WO2021178986A1 - Ressenti de paramétrage de sécurité - Google Patents

Ressenti de paramétrage de sécurité Download PDF

Info

Publication number
WO2021178986A1
WO2021178986A1 PCT/US2021/070012 US2021070012W WO2021178986A1 WO 2021178986 A1 WO2021178986 A1 WO 2021178986A1 US 2021070012 W US2021070012 W US 2021070012W WO 2021178986 A1 WO2021178986 A1 WO 2021178986A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
setup
security
instructions
experience
Prior art date
Application number
PCT/US2021/070012
Other languages
English (en)
Inventor
Azghar Sheik ALI
Kotapati VIJAY KRISHNA
Sunil M. KUMAR
Chandra Sekhar BANDI
Original Assignee
Hewlett-Packard Development Company, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Development Company, L.P. filed Critical Hewlett-Packard Development Company, L.P.
Publication of WO2021178986A1 publication Critical patent/WO2021178986A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Definitions

  • Multi-function devices often combine different components such as a printer, scanner, and copier into a single device. Such devices frequently receive refills of consumables, such as print substances (e.g., ink, toner, and/or additive materials) and/or media (e.g., paper, vinyl, and/or other print substrates).
  • print substances e.g., ink, toner, and/or additive materials
  • media e.g., paper, vinyl, and/or other print substrates
  • FIG. 1 is a block diagram of an example computing device for providing security setup experience.
  • FIG. 2 is a flowchart of an example method for providing security setup experience.
  • FIG. 3 is a block diagram of an example system for providing security setup experience.
  • MFPs multi-function-print devices
  • the scanning portion of an MFP may comprise an optical assembly located within a sealed enclosure.
  • the sealed enclosure may have a scan window through which the optical assembly can scan a document, which may be placed on a flatbed and/or delivered by a sheet feeder mechanism.
  • the out-of-box experience is typically the first impression a product creates with a user, and this experience may control the ease with which a user/customer can begin using the product. For printers and MFPs, this often means configuring the device with a default configuration, so that the device is ready to use very quickly.
  • the more features offered by the devices the more complex the OOBE may become, and users who do not have technical proficiency with such devices or who may be eager to begin using the device may find a complex setup experience frustrating and/or annoying.
  • security risk settings may be incorporated into the OOBE feature when the user/customer first sets up the printing device to use. This approach may help reduce security risk based on the user’s choices on how they use the printer and limit the network or application level access. It may be helpful to determine a user’s technical complexity level and/or willingness to configure such settings before presenting these security options, however, to assist in providing clear instructions and ensuring the user is easily able to select the appropriate options.
  • FIG. 1 is a block diagram of an example computing device 110 for providing security setup experience.
  • Computing device 110 may comprise a processor 112 and a non-transitory, machine-readable storage medium 114.
  • Storage medium 114 may comprise a plurality of processor-executable instructions, such as instructions 120 and instructions 125.
  • instructions 120, 125 may be associated with a single computing device 110 and/or may be communicatively coupled among different computing devices such as via a direct connection, bus, or network.
  • Processor 112 may comprise a central processing unit (CPU), a semiconductor-based microprocessor, a programmable component such as a complex programmable logic device (CPLD) and/or field-programmable gate array (FPGA), or any other hardware device suitable for retrieval and execution of instructions stored in machine-readable storage medium 114.
  • processor 112 may fetch, decode, and execute provide setup experience instructions 120, security setting determination instructions 125, identify user complexity level instructions 130, and security setting presentation instructions 135.
  • Executable instructions 120, 125, 130, 135 may comprise logic stored in any portion and/or component of machine-readable storage medium 114 and executable by processor 112.
  • the machine-readable storage medium 114 may comprise both volatile and/or nonvolatile memory and data storage components. Volatile components are those that do not retain data values upon loss of power. Nonvolatile components are those that retain data upon a loss of power.
  • the machine-readable storage medium 114 may comprise, for example, random access memory (RAM), read-only memory (ROM), hard disk drives, solid-state drives, USB flash drives, memory cards accessed via a memory card reader, floppy disks accessed via an associated floppy disk drive, optical discs accessed via an optical disc drive, magnetic tapes accessed via an appropriate tape drive, and/or other memory components, and/or a combination of any two and/or more of these memory components.
  • the RAM may comprise, for example, static random access memory (SRAM), dynamic random access memory (DRAM), and/or magnetic random access memory (MRAM) and other such devices.
  • the ROM may comprise, for example, a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), and/or other like memory device.
  • PROM programmable read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • Provide setup experience instructions 120 may provide a setup experience for device 110 to a user.
  • device 110 may present a user interface comprising a series of questions to a user.
  • the presentation may be, for example, via a control panel associated with device 110 and/or a separate device such as a mobile device, computer, laptop, and/or a web browser.
  • an OOBE may be presented via a computer connected to device 110 via a communication connection such as a wired and/or wireless network and/or a cable, such as a universal serial bus (USB) cable.
  • USB universal serial bus
  • the setup experience may, in some implementations present basic questions such as “Is this device being used in an office or home.” Answers to such basic questions may be configured to present different setup questions and/or offer different default options to some settings for device 110. For example, a device being configured for home use may skip setup questions regarding corporate login servers.
  • the setup experience may comprise a set of printed instructions for a device without a display component, a user interface displayed on a display component of device 110 and/or another display, such as a mobile device, computer, laptop, etc., and/oran interactive experience such as interactive voice response (IVR).
  • IVR interactive voice response
  • Security setting determination instructions 125 may determine whether security settings should be presented to the user as part of the setup experience. For example, a user may be presented with a set of configuration questions by provide setup experience instructions 120 along with options for such settings in free-form and/or selection modes. Free-form modes may allow a user to enter information in response to a question, such as entering a text string when asked for a name of device 110 and/or entering a number when asked for a network port to accept incoming connections on.
  • Selection modes may present one or more options to a user as responses to a question, such as checkboxes next to a list of features (e.g., scan, fax, email, copy) to enable and/or a dropdown or radio button interface for single option selections (e.g., presenting a list of available wireless networks to which the device 110 can connect).
  • a list of features e.g., scan, fax, email, copy
  • a dropdown or radio button interface for single option selections (e.g., presenting a list of available wireless networks to which the device 110 can connect).
  • the instructions 125 to determine whether security settings should be presented to the user as part of the setup experience may comprise instructions to determine whether the device has a network connection. For example, if device 110 is not connected to a wireless and/or wired network but only connected to a single computer via a cable, then device 110 may, in some cases, be configured by default to high network security settings that ignore or prevent incoming network requests.
  • the instructions 125 to determine whether security settings should be presented to the user as part of the setup experience may comprise instructions to determine whether the device is associated with a group of commonly managed devices. For example, if the user initiates the setup experience by joining a network on which other devices are detected, then additional security settings to configure access rights by those devices may be presented as part of the setup experience.
  • Identify user complexity level instructions 130 may, in response to determining that security settings should be presented to the user as part of the setup experience, identify a complexity level for the user.
  • each configuration question answered and/or setting entered by the user may be used to generate a general ranking of the user’s technical complexity level. For example, if a user takes a long time to answer each question or if the user opens an available “help” file or other documentation to research more information on one and/or more options, the user may be ranked as a non-technical user.
  • a user may be deemed a technical user, while a user who opts to examine and/or configure additional settings, such as by selecting an “advanced” button on the presented user interface and/or who is identified by their user profile as an administrator may be deemed an advanced user.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to request a selection of a plurality of possible complexity levels from the user. For example, the OOBE may ask if a user would like a simple and/or advanced setup experience.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to determine whether the user is associated with a user profile comprising administrative privileges.
  • Such administrative privileges may be associated with the device 110 and/or a second device of a similar type.
  • the user profile may be deemed associated with a user profile comprising administrative privileges when that user profile has previously exercised such privileges on a similar multi-function printer.
  • the existence of such privileges may not represent any particular privilege level for device 110, but may instead represent an indicator of the user’s technical proficiency and/or complexity level.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to determine whether the user required additional information before selecting a non-security setting option in the setup experience.
  • Security setting presentation instructions 135 may present at least one security setting option to the user according to the identified skill level of the user.
  • the at least one security setting option may comprise at least one of the following: a network setting, a user access setting, a feature availability setting, a communication port setting, and a service setting.
  • a user deemed a non-technical user may have security settings set to a default value based on a type of device 110, such as simply blocking network access for device intended for single user and/or home use.
  • Advanced features such as connections to online storage, file sharing, emailing, mobile device access, etc. may be similarly disabled and/or set to high security options.
  • a user may register an email address with device 110 as part of the setup address.
  • FIG. 2 is a flowchart of an example method 200 for security setup experience. Although execution of method 200 is described below with reference to computing device 110, other suitable components for execution of method 200 may be used.
  • Method 200 may begin at stage 205 and advance to stage 210 where device 110 may provide a setup experience for device 110 to a user.
  • device 110 may execute provide setup experience instructions 120 to provide a setup experience for device 110 to a user.
  • device 110 may present a user interface comprising a series of questions to a user. The presentation may be, for example, via a control panel associated with device 110 and/or a separate device such as a mobile device, computer, laptop, and/or a web browser.
  • an OOBE may be presented via a computer connected to device 110 via a communication connection such as a wired and/or wireless network and/or a cable, such as a universal serial bus (USB) cable.
  • USB universal serial bus
  • the setup experience may, in some implementations present basic questions such as “Is this device being used in an office or home.” Answers to such basic questions may be configured to present different setup questions and/or offer different default options to some settings for device 110. For example, a device being configured for home use may skip setup questions regarding corporate login servers.
  • the setup experience may comprise a set of printed instructions for a device without a display component, a user interface displayed on a display component of device 110 and/or another display, such as a mobile device, computer, laptop, etc., and/or an interactive experience such as interactive voice response (IVR).
  • IVR interactive voice response
  • Method 200 may then advance to stage 215 where computing device 110 may determine whether security settings should be presented to the user as part of the setup experience.
  • device 110 may execute security setting determination instructions 125 to determine whether security settings should be presented to the user as part of the setup experience.
  • a user may be presented with a set of configuration questions by provide setup experience instructions 120 along with options for such settings in free-form and/or selection modes. Free-form modes may allow a user to enter information in response to a question, such as entering a text string when asked for a name of device 110 and/or entering a number when asked for a network port to accept incoming connections on.
  • Selection modes may present one or more options to a user as responses to a question, such as checkboxes next to a list of features (e.g., scan, fax, email, copy) to enable and/or a dropdown or radio button interface for single option selections (e.g., presenting a list of available wireless networks to which the device 110 can connect).
  • a list of features e.g., scan, fax, email, copy
  • a dropdown or radio button interface for single option selections (e.g., presenting a list of available wireless networks to which the device 110 can connect).
  • the instructions 125 to determine whether security settings should be presented to the user as part of the setup experience may comprise instructions to determine whether the device has a network connection. For example, if device 110 is not connected to a wireless and/or wired network but only connected to a single computer via a cable, then device 110 may, in some cases, be configured by default to high network security settings that ignore or prevent incoming network requests.
  • the instructions 125 to determine whether security settings should be presented to the user as part of the setup experience may comprise instructions to determine whether the device is associated with a group of commonly managed devices. For example, if the user initiates the setup experience by joining a network on which other devices are detected, then additional security settings to configure access rights by those devices may be presented as part of the setup experience.
  • method 200 may advance to stage 220 where device 110 may identify a complexity level for the user.
  • the identified skill level of the user may comprise at least one of the following: a non-technical user, a technical user, and an advanced user.
  • device 110 may execute identify user complexity level instructions 130 to, in response to determining that security settings should be presented to the user as part of the setup experience, identify a complexity level for the user.
  • each configuration question answered and/or setting entered by the user may be used to generate a general ranking of the user’s technical complexity level.
  • the user may be ranked as a non-technical user.
  • the user may be deemed a technical user, while a user who opts to examine and/or configure additional settings, such as by selecting an “advanced” button on the presented user interface and/or who is identified by their user profile as an administrator may be deemed an advanced user.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to request a selection of a plurality of possible complexity levels from the user. For example, the OOBE may ask if a user would like a simple and/or advanced setup experience.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to determine whether the user is associated with a user profile comprising administrative privileges.
  • Such administrative privileges may be associated with the device 110 and/or a second device of a similar type.
  • the user profile may be deemed associated with a user profile comprising administrative privileges when that user profile has previously exercised such privileges on a similar multi-function printer.
  • the existence of such privileges may not represent any particular privilege level for device 110, but may instead represent an indicator of the user’s technical proficiency and/or complexity level.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to determine whether the user required additional information before selecting a non-security setting option in the setup experience.
  • Method 200 may then advance to stage 225 where computing device 110 may present at least one security setting option to the user according to the identified skill level of the user.
  • device 110 may execute security setting presentation instructions 135 to present at least one security setting option to the user according to the identified skill level of the user.
  • the at least one security setting option may comprise at least one of the following: a network setting, a user access setting, a feature availability setting, a communication port setting, and a service setting.
  • a user deemed a non-technical user may have security settings set to a default value based on a type of device 110, such as simply blocking network access for device intended for single user and/or home use.
  • Advanced features such as connections to online storage, file sharing, emailing, mobile device access, etc. may be similarly disabled and/or set to high security options.
  • a user may register an email address with device 110 as part of the setup address.
  • a technical and/or advanced user may be presented with options to set up an address book so that scanned documents may be emailed or faxed to a number of recipients, while a non-technical user may be limited by default to simply emailing such documents to their registered email address.
  • presenting the at least one security setting option to the user according to the identified skill level of the user may comprise presenting a plurality of additional security settings to the advanced user than to the technical user. For example, a non-technical user may be presented with a single question such as “Would you prefer high or low default security settings?”, a technical user may be asked additional questions such as about which features to enable, and an advanced user may be asked yet more questions, such as about firewall settings, user authentication servers, and other security features.
  • method 200 may advance to stage 230 where device 110 may configure the at least one security setting option to a default value.
  • configuring the at least one security setting option to a default value may comprise configuring the at least one security setting to a highest security value. For example, incoming network connection requests may be configured to be ignored and/or refused.
  • Method 200 may then end at stage 250.
  • FIG. 3 is a block diagram of an example apparatus 300 for providing security setup experience.
  • Apparatus 300 may comprise a multi-function printer device 302 comprising a storage medium 310, and a processor 312.
  • Device 302 may comprise and/or be associated with, for example, a general and/or special purpose computer, server, mainframe, desktop, laptop, tablet, smart phone, game console, printer, multi- function device, and/or any other system capable of providing computing capability consistent with providing the implementations described herein.
  • Device 302 may store, in storage medium 310, a setup engine 320 and a user engine 325.
  • Setup engine 320 may provide a setup experience for a device to a user.
  • setup engine 320 may execute provide setup experience instructions 120 to provide a setup experience for device 302 to a user.
  • device 302 may present a user interface comprising a series of questions to a user. The presentation may be, for example, via a control panel associated with device 302 and/or a separate device such as a mobile device, computer, laptop, and/or a web browser.
  • an OOBE may be presented via a computer connected to device 302 via a communication connection such as a wired and/or wireless network and/or a cable, such as a universal serial bus (USB) cable.
  • USB universal serial bus
  • the setup experience may, in some implementations present basic questions such as “Is this device being used in an office or home.” Answers to such basic questions may be configured to present different setup questions and/or offer different default options to some settings for device 302. For example, a device being configured for home use may skip setup questions regarding corporate login servers.
  • the setup experience may comprise a set of printed instructions for a device without a display component, a user interface displayed on a display component of device 302 and/or another display, such as a mobile device, computer, laptop, etc., and/or an interactive experience such as interactive voice response (IVR).
  • IVR interactive voice response
  • User engine 325 may determine whether security settings should be presented to the user as part of the setup experience, identify a complexity level for the user, and cause the setup engine 320 to present at least one security setting option to the user according to the identified skill level of the user.
  • user engine 325 may execute security setting determination instructions 125 to determine whether security settings should be presented to the user as part of the setup experience. For example, a user may be presented with a set of configuration questions by provide setup experience instructions 120 along with options for such settings in free-form and/or selection modes. Free-form modes may allow a user to enter information in response to a question, such as entering a text string when asked for a name of device 302 and/or entering a number when asked for a network port to accept incoming connections on.
  • Selection modes may present one or more options to a user as responses to a question, such as checkboxes next to a list of features (e.g., scan, fax, email, copy) to enable and/or a dropdown or radio button interface for single option selections (e.g., presenting a list of available wireless networks to which the device 302 can connect).
  • a list of features e.g., scan, fax, email, copy
  • a dropdown or radio button interface for single option selections (e.g., presenting a list of available wireless networks to which the device 302 can connect).
  • the instructions 125 to determine whether security settings should be presented to the user as part of the setup experience may comprise instructions to determine whether the device has a network connection. For example, if device 302 is not connected to a wireless and/or wired network but only connected to a single computer via a cable, then device 302 may, in some cases, be configured by default to high network security settings that ignore or prevent incoming network requests.
  • the instructions 125 to determine whether security settings should be presented to the user as part of the setup experience may comprise instructions to determine whether the device is associated with a group of commonly managed devices. For example, if the user initiates the setup experience by joining a network on which other devices are detected, then additional security settings to configure access rights by those devices may be presented as part of the setup experience.
  • User engine 325 may execute identify user complexity level instructions 130 to, in response to determining that security settings should be presented to the user as part of the setup experience, identify a complexity level for the user.
  • each configuration question answered and/or setting entered by the user may be used to generate a general ranking of the user’s technical complexity level. For example, if a user takes a long time to answer each question or if the user opens an available “help” file or other documentation to research more information on one and/or more options, the user may be ranked as a non-technical user.
  • a user may be deemed a technical user, while a user who opts to examine and/or configure additional settings, such as by selecting an “advanced” button on the presented user interface and/or who is identified by their user profile as an administrator may be deemed an advanced user.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to request a selection of a plurality of possible complexity levels from the user. For example, the OOBE may ask if a user would like a simple and/or advanced setup experience.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to determine whether the user is associated with a user profile comprising administrative privileges.
  • Such administrative privileges may be associated with the device 302 and/or a second device of a similar type.
  • the user profile may be deemed associated with a user profile comprising administrative privileges when that user profile has previously exercised such privileges on a similar multi-function printer.
  • the existence of such privileges may not represent any particular privilege level for device 302, but may instead represent an indicator of the user’s technical proficiency and/or complexity level.
  • the instructions 130 to identify the complexity level for the user may comprise instructions to determine whether the user required additional information before selecting a non-security setting option in the setup experience.
  • User engine 325 may execute security setting presentation instructions 135 to present at least one security setting option to the user according to the identified skill level of the user.
  • the at least one security setting option may comprise at least one of the following: a network setting, a user access setting, a feature availability setting, a communication port setting, and a service setting.
  • a user deemed a non-technical user may have security settings set to a default value based on a type of device 302, such as simply blocking network access for device intended for single user and/or home use.
  • Advanced features such as connections to online storage, file sharing, emailing, mobile device access, etc. may be similarly disabled and/or set to high security options.
  • a user may register an email address with device 302 as part of the setup address.
  • a technical and/or advanced user may be presented with options to set up an address book so that scanned documents may be emailed or faxed to a number of recipients, while a non-technical user may be limited by default to simply emailing such documents to their registered email address.
  • Each of engines 320, 325 may comprise any combination of hardware and programming to implement the functionalities of the respective engine.
  • the programming for the engines may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the engines may include a processing resource to execute those instructions.
  • the machine-readable storage medium may store instructions that, when executed by the processing resource, implement engines 320, 325.
  • device 302 may comprise the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to apparatus 300 and the processing resource.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Facsimiles In General (AREA)

Abstract

La présente invention a pour objet, dans les exemples décrits, de procurer un ressenti de paramétrage d'un dispositif à un utilisateur, de déterminer si des réglages de sécurité doivent être présentés à l'utilisateur dans le cadre du ressenti de paramétrage, et, en réponse à une détermination selon laquelle des réglages de sécurité doivent être présentés à l'utilisateur dans le cadre du ressenti de paramétrage, d'identifier un niveau de complexité pour l'utilisateur et de présenter au moins une option de réglage de sécurité à l'utilisateur selon le niveau de compétence identifié de l'utilisateur.
PCT/US2021/070012 2020-03-06 2021-01-08 Ressenti de paramétrage de sécurité WO2021178986A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202041009620 2020-03-06
IN202041009620 2020-03-06

Publications (1)

Publication Number Publication Date
WO2021178986A1 true WO2021178986A1 (fr) 2021-09-10

Family

ID=77614346

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2021/070012 WO2021178986A1 (fr) 2020-03-06 2021-01-08 Ressenti de paramétrage de sécurité

Country Status (1)

Country Link
WO (1) WO2021178986A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080055624A1 (en) * 2006-09-05 2008-03-06 Konica Minolta Business Technologies, Inc. Image processing apparatus that performs automatic control method setting
JP2014238675A (ja) * 2013-06-06 2014-12-18 株式会社オプティム セキュリティ設定提案サーバ、ユーザ端末、セキュリティ設定提案方法、セキュリティ設定提案サーバ用プログラム
JP2015228240A (ja) * 2015-07-30 2015-12-17 インテル・コーポレーション 設定の管理および配布のためのシステムおよび方法
US20200073604A1 (en) * 2018-08-29 2020-03-05 Konica Minolta, Inc. Image forming device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080055624A1 (en) * 2006-09-05 2008-03-06 Konica Minolta Business Technologies, Inc. Image processing apparatus that performs automatic control method setting
JP2014238675A (ja) * 2013-06-06 2014-12-18 株式会社オプティム セキュリティ設定提案サーバ、ユーザ端末、セキュリティ設定提案方法、セキュリティ設定提案サーバ用プログラム
JP2015228240A (ja) * 2015-07-30 2015-12-17 インテル・コーポレーション 設定の管理および配布のためのシステムおよび方法
US20200073604A1 (en) * 2018-08-29 2020-03-05 Konica Minolta, Inc. Image forming device

Similar Documents

Publication Publication Date Title
US20200220985A1 (en) Operating an appliance scanner system
US20180046888A1 (en) Image processing system and image processing apparatus for sending image data
US10126989B2 (en) Printing apparatus, control method of printing apparatus, and storage medium
US20150350204A1 (en) Cloud-based device authentication
US8625130B2 (en) Method and system for automatically creating print governance rules and policies
US20120147401A1 (en) Multi-function image forming apparatus
US11360721B2 (en) Method for implementing policy-based printing operations in a public domain
US9247078B2 (en) Accessing a service cloud from a mobile device
WO2021178986A1 (fr) Ressenti de paramétrage de sécurité
US11481163B2 (en) System and method for implementing policy-based printing operations for documents having confidential information
US11496649B2 (en) Methods and system for policy-based scanning using a public print service
US11275856B2 (en) Methods for policy-based printing operations in a public domain
US20130308154A1 (en) Image processing apparatus, method for controlling image processing apparatus, and storage medium
US10412044B2 (en) Information processing apparatus capable of improving convenience for users in change of names relating to management of destination tables, control method therefor, and storage medium
US11824755B2 (en) Communication asset usage metrics
US11159695B1 (en) System and method for remote user interactive storage management for communal devices
US20230007145A1 (en) System, and image processing apparatus and method for controlling the same
US11360716B2 (en) Image processing apparatus and method
US11972162B2 (en) Image processing system using authentication information acquired through two-factor authentication, method for controlling image processing system, and storage medium
US11647125B2 (en) Method for implementation of push scan functionality
US10817230B1 (en) Policy-based system and methods for accessing a print job from a private domain
US20230388424A1 (en) Image output apparatus and image output method
WO2021225575A1 (fr) Création de profil de dispositif optimal
US20220171586A1 (en) Printer identifying characteristics

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21765126

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21765126

Country of ref document: EP

Kind code of ref document: A1