US20080052722A1 - Information processing method and apparatus - Google Patents

Information processing method and apparatus Download PDF

Info

Publication number
US20080052722A1
US20080052722A1 US11/759,865 US75986507A US2008052722A1 US 20080052722 A1 US20080052722 A1 US 20080052722A1 US 75986507 A US75986507 A US 75986507A US 2008052722 A1 US2008052722 A1 US 2008052722A1
Authority
US
United States
Prior art keywords
task
user
job flow
processing
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/759,865
Other languages
English (en)
Inventor
Momoe Tokunaga
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TOKUNAGA, MOMOE
Publication of US20080052722A1 publication Critical patent/US20080052722A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

Definitions

  • the invention relates to an information processing apparatus and method that creates and executes a job flow wherein a plurality of processes cooperate.
  • Japanese Patent Laid-Open No. 2004-287859 discloses a service processing apparatus that is capable of combining, either in series or in parallel, such processes as fax transmission, scanning, and printing that are to be carried out on a document data, and setting and executing the processes as a job flow.
  • a service processing apparatus that is capable of combining, either in series or in parallel, such processes as fax transmission, scanning, and printing that are to be carried out on a document data, and setting and executing the processes as a job flow.
  • Japanese Patent Laid-Open No. 2004-287859 it is possible to make each respective device that is connected via a network cooperate to execute a plurality of processes that are set to be executed as a job flow.
  • the job flow may quit before completion with an error, depending on the security that is applied;
  • the present invention offers an information processing apparatus and method that facilitates executing a job flow as appropriate to such properties as the security level that is set for the data to be processed.
  • an information processing apparatus comprising: a receiving unit adapted to receive an execution request of a job flow that defines an execution order of a plurality of processing tasks; an acquiring unit adapted to acquire a property information that depicts a restriction for a processing-target data for a user who performs the execution request; and a control unit adapted to control the execution of the plurality of processing tasks for the job flow, according to the restriction that is depicted by the property information that is acquired by the acquiring unit.
  • an information processing method comprising the steps of: receiving an execution request of a job flow that defines an execution order of a plurality of processing tasks; acquiring a property information that depicts a restriction for a processing-target data for a user who performs the execution request; and controlling the execution of the plurality of processing tasks for the job flow, according to the restriction that is depicted by the property information that is acquired in the acquiring step.
  • FIG. 1 depicts an overall configuration of a task cooperation processing system according to the embodiment.
  • FIG. 2 is a flowchart that depicts an operation by the task cooperation processing system when a job flow is executed that handles a document data that is managed on a policy management server 12 .
  • FIG. 3 depicts an example of a data configuration of a task definition information according to the embodiment.
  • FIG. 4A depicts an example of a job flow for describing a job flow definition information according to the embodiment.
  • FIG. 4B depicts a definition information, in XML, that corresponds to the job flow example depicted in FIG. 4A .
  • FIG. 5 depicts an example of a security level being set on a per user basis for a document data A that is managed on the policy management server 12 .
  • FIG. 6 depicts a description of a job flow definition that is handled according to the embodiment.
  • FIG. 7 depicts an embodiment of each respective task when a user A executes the job flow 60 that is depicted in FIG. 6 .
  • FIG. 8 is a flowchart that describes using a job flow management server 11 for a job flow execution process, according to the embodiment.
  • FIG. 9 is a flowchart that depicts a process of execution task determination, performed by the job flow management server ( FIG. 8 , step S 104 ), according to the embodiment.
  • FIG. 10 depicts a description of a job flow definition that is depicted as an example according to a second embodiment.
  • FIG. 11 depicts an execution status of each respective task when the user A executes a job flow 110 that is depicted in FIG. 10 .
  • FIG. 12 is a flowchart that describes a process of the job flow management server 11 executing a job flow, according to the second embodiment.
  • FIG. 13 is a flowchart that depicts a process of the job flow management server 11 determining an execution task and a property ( FIG. 12 , step S 304 ), according to the second embodiment.
  • FIG. 14 depicts an example of a security level being set on a per user basis for the document data A that is managed on the policy management server 12 , according to a third embodiment.
  • FIG. 15 displays an alternative task table that contains alternative tasks that may be executed when a task cannot be executed because of the document data's security level.
  • FIG. 16 depicts a description of a job flow definition that is depicted as an example according to the third embodiment.
  • FIG. 17 depicts an execution status of each respective task when the user A executes a job flow 170 that is depicted in FIG. 16 .
  • FIG. 18 is a flowchart describing a process of determining the alternative task and the property, according to the third embodiment.
  • FIG. 19 depicts an example of a security level being set on a per user basis for a document B that is managed on the policy management server 12 , according to the third embodiment.
  • FIG. 20 depicts a description of a job flow definition that is depicted as an example according to a fourth embodiment.
  • FIG. 21 depicts an execution status of each respective task when the user A executes a job flow 220 that is depicted in FIG. 20 .
  • FIG. 22 is a flowchart describing a process of determining the alternative task and the property, according to the fourth embodiment.
  • FIG. 1 depicts an overall configuration of a task cooperation processing system according to the embodiment.
  • the task cooperation processing system entails a print processing apparatus 14 a cooperatively executing a variety of tasks that are offered by the print processing apparatus 14 a or an application 14 b .
  • a task according to the embodiment denotes a unit of executable processing on the document data.
  • a task of the print processing apparatus 14 a would signify a process on the document data such as a copy process, a scan process, a fax transmission process, a process of saving the document data to a hard drive within the print processing apparatus, or an e-mail transmission process. That the task is not limited to the foregoing goes without saying.
  • the task cooperation processing system is capable of cooperating with a plurality of applications 14 b , which are in turn capable of offering a variety of tasks, in addition to the print processing apparatus 14 a , which offers the foregoing tasks.
  • the print processing apparatus 14 a and the application 14 b are collectively defined as a task processing apparatus 14 , according to the embodiment.
  • a job flow management server 11 executes a task cooperation process according to a job flow definition, in cooperation with a plurality of task processing apparatuses 14 .
  • the task cooperation processing system is connected to the job flow management server 11 , a policy management server 12 , a user management server 13 , and the task processing apparatus 14 , via a dedicated network 15 for each apparatus.
  • the job flow management server 11 manages the task processing apparatus 14 , such as the print processing apparatus 14 a and the application 14 b , as well as a plurality of job flows (JF 1 , JF 2 , or JF 3 ).
  • the policy management server 12 manages the document data and the security information for the document data.
  • the user management server. 13 manages information about a user who executes a job flow, as well as for a user who accesses the document data.
  • the task cooperation processing system entails a single job flow management server 11 , a single policy management server 12 , a single user management server 13 , and a single task processing apparatus 14 being connected.
  • the description according to the job flow that is being executed is predicated on the handling of the document data that is being managed by the policy management server 12 .
  • FIG. 2 is a flowchart that depicts an operating flow of the task cooperation processing system when a job flow is executed that handles a document data that is managed on the policy management server 12 .
  • the task processing apparatus 14 requests that the job flow management server 11 execute the job flow.
  • the job flow management server 11 Upon receipt of the job flow execution request from the task processing apparatus 14 , the job flow management server 11 performs a user check, which queries the user management server 13 for information on the user 21 who is executing the job flow (step 23 ).
  • the job flow management server 11 executes a check for the presence of the document data, which checks whether or not the document data is being used in a task within the job flow that is being executed (step 24 ).
  • the job flow management server 11 performs a security check (step 25 ), by querying the policy management server 12 for the security information of the document data that is being handled within the job flow.
  • the policy management server 12 manages the security level for the document data on a per user basis. Accordingly, the job flow management server 11 is capable of checking whether or not the user 21 who is executing the job flow possesses authorization for the document data, by examining the security information on the policy management server 12 .
  • the job flow management server 11 executes the job flow by causing the task processing apparatus 14 to execute the task, according to the security level on the document data (step 26 ).
  • a record is left, such as a log of job flow execution results, and notifies the user 21 of the execution results (step 27 ). It is possible to perform the recording or the notification of the execution results, and the recipient of the notification of the results is not solely limited to the user 21 who is executing the job flow.
  • FIG. 3 depicts an example of a data configuration of a task definition information according to the embodiment.
  • a task definition information 31 stores the following information on a task: a task name, the task processing apparatus that executes the task, a property information that is necessary for the execution of the task, an input data that is necessary for the execution of the task, and an output data that is outputted following the execution of the task. While the task definition information has the protocol denoted in FIG. 3 according to the embodiment, the descriptive protocol of the task definition information is not limited thereto.
  • FIG. 4A depicts an example of a job flow for describing a job flow definition information according to the embodiment.
  • the example job flow in FIG. 4A executes a task 1 , processes a task 2 and a task 3 in parallel, and executes a task 4 , whereupon the job flow terminates.
  • FIG. 4B depicts a definition information, in XML, that corresponds to the job flow example depicted in FIG. 4A .
  • an XML task tag is labeled to correspond to each task, with a task execution sequence defined by the task name that is executed prior to the given task and the task name that is executed following the given task labeled appropriately.
  • the information relating to the property of the task is defined within the task definition information, the information is described within the property tag.
  • the job flow definition information is completed by describing all of the tasks that are defined within the job flow, using the task tag to define the tasks.
  • the description of the job flow definition information is not limited to XML, provided that the contextual relationship between the tasks
  • FIG. 5 depicts an example of a security level setting 51 on a per user basis for a document data A, i.e., a document A, that is managed on the policy management server 12 , according to the embodiment.
  • a document data A i.e., a document A
  • an administrator possesses browsing, printing, and editing authorization for the document A. While the user A possesses browsing and editing authorization for the document A, the user A does not possess printing authorization. A user B does not possess authorization to execute browsing, printing, or editing for the document A. It is also permissible to set a security level that would disable printing for the document A, without limitation by user.
  • the security level depicted in FIG. 5 is a segment of the property information of the document A, which describes a process restriction on a per user basis relating to the document A.
  • FIG. 6 depicts a description of a job flow definition that is handled according to the embodiment.
  • a job flow 60 in FIG. 6 is configured of a task 61 , which copies the document A, a task 62 , which sends the document A to a box of the print processing apparatus, i.e., sends a data of the document A to a storage apparatus, and a task 63 , which prints the document A.
  • FIG. 7 depicts an embodiment of each respective task when the user A executes the job flow 60 that is depicted in FIG. 6 .
  • the job flow management server 11 queries the user management server 13 for the user information of the user A (the user check in step 23 ). If the user check is able to obtain user authentication, the job flow management server 11 processes the tasks within the job flow, in sequence.
  • the policy management server 12 is queried for the authorization of the user A for the document A, prior to the execution of each respective task (the security check in step 25 ).
  • the security level is set such as is depicted in FIG. 5 , it will be evident to the job flow management server 11 that the user A possesses authorization other than printing authorization. Accordingly, the task 61 , to copy the document A, and the task 62 , to transmit the document A to the Box, are executed as per normal. Given, however, that the user A does not possess authorization to print the document A, the job flow 60 terminates without executing the task 63 , to print the document A.
  • FIGS. 8 and 9 are flowcharts that describe using the job flow management server 11 for a job flow execution process, according to the embodiment.
  • the process depicted in FIG. 8 is launched following obtainment of user authentication in the user check (step 23 ).
  • the job flow management server 11 checks whether or not the document data that is managed on the policy management server 12 is being used (step S 102 ). When the task does not use the document data that is managed on the policy management server 12 , the task is executed promptly (step S 106 ). The tasks 61 through 63 are applied to the document A that is managed on the policy management server 12 , and thus, the process proceeds to step S 103 .
  • the job flow management server 11 When the task uses the document data that is managed on the policy management server 12 , the job flow management server 11 performs the security check (step S 103 ), by querying the policy management server 12 regarding the security of the document data. Based on the security level for the user who is executing the job flow, the job flow management server 11 determines whether or not to execute the task (step S 104 ). If, in step S 104 , a determination is made to execute the task, the process proceeds from step S 105 to step S 106 , and the job flow management server 11 executes the task. If a determination is made not to execute the task, the execution of the task is prevented, by skipping step S 106 . When the processing of steps S 101 through S 107 is completed for all tasks within the job flow, the results of job flow that is executed is saved and a notification issued (step S 108 ), and the process terminates.
  • FIG. 9 is a flowchart that depicts a process of execution task determination by the job flow management server 11 ( FIG. 8 , step S 104 ), according to the embodiment. The process is executed if a task that is present within the job flow being executed is applied to the document data that is managed on the policy management server 12 .
  • the job flow management server 11 checks whether or not the user who is executing the job flow possesses authorization for the process that the task is attempting to execute on the document data, based on the security information that is obtained from the policy management server 12 (step S 201 ). If it is determined that the user does possess authorization, the job flow management server 11 sets the task for execution (step S 202 ), and the process terminates. If, on the other hand, it is determined that the executing user does not possess authorization, the task cannot be properly executed, and thus, the job flow management server 11 sets the task not to be executed (step S 203 ), whereupon the process terminates.
  • a security level has not been set for the document A concerning the processing of the tasks 61 and 62 , i.e., copying and transmitting to the Box.
  • the user is determined to possess authorization for the processes, and the tasks are set to be executed. Consequently, the tasks 61 and 62 are executed within the execution of the job flow 60 .
  • the security level setting 51 in FIG. 5 , however, the user A who is executing the job flow does not possess authorization for the process of the task 63 , i.e., printing. Consequently, the task 63 is set not to be executed in step S 203 , and the task 63 is skipped, i.e., execution is prevented, in step S 105 .
  • the job flow is executed as appropriate to the corresponding security.
  • the job flow changes dynamically in response to the user who is executing the job flow and the security level that is set for the user.
  • a second embodiment an example will be described wherein the job flow changes dynamically when a user is present who is related to each respective task other than the user who is executing the job flow.
  • the configuration for such as the task cooperation processing system according to the second embodiment is similar to that according to the first embodiment. It is presumed that the security level depicted in FIG. 5 is set for a document B on the policy management server 12 .
  • FIG. 10 depicts a description of a job flow definition that is depicted as an example according to the second embodiment.
  • the job flow 110 is configured of the following seven tasks:
  • a task 111 that scans the document data
  • a task 112 that carries out OCR processing on the document data that is scanned in the task 111 , and performs a text extraction
  • a task 113 that combines the text data that is extracted in the task 112 with the document data B that is managed on the policy management server 12 ;
  • a task 114 that sends the document data B that was combined and created in the task 113 to the administrator and a user B;
  • a task 115 that sends the document data B that was combined and created in the task 113 to the storage apparatus, i.e., the Box;
  • a task 116 that uses the print processing apparatus 14 a to print the document data B that was combined and created in the task 113 ;
  • a task 117 that sends an e-mail notification to the administrator and the user B that the document data B that was combined and created in the task 113 has been sent to the Box.
  • the job flow 110 is processed through cooperation between the job flow management server 11 and the task processing apparatus 14 .
  • the task 115 sending to the Box
  • the task 115 means a transmission of data to a storage region within the task processing apparatus 14 , i.e., within the print processing apparatus 14 a , that is referred to as the Box. It would also be permissible to send the data to a storage region, i.e., a folder, on the user's PC.
  • a protocol is used such as e-mail, a send to a folder wherein the files are shared, using a Server Message Block (SMB), protocol, or a put command that is part of the File Transfer Protocol (FTP).
  • SMB Server Message Block
  • FTP File Transfer Protocol
  • FIG. 11 depicts an execution status of each respective task when the user A executes the job flow 110 that is depicted in FIG. 10 .
  • the job flow management server 11 queries the user management server 13 for the user information of the user A (the user check in FIG. 2 (step 23 )). If the user check is able to obtain user authentication, the job flow management server 11 processes the tasks within the job flow, in sequence.
  • the task 113 performs a combination of the document B and the text, wherein the document B is the document data that is managed on the policy management server 12 . Accordingly, when the task 113 is executed, the job flow management server 11 queries the policy management server 12 for the security information of the user A for the document data. As depicted in FIG. 5 , the task 113 is determined to be executable, because the user A possesses editing authorization for the document B, and thus, the task 113 is executed.
  • the task 114 relates both to the user who is executing the job flow, such as each respective task that is depicted according to the first embodiment, as well as to the user other than the user who is executing the job flow.
  • the policy management server 12 is queried for the security information on all users that are connected with the task, including the user who is executing the job flow.
  • the security level for the document B is as depicted in FIG. 5 , and there is no constraint for the send process that is executed by the task 114 .
  • the task 114 is executable thereupon.
  • the job flow management server 11 changes the property of the task 114 , changing it into a task 121 , which sends the document B that has been edited in the task 113 only to the administrator. The modified task 121 is then executed.
  • the task 115 which sends the document data B, which was combined with the text in the task 113 , to the Box, relates only to the user A who is executing the job flow, and has no constraint relating to the process. Thus, it is executed as written.
  • the task 116 performs a print of the document data that includes the document B. As depicted in FIG. 5 , however, the user A does not possess authorization to print the document B, and thus, the task 116 is not executed, through a process similar to that according to the first embodiment.
  • the task 117 handles the document data that includes the document B, and is related to the administrator and the user B, in addition to the user A who is executing the job flow. Thus, all users are checked for security pertaining to the document B.
  • the administrator who relates to the task 114 possesses all authorization, whereas the user B possesses no authorization at all, as depicted in FIG. 5 . Consequently, the property of the task 117 is changed, similar to the task 114 , to send the e-mail, i.e., the notification that the document B has been sent to the Box, only to the administrator, and execution is performed as a task 122 .
  • FIG. 12 and FIG. 13 are flowcharts that describe a process of an affiliation of the job flow management server 11 and the task processing apparatus 14 executing a job flow, according to the second embodiment.
  • steps S 301 through S 307 are executed for all tasks within the job flow that is being executed.
  • the job flow management server 11 checks whether or not the document data that is managed on the policy management server 12 is being used (step S 302 ). When the task does not use the document data that is managed on the policy management server 12 , the process proceeds to step S 306 , wherein the job flow management server 11 executes the task.
  • the job flow management server 11 When the task uses the document data that is managed on the policy management server 12 , the job flow management server 11 performs the security check (step S 303 ), by querying the policy management server 12 regarding the security of the document data. Based on the security level of the document data for the user who is executing the job flow, as well as for the user who is related to the task, the job flow management server 11 determines the execution of the task, as well as the property of the task (step S 304 ). The process is described in detail in FIG. 13 .
  • the job flow management server 11 checks whether or not the results of the process in step S 304 have determined that the task is to be executed (step S 305 ). If the task is to be executed, the task is executed (step S 306 ), according to the property that was determined in step S 304 . When the process in steps S 301 through S 307 have been completed for all tasks, the outcome of the executed job flow is saved, and a notification of the outcome issued (step S 308 ), and the process terminates.
  • FIG. 13 is a flowchart that depicts a process of the job flow management server 11 determining an execution task and a property ( FIG. 12 , step S 304 ), according to the second embodiment.
  • the process is executed when a task is present within the job flow that is being executed that handles the document data that is managed on the policy management server 12 .
  • the job flow management server 11 checks whether or not the user who is executing the job flow possesses authorization to execute the process, vis-a-vis the document data, that is set forth in the task (step S 401 ). If the user who is executing the job flow does not have authorization, the job flow management server 11 sets the task to non-executable (step S 402 ), and the process terminates. If, on the other hand, the user who is executing the job flow does have authorization, the job flow management server 11 sets the task to executable (step S 403 ), and the process proceeds to step S 404 .
  • the job flow management server 11 checks whether or not a related user other than the user who is executing the job flow is present for the task (step S 404 ). If no related user is present, the process terminates. If the related user is present, the process in steps S 405 through S 408 is performed for each respective related user. The job flow management server 11 checks whether or not the related user has browsing authorization (step S 406 ), and deletes the related user from the property of the task if the related user does not have browsing authorization (step S 407 ). If the related user does have browsing authorization, the job flow management server 11 performs a check pertaining to the next related user, without performing the property change. When the process is completed for all related users, the property of the task is determined from the property that is updated in step S 407 , and the process terminates.
  • steps S 302 through S 306 are skipped, and the process is executed directly.
  • the task 113 assigns editing authorization to the user A who is executing the job flow, and no related user other than the user who is executing the job flow is present.
  • process of the task 113 is also executed as written (steps S 303 , S 304 , S 401 , S 403 , NO in S 404 , and YES in S 305 ).
  • the tasks 114 and 116 have, as related users, the administrator and the user B, aside from the user who is executing the job flow the user A, and the user B does not have browsing authorization.
  • the tasks 114 and 116 are executed with the user B deleted from the output destination that is the property information thereof (steps S 303 , S 304 , S 401 , S 403 , YES in S 404 , S 406 , S 407 , and YES in S 305 ).
  • a lack of browsing authorization prevents all access to the data, while possession of browsing authorization allows access. Accordingly, execution of pointless transmissions is prevented by checking only the browsing authorization of the user to whom the transmission is to be made, according to the embodiment.
  • the property of the task is determined according to the security level that is set for the user as relates to the execution of the task, in addition to whether or not the task is executable according to the security level of the user who is executing the job flow. Consequently, it is possible to implement efficient job flow execution according to the security.
  • the job flow is dynamically changed to execute an alternative task when the task cannot be executed according to the security level of the document data.
  • the configuration for such as the task cooperation processing system according to the third embodiment is similar to that according to the first embodiment.
  • FIG. 14 depicts an example of a security level being set on a per user basis for the document data A that is managed on the policy management server 12 , according to the third embodiment.
  • the security level setting 151 the administrator possesses browsing, copying, printing, and editing authorization for the document A. While the user A possesses browsing and printing authorization for the document A, the user A does not possess copying or editing authorization therefor. The user B does not possess authorization to execute any of browsing, copying, printing, or editing authorization for the document A.
  • FIG. 15 displays an example of a data configuration of an alternative task table that contains alternative tasks that may be executed when a task cannot be executed because of the document data's security level.
  • the alternative task that is chosen to be executed when the copy process cannot be executed is the notification to the user who executes the job flow of the location where the file is being saved.
  • the alternative task that is chosen to be executed when the print process cannot be executed is the sending of the data to the user who executes the job flow to modify the process, as well as notification by e-mail.
  • FIG. 15 depicts one example of setting via the alternative task table, which is not limited thereto. The user may set the alternative task at will.
  • FIG. 16 depicts a description of a job flow definition that is depicted as an example according to the third embodiment.
  • a job flow 170 is configured of a task 171 , that copies the document A, a task 172 , that sends the document A to the administrator and the user B, a task 173 , that prints the document A, and a task 174 , that e-mails the document A to the administrator and the user B.
  • FIG. 17 depicts an execution status of each respective task when the user A executes the job flow 170 that is depicted in FIG. 16 .
  • the job flow management server 11 queries the user management server 13 for the user information of the user A (the user check in FIG. 2 (step 23 )). If the user check is able to obtain the authentication of the user, the job flow management server 11 processes the tasks of the job flow in sequence, and in cooperation with the task processing apparatus 14 .
  • the job flow management server 11 queries the policy management server 12 for the security of the user A vis-A-vis the document data A, because the task 171 , which copies the document A, uses the document A that is managed by the policy management server 12 . As depicted in FIG. 14 , it is apparent that the task 171 cannot be executed, because the user A does not have copying authorization for the document A. According to the third embodiment, the alternative task table 161 that is depicted in FIG. 15 is queried, and a search is performed for an alternative task to the copy task that cannot be executed.
  • the task that is defined as the alternative task to the copy task is “notify the person who is executing the job flow of the location where the file is saved.” Accordingly, the task 171 is changed to a task 181 , wherein a notification is made of the location where the document is saved, and the task 181 is executed instead.
  • the task 172 sending the document A, is executable because there are no security constraints on the user A thereupon. Given, however, that the recipients, i.e., the administrator and the user B, are also concerned with the task 172 , the policy management server 12 is queried for the security of the administrator and the user B vis-a-vis the document A. As depicted in FIG. 15 , the user B has no authorization vis-a-vis the document A. Thus, the job flow management server 11 changes the property of the task 172 to perform the sending of the document A only to the administrator, executing the send as a task 182 (the process as described according to the second embodiment).
  • the task 173 involves handling the document A that is managed by the policy management server 12 , and given that the user A who is executing the job flow has printing authorization, the task is executed as written.
  • the job flow management server 11 changes the property to perform the sending of the document A by e-mail only to the administrator, executing the send as a task 183 , similar to the treatment of the task 172 .
  • step S 304 the setting of the alternative task is performed as required, in addition to the changing of the property. If there is a task that is set to be executed, i.e., the current task, the alternative task, or the task whose properties have been changed, the job flow management server 11 proceeds from step S 305 of the process to step S 306 , and executes the task.
  • FIG. 18 is a flowchart describing a process of determining the alternative task and the property, according to the third embodiment.
  • the process is executed in FIG. 12 , step S 304 , by the job flow management server 11 .
  • the tasks within the job flow that is being executed are executed with regard to the task that is concerned with handling the document A that is managed by the policy management server 12 .
  • the job flow management server 11 checks whether or not the user who is executing the job flow possess authorization for the processing of the task vis-a-vis the document data, based on the security information that was obtained by querying the policy management server 12 (step S 501 ). If the user who is executing the job flow does not have authorization, the job flow management server 11 determines the alternative task from the alternative task table (step S 502 ). If the alternative task table that is queried has no alternative task, the process terminates with no executable task, i.e., treating the task as non-executable (steps S 503 and S 511 ).
  • the job flow management server 11 sets the alternative task so defined to be the task to be executed (steps S 503 and S 504 ). If the user who is executing the job flow has authorization, the job flow management server 11 sets the task to be the task to be executed (steps S 501 and S 505 ).
  • the job flow management server 11 checks whether a user other than the user who is executing the job flow is involved with the task that is set in either step S 504 or S 505 as the task to be executed (step S 506 ). If no related user is present, the process terminates, and the task that is set as the task to be executed is executed as written in FIG. 12 , step S 306 .
  • steps S 507 through S 510 are performed for each respective related user.
  • the job flow management server 11 checks whether or not the related user has browsing authorization. The process continues as written if the related user has browsing authorization (step S 508 ). If the related user does not have browsing authorization, however, the job flow management server 11 deletes the related user from the property of the task that is set as the task to be executed (steps S 508 and S 509 ). When the above process of steps S 508 and S 509 is finished for all related users, the property of the task determined from the property that is updated in step S 509 , and the process ends. When the task and the property are determined, the task so determined is executed, using the property so determined.
  • the job flow is executed with an alternative task being substituted for a task for which the user who is executing the job flow, in addition to the effect according to the second embodiment, allowing the job flow to be executed flexibly and as appropriate to the security.
  • the configuration for such as the task cooperation processing system according to the fourth embodiment is similar to that according to the first embodiment.
  • FIG. 19 depicts an example of a security level being set on a per user basis for a document B that is managed on the policy management server 12 , according to the third embodiment.
  • the administrator possesses browsing, copying, printing, and editing authorization for the document B.
  • the user A possesses browsing and copying, though not printing or editing, authorization for the document B.
  • the user B possesses browsing, though not copying, printing, or editing, authorization for the document B.
  • the alternative task table which holds the alternative tasks that may be executed when a task is not executable by reason of the security level of the document data is similar to the alternative task table according to the third embodiment, as depicted in FIG. 15 .
  • the information contained in the alternative task table is not limited to the example depicted in FIG. 15 , however; alternative tasks may be set at will by the user.
  • FIG. 20 depicts a description of a job flow definition that is depicted as an example according to the fourth embodiment.
  • a job flow 220 is configured of a task 221 , which copies the document B, a task 222 , which sends the document B to the user A and the user B, and a task 223 , which prints the document B.
  • FIG. 21 depicts an execution status of each respective task when the user A executes the job flow 220 that is depicted in FIG. 20 .
  • the job flow management server 11 queries the user management server 13 for the user information of the user A (the user check in FIG. 2 (step 23 )). If the user check is able to obtain user authentication, the job flow management server 11 processes the tasks within the job flow, in sequence, and in cooperation with the task processing apparatus 14 .
  • the task 221 uses, i.e., copies, the document B that is managed on the policy management server 12 , and thus, queries the policy management server for the security of the user A vis-a-vis the document B. Given that the user A has copying authorization for the document B, as depicted in FIG. 19 , the task 221 is executed as written.
  • the task 222 sends the document B to the user A and the use B, meaning that the task 222 relates to the user B as well as the user A. Consequently, the policy management server 12 is queried for the security of the user B vis-a-vis the document B. Given that the user B has browsing authorization for the document B, as depicted in FIG. 19 , the task 222 is executed as written. The task 223 relates only to the user A, who is executing the job flow, and thus, only the security of the user A vis-A-vis the document B is checked. It is apparent from the check that the user A does not have printing authorization vis-a-vis the document B. As described according to the third embodiment, the alternative task table that is depicted in FIG.
  • the “send or e-mail the document B to the user who is executing the job flow” task is defined as the alternative task to the print, and the task 223 is changed to an alternative task 231 “send or e-mail the document B to the user who is executing the job flow”, i.e., the user A.
  • Sending the document B to the user A is, however, equivalent to the task 222 which exists in parallel with the alternative task 231 . Accordingly, execution of the alternative task 231 is prevented.
  • execution of an alternative task is constrained so as to be prevented in a circumstance such as when a task will execute a process that is equivalent to a task that is set as the alternative task, either in parallel therewith or subsequent thereto, rather than simply executing the alternative task, according to the fourth embodiment. Doing so allows efficient execution of the job flow, by facilitating prevention of execution of an unnecessary task.
  • FIG. 22 is a flowchart describing a process of determining the alternative task and the property, according to the fourth embodiment.
  • the process is executed by the job flow management server 11 , in FIG. 12 , step S 304 .
  • the process is executed with regard to the task among the tasks within the job flow that is being executed that handles a document data that is managed on the policy management server 12 .
  • the job flow management server 11 checks whether or not the user who is executing the job flow possess authorization for the process of the task vis-a-vis the document data, based on the security information that obtained via querying the policy management server 12 (step S 601 ). If the user who is executing the job flow does not have authorization, the job flow management server 11 determines an alternative task from the alternative task table (step S 602 ). If no alternative task is found in the examined alternative task table, the process terminates with no executable task (steps S 603 and S 612 ). If, on the other hand, an alternative task is defined in the alternative task table, the job flow management server 11 sets the alternative task so defined to the task to be executed (steps S 603 and S 604 ). If the user who is executing the job flow has authorization, the job flow management server 11 sets the task to the task to be executed (steps S 601 and S 606 ).
  • the job flow management server 11 checks whether or not a task is present that will perform an equivalent process to the alternative task, either in parallel therewith or subsequent thereto, when the alternative task is set in step S 604 (step S 605 ). If a task is present that will perform an equivalent process, the task is treated as a non-executable task (step S 612 ), as there would be no point in executing the alternative task, and the process terminates. If no task is present within the job flow that will perform an equivalent process to the alternative task, the process in step S 607 and thereafter is performed. Thus, a newly set alternative task is constrained not to duplicate another task, including an alternative task that is determined with regard to another task.
  • the job flow management server 11 checks whether or not a user other than the user who is executing the job flow is affiliated with the task that is set in either step S 604 or step S 606 as the task to be executed (step S 607 ). If a related user is not present, the process ends, and the task that is set in FIG. 12 , step S 306 as the task to be executed is executed as written.
  • step S 609 the process in steps S 608 through S 611 is performed for each respective related user.
  • the job flow management server 11 checks whether or not the related user has browsing authorization (step S 609 ). If the related user has browsing authorization, the process continues as written. If the related user does not have browsing authorization, the related user is deleted from the property of the task that is set as the task to be executed (steps S 609 and S 610 ). When the process in step S 609 and step S 610 is completed for all related users, the property of the task is determined according to the property that is updated in step S 610 , and the process ends. When the task and property are thus determined, the task so determined is executed, using the property so determined.
  • the MFP is an apparatus that combines such functions as scanning, copying, printing, boxing (storing, of document data or source files), and sending of e-mail or data files, with the functions of the job flow management server 11 , according to the first through the fourth embodiments.
  • boxing refers to a storage area of the storage apparatus within the MFP, and the function of the sending of e-mail or data files is referred to as the send function.
  • the MFP hosts a Java (registered trade mark) platform for running applications and programs, which is capable of cooperating with the MFP's native functions, i.e., scanning, copying, printing, boxing, and the sending of e-mail or data files.
  • Java registered trade mark
  • a representative example of an application and a program that is executable on the MFP that hosts the Java (registered trade mark) platform would include management of document data, conversion to PDF, and OCR processing.
  • the job flow execution operation is the same as the job flow execution operation according to the first through the fourth embodiments, and thus, is omitted hereinafter.
  • the MFP that is configured in a single system of the job flow management server 11 and the task processing apparatus 14 to include the following arrangements. That is, it would be permissible for the MFP to include a document processing system that comprises a document management apparatus that executes a process task for a document according to plurality of job flows that define a process task execution sequence and a document property management apparatus that manages the property of the document.
  • the document management apparatus possesses a document input unit and a job flow process unit, which executes each respective process task that is contained within the job flow that is directed to be executed on the document that is inputted via the document input unit.
  • the document management apparatus also possesses an output unit, that is connected to the job flow process unit, and which performs an output process on the document that is processed by the job flow process unit, according to the job flow that is directed to be executed.
  • the document management apparatus also possesses a job flow management server, which controls the document management apparatus.
  • the job flow management server possesses a document property acquisition unit, which obtains a property of the inputted document for the document property management apparatus.
  • the job flow management server changes the process content of the process task that the job flow process unit executes, or the output content of the output unit, according to the property of the document that the document property acquisition unit obtains.
  • the document property that the document property management apparatus manages is a document policy property, and as such, is capable of including authorization to execute any of browsing, editing, printing, or copying of the document, at a minimum.
  • the document property management apparatus may also be a document property management server, which is connected to the document processing apparatus via a network.
  • the output process that the output unit performs may also be any of the printing, sending, or save file processes, at a minimum.
  • the job flow management server follows the execution authorization that is signified by the document policy property that the document property acquisition unit obtains. It is thus possible to dynamically change the process content of each respective process task, or the output content of the output unit, of the job flow that is directed to be executed.
  • the document input unit is also capable of either input via an image reading apparatus, or input via selection of a document from a storage region where the document is saved, at a minimum.
  • document data has been employed as the processing-target data for each respective task. It would be permissible, however, to use other data, such as image data. It would also be permissible to attach the security level that is entered into the policy management server 12 to the processing-target data, in the form of property information, for each respective instance of the processing-target data, and for the job flow management server 11 to query the property information. It would also be permissible to employ a configuration wherein the user who is executing the job flow such as the job flow depicted in FIG. 7 or FIG. 10 , for example, is able to specify the processing-target data or the recipient user (the related user), for each respective task.
  • execution of tasks is controlled, and job flow dynamically changed, in response to the property, such as the security, that relates to a constraint on the process, and is set for the data that is handled by the job flow.
  • the property such as the security
  • the present invention contains a circumstance wherein a software program is provided the system or the apparatus, either directly or remotely, and the functions according to the embodiment are configured by having a computer within the system or the apparatus read and execute the program so provided.
  • the program so provided corresponds to the flowchart that is depicted in the figure according to the embodiment.
  • the program code that is installed into the computer in order to implement the function processing of the present invention will itself implement the present invention.
  • the computer program for implementing the function processing of the present invention is itself included in the present invention as well.
  • the program it would be permissible for the program to take such a form as object code, a program that is executed by an interpreter, or script data that is supplied to an operating system, if the code possesses the function of the program.
  • Examples of storage media for providing the program include a floppy disk, a hard drive, an optical disc, a magneto-optical disk, an MO, a CD-ROM, a CD-R, a CD-RW, magnetic tape, a nonvolatile memory card, ROM, or a DVD, including DVD-ROM or DVD-R.
  • Another example of a method for providing the program would be using a web browser on a client computer to connect to a website on the Internet, and downloading the computer program of the present invention from the website to a hard drive or other storage medium.
  • the program so downloaded to be a compressed file that includes an automatic installation function.
  • Implementation would also be possible by segmenting the program code that configures the program of the present invention into a plurality of files, and downloading the files from different webpages.
  • a World Wide Web server that downloads the program files for implementing the function process of the present invention to a plurality of users is also included in the present invention.
  • Another form that may be used is distributing an encrypted form of the program of the present invention to users that is stored on a CD-ROM or other storage medium.
  • a user who satisfies a prescribed condition may download a key information that decrypts the encryption from a website on the Internet, and use the key information to decrypt, execute, and install the program on the computer.
  • the function according to the embodiment is implemented in collaboration with the operating system or other software running on the computer, in accordance with the instruction of the program.
  • the function according to the embodiment is implemented by a process that is actually performed, in whole in or in part, by the operating system or other software.
  • the function according to the embodiment could also be permissible for the function according to the embodiment to be implemented, in whole in or in part, by writing the program that is read out from the storage medium to a memory that is either built into an expansion board that is installed into the computer, or into an expansion unit that is connected to the computer.
  • a CPU or other device that is either built into the expansion board or the expansion unit performs the actual process, in whole in or in part, in accordance with the instruction of the program that is written to the expansion board or the expansion unit.
US11/759,865 2006-06-14 2007-06-07 Information processing method and apparatus Abandoned US20080052722A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006-165364 2006-06-14
JP2006165364A JP4906406B2 (ja) 2006-06-14 2006-06-14 情報処理方法及び装置

Publications (1)

Publication Number Publication Date
US20080052722A1 true US20080052722A1 (en) 2008-02-28

Family

ID=38603400

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/759,865 Abandoned US20080052722A1 (en) 2006-06-14 2007-06-07 Information processing method and apparatus
US11/759,852 Expired - Fee Related US8279466B2 (en) 2006-06-14 2007-06-07 Document processing method and document processing apparatus

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/759,852 Expired - Fee Related US8279466B2 (en) 2006-06-14 2007-06-07 Document processing method and document processing apparatus

Country Status (4)

Country Link
US (2) US20080052722A1 (de)
EP (1) EP1868155A1 (de)
JP (1) JP4906406B2 (de)
CN (1) CN100589518C (de)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100070567A1 (en) * 2008-09-17 2010-03-18 Ricoh Company, Limited Information processing apparatus, delivery system, and processing control method
US20140189703A1 (en) * 2012-12-28 2014-07-03 General Electric Company System and method for distributed computing using automated provisoning of heterogeneous computing resources
US8984623B2 (en) 2011-05-11 2015-03-17 Konica Minolta Businesstechnologies, Inc. Image processing system, image processing apparatus and computer-readable recording medium
US9230246B1 (en) * 2008-08-19 2016-01-05 United Services Automobile Association Systems and methods for electronic document delivery, execution, and return

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4906406B2 (ja) * 2006-06-14 2012-03-28 キヤノン株式会社 情報処理方法及び装置
JP4996310B2 (ja) * 2007-04-05 2012-08-08 キヤノン株式会社 ワークフロー実行装置及びその制御方法とそのプログラム
JP2010140089A (ja) * 2008-12-09 2010-06-24 Ricoh Co Ltd 情報処理システム、画像形成装置、情報処理方法、プログラムおよび記録媒体
JP5644074B2 (ja) * 2009-08-17 2014-12-24 富士ゼロックス株式会社 情報処理装置及び情報処理プログラム
JP5537149B2 (ja) * 2009-12-25 2014-07-02 キヤノン株式会社 画像処理装置及びその制御方法、並びにプログラム
JP5132698B2 (ja) * 2010-02-18 2013-01-30 株式会社東芝 選択的複製システム及び情報管理サーバ装置
JP5682398B2 (ja) * 2011-03-25 2015-03-11 富士ゼロックス株式会社 情報処理装置、情報処理プログラム、及び情報処理システム
US9171178B1 (en) * 2012-05-14 2015-10-27 Symantec Corporation Systems and methods for optimizing security controls for virtual data centers
US20140025759A1 (en) * 2012-07-17 2014-01-23 Joe Miller Alert Management System
US9820119B2 (en) * 2013-10-09 2017-11-14 SWN Communications, Inc. Method and systems for lockbox secured file transmission
JP6294487B2 (ja) 2014-09-30 2018-03-14 エスゼット ディージェイアイ テクノロジー カンパニー リミテッドSz Dji Technology Co.,Ltd 飛行ミッション処理方法、装置及びシステム
JP2017097501A (ja) * 2015-11-19 2017-06-01 株式会社リコー データ出力制御装置、データ出力制御システム、データ出力制御方法及びプログラム

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6185683B1 (en) * 1995-02-13 2001-02-06 Intertrust Technologies Corp. Trusted and secure techniques, systems and methods for item delivery and execution
US20020089693A1 (en) * 2000-12-28 2002-07-11 Yoshiko Maruyama Printing system, printing apparatus and terminal apparatus employed in printing system, and printing method
US20020111841A1 (en) * 2001-02-09 2002-08-15 International Business Machines Corporation Controlling commands in workflow management systems
US6539404B1 (en) * 1997-07-28 2003-03-25 Solectron Corporation Project and role based workflow systems and methods
US20040194010A1 (en) * 2003-03-24 2004-09-30 Fuji Xerox Co., Ltd. Service processing apparatus and service processing method
US20050052664A1 (en) * 2003-08-25 2005-03-10 Ferlitsch Andrew Rodney Systems and methods for providing imaging job control
US20050209841A1 (en) * 2004-03-22 2005-09-22 Andreas Arning Optimization of process properties for workflows with failing activities
US20080007770A1 (en) * 2006-06-14 2008-01-10 Canon Kabushiki Kaisha Document processing method and document processing apparatus
US7574745B2 (en) * 2004-02-13 2009-08-11 Ricoh Company, Ltd. Information processing apparatus, information processing method, computer-readable medium having information processing program embodied therein, and resource management apparatus
US8117665B2 (en) * 2004-09-10 2012-02-14 Konica Minolta Business Technologies, Inc. Data managing method, data managing device and data managing server suitable for restricting distribution of data

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11306244A (ja) 1998-04-16 1999-11-05 Hitachi Ltd ワーク管理システム
JP2003281148A (ja) 2002-03-26 2003-10-03 Konica Corp 文書管理方法及び文書管理システム
GB2387817A (en) * 2002-04-27 2003-10-29 Hewlett Packard Co Page wide array inkjet printer having halftone controller and multiple printheads, each printing different image strips.
GB0306739D0 (en) 2003-03-24 2003-04-30 British Telecomm Mediator-based recovery mechanism for multi-agent system
JP4710215B2 (ja) * 2003-03-24 2011-06-29 富士ゼロックス株式会社 情報管理装置、情報管理方法、及び情報管理プログラム
JP2005228252A (ja) * 2004-02-16 2005-08-25 Fuji Xerox Co Ltd サービス処理装置及び連携処理システム
JP4813768B2 (ja) * 2004-03-11 2011-11-09 株式会社リコー リソース管理装置、リソース管理プログラム、及び記録媒体

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6185683B1 (en) * 1995-02-13 2001-02-06 Intertrust Technologies Corp. Trusted and secure techniques, systems and methods for item delivery and execution
US6539404B1 (en) * 1997-07-28 2003-03-25 Solectron Corporation Project and role based workflow systems and methods
US20020089693A1 (en) * 2000-12-28 2002-07-11 Yoshiko Maruyama Printing system, printing apparatus and terminal apparatus employed in printing system, and printing method
US20020111841A1 (en) * 2001-02-09 2002-08-15 International Business Machines Corporation Controlling commands in workflow management systems
US20040194010A1 (en) * 2003-03-24 2004-09-30 Fuji Xerox Co., Ltd. Service processing apparatus and service processing method
US20050052664A1 (en) * 2003-08-25 2005-03-10 Ferlitsch Andrew Rodney Systems and methods for providing imaging job control
US7574745B2 (en) * 2004-02-13 2009-08-11 Ricoh Company, Ltd. Information processing apparatus, information processing method, computer-readable medium having information processing program embodied therein, and resource management apparatus
US20050209841A1 (en) * 2004-03-22 2005-09-22 Andreas Arning Optimization of process properties for workflows with failing activities
US8117665B2 (en) * 2004-09-10 2012-02-14 Konica Minolta Business Technologies, Inc. Data managing method, data managing device and data managing server suitable for restricting distribution of data
US20080007770A1 (en) * 2006-06-14 2008-01-10 Canon Kabushiki Kaisha Document processing method and document processing apparatus

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9230246B1 (en) * 2008-08-19 2016-01-05 United Services Automobile Association Systems and methods for electronic document delivery, execution, and return
US20100070567A1 (en) * 2008-09-17 2010-03-18 Ricoh Company, Limited Information processing apparatus, delivery system, and processing control method
US8984623B2 (en) 2011-05-11 2015-03-17 Konica Minolta Businesstechnologies, Inc. Image processing system, image processing apparatus and computer-readable recording medium
US20140189703A1 (en) * 2012-12-28 2014-07-03 General Electric Company System and method for distributed computing using automated provisoning of heterogeneous computing resources

Also Published As

Publication number Publication date
CN101090441A (zh) 2007-12-19
JP2007334610A (ja) 2007-12-27
EP1868155A1 (de) 2007-12-19
CN100589518C (zh) 2010-02-10
US20080007770A1 (en) 2008-01-10
US8279466B2 (en) 2012-10-02
JP4906406B2 (ja) 2012-03-28

Similar Documents

Publication Publication Date Title
US8279466B2 (en) Document processing method and document processing apparatus
US7861282B2 (en) Information processing apparatus, printing apparatus and printing system including thereof apparatuses
US8797564B2 (en) Image processing apparatus, image processing method, and storage medium
US8243320B2 (en) Document management apparatus, control method therefor, computer program, and storage medium
JP5388541B2 (ja) 画像処理装置、画像処理システム、それらの制御方法、プログラム、及び記憶媒体
US20090044283A1 (en) Document management apparatus, document management system and method, and computer-readable medium
JP2007156612A (ja) 情報処理装置、サーバ装置、ファイル処理方法、記憶媒体およびプログラム
US20060044610A1 (en) Server printing apparatus and its control method, and computer program
US20110067088A1 (en) Image processing device, information processing method, and recording medium
KR101062285B1 (ko) 정보 처리 장치, 정보 처리 방법, 및 기록 매체
US20150248560A1 (en) Method for specifying user access rights for a digital document using existing rights management policies with modifications
KR100618043B1 (ko) 서비스 처리장치, 서비스 처리시스템 및 서비스처리시스템의 원 데이터 보관방법
JP5012525B2 (ja) セキュリティポリシーサーバ、セキュリティポリシー管理システム及びセキュリティポリシー管理プログラム
JP5371611B2 (ja) データ処理システム、サーバ、サーバの制御方法、及びプログラム
JP2007156900A (ja) 文書管理装置及び方法
JP4764897B2 (ja) 画像形成装置、画像形成方法、情報処理システム及びプログラム
US20160162233A1 (en) Electronic apparatus, management system, and recording medium
US20140101210A1 (en) Image processing apparatus capable of easily setting files that can be stored, method of controlling the same, and storage medium
US8341697B2 (en) Image processing system, image processing apparatus, and control method of image processing apparatus
JP5353476B2 (ja) 文書送信装置、文書送信プログラム、及び文書フローシステム
JP2008040934A (ja) 情報処理装置および情報処理システムおよび情報処理方法およびプログラム
JP2007304789A (ja) 印刷制御システム、画像形成装置、文書複製方法
JP2008181290A (ja) 文書管理システム、文書管理装置、制限情報管理装置、文書管理プログラムおよび制限情報管理プログラム
JP2009225016A (ja) 情報処理システムと情報処理装置と情報処理方法とプログラムとコンピュータ読み取り可能な記録媒体
JP2006256204A (ja) 画像形成装置、画像形成システム、データ出力方法、データ出力プログラム、及び、データ出力プログラムを格納した記録媒体

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TOKUNAGA, MOMOE;REEL/FRAME:019401/0544

Effective date: 20070606

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION