WO2022086695A1 - Controlling an image forming job performed between senders and receivers based on groups - Google Patents

Controlling an image forming job performed between senders and receivers based on groups Download PDF

Info

Publication number
WO2022086695A1
WO2022086695A1 PCT/US2021/053157 US2021053157W WO2022086695A1 WO 2022086695 A1 WO2022086695 A1 WO 2022086695A1 US 2021053157 W US2021053157 W US 2021053157W WO 2022086695 A1 WO2022086695 A1 WO 2022086695A1
Authority
WO
WIPO (PCT)
Prior art keywords
receiver
image forming
group
sender
data structure
Prior art date
Application number
PCT/US2021/053157
Other languages
French (fr)
Inventor
Jungnam Bae
Yoonsoo Lee
Jihyun Yoon
Original Assignee
Hewlett-Packard Development Company, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Development Company, L.P. filed Critical Hewlett-Packard Development Company, L.P.
Publication of WO2022086695A1 publication Critical patent/WO2022086695A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00204Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server
    • H04N1/00209Transmitting or receiving image data, e.g. facsimile data, via a computer, e.g. using e-mail, a computer network, the internet, I-fax
    • H04N1/00222Transmitting or receiving image data, e.g. facsimile data, via a computer, e.g. using e-mail, a computer network, the internet, I-fax details of image data generation or reproduction, e.g. scan-to-email or network printing
    • H04N1/00233Transmitting or receiving image data, e.g. facsimile data, via a computer, e.g. using e-mail, a computer network, the internet, I-fax details of image data generation or reproduction, e.g. scan-to-email or network printing details of image data reproduction, e.g. network printing or remote image display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1285Remote printer device, e.g. being remote from client or server
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32358Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device using picture signal storage, e.g. at transmitter
    • H04N1/324Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device using picture signal storage, e.g. at transmitter intermediate the transmitter and receiver terminals, e.g. at an exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0094Multifunctional device, i.e. a device capable of all of reading, reproducing, copying, facsimile transception, file transception

Definitions

  • MFPs multi-function printers
  • An image forming apparatus may be operated under direct connection with a host computer, or may be connected to a local network and operated by a plurality of computers as a shared device. According to these operation modes, a user who requests execution of an image forming job should directly take printed matter output from the image forming apparatus and, in order to allow other people to use the printed matter, they should meet face-to-face to deliver the printed matter.
  • FIG. 1 is a schematic diagram of a system including a server, senders, and receivers according to an example
  • FIG. 2 is a flowchart of a method according to an example
  • FIG. 3 is a flowchart of a method according to an example
  • FIG. 4 is a flowchart of a method according to an example
  • FIGS. 5A and 5B are a sequence diagram illustrating the operations illustrated in FIGS. 3 and 4 for each subject performing each operation according to an example
  • FIGS. 6 to 11 are conceptual diagrams illustrating operations of the method illustrated in FIG. 3 according to an example
  • FIGS. 12 to 17 are conceptual diagrams illustrating operations of the method illustrated in FIG. 4 according to an example
  • FIG. 18 illustrates a computer-readable recording medium including instructions to perform a method according to an example
  • FIG. 19 is a conceptual block diagram illustrating a server according to an example.
  • ordinal terms “first,” “second,” and so forth are meant to identify several similar elements. Unless otherwise described, such terms are not intended to impose limitations, e.g., a particular order of these elements or of their use, but rather are used merely for referring to multiple elements separately. For instance, an element may be referred to in an example with the term “first” while the same element may be referred to in another example with a different ordinal number such as “second” or “third.” In such examples, such ordinal terms are not to limit the scope of the present disclosure. Also, the use of the term “and/or” in a list of multiple elements is inclusive of all possible combinations of the listed items, including any one or plurality of the items.
  • image forming job may encompass any of a variety of image-related jobs, such as a print job, a scan job, a photocopy job, a facsimile job, and the like, that involve an operation of forming an image and/or other processing operation, e.g., creation, generation and/or transfer of an image file.
  • image forming job performed by an image forming apparatus may comprise various jobs related to printing, photocopying, scanning, faxing, storing, transmitting, coating, etc.
  • image forming apparatus may encompass any of a variety of apparatuses, such as printers, scanners, photocopiers, facsimile machines, multi-function printers (MFPs), display devices and so on, that carry out an image forming job.
  • an image forming apparatus may be a two-dimensional (2D) or three-dimensional (3D) image forming apparatus.
  • FIG. 1 is a schematic diagram of a system including a server, senders, and receivers according to an example.
  • a server 10 receives an image forming job from a sender 20 and relays the received image forming job from the sender 20 to a receiver 30 so that the receiver 30 may perform the received image forming job.
  • the sender 20 may transmit the image forming job to the server 10 using a transmitting device 21 , 22, or 23 (e.g., any information processing device that can be used by the sender 20, such as a computer, a laptop computer, a tablet personal computer (PC), a mobile phone terminal, or the like) associated with the sender 20.
  • a transmitting device 21 , 22, or 23 e.g., any information processing device that can be used by the sender 20, such as a computer, a laptop computer, a tablet personal computer (PC), a mobile phone terminal, or the like
  • the server 10 may allow the receiver 30 to perform the image forming job using an image forming apparatus 31 , 32, or 33 associated with the receiver 30.
  • the receiver 30 may perform the image forming job in a pull printing mode using the image forming apparatus 31 , 32, or 33.
  • the output result e.g., printed matter
  • the system according to the example illustrated in FIG. 1 may deliver the image forming job in a non-face-to- face manner.
  • the server 10 may communicate with the sender 20 according to a first encryption mode and the server 10 may communicate with the receiver 30 according to a second encryption mode.
  • the first encryption mode and the second encryption mode may each be an asymmetric key-based encryption mode, and the pair of public key and private key of the first encryption mode may be different from the pair of public key and private key of the second encryption mode. Examples of the first encryption mode and the second encryption mode will be described in more detail when operations illustrated in FIGS. 3 to 5B are described below.
  • the sender 20 may transmit an image forming job to one receiver 30 or transmit the image forming job to a plurality of receivers 30.
  • one of the participants may transmit an image forming job to the remaining participants of the project.
  • a teacher may have a plurality of students or parents in remote locations print out a document (e.g., home correspondence, homework, etc.).
  • a user who intends to conduct a predetermined financial transaction may need to request different financial institutions or different financial transaction managers to output a document such as a resident registration copy.
  • the server 10 may allow the sender 20 to preset the receivers 30 as one group and may collectively transmit the image forming job to the receivers 30 belonging to the group.
  • the work may be processed more efficiently.
  • the generated group may be repeatedly used by the sender 20 (e.g., after a teacher generates a group including students from one class as receivers, the teacher may use the group to transmit different image forming jobs to the receivers belonging to the group), an inconvenience that the sender 20 has to generate the same group again may be relieved.
  • FIG. 2 is a flowchart of a method according to an example.
  • the server 10 may receive a request for generation of a group including at least one receiver from a sender in operation S11.
  • a data structure for the group including the at least one receiver may be generated and stored in response to the request.
  • an image forming job related to the group may be received from the sender.
  • information about the image forming job may be added to the data structure for the group.
  • at least one receiver belonging to the group may be allowed to perform the image forming job using an image forming apparatus.
  • FIG. 3 is a flowchart of a method according to an example.
  • a server 10 when a server 10 receives a request for generation of a group including at least one receiver 30 from a sender 20, the server 10 generates and stores a data structure for the group in response to the request.
  • the sender 20 when the sender 20 generates the group including the at least one receiver 30, the group may be reused later, and thus the method according to the example illustrated in FIG. 3 may be performed once and there may be no need to repeat the same process.
  • the operations S101 to S106 illustrated in FIG. 3 will be described in more detail below with reference to FIGS. 5A and 5B.
  • FIG. 4 is a flowchart of a method according to an example.
  • a server 10 when a server 10 receives an image forming job related to a predetermined group from a sender 20 after generating and storing a data structure for the group as illustrated in FIG. 3, at least one receiver 30 belonging to the group is allowed to perform the image forming job.
  • the sender 20 may use the group to transmit another image forming job to the receivers 30 belonging to the group, and thus the method according to the example illustrated in FIG. 3 is performed once, whereas the method according to the example illustrated in FIG. 4 may be performed whenever a new image forming job is requested.
  • the operations S107 to S116 illustrated in FIG. 4 will be described in more detail below with reference to FIGS. 5A and 5B.
  • FIGS. 5A and 5B is a sequence diagram illustrating the operations illustrated in FIGS. 3 and 4 for each subject performing each operation according to an example.
  • FIGS. 5A and 5B illustrates an example in which the operations illustrated in FIG. 4 are performed one time after the operations illustrated in FIG. 3 are performed.
  • the server manager 11 transmits to the server 10 a request for registering the sender 20.
  • the server 10 receives the request for registering the sender 20 from the server manager 11 and adds the sender 20 to a sender list in operation S101 .
  • the server manager 11 may set parameters including the number of groups that the sender 20 is able to generate, the number of receivers, the number of image forming jobs that can be stored, a deadline, and the like.
  • a service fee that the sender 20 pays for using a service provided through the server 10 may be determined based on the set parameters.
  • the server manager 11 may pre-designate three types of price plans of A, B, and C and allow the sender 20 to select any one price plan of A, B, and C so that parameters (e.g., the number of groups that can be generated, the number of receivers, the number of image forming jobs that can be stored, a deadline, and the like) based on the selected price plan may be automatically set.
  • a price plan for each sender may also be stored in the sender list.
  • the sender 20 may request the server 10 to generate a group including at least one receiver 30.
  • the request for generation of the group including the at least one receiver may be performed in a single operation or may be performed in a plurality of operations including a request for generation of the group in operation S103 and a request for addition of the at least one receiver to the group in operation S105 as illustrated in FIGS. 3 and 5A.
  • the server 10 may generate and store a data structure for the group including the at least one receiver 30 in response to the request. For example, in response to reception of both of the request for generation of the group in operation S103 and the request for addition of the at least one receiver to the group in operation S105, the server 10 may generate and store a data structure for the group. A description of an example of the data structure for the group will be given below with reference to FIGS. 8 to 10.
  • Communication between the server 10 and the sender 20 may be performed according to a first encryption mode which may be an asymmetric keybased encryption mode.
  • a first encryption mode which may be an asymmetric keybased encryption mode.
  • the communication process in which the sender 20 transmits the request for generation of the group in operation S103 and the request for addition of the receivers to the group in operation S105 to the server 10 may also be performed according to the first encryption mode. Therefore, a pair of public key and private key of the first encryption mode may be generated by the sender 20 in operation S102, before operation S103 is performed.
  • the first private key used for the first encryption mode may be held by the sender 20, and the first public key used for the first encryption mode may be transmitted to the server 10.
  • the first public key may be transmitted together when the sender 20 transmits the request for generation of the group including the at least one receiver 30 to the server 10 in operation S103.
  • the sender 20 may add into a Page Description Language (PDL) document the data to be transmitted and a checksum (e.g., MessageDigest) for verifying whether an original document has been altered.
  • PDL Page Description Language
  • the sender 20 may transmit the PDL document to the server 10, as illustrated in FIG. 7.
  • the checksum may be generated by encrypting and hashing the corresponding data with the first private key.
  • the server 10 may verify a hash value included in the received PDL document using the first public key.
  • Communication between the server 10 and the receivers 30 may be performed according to a second encryption mode which may be an asymmetric key-based encryption mode.
  • a pair of public key and private key of the second encryption mode may be different for respective groups. Since the pair of second public key and second private key used for the second encryption mode is set identically for one group, the pair of second public key and second private key may be generated after the server 10 receives the request for generation of the group from the sender 20. For example, as illustrated in FIGS. 3 and 5A, after the server 10 receives the request for generation of the group from the sender 20 in operation S103, the pair of the second public key and second private key may be generated by the server 10 in operation S104. In an example, the order of operation S104 and operation S105 may be changed.
  • the second private key used for the second encryption mode may be held by the server 10, and the second public key used for the second encryption mode may be transmitted to the receivers 30 belonging to the group.
  • the server 10 may transmit the second public key to the receivers 30 in operation S106.
  • the server 10 may add into a PDL document the data included in the PDL document transmitted from the sender 20 and a checksum (e.g., MessageDigest) for verifying whether an original document has been altered, and transmit the PDL document to the receiver 30 as illustrated in FIG. 7.
  • the checksum may be generated by encrypting and hashing the corresponding data with the second private key.
  • the receiver 30 may verify a hash value included in the received PDL document using the second public key.
  • the data structure for the group may include a table 70 storing information about a group(s) generated by each sender 20.
  • the table 70 shows that a sender S1 among the senders 20 generates groups named “CLASS A” and “CLASS B,” a sender S2 among the senders 20 generates a group named “CLASS C,” and a sender S3 among the senders 20 generates a group named “Project A.”
  • the server 10 may add the new group for the corresponding sender into the table 70.
  • the data structure in the form of the table 70 illustrated in FIG. 8 is an example, and the data structure for storing information about a group generated for each sender 20 is not limited to the form of the table.
  • the data structure for the group may include a table 80 storing a pair of second private key and second public key corresponding to each group.
  • the pair of public key and private key used for the second encryption mode may be different for respective groups. Therefore, as shown in the table 80, the pair of second private key and second public key may be classified and stored for each group.
  • the second private key may be held only by the server 10, and the second public key may be shared with all receivers 30 belonging to the group.
  • FIG. 80 storing a pair of second private key and second public key corresponding to each group.
  • the pair of public key and private key used for the second encryption mode may be different for respective groups. Therefore, as shown in the table 80, the pair of second private key and second public key may be classified and stored for each group.
  • the second private key may be held only by the server 10, and the second public key may be shared with all receivers 30 belonging to the group.
  • the receivers 30 belonging to a group named “CLASS A” generated by a sender S1 among the senders 20 may share a public key, “key-CA-PK,” and the receivers 30 belonging to a group named “CLASS B” generated by the sender S1 may share a public key, “key-CB-PK.” Since the server 10 only needs to manage one asymmetric key pair for one group including multiple receivers 30, the data structure may be managed more efficiently as compared to the case of managing a different asymmetric key pair for each receiver 30.
  • the data structure in the form of the table 80 illustrated in FIG. 9 is an example, and the data structure for storing information about the group generated for each sender 20 is not limited to the form of the table.
  • the data structure for the group may include the table 70 for storing information about a group generated for each sender 20, and a table 90 storing a pair of second public/private key and contact information (e.g., an e-mail address, a mobile phone number, etc.) of receivers 30 corresponding to each group.
  • the contact information of the receiver 30 may be used to notify the receiver 30 of a path so that the receiver 30 can access the public key of the second encryption mode via the path.
  • the receiver 30 may be notified of the path through an e-mail 34 as illustrated in FIG. 11.
  • the contact information stored in the data structure is a mobile phone number (e.g., a mobile phone number of a receiver R3, R4, R6, or R8)
  • the receiver 30 may be notified of the path through a message service of a mobile phone 35, as illustrated in FIG. 11.
  • the e-mail address and the mobile phone number are examples of the contact information and different types of contact information may also be used.
  • the path which is provided by the server 10 to the receiver 30 may allow the receiver 30 to access the public key of the second encryption mode only for a predetermined preset time. Since the path for accessing the public key of the second encryption mode can be accessed by the receiver 30 only for the preset time, security for the key can be enhanced.
  • the server 10 may notify the receiver 30 of the path for accessing the public key of the second encryption mode immediately after the group is generated, as illustrated in FIGS. 3 and 5B.
  • the server 10 may notify the receiver 30 of the path when the image forming job is performed for a first time on the corresponding group instead of notifying the receiver 30 immediately after the group is generated.
  • a time of the notification may vary depending on an implementation.
  • the server 10 may transmit the second public key used in the second encryption mode to the receiver 30 directly.
  • the server 10 may transmit the path for accessing the second public key to the receiver 30 such that the receiver 30 can access the second public key through the path.
  • the path may include an address path such as a Uniform Resource Locator (URL) or include a path using a scanning method, such as a Quick Response (QR) code.
  • URL Uniform Resource Locator
  • QR Quick Response
  • a process in which the server 10 receives the image forming job related to the group from the sender 20 may be performed as a single operation or may be performed in a plurality of operations (e.g., operations S107 and S108), as illustrated in FIGS. 4 to 5B.
  • the sender 20 may select a group so that the receiver 30 belonging to the selected group can perform an image forming job in operation S107. For example, as illustrated in FIG. 12, the sender 20 may select a remote pull print as the image forming job and select “CLASS A” as a group for performing the image forming job.
  • a terminal driver included in a transmitting device associated with the sender 20 may generate the image forming job and transmit the image forming job to the server 10 in operation S108.
  • the image forming job may be generated as a PDL document and transmitted to the server 10.
  • the PDL document may include information about the group selected by the sender 20 as information about the receiver 30. For example, as illustrated in FIG.
  • signature information e.g., MessageDigest
  • the server 10 may perform an operation of managing the image forming job for each group by adding the information about the image forming job to the data structure for the group in operation S109. For example, when the server 10 receives the image forming job from the sender 20, the server 10 may add information including whether the receiver 30 updates a list of image forming jobs, whether each image forming job is performed, etc. to the data structure for each of the receivers 30 belonging to the group.
  • FIG. 1 A server 10 may perform an operation of managing the image forming job for each group by adding the information about the image forming job to the data structure for the group in operation S109.
  • the data structure may include a table structure including a data field "list” indicating whether each receiver 30 requests the list of image forming jobs and data fields "job1" and "job2" indicating whether each image forming job has been performed.
  • the data structure in the form of the table illustrated in FIG. 14 is an example, and implementation of the data structure is not limited to the form of the table.
  • the server 10 may allow at least one receiver 30 belonging to the group to perform the image forming job using the image forming apparatus.
  • the process in which the server 10 allows at least one receiver 30 belonging to the group to perform the image forming job using the image forming apparatus may be performed as a single operation or may be performed as a plurality of operations (e.g., operations S110 to S116) as illustrated in FIGS. 4 to 5B.
  • the second public key may be registered to the image forming apparatus so that the image forming job may be performed through the image forming apparatus associated with the receiver 30 in operation S110.
  • the receiver 30 may select, through a user interface of the image forming apparatus, “Remote Pull Printing,” “Configuration,” and “Upload Security key,” to register the second public key to the image forming apparatus via a File Transfer Protocol (FTP) method, a Hypertext Transfer Protocol (HTTP) method, or a URL or QR scanning method.
  • FTP File Transfer Protocol
  • HTTP Hypertext Transfer Protocol
  • QR scanning method a URL or QR scanning method.
  • an image forming apparatus 36 associated with the receiver 30 may send a request for the list of image forming jobs to the server 10 by encrypting the request on the basis of the second public key in operation S111.
  • the server 10 verifies the request from the image forming apparatus 36 using the second private key, encrypts the requested list of image forming jobs with the second private key, and transmits the encrypted list of image forming jobs to the image forming apparatus 36 in operation S112.
  • the receiver 30 may identify the list of image forming jobs and select a desired job from the jobs included in the list in operation S113.
  • the image forming apparatus 36 may transmit a request for the selected image forming job to the server 10 through encrypted communication based on the second public key in operation S114.
  • the server 10 may encrypt the image forming job with the second private key and transmit the encrypted image forming job to the image forming apparatus 36 in operation S115.
  • the image forming apparatus 36 may decrypt the received encrypted image forming job with the second public key and perform the decrypted image forming job so that the receiver 30 can take printed matter output from the image forming apparatus 36 in operation S116.
  • the server 10 may update the data structure for the receiver 30. For example, as shown in the data structure in the form of the table illustrated in FIG. 17, the server 10 may update the data structure to indicate that a receiver R1 among receivers 30 does not update a list of image forming jobs, a receiver R2 among the receivers 30 updates the list of image forming jobs and performs both of the image forming jobs corresponding to job1 and job2, and a receiver R3 among the receivers 30 updates the list of image forming jobs but performs only the image forming job corresponding to job2.
  • the sender 20 may request information based on the data structure from the server 10 to check the status of the image forming job(s) associated with each receiver 30 belonging to the group.
  • Each example operation included in the above-described method may be implemented through a computer program programmed to execute each operation, where the computer program may be stored in a computer-readable recording medium and may be executed by a processor (e.g., a processor of the server 10).
  • a processor e.g., a processor of the server 10
  • FIG. 18 illustrates a computer-readable recording medium including instructions to perform a method according to an example.
  • a computer-readable recording medium 100 may include a computer program 110 stored thereon.
  • the computer program 110 may include instructions for operations as in the example method described above.
  • the computer program 110 may include instructions S11 to receive a request for generation of a group including at least one receiver from a sender, instructions S12 to generate and store a data structure for the group including the at least one receiver in response to the request, instructions S13 to receive an image forming job related to the group from the sender, instructions S14 to add information about the image forming job to the data structure for the group, and instructions S15 to allow at least one receiver belonging to the group to perform the image forming job using an image forming apparatus.
  • FIG. 19 is a conceptual block diagram illustrating a server according to an example.
  • the server 10 may include a communication unit 12, a memory 13, and a processor 14.
  • the communication unit 12 may communicate with a transmitting device associated with the sender 20, a receiving device associated with the receiver 30, and an image forming apparatus associated with the receiver 30.
  • the memory 13 may store a data structure for a group including at least one receiver 30 generated by the sender 20.
  • the processor 14 may add information about the image forming job to the data structure for the group and allow the receiver 30 to perform the image forming job using the image forming apparatus.
  • a component contained in the server 10 may cooperate with another component to perform the above-described example operations performed by the server 10.
  • the computer-readable storage medium 100 may be a non-transitory readable medium.
  • non-transitory readable medium refers to a medium that is capable of semi-permanently storing data and is readable by an apparatus, rather than a medium, e.g., a register, a cache, a volatile memory device, etc., that temporarily stores data.
  • the foregoing program instructions may be stored and provided in a CD, a DVD, a hard disk, a Blu-ray disc, a USB, a memory card, a ROM device, or any of other type of non-transitory readable media.
  • the methodology disclosed herein may be incorporated into a computer program product.
  • the computer program product may be available as a product for trading between a seller and a buyer.
  • the computer program product may be distributed in the form of a machine-readable storage medium, e.g., compact disc read only memory (CD-ROM), or distributed online through an application store, e.g., PlayStoreTM.
  • an application store e.g., PlayStoreTM.
  • at least a portion of the computer program product may be temporarily stored, or temporarily created, in a storage medium such as a server of the manufacturer, a server of the application store, or a storage medium such as a memory of a relay server.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Facsimiles In General (AREA)

Abstract

An example method performed by a server includes receiving a request for generation of a group including at least one receiver from a sender, generating and storing a data structure for the group including the at least one receiver in response to the request, receiving an image forming job related to the group from the sender, adding information about the image forming job to the data structure for the group, and allowing the at least one receiver belonging to the group to perform the image forming job using an image forming apparatus.

Description

CONTROLLING AN IMAGE FORMING JOB PERFORMED BETWEEN SENDERS AND RECEIVERS BASED ON GROUPS
BACKGROUND
[0001] There exist many different types of image forming apparatuses, including printers, scanners, photocopiers, facsimile machines, etc., and also multi-function printers (MFPs) that act as all-in-one devices to provide a combination of, e.g., printing, copying, scanning, and faxing functions.
[0002] An image forming apparatus may be operated under direct connection with a host computer, or may be connected to a local network and operated by a plurality of computers as a shared device. According to these operation modes, a user who requests execution of an image forming job should directly take printed matter output from the image forming apparatus and, in order to allow other people to use the printed matter, they should meet face-to-face to deliver the printed matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0003] FIG. 1 is a schematic diagram of a system including a server, senders, and receivers according to an example;
[0004] FIG. 2 is a flowchart of a method according to an example;
[0005] FIG. 3 is a flowchart of a method according to an example;
[0006] FIG. 4 is a flowchart of a method according to an example;
[0007] FIGS. 5A and 5B are a sequence diagram illustrating the operations illustrated in FIGS. 3 and 4 for each subject performing each operation according to an example;
[0008] FIGS. 6 to 11 are conceptual diagrams illustrating operations of the method illustrated in FIG. 3 according to an example;
[0009] FIGS. 12 to 17 are conceptual diagrams illustrating operations of the method illustrated in FIG. 4 according to an example;
[0010] FIG. 18 illustrates a computer-readable recording medium including instructions to perform a method according to an example; and
[0011] FIG. 19 is a conceptual block diagram illustrating a server according to an example.
DETAILED DESCRIPTION
[0012] Various terms used in the present disclosure are chosen from a terminology of commonly used terms in consideration of their function herein, which may be appreciated differently depending on an intention of a person skilled in the art, a precedent case, or an emerging new technology. In certain instances, some terms are to be construed as set forth in the detailed description. Accordingly, the terms used herein are to be defined consistently with their meanings in the context of the present disclosure, rather than simply by their plain and ordinary meaning.
[0013] The terms “comprising,” “including,” “having,” “containing,” etc. are used herein when describing the presence of the elements listed thereafter. Unless otherwise indicated, these terms and variations thereof are not meant to exclude the presence or addition of other elements.
[0014] As used herein, the ordinal terms “first,” “second,” and so forth are meant to identify several similar elements. Unless otherwise described, such terms are not intended to impose limitations, e.g., a particular order of these elements or of their use, but rather are used merely for referring to multiple elements separately. For instance, an element may be referred to in an example with the term “first” while the same element may be referred to in another example with a different ordinal number such as “second” or “third.” In such examples, such ordinal terms are not to limit the scope of the present disclosure. Also, the use of the term “and/or” in a list of multiple elements is inclusive of all possible combinations of the listed items, including any one or plurality of the items.
[0015] The term “image forming job” as used herein may encompass any of a variety of image-related jobs, such as a print job, a scan job, a photocopy job, a facsimile job, and the like, that involve an operation of forming an image and/or other processing operation, e.g., creation, generation and/or transfer of an image file. Furthermore, an image forming job performed by an image forming apparatus may comprise various jobs related to printing, photocopying, scanning, faxing, storing, transmitting, coating, etc.
[0016] The term “image forming apparatus” as used herein may encompass any of a variety of apparatuses, such as printers, scanners, photocopiers, facsimile machines, multi-function printers (MFPs), display devices and so on, that carry out an image forming job. Moreover, an image forming apparatus may be a two-dimensional (2D) or three-dimensional (3D) image forming apparatus.
[0017] Certain examples of the present disclosure will now be described with reference to the accompanying drawings. The present disclosure should not be construed as limited to the examples set forth herein. Rather, these examples are given in order to provide a better understanding of the scope of the present disclosure.
[0018] Hereinafter, examples will be described with reference to the accompanying drawings.
[0019] FIG. 1 is a schematic diagram of a system including a server, senders, and receivers according to an example.
[0020] Referring to FIG. 1 , a server 10 receives an image forming job from a sender 20 and relays the received image forming job from the sender 20 to a receiver 30 so that the receiver 30 may perform the received image forming job. For example, even when the sender 20 and the receiver 30 are remotely separated, the sender 20 may transmit the image forming job to the server 10 using a transmitting device 21 , 22, or 23 (e.g., any information processing device that can be used by the sender 20, such as a computer, a laptop computer, a tablet personal computer (PC), a mobile phone terminal, or the like) associated with the sender 20. The server 10 may allow the receiver 30 to perform the image forming job using an image forming apparatus 31 , 32, or 33 associated with the receiver 30. For example, the receiver 30 may perform the image forming job in a pull printing mode using the image forming apparatus 31 , 32, or 33. As a result, it is possible to deliver the output result (e.g., printed matter) of the image forming job without direct contact between the sender 20 and the receiver 30. In a situation having a need for social distancing due to an infectious disease such as coronavirus disease 2019 (COVID-19) and the like, the system according to the example illustrated in FIG. 1 may deliver the image forming job in a non-face-to- face manner.
[0021] The server 10 may communicate with the sender 20 according to a first encryption mode and the server 10 may communicate with the receiver 30 according to a second encryption mode. For example, the first encryption mode and the second encryption mode may each be an asymmetric key-based encryption mode, and the pair of public key and private key of the first encryption mode may be different from the pair of public key and private key of the second encryption mode. Examples of the first encryption mode and the second encryption mode will be described in more detail when operations illustrated in FIGS. 3 to 5B are described below.
[0022] The sender 20 may transmit an image forming job to one receiver 30 or transmit the image forming job to a plurality of receivers 30. For example, when several people in a company participate and collaborate on the same project, one of the participants may transmit an image forming job to the remaining participants of the project. As another example, when an online class is conducted at an educational institution, a teacher may have a plurality of students or parents in remote locations print out a document (e.g., home correspondence, homework, etc.). As still another example, a user who intends to conduct a predetermined financial transaction may need to request different financial institutions or different financial transaction managers to output a document such as a resident registration copy.
[0023] In an example, when the sender 20 needs to transmit an image forming job to several receivers 30, the server 10 may allow the sender 20 to preset the receivers 30 as one group and may collectively transmit the image forming job to the receivers 30 belonging to the group. Thus, the work may be processed more efficiently.
[0024] Further, since the generated group may be repeatedly used by the sender 20 (e.g., after a teacher generates a group including students from one class as receivers, the teacher may use the group to transmit different image forming jobs to the receivers belonging to the group), an inconvenience that the sender 20 has to generate the same group again may be relieved.
[0025] FIG. 2 is a flowchart of a method according to an example.
[0026] Referring to FIG. 2, the server 10 may receive a request for generation of a group including at least one receiver from a sender in operation S11. In operation S12, a data structure for the group including the at least one receiver may be generated and stored in response to the request. In operation S13, an image forming job related to the group may be received from the sender. In operation S14, information about the image forming job may be added to the data structure for the group. In operation S15, at least one receiver belonging to the group may be allowed to perform the image forming job using an image forming apparatus.
[0027] FIG. 3 is a flowchart of a method according to an example.
[0028] Referring to FIG. 3, when a server 10 receives a request for generation of a group including at least one receiver 30 from a sender 20, the server 10 generates and stores a data structure for the group in response to the request. As described above, when the sender 20 generates the group including the at least one receiver 30, the group may be reused later, and thus the method according to the example illustrated in FIG. 3 may be performed once and there may be no need to repeat the same process. The operations S101 to S106 illustrated in FIG. 3 will be described in more detail below with reference to FIGS. 5A and 5B.
[0029] FIG. 4 is a flowchart of a method according to an example.
[0030] Referring to FIG. 4, when a server 10 receives an image forming job related to a predetermined group from a sender 20 after generating and storing a data structure for the group as illustrated in FIG. 3, at least one receiver 30 belonging to the group is allowed to perform the image forming job. As described above, after the sender 20 generates the group, the sender 20 may use the group to transmit another image forming job to the receivers 30 belonging to the group, and thus the method according to the example illustrated in FIG. 3 is performed once, whereas the method according to the example illustrated in FIG. 4 may be performed whenever a new image forming job is requested. The operations S107 to S116 illustrated in FIG. 4 will be described in more detail below with reference to FIGS. 5A and 5B.
[0031] FIGS. 5A and 5B is a sequence diagram illustrating the operations illustrated in FIGS. 3 and 4 for each subject performing each operation according to an example.
[0032] As described above, the operations (e.g., S101 to S106) included in FIG. 3 may be performed once and need not be repeated, and the operations (e.g., S107 to S116) included in FIG. 4 may be repeatedly performed for each image forming job transmitted by the sender 20. It may be understood that, for conciseness, FIGS. 5A and 5B illustrates an example in which the operations illustrated in FIG. 4 are performed one time after the operations illustrated in FIG. 3 are performed.
[0033] The order of the operations illustrated in FIGS. 3 to 5B is an example, and the order of some operations may be changed.
[0034] Hereinafter, a method according to the example illustrated in FIG. 3 will be described in more detail with reference to FIGS. 5A to 11 , and a method according to the example illustrated in FIG. 4 will be described in more detail with reference to FIGS. 5A and 12 to 17.
[0035] As illustrated in FIGS. 3 and 5B, when a service transaction is established between a server manager 11 and the sender 20, the server manager 11 transmits to the server 10 a request for registering the sender 20. The server 10 receives the request for registering the sender 20 from the server manager 11 and adds the sender 20 to a sender list in operation S101 .
[0036] The server manager 11 may set parameters including the number of groups that the sender 20 is able to generate, the number of receivers, the number of image forming jobs that can be stored, a deadline, and the like. A service fee that the sender 20 pays for using a service provided through the server 10 may be determined based on the set parameters. For example, the server manager 11 may pre-designate three types of price plans of A, B, and C and allow the sender 20 to select any one price plan of A, B, and C so that parameters (e.g., the number of groups that can be generated, the number of receivers, the number of image forming jobs that can be stored, a deadline, and the like) based on the selected price plan may be automatically set. As illustrated in FIG. 6, when the server 10 adds the sender 20 to a sender list 50, a price plan for each sender may also be stored in the sender list.
[0037] After the server 10 registers the sender 20 in the sender list, the sender 20 may request the server 10 to generate a group including at least one receiver 30. The request for generation of the group including the at least one receiver may be performed in a single operation or may be performed in a plurality of operations including a request for generation of the group in operation S103 and a request for addition of the at least one receiver to the group in operation S105 as illustrated in FIGS. 3 and 5A.
[0038] After the server 10 receives the request for generation of the group including the at least one receiver 30 from the sender 20, the server 10 may generate and store a data structure for the group including the at least one receiver 30 in response to the request. For example, in response to reception of both of the request for generation of the group in operation S103 and the request for addition of the at least one receiver to the group in operation S105, the server 10 may generate and store a data structure for the group. A description of an example of the data structure for the group will be given below with reference to FIGS. 8 to 10.
[0039] Communication between the server 10 and the sender 20 may be performed according to a first encryption mode which may be an asymmetric keybased encryption mode. In an example, the communication process in which the sender 20 transmits the request for generation of the group in operation S103 and the request for addition of the receivers to the group in operation S105 to the server 10 may also be performed according to the first encryption mode. Therefore, a pair of public key and private key of the first encryption mode may be generated by the sender 20 in operation S102, before operation S103 is performed. The first private key used for the first encryption mode may be held by the sender 20, and the first public key used for the first encryption mode may be transmitted to the server 10. For example, the first public key may be transmitted together when the sender 20 transmits the request for generation of the group including the at least one receiver 30 to the server 10 in operation S103. [0040] When the server 10 communicates with the sender 20 according to the first encryption mode, the sender 20 may add into a Page Description Language (PDL) document the data to be transmitted and a checksum (e.g., MessageDigest) for verifying whether an original document has been altered. The sender 20 may transmit the PDL document to the server 10, as illustrated in FIG. 7. The checksum may be generated by encrypting and hashing the corresponding data with the first private key. The server 10 may verify a hash value included in the received PDL document using the first public key.
[0041] Communication between the server 10 and the receivers 30 may be performed according to a second encryption mode which may be an asymmetric key-based encryption mode. In this case, a pair of public key and private key of the second encryption mode may be different for respective groups. Since the pair of second public key and second private key used for the second encryption mode is set identically for one group, the pair of second public key and second private key may be generated after the server 10 receives the request for generation of the group from the sender 20. For example, as illustrated in FIGS. 3 and 5A, after the server 10 receives the request for generation of the group from the sender 20 in operation S103, the pair of the second public key and second private key may be generated by the server 10 in operation S104. In an example, the order of operation S104 and operation S105 may be changed.
[0042] The second private key used for the second encryption mode may be held by the server 10, and the second public key used for the second encryption mode may be transmitted to the receivers 30 belonging to the group. For example, after operation S105, the server 10 may transmit the second public key to the receivers 30 in operation S106.
[0043] When the server 10 communicates with the receivers 30 according to the second encryption mode, the server 10 may add into a PDL document the data included in the PDL document transmitted from the sender 20 and a checksum (e.g., MessageDigest) for verifying whether an original document has been altered, and transmit the PDL document to the receiver 30 as illustrated in FIG. 7. The checksum may be generated by encrypting and hashing the corresponding data with the second private key. The receiver 30 may verify a hash value included in the received PDL document using the second public key. [0044] Hereinafter, an example process in which the server 10 generates and stores a data structure for the group in response to the server 10 receiving the request for generation of the group from the sender 20 will be described in more detail with reference to FIGS. 8 to 10.
[0045] As illustrated in FIG. 8, the data structure for the group may include a table 70 storing information about a group(s) generated by each sender 20. For example, the table 70 shows that a sender S1 among the senders 20 generates groups named “CLASS A” and “CLASS B,” a sender S2 among the senders 20 generates a group named “CLASS C,” and a sender S3 among the senders 20 generates a group named “Project A.” When one of the senders 20 transmits to the server 10 a request for generation of a new group, the server 10 may add the new group for the corresponding sender into the table 70. The data structure in the form of the table 70 illustrated in FIG. 8 is an example, and the data structure for storing information about a group generated for each sender 20 is not limited to the form of the table.
[0046] As illustrated in FIG. 9, the data structure for the group may include a table 80 storing a pair of second private key and second public key corresponding to each group. As described above, the pair of public key and private key used for the second encryption mode may be different for respective groups. Therefore, as shown in the table 80, the pair of second private key and second public key may be classified and stored for each group. The second private key may be held only by the server 10, and the second public key may be shared with all receivers 30 belonging to the group. In the example illustrated in FIG. 9, the receivers 30 belonging to a group named “CLASS A” generated by a sender S1 among the senders 20 may share a public key, “key-CA-PK,” and the receivers 30 belonging to a group named “CLASS B” generated by the sender S1 may share a public key, “key-CB-PK.” Since the server 10 only needs to manage one asymmetric key pair for one group including multiple receivers 30, the data structure may be managed more efficiently as compared to the case of managing a different asymmetric key pair for each receiver 30. The data structure in the form of the table 80 illustrated in FIG. 9 is an example, and the data structure for storing information about the group generated for each sender 20 is not limited to the form of the table.
[0047] As illustrated in FIG. 10, the data structure for the group may include the table 70 for storing information about a group generated for each sender 20, and a table 90 storing a pair of second public/private key and contact information (e.g., an e-mail address, a mobile phone number, etc.) of receivers 30 corresponding to each group. The contact information of the receiver 30 may be used to notify the receiver 30 of a path so that the receiver 30 can access the public key of the second encryption mode via the path. For example, when the contact information stored in the data structure is an e-mail address (e.g., an e- mail address of a receiver R1 , R2, R5, or R7), the receiver 30 may be notified of the path through an e-mail 34 as illustrated in FIG. 11. Alternatively, when the contact information stored in the data structure is a mobile phone number (e.g., a mobile phone number of a receiver R3, R4, R6, or R8), the receiver 30 may be notified of the path through a message service of a mobile phone 35, as illustrated in FIG. 11. The e-mail address and the mobile phone number are examples of the contact information and different types of contact information may also be used. Contact information through which the server 10 will notify the receiver 30 may be selected by the sender 20 in the process of adding the receiver 30 to the group. [0048] The path which is provided by the server 10 to the receiver 30 may allow the receiver 30 to access the public key of the second encryption mode only for a predetermined preset time. Since the path for accessing the public key of the second encryption mode can be accessed by the receiver 30 only for the preset time, security for the key can be enhanced.
[0049] The server 10 may notify the receiver 30 of the path for accessing the public key of the second encryption mode immediately after the group is generated, as illustrated in FIGS. 3 and 5B. Alternatively, the server 10 may notify the receiver 30 of the path when the image forming job is performed for a first time on the corresponding group instead of notifying the receiver 30 immediately after the group is generated. In other examples, a time of the notification may vary depending on an implementation.
[0050] The server 10 may transmit the second public key used in the second encryption mode to the receiver 30 directly. Alternatively, in order to enhance security, the server 10 may transmit the path for accessing the second public key to the receiver 30 such that the receiver 30 can access the second public key through the path. Here, the path may include an address path such as a Uniform Resource Locator (URL) or include a path using a scanning method, such as a Quick Response (QR) code.
[0051] Hereinafter, a series of example processes including a process in which a server 10 receives image forming jobs related to a group from a sender 20, a process in which the server 10 adds information about the image forming job to a data structure for the group, and a process in which the server 10 allows receivers 30 belonging to the group to perform the image forming jobs using an image forming apparatus will be described with reference to FIGS. 4, 5A, 5B and 12 to 17.
[0052] A process in which the server 10 receives the image forming job related to the group from the sender 20 may be performed as a single operation or may be performed in a plurality of operations (e.g., operations S107 and S108), as illustrated in FIGS. 4 to 5B.
[0053] The sender 20 may select a group so that the receiver 30 belonging to the selected group can perform an image forming job in operation S107. For example, as illustrated in FIG. 12, the sender 20 may select a remote pull print as the image forming job and select “CLASS A” as a group for performing the image forming job.
[0054] When the sender 20 selects a group so that the receiver 30 belonging to the selected group can perform the image forming job, a terminal driver included in a transmitting device associated with the sender 20 may generate the image forming job and transmit the image forming job to the server 10 in operation S108. In this case, the image forming job may be generated as a PDL document and transmitted to the server 10. The PDL document may include information about the group selected by the sender 20 as information about the receiver 30. For example, as illustrated in FIG. 13, the PDL document may include information indicating a group such as @PJL SET RECEIVER=“CLASS A, CLASS B.” Further, the PDL document may include signature information (e.g., MessageDigest) generated by hashing data to be transmitted with the first private key used by the sender 20. The server 10 may verify the signature information using the first public key.
[0055] The server 10 may perform an operation of managing the image forming job for each group by adding the information about the image forming job to the data structure for the group in operation S109. For example, when the server 10 receives the image forming job from the sender 20, the server 10 may add information including whether the receiver 30 updates a list of image forming jobs, whether each image forming job is performed, etc. to the data structure for each of the receivers 30 belonging to the group. FIG. 14 shows an example in which there are three receivers 30 belonging to the group named “CLASS A” as R1 , R2, and R3 and there are two image forming jobs transmitted by the sender 20 as job1 and job2, the data structure may include a table structure including a data field "list" indicating whether each receiver 30 requests the list of image forming jobs and data fields "job1" and "job2" indicating whether each image forming job has been performed. The data structure in the form of the table illustrated in FIG. 14 is an example, and implementation of the data structure is not limited to the form of the table.
[0056] The server 10 may allow at least one receiver 30 belonging to the group to perform the image forming job using the image forming apparatus. The process in which the server 10 allows at least one receiver 30 belonging to the group to perform the image forming job using the image forming apparatus may be performed as a single operation or may be performed as a plurality of operations (e.g., operations S110 to S116) as illustrated in FIGS. 4 to 5B.
[0057] After the sender 20 transmits to the server 10 a certain image forming job for the group to which the receiver 30 belongs, the second public key may be registered to the image forming apparatus so that the image forming job may be performed through the image forming apparatus associated with the receiver 30 in operation S110. For example, as illustrated in FIG. 15, the receiver 30 may select, through a user interface of the image forming apparatus, “Remote Pull Printing,” “Configuration,” and “Upload Security key,” to register the second public key to the image forming apparatus via a File Transfer Protocol (FTP) method, a Hypertext Transfer Protocol (HTTP) method, or a URL or QR scanning method.
[0058] As illustrated in FIGS. 4, 5B, and 16, an image forming apparatus 36 associated with the receiver 30 may send a request for the list of image forming jobs to the server 10 by encrypting the request on the basis of the second public key in operation S111. In response to the request, the server 10 verifies the request from the image forming apparatus 36 using the second private key, encrypts the requested list of image forming jobs with the second private key, and transmits the encrypted list of image forming jobs to the image forming apparatus 36 in operation S112.
[0059] Through the user interface of the image forming apparatus 36 associated with the receiver 30, the receiver 30 may identify the list of image forming jobs and select a desired job from the jobs included in the list in operation S113.
[0060] In response to the selection of the image forming job by the receiver 30, the image forming apparatus 36 may transmit a request for the selected image forming job to the server 10 through encrypted communication based on the second public key in operation S114.
[0061] After the server 10 verifies the request from the image forming job with the second private key, the server 10 may encrypt the image forming job with the second private key and transmit the encrypted image forming job to the image forming apparatus 36 in operation S115.
[0062] The image forming apparatus 36 may decrypt the received encrypted image forming job with the second public key and perform the decrypted image forming job so that the receiver 30 can take printed matter output from the image forming apparatus 36 in operation S116.
[0063] After a series of operations shown through operations S 111 to S 116 are performed based on a certain receiver 30, the server 10 may update the data structure for the receiver 30. For example, as shown in the data structure in the form of the table illustrated in FIG. 17, the server 10 may update the data structure to indicate that a receiver R1 among receivers 30 does not update a list of image forming jobs, a receiver R2 among the receivers 30 updates the list of image forming jobs and performs both of the image forming jobs corresponding to job1 and job2, and a receiver R3 among the receivers 30 updates the list of image forming jobs but performs only the image forming job corresponding to job2. The sender 20 may request information based on the data structure from the server 10 to check the status of the image forming job(s) associated with each receiver 30 belonging to the group.
[0064] Each example operation included in the above-described method may be implemented through a computer program programmed to execute each operation, where the computer program may be stored in a computer-readable recording medium and may be executed by a processor (e.g., a processor of the server 10).
[0065] FIG. 18 illustrates a computer-readable recording medium including instructions to perform a method according to an example.
[0066] Referring to FIG. 18, a computer-readable recording medium 100 may include a computer program 110 stored thereon. The computer program 110 may include instructions for operations as in the example method described above. For example, the computer program 110 may include instructions S11 to receive a request for generation of a group including at least one receiver from a sender, instructions S12 to generate and store a data structure for the group including the at least one receiver in response to the request, instructions S13 to receive an image forming job related to the group from the sender, instructions S14 to add information about the image forming job to the data structure for the group, and instructions S15 to allow at least one receiver belonging to the group to perform the image forming job using an image forming apparatus.
[0067] FIG. 19 is a conceptual block diagram illustrating a server according to an example.
[0068] Referring to FIG. 19, the server 10 may include a communication unit 12, a memory 13, and a processor 14. The communication unit 12 may communicate with a transmitting device associated with the sender 20, a receiving device associated with the receiver 30, and an image forming apparatus associated with the receiver 30. The memory 13 may store a data structure for a group including at least one receiver 30 generated by the sender 20. When the processor 14 receives an image forming job related to the group from the transmitting device, the processor 14 may add information about the image forming job to the data structure for the group and allow the receiver 30 to perform the image forming job using the image forming apparatus. In various examples, a component contained in the server 10 may cooperate with another component to perform the above-described example operations performed by the server 10. [0069] Referring again to FIG. 18, the computer-readable storage medium 100 may be a non-transitory readable medium. The term “non-transitory readable medium” as used herein refers to a medium that is capable of semi-permanently storing data and is readable by an apparatus, rather than a medium, e.g., a register, a cache, a volatile memory device, etc., that temporarily stores data. For example, the foregoing program instructions may be stored and provided in a CD, a DVD, a hard disk, a Blu-ray disc, a USB, a memory card, a ROM device, or any of other type of non-transitory readable media.
[0070] In an example, the methodology disclosed herein may be incorporated into a computer program product. The computer program product may be available as a product for trading between a seller and a buyer. The computer program product may be distributed in the form of a machine-readable storage medium, e.g., compact disc read only memory (CD-ROM), or distributed online through an application store, e.g., PlayStore™. For online distribution, at least a portion of the computer program product may be temporarily stored, or temporarily created, in a storage medium such as a server of the manufacturer, a server of the application store, or a storage medium such as a memory of a relay server.
[0071] The foregoing description has been presented to illustrate and describe some examples. It should be appreciated by those skilled in the art that many modifications and variations are possible in light of the above teaching. In various examples, suitable results may be achieved if the above-described techniques are performed in a different order, and/or if some of the components of the above-described systems, architectures, devices, circuits, and the like are coupled or combined in a different manner, or substituted for or replaced by other components or equivalents thereof. [0072] Therefore, the scope of the disclosure is not to be limited to the precise form disclosed, but rather defined by the following claims and equivalents thereof.

Claims

WHAT IS CLAIMED IS:
1 . A method performed by a server, the method comprising: receiving a request for generation of a group including at least one receiver from a sender; generating and storing a data structure for the group including the at least one receiver in response to the request; receiving an image forming job related to the group from the sender; adding information about the image forming job to the data structure for the group; and allowing the at least one receiver belonging to the group to perform the image forming job using an image forming apparatus.
2. The method of claim 1 , wherein the server communicates with the sender according to a first encryption mode, and wherein the server communicates with the at least one receiver according to a second encryption mode.
3. The method of claim 2, wherein the second encryption mode is an asymmetric key-based encryption mode, and wherein a pair of public key and private key of the second encryption mode is different for respective groups.
4. The method of claim 3, wherein the data structure for the group including the at least one receiver includes contact information of the at least one receiver, and wherein the method further comprises, after the generating and storing of the data structure for the group including the at least one receiver, notifying the at least one receiver of a path for accessing the public key of the second encryption mode through the contact information of the at least one receiver.
5. The method of claim 4, wherein the path allows the at least one receiver to access the public key of the second encryption mode for a preset time.
6. The method of claim 1 , wherein the data structure for the group includes information indicating whether the image forming job has been performed by each receiver belonging to the group.
7. The method of claim 1 , wherein the data structure for the group includes information indicating whether a list of image forming jobs has been requested by each receiver belonging to the group.
8. A non-transitory computer-readable recording medium in which a computer program of a method performed by a server is stored, the non-transitory computer-readable recording medium comprising: instructions to receive a request for generation of a group including at least one receiver from a sender; instructions to generate and store a data structure for the group including the at least one receiver in response to the request; instructions to receive an image forming job related to the group from the sender; instructions to add information about the image forming job to the data structure for the group; and instructions to allow the at least one receiver belonging to the group to perform the image forming job using an image forming apparatus.
9. The non-transitory computer-readable recording medium of claim 8, further comprising: instructions to communicate with the sender according to a first encryption mode, and instructions to communicate with the at least one receiver according to a second encryption mode. 19
10. The non-transitory computer-readable recording medium of claim 9, wherein the second encryption mode is an asymmetric key-based encryption mode, and wherein a pair of public key and private key of the second encryption mode is different for respective groups.
11. The non-transitory computer-readable recording medium of claim
10, wherein the data structure for the group including the at least one receiver includes contact information of the at least one receiver, and wherein the non-transitory computer-readable recording medium further comprises instructions to, after performing the instructions to generate and store the data structure for the group including the at least one receiver, notify the at least one receiver of a path for accessing the public key of the second encryption mode through the contact information of the at least one receiver.
12. The non-transitory computer-readable recording medium of claim
11 , wherein the path allows the at least one receiver to access the public key of the second encryption mode for a preset time.
13. The non-transitory computer-readable recording medium of claim 8, wherein the data structure for the group includes information indicating whether the image forming job has been performed by each receiver belonging to the group.
14. The non-transitory computer-readable recording medium of claim 8, wherein the data structure for the group includes information indicating whether a list of image forming jobs has been requested by each receiver belonging to the group.
15. A server comprising: 20 a communication unit to communicate with a transmitting device associated with a sender, a receiving device associated with a receiver, and an image forming apparatus associated with the receiver; a memory to store a data structure for a group including at least one receiver generated by the sender; and a processor to: when receiving an image forming job related to the group from the transmitting device, add information about the image forming job to the data structure for the group, and allow the at least one receiver to perform the image forming job using the image forming apparatus.
PCT/US2021/053157 2020-10-22 2021-10-01 Controlling an image forming job performed between senders and receivers based on groups WO2022086695A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020200137769A KR20220053369A (en) 2020-10-22 2020-10-22 Controlling an image forming job performed between senders and receivers based on groups
KR10-2020-0137769 2020-10-22

Publications (1)

Publication Number Publication Date
WO2022086695A1 true WO2022086695A1 (en) 2022-04-28

Family

ID=81291077

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2021/053157 WO2022086695A1 (en) 2020-10-22 2021-10-01 Controlling an image forming job performed between senders and receivers based on groups

Country Status (2)

Country Link
KR (1) KR20220053369A (en)
WO (1) WO2022086695A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130070301A1 (en) * 2008-03-03 2013-03-21 Samsung Electronics Co., Ltd. Unit using operating system and image forming apparatus using the same
US20170131658A1 (en) * 2013-10-18 2017-05-11 Samsung Electronics Co., Ltd. Crum chip, image forming device for verifying consumable unit comprising the crum chip, and methods thereof
US20170300008A1 (en) * 2011-09-09 2017-10-19 S-Printing Solution Co., Ltd. Crum chip and image forming device for communicating mutually, and method thereof
US20180020104A1 (en) * 2016-07-14 2018-01-18 S-Printing Solution Co., Ltd. Image forming apparatus determining supplies-purchasing condition based on usage of supplies and operating method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130070301A1 (en) * 2008-03-03 2013-03-21 Samsung Electronics Co., Ltd. Unit using operating system and image forming apparatus using the same
US20170300008A1 (en) * 2011-09-09 2017-10-19 S-Printing Solution Co., Ltd. Crum chip and image forming device for communicating mutually, and method thereof
US20170131658A1 (en) * 2013-10-18 2017-05-11 Samsung Electronics Co., Ltd. Crum chip, image forming device for verifying consumable unit comprising the crum chip, and methods thereof
US20180020104A1 (en) * 2016-07-14 2018-01-18 S-Printing Solution Co., Ltd. Image forming apparatus determining supplies-purchasing condition based on usage of supplies and operating method thereof

Also Published As

Publication number Publication date
KR20220053369A (en) 2022-04-29

Similar Documents

Publication Publication Date Title
US8081336B2 (en) Image forming apparatus, image processing method, and program
EP2285088B1 (en) Charging for image processing services carried out by service providing devices external to an image processing device
US8205797B2 (en) Method and system for transmitting proof of payment for “pay-as-you-go” multi-function devices
JP2004213469A (en) Image forming apparatus
US10110596B2 (en) Information processing system, information processing apparatus, method for managing electronic certificate
EP3158496A1 (en) Information processing program product, information processing apparatus, and information processing system
US9665727B2 (en) Information processing system, method of processing information, program, and recording medium
CN103002177A (en) Device cooperation system, function providing method
JP6717076B2 (en) Printing system, encryption key changing method, printer, program
JP6229343B2 (en) Information processing system, information processing method, program, and recording medium
US20160150125A1 (en) Information processing apparatus, information processing system, and control method of information processing apparatus
US10298783B2 (en) Delivery management system
KR101091520B1 (en) Printing-cumunication complex service system
JP7052497B2 (en) Information processing systems, information processing equipment, information processing methods, and programs
WO2022086695A1 (en) Controlling an image forming job performed between senders and receivers based on groups
JP2005267409A (en) Print system, display control method, image forming device and its control method
JP2015207192A (en) Image forming system and coordination program between users
JP2009093553A (en) Product ordering apparatus
US10715698B1 (en) System and method for processing documents using mobile payment to instantly activate privilege
US20200278820A1 (en) File management apparatus, non-transitory computer readable medium storing file management program, and file management system
JP2016136347A (en) Information processor, image forming apparatus, method for controlling information processor, and control program of information processor
US10271206B2 (en) Methods and systems for securely routing documents through third party infrastructures
JP2014167680A (en) Image processing system, processing control method, and image processing apparatus
CN104038656A (en) Metadata Support In Distributed Scan System
US20230153414A1 (en) Entity-specific user authentication in shared office document processing device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21883525

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21883525

Country of ref document: EP

Kind code of ref document: A1