WO2023229629A1 - Image forming apparatus and screen lock method - Google Patents

Image forming apparatus and screen lock method Download PDF

Info

Publication number
WO2023229629A1
WO2023229629A1 PCT/US2022/048361 US2022048361W WO2023229629A1 WO 2023229629 A1 WO2023229629 A1 WO 2023229629A1 US 2022048361 W US2022048361 W US 2022048361W WO 2023229629 A1 WO2023229629 A1 WO 2023229629A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
user
temporary lock
authentication information
image forming
Prior art date
Application number
PCT/US2022/048361
Other languages
English (en)
French (fr)
Inventor
Han Soon Yong
Jung Mo Hong
Yeonjung LIM
Original Assignee
Hewlett-Packard Development Company, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Development Company, L.P. filed Critical Hewlett-Packard Development Company, L.P.
Publication of WO2023229629A1 publication Critical patent/WO2023229629A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4413Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/0412Digitisers structurally integrated in a display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/0035User-machine interface; Control console
    • H04N1/00352Input means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/0035User-machine interface; Control console
    • H04N1/00501Tailoring a user interface [UI] to specific requirements
    • H04N1/00503Customising to a particular machine or model, machine function or application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4433Restricting access, e.g. according to user identity to an apparatus, part of an apparatus or an apparatus function
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1203Improving or facilitating administration, e.g. print management
    • G06F3/1204Improving or facilitating administration, e.g. print management resulting in reduced user or operator actions, e.g. presetting, automatic actions, using hardware token storing data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1279Controller construction, e.g. aspects of the interface hardware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0094Multifunctional device, i.e. a device capable of all of reading, reproducing, copying, facsimile transception, file transception

Definitions

  • MFPs multi-function products
  • Such an image forming apparatus may have a user login process for use thereof, which may also be utilized with a number of applications installed therein, some of which may not work except through their respective user login processes.
  • FIG. 1 is a diagram conceptually illustrating an image forming apparatus that supports a temporary lock function according to an example.
  • FIGS. 2 to 6 are schematic diagrams of interfaces of an image forming apparatus, illustratively showing temporary lock functions according to various examples.
  • FIG. 7 is a flow diagram illustratively showing operations of temporarily locking an image forming apparatus according to an example.
  • FIG. 8 is a schematic diagram of an interface of an image forming apparatus, illustratively showing a temporary lock function according to an example.
  • FIG. 9 is a flow diagram illustratively showing operations of temporarily locking an image forming apparatus according to an example.
  • FIG. 10 is a schematic diagram of an interface of an image forming apparatus, illustratively showing a temporary lock function according to an example.
  • FIG. 11 is a flow diagram illustratively showing operations of temporarily locking an image forming apparatus according to an example.
  • FIGS. 12 and 13 are schematic diagrams of interfaces of an image forming apparatus, illustratively showing temporary lock functions according to various examples.
  • FIG. 14 is a diagram illustratively showing records to support a temporary lock function according to an example.
  • FIG. 15 is a schematic illustration of a non-transitory computer readable recording medium including instructions according to an example.
  • An image forming apparatus may be utilized with a number of applications installed therein. Some of these applications may have a user authentication procedure, for example, a user login procedure, for use thereof. For example, a user who desires to use an application that provides a cloudbased service on the image forming apparatus may execute a procedure of logging in to the application of the image forming apparatus to use a function of the application. As an example, the user may provide information such as his/her identifier (ID) and password for use in authentication of the user with the application or run a biometrics-based or other authentication process, thereby completing the login procedure for the application.
  • ID his/her identifier
  • password password
  • the user may pause the use of the application.
  • the user may move away for some time from the image forming apparatus with a view to, for example, supply printing paper, pick up a document to be scanned, perform a personal task, and the like.
  • the user may desire to prevent his/her personal information from being exposed.
  • the user may desire to prevent his/her personal information from being indicated on a display of the image forming apparatus such as a screen of the application to which the user is currently logged in.
  • the user may desire to prevent another user from using the application with the user’s specific content of the application being exposed to the other user.
  • One solution is to, if no input is received for more than a certain period of time from the user who is logged in to the application, switch the image forming apparatus into a deactivated or sleep mode and log the user out of the application.
  • switch the image forming apparatus into a deactivated or sleep mode and log the user out of the application.
  • such solution may be less convenient since the logged-out user may need to go through the login procedure once more on the image forming apparatus.
  • an image forming apparatus supports a function of temporarily locking an application, thereby delivering enhanced user convenience and improved security.
  • a limited resource may be utilized in carrying out the temporary lock function, thereby achieving both user convenience and security without extra resource consumption.
  • the image forming apparatus may perform a login procedure of the user for the application based on the first authentication information. While staying logged in to the application after the login procedure is completed, the user may make a request to the image forming apparatus to temporarily lock the application in order, for example, to prevent an exposure of personal information while he/she is away for some time from the image forming apparatus and to avoid a repetition of the login procedure.
  • the temporary lock request may include second authentication information that is different from the first authentication information for use in logging in to the application.
  • the image forming apparatus may switch the application into a temporary lock status while keeping the user logged in to the application. Based on the second authentication information being input during the temporary lock status of the application, the image forming apparatus may cancel the temporary lock status. For example, the application may be switched back into a status that precedes the temporary locking, i.e. , the status in which the user is previously (e.g., originally) logged in thereto.
  • the first authentication information and the second authentication information may include their respective passwords, and the password in the second authentication information may have a cryptographic strength less than that of the password in the first authentication information.
  • the password in the second authentication information may be less complex than that in the first authentication information. Therefore, the user may easily avoid repetition of logging in to the application and may also have a secure way of preventing an exposure of information regarding the user.
  • ordinal terms “first,” “second,” and so forth are meant to identify several similar elements. Unless otherwise specified, such terms are not intended to impose limitations, e.g., a particular order of these elements or of their use, but rather are used merely for referring to multiple elements separately. For instance, an element may be referred to in an example with the term “first” while the same element may be referred to in another example with a different ordinal number such as “second” or “third.” In such examples, such ordinal terms are not to limit the scope of the present disclosure. Also, the use of the term “and/or” in a list of multiple elements is inclusive of all possible combinations of the listed items, including any one or plurality of the items.
  • image forming job may encompass any of a variety of image-related jobs that involve an operation of forming an image and/or other processing operations, e.g., creation, generation, and/or transfer of an image file.
  • job as used herein may encompass a chain of processes that facilitate an image forming job, as well as the image forming job per se.
  • an image forming device may perform an image forming job, such as a print job, a copy job, a scan job, a facsimile or other transmission job, a storage job, a coating job, or the like.
  • image forming device or “image forming apparatus” as used herein may encompass any of a variety of devices, such as a printer, a scanner, a facsimile machine, a multi-function product (MFP), a display device, and the like, that are capable of performing an image forming job.
  • an image forming device may be a two-dimensional (2D) or three- dimensional (3D) image forming device.
  • Such image forming device may provide various additional functions, as well as basic ones, for example, print, copy, and scan functions.
  • the term “user” as used herein may refer to a person/organization who manipulates an image forming device to operate an image forming job.
  • an administrator may refer to a person/organization who has access to the entire functionality of an image forming device.
  • an administrator may be a person/organization who can set up configuration data of a plurality of image forming apparatuses via a remote management server.
  • one person may have both roles of an administrator and a user.
  • service provider may refer to a person/organization who supplies an image forming device to a user and has control of the functions and settings of the image forming device.
  • a service provider may be a reseller who lends a plurality of image forming devices to a user or group, applies device setting values of the plurality of image forming devices according to an established contract, and controls and manages installation of an application and a setting value of the application.
  • one person may have both roles of an administrator and a service provider.
  • electronic device may refer to any information processing device, such as, for example, a computer, a laptop, a tablet personal computer (PC), a mobile telephone terminal, or the like, that may be used by a user.
  • PC personal computer
  • mobile telephone terminal or the like
  • FIG. 1 is a diagram conceptually illustrating an image forming apparatus that supports a temporary lock function according to an example.
  • an image forming apparatus 100 may include a processor 110, a memory 120, a display 130, an input device 140, a temporary lock manager 150, and an operating system 160. Other examples of the image forming apparatus 100 are also contemplated. In an example, the image forming apparatus 100 may also include an additional component, e.g., a power supply unit to supply power to the above-mentioned components, a communications unit to communicate with external entities, or the like. In another example, the image forming apparatus 100 may include some of, but not all of, the components shown in FIG. 1. Further, it may be appreciated that the image forming apparatus 100 is not necessarily a single device, but may include a plurality of interconnected devices.
  • the processor 110 may control a function of the image forming apparatus 100.
  • the processor 110 may be implemented with a central processing unit (CPU), a graphics processing unit (GPU), or other processing circuitry to perform example operations described herein.
  • the processor 110 may execute an instruction stored in the memory 120.
  • the processor 110 may also read other information stored in the memory 120.
  • the processor 110 may store new information in the memory 120 and may update some information stored in the memory 120.
  • the processor 110 may obtain, from the memory 120, information to control the image forming apparatus 100 or may store such information in the memory 120.
  • the memory 120 may include any computer- readable storage medium that stores data in a non-transitory form.
  • the memory 120 may be implemented with Random Access Memory (RAM), Read- Only Memory (ROM), or any other type of storage medium.
  • RAM Random Access Memory
  • ROM Read- Only Memory
  • the memory 120 may have stored therein a variety of information, for example, a set of instructions that are to be executed by the processor 110.
  • the display 130 may be provided for the image forming apparatus to function as a user interface of the image forming apparatus 100 to, e.g., output, display, or otherwise present a status, a certain message, an installed application, or the like, of the image forming apparatus.
  • the display 130 may be implemented as a touch screen or other device.
  • the input device 140 may receive various inputs from a user. For example, the user may select his/her desired image forming job, or select among various options related to the image forming job, through the input device 140. Further, the user may launch the above-mentioned application, which is installed in the image forming apparatus 100, through the input device 140.
  • Example implementations of the input device 140 may include a keyboard, a keypad, a physical button, a touch pad, a touch screen, and many other types of devices that are capable of receiving user inputs.
  • the display 130 and the input device 140 may be implemented as separate components or may be combined in a single component, e.g., a touch screen.
  • the touch screen may operate both as the display 130 to provide an output to the user and as the input device 140 to receive an input from the user.
  • the temporary lock manager 150 is to implement an example temporary lock function.
  • the temporary lock manager 150 may be a module including a library so as to be operable for any of a plurality of applications installed in the image forming apparatus 100 or otherwise may be implemented to be included in each application installed in the image forming apparatus 100.
  • the temporary lock manager 150 may be arranged on a separate apparatus that is communicatively coupled to the image forming apparatus 100 and provide functionality by communicating with the image forming apparatus 100.
  • the temporary lock manager 150 may be a part of the operating system 160 of the image forming apparatus 100, which will be described below.
  • the temporary lock manager 150 may encompass a module or component that implements, together with the processor 110 of the image forming apparatus, or causes the processor 110 to implement, the temporary lock function in the image forming apparatus 100 in accordance with examples of the present disclosure. It should be understood that implementations of the temporary lock manager 150 are not limited to any specific hardware/machine readable instruction examples as described herein.
  • the operating system 160 may provide a basic environment for control of individual hardware components of the image forming apparatus 100 and for use of machine readable instructions/applications.
  • FIGS. 2 to 6 are schematic diagrams of interfaces of an image forming apparatus, illustratively showing temporary lock functions according to various examples.
  • An application installed in the image forming apparatus 100 may be used by a user of the image forming apparatus 100 through the display 130 of the image forming apparatus 100.
  • the user may log in to the application on the image forming apparatus 100.
  • the application may provide a cloud service by which the user may view and print a document stored in a cloud and/or upload, to the cloud, a document scanned at the image forming apparatus 100.
  • Other examples of the application are also contemplated herein.
  • the use of the application may involve the user of the image forming apparatus 100 performing a process of logging in to the application.
  • the display 130 of the image forming apparatus 100 may display an application login screen, such as in an interface 200 of FIG.
  • log-in schemes are also contemplated herein, including, e.g., a biometrics-based technology, a CAPTCHA stage, a two-channel authentication approach, and so forth.
  • the log-in schemes are not limited to the above-described examples.
  • the image forming apparatus 100 may indicate, on the display 130, a usage screen of the application.
  • FIG. 3 shows an example interface 300 of the application for which the login procedure is performed.
  • the user may conduct, via the interface of the application, a desired action, for example, an action of accessing a document that is stored in a folder, an action of uploading from or downloading to the application a document that is scanned, printed, or otherwise processed by the image forming apparatus 100, or the like.
  • a desired action for example, an action of accessing a document that is stored in a folder, an action of uploading from or downloading to the application a document that is scanned, printed, or otherwise processed by the image forming apparatus 100, or the like.
  • the functionality of the application is not limited to the above-described examples.
  • the user may request a temporary lock of the application.
  • the user may make a request to the image forming apparatus for the temporary lock.
  • the user may request the temporary lock by selecting a temporary lock icon 310 on the interface 300 of FIG. 3.
  • the operating system 160 may generate a touch event which is processed by the application, the temporary lock manager 150, and/or the processor 110 so that the temporary lock of the application may be initiated.
  • Other examples of requesting the temporary lock are also contemplated herein, such as use of a voice command, manipulation of a certain keypad, and so forth.
  • FIG. 4 shows an example interface 400 of the application, which appears after the temporary lock request is received.
  • the temporary lock request may include second authentication information for use in temporarily locking the application and unlocking the temporarily locked application.
  • the second authentication information for use with the temporary lock function may be different from the first authentication information used for logging in to the application.
  • the first authentication information and the second authentication information may include their respective passwords, and the password in the second authentication information may have a cryptographic strength less than that of the password in the first authentication information.
  • the password in the second authentication information may be less complex than that in the first authentication information and may thus be easy for the user to set.
  • the password in the second authentication information may be set as a two-digit number while the password in the first authentication information may have a combination of ten or more letters, digits, or other characters.
  • Other examples are also contemplated in which the user’s password for the temporary lock may be simple to create and remember.
  • the image forming apparatus 100 may display an interface 410 through which to receive the second authentication information for the temporary lock.
  • the second authentication information may be a temporary lock password in the form of a personal identification number (PIN) having a certain number of digits.
  • PIN personal identification number
  • the temporary lock password may be directly set by the user through the input device 140.
  • the temporary lock manager 150 may generate arbitrary digits/characters as the temporary lock password and present the same on the interface 410. Other ways of generating the temporary lock password are also contemplated herein.
  • the second authentication information for use with the temporary lock function may further include at least one of a temporary lock time duration that specifies a period of time for which to continue the temporary lock and a temporary lock identifier that indicates which user requests the temporary lock or includes a message from the requesting user.
  • the temporary lock time duration may be a period of time for which the application is kept in a status of being temporarily locked.
  • the temporary lock time duration may be directly set by the user through the input device 140.
  • the temporary lock manager 150 may set up an arbitrary time duration as the temporary lock time duration and present the same on the interface 410.
  • the temporary lock time duration may be set to be a predetermined time duration.
  • the temporary lock time duration may be set with, e.g., switching of the application into the temporary lock status.
  • the temporary lock status which is set for the user, may be canceled and the user may be freed from staying logged in to the application, thereby being logged out of the application.
  • the temporary lock identifier may be used as a message based on the application being temporarily locked.
  • the temporary lock identifier may include an identifier for verifying the user requesting the temporary lock, a note that the requesting user may have completed, or the like.
  • Other examples of the temporary lock identifier are also contemplated herein.
  • the second authentication information such as the temporary lock password, the temporary lock time duration, and the temporary lock identifier, may not necessarily be indicated on the interface 410 of the image forming apparatus, but may be indicated on an electronic device such as a mobile phone of the user and/or inputted or set through the electronic device.
  • the image forming apparatus 100 may switch the application into the temporary lock status while keeping the user logged in to the application.
  • switching the application into the temporary lock status while keeping the user logged in to the application may include indicating, on the display 130, a type of interface on which the user’s specific content of the application is not available to another user.
  • information regarding a current status of the application may be stored, as records, in the memory 120 of the image forming apparatus 100 so as to keep the user logged in. That is, with the user getting logged in to the application and requesting the temporary lock, the image forming apparatus 100 may store information regarding his/her log-in and/or job with respect to the application and may switch the application into the temporary lock status.
  • FIG. 5 shows an example interface 500 of an application, which may be presented after switching into the temporary lock status.
  • the interface 500 indicates that the application is now switched to the temporary lock status.
  • the interface 500 may include an interface 510 indicating how much of the temporary lock time duration is left.
  • the screen of the application may be hidden, thereby preventing an exposure of personal information. It is also contemplated that the personal information exposure may be prevented in a manner other than or in addition to that described above, such as resolution reduction or blurring of the screen. Still further, the time left in the temporary lock time duration may be displayed in real time.
  • FIG. 6 there is described an example operation of unlocking an application in a temporary lock status.
  • the image forming apparatus 100 may perform an operation of receiving authentication information to undo the temporary lock.
  • FIG. 6 shows an example interface 600 of the application, through which the user may input authentication information for canceling the temporary lock status.
  • the second authentication information for example, the temporary lock password
  • the user may make a request for undoing of the temporary lock. That is, the user may request the unlocking by inputting the second authentication information, rather than the different, first authentication information, which is used in a situation in which the user is initially logged in to the application.
  • the user may input the password, for example, the PIN information as discussed above with reference to FIG.
  • the user may have inputted his/her identifier, for example, the identifier as discussed above with reference to FIG. 4, at the time of requesting the temporary lock.
  • the identifier may be indicated in the form of, e.g., “Message: userOOl ,” on the interface 610 so that the user may check such information.
  • different implementations are possible.
  • the image forming apparatus 100 may receive the unlock request, compare the second authentication information included in the unlock request with the second authentication information included in the temporary lock request that was received before the switching to the temporary lock status, and, based on the comparison resulting in a match therebetween, cancel the temporary lock status.
  • Canceling the temporary lock status may include re-displaying, on the display, the previous screen of the application, on which the user may thus use the application while still remaining logged in thereto.
  • the information regarding a current status of the application may be stored, as records, in the memory 120 of the image forming apparatus 100 based on the application being switched into the temporary lock status and may be used based on the temporary lock status being canceled.
  • using the application while the user stays logged in thereto may involve using certain data to communicate with a server side that maintains the application, for example, using token information, session information, or other information to authenticate the application with the server side.
  • such data may be stored as records in the memory so as to be used based on the temporary lock status being canceled.
  • the job information may be stored regarding the pending job and used in switching the application back into its immediately preceding status.
  • the user may proceed to use the application without any additional login procedure nor any further repeated manipulation.
  • the interface 300 of FIG. 3 may be indicated to the user.
  • FIG. 7 is a flow diagram illustratively showing operations of temporarily locking an image forming apparatus according to an example.
  • the image forming apparatus 100 performs a login procedure of a first user for an application based on the first user’s first authentication information regarding the application at operation S710.
  • the image forming apparatus 100 has the application installed thereon and performs the login procedure for the application based on the user requesting authentication for the application by launching the application and providing the first authentication information for use in logging in to the application.
  • the running application is caused to operate in a manner as described, for example, with respect to FIG. 3.
  • the image forming apparatus 100 receives a request for temporary lock of the application at operation S720.
  • the request includes second authentication information that is different from the first authentication information for use in performing the login procedure for the application.
  • the first authentication information and the second authentication information may include their respective passwords, and the password in the second authentication information may have a cryptographic strength less than that of the password in the first authentication information.
  • the second authentication information may include a time duration of the temporary lock and an identifier for identifying which user requests the temporary lock, as described above.
  • the image forming apparatus 100 switches the application into a temporary lock status while keeping the user logged in to the application in operation S730. For example, as described above with reference to FIG. 5, the image forming apparatus 100 may switch the application into the temporary lock status and indicate on the display 130 an interface corresponding to the temporary lock status.
  • the image forming apparatus 100 may associate login information and ongoing job information with the temporary lock request to store, as records, the login information and the ongoing job information.
  • the login information may include information regarding the user’s log-in, which information is available for keeping the user logged in to the application.
  • the ongoing job information may include information regarding the user’s job that is in progress in a situation in which the application is temporarily locked.
  • the image forming apparatus 100 may perform an operation of canceling the temporary lock status of the application in response to receiving the second authentication information while the temporary lock status is kept at operation S740. Descriptions of example operations of canceling the temporary lock status are provided above.
  • the image forming apparatus 100 may check whether the temporary lock time duration has elapsed and may cancel the temporary lock status based on receiving a request for undoing of the temporary lock, including, e.g., the second authentication information, before the temporary lock time duration elapses. For example, based on the temporary lock time duration elapsing after being set with the switching into the temporary lock status, which is set for the user, the temporary lock status may be canceled and the user may be freed from staying logged in to the application, thereby being logged out of the application.
  • the image forming apparatus supports the function of temporarily locking the application so that even in a situation in which a user moves away from and back to the image forming apparatus, the user may avoid a repetition of logging in to the application and may also have a secure way of preventing an exposure of information regarding the user.
  • FIG. 8 is a schematic diagram of an interface 800 of an image forming apparatus, illustratively showing a temporary lock function according to an example.
  • the image forming apparatus 100 may support use of the application by other users.
  • the interface 800 of FIG. 8 shows an example screen on which to receive, from the user, denoted as “user001 ,” upon whose request the application has been temporarily locked, an input of a temporary lock password, for example, a PIN, for undoing of the temporary lock.
  • a temporary lock password for example, a PIN
  • Another, second user may be unaware of the temporary lock password or may desire to use the application with his/her own account. In such cases, the second user may make a new request to log in to the temporarily locked application with the account different than the first user’s by, e.g., clicking the “Log in” button on the interface 810 of FIG. 8, without undoing the temporary lock by, e.g., clicking the “Unlock” button on the interface 810.
  • the image forming apparatus 100 may perform an operation of receiving the to-be-newly-logged-in user’s authentication information.
  • the image forming apparatus 100 may indicate the login screen as shown in FIG. 2 to receive the second user’s first authentication information regarding the application.
  • the image forming apparatus 100 may perform a login procedure of the second user for the application based on the second user’s first authentication information regarding the application.
  • the image forming apparatus 100 may display an interface of the application with the second user logged in thereto based on the second user’s account.
  • FIG. 9 is a flow diagram illustratively showing operations of temporarily locking an image forming apparatus according to an example.
  • the example operations illustrated in the flow diagram of FIG. 9 may be performed by the image forming apparatus 100 to allow the second user to use the application while the temporary lock status requested by the first user is kept.
  • Example operations of switching an application of the image forming apparatus 100 into the temporary lock status as requested by the first user are provided above with respect to FIGS. 2 to 7. While the temporary lock status is kept, the image forming apparatus 100 receives the second user’s authentication information regarding the application at operation S910. For example, as described above with reference to FIG.
  • the second user may request authentication for the temporarily locked application by attempting to log in to the application with the different account, for example, by clicking the “Log in” button on the interface 810, followed by providing his/her respective first authentication information regarding the application.
  • the image forming apparatus may perform the login procedure of the second user for the application at operation S920. Based on the login procedure being successfully performed, the running application may operate in a manner as described, for example, with respect to FIG. 3.
  • the image forming apparatus 100 may free the user who requested the existing temporary lock of the application, e.g., the first user, from being logged in to the application. That is, the application may not be kept any more in the temporary lock status for the first user once the application is used as such by the second user.
  • This may provide a solution for utilizing a limited resource in carrying out the temporary lock function, thereby achieving both user convenience and security without extra resource consumption in an environment in which the resource-constrained image forming apparatus is shared by multiple users.
  • the image forming apparatus 100 may keep the user who requested the existing temporary lock of the application, e.g., the first user, logged in to the application for a certain period of time. For example, the first user may be kept logged in for the temporary lock time duration that is set for the first user. Based on the second user logging out of the application after closing the application, the image forming apparatus 100 may identify whether the first user should continue to be kept logged in and, if so, switch the application back into the temporary lock status. Examples thereof are described below with reference to FIGS. and 11.
  • FIG. 10 is a schematic diagram of an interface 1000 of an image forming apparatus, illustratively showing a temporary lock function according to an example.
  • the second user may log in to the application with his/her account to use the application. Thereafter, based on the second user logging out of the application, the image forming apparatus 100 determines whether the user who requested the existing temporary lock of the application, e.g., the first user, should be kept logged in to the application. Based on the first user being kept logged in to the application and the temporary lock time duration set for the first user not elapsing, the image forming apparatus 100 may output the interface 1000, indicating that the application is in the temporary lock status. For example, the interface 1000 may include an interface 1010 to indicate how much of the temporary lock time duration is left.
  • FIG. 11 is a flow diagram illustratively showing operations of temporarily locking an image forming apparatus according to an example.
  • the image forming apparatus performs a logout procedure of the second user for the application at operation S1130.
  • the second user may request to log out of the application after closing the application.
  • the image forming apparatus 100 determines, for the temporary lock status that has been set for the existing user, e.g., the first user, and kept since before the second user logs in to the application, whether the temporary lock time duration elapses at operation S1140. Based on the temporary lock time duration elapsing, the image forming apparatus performs a logout procedure of the corresponding user, e.g., the first user, for the application and cancels the temporary lock status of the application at operation S1150.
  • the image forming apparatus restores the application to the temporary lock status for the corresponding user, e.g., the first user at operation S1160, and may display the interface 1000, for example as shown in FIG. 10.
  • the image forming apparatus supports the function of temporarily locking the application so that even in a situation in which a user moves away from and back to the image forming apparatus, the user may avoid a repetition of logging in to the application and may also have a secure way of preventing an exposure of information regarding the user.
  • FIGS. 12 and 13 are schematic diagrams of interfaces of an image forming apparatus, illustratively showing temporary lock functions according to various examples.
  • the image forming apparatus 100 may support a feature of logging a plurality of users in to the application, as discussed above, and may further allow the plurality of users to request the application to be temporarily locked. For example, with the application remaining switched into the temporary lock status as requested by a first user, a second user may log in to the application with the second user’s account. Thereafter, instead of logging out of the application, the second user may request the application to be temporarily locked for the second user. In this connection, the second user’s temporary lock request may be processed in a manner identical to that for the first user’s temporary lock request.
  • the image forming apparatus 100 may temporarily lock the application for the second user as well while keeping the first user and the second user logged in to the application.
  • the image forming apparatus may indicate, on an interface 1200, information identifying which users have requested the application to be switched into the temporary lock status. For example, for each of the users, the identifier included in that user’s respective second authentication information, for example, “user001” for the first user, “user002” for the second user, and so forth, may be stored. These identifiers may be indicated on an interface 1210 as being user-selectable. A user who desires the temporarily locked application to be unlocked may select his/her identifier and input his/her respective second authentication information, for example, his/her temporary lock password, to make a request for the unlocking.
  • respective second authentication information for example, “user001” for the first user, “user002” for the second user, and so forth.
  • the image forming apparatus 100 may perform, based on the second authentication information associated with “user001 ,” the unlocking of the temporarily locked application for the corresponding user.
  • an identifier may be a user-input message or identifier or may be any other type of information that distinguishes among multiple users. For example, a user may not directly input information as an identifier. Instead, the identifier may be generated by the temporary lock manager 150 and provided for the user. Further, the image forming apparatus 100 may perform an additional process of encrypting, converting, or otherwise processing information such as the identifier into a differently formatted one and then store the same as a record.
  • the user identification may not necessarily involve indicating the identifier or message on an interface of the image forming apparatus 100, but may employ various techniques, such as a near field communication (NFC) scheme, a quick response (QR) code scheme, or the like, supported by, e.g., the user’s portable electronic device.
  • NFC near field communication
  • QR quick response
  • the image forming apparatus supports the function of temporarily locking the application so that even in a situation in which a user moves away from and back to the image forming apparatus, the user may avoid a repetition of logging in to the application and may also have a secure way of preventing an exposure of information regarding the user.
  • FIG. 14 is a diagram illustratively showing records to support a temporary lock function according to an example.
  • the image forming apparatus may generate and manage records 1400 in order to keep a user logged in to an application based on the application being switched into and out of a temporary lock status.
  • the records 1400 may include temporary lock data 1410 for each of a plurality of users.
  • temporary lock data 1420 may include each user’s second authentication information, i.e., authentication information for use in temporarily locking the application and unlocking the temporarily locked application for the user.
  • the second authentication information may include, for example, a temporary lock password, a temporary lock time duration, a user identifier, and so forth.
  • the temporary lock data 1420 may also include each user’s login information, i.e., information for use in keeping the user logged in to the application.
  • the user login information may be stored in the form of JavaScript Object Notation (JSON) based on the application supporting token-based authentication.
  • JSON JavaScript Object Notation
  • the login information may also be stored in another form with which to switch the application back into its previous status (e.g., a status in which the user is originally logged in thereto).
  • the temporary lock data 1410 may further include each user’s job information. For example, based on there being a job on which the user has been working in a situation in which the application is switched into the temporary lock status, the job information may be stored regarding the pending job and used in switching the application back into its immediately preceding status. For example, based on the user entering certain text in an input window on the application at the time of the switching, the text may be stored as such.
  • FIG. 15 is a schematic illustration of a non-transitory computer readable recording medium including instructions according to an example.
  • a non-transitory computer readable recording medium 1500 stores a computer program that is executable by a processor and programmable to implement example operations of the aforementioned methodology, such as the example operations of the image forming apparatus described above with respect to FIGS. 1 to 14 and the operations of the temporary lock method described above with respect to FIGS. 1 to 14.
  • the computer program on the non-transitory computer readable storage medium 1500 may include a set of program instructions that direct the processor to perform specific operations. With reference to FIG. 15, examples of the computer program stored in the computer readable recording medium 1500 will be described.
  • the non-transitory computer readable storage medium 1500 may include an instruction 1510 to perform a login procedure of a first user for an application based on the first user’s first authentication information regarding the application, an instruction 1520 to receive a request for temporary lock of the application, the request including second authentication information that is different from the first authentication information, an instruction 1530 to, in response to the temporary lock request, switch the application into a temporary lock status while keeping the first user logged in to the application, and an instruction 1540 to, in response to receiving the second authentication information while the temporary lock status of the application is kept, cancel the temporary lock status.
  • the above-described computer readable recording medium may be a non-transitory readable medium.
  • the term “non-transitory readable medium” as used herein refers to a medium that is capable of semi-permanently storing data and is readable by an apparatus, rather than a medium, e.g., a register, a cache, a volatile memory device, etc., that temporarily stores data.
  • the foregoing program instructions may be stored and provided in a CD, a DVD, a hard disk, a Blu-ray disc, a USB, a memory card, a ROM device, or any of other types of non-transitory readable media.
  • the methodology disclosed herein may be incorporated into a computer program product.
  • the computer program product may be available as a product for trading between a seller and a buyer.
  • the computer program product may be distributed in the form of a machine-readable storage medium, e.g., compact disc read only memory (CD-ROM), or distributed online through an application store, e.g., PlayStoreTM.
  • an application store e.g., PlayStoreTM.
  • at least a portion of the computer program product may be temporarily stored, or temporarily created, in a storage medium such as a server of the manufacturer, a server of the application store, or a storage medium such as memory of a relay server.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Facsimiles In General (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
PCT/US2022/048361 2022-05-27 2022-10-31 Image forming apparatus and screen lock method WO2023229629A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2022-0065042 2022-05-27
KR1020220065042A KR20230165403A (ko) 2022-05-27 2022-05-27 일시 잠금 기능

Publications (1)

Publication Number Publication Date
WO2023229629A1 true WO2023229629A1 (en) 2023-11-30

Family

ID=84627294

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2022/048361 WO2023229629A1 (en) 2022-05-27 2022-10-31 Image forming apparatus and screen lock method

Country Status (2)

Country Link
KR (1) KR20230165403A (ko)
WO (1) WO2023229629A1 (ko)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060288234A1 (en) * 2005-06-16 2006-12-21 Cyrus Azar System and method for providing secure access to an electronic device using facial biometrics
US8325995B1 (en) * 2011-06-21 2012-12-04 Google Inc. Proximity wakeup
EP2741486A2 (en) * 2012-12-05 2014-06-11 Kyocera Document Solutions Inc. Information processing apparatus having user authentication function and authentication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060288234A1 (en) * 2005-06-16 2006-12-21 Cyrus Azar System and method for providing secure access to an electronic device using facial biometrics
US8325995B1 (en) * 2011-06-21 2012-12-04 Google Inc. Proximity wakeup
EP2741486A2 (en) * 2012-12-05 2014-06-11 Kyocera Document Solutions Inc. Information processing apparatus having user authentication function and authentication method

Also Published As

Publication number Publication date
KR20230165403A (ko) 2023-12-05

Similar Documents

Publication Publication Date Title
US7730526B2 (en) Management of physical security credentials at a multi-function device
CN101998012B (zh) 信息处理系统及其控制方法
KR101681888B1 (ko) 유저 인증을 행하는 화상 처리장치 및 그 인증방법, 및 기억매체
US10303407B2 (en) Image forming apparatus, method of controlling the same, and storage medium
US11455127B2 (en) Image processing apparatus, control method for image processing apparatus, and storage medium
JP7388285B2 (ja) サービス提供システム、ログイン設定方法、情報処理システム
CN106878144A (zh) 图像处理设备及其控制方法
US20150007279A1 (en) Communication method, device, information processing apparatus, and storage medium
KR20220106684A (ko) 멀티-요소 인증 기능을 갖는 화상 형성 장치
US11671313B2 (en) Printing apparatus, printing system, method of registering printing apparatus, and medium
CN107864307A (zh) 图像形成装置、图像形成装置的控制方法以及存储介质
US9917962B1 (en) Multifunction peripheral with avatar based login
US11249698B2 (en) Image processing apparatus, control method for image processing apparatus, and storage medium
US12008277B2 (en) Image forming apparatus with having multi-factor authentication function executable for any kind of remote access for using image processing functions of the image forming apparatus, control method, and non-transitory computer-readable storage medium
WO2023229629A1 (en) Image forming apparatus and screen lock method
JP6217301B2 (ja) 情報処理システム、情報処理装置、情報処理方法およびプログラム
JP2018074455A (ja) 情報処理装置及びプログラム
US10649703B2 (en) Print control apparatus, control method of a print control apparatus, and recording medium
US20190007581A1 (en) Image processing apparatus, method of controlling same, and storage medium
US11843738B2 (en) Information processing apparatus having multifactor authentication function, control method, and storage medium
US11989313B2 (en) Printing apparatus, method for controlling printing apparatus, and storage medium
JP2011060006A (ja) 情報処理システム、処理装置及びプログラム
JP2018073222A (ja) 情報処理装置及びプログラム
JP2020036267A (ja) 画像形成装置、画像形成装置の制御方法およびプログラム
JP2023030515A (ja) 情報処理装置、情報処理システム、情報処理方法、及びプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22830631

Country of ref document: EP

Kind code of ref document: A1