JP2014165716A - Electronic apparatus - Google Patents

Electronic apparatus Download PDF

Info

Publication number
JP2014165716A
JP2014165716A JP2013035692A JP2013035692A JP2014165716A JP 2014165716 A JP2014165716 A JP 2014165716A JP 2013035692 A JP2013035692 A JP 2013035692A JP 2013035692 A JP2013035692 A JP 2013035692A JP 2014165716 A JP2014165716 A JP 2014165716A
Authority
JP
Japan
Prior art keywords
function
unit
user
use restriction
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2013035692A
Other languages
Japanese (ja)
Other versions
JP5927131B2 (en
Inventor
琴 ▲高▼須
Koto Takasu
Original Assignee
Kyocera Document Solutions Inc
京セラドキュメントソリューションズ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kyocera Document Solutions Inc, 京セラドキュメントソリューションズ株式会社 filed Critical Kyocera Document Solutions Inc
Priority to JP2013035692A priority Critical patent/JP5927131B2/en
Publication of JP2014165716A publication Critical patent/JP2014165716A/en
Application granted granted Critical
Publication of JP5927131B2 publication Critical patent/JP5927131B2/en
Application status is Active legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Abstract

PROBLEM TO BE SOLVED: To enable a user to recognize a threat to security of an image forming device when the user removes use restriction of a predetermined function in the image forming device to use the function.SOLUTION: A setting unit sets use restriction of a function (Scan to Email, for example) according to an instruction from an administrator authenticated by an administrator authentication unit. A determination unit determines whether use restriction is set for a function, according to an instruction from a user. When the determination unit determines that use restriction is set for the function, a removal unit removes the use restriction of the function according to an instruction from the user. A notification unit uses a warning screen 20 to notify the user of a threat to security of an image forming device caused by use of the function, when the determination unit determines that the use restriction is set for the function.

Description

  The present invention relates to a technique for managing security of an electronic device (for example, an image forming apparatus).

  In an electronic apparatus, for example, an image forming apparatus such as an MFP (Multi Function Peripheral), as a countermeasure against a security threat, it is possible to make a setting for restricting use of a predetermined function of the image forming apparatus.

  For example, there is a case where a portable terminal (portable personal computer or tablet terminal) is brought to a business trip destination and the document data stored in the portable terminal is desired to be printed using the image forming apparatus of the business trip destination. In this case, if the use of the printer function is restricted for the mobile terminal in the business trip destination image forming apparatus, the document data stored in the mobile terminal cannot be printed.

  Also, even at work, if the use of the Scan to E-mail function is restricted for general-purpose users on an image forming apparatus having a user authentication function, for example, general-purpose users will The mail function cannot be used.

  By the way, in order to make the user easily understand security threats, when the user sets a plurality of initial setting items of the image forming apparatus, the security strength of the image forming apparatus based on these settings is quantified and presented to the user Has been proposed (see, for example, Patent Document 1).

JP 2008-205850 A

  Restricting the use of a predetermined function of an image forming apparatus for security threat countermeasures is set by the administrator of the image forming apparatus, so if you want to remove the use restriction, you must ask the administrator. I must. Since there is a case where the administrator is absent, it is convenient for the user if the user can release the use restriction. However, if the use restriction of a predetermined function is canceled and the function is used, it becomes a threat regarding the security of the image forming apparatus.

  An object of the present invention is to provide an electronic device that allows a user to recognize a threat related to security of an electronic device when the user removes the restriction on the use of a predetermined function of the electronic device and uses the function. To do.

  An electronic device according to one aspect of the present invention that achieves the above object is an electronic device that can be restricted in use with respect to a predetermined function, and uses a predetermined administrator authentication information to designate an administrator of the electronic device. An administrator authentication unit for authentication, a setting unit for setting use restrictions of the function according to an instruction from the administrator authenticated by the administrator authentication part, and a use restriction of the function set by an instruction from a user A determination unit that determines whether or not use of the function has been set by the determination unit, and a release unit that releases the use limitation of the function according to an instruction from the user And when the use restriction of the function is determined by the determination unit or when the use restriction of the function is released by the release unit, Jill with a warning screen indicating the threat security of the electronic device, and a notification unit that notifies the user.

  ADVANTAGE OF THE INVENTION According to this invention, when a user cancels | limits the utilization restriction | limiting of the predetermined function of an electronic device, and uses the function, a user can be made to recognize the threat regarding the security of an electronic device.

2 is an explanatory diagram for explaining an outline of an internal structure of the image forming apparatus according to the embodiment. FIG. FIG. 2 is a block diagram illustrating a configuration of the image forming apparatus illustrated in FIG. 1. It is a table which shows the state in which the use restriction of a function was set. 6 is a table showing threat levels related to security of the image forming apparatus. 6 is a flowchart (part 1) for explaining an operation of security management of the image forming apparatus according to the embodiment. 6 is a flowchart (part 2) illustrating an operation of security management of the image forming apparatus according to the present embodiment. It is explanatory drawing explaining a warning screen. It is explanatory drawing explaining a normal password authentication screen. It is explanatory drawing explaining a simple password authentication screen.

  Hereinafter, an embodiment of the present invention will be described in detail based on an image forming apparatus as an example of an electronic apparatus. FIG. 1 is an explanatory diagram for explaining the outline of the internal structure of an image forming apparatus 1 according to an embodiment of the present invention. The image forming apparatus 1 can be applied to, for example, a digital multifunction peripheral (MFP) having functions of a copy, a printer, a scanner, and a facsimile. The image forming apparatus 1 is disposed on the apparatus main body 100, an original reading unit 200 disposed on the apparatus main body 100, an original feeding unit 300 disposed on the original reading unit 200, and an upper front surface of the apparatus main body 100. An operation unit 400 is provided.

  The document feeding unit 300 functions as an automatic document feeding device, and can feed a plurality of documents placed on the document placing unit 301 so that the document reading unit 200 can read them continuously.

  The document reading unit 200 includes a carriage 201 on which an exposure lamp or the like is mounted, a document table 203 made of a transparent member such as glass, a CCD (Charge Coupled Device) sensor (not shown), and a document reading slit 205. When reading a document placed on the document table 203, the document is read by the CCD sensor while moving the carriage 201 in the longitudinal direction of the document table 203. On the other hand, when reading a document fed from the document feeding unit 300, the carriage 201 is moved to a position facing the document reading slit 205, and the document fed from the document feeding unit 300 is scanned. Reading is performed by the CCD sensor through the reading slit 205. The CCD sensor outputs the read original as image data.

  The apparatus main body 100 includes a sheet storage unit 101, an image forming unit 103, and a fixing unit 105. The sheet storage unit 101 is disposed at the lowermost part of the apparatus main body 100 and includes a sheet tray 107 that can store a bundle of sheets. In the bundle of sheets stored in the sheet tray 107, the uppermost sheet is sent out toward the sheet conveyance path 111 by driving the pickup roller 109. The sheet is conveyed to the image forming unit 103 through the sheet conveyance path 111.

  The image forming unit 103 forms a toner image on the conveyed paper. The image forming unit 103 includes a photosensitive drum 113, an exposure unit 115, a developing unit 117, and a transfer unit 119. The exposure unit 115 generates modulated light corresponding to image data (image data output from the document reading unit 200, image data transmitted from a personal computer, image data received by facsimile, etc.), and is uniformly charged. Irradiate to the peripheral surface of the photosensitive drum 113. As a result, an electrostatic latent image corresponding to the image data is formed on the peripheral surface of the photosensitive drum 113. In this state, a toner image corresponding to image data is formed on the peripheral surface by supplying toner from the developing unit 117 to the peripheral surface of the photosensitive drum 113. This toner image is transferred by the transfer unit 119 to the sheet conveyed from the sheet storage unit 101 described above.

  The sheet on which the toner image is transferred is sent to the fixing unit 105. In the fixing unit 105, heat and pressure are applied to the toner image and the paper, and the toner image is fixed to the paper. The paper is discharged to the stack tray 121 or the paper discharge tray 123.

  The operation unit 400 includes an operation key unit 401 and a display unit 403. The display unit 403 has a touch panel function, and displays a screen including soft keys. The user operates the soft key while viewing the screen to make settings necessary for executing functions such as copying.

  The operation key unit 401 is provided with operation keys including hard keys. Specifically, a start key 405, a numeric key 407, a stop key 409, a reset key 411, a function switching key 413, and the like are provided.

  A start key 405 is a key for starting operations such as copying and facsimile transmission. A numeric keypad 407 is a key for inputting numbers such as the number of copies and a facsimile number. A stop key 409 is a key for stopping a copy operation or the like halfway. The reset key 411 is a key for returning the set contents to the initial setting state.

  The function switching key 413 includes a copy key, a printer key, a scanner key, a facsimile transmission key, and a Scan to E-mail key, and is a key for switching these functions. For example, if a copy key is operated, an initial copy screen is displayed on the display unit 403. If the Scan to E-mail key is operated, the initial screen of Scan to E-mail is displayed on the display unit 403.

  FIG. 2 is a block diagram showing a configuration of the image forming apparatus 1 shown in FIG. The image forming apparatus 1 has a configuration in which an apparatus main body 100, a document reading unit 200, a document feeding unit 300, an operation unit 400, a control unit 500, and a communication unit 600 are connected to each other by a bus. Since the apparatus main body 100, the document reading unit 200, the document feeding unit 300, and the operation unit 400 have already been described, description thereof will be omitted.

  The control unit 500 includes a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), an image memory, and the like. The CPU executes control necessary for operating the image forming apparatus 1 for the above-described components of the image forming apparatus 1 such as the apparatus main body 100. The ROM stores software necessary for controlling the operation of the image forming apparatus 1. The RAM is used for temporary storage of data generated during execution of software, storage of application software, and the like. The image memory temporarily stores image data (image data output from the document reading unit 200, image data transmitted from a personal computer, image data received by facsimile, etc.).

  The control unit 500 includes an administrator authentication unit 501, a user authentication unit 503, a setting unit 505, a determination unit 507, a release unit 509, a display control unit 511, a specifying unit 513, a storage unit 515, and a generation unit 517 as functional blocks. Is provided. Details of these blocks will be described later.

  The communication unit 600 includes a facsimile communication unit 601, a network I / F unit 603, and a wireless I / F unit 609. The facsimile communication unit 601 includes an NCU (Network Control Unit) that controls connection of a telephone line with a destination facsimile, and a modulation / demodulation circuit that modulates / demodulates a signal for facsimile communication. The facsimile communication unit 601 is connected to the telephone line 605.

  The network I / F unit 603 is connected to a LAN (Local Area Network) 607. A network I / F unit 603 is a communication interface circuit for executing communication with a terminal device such as a personal computer connected to the LAN 607.

  The wireless I / F unit 609 is a communication interface circuit for performing wireless communication between the image forming apparatus 1 and the portable terminal 10 (for example, a portable personal computer or a tablet terminal).

  The administrator authentication unit 501 authenticates the administrator of the image forming apparatus 1 using predetermined administrator authentication information. The user authentication unit 503 authenticates each user using predetermined user authentication information. In the case of biometric authentication, the predetermined administrator authentication information and the predetermined user authentication information are the biometric information of the administrator and each user. In the case of ID card authentication, the administrator and each user recorded on the ID card are specified. In the case of password authentication, it is information on a password set in advance for an administrator or each user.

  “Instructions from the user” and “instructions from the administrator” that appear in the following description will be described in the case where they are instructed by operating the operation unit 400 provided in the image forming apparatus 1. However, these instructions may be given by operating an operation unit provided in a terminal for remotely operating the image forming apparatus 1. A terminal here means a personal computer or a portable terminal 10 (a portable personal computer, a tablet terminal, or the like).

  The setting unit 505 sets use restrictions on the functions of the image forming apparatus 1 in accordance with instructions from the administrator authenticated by the administrator authentication unit 501.

  FIG. 3 is a table showing a specific example of the function usage restriction set in the setting unit 505. Function usage restrictions are set in accordance with the type of user and the type of function of the image forming apparatus 1. There are two types of users: general positions and managerial positions. There are three types of functions: Scan to E-mail, facsimile transmission, and copying, but the present invention is not limited to these. Managers are set to be restricted from using Scan to E-mail and facsimile transmission, and general employees are set to be restricted from using copies in addition to these.

  The storage unit 515 stores in advance a table indicating threat levels related to security of the image forming apparatus 1. This table defines which level of the plurality of levels indicating the magnitude of the threat related to the security of the image forming apparatus 1 corresponds to the type of document, the type of user, and the type of function. FIG. 4 shows a specific example of the table.

  There are two types of users: general and managerial, and three types of functions: Scan to E-mail, facsimile transmission, and copying. Although described as three types: a printed document, a document on which a watermark of the word “circulation” is printed, and a document on which no watermark is printed, the present invention is not limited to this.

  Scan to E-mail uses the Internet, facsimile transmission uses a telephone line, and copying does not use an externally connected network. Therefore, with regard to functions, security threats increase in the order of copying, facsimile transmission, and Scan to E-mail.

  Regarding the types of originals, the security threats increase in the following order: originals without a watermark printed, originals with a "circulation" character watermark printed, and originals with a "secret" character watermark printed. Become.

  Regarding user types, security threats increase in the order of managers and general employees.

  Security threats include levels 1 to 12, and the security threat increases as the number increases.

  For example, it is assumed that a user in a general job has been set to use Scan to E-mail. When the user removes the restrictions on using Scan to E-mail, and scans to E-mails that are printed with a watermark of the word “secret”, the security threat level is the maximum of 12. Become.

  In addition, for example, it is assumed that a user of a managerial position is set to restrict use of copying. When the user removes the copy usage restriction and copies a document on which no watermark is printed, the security threat level is 1, which is the minimum. In this embodiment, as shown in FIG. 3, since the copy usage restriction is not set for the manager user, even if the manager user cancels the copy use restriction, a description will be given later. The warning screen indicating the security threat to be displayed is not displayed.

  Assign a number indicating the security threat according to the type of user, assign a number indicating the security threat according to the type of function, assign a number indicating the security threat according to the type of document, and multiply or add the values. It may be at the level of security threat. For example, if the number “5” is assigned to a document printed with a watermark “3” for a managerial user, “6” for Scan to E-mail, and “secret”, 14 ( = 3 + 6 + 5) and 90 (= 3 × 6 × 5) are set as security threat levels.

  The identifying unit 513 identifies the type of the document from the image data generated by the document reading unit 200 reading the document based on a predetermined reference. In the present embodiment, an original on which a watermark of the “Maltel” character is printed and a watermark of the “circulation” character based on the watermark of the “Mal” character and the watermark of the “circulation” character. Is identified as a document with no watermark.

  The determination unit 507 determines whether or not function usage restrictions are set according to an instruction from the user. For example, when the user operates the function switching key 413 of the operation unit 400 and selects Scan to E-mail, the determination unit 507 refers to the table shown in FIG. to Judge whether usage of E-mail is restricted. When the user operates the function switching key 413 to select facsimile transmission, the determination unit 507 refers to the table shown in FIG. 3 and the use of facsimile transmission is restricted for the user. Determine whether or not.

  When the determining unit 507 determines that the function usage restriction is set, the canceling unit 509 cancels the function usage restriction according to an instruction from the user. The canceling unit 509 requests the user to perform authentication for canceling the function usage restriction, and when the authentication is performed, cancels the function usage restriction.

  A specific example of the authentication will be described. The canceling unit 509 allows the user to select one of the first authentication for canceling the function use restriction and the second authentication that is simpler than the first authentication, and uses the function by the second authentication. When the restriction is released, when the job that uses the function is not executed by the image forming apparatus 1 until the predetermined time elapses after the use restriction is released, the release of the function use restriction is invalidated.

  The canceling unit 509 disables the cancellation of the function use restriction after the job using the function is executed by the image forming apparatus 1 in a state where the function use restriction is cancelled. Thereby, it returns to the state where the use of the function is restricted.

  When the determination unit 507 determines that the function usage restriction is set, the display control unit 511 displays a warning screen indicating a security threat to the image forming apparatus 1 caused by using the function to the user. Control display. Since an instruction from the user is input using the operation unit 400 of the image forming apparatus 1, a warning screen is displayed on the display unit 403 of the image forming apparatus 1. Note that when an instruction is given from the user using the operation unit provided in the portable terminal 10 that remotely operates the image forming apparatus 1, a warning screen is displayed on the display unit provided in the portable terminal 10.

  Accordingly, when an instruction is given from the user by operating the operation unit 400 of the image forming apparatus 1, the display control unit 511 and the display unit 403 provided in the image forming apparatus function as a notification unit. When the operation unit of the portable terminal 10 that remotely operates the image forming apparatus 1 is operated to give an instruction from the user, the display control unit 511 of the image forming apparatus 1 and the display unit of the portable terminal 10 function as a notification unit. To do.

  In this embodiment, a warning screen is displayed to the user when it is determined by the determination unit 507 that the function usage restriction is set, but when the function usage restriction is canceled by the cancellation unit 509, a warning is displayed. The screen may be displayed to the user.

  When the determination unit 507 determines that the function use restriction is set, the generation unit 517 determines the type of user authenticated by the user authentication unit 503, the type of document specified by the specifying unit 513, and The threat level related to the security of the image forming apparatus 1 determined by the type of function is determined with reference to the table shown in FIG. 4, and screen data of a warning screen indicating the determined level is generated.

  An operation regarding security management of the image forming apparatus 1 according to the present embodiment will be described. 5 and 6 are flowcharts for explaining the operation.

  When the administrator who has been authenticated by the administrator authentication unit 501 operates the operation unit 400 to input to the operation unit 400 to set the use restriction, the setting unit 505 sets the use restriction of the function illustrated in FIG. Has been.

  The user authentication unit 503 authenticates the user (step S1).

  The user operates the function switching key 413 (FIG. 1) to input an instruction for selecting a function to the operation unit 400 (step S2). Thereby, the determination unit 507 determines whether or not the user authenticated in step S1 is restricted in the use of the function with reference to the table of FIG. 3 (step S3).

  For example, assume that the Scan to E-mail function is selected in step S2. Scan to E-mail is restricted for both general and managerial users. Accordingly, the determination unit 507 determines that the use of the function of the user authenticated in step S1 is restricted (Yes in step S3). Then, the generation unit 517 determines a threat related to security with reference to the table shown in FIG. 4 (step S4), and generates screen data of a warning screen indicating the determined level.

  The display control unit 511 causes the display unit 403 to display a warning screen indicating the security-related threat determined in step S4 (step S5). FIG. 7 is an explanatory diagram for explaining the warning screen 20.

  The warning screen 20 includes a character image 21 and keys 23, 25, and 27. In the character image 21, “Scan to E-mail is restricted for security threats. Security threats are level 1 to 12, and the larger the number, the greater the security threat. If you use Scan to E-mail after canceling the document, the security threat level will be 12 and the watermark of “circulation” will be printed if the document is printed with the “secret” character watermark. If the document is an original, the security threat level is 9. If the document is not printed with a watermark, the security threat level is 6. Use restrictions can be removed by normal password authentication or simple password authentication. Is described.

  In addition to the level, for example, a percentage of the possibility of eavesdropping or tampering may be described.

  The key 23 is a soft key pressed by the user when selecting normal password authentication (first authentication). The key 25 is a soft key pressed by the user when selecting simple password authentication (second authentication). Simple password authentication is authentication that uses a simple password, as compared to normal password authentication. Here, the password used for normal password authentication is an eight-digit number, and the password used for simple password authentication is a four-digit number. . If password authentication is selected, Scan to E-mail usage time is not limited. If simple password authentication is selected, the time to use Scan to E-mail is limited.

  The key 27 is a soft key pressed by the user when switching the screen of the display unit 403 to the initial screen of Scan to E-mail. The same applies to the key 27 in FIGS.

  When the keys 23 and 25 are not pressed by the user (No in Step 6 and No in Step 7), that is, an instruction to select normal password authentication is not input to the operation unit 400 and an instruction to select simple password authentication is issued. If there is no input to the operation unit 400, the process returns to step S5.

  When the user presses the key 23 and inputs an instruction to select normal password authentication to the operation unit 400 (Yes in step S6), the display control unit 511 displays the normal password authentication screen 30 shown in FIG. (Step S8). The normal password authentication screen 30 includes a password input area 31 and keys 27 and 33.

  For normal password authentication, the user operates the numeric keypad 407 (FIG. 1) of the operation unit 400 to input a predetermined eight-digit password in the password input area 31 and presses the key 33.

  The canceling unit 509 determines whether or not the password input by the user is correct (step S9).

  If the cancellation unit 509 does not determine that the password input by the user is correct (No in step S9), the display control unit 511 causes the display unit 403 to display an operation screen requesting re-input of the normal password (step S10). Return to step S9.

  If the cancellation unit 509 determines that the password input by the user is correct (Yes in step S9), the cancellation unit 509 permits the execution of the function selected in step S2 (step S11). Here, execution of the Scan to E-mail function is permitted.

  When the start key 405 (FIG. 1) is pressed in a state in which the selected function (Scan to E-mail) can be executed, the image forming apparatus 1 performs a job (Scan to E-mail) using the selected function. A document transmission job using mail) is executed (step S12). Scan to E-mail can be executed when a document is set on the document placement unit 301 (FIG. 1) and the operation unit 400 is operated by the user to set a predetermined setting (resolution, etc.). And the address of the destination has been entered.

  After the job using the selected function is executed, the canceling unit 509 invalidates the cancellation of the use restriction of the function. As a result, the use of Scan to E-mail is restored.

  On the other hand, in the warning screen 20 shown in FIG. 7, when the user does not press the key 23 (No in step S6) and the key 25 is pressed and an instruction to select simple password authentication is input to the operation unit 400 (step The display control unit 511 displays the simple password authentication screen 40 shown in FIG. 9 on the display unit 403 (Step S13). The simple password authentication screen 40 includes a password input area 41 and keys 27 and 43.

  For simple password authentication, the user operates the numeric keypad 407 (FIG. 1) of the operation unit 400 to input a predetermined four-digit password in the password input area 41 and presses the key 43.

  The canceling unit 509 determines whether or not the password input by the user is correct (step S14).

  If the cancellation unit 509 does not determine that the password input by the user is correct (No in step S14), the display control unit 511 causes the display unit 403 to display an operation screen requesting re-input of the simple password (step S15). Return to step S14.

  When the cancellation unit 509 determines that the password input by the user is correct (Yes in step S14), the cancellation unit 509 permits the execution of the function selected in step S2 (step S16). Here, execution of the Scan to E-mail function is permitted.

  The canceling unit 509 starts a timer provided in the canceling unit 509 (step S17). Thereby, the count of the time limit (for example, 1 minute) in which the Scan to E-mail function can be used is started.

  When the start key 405 (FIG. 1) is pressed while the selected function (Scan to E-mail) can be executed, the canceling unit 509 determines whether or not the time limit has elapsed (step S18). ). Scan to E-mail can be executed when a document is set on the document placement unit 301 (FIG. 1) and the operation unit 400 is operated by the user to set a predetermined setting (resolution, etc.). And the address of the destination has been entered.

  When the canceling unit 509 determines that the time is within the time limit (Yes in Step S18), the image forming apparatus 1 performs a job using the function selected in Step S2 (a document transmission job using Scan to E-mail). Execute (Step S19). After the job using the selected function is executed, the canceling unit 509 invalidates the cancellation of the use restriction of the function. As a result, the use of Scan to E-mail is restored.

  On the other hand, when the canceling unit 509 determines that the time limit has elapsed (No in step S18), the display control unit 511 determines that the function selected in step S2 (Scan to E-mail) due to the elapse of the time limit. ) Is displayed on the display unit 403 as a character image that cannot be executed (step S20).

  For example, when the manager user selects the copy function in step S2, the determination unit 507 does not determine that the user authenticated in step S1 is restricted in the use of the function selected in step S2 ( No in step S3). Then, the user is permitted to execute the function (copy) selected in step S2 (step S21).

  When the start key 405 (FIG. 1) is pressed, the image forming apparatus 1 executes the function (copy) selected in step S2 (step S22).

  The main effects of this embodiment will be described. In the present embodiment, the administrator can set usage restrictions for predetermined functions. Based on an instruction from the user, it is determined whether or not the function use restriction is set (step S3). When it is determined that the function use restriction is set (Yes in step S3), FIG. 7 shows. Control to display the warning screen 20 to the user (control to notify) is performed (step S5). The warning screen 20 shows threats related to the security of the image forming apparatus 1 caused by using the function. Therefore, according to the present embodiment, when the user removes the restriction on the use of a predetermined function of the image forming apparatus 1 and uses the function, the user can recognize the threat related to the security of the image forming apparatus 1. .

  According to the present embodiment, since the user is requested to authenticate for releasing the function use restriction (steps S8 and S13), when the user uses the function by releasing the function use restriction, the image forming apparatus 1 security threats can be reduced.

  In this authentication, the user is allowed to select normal password authentication or simple password authentication (FIG. 7, steps S6 and S7). By permitting simple password authentication, the use time of the function is restricted when the use restriction of the function is canceled by simple password authentication while giving convenience to the user (step S18), so that the security of the image forming apparatus 1 is concerned. The threat can be reduced.

  Continuing the state in which the function use restriction has been lifted is a threat related to the security of the image forming apparatus 1. According to the present embodiment, after the function use restriction is released, the function use restriction is canceled after the job using the function is executed by the image forming apparatus 1 (steps S12 and S19). The Thereby, it returns to the state where the use of the function is restricted. Therefore, threats related to the security of the image forming apparatus 1 can be reduced.

  In the present embodiment, when the determination unit 507 determines that the function use restriction is set (Yes in step S3), the warning screen 20 shown in FIG. 7 is displayed (step S5). When the function use restriction is canceled by the canceling unit 509 (Yes in Step S9, Yes in Step S14), the warning screen 20 may be displayed. According to this aspect, since the warning screen 20 is displayed after the normal password authentication or the simple password authentication, the warning screen 20 does not include the keys 23 and 25.

1 Image forming device (electronic equipment)
20 Warning screen 21 Character image 23, 25, 27 Key 30 Normal password authentication screen 31 Password input area 33 Key 40 Simple password authentication screen 41 Password input area 43 Key 403 Display unit (element functioning as a notification unit)
511 Display control unit (element functioning as a notification unit)

Claims (4)

  1. An electronic device capable of restricting the use of a predetermined function,
    An administrator authentication unit that authenticates an administrator of the electronic device using predetermined administrator authentication information;
    A setting unit configured to set use restriction of the function according to an instruction from the administrator authenticated by the administrator authentication unit;
    A determination unit that determines whether or not use restriction of the function is set according to an instruction from a user;
    When it is determined by the determination unit that the use restriction of the function is set, a release unit that releases the use restriction of the function according to an instruction from the user;
    When it is determined that the use restriction of the function is set by the determination unit, or when the use restriction of the function is released by the release unit, the security of the electronic device generated by using the function An electronic device comprising: a notification unit that notifies the user using a warning screen indicating a threat.
  2.   The electronic device according to claim 1, wherein the release unit requests the user to perform authentication for releasing the use restriction of the function, and releases the use restriction of the function when the authentication is performed.
  3. The release unit is
    The user is allowed to select either the first authentication for canceling the use restriction of the function or the second authentication that is simpler than the first authentication, and the use of the function by the second authentication. The cancellation of the use restriction of the function is invalidated when a job that uses the function is not executed by the electronic device until a predetermined time elapses after the use restriction is released when the restriction is released. The electronic device described.
  4.   The canceling unit invalidates the cancellation of the use restriction of the function after a job using the function is executed by the electronic device in a state where the use restriction of the function is released. The electronic device as described in any one.
JP2013035692A 2013-02-26 2013-02-26 Electronics Active JP5927131B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2013035692A JP5927131B2 (en) 2013-02-26 2013-02-26 Electronics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2013035692A JP5927131B2 (en) 2013-02-26 2013-02-26 Electronics

Publications (2)

Publication Number Publication Date
JP2014165716A true JP2014165716A (en) 2014-09-08
JP5927131B2 JP5927131B2 (en) 2016-05-25

Family

ID=51615942

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2013035692A Active JP5927131B2 (en) 2013-02-26 2013-02-26 Electronics

Country Status (1)

Country Link
JP (1) JP5927131B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017211871A (en) * 2016-05-26 2017-11-30 京セラドキュメントソリューションズ株式会社 Image forming apparatus, and information processing device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006235757A (en) * 2005-02-22 2006-09-07 Canon Inc Data processor, data processing method, and program
JP2008070467A (en) * 2006-09-12 2008-03-27 Ricoh Co Ltd Image forming apparatus
JP2008085471A (en) * 2006-09-26 2008-04-10 Ricoh Co Ltd Image processor
JP2010244449A (en) * 2009-04-09 2010-10-28 Canon Inc Information processing apparatus, method of controlling the same, and program
JP2011128888A (en) * 2009-12-17 2011-06-30 Konica Minolta Business Technologies Inc Information processor and control method and information processing program for information processor
JP2012104884A (en) * 2010-11-05 2012-05-31 Fuji Xerox Co Ltd Information processing device, information processing system, and program
JP2012155512A (en) * 2011-01-26 2012-08-16 Ricoh Co Ltd Image processor, function use control method, function use control program and recording medium with the same program recorded

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006235757A (en) * 2005-02-22 2006-09-07 Canon Inc Data processor, data processing method, and program
JP2008070467A (en) * 2006-09-12 2008-03-27 Ricoh Co Ltd Image forming apparatus
JP2008085471A (en) * 2006-09-26 2008-04-10 Ricoh Co Ltd Image processor
JP2010244449A (en) * 2009-04-09 2010-10-28 Canon Inc Information processing apparatus, method of controlling the same, and program
JP2011128888A (en) * 2009-12-17 2011-06-30 Konica Minolta Business Technologies Inc Information processor and control method and information processing program for information processor
JP2012104884A (en) * 2010-11-05 2012-05-31 Fuji Xerox Co Ltd Information processing device, information processing system, and program
JP2012155512A (en) * 2011-01-26 2012-08-16 Ricoh Co Ltd Image processor, function use control method, function use control program and recording medium with the same program recorded

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017211871A (en) * 2016-05-26 2017-11-30 京セラドキュメントソリューションズ株式会社 Image forming apparatus, and information processing device

Also Published As

Publication number Publication date
JP5927131B2 (en) 2016-05-25

Similar Documents

Publication Publication Date Title
JP2006092018A (en) Authentication system, image forming apparatus, authentication control method and authentication control program for instruction processing apparatus
JP2005174028A (en) Data-protecting device and image forming apparatus
US8037521B2 (en) Information processing apparatus allowing multiple logins
JP5240264B2 (en) Image information processing apparatus, image information processing system, and computer program
US8166542B2 (en) Information processing apparatus, user information managing method, and computer program product
US20090296131A1 (en) Image data processing apparatus and image forming apparatus
JP2009134638A (en) Operation processing apparatus
US7864376B2 (en) Image processing apparatus
JP4539883B2 (en) Image forming apparatus
JP4514215B2 (en) Information processing apparatus, image forming apparatus, image forming system, information processing method, and image forming method
JP4725726B2 (en) Image processing apparatus, job log management program, and image processing system
JP2006346986A (en) Printing method and printing device
JP2005065200A (en) Image forming apparatus, electronic apparatus, program and computer readable recording medium
US20090033992A1 (en) Printing apparatus, printing method, and printing system
CN100504845C (en) Image processing device, image processing method and image processing system
JP4297914B2 (en) Transmitting apparatus and transmitting method
JP4335930B2 (en) Image processing device
US20070133043A1 (en) Image log function display program, image log function display method, image processing apparatus, and image processing system
US7716432B2 (en) Data processing apparatus and image forming apparatus for managing a data deletion history
JP4752480B2 (en) Image processing program, image processing apparatus, and image processing system
JP4572918B2 (en) Printing system, printing apparatus, printing number management apparatus, and program
US8544085B2 (en) Image processing apparatus, image processing method, and image forming apparatus
US8503017B2 (en) Image forming apparatus, control method for the same, and storage medium
JP4693875B2 (en) Image forming apparatus
JP5867780B2 (en) Printing apparatus, print management system, and user authentication program

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20150119

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20151007

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20151020

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20151217

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20160405

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20160425

R150 Certificate of patent or registration of utility model

Ref document number: 5927131

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150