US20050108530A1 - Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program - Google Patents

Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program Download PDF

Info

Publication number
US20050108530A1
US20050108530A1 US10/991,315 US99131504A US2005108530A1 US 20050108530 A1 US20050108530 A1 US 20050108530A1 US 99131504 A US99131504 A US 99131504A US 2005108530 A1 US2005108530 A1 US 2005108530A1
Authority
US
United States
Prior art keywords
authentication
information
mail
user
transmission protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/991,315
Inventor
Nobuyuki Tonegawa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TONEGAWA, NOBUYUKI
Publication of US20050108530A1 publication Critical patent/US20050108530A1/en
Priority to US13/109,455 priority Critical patent/US8621579B2/en
Priority to US14/087,831 priority patent/US10243948B2/en
Priority to US16/260,598 priority patent/US20190158485A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Definitions

  • the present invention relates to a communication apparatus, an electronic mail transmitting method, and an electronic mail transmitting program, which transmit electronic mails according to a predetermined transmission protocol.
  • Electronic mail communication for exchanging character information via a network has been prevailing.
  • Electronic mail can transmit not only the body of an electronic mail message as character information but also files in various formats as an attachment thereto.
  • Internet FAX which transmits and receives image data as an attached file in the TIFF (Tag Image File Format) format has come into proliferation.
  • Internet FAX (hereinafter referred to “iFAX”) is a communication technique used for communication between a transmitting apparatus and a receiving apparatus, in which the transmitting apparatus converts image data read using a scanner into the TIFF format and transmits the TIFF image data to the receiving apparatus, and the receiving apparatus prints out the received TIFF image data.
  • iFAX Internet FAX
  • SMTP authentication technique in which when transmitting an electronic mail to the mail address of a transmission destination according to Simple Mail Transfer Protocol (SMTP), user authentication is carried out by a mail server before transmission, so as to prevent illegal replaying of an electronic mail with a false mail address, is standardized in the technical specification RFC 2554.
  • SMTP Simple Mail Transfer Protocol
  • An example of such conventional technique of transmitting an electronic mail after execution of user authentication is described e.g. in Japanese Laid-Open Patent Publication (Kokai) No. H11-234496.
  • the assignee of the present application has already proposed a method in which when a user logs in to an authentication server in advance before transmitting an electronic mail, to have his/her user name and password authenticated, he/she acquires an electronic mail address associated with the authenticated user name, and then transmits the electronic mail to the mail address of a transmission destination, using the acquired mail address as the address of the transmission source (Japanese Patent Application No. 2003-066857).
  • a log of the user name of a user who logged in to the authentication server can be stored as a transmission log in the apparatus.
  • the log stored in the apparatus is different from the log stored in the mail server, which makes it difficult to correlate these logs with each other, and hence to identify the real sender.
  • a person other than the user who knows the user name and password specific to the apparatus, might perform a transmitting operation using the mail address as a disguised user.
  • a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input device via which user information is input, a user authentication requesting device that requests the authentication apparatus to authenticate the input user information, an authentication information acquisition device that is operable when the user information is authenticated, to acquire information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, a transmission authentication requesting device that requests the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission device that is operable when the acquired information for authentication is authenticated, to transmit an electronic mail to the mail distributing apparatus according to the transmission protocol.
  • authentication of the input user information is requested of the authentication apparatus, and when the user information is authenticated, information for authentication according to the transmission protocol associated with the authenticated user information is acquired from the authentication apparatus. Then, authentication of the acquired information for authentication is requested of the mail distributing apparatus according to the transmission protocol, and when the acquired information for authentication is authenticated, an electronic mail is transmitted to the mail distributing apparatus according to the transmission protocol.
  • the authentication apparatus comprises a storage device that stores an electronic mail address associated with the user information and the information for authentication according to the transmission protocol associated with the user information, and the authentication information acquisition device acquires the electronic mail address and the information for authentication stored in the storage device.
  • an electronic mail address associated with the authenticated user information is acquired from the authentication apparatus. This makes it possible to prevent relaying of malicious electronic mails e.g. using false electronic mail addresses.
  • the information for authentication comprises a user name and a password for SMTP authentication, the user name and the password being associated with the user information.
  • a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an authentication information storage device that stores information for authentication according to the transmission protocol, an input device via which user information is input, a user authentication requesting device that requests authentication of the input user information, an authentication information acquisition device that is operable when the user information is authenticated, to acquire information for authentication according to the transmission protocol associated with the authenticated user information from the authentication information storage device, a transmission authentication requesting device that requests the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission device that is operable when the acquired information for authentication is authenticated, to transmit an electronic mail to the mail distributing apparatus according to the transmission protocol.
  • the authentication information storage device stores an electronic mail address associated with the user information and the information for authentication according to the transmission protocol associated with the user information, and the authentication information acquisition device acquires the electronic mail address and the authentication information stored in the authentication information storage device.
  • the information for authentication comprises a user name and a password for SMTP authentication, the user name and the password being associated with the user information.
  • an electronic mail transmitting method executed by a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input step of inputting user information, a user authentication requesting step of requesting the authentication apparatus to authenticate the input user information, an authentication information acquisition step of acquiring information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, when the user information is authenticated, a transmission authentication requesting step of requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission step of transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the acquired information for authentication is authenticated.
  • an electronic mail transmitting method executed by a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input step of inputting user information, a user authentication requesting step of requesting authentication of the input user information, a retaining step of retaining information for authentication according to the transmission protocol on a user-by-user basis, an authentication information acquisition step of acquiring information for authentication according to the transmission protocol associated with the authenticated user information, from the authentication information retained in the retaining step, a transmission authentication requesting step of requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission step of transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the information for authentication is authenticated.
  • an electronic mail transmitting program executed by a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input module for inputting user information, a user authentication requesting module for requesting the authentication apparatus to authenticate the input user information, an authentication information acquisition module for acquiring information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, when the user information is authenticated, a transmission authentication requesting module for requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission module for transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the acquired information for authentication is authenticated.
  • an electronic mail transmitting program executed by a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input module for inputting user information, a user authentication requesting module for requesting authentication of the input user information, a retaining module for retaining information for authentication according to the transmission protocol on a user-by-user basis, an authentication information acquisition module for acquiring information for authentication according to the transmission protocol associated with the authenticated user information, from the authentication information retained by the retaining module, a transmission authentication requesting module for requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission module for transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the information for authentication is authenticated.
  • FIG. 1 is a diagram showing the overall arrangement of an electronic mail system including a communication apparatus according to a first embodiment of the present invention
  • FIG. 2 is a block diagram showing the configuration of a MFP (Multi-Function Peripheral) appearing in FIG. 1 ;
  • MFP Multi-Function Peripheral
  • FIG. 3 is a diagram showing the layered structure of network protocols possessed by the MFP
  • FIG. 4 is a diagram showing an operating screen displayed during execution of a program for looking up user information registered in an authentication server appearing in FIG. 1 and/or editing contents of the user information;
  • FIG. 5 is a flowchart of a log-in process executed by the MFP for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication password;
  • FIG. 6 is a diagram useful in explaining details of the procedure of processing carried out between the MFP and the authentication server, for user authentication;
  • FIG. 7 is a diagram showing a transmission setup screen displayed on an operating section
  • FIG. 8 is a diagram showing an address book for managing transmission destination information
  • FIG. 9 is a flowchart of a transmission process for reading an original by a scanner and then transmitting an E-mail to destinations;
  • FIG. 10 is a diagram useful for explaining details of the procedure of SMTP authentication performed between the MFP and a mail server, executed in a step S 17 in FIG. 9 ;
  • FIG. 11 is a diagram showing an operating screen displayed during execution of a program for looking up user information registered in the authentication server and/or editing contents of the user information, according to a second embodiment of the present invention.
  • FIG. 12 is a flowchart of a log-in process executed by the MFP for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication user password;
  • FIG. 13 is a diagram showing a transmission setup screen displayed on an operating section.
  • FIG. 1 is a diagram showing the overall arrangement of an E-mail system including a communication apparatus according to a first embodiment of the present invention.
  • the E-mail system is comprised of a plurality of apparatuses and devices connected to a first network 105 and a second network 125 via the Internet 110 as a worldwide network.
  • the first network 105 is assigned a domain name “xyz.co.jp”, and has connected thereto MFPs (Multi Function Peripherals) 100 and 101 , an authentication server 102 , a Mail/POP server 103 , and a client PC 104 .
  • a second network 125 is assigned a domain name “abc.co.jp”, and has connected thereto a Mail and POP server 120 , a PC 121 , and an Internet FAX 122 .
  • the MFPs 100 and 101 are equipped with a scanner and a printer, and have a copying function, a facsimile (FAX) transmitting and receiving function, and a printer function for printing data generated by a computer. Further, the MFP 100 is assigned a host name “copy1.xyz.co.jp” and an E-mail address “ifax@copy1.xyz.co.jp”. The MFP 101 is assigned a host name “copy2.xyz.co.jp” and an E-mail address “ifax@copy2.xyz.co.jp”.
  • the authentication server 102 performs user authentication for the domain of the first network 105 , and a plurality of pairs of user names and passwords valid in the domain are registered in the authentication server 102 .
  • the PC 104 has general-purpose E-mail software installed therein, and is assigned an E-mail address “syain1@xyz.co.jp”.
  • the client PC 104 inquires of the authentication server 102 as to whether or not the entered user name and the password match the registered user name and password. If the user has the user name and the password registered in the authentication server 102 , the use of the PC 104 is permitted.
  • the Mail/POP server 103 has both the functions of a mail server (SMTP server) and a POP server. Needless to say, the mail server (SMTP server) and the POP server may be implemented by respective separate apparatuses.
  • the Mail/POP server 120 in the domain of the second network 125 has the same functions as those of the Mail/POP server 103 . For example, when an E-mail is transmitted from the PC 104 to an E-mail address “pcmail@abc.co.jp”, E-mail data generated by the PC 104 is sent to the mail server 103 using SMTP (Simple Mail Transfer Protocol), and then further sent from the mail server 103 to the mail server 120 via the Internet 110 using SMTP.
  • SMTP Simple Mail Transfer Protocol
  • the PC 121 has general-purpose E-mail software installed therein.
  • the PC 121 monitors at predetermined time intervals whether or not any E-mail has arrived at the POP server 120 , using POP3 (Post Office Protocol-Version 3), and if any E-mail has arrived at the POP server 120 , the PC 121 receives the E-mail data.
  • POP3 Post Office Protocol-Version 3
  • the PC 121 having the E-mail address “pcmail@abc.co.jp” sends an E-mail to the PC 104 having the E-mail address “syain1@xyz.co.jp”
  • the route is reversed, that is, E-mail data generated by the PC 121 is sent to the mail server 103 by way of the mail server 120 .
  • the PC 104 acquires the delivered E-mail data using the POP3 protocol.
  • the PC 104 has the capabilities of interpreting E-mail data in the MIME format or the like, and decoding image data contained in the E-
  • the MFPs 100 and 101 have two transmission modes: an E-mail transmission mode for transmitting an image received using the facsimile (FAX) or iFAX receiving function, or a monochrome/color image scanned by the scanner, on the assumption that the same will be sent to a general E-mail address, and an iFAX transmission mode for transmitting the image on the assumption that the same will be sent to an apparatus compliant with the iFAX standard.
  • the MFPs 100 and 101 use SMTP and POP3 as communication protocols to perform operations similar to the transmitting and receiving operations by the PCs described above.
  • an image in the JPEG file format (hereinafter simply referred to as a JPEG image) is transmitted.
  • a JPEG image For example, when a color image is transmitted to the client PC 104 having the E-mail address “syain1@xyz.co.jp”, the PC 104 receives the E-mail and displays the JPEG image, using a general-purpose image viewer.
  • an image in the TIFF format is transmitted according to the technical specification RFC 2301.
  • an image is transmitted or received by the MFP 100 or the MFP 101 compliant with the iFAX standard or the Internet FAX 122 .
  • JPEG images in the TIFF format are transmitted or received.
  • FIG. 2 is a block diagram showing the configuration of the MFP 100 .
  • the MFP 100 and the MFP 101 are identical in configuration, and hence a description will be given of only the configuration of the MFP 100 .
  • the MFP 100 is comprised of a CPU 130 , a ROM 131 , a RAM 132 , an operating section 133 , a scanner 134 , a printer 135 , an image processing circuit 136 , a hard disk 137 , a network interface (I/F) 138 , a formatter section 139 , and a FAX section 140 .
  • I/F network interface
  • the CPU 130 functions as a control circuit that controls the overall operation of the system.
  • the CPU 130 executes programs stored in the ROM 131 and uses the RAM 132 as a work area.
  • the operating section 133 is comprised of hardware keys, such as a start key and keys of a ten key pad, and a LCD display panel that displays buttons as software keys and detects a touch of any of the displayed buttons by a user's finger, for smooth execution of user operation.
  • the scanner 134 converts an original image into electric image data by photoelectric conversion.
  • the scanner 134 is comprised of a platen glass on which an original conveyed from an original feeder is placed, a scanner unit including a lamp for illuminating the original, a CCD image sensor for receiving reflected light from the original, mirrors and lenses for guiding the reflected light from the original to the CCD image sensor, and an A/D conversion circuit for converting an electric signal subjected to photoelectrical conversion by the CCD image sensor into digital data, none of the above-mentioned component elements included in the scanner 134 being shown in FIG. 2 .
  • the lamp When an original conveyed from the original feeder is placed on the platen glass, the lamp is turned on and the scanner unit is caused to start traveling whereby the original is scanned while being exposed to light. Reflected light from the original is guided to the CCD image sensor via the mirrors and the lens. The reflected light is converted into an electric signal by the CDD image sensor, and then the electric signal is converted into digital data by the A/D conversion circuit. After completion of the operation for reading the original, the original is discharged from the platen glass.
  • the printer section 135 prints image data on a recording sheet.
  • the printer section 135 is comprised of a laser emitting section, a photosensitive drum, a transfer section, a fixing section, a discharge roller, and a sorter having a plurality of bins.
  • the laser emitting section generates a laser beam dependent on the image data.
  • a latent image is formed on the photosensitive drum according to the laser beam.
  • Developer is applied to the latent image on the photosensitive drum by a developing device, and a recording sheet is fed from a sheet feed cassette in timing synchronous with the start of laser radiation by the laser emitting section, and conveyed to the transfer section.
  • the developer attached to the photosensitive drum as a developer image is transferred onto the recording sheet.
  • the fixing section fixes the developer image on the recording sheet by heating and pressing the recording sheet.
  • the recording sheet having passed through the fixing section is discharged by the discharge roller. Discharged recording sheets are sorted by the sorter into bins thereof.
  • the image processing circuit 136 is comprised of a large-capacity image memory, an image rotating circuit, a resolution change and scaling circuit, and an encoding and decoding circuit for encoding and decoding MH, MR, MMR, JBIG, JPEG, and like formats of data, and carries out various image processing including shading, trimming, and masking.
  • the hard disk 137 is a large-capacity recording medium connectable by an interface (I/F), such as a SCSI interface or a USB interface.
  • the recording medium is not limited to a hard disk, but a magneto-optical disk (MO) or the like may be employed.
  • the network I/F 138 is implemented by an Ethernet (registered trademark of Xerox Corporation, US) typified by 10 BASE-T and 100 BASE-T, or a Token Ring (registered trademark of IBM Corporation, US), and operates to achieve a network data link for connection to the network.
  • the formatter section 139 includes an IEEE 1284-compliant parallel interface and a PC interface (I/F), such as USB, and generates image data based on PDL (Page Description Language) data received from a personal computer via the PC interface (I/F) or a network I/F 138 .
  • the image processing circuit 136 performs image processing, such as rendering, on the generated image data to print the same by the printer 135 .
  • the FAX section 140 which is connected to a telephone line, is a facsimile I/F circuit including a NCU (Network Control Unit), a MODEM (Modulator/Demodulator), and so on.
  • the FAX section 140 causes the image processing circuit 136 to perform image processing on image data read by the scanner 134 , and then transmits the processed image data to another facsimile (FAX) machine via the telephone line, or receives image data sent from another facsimile (FAX) machine and then causes the image processing circuit 136 to perform image processing on the image data for printing by the printer 135 .
  • the scanner 134 , the printer 135 , the image processing circuit 136 , the formatter section 139 , and the FAX section 140 are interconnected via a high-speed video bus 142 separate from a CPU bus 141 connected to the CPU 130 , so that image data can be transferred at high speed.
  • the use of the high-speed video bus 142 enables the image processing circuit 136 to perform image processing on the image data read by the scanner 134 , and the printer 135 to print the processed image data to thereby realize a copying function.
  • the MFP 100 has a transmission (Send) function for transmitting image data read by the scanner 134 and processed by the image processing circuit 136 to the network 105 via the network I/F, and an iFAX function for transmitting image data generated by the image processing circuit 136 according to the technical specification RFC 2301, using an E-mail protocol.
  • FIG. 3 is a block diagram showing the layered structure of network protocols possessed by the MFP 100 .
  • the network protocols can be roughly grouped into three layers: an IP (Internet Protocol) layer 200 , a TCP (Transmission Control Protocol)/UDP (User Datagram Protocol) layer 201 , and an application layer 202 .
  • IP Internet Protocol
  • TCP Transmission Control Protocol
  • UDP User Datagram Protocol
  • the IP layer 200 is an Internet protocol layer that provides a service for delivering a message from a source host to a destination host via relay nodes, such as routers.
  • the IP layer 200 performs a routing function for managing source addresses from which data is transmitted and destination addresses to which data is transmitted, and determining a route in the network through which data is sent to the destination host, based on address information.
  • the TCP/UDP layer 201 is a transport layer that provides a service for passing a message from a transmission application process to a reception application process.
  • the TCP which is a connection-type service protocol, ensures high reliability for communication, whereas the UDP, which is a connectionless-type service protocol, does not ensure reliability.
  • the application layer 202 defines a plurality of protocols.
  • the protocols defined by this layer 202 include FTP (File Transfer Protocol) as a protocol for file transfer services, SNMP (Network Management Protocol) as a protocol for network management, LPD as a server protocol for printing by the printer, HTTPd as a protocol for WWW (World Wide Web) servers, SMTP (Simple Mail Transfer Protocol) as a protocol for E-mail transmission and reception, and POP3 (Post Office Protocol-Version 3) as a protocol for E-mail downloading.
  • FTP File Transfer Protocol
  • SNMP Network Management Protocol
  • LPD Layer Packe Mail Transfer Protocol
  • HTTPd as a protocol for WWW (World Wide Web) servers
  • SMTP Simple Mail Transfer Protocol
  • POP3 Post Office Protocol-Version 3
  • the application layer 202 also contains a Kerberos authentication program defined by the technical specification RFC 1510.
  • FIG. 4 is a diagram showing an operating screen displayed during execution of a program for looking up user information registered in the authentication server 102 and/or editing contents of the user information.
  • the user information is comprised of a user name 230 , a password 231 , an E-mail address 232 , a SMTP authentication user name 233 , and a SMTP authentication password 234 .
  • the user name 230 is the name of a user who is permitted to use a computer within the domain (principal) assigned the domain name “xyz.co.jp”, which is managed by the authentication server 102 .
  • In the columns of the password 231 there are registered passwords associated with the respective user names. Here, each password is displayed as “xxxxx” so as to prevent a third party from viewing the password easily.
  • E-mail address 232 there are registered E-mail addresses usable by the respective users registered in the authentication server 102 .
  • the E-mail address associated with the user name “syain1” is “syain1@xyz.co.jp”.
  • the E-mail address associated with the user name “syain2” is “syain2@xyz.co.jp”.
  • the E-mail address associated with the user name “syain3” is “syain3@xyz.co.jp”.
  • the E-mail address associated with the user name “syain4” is “syain4@xyz.co.jp”.
  • the E-mail address associated with the user name “syain5” is “syain5@xyz.co.jp”.
  • the SMTP authentication user name 233 and the SMTP authentication password 234 are user names and passwords to be used for SMTP authentication (RFC 2554) which is executed according to the SMTP protocol before transmission of an E-mail e.g. from the MFP 100 , the MFP 101 or the PC 104 to the mail server 103 , to thereby prevent unauthorized access or illegal relay of an E-mail with a false sender name (From Address).
  • RRC 2554 SMTP authentication
  • the SMTP authentication user names associated with the user names “syain1” to “syain5” are identical to the associated user names, it is to be understood that different names can be used.
  • the SMTP authentication password 234 is displayed as “xxxxx” so as to prevent a third party from viewing the same easily.
  • An add key 240 is used for registration of a new user.
  • a delete key 241 is used for deleting a registered user.
  • a property key 242 is used for modifying registered contents, and when the property 242 is depressed, the registered contents are displayed.
  • FIG. 5 is a flowchart of a log-in process executed by the MFP 100 , for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication password.
  • the MFP 100 requests the authentication server 102 to perform user authentication, whereby E-mail can be used using a designated user name.
  • This also applies to the MFP 101 , and therefore a description will be given of the log-in process of the MFP 100 alone.
  • the present log-in process is started on condition that “User Authentication” is set to “Execute” by system user configuration. In this state, processing requiring user operation, such as copying, is disabled, and a screen prompting the user to enter a user name is displayed on the operating section 133 .
  • a user name entry screen is displayed, and entry of a user name by the user is awaited (step S 1 )
  • entry of a password is awaited (step S 2 )
  • the password is entered, the user name and the password are sent to the authentication server 102 for authentication thereby (step S 3 ).
  • step S 4 it is determined whether or not “authentication OK” has been returned from the authentication server 102 , i.e. whether or not it is confirmed by the authentication that the entered user name and password match the user name 230 and the password 231 registered in the authentication server 102 (step S 4 ). If an invalid user name and/or an invalid password have/has been entered, i.e., if not “authentication OK” but “authentication NG” has been returned, the process returns to the step S 1 , wherein the same processing as described above is carried out again on the user name entry screen.
  • an E-mail address 232 of the user having logged in, which is registered in the authentication server 102 is acquired from the authentication server 102 (step S 5 ). Further, the user's SMTP authentication user name 233 and SMTP authentication password 234 are acquired from the authentication server 102 (steps S 6 and S 7 ), followed by terminating the present process.
  • the processing requiring user operation such as copying or transmission (SEND).
  • SEND copying or transmission
  • the user name and the password are entered for user authentication, a method using biometrics authentication based on a fingerprint, an iris pattern, or the like, or a method using a contact-type or non-contact-type control card may be employed.
  • FIG. 6 is a diagram useful in explaining details of the procedure of processing carried out between the MFP 100 and the authentication server 102 , for user authentication.
  • the user authentication method of the authentication server 102 is an authentication method using Kerberos as one of protocols of the application layer 202 . This method is standardized as the technical specification RFC 1510.
  • a Kerberos authentication service request KEB_AS_REQ is sent from the MFP 100 as a client to the authentication server 102 (T 1 ) to make an inquiry as to whether or not the user is valid
  • an encrypted log-on session key and client authentication data are returned as a Kerberos authentication service reply KEB_AS_REP from the authentication server 102 to the MFP 100 (T 2 ).
  • a Kerberos ticket authorization service request KEB_TGS_REQ is generated, and the MFP 100 requests qualification information from the authentication server 102 (T 3 ).
  • Encrypted client authentication data is returned as a Kerberos ticket authorization service reply KEB_TGS_REP from the authentication server 102 (T 4 ).
  • a Kerberos application request KEB_AP_REQ is generated, and the MFP 100 asks the authentication server 102 to permit use of service (T 5 ). Then, when the Kerberos application reply KEB_AP_REP is returned from the authentication server 102 (T 6 ), if the returned data is normal and it is shown that time data in the returned data is within a predetermined time period, the MFP 100 determines that the authentication is successful.
  • the three requests are sent to the same authentication server, this is not limitative, but a plurality of servers may be used e.g. depending on the network configuration. Further, it is possible to employ another authentication method, such as DH (Diffie-Hellman) authentication.
  • FIG. 7 is a diagram showing a transmission setup screen displayed on the operating section 133 .
  • the transmission setup screen is displayed on the operating section 133 when image data read by the scanner 134 is to be sent by E-mail after normal completion of log-in using the user name “syain1” in the log-in process shown in FIG. 5 .
  • a field “Reading size” 300 the size of an original to be read by the scanner 134 is designated.
  • any one of sheet sizes including A3, A4, A5, B4, B5, 11*17, LTR, and STMT, and the orientation of the sheet can be designated.
  • “auto” is currently set in the field “Reading size” 300 , and hence a value detected by an original detection sensor incorporated in the scanner 134 is read in.
  • a resolution in which an original is to be read by the scanner 134 can be designated.
  • any one of 200*100 dpi, 200*200 dpi, 200*400 dpi, 300*300 dpi, 400*400 dpi and 600*600 dpi can be designated.
  • a default value 200*200 dpi is currently set.
  • Details it is possible to specify detailed operations for scanning, such as scanning density, the type of the original, double-sided reading, duplex-to-duplex copy, and image quality adjustment.
  • a field “Subject” 304 is entered a title given to an E-mail to be sent, and in a field “Body” 305 is entered the body of the E-mail.
  • a software keyboard is displayed to allow entry of a character string.
  • a field “Address” 303 is provided for specifying a destination address.
  • FIG. 8 is a diagram showing an address book for managing transmission destination information.
  • the E-mail addresses of candidate transmission destinations are displayed in a column “Address” 352 .
  • a checkmark is placed in a checkbox of a column “Selection” 350 of each of selected addresses, whereby the selected address is entered in a field “To:” of an E-mail before the E-mail is sent.
  • a column “MODE” 351 it is possible to designate either the E-mail transmission mode for transmitting an E-mail on the assumption that the same will be sent to a general E-mail address, or the iFAX transmission mode for transmitting an E-mail on the assumption that the same will be sent to an iFAX apparatus equipped with a function enabling transmission/reception of Internet Faxes between apparatuses.
  • the E-mail transmission mode for transmitting an E-mail on the assumption that the same will be sent to a general E-mail address
  • the iFAX transmission mode for transmitting an E-mail on the assumption that the same will be sent to an iFAX apparatus equipped with a function enabling transmission/reception of Internet Faxes between apparatuses.
  • E-mail destinations E-mail addresses “pcmail@abc.co.jp” and “syain1@xyz.co.jp”
  • iFAX destination E-mail address “ifax@abc.co.jp”
  • FIG. 9 is a flowchart of a transmission process for reading an original by the scanner 134 and then transmitting an E-mail to each of selected destinations.
  • a program for executing the present process is stored in a storage medium (the ROM 131 or the hard disk 137 ) of the MFP 100 , and carried out by the CPU 130 when an E-mail is sent to the addresses.
  • step S 11 it is determined whether or not the iFAX transmission mode is selected as the transmission mode (MODE 351) (step S 11 ). If the iFAX transmission mode is selected, the address of the apparatus, which is entered in a user mode, is set to a field “From” of the header section of the E-mail (step S 12 ). Then, the E-mail address 232 associated with the user name 230 set in the log-in process is set to a field “sender” of the E-mail (step S 13 ; See FIG. 4 ).
  • the E-mail address “syain1@xyz.co.jp” associated with the user name “syain1” is set to the address of the field “Sender” of the E-mail.
  • an image header which has been generated as image data, based on the information of the E-mail address of the transmitting apparatus, the abbreviated name of the transmission destination, and a transmission time, is attached to the upper end of the image read by the scanner.
  • the E-mail address 232 associated with the user name 230 which has been set in the log-in process, is set to the “From” field (step S 15 ). In this case, the “Sender” field is not generated.
  • a mail data generation process for generating a mail header, adding MIME information, encoding an attached file according to a BASE-64 encoding method, and so forth is carried out based on the information in the “From” field and the “Sender” field (step S 16 ).
  • SMTP authentication is performed using the SMTP authentication user name and the SMTP authentication password acquired from the authentication server 102 in the steps S 6 and S 7 , respectively (step S 17 ), and the result of the SMTP authentication is determined (step S 18 ).
  • the SMTP authentication will be described in detail hereinafter.
  • the data is transmitted to the mail server 103 , using SMTP (step S 19 ).
  • the user name 230 specified in the log-in process, the transmission destination information, a transmission date, the transmission time, the number of pages for transmission, and the result of the transmission are written in a log (step S 20 ), followed by terminating the present process.
  • the result of the authentication is “authentication NG” in the step S 18 , the process is immediately terminated without executing the transmission.
  • the data written in the log by the MFP 100 is printed as a transmission result report for notifying the result of the transmission or as a communication management report which is generated whenever a predetermined number of transmission events are completed.
  • the printed report allows identification of senders of sent jobs.
  • the contents of the transmission management report or the communication management report can be checked against the contents of the log stored in the mail server 103 .
  • the data written in the log can be displayed as a list on the operating section 133 .
  • FIG. 10 is a diagram useful for explaining details of the procedure of the SMTP authentication performed between the MFP 100 and the mail server 103 in the step S 17 .
  • This SMTP authentication makes it possible to authenticate the sender of an E-mail before the E-mail is sent from the MFP 101 to the mail server 103 , to thereby prevent relaying of malicious E-mails e.g. using false E-mail addresses.
  • the SMTP authentication process described below is mainly executed by the CPU of the MFP 100 and that of the mail server 103 .
  • a numeral “220” indicating that the SMTP service is ready, and a domain name are returned from the mail server 103 (T 12 ).
  • a command response in the form of a message starting with a numeral “250” indicating that the requested command is successful is returned from the mail server 103 (T 14 ). Further, responses based on one or more SMTP extended functions owned by the mail server 103 are returned (T 15 and T 16 ).
  • the T 15 response indicates that the mail server 103 has a DSN (Delivery Status Notifications) service function
  • the T 16 response indicates that the mail server 103 supports a SMTP authentication function SMTP AUTH, and supports authentication methods CRAM-MD 5 and DIGEST-MD 5 .
  • the MFP 101 sends a command indicating that SMTP AUTH should be used for authentication, and CRAM-MD 5 should be used as the authentication method (T 17 ).
  • the mail server 103 returns a numeral “334” indicative of continuation of the request and a character string as server challenge data (T 18 ).
  • the MFP 101 creates a cryptographic password encrypted by CRAM-MD 5 from the acquired server challenge data and password, and returns the character strings of the encrypted user name and password (T 19 ).
  • the mail server 103 also creates a cryptographic password from the server challenge data sent to the MFP 101 and the password associated with the user name received from the MFP 101 , and detects a match between the created cryptographic password and the cryptographic password sent from the MFP 101 to thereby validate the password from the MFP 101 .
  • the mail server 103 sends a message starting with a numeral “235” indicative of successful authentication (T 20 ), followed by terminating the SMTP authentication.
  • the E-mail data is transmitted by the normal sequence of SMTP, as described above.
  • the mail server 103 records information of the E-mail address of the MFP 101 from which the E-mail has been received, the E-mail address of the transmission destination, the user name subjected to the SMTP authentication, the transmission date and time, etc. in the log file.
  • the administrator of the mail server 103 can refer to the recorded log file.
  • the sender of the transmitted job can be identified.
  • the mail server 103 stores a log of the times of execution of SMTP authentication the authentication user names, and so forth. Therefore, an actual sender can be identified by comparing the contents of the transmission result report or the communication management report with those of the log in the mail server. Thus, security in transmission using SMTP authentication can be enhanced without degrading operability.
  • SMTP user name a SMTP authentication password
  • E-mail address an E-mail address
  • the log of user names authenticated by SMTP authentication is stored in the mail server, as described above, so that it is possible to compare the log with the transmission log stored in the MFP on a one-to-one basis, to thereby enhance security.
  • SMTP authentication user names and SMTP authentication passwords are managed by the authentication server
  • they are managed by the MFPs. That is, user names for SMTP authentication and passwords associated therewith, which are managed by the authentication server 102 in the first embodiment are stored in the hard disk 137 in the second embodiment.
  • FIG. 11 is a diagram showing an operating screen displayed during execution of a program according to the second embodiment, for looking up user information registered in the authentication server 102 and/or editing contents of the user information. While in the first embodiment, as shown in FIG. 4 , the SMTP authentication user name and the SMTP authentication password are set as user information, in the second embodiment, as shown in FIG. 11 , the SMTP authentication user name and the SMTP authentication password are not set.
  • entries in a column “User Name” 230 are registered as user names in the authentication server 102 .
  • Entries in a column “Password” 231 are passwords associated with the respective registered user names.
  • Entries in a column “E-mail Address” 232 are E-mail addresses associated with the registered user names.
  • An add key 240 is used for registering a new user.
  • a delete key 241 is used for deleting a registered user.
  • a property key 242 is used for modifying registered contents. When the property 242 is depressed, the registered contents are displayed to allow modification thereof.
  • FIG. 12 is a flowchart of a log-in process executed by the MFP 100 , for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication password.
  • the MFP 100 requests the authentication server 102 to perform user authentication, whereby the E-mail service can be used using a designated user name.
  • This also applies to the MFP 101 , and therefore a description will be given of the log-in process of the MFP 100 alone.
  • the present log-in process is started on condition that “User Authentication” is set to “Execute” by system user configuration. In this state, processing requiring user operation, such as copying, is disabled, and a screen prompting the user to enter a user name is displayed on the operating section 133 .
  • a user name entry screen is displayed, and entry of a user name by the user is awaited (step S 31 ).
  • entry of a password is awaited (step S 32 ).
  • the password is entered, the user name and the password are sent to the authentication server 102 for authentication thereby (step S 33 ).
  • step S 34 it is determined whether or not “authentication OK” has been returned from the authentication server 102 , i.e. whether or not it is confirmed by the authentication that the entered user name and password match the user name 230 and the password 231 registered in the authentication server 102 (step S 34 ). If an invalid user name and/or an invalid password have/has been entered, i.e., if not “authentication OK” but “authentication NG” has been returned, the process returns to the step S 31 , wherein the same processing as described above is carried out again on the user name entry screen. On the other hand, if “authentication OK” has been returned, an E-mail address 232 of the user having logged in, which is registered in the authentication server 102 , is acquired from the authentication server 102 (step S 35 ).
  • a SMTP authentication user name 306 is acquired (step S 36 )
  • a SMTP authentication password 307 is acquired (step S 37 ), followed by terminating the present process.
  • the processing requiring user operation such as copying or transmission (SEND).
  • SEND copying or transmission
  • the user name and the password are entered for user authentication a method using biometrics authentication based on a fingerprint, an iris pattern, or the like, or a method using a contact-type or non-contact-type control card may be employed.
  • FIG. 13 is a diagram showing a transmission setup screen displayed on the operating section 133 .
  • the transmission setup screen which is used for a “Send” operation, assuming that a user logs in using a user name “syain1”, the user name “syain1” used by the user for log-in is displayed at the upper left corner of the screen.
  • a field “Reading size” 300 the size of an original to be read by the scanner 134 is designated.
  • any one of sheet sizes including A3, A4, A5, B4, B5, 11*17, LTR, and STMT, and the orientation of the sheet can be designated.
  • “Auto” is currently set in the field “Reading size” 300 , and hence a value detected by an original detection sensor incorporated in the scanner 134 is read in.
  • a resolution in which an original is to be read by the scanner 134 can be designated.
  • any one of 200*100 dpi, 200*200 dpi, 200*400 dpi, 300*300 dpi, 400*400 dpi and 600*600 dpi can be designated.
  • a default value 200*200 dpi is currently set.
  • Details it is possible to specify detailed operations for scanning, such as scanning density, the type of the original, double-sided reading, page continuous printing, and image quality adjustment.
  • a field “Subject” 304 is entered a title given to an E-mail to be sent, and in a field “Body” 305 is entered the body of the E-mail.
  • a software keyboard is displayed to allow entry of a character string.
  • a field “Address” 303 is provided for specifying a destination address. The address is selected from the address book (see FIG. 8 ) in the first embodiment.
  • the SMTP authentication user name 306 and the SMTP authentication password 307 are a user name and a password, respectively, which are used in transmitting E-mail data to the mail server 103 , using the SMTP protocol.
  • the user name and password are set parameters stored in the apparatus used by the user, the set parameters being set on a user-by-user basis.
  • the SMTP authentication user name 306 and the SMTP authentication password 307 are displayed as set parameters on the transmission setup screen. These set parameters can be changed.
  • the image data read in by the scanner 134 is transmitted by the transmission process in FIG. 9 according to the first embodiment.
  • authentication is performed using the SMTP authentication user name 306 and the SMTP authentication password 307 .
  • a MFP which stores the SMTP authentication user name and the authentication password, is allowed to request the mail server 103 to perform SMTP authentication to thereby execute transmission of an E-mail or the like.
  • SMTP authentication is performed by the mail server, this is not limitative, but if the SMTP server and the POP server are implemented by the same apparatus, it is possible to employ various other methods including a method in which a user name and a password for POP authentication according to POP-before-SMTP are used.
  • the SMTP authentication user name and the SMTP authentication password are managed by the authentication server, and by a MFP in the second embodiment, it may be configured such that the management can be switched between the authentication server and the MFP.
  • the authentication server is provided on the network to authenticate user information from a plurality of PCs and MFPs, the same advantageous effects as provided by the first and second embodiments can also be obtained by incorporating the function of the authentication server into the MFPs.
  • the object of the present invention may also be accomplished by supplying a system or an apparatus with a storage medium (or a recording medium) in which a program code of software, which realizes the functions of either of the above described embodiments is stored, and causing a computer (or CPU or MPU) of the system or apparatus to read out and execute the program code stored in the storage medium.
  • the program code itself read from the storage medium realizes the functions of either of the above described embodiments, and hence the program code and a storage medium on which the program code is stored constitute the present invention.
  • the above program has only to realize the functions of either of the above-mentioned embodiments on a computer, and the form of the program may be an object code, a program executed by an interpreter, or script data supplied to an OS.
  • Examples of the storage medium for supplying the program code include a floppy (registered trademark) disk, a hard disk, a magnetic-optical disk, a CD-ROM, a CD-R, a CD-RW, a DVD-ROM, a DVD-RAM, a DVD-RW, a DVD+RW, a magnetic tape, a nonvolatile memory card, and a ROM.
  • the program is supplied by downloading from another computer, a database, or the like, not shown, connected to the Internet, a commercial network, a local area network, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Facsimile Transmission Control (AREA)
  • Facsimiles In General (AREA)

Abstract

A communication apparatus which is capable of enhancing security in transmitting an electronic mail to a destination mail address, using a transmission protocol, without degrading operability. A MFP 100 is connected to an authentication server 102 and a mail server 120 via a network, for transmitting an E-mail via the mail server according to SMTP. A user name and a password are entered in a user name entry screen. The MFP 100 requests the authentication server 102 to authenticate the entered user name and password. When the user name and the password are authenticated, the MFP 100 is operable to acquire an E-mail address 232, a SMTP authentication user name 233, and a SMTP authentication password 234 according to SMTP associated with the authenticated user name and password from the authentication server 102. The MFP 100 requests the mail server 103 to authenticate the acquired SMTP authentication user name 233 and SMTP authentication password 234 according to SMTP. When the SMTP authentication user name 233 and the SMTP authentication password 234 are authenticated, the MFP is operable to transmit an E-mail to the mail server 103 according to SMTP.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to a communication apparatus, an electronic mail transmitting method, and an electronic mail transmitting program, which transmit electronic mails according to a predetermined transmission protocol.
  • 2. Description of the Related Art
  • In recent years, with proliferation of computers and networking of information, electronic mail communication for exchanging character information via a network has been prevailing. Electronic mail can transmit not only the body of an electronic mail message as character information but also files in various formats as an attachment thereto. For example, Internet FAX, which transmits and receives image data as an attached file in the TIFF (Tag Image File Format) format has come into proliferation.
  • Internet FAX (hereinafter referred to “iFAX”) is a communication technique used for communication between a transmitting apparatus and a receiving apparatus, in which the transmitting apparatus converts image data read using a scanner into the TIFF format and transmits the TIFF image data to the receiving apparatus, and the receiving apparatus prints out the received TIFF image data. To secure compatibility between a plurality of apparatuses, the specification of TIFF image data for communication is standardized in details in the technical specification RFC (Request for Comments) 2301 by the IETF (Internet Engineering Task Force) which is an organization for standardizing Internet techniques.
  • Further, a SMTP authentication technique in which when transmitting an electronic mail to the mail address of a transmission destination according to Simple Mail Transfer Protocol (SMTP), user authentication is carried out by a mail server before transmission, so as to prevent illegal replaying of an electronic mail with a false mail address, is standardized in the technical specification RFC 2554. An example of such conventional technique of transmitting an electronic mail after execution of user authentication is described e.g. in Japanese Laid-Open Patent Publication (Kokai) No. H11-234496.
  • Furthermore, the assignee of the present application has already proposed a method in which when a user logs in to an authentication server in advance before transmitting an electronic mail, to have his/her user name and password authenticated, he/she acquires an electronic mail address associated with the authenticated user name, and then transmits the electronic mail to the mail address of a transmission destination, using the acquired mail address as the address of the transmission source (Japanese Patent Application No. 2003-066857).
  • However, even the proposed electronic mail transmitting method remains to be improved in the following points.
  • When an electronic mail is transmitted using the SMTP authentication, if set values (i.e. a user name and a password) specific to an apparatus (e.g. a communication apparatus, such as a MFP (Multi-Function Peripheral)) are used as the user name and password for SMTP authentication, a log of the user name of a user who logged in to the authentication server can be stored as a transmission log in the apparatus. However, only the user name specific to the apparatus is stored in the mail server. As a result, the log stored in the apparatus is different from the log stored in the mail server, which makes it difficult to correlate these logs with each other, and hence to identify the real sender. Further, there still remains the possibility that a person other than the user, who knows the user name and password specific to the apparatus, might perform a transmitting operation using the mail address as a disguised user.
  • Although this inconvenience can be avoided by inputting the user name and password used for SMTP authentication without using the user name and password specific to the apparatus each time an E-mail is transmitted using SMTP authentication, this leads to degradation of operability.
  • SUMMARY OF THE INVENTION
  • It is an object of the present invention to provide a communication apparatus, an electronic mail transmitting method, and an electronic mail transmitting program, which are capable of enhancing security in transmission of an electronic mail to a destination mail address, using a transmission protocol, without degrading operability.
  • To attain the above object, in a first aspect of the present invention, there is provided a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input device via which user information is input, a user authentication requesting device that requests the authentication apparatus to authenticate the input user information, an authentication information acquisition device that is operable when the user information is authenticated, to acquire information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, a transmission authentication requesting device that requests the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission device that is operable when the acquired information for authentication is authenticated, to transmit an electronic mail to the mail distributing apparatus according to the transmission protocol.
  • With the arrangement of the first aspect of the present invention, authentication of the input user information is requested of the authentication apparatus, and when the user information is authenticated, information for authentication according to the transmission protocol associated with the authenticated user information is acquired from the authentication apparatus. Then, authentication of the acquired information for authentication is requested of the mail distributing apparatus according to the transmission protocol, and when the acquired information for authentication is authenticated, an electronic mail is transmitted to the mail distributing apparatus according to the transmission protocol. This makes it possible to enhance security in transmission of an electronic mail to a destination mail address, using the transmission protocol, without degrading operability.
  • Preferably, the authentication apparatus comprises a storage device that stores an electronic mail address associated with the user information and the information for authentication according to the transmission protocol associated with the user information, and the authentication information acquisition device acquires the electronic mail address and the information for authentication stored in the storage device.
  • With this arrangement of the preferred embodiment, when the user information is authenticated, an electronic mail address associated with the authenticated user information is acquired from the authentication apparatus. This makes it possible to prevent relaying of malicious electronic mails e.g. using false electronic mail addresses.
  • Preferably, the information for authentication comprises a user name and a password for SMTP authentication, the user name and the password being associated with the user information.
  • To attain the above object, in a second aspect of the present invention, there is provided a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an authentication information storage device that stores information for authentication according to the transmission protocol, an input device via which user information is input, a user authentication requesting device that requests authentication of the input user information, an authentication information acquisition device that is operable when the user information is authenticated, to acquire information for authentication according to the transmission protocol associated with the authenticated user information from the authentication information storage device, a transmission authentication requesting device that requests the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission device that is operable when the acquired information for authentication is authenticated, to transmit an electronic mail to the mail distributing apparatus according to the transmission protocol.
  • With the arrangement of the second aspect of the present invention, it is possible to obtain the same advantageous effects as provided by the first aspect of the present invention.
  • Preferably, the authentication information storage device stores an electronic mail address associated with the user information and the information for authentication according to the transmission protocol associated with the user information, and the authentication information acquisition device acquires the electronic mail address and the authentication information stored in the authentication information storage device.
  • With this arrangement of the preferred embodiment, it is possible to obtain the same advantageous effects as provided by the first-mentioned preferred embodiment of the first aspect of the present invention.
  • Preferably, the information for authentication comprises a user name and a password for SMTP authentication, the user name and the password being associated with the user information.
  • To attain the above object, in a third aspect of the present invention, there is provided an electronic mail transmitting method executed by a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input step of inputting user information, a user authentication requesting step of requesting the authentication apparatus to authenticate the input user information, an authentication information acquisition step of acquiring information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, when the user information is authenticated, a transmission authentication requesting step of requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission step of transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the acquired information for authentication is authenticated.
  • To attain the above object, in a fourth aspect of the present invention, there is provided an electronic mail transmitting method executed by a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input step of inputting user information, a user authentication requesting step of requesting authentication of the input user information, a retaining step of retaining information for authentication according to the transmission protocol on a user-by-user basis, an authentication information acquisition step of acquiring information for authentication according to the transmission protocol associated with the authenticated user information, from the authentication information retained in the retaining step, a transmission authentication requesting step of requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission step of transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the information for authentication is authenticated.
  • To attain the above object, in a fifth aspect of the present invention, there is provided an electronic mail transmitting program executed by a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input module for inputting user information, a user authentication requesting module for requesting the authentication apparatus to authenticate the input user information, an authentication information acquisition module for acquiring information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, when the user information is authenticated, a transmission authentication requesting module for requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission module for transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the acquired information for authentication is authenticated.
  • To attain the above object, in a sixth aspect of the present invention, there is provided an electronic mail transmitting program executed by a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising an input module for inputting user information, a user authentication requesting module for requesting authentication of the input user information, a retaining module for retaining information for authentication according to the transmission protocol on a user-by-user basis, an authentication information acquisition module for acquiring information for authentication according to the transmission protocol associated with the authenticated user information, from the authentication information retained by the retaining module, a transmission authentication requesting module for requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol, and a transmission module for transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the information for authentication is authenticated.
  • The above and other objects, features, and advantages of the invention will become more apparent from the following detailed description taken in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram showing the overall arrangement of an electronic mail system including a communication apparatus according to a first embodiment of the present invention;
  • FIG. 2 is a block diagram showing the configuration of a MFP (Multi-Function Peripheral) appearing in FIG. 1;
  • FIG. 3 is a diagram showing the layered structure of network protocols possessed by the MFP;
  • FIG. 4 is a diagram showing an operating screen displayed during execution of a program for looking up user information registered in an authentication server appearing in FIG. 1 and/or editing contents of the user information;
  • FIG. 5 is a flowchart of a log-in process executed by the MFP for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication password;
  • FIG. 6 is a diagram useful in explaining details of the procedure of processing carried out between the MFP and the authentication server, for user authentication;
  • FIG. 7 is a diagram showing a transmission setup screen displayed on an operating section;
  • FIG. 8 is a diagram showing an address book for managing transmission destination information;
  • FIG. 9 is a flowchart of a transmission process for reading an original by a scanner and then transmitting an E-mail to destinations;
  • FIG. 10 is a diagram useful for explaining details of the procedure of SMTP authentication performed between the MFP and a mail server, executed in a step S17 in FIG. 9;
  • FIG. 11 is a diagram showing an operating screen displayed during execution of a program for looking up user information registered in the authentication server and/or editing contents of the user information, according to a second embodiment of the present invention;
  • FIG. 12 is a flowchart of a log-in process executed by the MFP for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication user password; and
  • FIG. 13 is a diagram showing a transmission setup screen displayed on an operating section.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The present invention will now be described in detail with reference to the drawings showing preferred embodiments thereof. In the drawings, elements and parts which are identical throughout the views are designated by identical reference numerals, and duplicate description thereof is omitted.
  • FIG. 1 is a diagram showing the overall arrangement of an E-mail system including a communication apparatus according to a first embodiment of the present invention. The E-mail system is comprised of a plurality of apparatuses and devices connected to a first network 105 and a second network 125 via the Internet 110 as a worldwide network.
  • The first network 105 is assigned a domain name “xyz.co.jp”, and has connected thereto MFPs (Multi Function Peripherals) 100 and 101, an authentication server 102, a Mail/POP server 103, and a client PC 104. A second network 125 is assigned a domain name “abc.co.jp”, and has connected thereto a Mail and POP server 120, a PC 121, and an Internet FAX 122.
  • The MFPs 100 and 101 are equipped with a scanner and a printer, and have a copying function, a facsimile (FAX) transmitting and receiving function, and a printer function for printing data generated by a computer. Further, the MFP 100 is assigned a host name “copy1.xyz.co.jp” and an E-mail address “ifax@copy1.xyz.co.jp”. The MFP 101 is assigned a host name “copy2.xyz.co.jp” and an E-mail address “ifax@copy2.xyz.co.jp”.
  • The authentication server 102 performs user authentication for the domain of the first network 105, and a plurality of pairs of user names and passwords valid in the domain are registered in the authentication server 102. The PC 104 has general-purpose E-mail software installed therein, and is assigned an E-mail address “syain1@xyz.co.jp”. When the power of the client PC 104 is turned on, entry of the user name and password is requested. Then, when the user enters the user name and password, the client PC 104 inquires of the authentication server 102 as to whether or not the entered user name and the password match the registered user name and password. If the user has the user name and the password registered in the authentication server 102, the use of the PC 104 is permitted.
  • The Mail/POP server 103 has both the functions of a mail server (SMTP server) and a POP server. Needless to say, the mail server (SMTP server) and the POP server may be implemented by respective separate apparatuses. The Mail/POP server 120 in the domain of the second network 125 has the same functions as those of the Mail/POP server 103. For example, when an E-mail is transmitted from the PC 104 to an E-mail address “pcmail@abc.co.jp”, E-mail data generated by the PC 104 is sent to the mail server 103 using SMTP (Simple Mail Transfer Protocol), and then further sent from the mail server 103 to the mail server 120 via the Internet 110 using SMTP.
  • The PC 121 has general-purpose E-mail software installed therein. The PC 121 monitors at predetermined time intervals whether or not any E-mail has arrived at the POP server 120, using POP3 (Post Office Protocol-Version 3), and if any E-mail has arrived at the POP server 120, the PC 121 receives the E-mail data. On the other hand, when the PC 121 having the E-mail address “pcmail@abc.co.jp” sends an E-mail to the PC 104 having the E-mail address “syain1@xyz.co.jp”, the route is reversed, that is, E-mail data generated by the PC 121 is sent to the mail server 103 by way of the mail server 120. Then, the PC 104 acquires the delivered E-mail data using the POP3 protocol. The PC 104 has the capabilities of interpreting E-mail data in the MIME format or the like, and decoding image data contained in the E-mail data, for reproduction.
  • The MFPs 100 and 101 have two transmission modes: an E-mail transmission mode for transmitting an image received using the facsimile (FAX) or iFAX receiving function, or a monochrome/color image scanned by the scanner, on the assumption that the same will be sent to a general E-mail address, and an iFAX transmission mode for transmitting the image on the assumption that the same will be sent to an apparatus compliant with the iFAX standard. The MFPs 100 and 101 use SMTP and POP3 as communication protocols to perform operations similar to the transmitting and receiving operations by the PCs described above.
  • In the E-mail transmission mode, an image in the JPEG file format (hereinafter simply referred to as a JPEG image) is transmitted. For example, when a color image is transmitted to the client PC 104 having the E-mail address “syain1@xyz.co.jp”, the PC 104 receives the E-mail and displays the JPEG image, using a general-purpose image viewer. In the iFAX transmission mode, an image in the TIFF format is transmitted according to the technical specification RFC 2301. For example, an image is transmitted or received by the MFP 100 or the MFP 101 compliant with the iFAX standard or the Internet FAX 122. Between apparatuses capable of processing color images, JPEG images in the TIFF format are transmitted or received.
  • FIG. 2 is a block diagram showing the configuration of the MFP 100. The MFP 100 and the MFP 101 are identical in configuration, and hence a description will be given of only the configuration of the MFP 100. The MFP 100 is comprised of a CPU 130, a ROM 131, a RAM 132, an operating section 133, a scanner 134, a printer 135, an image processing circuit 136, a hard disk 137, a network interface (I/F) 138, a formatter section 139, and a FAX section 140.
  • The CPU 130 functions as a control circuit that controls the overall operation of the system. The CPU 130 executes programs stored in the ROM 131 and uses the RAM 132 as a work area. The operating section 133 is comprised of hardware keys, such as a start key and keys of a ten key pad, and a LCD display panel that displays buttons as software keys and detects a touch of any of the displayed buttons by a user's finger, for smooth execution of user operation.
  • The scanner 134 converts an original image into electric image data by photoelectric conversion. The scanner 134 is comprised of a platen glass on which an original conveyed from an original feeder is placed, a scanner unit including a lamp for illuminating the original, a CCD image sensor for receiving reflected light from the original, mirrors and lenses for guiding the reflected light from the original to the CCD image sensor, and an A/D conversion circuit for converting an electric signal subjected to photoelectrical conversion by the CCD image sensor into digital data, none of the above-mentioned component elements included in the scanner 134 being shown in FIG. 2. When an original conveyed from the original feeder is placed on the platen glass, the lamp is turned on and the scanner unit is caused to start traveling whereby the original is scanned while being exposed to light. Reflected light from the original is guided to the CCD image sensor via the mirrors and the lens. The reflected light is converted into an electric signal by the CDD image sensor, and then the electric signal is converted into digital data by the A/D conversion circuit. After completion of the operation for reading the original, the original is discharged from the platen glass.
  • The printer section 135 prints image data on a recording sheet. The printer section 135 is comprised of a laser emitting section, a photosensitive drum, a transfer section, a fixing section, a discharge roller, and a sorter having a plurality of bins. The laser emitting section generates a laser beam dependent on the image data. When the laser beam is irradiated onto the photosensitive drum, a latent image is formed on the photosensitive drum according to the laser beam. Developer is applied to the latent image on the photosensitive drum by a developing device, and a recording sheet is fed from a sheet feed cassette in timing synchronous with the start of laser radiation by the laser emitting section, and conveyed to the transfer section. The developer attached to the photosensitive drum as a developer image is transferred onto the recording sheet. When the recording sheet with the developer image transferred thereon is conveyed to the fixing section, the fixing section fixes the developer image on the recording sheet by heating and pressing the recording sheet. The recording sheet having passed through the fixing section is discharged by the discharge roller. Discharged recording sheets are sorted by the sorter into bins thereof.
  • The image processing circuit 136 is comprised of a large-capacity image memory, an image rotating circuit, a resolution change and scaling circuit, and an encoding and decoding circuit for encoding and decoding MH, MR, MMR, JBIG, JPEG, and like formats of data, and carries out various image processing including shading, trimming, and masking. The hard disk 137 is a large-capacity recording medium connectable by an interface (I/F), such as a SCSI interface or a USB interface. The recording medium is not limited to a hard disk, but a magneto-optical disk (MO) or the like may be employed.
  • The network I/F 138 is implemented by an Ethernet (registered trademark of Xerox Corporation, US) typified by 10 BASE-T and 100 BASE-T, or a Token Ring (registered trademark of IBM Corporation, US), and operates to achieve a network data link for connection to the network. The formatter section 139 includes an IEEE 1284-compliant parallel interface and a PC interface (I/F), such as USB, and generates image data based on PDL (Page Description Language) data received from a personal computer via the PC interface (I/F) or a network I/F 138. The image processing circuit 136 performs image processing, such as rendering, on the generated image data to print the same by the printer 135.
  • The FAX section 140, which is connected to a telephone line, is a facsimile I/F circuit including a NCU (Network Control Unit), a MODEM (Modulator/Demodulator), and so on. The FAX section 140 causes the image processing circuit 136 to perform image processing on image data read by the scanner 134, and then transmits the processed image data to another facsimile (FAX) machine via the telephone line, or receives image data sent from another facsimile (FAX) machine and then causes the image processing circuit 136 to perform image processing on the image data for printing by the printer 135.
  • The scanner 134, the printer 135, the image processing circuit 136, the formatter section 139, and the FAX section 140 are interconnected via a high-speed video bus 142 separate from a CPU bus 141 connected to the CPU 130, so that image data can be transferred at high speed. The use of the high-speed video bus 142 enables the image processing circuit 136 to perform image processing on the image data read by the scanner 134, and the printer 135 to print the processed image data to thereby realize a copying function.
  • Further, the MFP 100 has a transmission (Send) function for transmitting image data read by the scanner 134 and processed by the image processing circuit 136 to the network 105 via the network I/F, and an iFAX function for transmitting image data generated by the image processing circuit 136 according to the technical specification RFC 2301, using an E-mail protocol.
  • FIG. 3 is a block diagram showing the layered structure of network protocols possessed by the MFP 100. The network protocols can be roughly grouped into three layers: an IP (Internet Protocol) layer 200, a TCP (Transmission Control Protocol)/UDP (User Datagram Protocol) layer 201, and an application layer 202.
  • The IP layer 200 is an Internet protocol layer that provides a service for delivering a message from a source host to a destination host via relay nodes, such as routers. The IP layer 200 performs a routing function for managing source addresses from which data is transmitted and destination addresses to which data is transmitted, and determining a route in the network through which data is sent to the destination host, based on address information.
  • The TCP/UDP layer 201 is a transport layer that provides a service for passing a message from a transmission application process to a reception application process. The TCP, which is a connection-type service protocol, ensures high reliability for communication, whereas the UDP, which is a connectionless-type service protocol, does not ensure reliability.
  • The application layer 202 defines a plurality of protocols. The protocols defined by this layer 202 include FTP (File Transfer Protocol) as a protocol for file transfer services, SNMP (Network Management Protocol) as a protocol for network management, LPD as a server protocol for printing by the printer, HTTPd as a protocol for WWW (World Wide Web) servers, SMTP (Simple Mail Transfer Protocol) as a protocol for E-mail transmission and reception, and POP3 (Post Office Protocol-Version 3) as a protocol for E-mail downloading. Further, the application layer 202 also contains a Kerberos authentication program defined by the technical specification RFC 1510.
  • FIG. 4 is a diagram showing an operating screen displayed during execution of a program for looking up user information registered in the authentication server 102 and/or editing contents of the user information. The user information is comprised of a user name 230, a password 231, an E-mail address 232, a SMTP authentication user name 233, and a SMTP authentication password 234. The user name 230 is the name of a user who is permitted to use a computer within the domain (principal) assigned the domain name “xyz.co.jp”, which is managed by the authentication server 102. In FIG. 4, there are registered user names “syain1” to “syain5”. In the columns of the password 231, there are registered passwords associated with the respective user names. Here, each password is displayed as “xxxxx” so as to prevent a third party from viewing the password easily.
  • In the columns of the E-mail address 232, there are registered E-mail addresses usable by the respective users registered in the authentication server 102. The E-mail address associated with the user name “syain1” is “syain1@xyz.co.jp”. The E-mail address associated with the user name “syain2” is “syain2@xyz.co.jp”. The E-mail address associated with the user name “syain3” is “syain3@xyz.co.jp”. The E-mail address associated with the user name “syain4” is “syain4@xyz.co.jp”. The E-mail address associated with the user name “syain5” is “syain5@xyz.co.jp”.
  • The SMTP authentication user name 233 and the SMTP authentication password 234 are user names and passwords to be used for SMTP authentication (RFC 2554) which is executed according to the SMTP protocol before transmission of an E-mail e.g. from the MFP 100, the MFP 101 or the PC 104 to the mail server 103, to thereby prevent unauthorized access or illegal relay of an E-mail with a false sender name (From Address). Although in FIG. 4, the SMTP authentication user names associated with the user names “syain1” to “syain5” are identical to the associated user names, it is to be understood that different names can be used. Further, similarly to the password 231, the SMTP authentication password 234 is displayed as “xxxxx” so as to prevent a third party from viewing the same easily.
  • An add key 240 is used for registration of a new user. A delete key 241 is used for deleting a registered user. A property key 242 is used for modifying registered contents, and when the property 242 is depressed, the registered contents are displayed.
  • FIG. 5 is a flowchart of a log-in process executed by the MFP 100, for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication password. By executing this log-in process, the MFP 100 requests the authentication server 102 to perform user authentication, whereby E-mail can be used using a designated user name. This also applies to the MFP 101, and therefore a description will be given of the log-in process of the MFP 100 alone.
  • After the main power of the MFP 100 is turned on and initialization of the memory, I/O ports, etc. is executed, the present log-in process is started on condition that “User Authentication” is set to “Execute” by system user configuration. In this state, processing requiring user operation, such as copying, is disabled, and a screen prompting the user to enter a user name is displayed on the operating section 133.
  • First, a user name entry screen is displayed, and entry of a user name by the user is awaited (step S1) When the user name is entered, entry of a password is awaited (step S2). When the password is entered, the user name and the password are sent to the authentication server 102 for authentication thereby (step S3).
  • Then, it is determined whether or not “authentication OK” has been returned from the authentication server 102, i.e. whether or not it is confirmed by the authentication that the entered user name and password match the user name 230 and the password 231 registered in the authentication server 102 (step S4). If an invalid user name and/or an invalid password have/has been entered, i.e., if not “authentication OK” but “authentication NG” has been returned, the process returns to the step S1, wherein the same processing as described above is carried out again on the user name entry screen. On the other hand, if “authentication OK” has been returned, an E-mail address 232 of the user having logged in, which is registered in the authentication server 102, is acquired from the authentication server 102 (step S5). Further, the user's SMTP authentication user name 233 and SMTP authentication password 234 are acquired from the authentication server 102 (steps S6 and S7), followed by terminating the present process.
  • When the user authentication is normally completed, the processing requiring user operation, such as copying or transmission (SEND), becomes executable. Although in the present embodiment, the user name and the password are entered for user authentication, a method using biometrics authentication based on a fingerprint, an iris pattern, or the like, or a method using a contact-type or non-contact-type control card may be employed.
  • FIG. 6 is a diagram useful in explaining details of the procedure of processing carried out between the MFP 100 and the authentication server 102, for user authentication. The user authentication method of the authentication server 102 is an authentication method using Kerberos as one of protocols of the application layer 202. This method is standardized as the technical specification RFC 1510.
  • First, when a Kerberos authentication service request KEB_AS_REQ is sent from the MFP 100 as a client to the authentication server 102 (T1) to make an inquiry as to whether or not the user is valid, an encrypted log-on session key and client authentication data are returned as a Kerberos authentication service reply KEB_AS_REP from the authentication server 102 to the MFP 100 (T2).
  • Based on the data, a Kerberos ticket authorization service request KEB_TGS_REQ is generated, and the MFP 100 requests qualification information from the authentication server 102 (T3). Encrypted client authentication data is returned as a Kerberos ticket authorization service reply KEB_TGS_REP from the authentication server 102 (T4).
  • Based on the data, a Kerberos application request KEB_AP_REQ is generated, and the MFP 100 asks the authentication server 102 to permit use of service (T5). Then, when the Kerberos application reply KEB_AP_REP is returned from the authentication server 102 (T6), if the returned data is normal and it is shown that time data in the returned data is within a predetermined time period, the MFP 100 determines that the authentication is successful.
  • Although in the present embodiment, the three requests are sent to the same authentication server, this is not limitative, but a plurality of servers may be used e.g. depending on the network configuration. Further, it is possible to employ another authentication method, such as DH (Diffie-Hellman) authentication.
  • FIG. 7 is a diagram showing a transmission setup screen displayed on the operating section 133. The transmission setup screen is displayed on the operating section 133 when image data read by the scanner 134 is to be sent by E-mail after normal completion of log-in using the user name “syain1” in the log-in process shown in FIG. 5. In a field “Reading size” 300, the size of an original to be read by the scanner 134 is designated. For originals to be read, any one of sheet sizes including A3, A4, A5, B4, B5, 11*17, LTR, and STMT, and the orientation of the sheet can be designated. In FIG. 7, “auto” is currently set in the field “Reading size” 300, and hence a value detected by an original detection sensor incorporated in the scanner 134 is read in.
  • In a field “Resolution” 301, a resolution in which an original is to be read by the scanner 134 can be designated. For the resolution, any one of 200*100 dpi, 200*200 dpi, 200*400 dpi, 300*300 dpi, 400*400 dpi and 600*600 dpi can be designated. In FIG. 7, a default value 200*200 dpi is currently set. Further, in a field “Details” 302, it is possible to specify detailed operations for scanning, such as scanning density, the type of the original, double-sided reading, duplex-to-duplex copy, and image quality adjustment.
  • In a field “Subject” 304 is entered a title given to an E-mail to be sent, and in a field “Body” 305 is entered the body of the E-mail. When each of the setting fields is selected, a software keyboard is displayed to allow entry of a character string. A field “Address” 303 is provided for specifying a destination address.
  • FIG. 8 is a diagram showing an address book for managing transmission destination information. The E-mail addresses of candidate transmission destinations are displayed in a column “Address” 352. When a checkmark is placed in a checkbox of a column “Selection” 350 of each of selected addresses, whereby the selected address is entered in a field “To:” of an E-mail before the E-mail is sent. In a column “MODE” 351, it is possible to designate either the E-mail transmission mode for transmitting an E-mail on the assumption that the same will be sent to a general E-mail address, or the iFAX transmission mode for transmitting an E-mail on the assumption that the same will be sent to an iFAX apparatus equipped with a function enabling transmission/reception of Internet Faxes between apparatuses. In FIG. 8, there are designated two E-mail destinations (E-mail addresses “pcmail@abc.co.jp” and “syain1@xyz.co.jp”) for the E-mail transmission mode, and one iFAX destination (E-mail address “ifax@abc.co.jp”) for the iFAX transmission mode.
  • FIG. 9 is a flowchart of a transmission process for reading an original by the scanner 134 and then transmitting an E-mail to each of selected destinations. A program for executing the present process is stored in a storage medium (the ROM 131 or the hard disk 137) of the MFP 100, and carried out by the CPU 130 when an E-mail is sent to the addresses.
  • First, it is determined whether or not the iFAX transmission mode is selected as the transmission mode (MODE 351) (step S11). If the iFAX transmission mode is selected, the address of the apparatus, which is entered in a user mode, is set to a field “From” of the header section of the E-mail (step S12). Then, the E-mail address 232 associated with the user name 230 set in the log-in process is set to a field “sender” of the E-mail (step S13; See FIG. 4). In this case, since the user has logged in using the user name “syain1”, the E-mail address “syain1@xyz.co.jp” associated with the user name “syain1” is set to the address of the field “Sender” of the E-mail. After having set the “From” field and the “Sender” field, an image header, which has been generated as image data, based on the information of the E-mail address of the transmitting apparatus, the abbreviated name of the transmission destination, and a transmission time, is attached to the upper end of the image read by the scanner.
  • On the other hand, if the iFAX transmission mode is not selected as the transmission mode, but the E-mail transmission mode is selected, the E-mail address 232 associated with the user name 230, which has been set in the log-in process, is set to the “From” field (step S15). In this case, the “Sender” field is not generated.
  • Then, a mail data generation process for generating a mail header, adding MIME information, encoding an attached file according to a BASE-64 encoding method, and so forth is carried out based on the information in the “From” field and the “Sender” field (step S16).
  • Before the generated E-mail data is sent to the mail server 103, SMTP authentication is performed using the SMTP authentication user name and the SMTP authentication password acquired from the authentication server 102 in the steps S6 and S7, respectively (step S17), and the result of the SMTP authentication is determined (step S18). The SMTP authentication will be described in detail hereinafter. After completion of the authentication, i.e. when “authentication OK” is returned, the data is transmitted to the mail server 103, using SMTP (step S19). When the transmission is completed, the user name 230 specified in the log-in process, the transmission destination information, a transmission date, the transmission time, the number of pages for transmission, and the result of the transmission are written in a log (step S20), followed by terminating the present process. On the other hand, if the result of the authentication is “authentication NG” in the step S18, the process is immediately terminated without executing the transmission.
  • The data written in the log by the MFP 100 is printed as a transmission result report for notifying the result of the transmission or as a communication management report which is generated whenever a predetermined number of transmission events are completed. The printed report allows identification of senders of sent jobs. Further, since a log of the times of execution of SMTP authentication, the authentication user names, and so forth is stored in the mail server 103, the contents of the transmission management report or the communication management report can be checked against the contents of the log stored in the mail server 103. Thus, the validity of the log can be checked. The data written in the log can be displayed as a list on the operating section 133.
  • FIG. 10 is a diagram useful for explaining details of the procedure of the SMTP authentication performed between the MFP 100 and the mail server 103 in the step S17. This SMTP authentication makes it possible to authenticate the sender of an E-mail before the E-mail is sent from the MFP 101 to the mail server 103, to thereby prevent relaying of malicious E-mails e.g. using false E-mail addresses. The SMTP authentication process described below is mainly executed by the CPU of the MFP 100 and that of the mail server 103.
  • First, when the MFP 101 accesses the mail server 103 (T11) by SMTP, a numeral “220” indicating that the SMTP service is ready, and a domain name are returned from the mail server 103 (T12). When the MFP 101 as a client sends an EHLO command indicative of the start of an extended SMTP session to the mail server 103 (T13), a command response in the form of a message starting with a numeral “250” indicating that the requested command is successful is returned from the mail server 103 (T14). Further, responses based on one or more SMTP extended functions owned by the mail server 103 are returned (T15 and T16). The T15 response indicates that the mail server 103 has a DSN (Delivery Status Notifications) service function, and the T16 response indicates that the mail server 103 supports a SMTP authentication function SMTP AUTH, and supports authentication methods CRAM-MD 5 and DIGEST-MD 5.
  • Since it is thus indicated that the mail server 103 is compatible with SMTP AUTH, the MFP 101 sends a command indicating that SMTP AUTH should be used for authentication, and CRAM-MD 5 should be used as the authentication method (T17). The mail server 103 returns a numeral “334” indicative of continuation of the request and a character string as server challenge data (T18). The MFP 101 creates a cryptographic password encrypted by CRAM-MD 5 from the acquired server challenge data and password, and returns the character strings of the encrypted user name and password (T19).
  • Similarly, the mail server 103 also creates a cryptographic password from the server challenge data sent to the MFP 101 and the password associated with the user name received from the MFP 101, and detects a match between the created cryptographic password and the cryptographic password sent from the MFP 101 to thereby validate the password from the MFP 101. When the validity of the password is verified, the mail server 103 sends a message starting with a numeral “235” indicative of successful authentication (T20), followed by terminating the SMTP authentication.
  • Thereafter, the E-mail data is transmitted by the normal sequence of SMTP, as described above. When the transmission is completed, the mail server 103 records information of the E-mail address of the MFP 101 from which the E-mail has been received, the E-mail address of the transmission destination, the user name subjected to the SMTP authentication, the transmission date and time, etc. in the log file. The administrator of the mail server 103 can refer to the recorded log file.
  • As described above, according to the first embodiment, since data written in the log by the MFP 100 is printed as a transmission result report or a communication management report, the sender of the transmitted job can be identified. On the other hand, the mail server 103 stores a log of the times of execution of SMTP authentication the authentication user names, and so forth. Therefore, an actual sender can be identified by comparing the contents of the transmission result report or the communication management report with those of the log in the mail server. Thus, security in transmission using SMTP authentication can be enhanced without degrading operability.
  • Further, there is no need to set a SMTP user name, a SMTP authentication password, and an E-mail address to a MFP, which facilitates management including registration and modification of these data. Further, the log of user names authenticated by SMTP authentication is stored in the mail server, as described above, so that it is possible to compare the log with the transmission log stored in the MFP on a one-to-one basis, to thereby enhance security.
  • In the following, a description will be given of a second embodiment of the present invention with reference to FIGS. 11 to 13.
  • As distinct from the first embodiment in which SMTP authentication user names and SMTP authentication passwords are managed by the authentication server, in the present embodiment, they are managed by the MFPs. That is, user names for SMTP authentication and passwords associated therewith, which are managed by the authentication server 102 in the first embodiment are stored in the hard disk 137 in the second embodiment.
  • An E-mail system including a communication apparatus according to the second embodiment is substantially identical in configuration to that of the first embodiment, and therefore component parts identical to those in the first embodiment are designated by identical reference numerals, while omitting description thereof. FIG. 11 is a diagram showing an operating screen displayed during execution of a program according to the second embodiment, for looking up user information registered in the authentication server 102 and/or editing contents of the user information. While in the first embodiment, as shown in FIG. 4, the SMTP authentication user name and the SMTP authentication password are set as user information, in the second embodiment, as shown in FIG. 11, the SMTP authentication user name and the SMTP authentication password are not set.
  • In FIG. 11, entries in a column “User Name” 230 are registered as user names in the authentication server 102. Entries in a column “Password” 231 are passwords associated with the respective registered user names. Entries in a column “E-mail Address” 232 are E-mail addresses associated with the registered user names. An add key 240 is used for registering a new user. A delete key 241 is used for deleting a registered user. A property key 242 is used for modifying registered contents. When the property 242 is depressed, the registered contents are displayed to allow modification thereof.
  • FIG. 12 is a flowchart of a log-in process executed by the MFP 100, for acquiring an E-mail address, a SMTP authentication user name, and a SMTP authentication password. By executing this log-in process, the MFP 100 requests the authentication server 102 to perform user authentication, whereby the E-mail service can be used using a designated user name. This also applies to the MFP 101, and therefore a description will be given of the log-in process of the MFP 100 alone.
  • After the main power of the MFP 100 is turned on and initialization of the memory, I/O ports, etc. is executed, the present log-in process is started on condition that “User Authentication” is set to “Execute” by system user configuration. In this state, processing requiring user operation, such as copying, is disabled, and a screen prompting the user to enter a user name is displayed on the operating section 133.
  • First, a user name entry screen is displayed, and entry of a user name by the user is awaited (step S31). When the user name is entered, entry of a password is awaited (step S32). When the password is entered, the user name and the password are sent to the authentication server 102 for authentication thereby (step S33).
  • Then, it is determined whether or not “authentication OK” has been returned from the authentication server 102, i.e. whether or not it is confirmed by the authentication that the entered user name and password match the user name 230 and the password 231 registered in the authentication server 102 (step S34). If an invalid user name and/or an invalid password have/has been entered, i.e., if not “authentication OK” but “authentication NG” has been returned, the process returns to the step S31, wherein the same processing as described above is carried out again on the user name entry screen. On the other hand, if “authentication OK” has been returned, an E-mail address 232 of the user having logged in, which is registered in the authentication server 102, is acquired from the authentication server 102 (step S35).
  • After acquisition of the E-mail address, a SMTP authentication user name 306, among SMTP authentication user names set for each of users of apparatuses such as the MFP 100 or the MFP 101, is acquired (step S36) Further, a SMTP authentication password 307 also set for each of the users of the apparatuses is acquired (step S37), followed by terminating the present process.
  • When the user authentication is normally completed, the processing requiring user operation, such as copying or transmission (SEND), becomes executable. Although in the present embodiment, the user name and the password are entered for user authentication a method using biometrics authentication based on a fingerprint, an iris pattern, or the like, or a method using a contact-type or non-contact-type control card may be employed.
  • FIG. 13 is a diagram showing a transmission setup screen displayed on the operating section 133. On the transmission setup screen, which is used for a “Send” operation, assuming that a user logs in using a user name “syain1”, the user name “syain1” used by the user for log-in is displayed at the upper left corner of the screen.
  • In a field “Reading size” 300, the size of an original to be read by the scanner 134 is designated. For originals to be read, any one of sheet sizes including A3, A4, A5, B4, B5, 11*17, LTR, and STMT, and the orientation of the sheet can be designated. In FIG. 13, “Auto” is currently set in the field “Reading size” 300, and hence a value detected by an original detection sensor incorporated in the scanner 134 is read in.
  • In a field “Resolution” 301, a resolution in which an original is to be read by the scanner 134 can be designated. For the resolution, any one of 200*100 dpi, 200*200 dpi, 200*400 dpi, 300*300 dpi, 400*400 dpi and 600*600 dpi can be designated. In FIG. 13, a default value 200*200 dpi is currently set. Further, in a field “Details” 302, it is possible to specify detailed operations for scanning, such as scanning density, the type of the original, double-sided reading, page continuous printing, and image quality adjustment.
  • In a field “Subject” 304 is entered a title given to an E-mail to be sent, and in a field “Body” 305 is entered the body of the E-mail. When each of the setting fields is selected, a software keyboard is displayed to allow entry of a character string. A field “Address” 303 is provided for specifying a destination address. The address is selected from the address book (see FIG. 8) in the first embodiment.
  • The SMTP authentication user name 306 and the SMTP authentication password 307 are a user name and a password, respectively, which are used in transmitting E-mail data to the mail server 103, using the SMTP protocol. The user name and password are set parameters stored in the apparatus used by the user, the set parameters being set on a user-by-user basis. When a user logs in, the SMTP authentication user name 306 and the SMTP authentication password 307 are displayed as set parameters on the transmission setup screen. These set parameters can be changed.
  • The image data read in by the scanner 134 is transmitted by the transmission process in FIG. 9 according to the first embodiment. In the SMTP authentication process in the step S17 of the transmission process, authentication is performed using the SMTP authentication user name 306 and the SMTP authentication password 307.
  • According to the second embodiment, the same advantageous effects as provided by the first embodiment can be obtained. Further, a MFP, which stores the SMTP authentication user name and the authentication password, is allowed to request the mail server 103 to perform SMTP authentication to thereby execute transmission of an E-mail or the like.
  • Although in the above-described embodiment, SMTP authentication is performed by the mail server, this is not limitative, but if the SMTP server and the POP server are implemented by the same apparatus, it is possible to employ various other methods including a method in which a user name and a password for POP authentication according to POP-before-SMTP are used.
  • The present invention is not limited to the above described embodiments, but can be modified in various manners within the scope of the present invention insofar as functions as recited in the appended claims or the functions performed by the construction of either of the above described embodiments can be achieved.
  • For example, although in the first embodiment, the SMTP authentication user name and the SMTP authentication password are managed by the authentication server, and by a MFP in the second embodiment, it may be configured such that the management can be switched between the authentication server and the MFP. Further, although the authentication server is provided on the network to authenticate user information from a plurality of PCs and MFPs, the same advantageous effects as provided by the first and second embodiments can also be obtained by incorporating the function of the authentication server into the MFPs.
  • It is to be understood that the object of the present invention may also be accomplished by supplying a system or an apparatus with a storage medium (or a recording medium) in which a program code of software, which realizes the functions of either of the above described embodiments is stored, and causing a computer (or CPU or MPU) of the system or apparatus to read out and execute the program code stored in the storage medium.
  • In this case, the program code itself read from the storage medium realizes the functions of either of the above described embodiments, and hence the program code and a storage medium on which the program code is stored constitute the present invention.
  • Further, it is to be understood that the functions of either of the above described embodiments may be accomplished not only by executing the program code read out by a computer, but also by causing an OS (operating system) or the like which operates on the computer to perform a part or all of the actual operations based on instructions of the program code.
  • Further, it is to be understood that the functions of either of the above described embodiments may be accomplished by writing the program code read out from the storage medium into a memory provided in an expansion board inserted into a computer or a memory provided in an expansion unit connected to the computer and then causing a CPU or the like provided in the expansion board or the expansion unit to perform a part or all of the actual operations based on instructions of the program code.
  • Further, the above program has only to realize the functions of either of the above-mentioned embodiments on a computer, and the form of the program may be an object code, a program executed by an interpreter, or script data supplied to an OS.
  • Examples of the storage medium for supplying the program code include a floppy (registered trademark) disk, a hard disk, a magnetic-optical disk, a CD-ROM, a CD-R, a CD-RW, a DVD-ROM, a DVD-RAM, a DVD-RW, a DVD+RW, a magnetic tape, a nonvolatile memory card, and a ROM. Alternatively, the program is supplied by downloading from another computer, a database, or the like, not shown, connected to the Internet, a commercial network, a local area network, or the like.
  • CROSS REFERENCE TO RELATED APPLICATION
  • This application claims priority from Japanese Patent Application No. 2003-386985 filed Nov. 17, 2003, which is hereby incorporated by reference herein.

Claims (10)

1. A communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising:
an input device via which user information is input;
a user authentication requesting device that requests the authentication apparatus to authenticate the input user information;
an authentication information acquisition device that is operable when the user information is authenticated, to acquire information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus;
a transmission authentication requesting device that requests the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol; and
a transmission device that is operable when the acquired information for authentication is authenticated, to transmit an electronic mail to the mail distributing apparatus according to the transmission protocol.
2. A communication apparatus as claimed in claim 1, wherein the authentication apparatus comprises a storage device that stores an electronic mail address associated with the user information and the information for authentication according to the transmission protocol associated with the user information, and said authentication information acquisition device acquires the electronic mail address and the information for authentication stored in said storage device.
3. A communication apparatus as claimed in claim 1, wherein the information for authentication comprises a user name and a password for SMTP authentication, the user name and the password being associated with the user information.
4. A communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising:
an authentication information storage device that stores information for authentication according to the transmission protocol;
an input device via which user information is input;
a user authentication requesting device that requests authentication of the input user information;
an authentication information acquisition device that is operable when the user information is authenticated, to acquire information for authentication according to the transmission protocol associated with the authenticated user information from said authentication information storage device;
a transmission authentication requesting device that requests the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol; and
a transmission device that is operable when the acquired information for authentication is authenticated, to transmit an electronic mail to the mail distributing apparatus according to the transmission protocol.
5. A communication apparatus as claimed in claim 4, wherein said authentication information storage device stores an electronic mail address associated with the user information and the information for authentication according to the transmission protocol associated with the user information, and said authentication information acquisition device acquires the electronic mail address and the authentication information stored in said authentication information storage device.
6. A communication apparatus as claimed in claim 4, wherein the information for authentication comprises a user name and a password for SMTP authentication, the user name and the password being associated with the user information.
7. An electronic mail transmitting method executed by a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising:
an input step of inputting user information;
a user authentication requesting step of requesting the authentication apparatus to authenticate the input user information;
an authentication information acquisition step of acquiring information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, when the user information is authenticated;
a transmission authentication requesting step of requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol; and
a transmission step of transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the acquired information for authentication is authenticated.
8. An electronic mail transmitting method executed by a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising:
an input step of inputting user information;
a user authentication requesting step of requesting authentication of the input user information;
a retaining step of retaining information for authentication according to the transmission protocol on a user-by-user basis;
an authentication information acquisition step of acquiring information for authentication according to the transmission protocol associated with the authenticated user information, from the authentication information retained in said retaining step;
a transmission authentication requesting step of requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol; and
a transmission step of transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the information for authentication is authenticated.
9. An electronic mail transmitting program executed by a communication apparatus connected to an authentication apparatus and a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising:
an input module for inputting user information;
a user authentication requesting module for requesting the authentication apparatus to authenticate the input user information;
an authentication information acquisition module for acquiring information for authentication according to the transmission protocol associated with the authenticated user information from the authentication apparatus, when the user information is authenticated;
a transmission authentication requesting module for requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol; and
a transmission module for transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the acquired information for authentication is authenticated.
10. An electronic mail transmitting program executed by a communication apparatus connected to a mail distributing apparatus via a network, for transmitting an electronic mail via the mail distributing apparatus according to a predetermined transmission protocol, comprising:
an input module for inputting user information;
a user authentication requesting module for requesting authentication of the input user information;
a retaining module for retaining information for authentication according to the transmission protocol on a user-by-user basis;
an authentication information acquisition module for acquiring information for authentication according to the transmission protocol associated with the authenticated user information, from the authentication information retained by said retaining module;
a transmission authentication requesting module for requesting the mail distributing apparatus to authenticate the acquired information for authentication, according to the transmission protocol; and
a transmission module for transmitting an electronic mail to the mail distributing apparatus according to the transmission protocol, when the information for authentication is authenticated.
US10/991,315 2003-11-17 2004-11-17 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program Abandoned US20050108530A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/109,455 US8621579B2 (en) 2003-11-17 2011-05-17 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US14/087,831 US10243948B2 (en) 2003-11-17 2013-11-22 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US16/260,598 US20190158485A1 (en) 2003-11-17 2019-01-29 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2003386985A JP4574161B2 (en) 2003-11-17 2003-11-17 COMMUNICATION DEVICE, ITS CONTROL METHOD, AND PROGRAM
JP2003-386985 2003-11-17

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/109,455 Continuation US8621579B2 (en) 2003-11-17 2011-05-17 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program

Publications (1)

Publication Number Publication Date
US20050108530A1 true US20050108530A1 (en) 2005-05-19

Family

ID=34567431

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/991,315 Abandoned US20050108530A1 (en) 2003-11-17 2004-11-17 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US13/109,455 Expired - Fee Related US8621579B2 (en) 2003-11-17 2011-05-17 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US14/087,831 Active US10243948B2 (en) 2003-11-17 2013-11-22 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US16/260,598 Abandoned US20190158485A1 (en) 2003-11-17 2019-01-29 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program

Family Applications After (3)

Application Number Title Priority Date Filing Date
US13/109,455 Expired - Fee Related US8621579B2 (en) 2003-11-17 2011-05-17 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US14/087,831 Active US10243948B2 (en) 2003-11-17 2013-11-22 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US16/260,598 Abandoned US20190158485A1 (en) 2003-11-17 2019-01-29 Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program

Country Status (3)

Country Link
US (4) US20050108530A1 (en)
JP (1) JP4574161B2 (en)
CN (1) CN100539583C (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060139671A1 (en) * 2004-12-27 2006-06-29 Kabushiki Kaisha Toshiba Image forming apparatus and method of controlling apparatus
US20060248153A1 (en) * 2005-05-02 2006-11-02 Xerox Corporation Electronic mail behavior with a multi-function machine
US20070011293A1 (en) * 2005-06-28 2007-01-11 Samsung Electronics Co., Ltd. System and method of managing printing data using an FTP and a user terminal device and an image forming device using the same
US20070220501A1 (en) * 2006-03-15 2007-09-20 Canon Kabushiki Kaisha Image processing apparatus, method therefor, and storage medium
US20080046523A1 (en) * 2006-08-18 2008-02-21 Brother Kogyo Kabushiki Kaisha Electronic mail communication device
US20080046521A1 (en) * 2006-08-18 2008-02-21 Brother Kogyo Kabushiki Kaisha Network device
US20080086639A1 (en) * 2006-10-10 2008-04-10 Fuji Xerox Co., Ltd. Processor with encryption function, encryption device, encryption processing method, and computer readable medium
US20080231884A1 (en) * 2007-03-22 2008-09-25 Kabushiki Kaisha Toshiba Image forming apparatus which has a fax function
US20090064289A1 (en) * 2007-09-05 2009-03-05 Samsung Electronics Co., Ltd. Method of authenticating user using server and image forming apparatus using the method
US20090187758A1 (en) * 2008-01-18 2009-07-23 Sharp Kabushiki Kaisha Data communication system and data transmitting apparatus
US20090310180A1 (en) * 2008-06-13 2009-12-17 Konica Minolta Business Technologies, Inc. Image processing device which performs setting of device based on information acquired
US20110004755A1 (en) * 2009-07-02 2011-01-06 Sharp Kabushiki Kaisha User information providing system
US20120092691A1 (en) * 2010-10-13 2012-04-19 Konica Minolta Business Technologies, Inc. Image forming apparatus, information device, and computer-readable storage medium for computer program
US20120158873A1 (en) * 2010-12-21 2012-06-21 Canon Kabushiki Kaisha Data communication apparatus, data communication apparatus control method, and program
US20120226895A1 (en) * 2011-03-01 2012-09-06 Microsoft Corporation Protecting operating system configuration values
US20140223004A1 (en) * 2013-02-06 2014-08-07 Tadashi Honda Network system and information reporting method
US20160014113A1 (en) * 2014-07-10 2016-01-14 Ricoh Company, Ltd. Information processing apparatus, information processing method, and computer program product
CN105991523A (en) * 2015-01-30 2016-10-05 莱里达网络远程信息技术服务有限公司 Method of generating electronic protocol authenticated by user of telecom operator

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4574161B2 (en) * 2003-11-17 2010-11-04 キヤノン株式会社 COMMUNICATION DEVICE, ITS CONTROL METHOD, AND PROGRAM
JP2006013747A (en) * 2004-06-24 2006-01-12 Murata Mach Ltd Electronic mail server apparatus and electronic mail network system
JP4948119B2 (en) * 2006-10-26 2012-06-06 株式会社リコー Spoofing prevention method, image processing apparatus, spoofing prevention program, and recording medium
JP4915257B2 (en) * 2007-03-08 2012-04-11 セイコーエプソン株式会社 Authentication printing system and authentication printing method
JP5103087B2 (en) * 2007-08-01 2012-12-19 シャープ株式会社 COMMUNICATION DEVICE, PROGRAM, AND RECORDING MEDIUM
JP5300367B2 (en) * 2008-08-08 2013-09-25 キヤノン株式会社 Information processing apparatus, information processing method, and computer program
US8707420B2 (en) * 2010-05-21 2014-04-22 Microsoft Corporation Trusted e-mail communication in a multi-tenant environment
US8516062B2 (en) 2010-10-01 2013-08-20 @Pay Ip Holdings Llc Storage, communication, and display of task-related data
US8918467B2 (en) 2010-10-01 2014-12-23 Clover Leaf Environmental Solutions, Inc. Generation and retrieval of report information
JP5530909B2 (en) * 2010-11-30 2014-06-25 京セラドキュメントソリューションズ株式会社 Image forming apparatus
CN102761498A (en) * 2012-07-17 2012-10-31 苏州市米想网络信息技术有限公司 E-mail management system with security authentication module
JP5796725B2 (en) 2013-03-22 2015-10-21 カシオ計算機株式会社 Authentication processing apparatus, authentication processing method, and program
JP5591388B2 (en) * 2013-08-28 2014-09-17 キヤノン株式会社 Image transmitting apparatus and authentication method for image transmitting apparatus
CN107172087A (en) * 2017-06-30 2017-09-15 北京小米移动软件有限公司 Verification method, device and storage medium based on checking mail
CN109829276B (en) * 2018-12-17 2023-05-09 航天信息股份有限公司 Electronic invoice unified management method and system based on FIDO protocol identity authentication
CN110784395B (en) * 2019-11-04 2023-02-21 航天信息股份有限公司 Mail safety login method and system based on FIDO authentication

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020104026A1 (en) * 2001-01-29 2002-08-01 Robert Barra Method and apparatus for providing a service to transfer messages over a communications network
US20020157028A1 (en) * 2000-12-19 2002-10-24 Fuji Xerox Co., Ltd. Internet facsimile and control method thereof and communication instruction terminal
US20020191223A1 (en) * 2001-03-29 2002-12-19 Atsushi Ishikawa Image processing apparatus, information communication method, program and information communication system
US20030140252A1 (en) * 2001-07-20 2003-07-24 Martin Lafon Authentication process and device
US20030233437A1 (en) * 2002-04-24 2003-12-18 Hiroshi Kitada Browser, method, and computer program product for managing documents
US20040003030A1 (en) * 2002-06-28 2004-01-01 Ems Inc. Mail server with forwarding function and a storage medium storing a program for the mail server
US20050073665A1 (en) * 2002-10-21 2005-04-07 Sharp Kabushiki Kaisha. Data transmission device, data transmission method, data transmission program, data reception device, data reception method, data reception program, and communication system

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6569103B2 (en) * 1995-12-22 2003-05-27 Arrow International Investment Corp. Device for determining a characteristic point in the cardiac cycle
US6009462A (en) * 1997-06-16 1999-12-28 Digital Equipment Corporation Replacing large bit component of electronic mail (e-mail) message with hot-link in distributed computer system
US6189026B1 (en) * 1997-06-16 2001-02-13 Digital Equipment Corporation Technique for dynamically generating an address book in a distributed electronic mail system
JPH11234496A (en) 1998-02-13 1999-08-27 Ricoh Co Ltd Control method for network facsimile equipment
US7173651B1 (en) * 1998-06-02 2007-02-06 Knowles Andrew T Apparatus and system for prompt digital photo delivery and archival
US6677858B1 (en) * 1999-02-26 2004-01-13 Reveo, Inc. Internet-based method of and system for monitoring space-time coordinate information and biophysiological state information collected from an animate object along a course through the space-time continuum
US20080039052A1 (en) * 1999-06-02 2008-02-14 Knowles Andrew T Digital Message Processing System
JP2001034580A (en) * 1999-07-21 2001-02-09 Nippon Telegr & Teleph Corp <Ntt> Common-use computer using method
US6889213B1 (en) * 2000-02-18 2005-05-03 Hewlett-Packard Development Company, L.P. E-service to manage contact information with privacy levels
US6880091B1 (en) * 2000-06-29 2005-04-12 Hewlett-Packard Development Company, L.P. System and method for authentication of a user of a multi-function peripheral
US20020042815A1 (en) * 2000-09-22 2002-04-11 Arthur Salzfass Automated system and method for routing undeliverable e-mail messages and otherwise managing e-mail
US6931382B2 (en) * 2001-01-24 2005-08-16 Cdck Corporation Payment instrument authorization technique
JP2002244973A (en) * 2001-02-19 2002-08-30 Canon Inc Method and device for controlling communication
JP4405728B2 (en) * 2001-03-08 2010-01-27 富士通株式会社 E-mail management apparatus, mail server, transfer method, and medium
JP2002288059A (en) * 2001-03-28 2002-10-04 Smart Card Technologies:Kk Automatic electronic mail setting method using electronic device provided with usb interface
US6625265B2 (en) * 2001-06-21 2003-09-23 Docutek Information Systems, Inc. Automated electronic reserves system and method
JP2003066857A (en) 2001-08-27 2003-03-05 Meiko:Kk Display device
JP3965993B2 (en) * 2001-12-27 2007-08-29 富士ゼロックス株式会社 Mail server, e-mail communication control method in mail server, e-mail system
US20030182383A1 (en) * 2002-02-12 2003-09-25 Xiaopeng He Enterprise electronic mail filtering and notification system
US7916322B2 (en) * 2002-03-14 2011-03-29 Senshin Capital, Llc Method and apparatus for uploading content from a device to a remote network location
US20040024823A1 (en) * 2002-08-01 2004-02-05 Del Monte Michael George Email authentication system
US8595495B2 (en) * 2003-01-12 2013-11-26 Yaron Mayer System and method for secure communications
US20050278533A1 (en) * 2003-01-12 2005-12-15 Yaron Mayer System and method for secure communications
US20040243847A1 (en) * 2003-03-03 2004-12-02 Way Gregory G. Method for rejecting SPAM email and for authenticating source addresses in email servers
US7406501B2 (en) * 2003-03-24 2008-07-29 Yahoo! Inc. System and method for instant messaging using an e-mail protocol
US7142211B2 (en) * 2003-07-07 2006-11-28 Arcsoft, Inc. Graphic engine for fill style transferring in a resource-constrained device
JP4574161B2 (en) * 2003-11-17 2010-11-04 キヤノン株式会社 COMMUNICATION DEVICE, ITS CONTROL METHOD, AND PROGRAM

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020157028A1 (en) * 2000-12-19 2002-10-24 Fuji Xerox Co., Ltd. Internet facsimile and control method thereof and communication instruction terminal
US20020104026A1 (en) * 2001-01-29 2002-08-01 Robert Barra Method and apparatus for providing a service to transfer messages over a communications network
US20020191223A1 (en) * 2001-03-29 2002-12-19 Atsushi Ishikawa Image processing apparatus, information communication method, program and information communication system
US20030140252A1 (en) * 2001-07-20 2003-07-24 Martin Lafon Authentication process and device
US20030233437A1 (en) * 2002-04-24 2003-12-18 Hiroshi Kitada Browser, method, and computer program product for managing documents
US20040003030A1 (en) * 2002-06-28 2004-01-01 Ems Inc. Mail server with forwarding function and a storage medium storing a program for the mail server
US20050073665A1 (en) * 2002-10-21 2005-04-07 Sharp Kabushiki Kaisha. Data transmission device, data transmission method, data transmission program, data reception device, data reception method, data reception program, and communication system

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060139671A1 (en) * 2004-12-27 2006-06-29 Kabushiki Kaisha Toshiba Image forming apparatus and method of controlling apparatus
US20060248153A1 (en) * 2005-05-02 2006-11-02 Xerox Corporation Electronic mail behavior with a multi-function machine
US7831665B2 (en) * 2005-05-02 2010-11-09 Xerox Corporation Electronic mail behavior with a multi-function machine
US20070011293A1 (en) * 2005-06-28 2007-01-11 Samsung Electronics Co., Ltd. System and method of managing printing data using an FTP and a user terminal device and an image forming device using the same
US7676658B2 (en) * 2006-03-15 2010-03-09 Canon Kabushiki Kaisha Data processing apparatus configured to load a program corresponding to each of a plurality of functions into a memory and execute the loaded program, and method for loading programs in the data processing apparatus
US20070220501A1 (en) * 2006-03-15 2007-09-20 Canon Kabushiki Kaisha Image processing apparatus, method therefor, and storage medium
US7756937B2 (en) * 2006-08-18 2010-07-13 Brother Kogyo Kabushiki Kaisha Network device
US20080046521A1 (en) * 2006-08-18 2008-02-21 Brother Kogyo Kabushiki Kaisha Network device
US8386570B2 (en) 2006-08-18 2013-02-26 Brother Kogyo Kabushiki Kaisha Electronic mail communication device
US20080046523A1 (en) * 2006-08-18 2008-02-21 Brother Kogyo Kabushiki Kaisha Electronic mail communication device
US20080086639A1 (en) * 2006-10-10 2008-04-10 Fuji Xerox Co., Ltd. Processor with encryption function, encryption device, encryption processing method, and computer readable medium
US20080231884A1 (en) * 2007-03-22 2008-09-25 Kabushiki Kaisha Toshiba Image forming apparatus which has a fax function
US20090064289A1 (en) * 2007-09-05 2009-03-05 Samsung Electronics Co., Ltd. Method of authenticating user using server and image forming apparatus using the method
US8522325B2 (en) * 2007-09-05 2013-08-27 Samsung Electronics Co., Ltd. Method of authentication user using server and image forming apparatus using the method
US8918852B2 (en) 2007-09-05 2014-12-23 Samsung Electronics Co., Ltd. Method of authentication user using server and image forming apparatus using the method
US20090187758A1 (en) * 2008-01-18 2009-07-23 Sharp Kabushiki Kaisha Data communication system and data transmitting apparatus
US8181263B2 (en) * 2008-01-18 2012-05-15 Sharp Kabushiki Kaisha Data communication system controlling available addressees for data based on preselected security level of user and addressee location
US20090310180A1 (en) * 2008-06-13 2009-12-17 Konica Minolta Business Technologies, Inc. Image processing device which performs setting of device based on information acquired
US8934118B2 (en) * 2008-06-13 2015-01-13 Konica Minolta Business Technologies, Inc. Image processing device which performs setting of device based on information acquired
CN101945095A (en) * 2009-07-02 2011-01-12 夏普株式会社 User profile provides system
US20110004755A1 (en) * 2009-07-02 2011-01-06 Sharp Kabushiki Kaisha User information providing system
US8402271B2 (en) * 2009-07-02 2013-03-19 Sharp Kabushiki Kaisha User information providing system
US20120092691A1 (en) * 2010-10-13 2012-04-19 Konica Minolta Business Technologies, Inc. Image forming apparatus, information device, and computer-readable storage medium for computer program
US8767225B2 (en) * 2010-10-13 2014-07-01 Konica Minolta Business Technologies, Inc. Image forming apparatus, information device, and computer-readable storage medium for computer program for setting a function based on device information
US20120158873A1 (en) * 2010-12-21 2012-06-21 Canon Kabushiki Kaisha Data communication apparatus, data communication apparatus control method, and program
US9641473B2 (en) * 2010-12-21 2017-05-02 Canon Kabushiki Kaisha Data communication apparatus, data communication apparatus control method, and program
US20120226895A1 (en) * 2011-03-01 2012-09-06 Microsoft Corporation Protecting operating system configuration values
US9256745B2 (en) * 2011-03-01 2016-02-09 Microsoft Technology Licensing, Llc Protecting operating system configuration values using a policy identifying operating system configuration settings
US9424431B2 (en) 2011-03-01 2016-08-23 Microsoft Technology Licensing, Llc Protecting operating system configuration values using a policy identifying operating system configuration settings
US20140223004A1 (en) * 2013-02-06 2014-08-07 Tadashi Honda Network system and information reporting method
US20160014113A1 (en) * 2014-07-10 2016-01-14 Ricoh Company, Ltd. Information processing apparatus, information processing method, and computer program product
CN105991523A (en) * 2015-01-30 2016-10-05 莱里达网络远程信息技术服务有限公司 Method of generating electronic protocol authenticated by user of telecom operator

Also Published As

Publication number Publication date
JP2005149221A (en) 2005-06-09
CN1620065A (en) 2005-05-25
US8621579B2 (en) 2013-12-31
JP4574161B2 (en) 2010-11-04
US20140082708A1 (en) 2014-03-20
CN100539583C (en) 2009-09-09
US20110219436A1 (en) 2011-09-08
US20190158485A1 (en) 2019-05-23
US10243948B2 (en) 2019-03-26

Similar Documents

Publication Publication Date Title
US20190158485A1 (en) Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US20210044705A1 (en) Apparatus for transmitting image, method of transmitting image, computer-readable program and computer-readable storage medium
US20160316076A1 (en) Image communication method and apparatus
US9106868B2 (en) Image processing apparatus, control method therefor, and storage medium
US9948584B2 (en) Communication apparatus and method of controlling same
JP5513107B2 (en) Information processing apparatus, control method therefor, and program
JP5883165B2 (en) Image transmitting apparatus, image transmitting apparatus control method and program
JP2003179722A (en) Method for scanning hard-copy image to electronic mail
JP4656671B2 (en) Image communication apparatus and control method thereof
US7733518B2 (en) Image processing apparatus with resolution determined by pixel count and used for print image, method, program, and recording
MXPA02008522A (en) Features for scanning hard-copy images to electronic mail.

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TONEGAWA, NOBUYUKI;REEL/FRAME:016009/0468

Effective date: 20041108

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION