or additional information (job environment). Data) is used as an image log (S632).

  On the other hand, if another storage unit 268 that can transfer the image log to the storage unit 268 is not found (NO in step S626), the storage control unit 262 and the control unit 100 cooperate with each other in the image forming apparatus 5. The processing is interrupted (S626-NO, S628). An error message may be displayed on the display unit 120 as necessary.

  Here, although the availability of another storage unit 268 is automatically determined, the user is inquired, and another storage unit 268 that can be used at that time is set as a storage destination, or processing is performed. An operation change such as interruption may be prompted.

  According to the mechanism of the sixth embodiment, when the transfer of the image log to the storage unit 268 specified first is impossible, unlike the mechanism described in Patent Document 2, it is immediately Instead of stopping the process, the existence of another storage unit 268 that can be saved at that time is confirmed. For example, when there is no response from the document management device 7 as a log server, the subsequent job is executed while the image log is stored by switching the storage unit 268 in the image forming device 5 or another document management device 7 to the storage destination. Can do. Even when the storage unit 268 specified first cannot be used, such as when the server is down, the output processing is performed by the image forming apparatus 5 by switching to another storage destination, unlike the mechanism described in Patent Document 2. Can be executed.

<Example of Processing; Seventh Embodiment>
FIG. 11 is a flowchart illustrating a processing procedure of the seventh embodiment in the image processing apparatus 2. The seventh embodiment focuses on the functions of the log acquisition level setting unit 242 and the stored image selection processing unit 244. Considering the log acquisition level and productivity, an image log (especially original image data) to be stored is stored. It has the feature in the point to switch.

  In the case of a registered user at the time of authentication processing, the log acquisition level setting unit 242 displays a screen for accepting designation of the log acquisition level for the registered user on the display unit 120, and any acquisition level is desired. (S712-YES, S720).

  In this example, the general user can freely specify the image log acquisition level. However, only the administrator can specify the level without releasing the specification to the general user. Good.

  In response to this acquisition level specification, the saved image selection processing unit 244 of the image log acquisition unit 240 determines the requested storage accuracy, data capacity, and the like according to the log acquisition level received by the log acquisition level setting unit 242 from the user. In consideration of the ease of acquisition processing, etc., it is determined whether the captured input image data should be used, the output image data handled by the image output unit 30 should be used, or other intermediate image data should be used. (S732).

  According to the mechanism of the basic example of the seventh embodiment, a user (may be an administrator) desires instead of always saving an output image equivalent as original image data for an image log. Since the image to be saved is selected and saved according to the image log acquisition level, an efficient image can be selected as the original image data according to the degree of accuracy of log saving and the acquisition efficiency. Can do.

  For example, if it is not always necessary to store the output image itself as an image log, the input image can be used as document image data for storage. For example, in the case of a print job, if PDL data itself input from the image input terminal 3 (personal computer 3a) is used as original image data for log storage, no special processing is required for acquiring original image data, and output is performed. The amount of stored information can be reduced as compared with storing image data, and the acquisition efficiency and storage efficiency of image logs can be increased.

  In addition to collecting and saving the same output image as the image log, it is possible to select other than the output image as manuscript image data, thereby improving the acquisition efficiency and storage efficiency of the image log without reducing productivity. It can be done.

<Example of Processing; Eighth Embodiment>
FIG. 12 is a flowchart illustrating the processing procedure of the eighth embodiment in the image processing apparatus 2. The eighth embodiment focuses on the function of the processing timing control unit 102. The image log acquisition unit 240 in the image log processing unit 200 and the image to the storage processing unit 260 by the storage control unit 262 in the image log processing unit 200. It is characterized in that the timing of log storage processing is controlled according to the requested job service and system configuration.

  In the case of a registered user at the time of authentication processing, the processing timing control unit 102 determines what the requested job service and the system configuration at that time are, and according to the job content and the system configuration Then, a more efficient method for acquiring and saving an image log is determined (S812-YES, S820). “Efficient” in this case means to prevent a reduction in throughput as much as possible.

  For example, it is determined whether there is image editing in the output image processing in the image output unit 30 (S830). For example, when a scan accumulation job or a copy job without post-processing is requested, image log acquisition (creation) is performed for each page simultaneously with scanning and input data acquisition (S830-NO, S831). This is because these job requests are jobs that are not subjected to image processing by the image output unit 30, and therefore, even if the captured input image is the original image data, it can be the original image data that is almost the same as the output image.

  When an image log is acquired and stored in parallel with the output process in the image output unit 30, the output process is interrupted to perform log acquisition and log storage, which may cause a reduction in throughput. By using it as image data, substantially the same output image can be collected and stored as an image log without causing a decrease in throughput.

  On the other hand, in the case of a copy job with post-processing such as image composition, image log creation is performed on the post-processed image, that is, simultaneously and in parallel with the output processing (S830-YES). Since this job request is a job that involves image processing by the image output unit 30, the output image data handled by the image output unit 30 is used as the original image data, not the input image that has been captured. However, in this case, as described above, it is necessary to acquire and store the image log in parallel with the output processing in the image output unit 30, and the throughput may decrease.

  Therefore, in the case of a copy job with post-processing such as image composition, it is further determined whether or not a hardware circuit for image log creation is incorporated in the image forming apparatus 5 and can be used (S832). . For example, when a hardware circuit capable of creating an image log is connected at the same time as scanning, or when a hardware circuit capable of creating an image log is connected at the same time as printing, that is, using a hardware circuit instead of software processing If image log acquisition (creation) is possible (S832-YES), an image log equivalent to the output image is generated and output by the hardware circuit in parallel with the output image processing in the image output unit 30. Is switched to use the original for the original image data (S823).

  When hardware circuits cannot be used, software processing is used to allow throughput reduction, and image logs are acquired and stored in parallel with output processing. However, the input image data may be the original image data (S832-NO, S834). The user may be inquired about which one to use.

  According to the mechanism of the basic example of the eighth embodiment as described above, the output image data is not always used as the original image data, but the image log acquisition method and the storage method are adjusted according to the job to be processed and the system configuration. As a result, the same output image as possible can be collected and stored as an image log, and productivity (throughput) can be prevented from being reduced.

<Example of Processing; Ninth Embodiment>
FIG. 13 is a flowchart illustrating the processing procedure of the ninth embodiment in the image processing apparatus 2. The ninth embodiment focuses on the function of the hidden information processing unit 258. When a hidden printed matter on which hidden information such as a watermark or embedded information is superimposed is set as a processing target image, the hidden information is displayed. Is separated from the original image, the separated image is used as document image data, and the hidden information is included in the job environment data.

  After the authentication processing, the image reading unit 10 reads the image, and when the image output unit 30 copies and prints the image based on the read document to output the copy (S930), the image reading unit 10 Instead of scanning with reduced accuracy according to the color type and resolution, the document is scanned with the maximum capability it has. Then, the hidden information processing unit 258 determines whether hidden information exists in the document (S931). Note that the image read by the image reading unit 10 may be analyzed to determine the presence of hidden information, but designation from the user may be accepted.

  When the hidden information exists (S931-YES), the hidden information processing unit 258 separates the hidden information from the original image, sets the remaining image as the original image data, and displays the separated hidden information. It is converted into code information (for example, character information) and included in the job environment data (S932, 933).

  For example, when a copy output job that reads a color original in which hidden information (color watermark, etc.) is embedded and outputs it in black and white is specified, the monochrome output image handled by the image output unit 30 is an original for saving a log. If it is image data, the hidden color information is lost in the document image data (image log).

  In order to deal with this problem, in this embodiment, the image reading unit 10 reads an image in the color mode, the hidden information processing unit 258 separates the hidden information from the read information, and the storage processing unit 260 converts the original image data. As additional data, hidden information is attached and saved.

  Alternatively, as in the case where the additional information is embedded in a high-resolution dot pattern or gradation pattern, the original (color / monochrome is not required) with hidden information embedded at high resolution is output at low resolution. When an output job (copy output or print output) is specified, if a low-resolution output image handled by the image output unit 30 is document image data for log storage, the document image data (image log) has a high resolution. Hidden information disappears.

  As a countermeasure for this problem, in the present embodiment, at the time of copy output, the image reading unit 10 reads an image at the maximum resolution, and the hidden information processing unit 258 reads the acquired image information (the image reading unit 10 has read the image information). The hidden information is separated from the image data and the image developed by the print job, and the storage processing unit 260 stores the hidden information as additional data of the document image data.

  In any case, by using a technique for separating hidden information, converting it into character information, etc., and storing it in association with the document image data, the stored document image data itself contains hidden information. Although it does not exist, hidden information can be extracted from job environment data stored in association with each other and can be used for searching and browsing.

It is a figure which shows the structural example of an image log system. It is a functional block diagram which shows the basic composition of an image processing apparatus. It is a flowchart which shows the process sequence of the basic example of 1st Embodiment. It is a flowchart which shows the process sequence of the modification with respect to 1st Embodiment. It is a flowchart which shows the process sequence of 2nd Embodiment. It is a flowchart which shows the process sequence of 3rd Embodiment. It is a flowchart which shows the process sequence of 4th Embodiment. It is a flowchart which shows the process sequence of the basic example of 5th Embodiment. It is a flowchart which shows the process sequence of the modification of 5th Embodiment. It is a flowchart which shows the process sequence of 6th Embodiment. It is a flowchart which shows the process sequence of 7th Embodiment. It is a flowchart which shows the process sequence of 8th Embodiment. It is a flowchart which shows the process sequence of 9th Embodiment.

Explanation of symbols

  DESCRIPTION OF SYMBOLS 1 ... Image forming system (image log system), 2 ... Image processing apparatus, 3 ... Image input terminal, 5 ... Image forming apparatus, 7 ... Document management apparatus, 8 ... Viewing apparatus, 9a ... Log management NW, 10 ... Image reading 15 ... User interface unit, 17 ... Card reading unit, 20 ... Controller unit, 30 ... Image output unit, 100 ... Control unit, 102 ... Processing timing control unit, 110 ... Instruction receiving unit, 120 ... Display unit, 130 ... Communication interface unit 200 ... Image log processing unit 240 ... Image log acquisition unit 242 ... Log acquisition level setting unit 243 ... Log disclosure level adjustment unit 244 ... Saved image selection processing unit 245 ... Accuracy adjustment processing unit 246 ... log storage destination switching unit, 247 ... encryption processing unit, 248 ... key reading unit, 250 ... authentication processing unit, 252 ... encryption right setting unit, 256 ... log creation Refusal right setting section, 258 ... hidden information processing section, 260 ... storage processing section, 262 ... storage control section, 264 ... log disclosure level reception section, 266 ... storage permission confirmation section, 267 ... storage notification section, 268 ... storage section, 268a ... Original data storage area, 268b ... Job environment data area, 268c, 268d ... Work area, 269 ... Log database, 280 ... Image log viewing processing section, 282 ... Log reading section, 284 ... Investigation processing section, 286 ... Decryption Processing unit, 288 ... Notification control unit, 290 ... Authentication processing unit, 292 ... Log disclosure level setting unit

Claims (20)

  1. An image processing apparatus having an image log function,
    An image processing unit that processes the processing target image in a state where the processing target image cannot be estimated at a glance when browsing the stored image log image;
    An image processing apparatus, wherein an image processed by the image processing unit is stored as an image of the image log.
  2. The image processing apparatus according to claim 1, wherein the image processing unit performs an encryption process as an image processing process.
  3. The image processing apparatus according to claim 2, wherein the image processing unit performs the encryption processing by a public key method.
  4. The image processing unit receives an image to be processed and a public key, performs image processing such as character recognition processing on the image to be processed, and then encrypts the processed image using the public key. The image processing apparatus according to claim 3, wherein:
  5. An image processing right setting unit for setting a right to select whether or not to perform image processing is provided.
    The image processing apparatus according to claim 1, wherein use of the encryption process can be selected only for a user whose selection authority is set by the encryption authority setting unit.
  6. The image processing apparatus according to claim 5, wherein the image processing right setting unit is configured such that only a specific person can set a right to select whether or not to perform the image processing.
  7. An image processing apparatus having an image log function,
    An image processing apparatus comprising: a log disclosure level adjustment processing unit that adjusts a disclosure level of the stored image log.
  8. An image processing apparatus having an image log function,
    A log disclosure level adjusting unit for adjusting a disclosure level of the stored image log;
    An image processing apparatus comprising: a log storage destination switching unit that switches a storage destination of the image log according to a log disclosure level adjusted by the log disclosure level adjustment unit.
  9. A log creation refusal right setting unit for setting a right to select whether to use the image log function;
    The use of the image log function can be selected only for a user whose selection authority is set by the log creation refusal right setting unit. The image processing apparatus according to item.
  10. The image processing apparatus according to claim 9, wherein the log creation refusal right setting unit is configured so that only a specific person can set a right to select whether or not to use the image log function. .
  11. A log acquisition level adjustment processing unit for adjusting the acquisition level of the stored image log;
    The image quality adjusting unit according to claim 1, further comprising: an image quality adjusting unit that adjusts the quality of the processing target image according to the log acquisition level adjusted by the log acquisition level adjustment processing unit to obtain an image for storage. The image processing apparatus according to any one of 10 to 10.
  12. The image processing apparatus according to claim 11, wherein the image quality adjustment unit processes a color processing target image into a monochrome image.
  13. The image processing apparatus according to claim 11, wherein the image quality adjustment unit reduces the resolution of the processing target image.
  14. The storage image selection processing unit for selecting an input image other than an output image or an intermediate image as the image for image log is further provided. Image processing device.
  15. A log acquisition level adjustment processing unit for adjusting the acquisition level of the stored image log;
    The image processing apparatus according to claim 14, wherein the stored image selection processing unit determines an image for the image log according to a log acquisition level adjusted by the log acquisition level adjustment processing unit.
  16. When the job to be processed is a print job and PDL data is input,
    The image processing apparatus according to claim 14, wherein the stored image selection processing unit uses the PDL data as an image for the image log.
  17. A storage availability confirmation unit for confirming whether or not the storage destination of the image log to be stored is in a storable state;
    A log storage destination switching unit that searches for another storage destination that can be stored and sets the storage destination when the confirmation result of the storage permission confirmation unit indicates that the storage result is not in a storable state; The image processing apparatus according to claim 1, wherein the image processing apparatus is an image processing apparatus.
  18. 18. The processing timing control unit according to claim 1, further comprising a processing timing control unit configured to adjust acquisition timing and storage timing of the image log according to a processing job and a system configuration. Image processing device.
  19. The image processing apparatus further includes a hidden information processing unit that separates hidden information embedded in the image to be processed from the image,
    The image processing apparatus according to claim 1, wherein the hidden information separated by the hidden information processing unit is stored as the image log in association with an image.
  20. The image processing apparatus according to claim 1, further comprising a storage notification unit that notifies that the image log is stored.
JP2006029120A 2006-02-07 2006-02-07 Image processing apparatus Withdrawn JP2007214611A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2006029120A JP2007214611A (en) 2006-02-07 2006-02-07 Image processing apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2006029120A JP2007214611A (en) 2006-02-07 2006-02-07 Image processing apparatus

Publications (1)

Publication Number Publication Date
JP2007214611A true JP2007214611A (en) 2007-08-23

Family

ID=38492702

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2006029120A Withdrawn JP2007214611A (en) 2006-02-07 2006-02-07 Image processing apparatus

Country Status (1)

Country Link
JP (1) JP2007214611A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009071634A (en) * 2007-09-13 2009-04-02 Fuji Xerox Co Ltd History image generating device, and program
JP2011028737A (en) * 2009-07-28 2011-02-10 Internatl Business Mach Corp <Ibm> Method for enhancement of screen-capturing function so as to process form, and computer program
JP2014131129A (en) * 2012-12-28 2014-07-10 Kyocera Document Solutions Inc Image forming apparatus and image forming method
JP2015005039A (en) * 2013-06-19 2015-01-08 ブラザー工業株式会社 Program and information processor
CN104469053A (en) * 2013-09-24 2015-03-25 京瓷办公信息系统株式会社 Image forming apparatus and image forming method
JP2015065542A (en) * 2013-09-24 2015-04-09 京セラドキュメントソリューションズ株式会社 Image forming apparatus, image forming system, and image forming program
US9088767B2 (en) 2012-10-08 2015-07-21 International Business Machines Corporation Activities duplication via recorded video

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009071634A (en) * 2007-09-13 2009-04-02 Fuji Xerox Co Ltd History image generating device, and program
US8064634B2 (en) 2007-09-13 2011-11-22 Fuji Xerox Co., Ltd. History image generating system, history image generating method, and recording medium in which is recorded a computer program
JP2011028737A (en) * 2009-07-28 2011-02-10 Internatl Business Mach Corp <Ibm> Method for enhancement of screen-capturing function so as to process form, and computer program
US9460072B2 (en) 2009-07-28 2016-10-04 International Business Machines Corporation Enhanced screen capture for form manipulation
KR101572273B1 (en) 2009-07-28 2015-12-04 인터내셔널 비지네스 머신즈 코포레이션 Enhanced screen capture for form manipulation
US9088767B2 (en) 2012-10-08 2015-07-21 International Business Machines Corporation Activities duplication via recorded video
JP2014131129A (en) * 2012-12-28 2014-07-10 Kyocera Document Solutions Inc Image forming apparatus and image forming method
JP2015005039A (en) * 2013-06-19 2015-01-08 ブラザー工業株式会社 Program and information processor
CN104469053A (en) * 2013-09-24 2015-03-25 京瓷办公信息系统株式会社 Image forming apparatus and image forming method
JP2015065542A (en) * 2013-09-24 2015-04-09 京セラドキュメントソリューションズ株式会社 Image forming apparatus, image forming system, and image forming program
US9304723B2 (en) 2013-09-24 2016-04-05 Kyocera Document Solutions Inc. Image forming apparatus that restricts a storage size of a generated log image
CN104469053B (en) * 2013-09-24 2017-10-31 京瓷办公信息系统株式会社 Image processing system and image forming method

Similar Documents

Publication Publication Date Title
EP2409483B1 (en) Image forming apparatus and information processing system
JP4622347B2 (en) Output system with use right authentication function, material output device, and use right authentication output method
US8108938B2 (en) Data communication system, device, and method
US7729000B2 (en) Image forming apparatus performing image formation on print data, image processing system including plurality of image forming apparatuses, print data output method executed on image forming apparatus, and print data output program product
JP4267011B2 (en) Image forming apparatus, authority control server, and image forming system
US8467080B2 (en) Printing control system, printing control server, image forming apparatus, program, and printing control method
US20050273852A1 (en) Imaging job authorization
US7689824B2 (en) Data management apparatus, data management system, and method of data management
US20060026434A1 (en) Image forming apparatus and image forming system
US20100185858A1 (en) Image Forming System
JP2011244354A (en) Job history information auditing system, information processing apparatus, printer, and auditing method
JP2007221747A (en) Multi-functional input-output device and method of input-output
US7295790B2 (en) Image forming apparatus and control method
US8081327B2 (en) Information processing apparatus that controls transmission of print job data based on a processing designation, and control method and program therefor
JP4489003B2 (en) Authentication apparatus and image forming apparatus
CN1941824A (en) Data transmission apparatus, control method therefor, and image input/output apparatus
US20060170953A1 (en) Information processing method, information processing system, information processing device and recording medium
US20080151288A1 (en) Document processing system, document processing instruction apparatus, computer readable recording medium storing document processing program, and computer data signal embodied in carrier wave
US8056140B2 (en) Multifunction peripheral and method for controlling the same
US7864376B2 (en) Image processing apparatus
US8896856B2 (en) Image processing apparatus, control method therefor, and storage medium
JP2006235757A (en) Data processor, data processing method, and program
US8670145B2 (en) Controlling image processing system
JP4379499B2 (en) Image output authentication system, image output authentication server, and image output authentication method
JP2008040958A (en) Apparatus, method and program for managing electronic document and method for preparing electronic document

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20081225

RD01 Notification of change of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7421

Effective date: 20091009

A761 Written withdrawal of application

Free format text: JAPANESE INTERMEDIATE CODE: A761

Effective date: 20100413