JP4653436B2 - Electronic signature assigning method, electronic signature assigning apparatus, electronic signature assigning program, and recording medium - Google Patents

Electronic signature assigning method, electronic signature assigning apparatus, electronic signature assigning program, and recording medium Download PDF

Info

Publication number
JP4653436B2
JP4653436B2 JP2004227910A JP2004227910A JP4653436B2 JP 4653436 B2 JP4653436 B2 JP 4653436B2 JP 2004227910 A JP2004227910 A JP 2004227910A JP 2004227910 A JP2004227910 A JP 2004227910A JP 4653436 B2 JP4653436 B2 JP 4653436B2
Authority
JP
Japan
Prior art keywords
signature
electronic
key
attribute information
electronic signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2004227910A
Other languages
Japanese (ja)
Other versions
JP2006050210A (en
Inventor
雄介 太田
Original Assignee
株式会社リコー
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社リコー filed Critical 株式会社リコー
Priority to JP2004227910A priority Critical patent/JP4653436B2/en
Publication of JP2006050210A publication Critical patent/JP2006050210A/en
Application granted granted Critical
Publication of JP4653436B2 publication Critical patent/JP4653436B2/en
Application status is Expired - Fee Related legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Description

The present invention relates to an electronic signing method, digital signing device, electronic signing program relates及 Beauty recording medium.

  In recent years, a method, an apparatus, and the like for giving an electronic signature to electronic data, in particular, data obtained by reading a paper document with a scanner device or the like and digitizing it have been disclosed (for example, see Patent Document 1).

  In Patent Document 1, an IC card is used as a device for performing an encryption process for creating electronic signature data, and a plurality of persons repeat the same means in one document (that is, different possessions owned by each person). It is also possible to make an electronic signature using an IC card.

In other words, Patent Document 1 is based on the premise that only one electronic signature key is provided in one IC card.
JP 2003-31885 A

  However, in actual society, there is a case where one person's own item has a plurality of seals and uses them according to the position of imprinting. For example, in a company, there are cases where a normal seal uses a personal seal, and when a contract is stamped, a mark representing a title (for example, a department manager) is used.

  In this way, one person can use a plurality of signatures in the same way in the world of electronic signatures.

  For example, when a person with official qualifications, such as a doctor, digitally signs personal emails, the personal signature key is used, and when electronic signatures are digitally signed, they are assigned to public qualifications. A case in which a signed key is used is considered. In this way, when a signature key assigned to a public qualification (for example, a doctor) is used, for example, an electronic medical record is guaranteed to be signed by a “doctor”, but a personal signature key is used. In that case, the signature by "doctor" is not guaranteed.

  Similarly, for example, when a person in charge at a government office gives an electronic signature, it is necessary to use a personal signature and a public signature as a person in charge of the window.

  Recently, the “e-document bill” has been submitted to the Diet, and the need for technology that uses electronic signatures flexibly is increasing.

  Therefore, a method is conceivable in which a plurality of electronic signature keys are presented to the user, the user selects an electronic signature key suitable for the purpose, and an electronic signature is performed using the selected electronic signature key. However, in the case where the electronic signature key is uniquely determined, this method has a problem that it takes time and labor to present the user with a candidate for the electronic signature key. Even when a plurality of electronic signature keys are listed as candidates, there is a problem that if the user makes a selection mistake, the electronic signature is performed with the wrong electronic signature key and the validity of the electronic signature may be impaired. It was.

  The present invention has been made in view of the above points, and an object thereof is to automatically select an appropriate signature key when one user can use a plurality of electronic signature keys.

Therefore, in order to solve the above-described problem, the present invention is an electronic signature providing method in an electronic signature providing apparatus that includes at least one scan application in which setting information is set, and adds an electronic signature to electronic data, The scan application requests at least one signature key attribute information, at least one signature key attribute information obtained in response to the request, and setting information set in the requested scan application If, by comparing the signature key selection step of selecting a signature key corresponding to the attribute information of a valid signature key in the attribute information of the one or more signature keys, it is entered as an electronic signature target and an electronic data, a signing key selected in the signature key selection step, and the electronic signature file creation step that creates a digital signature file on the basis of the signature data generated using the Characterized in that it.

According to the present invention, there is provided an electronic signature assigning method in an electronic signature assigning apparatus that includes at least one scan application in which setting information is set and attaches an electronic signature to electronic data, wherein the scan app is at least one By requesting attribute information of one or more signature keys and comparing the attribute information of at least one or more signature keys obtained in response to the request with the setting information set in the requested scan application a signature key selection step of selecting a signature key corresponding to the attribute information of a valid signature key in the attribute information of the one or more signature keys, and electronic data input as an electronic signature subject, the signature a signature key that has been selected in the key selection step, and the electronic signature file creation step that creates a digital signature file on the basis of the signature data generated using, by having, one of Yoo The is, when properly used a plurality of electronic signature keys, it is possible to automatically select the appropriate signature key.

Further, the present invention is an electronic signature assigning method in an electronic signature assigning apparatus that includes at least one scan application in which setting information is set, and attaches an electronic signature to electronic data, wherein the scan app is at least one Requesting attribute information of one or more signature keys, and comparing the signature key attribute information obtained in response to the request with the setting information set in the requested scan application. A signature key attribute information determination stage for determining whether the attribute information is valid signature key attribute information, electronic data input as an electronic signature target, and the signature key attribute information determination stage determined to be valid characterized in that it has, and the electronic signature file creation step that creates a digital signature file on the basis of the signature data generated using a signature key corresponding to the attribute information of the signature key To.

According to the present invention, there is provided an electronic signature assigning method in an electronic signature assigning apparatus that includes at least one scan application in which setting information is set and attaches an electronic signature to electronic data, wherein the scan app is at least one Requesting attribute information of one or more signature keys, and comparing the signature key attribute information obtained in response to the request with the setting information set in the requested scan application. A signature key attribute information determination stage for determining whether the attribute information is valid signature key attribute information, electronic data input as an electronic signature target, and the signature key attribute information determination stage determined to be valid and the electronic signature file creation step of creating a signature key corresponding to the attribute information of the signature key, an electronic signature file based on signature data created using, by having One user, when used properly a plurality of electronic signature keys, it is possible to automatically select the appropriate signature key.

As a means for solving the above problems, digital signing device, electronic signing program may be beauty recording medium.

  According to the present invention, when a single user can use a plurality of electronic signature keys properly, an appropriate signature key can be automatically selected.

  Hereinafter, embodiments of the present invention will be described with reference to the drawings.

  FIG. 1 is a system configuration diagram of an example of an electronic signature assigning system. As shown in FIG. 1, the electronic signature assigning system includes a digital multi-function peripheral 1, an IC card 2, and an electronic document storage server 3. In addition, the digital multi-function peripheral 1 includes a receipt scanning business application 51, an approval document scanning business application 52, and a general document scanning application 53 as scanning applications. The IC card 2 includes an electronic signature card application (hereinafter simply referred to as a card application) 45.

  The user inserts the portable IC card 2 into the digital multi-function peripheral 1, selects a scan application according to the type of document to be scanned, and scans the paper document. The scanned electronic data, the generated electronic signature file, and the like are stored in an electronic document storage server 3 connected to the digital multi-function peripheral 1 via a network. Note that the scanned electronic data, the generated electronic signature file, and the like may be stored not in the electronic document storage server 3 but in the hard disk of the digital multi-function peripheral 1. However, in the following, for simplification of explanation, it is assumed that scanned electronic data, a generated electronic signature file, and the like are stored in the electronic document storage server 3.

  An example of the hardware configuration of the digital multifunction peripheral 1 and the IC card 2 is shown in FIG. FIG. 2 is a hardware configuration diagram of the digital multifunction peripheral and the IC card.

  As shown in FIG. 2, the digital multi-function peripheral 1 includes an operation panel 11, an image scanner 12, an IC card R / W 13, a CPU 14, a hard disk drive 15, a ROM 16, a RAM 17, a media drive 18, The IC card 2 includes a CPU 41, a RAM 42, and a flash ROM 43.

  The operation panel 11 receives an input operation from the operator and performs display for the operator. The image scanner 12 reads a paper document and creates an electronic document. The IC card R / W 13 reads data from the IC card 2 or writes data to the IC card 2. The IC card 2 is a card for recording information or data, and may be a normal IC card or a multi-application IC card (hereinafter referred to as a multi-application IC card).

  The CPU 14 controls the digital multi-function peripheral 1 according to a program (electronic signature providing program) stored in the RAM 17 or the like, for example. The hard disk drive 15 stores, for example, a program (electronic signature assigning program). The ROM 16 stores data and the like. The RAM 17 reads and stores a program (electronic signature assigning program) from the hard disk drive 15 when the digital multi-function peripheral 1 is started up, stores target data to be attached with an electronic signature, and stores a message digest. To do.

  The media drive 18 reads and writes a recording medium (recording medium) such as a floppy (registered trademark) disk or a CD-R. The program (digital signature application program) of the digital multi-function peripheral 1 may be stored in the hard disk drive 15 or the like from the beginning, or may be installed in the hard disk drive 15 from the recording medium via the media drive 18. The network adapter 19 connects the digital multifunction peripheral 1 to a network or the like. Note that the program (digital signature assigning program) of the digital multi-function peripheral 1 may be downloaded from a network or the like via the network adapter 19 and stored in the hard disk drive 15 or the like.

  Similarly, the CPU 41 stores the IC card 2 in accordance with a program (signature data creation program) corresponding to a card application 45 included in the signature data creation unit 25 and / or the signature data creation unit 25, which will be described later, stored in the RAM 42, for example. Control. The flash ROM 43 stores a signature key, a program (signature data creation program), and the like.

  For example, when the IC card 2 receives a command from the digital multi-function peripheral 1 through the IC card R / W 13, the RAM 42 reads and stores a program (signature data creation program) from the flash ROM 43.

  An example of the functional configuration of the digital multifunction peripheral 1 and the IC card 2 is shown in FIG. FIG. 3 is a functional configuration diagram of an example of a digital multi-function peripheral and an IC card. In FIG. 3, a solid line arrow indicates the movement of main data, and a broken line arrow indicates the exchange of parameters and instructions.

  As shown in FIG. 3, the digital multi-function peripheral 1 includes a target data input unit 21, an interface unit 22, a file post-processing unit 23, a receipt scanning business application 51, an approval document scanning business application 52, A document scanning application 53 and a target data preprocessing unit 26 are included.

  The interface unit 22 receives an electronic signature execution instruction from the user and displays (notifies) the result of the electronic signature to the user. For example, the operation panel 11 in FIG. 2 corresponds to the interface unit 22.

  The target data input unit 21 is for inputting target data to be provided with an electronic signature (hereinafter referred to as signature target data). For example, when a paper document is converted into electronic data and input, the image scanner 12 in FIG. 2 corresponds to the target data input unit 21. Also, when inputting what is originally stored (or stored) in the hard disk drive 15 or the like of the digital multifunction device 1 in the form of an electronic document, the electronic document is read from the hard disk drive 15 or the like, or the digital multifunction device 1 When an object stored in an electronic document storage server or the like connected via a network is input, a process of acquiring an electronic document from the electronic document storage server or the like via the network is performed in the target data input unit 21. Correspond.

  The file post-processing unit 23 is a processing unit that processes an electronic signature file created by the receipt scanning business application 51, the approval document scanning business application 52, the general document scanning business application 53, or the like. For example, the file post-processing unit 23 transfers the electronic signature file to the electronic document storage server 3 or the like connected to the digital multifunction peripheral 1 via the network, and requests storage.

  The target data preprocessing unit 26 applies a one-way function (for example, a hash function) to the signature target data and converts it into small data called a message digest (MD).

  The receipt scanning business application 51 is an application that executes processing related to a receipt. For example, the electronic signature data creation unit 25 is inquired about a signature key candidate that can sign a receipt, and is presented in response to the inquiry. From the candidate signature keys (or signature key profile information), an appropriate signature key (or signature key profile information) is selected based on the setting information set in the receipt scanning application 51. Alternatively, the validity of the signature key (or signature key profile information) presented in response to the inquiry is determined based on the setting information set in the receipt scanning business application 51, or an electronic signature data creation unit 25 is requested to create electronic signature data, or an electronic signature file in a file format is created based on the created electronic signature data.

  The approval scan application 52 is an application that executes a process related to the approval document. For example, the electronic signature data creation unit 25 is inquired about a signature key candidate that can sign the approval document, and is presented in response to the inquiry. From the candidates for the signature key (or signature key profile information), an appropriate signature key (or signature key profile information) is selected based on the setting information set in the approval scan application 52 Alternatively, the validity of the signature key (or signature key profile information) presented in response to the inquiry is determined based on the setting information set in the final approval scan application 52, or an electronic signature data creation unit 25 is requested to create electronic signature data, or an electronic signature file in a file format is created based on the created electronic signature data.

  The general document scanning application 53 is an application that executes processing related to a general document. For example, the general document scanning application 53 inquires the electronic signature data creation unit 25 about a signature key candidate that can sign a general document, or is presented in response to the inquiry. From the candidates for the signature key (or signature key profile information), an appropriate signature key (or signature key profile information) is selected based on the setting information set in the general document scanning application 53, or The validity of the signature key (or signature key profile information) presented in response to the inquiry is determined based on the setting information set in the general document scanning application 53, or the electronic signature data creation unit 25 is electronically Requests creation of signature data, or creates an electronic signature file in a file format based on the created electronic signature data.

  On the other hand, as shown in FIG. 3, the IC card 2 includes a signature data creation unit 25. The signature data creation unit 25 is a creation unit that creates signature data (signature target data encrypted with an electronic signature key). A plurality of signature keys are held in the signature data creation unit 25. For example, the card application 45 stored in the IC card 2 corresponds to the signature data creation unit 25. In other words, the card application 45 corresponding to the signature data creation unit 25 is stored in the IC card 2. The signature data creation unit 25 may be mounted on the digital multi-function peripheral 1 instead of being mounted on the IC card 2. However, for the sake of simplification of description, the signature data creation unit 25 will be described as being mounted on the IC card 2 below.

  Hereinafter, an example of setting information of the receipt scanning business application 51 will be described with reference to FIG. FIG. 4 is a diagram illustrating an example of setting information of the receipt scanning business application.

  As shown in FIG. 4, the setting information includes a card application ID to be used, an organization name, and a necessary job title level. The card application ID to be used is an ID for identifying the card application 45 when the digital multi-function peripheral 1 calls the card application 45 in the IC card 2. The organization name and the required job title level indicate conditions for giving an electronic signature. In the present embodiment, the position level indicates a higher level as the number increases. For example, “1” is a general employee, “3” is a general manager, and “9” is a president.

  That is, in the setting information shown in FIG. 4, the receipt scanning business application 51 uses the card application 45 identified by the card application ID “001”, and the user who gives the electronic signature belongs to the “accounting department” In addition, the job title level indicates that “1” or more is necessary.

  Hereinafter, an example of setting information of the approval document scan business application 52 will be described with reference to FIG. FIG. 5 is a diagram (part 1) illustrating setting information of the approval document scanning business application.

  In the setting information shown in FIG. 5, the approval document scanning business application 52 uses the card application 45 identified by the card application ID “001”, and the user who gives the electronic signature belongs to the “accounting department”. The job title level indicates that “3” or higher is required.

  Hereinafter, an example of setting information of the general document scanning application 53 will be described with reference to FIG. FIG. 6 is a diagram (part 1) illustrating setting information of the general document scanning application.

  In the setting information shown in FIG. 6, the general document scanning application 53 uses the card application 45 identified by the card application ID “001”, and the user who gives the electronic signature may belong to any place. It also shows that no job title level is required, that is, anyone can do it.

  An example of the internal configuration of the signature data creation unit 25 is shown in FIG. FIG. 7 is a diagram (part 1) illustrating the internal configuration of the signature data creation unit.

  As one of methods for realizing the signature data creation unit 25 shown in FIG. 3, there is a method of configuring with one card application 45.

  When the signature data creation unit 25 is configured with one card application 45 as described above, as shown in FIG. 7, the card application 45 has a plurality of signature key sets as data, and as a method (or function), A signature execution method for executing encryption processing with a designated key; and a signature key list presentation method for presenting a list of profile information of keys that can be signed. The signature key set is a data set that includes a secret key used for digital signature encryption processing and profile information about the secret key as elements.

  The signature key profile information includes a key ID for identifying the signature key, an organization name, a job title level, a name of the signature key owner, a validity period of the signature key, and the like.

  In the following, FIG. 8 shows an example of the signature key set of Mr. A who is the accounting manager. FIG. 8 is a diagram illustrating an example of the signature key set of Mr. A who is the accounting department manager.

  As shown in FIG. 8, Mr. A's IC card 2 stores a signature key set 1 that is a key for the accounting department manager and a signature key set 2 that is a personal key.

  An example of a signature key set of Mr. B who is a general member of the accounting department is shown in FIG. FIG. 9 is a diagram illustrating an example of a signature key set of Mr. B who is a general member of the accounting department.

  As shown in FIG. 9, Mr. B's IC card 2 stores a signature key set 1 that is a key for an accounting member and a signature key set 2 that is a personal key.

  When Mr. A executes the receipt scan business application 51 or the approval scan business application 52, Mr. A's signature key set 1 is selected by the receipt scan business application 51 or the approval scan business application 52, and Mr. B When the receipt scanning business application 51 is executed, Mr. B's signature key set 1 is selected by the receipt scanning business application 51.

  Further, in the case as shown in FIG. 9, Mr. B cannot execute the approval document scanning business application 52 because he does not have a key set that satisfies the condition that the job title level is 3 or more, for example.

  In the general document scanning application 53, for example, the signature key set 2 is used for both Mr. A and Mr. B.

  An example of an electronic signature adding process is shown in FIG. FIG. 10 is a sequence diagram (part 1) of the electronic signature attaching process.

  First, the user activates the scan function of the digital multi-function peripheral 1 by pressing a scanner activation button. Upon receiving information indicating that the scanner activation button has been pressed by the user, the digital multifunction peripheral 1 scans applications that can be used by the user, for example, a receipt scanning application 51, an approval document scanning business application 52, and a general document scanning application. 53 are displayed as a list on the operation panel 11 via the interface unit 22. An example of the operation panel 11 is a liquid crystal display with a touch function, for example.

  After inserting the user's own IC card 2 into the IC card R / W 13, the user selects a scanner application from the displayed list according to the business and the like, and puts a paper document (for example, an approval document) on the image scanner 12. Set and start scanning (sequence SQ1). In FIG. 10, description will be made assuming that the user has selected the approval document scan business application 52.

  When data input is instructed by the user, interface unit 22 notifies target data input unit 21 that the user has instructed data input (sequence SQ2).

  When the target data input unit 21 receives from the interface unit 22 that data input is instructed by the user, the target data input unit 21 reads a paper document set by the user to generate signature target data (sequence SQ3), and scan application (decision) (Sequence SQ4).

  The scan application (decision document scan business application 52) expands the signature target data passed from the target data input unit 21 on the RAM 17, and instructs the target data preprocessing unit 26 to perform preprocessing (sequence SQ5).

  The target data pre-processing unit 26 performs a one-way function on the signature target data instructed to be processed by the scan application (decision document scan business application 52) (sequence SQ6), creates a message digest of the signature target data, The message digest is expanded on the RAM 17 and the message digest is returned to the scan application (decision document scan application 52) (sequence SQ7).

  On the other hand, the scan application (decision document scan business application 52) sends a signature key list request for calling the signature key list presentation method of the card application 45 in the IC card 2 to the signature data creation unit 25 via the IC card R / W 13. (Sequence SQ8). At this time, as shown in FIG. 5, for example, the scan application (decision document scan business application 52) includes “001” as a card application ID to be used in the signature key list request via the IC card R / W 13. You may make it pass to the signature data preparation part 25. FIG.

  Upon receiving the signature key list request from the scan application (decision document scan business application 52), the signature data creation unit 25 executes the signature key list presentation method of the corresponding card application 45 (sequence SQ9), and the corresponding card application 45. The profile information is collected from the signature key set possessed by, and the collected profile information is presented as a signature key list to the scan application (decision document scan business application 52) (sequence SQ10).

  The scan application (decision document scan business application 52) matches the conditions by comparing the profile information included in the presented signature key list with the setting information of the scan application (final document scan business application 52). A signature key is selected (sequence SQ11). For example, the approval document scanning business application 52 selects a signature key with a condition that the organization name is the accounting department and the job title level is 3 in the presented signature key list. Details of the signature key selection process are shown in FIGS. In the following description, it is assumed that there is a signature key that meets the conditions.

  When the scan application (decision document scan business application 52) selects a signature key, for example, the IC card 2 with the identifier (key ID) of the selected signature key and the corresponding message digest held in the RAM 17 as parameters. A signature data creation request for calling the signature execution method of the card application 45 is passed to the signature data creation unit 25 via the IC card R / W 13 (sequence SQ12).

  When the signature data creation unit 25 receives a signature data creation request from the scan application (decision document scan business application 52), the signature data creation unit 25 executes the signature execution method of the corresponding card application 45 based on the parameters (sequence SQ13), and the execution result Is returned to the scan application (decision document scan business application 52) (sequence SQ14). For example, the signature execution method encrypts the message digest by the RSA 1024 bit method or the like with the signature key identified by the profile name and / or key identifier given as parameters.

  Upon receiving the signature data from the signature data creation unit 25, the scan application (decision document scan business application 52) converts the signature data into a file and creates a signature file (sequence SQ15), for example, post-processing including the signature file Is sent to the file post-processing unit 23 (sequence SQ16).

  When the file post-processing unit 23 receives a post-processing request from the scan application (finalization document scan business application 52), the file post-processing unit 23 transmits the signature file included in the post-processing request to the electronic document storage server 3 to request storage. Then (sequence SQ17), the result of post-processing (for example, storage completion) is notified to the scan application (decision document scan business application 52) (sequence SQ18).

  Upon receiving the result notification from the file post-processing unit 23, the scan application (decision document scan business application 52) notifies the interface unit 22 of the result (sequence SQ19).

  Upon receiving the result notification from the signature file creation unit 24, the interface unit 22 displays the result on the operation panel 11 (sequence SQ20).

  By performing the processing shown in FIG. 10, the digital multi-function peripheral 1 automatically selects an appropriate electronic signature key from among a plurality of electronic signature keys possessed by one user, and assigns the electronic signature. be able to.

  An example of the signature key selection process is shown in FIG. FIG. 11 is a flowchart (part 1) showing the signature key selection process.

  In step S <b> 1, the scan application (for example, the approval document scan business application 52) sets profile information included in the signature key list presented by the signature data creation unit 25 and the scan application (decision document scan business application 52). The information is compared with each other to determine whether or not there is profile information having the same organization name.

  If the scan application (decision document scan business application 52) determines that there is profile information that matches the organization name (YES in step S1), the scan application extracts the profile information and proceeds to step S2, where profile information that matches the organization name is found. If it is determined that it does not exist (NO in step S1), the process proceeds to step S4.

  In step S2, the scan application (decision document scan business application 52) compares the profile information extracted in step S1 with the setting information of the scan application (decision document scan business application 52). It is determined whether three or more profile information exists.

  If the scan application (decision document scan business application 52) determines that there is profile information with a job title level of 3 or higher (YES in step S2), the profile application extracts the profile information and proceeds to step S3. If it is determined that there is no information (NO in step S2), the process proceeds to step S4.

  In step S3, the scan application (approval document scan business application 52) selects the extracted profile information (or the signature key corresponding to the profile information) as a valid signature key. If there are a plurality of profile information in the process up to step S2, a signature key that strictly satisfies the conditions (for example, a signature key of exactly 3 instead of a job title level of 3 or higher) is used as an effective signature key. One signature key is selected by selecting or preferentially selecting a key having a small key ID.

  On the other hand, in step S4, the scan application (decision document scan business application 52) determines that there is no valid signature key profile information. For example, the scan application selected on the operation panel 11 via the interface unit 22 or the like is used. Execute error processing such as displaying an error message indicating that there is no appropriate signature key to use the application.

  A valid signature key can be selected by the scan application performing the process shown in FIG. In addition, in the process of FIG. 11, the process order of step S1 and step S2 is not ask | required.

  Another example of the signature key selection process is shown in FIG. FIG. 12 is a flowchart (part 2) illustrating the signature key selection process.

  In FIG. 10, the scan application (for example, the approval document scan business application 52) sets the profile information included in the signature key list presented by the signature data creation unit 25 and the setting of the scan application (decision document scan business application 52). The information is compared to determine whether the organization names match and the job title level satisfies a predetermined condition (3 or more), and the signature key is selected. For example, as shown in step S10, the signature is The profile information included in the signature key list presented by the data creation unit 25 may be referred to determine whether the signature key is within the expiration date.

  If the scan application (decision document scan business application 52) determines that a signature key within the valid period exists (YES in step S10), the scan application extracts profile information within the valid period and proceeds to step S11, where the signature key within the valid period is reached. If it is determined that no exists (NO in step S10), the process proceeds to step S14.

  The processing from step S11 to step S14 is the same as the processing from step S1 to step S4 in FIG.

  A valid signature key can also be selected by the scan application performing the process shown in FIG. In addition, in the process of FIG. 12, the process order of step S10, step S11, and step S12 is not ask | required.

  Hereinafter, another example of the signature key selection process is shown in FIG. FIG. 13 is a flowchart (part 3) illustrating the signature key selection process.

  For example, in FIG. 10, the scan application (for example, the approval document scan business application 52) displays the profile information included in the signature key list presented by the signature data creation unit 25 and the scan application (decision document scan business application 52). The setting information is compared to determine whether the organization names match and the job title level satisfies a predetermined condition (3 or more), and the signature key is selected. In this case, as shown in FIG. 6, neither the organization name nor the required post level is set, so that the scan application (general document scan application 53) is presented by the signature data creation unit 25 as shown in step S20. The profile information included in the signed key list may be referenced to determine whether or not the signature key is within the valid period. .

  If the scan application (general document scan application 53) determines that there is a signature key within the valid period (YES in step S20), the profile information within the valid period is extracted and the process proceeds to step S21. If it is determined that it does not exist (NO in step S20), the process proceeds to step S22.

  The process of step S21 is the same as the process of step S3. Moreover, the process of step S22 is the same as the process of step S4.

  A valid signature key can also be selected by the scan application performing the process shown in FIG.

  In the first embodiment, the example in which the signature data creation unit 25 is configured by one card application 45 has been described. However, in the second embodiment, an example in which the signature data creation unit 25 is configured by a plurality of card applications 45 will be described. Do. When the signature data creation unit 25 is configured by a plurality of card applications 45, the IC card 2 can be realized by a multi-application IC card instead of a normal IC card.

  Hereinafter, another example of setting information of the approval document scan business application 52 will be described with reference to FIG. FIG. 14 is a diagram (part 2) illustrating setting information of the approval document scanning business application.

  In the setting information shown in FIG. 14, the approval document scanning business application 52 uses the card application 45 identified by the card application ID “002”, and the user who gives the electronic signature belongs to the “accounting department”. The job title level indicates that “3” or higher is required.

  The card application ID to be used is different from the setting information of the approval document scanning business application 52 shown in the first embodiment.

  Hereinafter, another example of setting information of the general document scanning application 53 will be described with reference to FIG. FIG. 15 is a diagram (part 2) illustrating setting information of the general document scanning application.

  In the setting information shown in FIG. 15, the general document scanning application 53 uses the card application 45 identified by the card application ID “003”, and the user who gives the electronic signature may belong to any place, It also shows that no job title level is required, that is, anyone can do it.

  The card application ID to be used is different from the setting information of the general document scanning application 53 shown in the first embodiment.

  As shown in FIGS. 14 and 15, in the second embodiment, the scan application and the card application 45 of the signature data creation unit 25 are associated with each other on a one-to-one basis. Note that the setting information of the receipt scanning business application 51 is the same as the setting information shown in FIG.

  Hereinafter, another example of the internal configuration of the signature data creation unit 25 is shown in FIG. FIG. 16 is a diagram (part 2) illustrating an internal configuration of the signature data creation unit.

  In the first embodiment, an example in which the signature data creation unit 25 is configured by one card application 45 having a plurality of signature key sets has been described. On the other hand, as shown in FIG. 16, the signature data creation unit 25 may be configured with a plurality of card applications 45 having one signature key set.

  When the signature data creation unit 25 is composed of a plurality of card applications 45, as shown in FIG. 16, each card application 45 has one signature key set as data and a designated key as a method (or function). And a signature execution method for executing encryption processing according to, and a signature key profile information presentation method for presenting profile information of a signable key.

  Hereinafter, an example of the electronic signature adding process is shown in FIG. FIG. 17 is a sequence diagram (part 2) of the electronic signature attaching process.

  First, the user activates the scan function of the digital multi-function peripheral 1 by pressing a scanner activation button. Upon receiving information indicating that the scanner activation button has been pressed by the user, the digital multifunction peripheral 1 scans applications that can be used by the user, for example, a receipt scanning application 51, an approval document scanning business application 52, and a general document scanning application. 53 are displayed as a list on the operation panel 11 via the interface unit 22. An example of the operation panel 11 is a liquid crystal display with a touch function, for example.

  After inserting the user's own IC card 2 into the IC card R / W 13, the user selects a scanner application from the displayed list according to the business and the like, and puts a paper document (for example, an approval document) on the image scanner 12. The scan is started (sequence SQ31). In FIG. 17, description will be made assuming that the user has selected the approval document scan business application 52.

  When data input is instructed by the user, interface unit 22 informs target data input unit 21 that the data input has been instructed by the user (sequence SQ32).

  When the target data input unit 21 receives an instruction from the interface unit 22 to input data by the user, the target data input unit 21 reads the paper document set by the user to generate signature target data (sequence SQ33), and scan application (decision). (Sequence SQ34).

  The scan application (decision document scan business application 52) expands the signature target data passed from the target data input unit 21 on the RAM 17, and instructs the target data preprocessing unit 26 to perform preprocessing (sequence SQ35).

  The target data pre-processing unit 26 performs a one-way function on the signature target data instructed to be processed by the scan application (decision document scan business application 52) (sequence SQ36), creates a message digest of the signature target data, The data is expanded on the RAM 17 and the message digest is returned to the scan application (decision document scan application 52) (sequence SQ37).

  On the other hand, the scan application (decision document scan business application 52) generates a signature data profile request for calling a signature key profile information presentation method of the card application 45 in the IC card 2 via the IC card R / W 13. To the unit 25 (card application 002) (sequence SQ38). At this time, as shown in FIG. 14, the approval document scan application 52 includes “002” as a card application ID to be used in the signature key profile information presentation request and the signature data via the IC card R / W 13. The data is transferred to the creation unit 25 (card application 002).

  When the signature data creation unit 25 (card application 002) receives the signature key profile information presentation request from the scan application (decision document scan business application 52), it executes the signature key list presentation method of the card application 002 (sequence SQ39). The profile information is presented to the scan application (decision document scan business application 52) (sequence SQ40).

  The scan application (decision document scan business application 52) compares the presented profile information with the setting information of the scan application (decision document scan business application 52) to determine whether or not the signature key is valid. (Sequence SQ41). For example, the approval document scanning business application 52 determines whether the profile information of the presented signature key is the accounting department and the job title level is 3 or higher. Details of the signature key determination processing are shown in FIGS. In the following description, it is assumed that the presented profile information is valid signature key profile information.

  When the scan application (decision document scan application 52) determines that the signature information is valid signature key profile information, for example, the signature key identifier (key ID) determined to be valid signature key profile information and the RAM 17 The signature data creation request for calling the signature execution method of the card application (card application 002) 45 in the IC card 2 using the corresponding message digest held above as a parameter is sent via the IC card R / W 13 to the signature data. The data is passed to the creation unit 25 (sequence SQ42).

  When the signature data creation unit 25 (card application 002) receives the signature data creation request from the scan application (decision document scan business application 52), it executes the signature execution method of the corresponding card application 45 based on the parameters (sequence). SQ43), the signature data as the execution result is returned to the scan application (decision document scan business application 52) (sequence SQ44). For example, the signature execution method encrypts the message digest by the RSA 1024 bit method or the like with the signature key identified by the profile name and / or key identifier given as parameters.

  Upon receiving the signature data from the signature data creation unit 25, the scan application (decision document scan business application 52) converts the signature data into a file and creates a signature file (sequence SQ45), for example, post-processing including the signature file Is sent to the file post-processing unit 23 (sequence SQ46).

  When the file post-processing unit 23 receives a post-processing request from the scan application (finalization document scan business application 52), the file post-processing unit 23 transmits the signature file included in the post-processing request to the electronic document storage server 3 to request storage. Then (sequence SQ47), the result of post-processing (for example, storage completion) is notified to the scan application (decision document scan business application 52) (sequence SQ48).

  Upon receiving the result notification from the file post-processing unit 23, the scan application (decision document scan business application 52) notifies the interface unit 22 of the result (sequence SQ49).

  Upon receiving the result notification from the signature file creation unit 24, the interface unit 22 displays the result on the operation panel 11 (sequence SQ50).

By performing the processing as shown in FIG. 17, the digital multi-function peripheral 1 gives an electronic signature by using an appropriate electronic signature key among a plurality of electronic signature keys possessed by one user. Can do.
An example of the signature key determination process is shown in FIG. FIG. 18 is a flowchart (part 1) illustrating the signature key determination process.

  In step S30, the scan application (for example, the approval document scan business application 52) compares the profile information presented by the signature data creation unit 25 with the setting information of the scan application (decision document scan business application 52). To determine whether the organization names match.

  If the scan application (decision document scan business application 52) determines that the organization names match (YES in step S30), the process proceeds to step S31, and if it determines that the organization names do not match (NO in step S30), the process proceeds to step S32. .

  In step S31, the scan application (decision document scan business application 52) compares the profile information presented by the signature data creation unit 25 with the setting information of the scan application (decision document scan business application 52), and For example, it is determined whether or not the post level of the profile information presented by the signature data creation unit 25 is 3 or higher.

  When the scan application (decision document scan business application 52) determines that the job information level of the profile information presented by the signature data creation unit 25 is 3 or more (YES in step S31), the scan application ends, and the signature data creation unit If it is determined that the position level of the profile information presented by 25 is not 3 or more (NO in step S31), the process proceeds to step S32.

  In step S 32, the selected scan application is used on the operation panel 11, for example, via the interface unit 22, assuming that the scan application (approval document scan business application 52) is not valid signature key profile information. Error processing such as displaying an error message indicating that an appropriate signature key does not exist is executed.

  When the scan application performs the process as shown in FIG. 18, it is possible to determine whether or not the signature key is valid (profile information). In addition, in the process of FIG. 18, the process order of step S30 and step S31 is not ask | required.

  Hereinafter, another example of the signature key determination process is shown in FIG. FIG. 19 is a flowchart (part 2) illustrating the signature key determination process.

  In FIG. 18, the scan application (for example, the approval document scan business application 52) compares the profile information presented by the signature data creation unit 25 with the setting information of the scan application (decision document scan business application 52). Then, it is determined whether the organization names match and the job title level satisfies a predetermined condition (3 or more), and the validity of the signature key (profile information thereof) is determined. For example, as shown in step S40 The profile data presented by the signature data creation unit 25 may be referred to determine whether the signature key is within the validity period.

  If the scan application (decision document scan business application 52) determines that the signature key is within the expiration date (YES in step S40), the process proceeds to step S41, and if it is determined that the signature key is not within the expiration date (NO in step S40) ), The process proceeds to step S43.

  The processing from step S41 to step S43 is the same as the processing from step S30 to step S32 in FIG.

  The scan application can also determine whether or not the signature key is valid by performing the processing shown in FIG. In addition, in the process of FIG. 19, the process order of step S40, step S41, and step S42 is not ask | required.

  Hereinafter, another example of the signature key determination process is shown in FIG. FIG. 20 is a flowchart (part 3) illustrating the signature key determination process.

  For example, in FIG. 18, the scan application (for example, the approval document scan business application 52) compares the profile information presented by the signature data creation unit 25 with the setting information of the scan application (the approval document scan business application 52). Then, it is determined whether the organization names match and the job title level satisfies a predetermined condition (3 or more), and the validity of the signature key (profile information) is determined. In the case of 53, since neither the organization name nor the required post level is set as shown in FIG. 15, the scan application (general document scan application 53) is executed by the signature data creating unit 25 as shown in step S50. You may make it determine only whether it is the signature key within an expiration date with reference to the profile information shown.

  If the scan application (general document scan application 53) determines that the signature key is within the expiration date (YES in step S50), the process ends and if it is determined that the signature key is not within the expiration date (NO in step S50). The process proceeds to step S51.

  The process of step S51 is the same as the process of step S32.

  The scan application can also determine whether or not the signature key is valid by performing the processing shown in FIG.

  As described above, according to the present invention, an appropriate signature key can be automatically selected when one user can use a plurality of electronic signature keys.

  The preferred embodiments of the present invention have been described in detail above, but the present invention is not limited to such specific embodiments, and various modifications can be made within the scope of the gist of the present invention described in the claims.・ Change is possible.

It is a system block diagram of an example of an electronic signature provision system. It is a hardware block diagram of a digital multi-function peripheral and an IC card. 2 is a functional configuration diagram of an example of a digital multifunction peripheral and an IC card. FIG. It is a figure which shows an example of the setting information of a receipt scanning business application. FIG. 10 is a diagram (part 1) illustrating setting information of a decision scan business application; FIG. 10 is a diagram (part 1) illustrating setting information of a general document scanning application. FIG. 3 is a diagram (part 1) illustrating an internal configuration of a signature data creation unit. It is a figure which shows an example of the signature key set of Mr. A who is the accounting department manager. It is a figure which shows an example of the signature key set of Mr. B who is a general member of the accounting department. It is a sequence diagram (the 1) of an electronic signature provision process. It is a flowchart (the 1) which shows a signature key selection process. It is a flowchart (the 2) which shows a signature key selection process. It is a flowchart (the 3) which shows a signature key selection process. It is FIG. (2) which shows the setting information of a written approval scan business application. FIG. 10 is a diagram (part 2) illustrating setting information of a general document scanning application. It is FIG. (2) which shows the internal structure of a signature data preparation part. It is a sequence diagram (the 2) of an electronic signature provision process. It is a flowchart (the 1) which shows a signature key determination process. It is a flowchart (the 2) which shows a signature key determination process. It is a flowchart (the 3) which shows a signature key determination process.

Explanation of symbols

1 Digital MFP 2 IC Card 3 Electronic Document Storage Server 11 Operation Panel 12 Image Scanner 13 IC Card R / W
14 CPU
15 Hard disk drive 16 ROM
17 RAM
18 Media Drive 19 Network Adapter 21 Target Data Input Unit 22 Interface Unit 23 File Post-Processing Unit 25 Signature Data Creation Unit 26 Target Data Pre-Processing Unit 41 CPU
42 RAM
43 Flash ROM
45 Electronic signature card application 51 Receipt scanning business application 52 Approval document scanning business application 53 General document scanning application

Claims (17)

  1. An electronic signature affixing method in an electronic signature affixing device that includes at least one scan application in which setting information is set, and that imparts an electronic signature to electronic data,
    The scan application requests at least one signature key attribute information, at least one signature key attribute information obtained in response to the request, and setting information set in the requested scan application If, by comparing the signature key selection step of selecting a signature key corresponding to the attribute information of a valid signature key in the attribute information of the one or more signature keys,
    And electronic data input as an electronic signature subject, a signing key selected in the signature key selection step, and the electronic signature file creation step that creates a digital signature file on the basis of the signature data generated using,
    A method for providing an electronic signature, comprising:
  2. Signature The digital signing apparatus capable of communicating with the portable information processing apparatus, in response to said request for an electronic signature file creation step, an electronic data input as an electronic signature target, selected in the signature key selection step digital signing method of claim 1 Symbol placement, characterized by further comprising a signature data creation step of creating a signature data by using the key and, the.
  3. 3. The electronic signature adding method according to claim 1, further comprising an electronic signature file storage step of storing the electronic signature file created in the electronic signature file creation step in a storage unit.
  4. An electronic signature affixing method in an electronic signature affixing device that includes at least one scan application in which setting information is set, and that imparts an electronic signature to electronic data,
    The scan application requests at least one signature key attribute information, and compares the signature key attribute information obtained in response to the request with the setting information set in the requested scan application. A signature key attribute information determination step for determining whether the attribute information of the signature key is valid signature key attribute information;
    And electronic data input as an electronic signature target, electrons on the basis of the signature data generated using a signature key corresponding to the attribute information of the signature key determined to be effective in the signature key attribute information determination step An electronic signature file creation stage for creating a signature file ;
    A method for providing an electronic signature, comprising:
  5. A portable information processing apparatus capable of communicating with the electronic signature providing apparatus is effective in the electronic data input as an electronic signature object and the signature key attribute information determination stage in response to a request in the electronic signature file creation stage. and the determined signature key and an electronic signing method of claim 4 Symbol mounting, characterized by further comprising a signature data creation step of creating a signature data by using the corresponding to the attribute information of the signature key.
  6. 6. The method of providing an electronic signature according to claim 4, further comprising an electronic signature file storage step of storing the electronic signature file created in the electronic signature file creation step in a storage means.
  7. An electronic signature attaching device for attaching an electronic signature to electronic data,
    Even without least requesting attribute information of the one or more signature keys, the signature key corresponding to the attribute information of a valid signature key in the attribute information of one or more signature key obtained in response to the request a is selected, and at least one or more of the scan application,
    And electronic data input as an electronic signature subject, and the electronic signature file creation means for creating an electronic signature file based on signature data created using a signing key selected in the scan application,
    I have a,
    By comparing the attribute information of at least one signature key obtained in response to the request with the setting information set in the requested scan application, the scan application in which setting information is set, An electronic signature providing apparatus , wherein a signature key corresponding to valid signature key attribute information is selected from the one or more signature key attribute information .
  8. And electronic data input as an electronic signature target, No further mounting Claim 7 Symbol characterized by having a signature data generating means for generating signature data using the signature key that is selected in the scan app Electronic signature assigning device.
  9. The signature data generating means, in response to the request, one or more of claims 8 Symbol mounting digital signing apparatus attribute information to said collection to Rukoto the signature key.
  10. 10. The electronic signature adding apparatus according to claim 7, further comprising an electronic signature file storage unit that stores the electronic signature file created by the electronic signature file creation unit in a storage unit.
  11. An electronic signature attaching device for attaching an electronic signature to electronic data,
    Requesting attribute information of the signing key, determining the efficacy of the attribute information of the signature key obtained in response to the request, at least one or more scan app
    And electronic data input as an electronic signature subject, a signature key corresponding to the attribute information of the determined signature key to be effective in the scanning application, the digital signature file on the basis of the signature data generated using the An electronic signature file creation means to create;
    I have a,
    The scan application in which the setting information is set compares the signature key attribute information obtained in response to the request with the setting information set in the requested scan application, thereby obtaining the signature key attribute. An electronic signature affixing device for determining whether or not information is attribute information of a valid signature key .
  12. Further comprising electronic data input as an electronic signature subject, a signature key corresponding to the attribute information of the signature key determined to be effective in the scanning application, the signature data generating means for generating signature data by using the digital signing apparatus according to claim 11 Symbol mounting, characterized in that.
  13. The signature data generating means, in response to the request, the corresponding claim 12 Symbol mounting digital signing apparatus characterized Rukoto Tokusu preparative attribute information of the signature key.
  14. 14. The electronic signature providing apparatus according to claim 11, further comprising an electronic signature file storage unit that stores the electronic signature file created by the electronic signature file creation unit in a storage unit.
  15. Computer
    Even without least requesting attribute information of the one or more signature keys, the signature key corresponding to the attribute information of a valid signature key in the attribute information of one or more signature key obtained in response to the request a is selected, and at least one or more of the scan application,
    And electronic data input as an electronic signature target, said a signing key selected in scan application, and the electronic signature file creation means for creating an electronic signature file based on signature data created using, to Make it work ,
    By comparing the attribute information of at least one signature key obtained in response to the request with the setting information set in the requested scan application, the scan application in which setting information is set, digital signing program characterized Rukoto operated to select a signature key corresponding to the attribute information of a valid signature key in the attribute information of the one or more signature keys.
  16. Computer
    Requesting attribute information of the signing key, determining the efficacy of the attribute information of the signature key obtained in response to the request, at least one or more scan app
    And electronic data input as an electronic signature subject, a signature key corresponding to the attribute information of the determined signature key to be effective in the scanning application, the digital signature file on the basis of the signature data generated using the Operate as electronic signature file creation means to create ,
    The scan application in which the setting information is set compares the signature key attribute information obtained in response to the request with the setting information set in the requested scan application, thereby obtaining the signature key attribute. digital signing program information is characterized Rukoto operated to determine whether the attribute information of a valid signature key.
  17. A computer-readable recording medium on which the electronic signature applying program according to claim 15 or 16 is recorded.
JP2004227910A 2004-08-04 2004-08-04 Electronic signature assigning method, electronic signature assigning apparatus, electronic signature assigning program, and recording medium Expired - Fee Related JP4653436B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2004227910A JP4653436B2 (en) 2004-08-04 2004-08-04 Electronic signature assigning method, electronic signature assigning apparatus, electronic signature assigning program, and recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2004227910A JP4653436B2 (en) 2004-08-04 2004-08-04 Electronic signature assigning method, electronic signature assigning apparatus, electronic signature assigning program, and recording medium

Publications (2)

Publication Number Publication Date
JP2006050210A JP2006050210A (en) 2006-02-16
JP4653436B2 true JP4653436B2 (en) 2011-03-16

Family

ID=36028257

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2004227910A Expired - Fee Related JP4653436B2 (en) 2004-08-04 2004-08-04 Electronic signature assigning method, electronic signature assigning apparatus, electronic signature assigning program, and recording medium

Country Status (1)

Country Link
JP (1) JP4653436B2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4410166B2 (en) 2005-07-14 2010-02-03 株式会社リコー Image forming apparatus, electronic signature generation method, electronic signature generation program, and recording medium
JP4753418B2 (en) * 2005-08-02 2011-08-24 株式会社リコー Image processing apparatus and image processing method
US10447673B2 (en) 2013-08-05 2019-10-15 Sony Corporation Information processing apparatus, information processing method, and computer program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000227755A (en) * 1998-12-24 2000-08-15 Pitney Bowes Inc Selective safe level proofing meter
JP2002164884A (en) * 2000-11-02 2002-06-07 Internatl Business Mach Corp <Ibm> Proxy server, electronic signature system, electronic signature verification system, network system, electronic signature method, electronic signature verification method, recording medium and program transmission device
JP2003234729A (en) * 2001-12-19 2003-08-22 Trw Inc Revocation and updating of token in public key infrastructure system
JP2003281333A (en) * 2002-03-25 2003-10-03 Mitsubishi Electric Information Systems Corp System, method and program for electronic signature, and recording medium having the program recorded thereon
JP2003318885A (en) * 2002-04-23 2003-11-07 Canon Inc Electronic signature device, electronic signature checking device and methods for these devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000227755A (en) * 1998-12-24 2000-08-15 Pitney Bowes Inc Selective safe level proofing meter
JP2002164884A (en) * 2000-11-02 2002-06-07 Internatl Business Mach Corp <Ibm> Proxy server, electronic signature system, electronic signature verification system, network system, electronic signature method, electronic signature verification method, recording medium and program transmission device
JP2003234729A (en) * 2001-12-19 2003-08-22 Trw Inc Revocation and updating of token in public key infrastructure system
JP2003281333A (en) * 2002-03-25 2003-10-03 Mitsubishi Electric Information Systems Corp System, method and program for electronic signature, and recording medium having the program recorded thereon
JP2003318885A (en) * 2002-04-23 2003-11-07 Canon Inc Electronic signature device, electronic signature checking device and methods for these devices

Also Published As

Publication number Publication date
JP2006050210A (en) 2006-02-16

Similar Documents

Publication Publication Date Title
JP4267011B2 (en) Image forming apparatus, authority control server, and image forming system
EP1729240B1 (en) Image processing apparatus connected to network
JP4024077B2 (en) Print data management system, method, program, and recording medium
RU2421778C2 (en) Print managing server, print managing method, programme, and recording medium
JP2007213246A (en) Application execution device, application execution method and application execution program
KR20100131942A (en) Method and system for printing documents from a portable device
JP2012252579A (en) Image forming system, image forming apparatus, and program
EP1238321B1 (en) Method and system for generating a secure electronic signature
US8009311B2 (en) Output system, network device, device using apparatus, output control program and output request program, and output method
CN101472034A (en) Print control system, print control server, imaging apparatus and print control method
JP2009271680A (en) License management device and method and license management system
JP2003123060A (en) Method and apparatus to biometrically authenticate mfp users
JP2007087322A (en) Workflow system, server system, processing method of workflow system, and workflow program
JP2002236577A (en) Automatic authenticating method for print processing and system thereof
US9245212B2 (en) Printing system and printing method wherein print data formed by print data forming device are printed by printer apparatus
CN101176337A (en) Scanning systems and methods
US8370632B2 (en) Apparatus and method for incorporating signature into electronic documents
US8056140B2 (en) Multifunction peripheral and method for controlling the same
US8255784B2 (en) Information processing apparatus, information processing system, computer readable medium storing control program, information processing method, and image processing apparatus
JP2008092597A (en) Image processor and operation mode switching method for same
US8424056B2 (en) Workflow system and object generating apparatus
US7484104B2 (en) Information processor and information processing method for cooperative operation of job processor
CN101194223B (en) Printing system and method
US8601559B2 (en) Image output authentication system, image output authentication server, and image output authentication method
JP2006150629A (en) Printing device and its controlling method, computer program, and storage medium

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20070614

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20100831

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20101101

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20101124

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20101217

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20131224

Year of fee payment: 3

LAPS Cancellation because of no payment of annual fees