US20030152231A1 - Verification system, server, and electronic instrument - Google Patents

Verification system, server, and electronic instrument Download PDF

Info

Publication number
US20030152231A1
US20030152231A1 US10/357,510 US35751003A US2003152231A1 US 20030152231 A1 US20030152231 A1 US 20030152231A1 US 35751003 A US35751003 A US 35751003A US 2003152231 A1 US2003152231 A1 US 2003152231A1
Authority
US
United States
Prior art keywords
verification
user
section
electronic instrument
instrument
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/357,510
Inventor
Atsushi Tomita
Katsuaki Tajima
Kenichi Matsumoto
Kazuhiro Araki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Minolta Co Ltd
Original Assignee
Minolta Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP2002030476A external-priority patent/JP2003233596A/en
Priority claimed from JP2002091550A external-priority patent/JP4189571B2/en
Application filed by Minolta Co Ltd filed Critical Minolta Co Ltd
Assigned to MINOLTA COMPANY, LTD. reassignment MINOLTA COMPANY, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ARAKI, KAZUHIRO, MATSUMOTO, KENICHI, TAJIMA, KATSUAKI, TOMITA, ATSUSHI
Publication of US20030152231A1 publication Critical patent/US20030152231A1/en
Priority to US11/802,049 priority Critical patent/US8340293B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00326Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a data reading, recognizing or recording apparatus, e.g. with a bar-code apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00326Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a data reading, recognizing or recording apparatus, e.g. with a bar-code apparatus
    • H04N1/00339Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a data reading, recognizing or recording apparatus, e.g. with a bar-code apparatus with an electronic or magnetic storage medium I/O device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4413Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4426Restricting access, e.g. according to user identity involving separate means, e.g. a server, a magnetic card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4433Restricting access, e.g. according to user identity to an apparatus, part of an apparatus or an apparatus function
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00365Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
    • G07C2009/00373Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit whereby the wake-up circuit is situated in the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00968Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
    • G07C2009/00976Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00281Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal
    • H04N1/00307Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a telecommunication apparatus, e.g. a switched network of teleprinters for the distribution of text-based information, a selective call terminal with a mobile telephone apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0008Connection or combination of a still picture apparatus with another apparatus
    • H04N2201/0034Details of the connection, e.g. connector, interface
    • H04N2201/0037Topological details of the connection
    • H04N2201/0041Point to point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0008Connection or combination of a still picture apparatus with another apparatus
    • H04N2201/0034Details of the connection, e.g. connector, interface
    • H04N2201/0048Type of connection
    • H04N2201/0055By radio
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0091Digital copier; digital 'photocopier'
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0096Portable devices

Definitions

  • the present invention relates to a verification system for verifying whether or not use of an electronic instrument is permitted, a method, a server and electronic instrument and more particularly to a verification system whose security is intensified by employing plural verification methods, a method, a server and an electronic instrument.
  • the verification system verifies whether or not user is a person who is dully permitted to use it.
  • each user carries such a medium as a magnetic card in which his ID is registered or an IC card and throws that medium into the system so as to verify himself.
  • the system reads out his ID from the thrown medium and checks whether or not that ID is an ID registered as a person permitted to use it. Consequently, the system determines whether or not he is permitted to use the system.
  • a password is inputted with an input key provided on the apparatus.
  • verification systems employing personal feature information such as finger print, voice print, face image and the like.
  • the above-described conventional verification systems have following problems. That is, the verification system employing such a medium as the magnetic card or IC card has such a fear that the medium may be stolen or copied so that it may be used illegally by a different person and therefore, the security performance of this system is low.
  • the verification method by password input also has the same problem, which may be generated if the password leaks out.
  • the method using personal feature information has a very high security performance, its verification system is very expensive. Further, in case of an apparatus used by many people, it takes labor and time for each person to register his personal feature information and it also takes time for verification. For the reason, the verification system using personal feature information is not so convenient for use.
  • Any verification system determines whether or not a person of verification object is a person permitted to use an object apparatus according to verification information such as inputted password and user ID.
  • the verification information is different among these verification systems.
  • the security level which is a result of verification, differs among them.
  • the conventional verification system allows a verified person to use its apparatus without any limitation regardless of the security level, which is a result of the verification once he is verified to use.
  • such an apparatus as copying machine allows the verified person to use a common resource such as consumption goods and memory region freely.
  • a common resource such as consumption goods and memory region freely.
  • low-security level verification based on password input may cause an illegal procedure.
  • the present invention has been made in view of the above circumstances and has an object to overcome the above problems and to provide a high-security and usability of verification system and a server, an electronic instrument, an image processing apparatus and an image forming apparatus incorporated in the system, a verification method or verification system or the like capable of appropriately controlling permission/inhibition of apparatuses in accordance with security level determined by a verified method.
  • a verification system consisting of an identification information receiving apparatus for receiving user's identification information, a server for receiving user's positioning information transmitted from an external instrument in a form of radio wave, and an electronic instrument, the verification system comprising: a first verification section for verifying a user based on user's identification information that the identification information receiving apparatus has received; a second verification section for verifying a user based on user's positioning information that the server has received from an external instrument; and permission giving section for permitting a user to use the electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem.
  • the inventive image processing apparatus is equipped with at lest two of the following typical examples of electronic instruments: a scanner that scans a document to obtain image data thereon, a printer that forms an image based on image data; and an image transmitting apparatus that transmits image data to other apparatus.
  • a server for receiving user's identification information and receiving user's positioning information transmitted from an external instrument in a form of radio wave, and determining to permit/not to permit the user to use an electronic instrument
  • the server comprising: a first verification section for verifying a user based on obtained user's identification information; a second verification section for verifying a user based on user's positioning information received from an external instrument; and permission giving section for permitting a user to use an electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem.
  • an electronic instrument for receiving user's identification information and receiving user's positioning information transmitted from an external instrument in a form of radio wave, the electronic instrument comprising: a first verification section for verifying a user based on obtained user's identification information; a second verification section for verifying a user based on user's positioning information received from an external instrument; and permission giving section for permitting a user to use the electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem.
  • a verification method for a verification system consisting of an identification information receiving apparatus for receiving user's identification information, a server for receiving user's positioning information transmitted from an external instrument in a form of radio wave, and an electronic instrument
  • the verification method comprising: a step to execute a first verification based on user's identification information that the identification information receiving apparatus has received; a step to execute a second verification based on user's positioning information that the server has received from an external instrument; and a step to permit a user to use the electronic instrument in case both a verification result of the first verification and that of the second verification are no problem.
  • a verification method for an image processing apparatus having least two of following items, a scanner that scans a document to obtain image data thereon, a printer that forms an image based on image data, and an image transmitting apparatus that transmits image data to other apparatus, the verification method comprising: a step to obtain user's identification information and execute a first verification based on the user's identification information; a step to obtain user's positioning information from an external instrument transmitting radio wave and execute a second verification based on the user's positioning information; and a step to permit a user to use the image processing apparatus in case both a verification result of the first verification and that of the second verification are no problem.
  • a verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods
  • the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method, wherein, under situation such that operation for the first electronic instrument has been permitted based on a single verification in accordance with either the first verification method or the second verification method, in case a double verification for the second electronic instrument is executed in accordance with both the first verification method and the second verification method including a verification content of which is same as the single verification by a first electronic instrument, the permission restricting section inhibits operation for the first electronic instrument.
  • a verification system incorporating a first electronic instrument and second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification methods
  • the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method, wherein, under situation such that operation for the first electronic instrument has been permitted based on a double verification in accordance with both the first verification method and the second verification method, in case a single verification for the second electronic instrument is executed in accordance with either the first verification method or the second verification method including a verification content of which is common to the verification for a first electronic instrument, the permission restricting section inhibits operation for the second electronic instrument.
  • a verification system incorporating a first electronic instrument and second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification methods
  • the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method, wherein, after an operation with a double verification in accordance with both the first verification method and the second verification method for the first electronic instrument finished, in case a single verification for the second electronic instrument in accordance with either the first verification method or the second verification method is made including a verification content common to verification for the first electronic apparatus, the permission restricting section determines to permit/not to permit the second apparatus to operate based on positioning information of the first and second electronic instruments and verification time information relating to the second electronic instrument.
  • a verification method for verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods, wherein, under situation such that operation for the first electronic instrument has been permitted based on a single verification in accordance with either the first verification method or the second verification method, in case a double verification for the second electronic instrument is executed in accordance with both the first verification method and the second verification method including a verification content of which is same as the single verification by a first electronic instrument, operation for the first electronic instrument is inhibited.
  • a verification method for a verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods, wherein, under situation such that operation for the first electronic instrument has been permitted based on a double verification in accordance with both the first verification method and the second verification method, in case a single verification for the second electronic instrument is executed in accordance with either the first verification method or the second verification method including a verification content of which is common to the verification for a first electronic instrument, operation for the second electronic instrument is inhibited.
  • the inventive verification apparatus or the image processing apparatus, or the image forming apparatus, or the verification apparatus comprises: a first verification section for conducting verification in accordance with first verification method; a second verification section for conducting verification in accordance with second verification method; and an operation restricting section for restricting an operation based on verification results obtained by the first verification section and the second verification section, wherein in case a single verification by either the first verification section or the second verification section is made, the operation restricting section permits to operate with functions narrower than a case of an operation double verified by both the first verification section and the second verification section.
  • a verification method using a first verification method and a second verification method wherein in case a single verification in accordance with either the first verification method or the second verification method is made, operation with functions narrower than a case of an operation double verified by both the first verification method and the second verification method is permitted.
  • a user verified double in accordance with the first and second verification systems is permitted to widely use functions of an apparatus. This is because credibility of the verification is high.
  • a user verified single in accordance with one of the first and second verification system is permitted use restricted functions of the apparatus because credibility of the verification is low.
  • FIG. 1 is a block structure diagram showing a verification system directed to a first embodiment
  • FIG. 2 is a data structure diagram showing format of identification codes for a cellular phone
  • FIG. 3 is a data structure diagram showing format of identification codes for a simple cellular phone
  • FIG. 4 is a flowchart showing processing by an image forming apparatus in verification processing
  • FIG. 5 is a flowchart showing processing by a card reader in verification processing
  • FIG. 6 is a flowchart showing processing by a portable instrument in verification processing
  • FIG. 7 is a block structure diagram showing a verification system directed to a second embodiment
  • FIG. 8 is a block structure diagram showing a verification system directed to a third embodiment
  • FIG. 9 is a diagram for illustrating an operation of a verification system
  • FIG. 10 is a diagram for illustrating an operation of a verification system
  • FIG. 11 is a diagram for illustrating an operation of a verification system
  • FIG. 12 is a diagram for illustrating an operation of a verification system
  • FIG. 13 is a flowchart showing an operation of each copying machine for a verification system
  • the card reader 2 is an ordinary card reader capable of reading a magnetic card or IC card (hereinafter referred to as just a card). Although the card reader 2 is separated from the image forming apparatus 1 here, it may be incorporated in the image forming apparatus 1 .
  • the portable instrument 3 is an ordinary communication unit which user carries with himself.
  • the base station system 4 is constituted of plural radio communication bases capable of acquiring position information by communicating with the portable instrument 3 .
  • An operation panel 16 is connected to the input/out 15 .
  • the operation panel 16 contains various kinds of key switches and a liquid crystal displayer.
  • the various kinds of the key switches include a copy button for specifying a start of image forming processing and ten keys for numerical data input.
  • the liquid crystal displayer displays various kinds of messages for user as required and soft keys for inputting various kinds of settings such as paper size, print density, magnification change, paper discharge mode.
  • the card reader I/F 17 is connected to an external card reader 2 and communicates with the card reader 2 .
  • the short-range radio communication I/F 18 is an apparatus for carrying out short-range radio communication by sending or receiving radio waves.
  • the short-range radio communication I/F 18 is capable of communicating with a short-range radio communication I/F of other unit nearby.
  • FIG. 2 shows MSI (Mobile System Identifier) format, which is an identification code of the portable phone.
  • FIG. 3 shows the format of individual cell channel (SCCH) in a control physical slot of logical control channel (LCCH) of the compact type portable phone.
  • SCCH Cell Channel
  • LCCH logical control channel
  • the portable instrument 3 is constructed to send this MSI or SCCH if it receives a polling command from outside through the short-range radio communication I/F 35 .
  • a different user ID is allocated to individual user who is permitted to use the image forming apparatus 1 and a card in which user ID is recorded is distributed to that user.
  • the card mentioned here is a name card of an employee or a registration card registered in his facility or so on. This card corresponds to a medium and the user ID recorded in the card corresponds to identification information. Instead of distributing the card, it is permissible to store individual user ID and input it into the operation panel 16 as a password.
  • the portable instrument 3 acquires its own current position information by communication with the base station system 4 or the GPS system through the radio communication I/F 36 as required. If the current position information according to this method is employed with the above-described position information, a higher verification is enabled.
  • the image forming apparatus 1 checks whether or not a card user ID has been registered by referring to the use permission table of Table 1. As a result, it can be checked whether or not that card is a card of user permitted to use the image forming apparatus 1 . If it is not a card of user permitted to use, usage of the image forming apparatus 1 is not permitted. The verification of this card corresponds to the first verification means.
  • the card user ID and identification code of the portable instrument 3 are registered together in the use permission table, usage of the image forming apparatus 1 is permitted. If corresponding identification code cannot be received when a registered card is inserted, it indicates that the portable instrument 3 of that user does not exist nearby. For the reason, the system does not allow that user to use the image forming apparatus 1 . Thus, recognizing that the card and the portable instrument 3 are possessed at the same time enables to prevent illegal use thereof because the card is stolen. This ensures a higher security system as compared to a case where the verification is done with only the card.
  • FIGS. 4 - 6 Each flow chart indicates processing with the image forming apparatus 1 , the card reader 2 , and the portable instrument 3 . These processings are executed in parallel and continued by exchange of data among these.
  • the processing of the image forming apparatus 1 is started when its power supply is turned on and first, initial setting such as DRAM 13 clearing, setting of standard mode is carried out (S 101 ). After that, the CPU 11 of the image forming apparatus 1 stands by until the card reader I/F 17 receives a notification of the user ID from the card reader 2 (S 103 ).
  • the identification code sent back by the portable instrument 3 is a number corresponding to the user ID in S 109 (S 109 : Yes), it means that the portable instrument 3 of an original owner of that card exists in a short distance.
  • the CPU 11 sets up a permission for use of the image forming apparatus 1 (S 111 ). The reason is that a person inserting the card into the card reader 2 is an original owner of that card. After that, the system stands by until the card is removed from the card reader 2 (S 113 : Yes) or a start button is pressed by the user (S 115 : Yes).
  • the processing of the card reader 2 will be described with reference to a flow chart of FIG. 5.
  • the card reader 2 starts the processing so as to execute initial setting (S 201 ). Then, the system stands by until the user inserts his card (S 203 ).
  • the card reader 2 reads out his user ID from that card (S 205 ). Then, whether or not reading of the user ID succeeds is determined (S 207 ). If reading of the card fails because a different card is inserted or card information is damaged (S 207 : No), an error message is displayed on the liquid crystal displayer of the card reader 2 (S 221 ). In this case, the system stands by until the card is removed (S 223 ). If the card is removed (S 223 : Yes), the system stands by until the card is inserted (S 203 ).
  • the read user ID is transmitted to the image forming apparatus 1 (S 209 ).
  • This transmission is the user ID notification shown in S 103 of FIG. 4.
  • the card reader 2 stands by until the card is removed (S 211 ). If the card is removed (S 211 : Yes), the card removal notification is transmitted to the image forming apparatus 1 (S 213 ). This transmission is the card removal notification shown in S 113 or S 123 of FIG. 4.
  • the card reader 2 stands by until a next card is inserted (S 203 ). The card reader 2 repeats the above-described processing until the power supply is turned off.
  • the portable instrument 3 starts its processing so as to execute initial setting (S 301 ). Then, whether or not a polling command has been received is determined (S 303 ). Unless the polling command is received (S 303 : No), other processing of the portable communication unit such as communication processing is carried out (S 311 ). If the polling command is received (S 303 : Yes), an identification code is sent back as a response (S 305 ). The portable instrument 3 repeats the above described processing until the power supply is turned off.
  • the system of this embodiment is constructed as shown in FIG. 7. That is, this system comprises the image forming apparatus 1 , which is an electronic instrument, the card reader 2 capable of communicating with the image forming apparatus 1 , the portable instrument 3 , which is an external instrument, the base station system 4 capable of communicating with the portable instrument 3 by radio and the server 5 capable of communicating with the image forming apparatus 1 .
  • the image forming apparatus 1 , the card reader 2 , the portable instrument 3 and the base station system 4 are the same devices as those of the first embodiment.
  • the server unit 5 is an ordinary unit having CPU, memory unit and the like.
  • the image forming apparatus 1 is capable of communicating with the server 5 through communication I/F 19 .
  • a unit which is an object for permission or non-permission of its usage is the image forming apparatus 1 and the verification processing is carried out in the server 5 .
  • the use permission table is disposed in a memory unit of the server 5 , while counterpart of it is provided on the NV-RAM 14 of the image forming apparatus 1 in case of the first embodiment.
  • the image forming apparatus 1 sends a user ID acquired from the card reader 2 to the server 5 .
  • the server 5 after receiving the user ID from the image forming apparatus 1 , checks whether or not that user ID is registered in the use permission table. This procedure corresponds to the first verification means. Further, the server 5 communicates with the base station system 4 so as to acquire the position of the portable instrument 3 having an identification code corresponding to that user ID. Consequently, whether or not the portable instrument 3 exists near the image forming apparatus 1 is checked. This procedure corresponds to the second verification means. Then, if the verification results of the first and second verification means are acceptable, the server 5 permits this user to use the image forming apparatus 1 .
  • the image forming apparatus 1 or the server 5 acquires the user ID read from the card by the card reader 2 and further an identification code of the portable instrument 3 through communication with the portable instrument 3 . Then, only if the user ID of the card and the identification code of the portable instrument 3 correspond to each other and are registered in the use permission table, usage of the image forming apparatus 1 is permitted. Therefore, a much higher security performance is ensured as compared to a case where the verification is carried out with only the card. Further, because this does not require an expensive system which takes time for registration and verification like personal feature information, a well convenient system is achieved.
  • an electronic instrument whose usage is permitted or not permitted is not restricted to an image forming device.
  • the server 5 may only carry out verification while determination of permission or non-permission may be carried out by the image forming apparatus 1 .
  • a short-range radio communication portion for sending a polling command is omitted from its representation, it may be transmitted from the image forming apparatus 1 or may be transmitted from the base station system 4 through the server 5 .
  • the present invention has been applied to a system in which plural copying machines are connected to a network such as LAN while each copying machine contains verification means based on two kinds of verification systems.
  • a verification system 41 of this embodiment is constructed as shown in FIG. 8. That is, a copying machine 51 , a copying machine 52 , a general information management server 53 and an important information management server 54 are connected to the LAN 55 .
  • the copying machine 51 and the copying machine 52 have facsimile function and scan mail function like the image forming apparatus 1 of the first and second embodiments and cannot be used until its usage is permitted.
  • the two copying machines (copying machine 51 and copying machine 52 ) are indicated in the same Figure, it is permissible to use a system 41 in which more copying machines or other devices are connected.
  • other servers than the general information management server 53 and the important information management server 54 may be connected thereto.
  • the copying machines 51 , 52 of this system 41 have verification means based on two verification systems, namely, verification by password input and verification with the portable communication unit.
  • the verification by password input is carried out by user's inputting his password.
  • the respective copying machines 51 , 52 contain a liquid crystal displayer for displaying various kinds of messages and key switches 61 , 62 (see FIG. 9) which allow a password to be inputted. Instead of inputting the password, it is permissible to distribute a card in which each person's user ID is recorded and read it with the card reader.
  • Verification with the portable instrument is carried out by communication with such a portable instrument as a portable phone owned by user personally.
  • the respective copying machines 51 , 52 have the same short-distance communication function as the first and second embodiments.
  • the respective copying machines 51 , 52 execute verification processing according to the identification code received through this short-distance communication function. This verification method is validated only if user carries his own portable instrument 42 with its power ON and requires no special operation or input processing.
  • the respective copying machines 51 , 52 contain each memory device.
  • the respective memory devices store a password allocated to each user for use in the verification and an identification code of the portable instrument 42 possessed by user personally, wherein each password and each identification code are linked together. That is, this contains a table in which the “user ID” column in table 1 described in the first embodiment is replaced with the column of password.
  • the table of each memory may be different between the copying machine 51 and the copying machine 52 . For example, there can be a common user who is allowed to use both the copying machines or a user allowed to use only any one.
  • the general information management server 53 and the important information management server 54 are ordinary servers for storing various kinds of data and controlling the entire system 41 .
  • Data stored in the general information management server 53 is only information having a relatively low security degree. Contrary to this, data stored in the important information management server 54 contains information having a high security degree.
  • the general information management server 53 stores various kinds of information relating to verification processing. Then, they control the verification condition by communication with the respective copying machines 51 , 52 connected to the LAN 55 . A permission restricting means is achieved in the general information management server 53 .
  • the respective copying machines 51 , 52 transmit a polling command. Its purpose is to receive an identification code of the portable instrument 42 located within an area at a short distance. Then, whether or not an identification code corresponding to the inputted password on the same table is received is determined. If the respective copying machines 51 , 52 succeed to receive the identification code corresponding to the password, they verify that person as a double verified user having a high verification reliability. If they cannot receive the identification code, they verify the person as a single verified user having a low verification reliability.
  • the respective copying machines 51 , 52 transmit its verification information to the general information management server 53 through the LAN 55 . If the verified person is the double verified user, the transmitted verification information is inputted password and an identification code acquired from the portable instrument 42 of the user. If the verified person is the single verified user, the transmitted verification information is only the inputted password.
  • the general information management server 53 determines whether or not usage of the copying machines 51 , 52 is permitted based on the verification information received from the respective copying machines 51 , 52 . Then, it transmits an enable signal or a disable signal to the respective copying machines 51 , 52 . If the enable signal is received, the respective copying machines 51 , 52 are set up for permission of usage, so that usage thereof is permitted. If the disable signal is received, it is indicated on a liquid crystal displayer so that the copying machine is set up for prohibition of the usage.
  • the general information management server 53 determines whether or not usage of the copying machines 51 , 52 is permitted, as follows.
  • the general information management server 53 searches the verification information of user currently using other copying machine if it receives the verification information of a newly verified user. Then, it checks whether or not there is any user verified based on the same password as a password contained in the verification information of the newly verified user. Because the same person cannot use plural copying machines at the same time, if there is a user verified based on the same password, there is a possibility that any one uses that password illegally.
  • any user is the double verified user while the other user is the single verified user, usage by the double verified user is permitted and usage by the single verified user is prohibited. If every user is the single verified user, a first verified user is permitted to use while the latter verified person is prohibited from using. If every user is the double verified user and uses a different identification code, usage of both the users is permitted. The reason is that any user is considered to be a proper user.
  • FIG. 9 shows that user verified by the copying machine 51 is the double verified user and the user verified by the copying machine 52 is the single verified user.
  • the passwords of both the users are the same.
  • the user of the copying machine 51 is permitted to use while the user of the copying machine 52 is prohibited from using.
  • the same thing can be said if the user of the copying machine 52 is verified first and starts its usage. In this case, if the user of the copying machine 51 is verified, after that, usage of the user of the copying machine 52 is disabled.
  • the above-described prohibition of use by the single verified user is adapted for a while after use of the other user is ended.
  • the respective copying machines 51 , 52 after use of the user is ended, transmit a finish signal to the general information management server 53 and waits for the next verification.
  • the general information management server 53 holds the verification information for a while after the finish signal is received.
  • a password inputted by user newly verified by the other copying machine after use of one copying machine is ended is compared with a password inputted by the user whose usage is ended at the time of start of his usage. If both the passwords are equal, whether or not usage of the latter user is permitted is determined according to an elapsed time T until a password is inputted by the latter user since the usage by a preceding user is ended and a distance D between both copying machines.
  • the permission of usage is determined depending on whether or not the user can move from the position of one copying machine to the position of the other copying machine within the elapsed time T.
  • a reference moving time between the respective machines is set up preliminarily and stored in the memory unit. If the elapsed time T is longer than the stored reference moving time and it is determined that he can move, the usage of the latter user is permitted. However, if the elapsed time T is too short and it is determined that he cannot move, the usage of the latter user is prohibited.
  • FIG. 10 shows such a case.
  • FIG. 10 indicates a case where after the time T is elapsed after the usage of the copying machine 51 by the double verified user is ended, the same password is inputted to the copying machine 52 located a distance D apart from the copying machine 51 .
  • the respective copying machines 51 , 52 receive an enable signal from the general information management server 53 , usable function range is determined depending on which the user is a single verified user or a double verified user. If the user of the copying machine 51 is the double verified user in FIG. 11, all the functions of the copying machine 51 can be used. On the other hand, because the user of the copying machine 52 is the single verified user, verification level is low and usable function is limited. That is, the respective copying machines 51 , 52 carry out an operation similar to an operation restricting means.
  • the functions of the respective copying machines 51 , 52 include, for example, quantity of copies, output type, paper attribute, output resolution, number of output colors and the like.
  • the output type refers to classification about single sided print or double sided print or classification about 1 in 1 print, 2 in 1 print and 4 in 1 print.
  • the paper attribute refers to the type of print paper for use.
  • the output resolution refers to classification of low, standard and high.
  • the number of output colors refers to one color, four colors, full-color and the like.
  • a limitation is not applied to the double verified user and he can use every function.
  • the respective copying machines 51 , 52 are provided with a finisher (paper folding, staple drive and the like), it is permissible to prohibit the single verified user from using that function.
  • FIG. 12 shows a case where the copying machines 51 , 52 can read out information stored in the general information management server 53 or the important information management server 54 and print it.
  • the double verified user can access any one of the general information management server 53 and the important information management server 54
  • the single verified user cannot access but the general information management server 53 .
  • the user of the copying machine 51 is the double verified user, he can access any one of the general information management server 53 and the important information management server 54 .
  • the user of the copying machine 52 is the single verified user, access to the important information management server 54 by him is prohibited.
  • FIG. 13 shows processing which are carried out in the copying machines 51 , 52 .
  • FIG. 14 shows processing which is carried out in the server 53 .
  • FIG. 15 shows processing which is carried out in the portable instrument 42 .
  • initial setting including copy mode and the like is carried out after the processing is started by turning on power (S 401 ). Then, whether or not any password is inputted by user's operating the key switches 61 , 62 is determined (S 402 ). If no password is inputted (S 402 : No), the copying machines 51 , 52 stand by with their initial setting condition (S 401 ). If any password is inputted (S 402 : Yes), whether or not the inputted password is a registered password is determined (S 403 ). If it is not a registered password (S 403 : No), the usage of that user is not permitted (S 404 ). Then, the copying machines 51 , 52 stand by with their initial setting (S 401 ).
  • the copying machines 51 , 52 transmit a polling command in order to receive an identification code of the portable instrument 42 located in a range at a short distance (S 406 ). With the transmitted polling command, whether or not an identification code of the portable instrument 42 is received is determined (S 407 ). If the identification code of the portable instrument 42 is received (S 407 : Yes), that received identification code is transmitted to the server 53 (S 408 ).
  • the server 53 After receiving password information of user or the identification code of the portable instrument 42 , the server 53 determines whether or not usage of the copying machines 51 , 52 is permitted according to a flow chart shown in FIG. 14, which will be described later. According to a result of that determination, the server 53 transmits an enable/disable signal to the copying machines 51 , 52 (S 503 , S 505 , S 506 in FIG. 14). Then, the respective copying machines 51 , 52 receive the enable/disable signal from the server 53 (S 409 ). If a signal received at this time is a disable signal (S 410 : No), the copying machines 51 , 52 are set up to be disabled and stand by with the initial setting condition (S 401 ).
  • a disable signal S 410 : No
  • the copying machine is set up to be enabled, so that it stands by until a print key is inputted (S 411 ). If the print key is turned on (S 411 : Yes), print processing is executed (S 412 ). The print processing is continued (S 412 ) until the print processing is ended (S 413 : No). If the processing is ended (S 413 : Yes), a finish signal is transmitted to the server 53 (S 414 ). With this transmitted finish signal, the server 53 determines that the copying machines 51 , 52 are not being used. The end of this print processing may be executed by user's inputting a key.
  • the processing is ended if no key is inputted to the copying machines 51 , 52 in a period over a predetermined time. If the finish signal is transmitted (S 414 ), the copying machines 51 , 52 stand by in their initial setting condition until a password is inputted again (S 401 ).
  • the server 53 executes other processing until password information is transmitted from the copying machines 51 , 52 . Then, the server 53 receives the password information transmitted by the copying machines 51 , 52 in S 405 of FIG. 13 (S 501 ). The server 53 determines whether or not there is any machine currently being employed after its verification based on the same password, of other machines connected to LAN than the machine which transmits the password information in S 501 (S 502 ). If there is no other machine being employed with the same password (S 502 : No), the server 53 transmits an enable signal to that machine (S 503 ) and comes to stand by.
  • the server permits usage of that machine (S 506 ), it is necessary to check whether or not user of other machine used with the same password is a proper user. Then, whether or not there is any other machine currently being used under single verification is determined (S 507 ). If there is no machine used under single verification (S 507 : No), any user is recognized to be a proper user and therefore, the server 53 comes to stand by. Alternatively, if there is any machine currently used under the single verification (S 507 : Yes), there is a fear that that machine may be used improperly. Thus, a disable signal is transmitted to a machine being used under the single verification.
  • the portable instrument 42 executes various kinds of initial settings if the power is turned on and its usage is started (S 601 ). Then, whether or not a polling command is received is determined (S 602 ). If the polling command transmitted from the copying machines 51 , 52 in S 406 of FIG. 13 is received (S 602 : Yes), the portable instrument 42 sends back its inherent identification signal to the copying machines 51 , 52 (S 603 ) and comes to stand by. While it receives no polling command (S 602 : No), the portable instrument 42 executes processing of other function (S 604 ) and stands by.
  • the general information management server 53 permits a double verified user by the password and the portable instrument 2 to use it and prohibits a single verified user by only the password from using it. Further, if after usage of the copying machine 51 is ended, the verification is carried out with the same password on the copying machine 52 at a time interval which does not allow the user to move from the one to the other, usage of the copying machine 52 is not allowed to a single verified user. Further, the single verified user is not allowed to use every available function and he cannot access the important information management server 54 . Consequently, there is provided a verification system 41 , which permits usage of the respective copying machines 51 , 52 in an appropriate range depending on the security level of a verified system.
  • the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
  • the above-described embodiment adopts two verification methods possessed by the copying machines 51 , 52 , namely, by input of the password and identification code of the portable instrument 42
  • each of the respective verification methods is supplied with a level value which serves as an index of those security levels, so that a machine having a higher priority may be selected depending on its level value.
  • the copying machines 51 , 52 possess the verification means, it is permissible to construct that the copying machines 51 , 52 only fetch in verification information such as password while the verification processing is carried out by the general information management server 53 .
  • the copying machines 51 , 52 act as an operation restricting means, the operation restricting means may be achieved in the general information management server 53 so as to transmit an instruction signal to the respective copying machines 51 , 52 .
  • the identification code may be acquired by communication with a base station system such as the portable phone instead of or as well as the short-range radio communication. Further, a machine verified and used is not restricted to a copying machine.

Abstract

The verification system of this invention comprises an image forming apparatus 1 having verification function and a card reader 2 for reading a user ID from a card. The image forming apparatus 1 is capable of performing short-range radio communication with a portable instrument 3. The portable instrument 3 receives a polling command transmitted by the image forming apparatus 1 and sends back its own identification code if it is located near the image forming apparatus 1. The image forming apparatus 1 permits usage of all the functions thereof if it verifies that user is an officially permitted person according to user ID read by the card reader 2 and the identification code sent back from the portable instrument 3. Consequently, there is provided a verification system having a high security level and convenient for use or a verification system which permits usage of its apparatus and other related devices within an appropriate range depending on the security level of a verified method.

Description

  • This application is based on applications Nos. 2002-30476, 2002-91550 filed in Japan, the contents of which are hereby incorporated by reference. [0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • The present invention relates to a verification system for verifying whether or not use of an electronic instrument is permitted, a method, a server and electronic instrument and more particularly to a verification system whose security is intensified by employing plural verification methods, a method, a server and an electronic instrument. [0003]
  • 2. Description of Related Art [0004]
  • Conventionally, upon use of an image forming apparatus such as a copying machine, various kinds of verification methods have been used. The verification system verifies whether or not user is a person who is dully permitted to use it. As a verification method, each user carries such a medium as a magnetic card in which his ID is registered or an IC card and throws that medium into the system so as to verify himself. The system reads out his ID from the thrown medium and checks whether or not that ID is an ID registered as a person permitted to use it. Consequently, the system determines whether or not he is permitted to use the system. [0005]
  • According to another method, a password is inputted with an input key provided on the apparatus. Further, as a verification system having a higher security, there are verification systems employing personal feature information such as finger print, voice print, face image and the like. [0006]
  • However, the above-described conventional verification systems have following problems. That is, the verification system employing such a medium as the magnetic card or IC card has such a fear that the medium may be stolen or copied so that it may be used illegally by a different person and therefore, the security performance of this system is low. The verification method by password input also has the same problem, which may be generated if the password leaks out. On the other hand, although the method using personal feature information has a very high security performance, its verification system is very expensive. Further, in case of an apparatus used by many people, it takes labor and time for each person to register his personal feature information and it also takes time for verification. For the reason, the verification system using personal feature information is not so convenient for use. [0007]
  • Any verification system determines whether or not a person of verification object is a person permitted to use an object apparatus according to verification information such as inputted password and user ID. The verification information is different among these verification systems. Correspondingly, the security level, which is a result of verification, differs among them. [0008]
  • However, the conventional verification system allows a verified person to use its apparatus without any limitation regardless of the security level, which is a result of the verification once he is verified to use. For example, such an apparatus as copying machine allows the verified person to use a common resource such as consumption goods and memory region freely. However, in this case, there is such a problem that it is not favorable to permit a person verified by only a verification system having a low security level to use its system without any limitation. The reason is that low-security level verification based on password input may cause an illegal procedure. [0009]
  • SUMMARY OF THE INVENTION
  • The present invention has been made in view of the above circumstances and has an object to overcome the above problems and to provide a high-security and usability of verification system and a server, an electronic instrument, an image processing apparatus and an image forming apparatus incorporated in the system, a verification method or verification system or the like capable of appropriately controlling permission/inhibition of apparatuses in accordance with security level determined by a verified method. [0010]
  • To achieve the objects and in accordance with the purpose of the invention as embodied and broadly described herein, there is provided a verification system consisting of an identification information receiving apparatus for receiving user's identification information, a server for receiving user's positioning information transmitted from an external instrument in a form of radio wave, and an electronic instrument, the verification system comprising: a first verification section for verifying a user based on user's identification information that the identification information receiving apparatus has received; a second verification section for verifying a user based on user's positioning information that the server has received from an external instrument; and permission giving section for permitting a user to use the electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem. [0011]
  • That is, in the present invention, a user who wants to use an electronic instrument has the identification information receiving apparatus identify the user's identification information by inputting codes through a keyboard, inserting a recoding medium, and the like. For using the electronic instrument, the user brings an external instrument. Thereby, the external instrument supplies user's positioning information to a server. In case both a verification result that the first verification section has made based on the user's identification information and a verification result that the second verification section has made based on the user's positioning information are no problem, the user is permitted to use the electronic instrument. Accordingly, there is a lower possibility that a fake is permitted to use compared with case of a verification based on only user's identification information. Therefore, the inventive verification system promises significantly high security. On the other hand, the inventive system does not require an expensive verification system based on personal feature information, which takes time to register and verify information. Accordingly, it is usable. [0012]
  • The inventive image processing apparatus is equipped with at lest two of the following typical examples of electronic instruments: a scanner that scans a document to obtain image data thereon, a printer that forms an image based on image data; and an image transmitting apparatus that transmits image data to other apparatus. [0013]
  • According to other aspect of the present invention, there is provided a server for receiving user's identification information and receiving user's positioning information transmitted from an external instrument in a form of radio wave, and determining to permit/not to permit the user to use an electronic instrument, the server comprising: a first verification section for verifying a user based on obtained user's identification information; a second verification section for verifying a user based on user's positioning information received from an external instrument; and permission giving section for permitting a user to use an electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem. [0014]
  • According to other aspect of the present invention, there is provided an electronic instrument for receiving user's identification information and receiving user's positioning information transmitted from an external instrument in a form of radio wave, the electronic instrument comprising: a first verification section for verifying a user based on obtained user's identification information; a second verification section for verifying a user based on user's positioning information received from an external instrument; and permission giving section for permitting a user to use the electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem. [0015]
  • According to other aspect of the present invention, there is provided a verification method for a verification system consisting of an identification information receiving apparatus for receiving user's identification information, a server for receiving user's positioning information transmitted from an external instrument in a form of radio wave, and an electronic instrument, the verification method comprising: a step to execute a first verification based on user's identification information that the identification information receiving apparatus has received; a step to execute a second verification based on user's positioning information that the server has received from an external instrument; and a step to permit a user to use the electronic instrument in case both a verification result of the first verification and that of the second verification are no problem. [0016]
  • According to other aspect of the present invention, there is provided a verification method for an image processing apparatus having least two of following items, a scanner that scans a document to obtain image data thereon, a printer that forms an image based on image data, and an image transmitting apparatus that transmits image data to other apparatus, the verification method comprising: a step to obtain user's identification information and execute a first verification based on the user's identification information; a step to obtain user's positioning information from an external instrument transmitting radio wave and execute a second verification based on the user's positioning information; and a step to permit a user to use the image processing apparatus in case both a verification result of the first verification and that of the second verification are no problem. [0017]
  • According to other aspect of the present invention, there is provided a verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods, the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method, wherein, under situation such that operation for the first electronic instrument has been permitted based on a single verification in accordance with either the first verification method or the second verification method, in case a double verification for the second electronic instrument is executed in accordance with both the first verification method and the second verification method including a verification content of which is same as the single verification by a first electronic instrument, the permission restricting section inhibits operation for the first electronic instrument. [0018]
  • According to other aspect of the present invention, there is provided a verification system incorporating a first electronic instrument and second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification methods, the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method, wherein, under situation such that operation for the first electronic instrument has been permitted based on a double verification in accordance with both the first verification method and the second verification method, in case a single verification for the second electronic instrument is executed in accordance with either the first verification method or the second verification method including a verification content of which is common to the verification for a first electronic instrument, the permission restricting section inhibits operation for the second electronic instrument. [0019]
  • According to other aspect of the present invention, there is provided a verification system incorporating a first electronic instrument and second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification methods, the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method, wherein, after an operation with a double verification in accordance with both the first verification method and the second verification method for the first electronic instrument finished, in case a single verification for the second electronic instrument in accordance with either the first verification method or the second verification method is made including a verification content common to verification for the first electronic apparatus, the permission restricting section determines to permit/not to permit the second apparatus to operate based on positioning information of the first and second electronic instruments and verification time information relating to the second electronic instrument. [0020]
  • According to other aspect of the present invention, there is provided a verification method for verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods, wherein, under situation such that operation for the first electronic instrument has been permitted based on a single verification in accordance with either the first verification method or the second verification method, in case a double verification for the second electronic instrument is executed in accordance with both the first verification method and the second verification method including a verification content of which is same as the single verification by a first electronic instrument, operation for the first electronic instrument is inhibited. [0021]
  • According to other aspect of the present invention, there is provided a verification method for a verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods, wherein, under situation such that operation for the first electronic instrument has been permitted based on a double verification in accordance with both the first verification method and the second verification method, in case a single verification for the second electronic instrument is executed in accordance with either the first verification method or the second verification method including a verification content of which is common to the verification for a first electronic instrument, operation for the second electronic instrument is inhibited. [0022]
  • That is, in the inventive verification system, in case verifications made for two electronic instruments include same content, operation for an electronic instrument verified double in accordance with two verification system is preceded to other electronic instrument verified in accordance with one verification system. This is because credibility of verification differs between single verification and double verification. Furthermore, in case there is time difference between double verification and single verification, operation permission is determined based on positioning information between electronic instruments and verification time information. Accordingly, in case verifications of two instruments are made taking time interval that is not long enough for a user to move between the two instruments, use of the instrument verified later is not permitted. It should be noted that content of time information may be time interval between verification of a first instrument and verification of a second instrument, and time interval between completion of operation for a first instrument and verification of a second instrument. According to the present invention, permission/inhibition of instruments is controlled appropriately depending on security level verified in accordance with verification system. [0023]
  • The inventive verification apparatus or the image processing apparatus, or the image forming apparatus, or the verification apparatus, comprises: a first verification section for conducting verification in accordance with first verification method; a second verification section for conducting verification in accordance with second verification method; and an operation restricting section for restricting an operation based on verification results obtained by the first verification section and the second verification section, wherein in case a single verification by either the first verification section or the second verification section is made, the operation restricting section permits to operate with functions narrower than a case of an operation double verified by both the first verification section and the second verification section. [0024]
  • According to other aspect of the present invention, there is provided a verification method using a first verification method and a second verification method, wherein in case a single verification in accordance with either the first verification method or the second verification method is made, operation with functions narrower than a case of an operation double verified by both the first verification method and the second verification method is permitted. [0025]
  • That is, in the present invention, a user verified double in accordance with the first and second verification systems is permitted to widely use functions of an apparatus. This is because credibility of the verification is high. On the other hand, a user verified single in accordance with one of the first and second verification system is permitted use restricted functions of the apparatus because credibility of the verification is low.[0026]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a better understanding of the present invention, reference is made to the following detailed description of the invention, just in conjunction with the accompanying drawings in which: [0027]
  • FIG. 1 is a block structure diagram showing a verification system directed to a first embodiment; [0028]
  • FIG. 2 is a data structure diagram showing format of identification codes for a cellular phone; [0029]
  • FIG. 3 is a data structure diagram showing format of identification codes for a simple cellular phone; [0030]
  • FIG. 4 is a flowchart showing processing by an image forming apparatus in verification processing; [0031]
  • FIG. 5 is a flowchart showing processing by a card reader in verification processing; [0032]
  • FIG. 6 is a flowchart showing processing by a portable instrument in verification processing; [0033]
  • FIG. 7 is a block structure diagram showing a verification system directed to a second embodiment; [0034]
  • FIG. 8 is a block structure diagram showing a verification system directed to a third embodiment; [0035]
  • FIG. 9 is a diagram for illustrating an operation of a verification system; [0036]
  • FIG. 10 is a diagram for illustrating an operation of a verification system; [0037]
  • FIG. 11 is a diagram for illustrating an operation of a verification system; [0038]
  • FIG. 12 is a diagram for illustrating an operation of a verification system; [0039]
  • FIG. 13 is a flowchart showing an operation of each copying machine for a verification system; [0040]
  • FIG. 14 is a flowchart showing an operation of a server for a verification system; and [0041]
  • FIG. 15 is a flowchart showing an operation of a portable apparatus for a verification system.[0042]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • Hereinafter, the embodiments of the present invention will be described in detail with reference to the accompanying drawings. [0043]
  • [First Embodiment][0044]
  • In this embodiment, an apparatus, which is an object for permission or non-permission of use, is an image forming apparatus and the verification processing is carried out with the image forming apparatus. [0045]
  • The system of this embodiment is constructed as shown in FIG. 1. That is, this system comprises an [0046] image forming apparatus 1, which is an electronic instrument and a server, a card reader 2 capable of communicating with the image forming apparatus 1, a portable instrument 3, which is an external instrument and is capable of executing short-range radio communication with the image forming apparatus 1 and a base station system 4 capable of communicating with the portable instrument 3. The image forming apparatus 1 is an apparatus having image forming function, such as a copying machine and contains facsimile function and scan mail function. In FIG. 1, a portion corresponding to the image forming function is omitted from its representation. The card reader 2 is an ordinary card reader capable of reading a magnetic card or IC card (hereinafter referred to as just a card). Although the card reader 2 is separated from the image forming apparatus 1 here, it may be incorporated in the image forming apparatus 1. The portable instrument 3 is an ordinary communication unit which user carries with himself. The base station system 4 is constituted of plural radio communication bases capable of acquiring position information by communicating with the portable instrument 3.
  • As shown in FIG. 1, in the [0047] image forming apparatus 1, a ROM 12, a DRAM 13, a NV-RAM 14, an input/out 15, a card reader I/F 17 and a short-range radio communication I/F 18 are connected to a CPU 11 for executing the entire control. The ROM 12 is a memory storage unit for storing a program describing control procedure of the image forming apparatus 1 and data. The DRAM 13 is a volatile memory unit for temporarily storing such image forming condition as magnification, density and double-sided copy relating to image forming processing and used as a working region. The NV-RAM 14 is a non-volatile memory unit for storing various kinds of settings relating to image forming processing.
  • An [0048] operation panel 16 is connected to the input/out 15. The operation panel 16 contains various kinds of key switches and a liquid crystal displayer. The various kinds of the key switches include a copy button for specifying a start of image forming processing and ten keys for numerical data input. The liquid crystal displayer displays various kinds of messages for user as required and soft keys for inputting various kinds of settings such as paper size, print density, magnification change, paper discharge mode. The card reader I/F 17 is connected to an external card reader 2 and communicates with the card reader 2. The short-range radio communication I/F 18 is an apparatus for carrying out short-range radio communication by sending or receiving radio waves. The short-range radio communication I/F 18 is capable of communicating with a short-range radio communication I/F of other unit nearby.
  • The [0049] card reader 2 is a unit for acquiring identification information such as user ID by reading a card inserted by user. The card reader 2 contains switches which are turned ON physically when a card is inserted, these switches being disposed at its front and rear sides in order to detect a card insertion condition. Further, the card reader 2 contains a liquid crystal displayer for notifying user with a card reading error or the like.
  • In the [0050] portable instrument 3, a ROM 32, a DRAM 33, a NV-RAM 34, a short-range radio communication I/F 35 and a radio communication I/F 36 are connected to a CPU 31 for executing the entire control. The ROM 32, DRAM 33 and NV-RAM 34 are substantially the same units as the ROM 12, DRAM 13 and NV-RAM 14 in the image forming apparatus 1 and store not image forming data but communication data. If the portable instrument 3 exists near the image forming apparatus 1, the short-range radio communication I/F 35 is capable of communicating with the short-range radio communication I/F 18 of the image forming apparatus 1. Although a communication device such as a portable phone is used as the portable instrument 3 here, the radio communication I/F 36 for communication is provided separately from the short-range radio communication I/F 35. For the reason, its voice communication condition is not affected even if communication by the short-range radio communication I/F 35 is being carried out and even during communication, short-range radio communication by the short-range communication I/F 35 is possible. Further, the radio communication I/F 36 is capable of communicating with the base station system 4 for voice communication.
  • In case of the portable phone or a compact type portable phone, individual portable terminals are provided with inherent identification codes for identifying from other terminals and these codes are stored in the NV-[0051] RAM 34. This identification code format is unified according to a standard. FIG. 2 shows MSI (Mobile System Identifier) format, which is an identification code of the portable phone. FIG. 3 shows the format of individual cell channel (SCCH) in a control physical slot of logical control channel (LCCH) of the compact type portable phone. In case of Japan, as an identification code, a unique number is attached to each terminal by Corporation of National Land Radio/Shadan-houjin Zenkoku Rikujo Musen Kyokai. The portable instrument 3 is constructed to send this MSI or SCCH if it receives a polling command from outside through the short-range radio communication I/F 35.
  • Next, the verification operation of this system will be described. A different user ID is allocated to individual user who is permitted to use the [0052] image forming apparatus 1 and a card in which user ID is recorded is distributed to that user. The card mentioned here is a name card of an employee or a registration card registered in his facility or so on. This card corresponds to a medium and the user ID recorded in the card corresponds to identification information. Instead of distributing the card, it is permissible to store individual user ID and input it into the operation panel 16 as a password.
  • Further, an identification code of the [0053] portable instrument 3 which individual user possesses personally is investigated and registered in system corresponding to user ID. Thus, a use permission table is created by making the user ID of user permitted to use the image forming apparatus 1 correspond to the identification code of the portable instrument 3 of that user and memorized in the NV-RAM 14. Table 1 shows an example of the use permission table.
    TABLE 1
    USER ID ID Number of Portable Instrument
    000001 1111111
    000002 2222222
    000003 3333333
    . .
    . .
    . .
  • When using the [0054] image forming apparatus 1, user inserts his own card into the card reader 2. If the card is inserted into the card reader 2, it automatically reads user ID, which is its content, and transmits it to the image forming apparatus 1. The image forming apparatus 1, after receiving the user ID, transmits a polling command through the short-range radio communication I/F 18. After receiving the polling command, the portable instrument 3 automatically sends back an identification code. The image forming apparatus 1 receives the identification code sent back from the portable instrument 3 through the short-range radio communication I/F 18. Here, the identification code sent back from the portable instrument 3 recognizes that an owner of the portable instrument 3 exists nearby. This information corresponds to position information. In the meantime, the portable instrument 3 acquires its own current position information by communication with the base station system 4 or the GPS system through the radio communication I/F 36 as required. If the current position information according to this method is employed with the above-described position information, a higher verification is enabled.
  • Next, the [0055] image forming apparatus 1 checks whether or not a card user ID has been registered by referring to the use permission table of Table 1. As a result, it can be checked whether or not that card is a card of user permitted to use the image forming apparatus 1. If it is not a card of user permitted to use, usage of the image forming apparatus 1 is not permitted. The verification of this card corresponds to the first verification means.
  • If it is a card of user permitted to use the [0056] image forming apparatus 1, whether or not an identification code sent back from the portable instrument 3 is an identification code corresponding to that user ID is checked by referring to the use permission table of Table 1. Consequently, whether or not user who owns the portable instrument 3 corresponding to the card user ID exists in a short distance from the image forming apparatus 1 can be verified. Verification by making the identification code of the portable instrument 3 corresponds to the user ID corresponds to a second verification means.
  • If the card user ID and identification code of the [0057] portable instrument 3 are registered together in the use permission table, usage of the image forming apparatus 1 is permitted. If corresponding identification code cannot be received when a registered card is inserted, it indicates that the portable instrument 3 of that user does not exist nearby. For the reason, the system does not allow that user to use the image forming apparatus 1. Thus, recognizing that the card and the portable instrument 3 are possessed at the same time enables to prevent illegal use thereof because the card is stolen. This ensures a higher security system as compared to a case where the verification is done with only the card.
  • Next, verification processing control based on this system will be described with reference to flow charts of FIGS. [0058] 4-6. Each flow chart indicates processing with the image forming apparatus 1, the card reader 2, and the portable instrument 3. These processings are executed in parallel and continued by exchange of data among these.
  • First, the processing of the [0059] image forming apparatus 1 will be described with reference to a flow chart of FIG. 4. The processing of the image forming apparatus 1 is started when its power supply is turned on and first, initial setting such as DRAM 13 clearing, setting of standard mode is carried out (S101). After that, the CPU 11 of the image forming apparatus 1 stands by until the card reader I/F 17 receives a notification of the user ID from the card reader 2 (S103).
  • When the user ID is notified from the card reader [0060] 2 (S103: Yes), the CPU 11 refers to the usage permission ID table stored in the NV-RAM 14. Then, whether or not that user ID is registered is checked (S105). If the notified user ID is not registered in the usage permission ID table (S105: No), the CPU 11 displays a message saying “the image forming apparatus 1 cannot be used” on the liquid crystal displayer of the operation panel 16 (S121). After that, the system stands by until a card removal notification comes from the card reader 2 (S123). If the card removal notification comes (S123: Yes), the processing returns to S103. Then, the system stands by until the user ID is notified from the card reader 2 again (S103).
  • If the user ID notified from the [0061] card reader 2 is registered in the use permission table in S105 (S105: Yes), the CPU 11 transmits a polling command through the short-range radio communication I/F 18 (S107). Then, the system waits for a response from the portable instrument 3 (S109).
  • If no response comes from the [0062] portable instrument 3 or a received identification code is different from a number corresponding to the user ID (S109: No), the verification is disabled. The reason is that a person who inserts a card into the card reader 2 is considered not to be an owner of that card. In this case, the CPU 11 displays a message saying “the image forming apparatus 1 cannot be used” on the liquid crystal displayer of the operation panel 16 (S121). After that, the system stands by until the card removal notification comes from the card reader 2 (S123). If the card removal notification comes (S123: Yes), the processing returns to S103.
  • If the identification code sent back by the [0063] portable instrument 3 is a number corresponding to the user ID in S109 (S109: Yes), it means that the portable instrument 3 of an original owner of that card exists in a short distance. In this case, the CPU 11 sets up a permission for use of the image forming apparatus 1 (S111). The reason is that a person inserting the card into the card reader 2 is an original owner of that card. After that, the system stands by until the card is removed from the card reader 2 (S113: Yes) or a start button is pressed by the user (S115: Yes). If no card removal notification comes from the card reader 2 (S113: No) and the start button is pressed by the user (S115: Yes), image formation processing such as copy is carried out (S117). After the processing, the system stands by until the card removable notification comes from the card reader 2 (S113: Yes) or the start button is pressed by the user (S115: Yes).
  • If the card removable notification comes from the card reader [0064] 2 (S113: Yes), usage by this user is terminated and usage prohibition is set up (S119). Then, the system stands up unitl the user ID is notified from the card reader 2 (S103). The image forming apparatus 1 repeats the above-described processing until the power supply is turned off.
  • Next, the processing of the [0065] card reader 2 will be described with reference to a flow chart of FIG. 5. When the power supply is turned on, the card reader 2 starts the processing so as to execute initial setting (S201). Then, the system stands by until the user inserts his card (S203).
  • If the user inserts the card (S[0066] 203: Yes), the card reader 2 reads out his user ID from that card (S205). Then, whether or not reading of the user ID succeeds is determined (S207). If reading of the card fails because a different card is inserted or card information is damaged (S207: No), an error message is displayed on the liquid crystal displayer of the card reader 2 (S221). In this case, the system stands by until the card is removed (S223). If the card is removed (S223: Yes), the system stands by until the card is inserted (S203).
  • If reading of the user ID from the card succeeds (S[0067] 207: Yes) in S207, the read user ID is transmitted to the image forming apparatus 1 (S209). This transmission is the user ID notification shown in S103 of FIG. 4. After that, the card reader 2 stands by until the card is removed (S211). If the card is removed (S211: Yes), the card removal notification is transmitted to the image forming apparatus 1 (S213). This transmission is the card removal notification shown in S113 or S123 of FIG. 4. After the card removal notification is transmitted, the card reader 2 stands by until a next card is inserted (S203). The card reader 2 repeats the above-described processing until the power supply is turned off.
  • Next, the processing on the [0068] portable instrument 3 will be described with reference to the flow chart of FIG. 6. When the power supply is turned on, the portable instrument 3 starts its processing so as to execute initial setting (S301). Then, whether or not a polling command has been received is determined (S303). Unless the polling command is received (S303: No), other processing of the portable communication unit such as communication processing is carried out (S311). If the polling command is received (S303: Yes), an identification code is sent back as a response (S305). The portable instrument 3 repeats the above described processing until the power supply is turned off.
  • [Second Embodiment][0069]
  • The system of this embodiment is constructed as shown in FIG. 7. That is, this system comprises the [0070] image forming apparatus 1, which is an electronic instrument, the card reader 2 capable of communicating with the image forming apparatus 1, the portable instrument 3, which is an external instrument, the base station system 4 capable of communicating with the portable instrument 3 by radio and the server 5 capable of communicating with the image forming apparatus 1. The image forming apparatus 1, the card reader 2, the portable instrument 3 and the base station system 4 are the same devices as those of the first embodiment. The server unit 5 is an ordinary unit having CPU, memory unit and the like. The image forming apparatus 1 is capable of communicating with the server 5 through communication I/F 19.
  • According to this embodiment, a unit which is an object for permission or non-permission of its usage is the [0071] image forming apparatus 1 and the verification processing is carried out in the server 5. The use permission table is disposed in a memory unit of the server 5, while counterpart of it is provided on the NV-RAM 14 of the image forming apparatus 1 in case of the first embodiment.
  • According to this embodiment, the [0072] image forming apparatus 1 sends a user ID acquired from the card reader 2 to the server 5. The server 5, after receiving the user ID from the image forming apparatus 1, checks whether or not that user ID is registered in the use permission table. This procedure corresponds to the first verification means. Further, the server 5 communicates with the base station system 4 so as to acquire the position of the portable instrument 3 having an identification code corresponding to that user ID. Consequently, whether or not the portable instrument 3 exists near the image forming apparatus 1 is checked. This procedure corresponds to the second verification means. Then, if the verification results of the first and second verification means are acceptable, the server 5 permits this user to use the image forming apparatus 1.
  • As described above, according to the first and second embodiments, the [0073] image forming apparatus 1 or the server 5 acquires the user ID read from the card by the card reader 2 and further an identification code of the portable instrument 3 through communication with the portable instrument 3. Then, only if the user ID of the card and the identification code of the portable instrument 3 correspond to each other and are registered in the use permission table, usage of the image forming apparatus 1 is permitted. Therefore, a much higher security performance is ensured as compared to a case where the verification is carried out with only the card. Further, because this does not require an expensive system which takes time for registration and verification like personal feature information, a well convenient system is achieved.
  • According to the first and second embodiments, an electronic instrument whose usage is permitted or not permitted is not restricted to an image forming device. According to the second embodiment, the [0074] server 5 may only carry out verification while determination of permission or non-permission may be carried out by the image forming apparatus 1. Further, although according to the second embodiment, a short-range radio communication portion for sending a polling command is omitted from its representation, it may be transmitted from the image forming apparatus 1 or may be transmitted from the base station system 4 through the server 5.
  • [Third Embodiment][0075]
  • According to this embodiment, the present invention has been applied to a system in which plural copying machines are connected to a network such as LAN while each copying machine contains verification means based on two kinds of verification systems. [0076]
  • First, a [0077] verification system 41 of this embodiment is constructed as shown in FIG. 8. That is, a copying machine 51, a copying machine 52, a general information management server 53 and an important information management server 54 are connected to the LAN 55. The copying machine 51 and the copying machine 52 have facsimile function and scan mail function like the image forming apparatus 1 of the first and second embodiments and cannot be used until its usage is permitted. Although the two copying machines (copying machine 51 and copying machine 52) are indicated in the same Figure, it is permissible to use a system 41 in which more copying machines or other devices are connected. Further, other servers than the general information management server 53 and the important information management server 54 may be connected thereto.
  • The copying [0078] machines 51, 52 of this system 41 have verification means based on two verification systems, namely, verification by password input and verification with the portable communication unit. The verification by password input is carried out by user's inputting his password. Thus, the respective copying machines 51, 52 contain a liquid crystal displayer for displaying various kinds of messages and key switches 61, 62 (see FIG. 9) which allow a password to be inputted. Instead of inputting the password, it is permissible to distribute a card in which each person's user ID is recorded and read it with the card reader.
  • Verification with the portable instrument is carried out by communication with such a portable instrument as a portable phone owned by user personally. Thus, the [0079] respective copying machines 51, 52 have the same short-distance communication function as the first and second embodiments. The respective copying machines 51, 52 execute verification processing according to the identification code received through this short-distance communication function. This verification method is validated only if user carries his own portable instrument 42 with its power ON and requires no special operation or input processing.
  • The [0080] respective copying machines 51, 52 contain each memory device. The respective memory devices store a password allocated to each user for use in the verification and an identification code of the portable instrument 42 possessed by user personally, wherein each password and each identification code are linked together. That is, this contains a table in which the “user ID” column in table 1 described in the first embodiment is replaced with the column of password. The table of each memory may be different between the copying machine 51 and the copying machine 52. For example, there can be a common user who is allowed to use both the copying machines or a user allowed to use only any one.
  • The general [0081] information management server 53 and the important information management server 54 are ordinary servers for storing various kinds of data and controlling the entire system 41. Data stored in the general information management server 53 is only information having a relatively low security degree. Contrary to this, data stored in the important information management server 54 contains information having a high security degree. Further, the general information management server 53 stores various kinds of information relating to verification processing. Then, they control the verification condition by communication with the respective copying machines 51, 52 connected to the LAN 55. A permission restricting means is achieved in the general information management server 53.
  • Next, a basic verification processing action in the [0082] verification system 41 of this embodiment will be described. User of the respective copying machines 51, 52 inputs his own password using key switches 61, 62 attached to each copying machine. Here, the password is an indispensable condition and the copying machines 51, 52 cannot be used until the password is inputted. The respective copying machines 51, 52 compare the inputted password with the content of table and if that password is not a registered password which permits the verification, it is indicated on a liquid crystal displayer.
  • If the inputted password is a registered password, the [0083] respective copying machines 51, 52 transmit a polling command. Its purpose is to receive an identification code of the portable instrument 42 located within an area at a short distance. Then, whether or not an identification code corresponding to the inputted password on the same table is received is determined. If the respective copying machines 51, 52 succeed to receive the identification code corresponding to the password, they verify that person as a double verified user having a high verification reliability. If they cannot receive the identification code, they verify the person as a single verified user having a low verification reliability.
  • When the user is verified, the [0084] respective copying machines 51, 52 transmit its verification information to the general information management server 53 through the LAN 55. If the verified person is the double verified user, the transmitted verification information is inputted password and an identification code acquired from the portable instrument 42 of the user. If the verified person is the single verified user, the transmitted verification information is only the inputted password. The general information management server 53 determines whether or not usage of the copying machines 51, 52 is permitted based on the verification information received from the respective copying machines 51, 52. Then, it transmits an enable signal or a disable signal to the respective copying machines 51, 52. If the enable signal is received, the respective copying machines 51, 52 are set up for permission of usage, so that usage thereof is permitted. If the disable signal is received, it is indicated on a liquid crystal displayer so that the copying machine is set up for prohibition of the usage.
  • The general [0085] information management server 53 determines whether or not usage of the copying machines 51, 52 is permitted, as follows. The general information management server 53 searches the verification information of user currently using other copying machine if it receives the verification information of a newly verified user. Then, it checks whether or not there is any user verified based on the same password as a password contained in the verification information of the newly verified user. Because the same person cannot use plural copying machines at the same time, if there is a user verified based on the same password, there is a possibility that any one uses that password illegally.
  • In this case, if any user is the double verified user while the other user is the single verified user, usage by the double verified user is permitted and usage by the single verified user is prohibited. If every user is the single verified user, a first verified user is permitted to use while the latter verified person is prohibited from using. If every user is the double verified user and uses a different identification code, usage of both the users is permitted. The reason is that any user is considered to be a proper user. [0086]
  • FIG. 9 shows that user verified by the copying [0087] machine 51 is the double verified user and the user verified by the copying machine 52 is the single verified user. Here, it is assumed that the passwords of both the users are the same. In this case, the user of the copying machine 51 is permitted to use while the user of the copying machine 52 is prohibited from using. The same thing can be said if the user of the copying machine 52 is verified first and starts its usage. In this case, if the user of the copying machine 51 is verified, after that, usage of the user of the copying machine 52 is disabled.
  • The above-described prohibition of use by the single verified user is adapted for a while after use of the other user is ended. For that purpose, the [0088] respective copying machines 51, 52, after use of the user is ended, transmit a finish signal to the general information management server 53 and waits for the next verification. The general information management server 53 holds the verification information for a while after the finish signal is received. Then, a password inputted by user newly verified by the other copying machine after use of one copying machine is ended is compared with a password inputted by the user whose usage is ended at the time of start of his usage. If both the passwords are equal, whether or not usage of the latter user is permitted is determined according to an elapsed time T until a password is inputted by the latter user since the usage by a preceding user is ended and a distance D between both copying machines.
  • That is, the permission of usage is determined depending on whether or not the user can move from the position of one copying machine to the position of the other copying machine within the elapsed time T. For that purpose, a reference moving time between the respective machines is set up preliminarily and stored in the memory unit. If the elapsed time T is longer than the stored reference moving time and it is determined that he can move, the usage of the latter user is permitted. However, if the elapsed time T is too short and it is determined that he cannot move, the usage of the latter user is prohibited. [0089]
  • FIG. 10 shows such a case. FIG. 10 indicates a case where after the time T is elapsed after the usage of the copying [0090] machine 51 by the double verified user is ended, the same password is inputted to the copying machine 52 located a distance D apart from the copying machine 51. Here, assume that the user of the copying machine 52 does not carry the portable instrument 42 and is verified as a single verified user. If it is determined that the user cannot move like a case where D=15 meter and T=1 second, usage of the copying machine 52 by the user is prohibited. The same thing can be said if the user of the copying machine 51 is a single verified user. If a verified user of the copying machine 52 is a double verified user and his identification code is different, the usage of the copying machine 52 is permitted.
  • In the description up to here, it has been stated that even the single verified user can use the [0091] respective copying machines 51, 52 without any restriction if his usage is permitted. However, the usage by the single verified user is limited to some extent. Hereinafter, this limitation will be described. If the respective copying machines 51, 52 receive an enable signal from the general information management server 53, usable function range is determined depending on which the user is a single verified user or a double verified user. If the user of the copying machine 51 is the double verified user in FIG. 11, all the functions of the copying machine 51 can be used. On the other hand, because the user of the copying machine 52 is the single verified user, verification level is low and usable function is limited. That is, the respective copying machines 51, 52 carry out an operation similar to an operation restricting means.
  • The functions of the [0092] respective copying machines 51, 52 include, for example, quantity of copies, output type, paper attribute, output resolution, number of output colors and the like. The output type refers to classification about single sided print or double sided print or classification about 1 in 1 print, 2 in 1 print and 4 in 1 print. The paper attribute refers to the type of print paper for use. The output resolution refers to classification of low, standard and high. The number of output colors refers to one color, four colors, full-color and the like. Of these functions, the functions which the single verified user can use are restricted to, for example, number of copies=only 1, output type=single sided print prohibition and 1 in 1 print prohibition, paper attribute=only reproduced paper, output resolution=only low resolution, and number of output colors=full-color prohibition. Of course, such a limitation is not applied to the double verified user and he can use every function. In the meantime, if the respective copying machines 51, 52 are provided with a finisher (paper folding, staple drive and the like), it is permissible to prohibit the single verified user from using that function.
  • FIG. 12 shows a case where the copying [0093] machines 51, 52 can read out information stored in the general information management server 53 or the important information management server 54 and print it. In this case, it is so limited that although the double verified user can access any one of the general information management server 53 and the important information management server 54, the single verified user cannot access but the general information management server 53. In case of FIG. 12, because the user of the copying machine 51 is the double verified user, he can access any one of the general information management server 53 and the important information management server 54. However, because the user of the copying machine 52 is the single verified user, access to the important information management server 54 by him is prohibited. These limitations may be carried out to the copying machines 51, 52 in the same ways or may be in different ways.
  • Next, the operation of the verification system of this embodiment will be described with reference to the flow charts of FIGS. [0094] 13-15. FIG. 13 shows processing which are carried out in the copying machines 51, 52. FIG. 14 shows processing which is carried out in the server 53. FIG. 15 shows processing which is carried out in the portable instrument 42.
  • In the copying [0095] machines 51, 52, initial setting including copy mode and the like is carried out after the processing is started by turning on power (S401). Then, whether or not any password is inputted by user's operating the key switches 61, 62 is determined (S402). If no password is inputted (S402: No), the copying machines 51, 52 stand by with their initial setting condition (S401). If any password is inputted (S402: Yes), whether or not the inputted password is a registered password is determined (S403). If it is not a registered password (S403: No), the usage of that user is not permitted (S404). Then, the copying machines 51, 52 stand by with their initial setting (S401).
  • If the inputted password is a registered password (S[0096] 403: Yes), that password information is transmitted to the server 53 (S405). The information transmitted here may be verification information relating to the password. Subsequently, the copying machines 51, 52 transmit a polling command in order to receive an identification code of the portable instrument 42 located in a range at a short distance (S406). With the transmitted polling command, whether or not an identification code of the portable instrument 42 is received is determined (S407). If the identification code of the portable instrument 42 is received (S407: Yes), that received identification code is transmitted to the server 53 (S408).
  • After receiving password information of user or the identification code of the [0097] portable instrument 42, the server 53 determines whether or not usage of the copying machines 51, 52 is permitted according to a flow chart shown in FIG. 14, which will be described later. According to a result of that determination, the server 53 transmits an enable/disable signal to the copying machines 51, 52 (S503, S505, S506 in FIG. 14). Then, the respective copying machines 51, 52 receive the enable/disable signal from the server 53 (S409). If a signal received at this time is a disable signal (S410: No), the copying machines 51, 52 are set up to be disabled and stand by with the initial setting condition (S401).
  • If the received signal is an enable signal (S[0098] 410: Yes) in S410, the copying machine is set up to be enabled, so that it stands by until a print key is inputted (S411). If the print key is turned on (S411: Yes), print processing is executed (S412). The print processing is continued (S412) until the print processing is ended (S413: No). If the processing is ended (S413: Yes), a finish signal is transmitted to the server 53 (S414). With this transmitted finish signal, the server 53 determines that the copying machines 51, 52 are not being used. The end of this print processing may be executed by user's inputting a key. Alternatively, it is permissible to construct that the processing is ended if no key is inputted to the copying machines 51, 52 in a period over a predetermined time. If the finish signal is transmitted (S414), the copying machines 51, 52 stand by in their initial setting condition until a password is inputted again (S401).
  • Next, the operation of the [0099] server 53 will be described with reference to FIG. 14. The server 53 executes other processing until password information is transmitted from the copying machines 51, 52. Then, the server 53 receives the password information transmitted by the copying machines 51, 52 in S405 of FIG. 13 (S501). The server 53 determines whether or not there is any machine currently being employed after its verification based on the same password, of other machines connected to LAN than the machine which transmits the password information in S501 (S502). If there is no other machine being employed with the same password (S502: No), the server 53 transmits an enable signal to that machine (S503) and comes to stand by.
  • If there is any machine being employed with the same password (S[0100] 502: Yes), whether or not an identification code of the portable instrument 42 is received from that machine is determined (S504). The identification code of this portable instrument 42 is transmitted in S408 of FIG. 13. If the identification code of the portable instrument 42 cannot be received here (S504: No), the user is a single verified user and the same password has been already used by other machine. Thus, the server 53 transmits a disable signal to that given machine (S505) and comes to stand by. If the identification code of the portable instrument 42 can be received (S504: Yes), the user is a double verified user and therefore, the server transmits an enable signal to that machine(S506). The disable signal or enable signal transmitted in S503, S505, S506 is received by that machine in S409 of FIG. 13.
  • If the server permits usage of that machine (S[0101] 506), it is necessary to check whether or not user of other machine used with the same password is a proper user. Then, whether or not there is any other machine currently being used under single verification is determined (S507). If there is no machine used under single verification (S507: No), any user is recognized to be a proper user and therefore, the server 53 comes to stand by. Alternatively, if there is any machine currently used under the single verification (S507: Yes), there is a fear that that machine may be used improperly. Thus, a disable signal is transmitted to a machine being used under the single verification.
  • Next, the operation of the [0102] portable instrument 42 will be described with reference to FIG. 15. The portable instrument 42 executes various kinds of initial settings if the power is turned on and its usage is started (S601). Then, whether or not a polling command is received is determined (S602). If the polling command transmitted from the copying machines 51, 52 in S406 of FIG. 13 is received (S602: Yes), the portable instrument 42 sends back its inherent identification signal to the copying machines 51, 52 (S603) and comes to stand by. While it receives no polling command (S602: No), the portable instrument 42 executes processing of other function (S604) and stands by.
  • As described above, according to this embodiment if the passwords inputted by users verified by the copying [0103] machines 51, 52 are the same, any one of them can be improper verification. Thus, the general information management server 53 permits a double verified user by the password and the portable instrument 2 to use it and prohibits a single verified user by only the password from using it. Further, if after usage of the copying machine 51 is ended, the verification is carried out with the same password on the copying machine 52 at a time interval which does not allow the user to move from the one to the other, usage of the copying machine 52 is not allowed to a single verified user. Further, the single verified user is not allowed to use every available function and he cannot access the important information management server 54. Consequently, there is provided a verification system 41, which permits usage of the respective copying machines 51, 52 in an appropriate range depending on the security level of a verified system.
  • The present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. For instance, although the above-described embodiment adopts two verification methods possessed by the copying [0104] machines 51, 52, namely, by input of the password and identification code of the portable instrument 42, there may be a machine having only one verification method or a machine adopting three or more verification methods. Further there may be a machine having other verification methods such as by input of the card. In such a case, each of the respective verification methods is supplied with a level value which serves as an index of those security levels, so that a machine having a higher priority may be selected depending on its level value. Further, although according to the above-described embodiment, it is assumed that the copying machines 51, 52 possess the verification means, it is permissible to construct that the copying machines 51, 52 only fetch in verification information such as password while the verification processing is carried out by the general information management server 53. Further, although according to the above-described embodiment, it is assumed that the copying machines 51, 52 act as an operation restricting means, the operation restricting means may be achieved in the general information management server 53 so as to transmit an instruction signal to the respective copying machines 51, 52. Further, the identification code may be acquired by communication with a base station system such as the portable phone instead of or as well as the short-range radio communication. Further, a machine verified and used is not restricted to a copying machine.
  • The foregoing description of the preferred embodiment of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiment chosen and described in order to explain the principles of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. [0105]
  • It is intended that the scope of the invention be defined by the claims appended hereto, and their equivalents. [0106]

Claims (35)

What is claimed is:
1. A verification system consisting of an identification information receiving apparatus for receiving user's identification information, a server for receiving user's positioning information transmitted from an external instrument in a form of radio wave, and an electronic instrument, the verification system comprising:
a first verification section for verifying a user based on user's identification information that the identification information receiving apparatus has received;
a second verification section for verifying a user based on user's positioning information that the server has received from an external instrument; and
permission giving section for permitting a user to use the electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem.
2. A verification system according to claim 1, wherein the electronic instrument is an image processing apparatus which has at least two of following items: a scanner that scans a document to obtain image data thereon; a printer that forms an image based on image data; and an image transmitting apparatus that transmits image data to other apparatus.
3. A verification system according to claim 1, wherein the identification information receiving apparatus reads out user's identification information from a recording medium on which user's identification information are recorded in advance.
4. A verification system according to claim 1, wherein the server is capable of receiving information from an external instrument in case the external instrument exists within a predetermined short range, and treats presence/absence of a response from the external instrument as positioning information that indicates presence/absence of the external instrument within the predetermined short range.
5. A verification system according to claim 1, wherein the server makes use of a portable terminal carried by a user and receiving its positioning information through communication with outside as an external instrument, and receives positioning information that the portable terminal has received through communication with outside.
6. A verification system according to claim 4, wherein the server makes use of a portable terminal carried by a user and receiving its positioning information through communication with outside as an external instrument, receives positioning information that the portable terminal has received through communication with outside, and treats presence/absence of a response from the portable terminal as positioning information that indicates presence/absence of the user within the predetermined short range.
7. A verification system according to claim 6, wherein a response from a portable terminal used by the server is in a form of trigger automatically generated by the portable terminal while power is on.
8. A server for receiving user's identification information and receiving user's positioning information transmitted from an external instrument in a form of radio wave, and determining to permit/not to permit the user to use an electronic instrument, the server comprising:
a first verification section for verifying a user based on obtained user's identification information;
a second verification section for verifying a user based on user's positioning information received from an external instrument; and
permission giving section for permitting a user to use an electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem.
9. A server according to claim 8, wherein the server is capable of receiving information from an external instrument in case the external instrument exists within a predetermined short range, and treats presence/absence of a response from the external instrument as positioning information that indicates presence/absence of the external instrument within the predetermined short range.
10. A server according to claim 8, wherein the server makes use of a portable terminal receiving its positioning information through communication with outside as an external instrument, and, receives positioning information that the portable terminal has received through communication with outside.
11. An electronic instrument for receiving user's identification information and receiving user's positioning information transmitted from an external instrument in a form of radio wave, the electronic instrument comprising:
a first verification section for verifying a user based on obtained user's identification information;
a second verification section for verifying a user based on user's positioning information received from an external instrument; and
permission giving section for permitting a user to use the electronic instrument in case both a verification result of the first verification section and that of the second verification section are no problem.
12. An electronic instrument according to claim 11, wherein the electronic instrument is an image processing apparatus which has at least two of following items: a scanner that scans a document to obtain image data thereon; a printer that forms an image based on image data; and an image transmitting apparatus that transmits image data to other apparatus.
13. An electronic instrument according to claim 11, wherein the electronic instrument is capable of receiving information from an external instrument in case the external instrument exists within a predetermined short range, and treats presence/absence of a response from the external instrument as positioning information that indicates presence/absence of the external instrument within the predetermined short range.
14. An electronic instrument according to claim 11, wherein the electronic instrument makes use of a portable terminal receiving its positioning information through communication with outside as an external instrument, and receives positioning information that the portable terminal has received through communication with outside.
15. A verification method for a verification system consisting of an identification information receiving apparatus for receiving user's identification information, a server for receiving user's positioning information transmitted from an external instrument in a form of radio wave, and an electronic instrument, the verification method comprising:
a step to execute a first verification based on user's identification information that the identification information receiving apparatus has received;
a step to execute a second verification based on user's positioning information that the server has received from an external instrument; and
a step to permit a user to use the electronic instrument in case both a verification result of the first verification and that of the second verification are no problem.
16. A verification method for an image processing apparatus having at least two of following items, a scanner that scans a document to obtain image data thereon, a printer that forms an image based on image data, and an image transmitting apparatus that transmits image data to other apparatus, the verification method comprising:
a step to obtain user's identification information and execute a first verification based on the user's identification information;
a step to obtain user's positioning information from an external instrument transmitting radio wave and execute a second verification based on the user's positioning information; and
a step to permit a user to use the image processing apparatus in case both a verification result of the first verification and that of the second verification are no problem.
17. A verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods,
the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method,
wherein, under situation such that operation for the first electronic instrument has been permitted based on a single verification in accordance with either the first verification method or the second verification method, in case a double verification for the second electronic instrument is executed in accordance with both the first verification method and the second verification method including a verification content of which is same as the single verification by a first electronic instrument, the permission restricting section inhibits operation for the first electronic instrument.
18. A verification system according to claim 17, wherein both the first electronic instrument and the second electronic instrument are image processing apparatuses each of which includes at least two of following items: a scanner that scans a document to obtain image data thereon; a printer that forms an image based on image data; and an image transmitting apparatus that transmits image data to other apparatus.
19. A verification system according to claim 17, wherein a verification in accordance with a first verification method is executed by obtaining user's identification information.
20. A verification system according to claim 17, wherein a verification in accordance with a second verification method is executed by obtaining a user's positioning information from a portable terminal carried by a user.
21. A verification system according to claim 20, wherein user's positioning information from a portable terminal is obtained based on trigger automatically generated by the portable terminal while power is on.
22. A verification system incorporating a first electronic instrument and second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification methods,
the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method,
wherein, under situation such that operation for the first electronic instrument has been permitted based on a double verification in accordance with both the first verification method and the second verification method, in case a single verification for the second electronic instrument is executed in accordance with either the first verification method or the second verification method including a verification content of which is common to the verification for a first electronic instrument, the permission restricting section inhibits operation for the second electronic instrument.
23. A verification system according to claim 22, wherein a verification in accordance with a first verification method is executed by obtaining user's identification information.
24. A verification system according to claim 22, wherein a verification in accordance with a second verification method is executed by obtaining a user's positioning information from a portable terminal carried by a user.
25. A verification system incorporating a first electronic instrument and second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification methods,
the verification system comprising a permission restricting section that restricts an operation permission for one of the first and second electronic instruments based on a single verification in accordance with either a first verification method or a second verification method in case an operation permission for other one of the first and second instruments has been made based on a double verification in accordance with both the first verification method and the second verification method,
wherein, after an operation with a double verification in accordance with both the first verification method and the second verification method for the first electronic instrument finished, in case a single verification for the second electronic instrument in accordance with either the first verification method or the second verification method is made including a verification content common to verification for the first electronic apparatus, the permission restricting section determines to permit/not to permit the second apparatus to operate based on positioning information of the first and second electronic instruments and verification time information relating to the second electronic instrument.
26. A verification apparatus comprising:
a first verification section for conducting verification in accordance with first verification method;
a second verification section for conducting verification in accordance with second verification method; and
an operation restricting section for restricting an operation based on verification results obtained by the first verification section and the second verification section,
wherein in case a single verification by either the first verification section or the second verification section is verified, the operation restricting section permits to operate with functions narrower than a case of an operation double verified by both the first verification section and the second verification section.
27. An image processing apparatus having at least two of following items: a scanner that scans a document to obtain image data thereon; a printer that forms an image based on image data; and an image transmitting apparatus that transmits image data to other apparatus,
the image processing apparatus comprising: a first verification section for conducting verification in accordance with first verification method;
a second verification section for conducting verification in accordance with second verification method; and
an operation restricting section for restricting an operation based on verification results obtained by the first verification section and the second verification section,
wherein in case a single verification by either the first verification section or the second verification section is verified, the operation restricting section permits to operate with functions narrower than a case of an operation double verified by both the first verification section and the second verification section.
28. An image processing apparatus according to claim 27, wherein a verification in accordance with a first verification method is executed by obtaining user's identification information.
29. An image processing apparatus according to claim 27, wherein a verification in accordance with a second verification method is executed by obtaining a user's positioning information from a portable terminal carried by a user.
30. An image processing apparatus according to claim 29, wherein user's positioning information from a portable terminal is obtained based on trigger automatically generated by the portable terminal while power is on.
31. An image forming apparatus for forming an image based on image data, the image forming apparatus comprising:
a first verification section for conducting verification in accordance with first verification method;
a second verification section for conducting verification in accordance with second verification method; and
an operation restricting section for restricting an operation based on verification results obtained by the first verification section and the second verification section,
wherein in case a single verification by either the first verification section or the second verification section is made, the operation restricting section inhibits at least one of following operations: 1-in-1 print; one-side print; print on unused paper; high-resolution print; multi-color print; plural numbers of print; and post processing after print.
32. A server which is capable of communicating with a first verification section for conducting verification in accordance with first verification method and a second verification section for conducting verification in accordance with second verification method and, controls operation permission/inhibition of electronic instruments, the server comprising:
an operation restricting section for restricting an operation based on verification results of first verification method and second verification method,
wherein in case a single verification by first verification method or second verification method is verified, the operation restricting section permits to operate with functions narrower than a case of an operation double verified by both the first verification method and second verification method.
33. A verification method for a verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods,
wherein, under situation such that operation for the first electronic instrument has been permitted based on a single verification in accordance with either the first verification method or the second verification method, in case a double verification for the second electronic instrument is executed in accordance with both the first verification method and the second verification method including a verification content of which is same as the single verification by a first electronic instrument, operation for the first electronic instrument is inhibited.
34. A verification method for a verification system incorporating a first electronic instrument and a second electronic instrument both of which are permitted/not permitted to operate in accordance with two or more verification results based on two or more verification methods,
wherein, under situation such that operation for the first electronic instrument has been permitted based on a double verification in accordance with both the first verification method and the second verification method, in case a single verification for the second electronic instrument is executed in accordance with either the first verification method or the second verification method including a verification content of which is common to the verification for a first electronic instrument, operation for the second electronic instrument is inhibited.
35. A verification method using a first verification method and a second verification method, wherein in case a single verification in accordance with either the first verification method or the second verification method is made, operation with functions narrower than a case of an operation double verified by both the first verification method and the second verification method is permitted.
US10/357,510 2002-02-07 2003-02-04 Verification system, server, and electronic instrument Abandoned US20030152231A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/802,049 US8340293B2 (en) 2002-02-07 2007-05-18 Verification system, server, and electronic instrument

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2002-30476 2002-02-07
JP2002030476A JP2003233596A (en) 2002-02-07 2002-02-07 Authentication system, server device and electronic equipment
JP2002-91550 2002-03-28
JP2002091550A JP4189571B2 (en) 2002-03-28 2002-03-28 Authentication system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/802,049 Division US8340293B2 (en) 2002-02-07 2007-05-18 Verification system, server, and electronic instrument

Publications (1)

Publication Number Publication Date
US20030152231A1 true US20030152231A1 (en) 2003-08-14

Family

ID=27667508

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/357,510 Abandoned US20030152231A1 (en) 2002-02-07 2003-02-04 Verification system, server, and electronic instrument
US11/802,049 Active 2026-02-14 US8340293B2 (en) 2002-02-07 2007-05-18 Verification system, server, and electronic instrument

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/802,049 Active 2026-02-14 US8340293B2 (en) 2002-02-07 2007-05-18 Verification system, server, and electronic instrument

Country Status (1)

Country Link
US (2) US20030152231A1 (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040228489A1 (en) * 2003-04-18 2004-11-18 Aisin Aw Co., Ltd. Identification assigning method and apparatus
US20050259288A1 (en) * 2004-05-21 2005-11-24 Junichi Minato Information processing apparatus, information processing method, information processing program and computer readable recording medium
US20060064753A1 (en) * 2004-09-21 2006-03-23 Konica Minolta Business Technologies, Inc. Authentication system for instruction processing apparatus, image forming apparatus, authentication control method, and authentication control program
US20070079363A1 (en) * 2005-09-30 2007-04-05 Brother Kogyo Kabushiki Kaisha Multi function peripheral
US20070101153A1 (en) * 2005-10-27 2007-05-03 Sharp Kabushiki Kaisha Authentication apparatus and image forming apparatus
US20070119917A1 (en) * 2005-11-25 2007-05-31 Fujitsu Limited Integrated circuit card, mobile communication terminal device, transaction system, and unauthorized use preventing method
WO2007062965A1 (en) * 2005-11-30 2007-06-07 Siemens Aktiengesellschaft Method and central device for access controls to secure areas or devices
EP1892686A1 (en) * 2005-06-17 2008-02-27 Dainippon Printing Co., Ltd. Use management system
US20080192289A1 (en) * 2007-02-13 2008-08-14 Konica Minolta Business Technologies, Inc. Image forming apparatus and image forming system
US20090185221A1 (en) * 2008-01-22 2009-07-23 Brother Kogyo Kabushiki Kaisha Information processing apparatus and program therefor
US20090249002A1 (en) * 2008-03-27 2009-10-01 Kabushiki Kaisha Toshiba Information collection apparatus, method, and program
US20110051163A1 (en) * 2009-09-01 2011-03-03 Xerox Corporation Secure print job management using machine-readable markings in an image production device
US20110075179A1 (en) * 2009-09-29 2011-03-31 Canon Kabushiki Kaisha Image processing apparatus that performs authentication, authentication method therefor, and storage medium
US20130080587A1 (en) * 2011-05-13 2013-03-28 Hideaki Yajima Display apparatus, operation apparatus, apparatus coordination control system, display method, operation method, and apparatus coordination control method
US20140033090A1 (en) * 2012-07-30 2014-01-30 Brother Kogyo Kabushiki Kaisha Image processing apparatus and storage medium storing program executable on information processing apparatus
CN104636777A (en) * 2015-01-15 2015-05-20 李明 Identity card information obtaining system
CN104899621A (en) * 2015-05-20 2015-09-09 李明 Method, apparatus and system for acquiring identify card information
US9300648B2 (en) 2013-01-31 2016-03-29 Brother Kogyo Kabushiki Kaisha Image processing apparatus and image processing system
US20160253133A1 (en) * 2015-02-26 2016-09-01 Brother Kogyo Kabushiki Kaisha Image recording apparatus
US9462111B1 (en) * 2015-12-31 2016-10-04 FuelStation Inc. Wearable electronic device having short-range wireless communication element for updating information
US20160301815A1 (en) * 2015-04-10 2016-10-13 Canon Kabushiki Kaisha Information processing system, mobile terminal, and method of controlling the same
US9769020B2 (en) 2014-10-21 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for responding to events affecting communications in a communication network
CN111563983A (en) * 2020-05-27 2020-08-21 南京东屋电气有限公司 Multi-lock unlocking authorization control method and system based on dynamic password and lockset
US20210223973A1 (en) * 2005-12-20 2021-07-22 Canon Kabushiki Kaisha Data communication system device and method
US11449631B2 (en) * 2019-03-21 2022-09-20 Samsung Electronics Co., Ltd. Electronic device for managing personal information and operating method thereof

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9680324B2 (en) * 2015-03-06 2017-06-13 Ruskin Company Energy harvesting damper control and method of operation
CN110021088B (en) * 2018-10-29 2021-06-29 深圳市微开互联科技有限公司 Page control door opening system and method of distributed authorization architecture

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5629981A (en) * 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5757916A (en) * 1995-10-06 1998-05-26 International Series Research, Inc. Method and apparatus for authenticating the location of remote users of networked computing systems
US5796827A (en) * 1996-11-14 1998-08-18 International Business Machines Corporation System and method for near-field human-body coupling for encrypted communication with identification cards
US6058477A (en) * 1997-03-26 2000-05-02 Sony Corporation System and method for authentication, and device and method for authentication
US6075454A (en) * 1997-06-24 2000-06-13 Alps Electric Co., Ltd. Keyless entry device
US6088450A (en) * 1996-04-17 2000-07-11 Intel Corporation Authentication system based on periodic challenge/response protocol
US6148094A (en) * 1996-09-30 2000-11-14 David J. Kinsella Pointing device with biometric sensor
US6195542B1 (en) * 1998-07-31 2001-02-27 Avaya Technology Corp. Identification by a central computer of a wireless telephone functioning as a transaction device
US20010036183A1 (en) * 2000-03-10 2001-11-01 Melick Bruce D. Method for routing data packets using an IP address based in GEO position
US20020007291A1 (en) * 2000-01-24 2002-01-17 Norbert Miller Method for the automation of allocation processes for products and/or services
US20020062284A1 (en) * 1998-01-30 2002-05-23 Joseph C. Kawan Method and system of contactless interfacing for smart card banking
US20020115426A1 (en) * 2001-01-30 2002-08-22 Erlend Olson Wireless device authentication at mutual reduced transmit power
US6442532B1 (en) * 1995-11-13 2002-08-27 Transaction Technology Inc. Wireless transaction and information system
US20020123325A1 (en) * 2001-03-01 2002-09-05 Cooper Gerald M. Method and apparatus for increasing the security of wireless data services
US20020143634A1 (en) * 2001-03-30 2002-10-03 Kumar K. Anand Wireless payment system
US6490443B1 (en) * 1999-09-02 2002-12-03 Automated Business Companies Communication and proximity authorization systems
US20020188842A1 (en) * 2001-06-06 2002-12-12 Willeby Tandy G. Client system validation by network address and associated geographic location verification
US20030025603A1 (en) * 2001-08-01 2003-02-06 Smith Edwin Derek Master authenticator
US20030038965A1 (en) * 2001-08-27 2003-02-27 Simpson Shell S. Private printing using network-based imaging
US20030115142A1 (en) * 2001-12-12 2003-06-19 Intel Corporation Identity authentication portfolio system
US6832721B2 (en) * 2000-10-04 2004-12-21 Nec Corporation Authentication system using information on position
US6937732B2 (en) * 2000-04-07 2005-08-30 Mazda Motor Corporation Audio system and its contents reproduction method, audio apparatus for a vehicle and its contents reproduction method, portable audio apparatus, computer program product and computer-readable storage medium
US7031945B1 (en) * 2000-07-24 2006-04-18 Donner Irah H System and method for reallocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services
US7310734B2 (en) * 2001-02-01 2007-12-18 3M Innovative Properties Company Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US7360248B1 (en) * 1999-11-09 2008-04-15 International Business Machines Corporation Methods and apparatus for verifying the identity of a user requesting access using location information

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3135104B2 (en) 1994-11-07 2001-02-13 シャープ株式会社 User authentication device for electronic devices
TW333630B (en) * 1996-05-22 1998-06-11 Matsushita Electric Ind Co Ltd An encryption apparatus for ensuring security in communication between devices
JP3526524B2 (en) * 1996-10-31 2004-05-17 松下電器産業株式会社 One-way data conversion device and device authentication system
JPH10222618A (en) * 1997-01-31 1998-08-21 Toshiba Corp Ic card and ic card processing system
JPH10319802A (en) * 1997-05-16 1998-12-04 Minolta Co Ltd Copying device
JPH11224236A (en) 1998-02-05 1999-08-17 Mitsubishi Electric Corp Remote authentication system
JP4181667B2 (en) * 1998-09-04 2008-11-19 キヤノン株式会社 Image processing apparatus, image processing method, and recording medium
US6651168B1 (en) * 1999-01-29 2003-11-18 International Business Machines, Corp. Authentication framework for multiple authentication processes and mechanisms
JP3332221B2 (en) 1999-05-28 2002-10-07 株式会社エヌ・ティ・ティ・データ Mobile terminal connection management method and method
JP2001003615A (en) 1999-06-24 2001-01-09 Nec Corp Unlockable interphone device utilizing mobile portable terminal
JP2001022698A (en) 1999-07-05 2001-01-26 Matsushita Electric Ind Co Ltd System and method for authentication for mobile telephone
JP2001109855A (en) 1999-10-13 2001-04-20 Matsushita Electric Ind Co Ltd Individual authentication device
JP4187935B2 (en) * 2000-08-23 2008-11-26 株式会社東芝 RADIO COMMUNICATION SYSTEM, TRANSMITTING DEVICE, RECEIVING DEVICE, AND CONTENT DATA TRANSFER METHOD
EP1341104A4 (en) * 2000-10-31 2008-01-16 Arkray Inc User authentication method in network
JP4280439B2 (en) * 2000-11-17 2009-06-17 キヤノン株式会社 Image verification system, verification data conversion apparatus, program, and recording medium
US6612928B1 (en) * 2001-02-15 2003-09-02 Sierra Design Group Player identification using biometric data in a gaming environment
US20020147926A1 (en) * 2001-04-04 2002-10-10 Pecen Mark E. Method and apparatus for authentication using remote multiple access SIM technology
JP4383072B2 (en) * 2002-03-26 2009-12-16 ロベルト・ボッシュ・ゲゼルシャフト・ミト・ベシュレンクテル・ハフツング Method for determining clutch state of vehicle and apparatus for implementing the same

Patent Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5629981A (en) * 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5757916A (en) * 1995-10-06 1998-05-26 International Series Research, Inc. Method and apparatus for authenticating the location of remote users of networked computing systems
US6442532B1 (en) * 1995-11-13 2002-08-27 Transaction Technology Inc. Wireless transaction and information system
US6088450A (en) * 1996-04-17 2000-07-11 Intel Corporation Authentication system based on periodic challenge/response protocol
US6148094A (en) * 1996-09-30 2000-11-14 David J. Kinsella Pointing device with biometric sensor
US5796827A (en) * 1996-11-14 1998-08-18 International Business Machines Corporation System and method for near-field human-body coupling for encrypted communication with identification cards
US6058477A (en) * 1997-03-26 2000-05-02 Sony Corporation System and method for authentication, and device and method for authentication
US6075454A (en) * 1997-06-24 2000-06-13 Alps Electric Co., Ltd. Keyless entry device
US20020062284A1 (en) * 1998-01-30 2002-05-23 Joseph C. Kawan Method and system of contactless interfacing for smart card banking
US6195542B1 (en) * 1998-07-31 2001-02-27 Avaya Technology Corp. Identification by a central computer of a wireless telephone functioning as a transaction device
US6490443B1 (en) * 1999-09-02 2002-12-03 Automated Business Companies Communication and proximity authorization systems
US7360248B1 (en) * 1999-11-09 2008-04-15 International Business Machines Corporation Methods and apparatus for verifying the identity of a user requesting access using location information
US20020007291A1 (en) * 2000-01-24 2002-01-17 Norbert Miller Method for the automation of allocation processes for products and/or services
US20010036183A1 (en) * 2000-03-10 2001-11-01 Melick Bruce D. Method for routing data packets using an IP address based in GEO position
US6937732B2 (en) * 2000-04-07 2005-08-30 Mazda Motor Corporation Audio system and its contents reproduction method, audio apparatus for a vehicle and its contents reproduction method, portable audio apparatus, computer program product and computer-readable storage medium
US7031945B1 (en) * 2000-07-24 2006-04-18 Donner Irah H System and method for reallocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services
US6832721B2 (en) * 2000-10-04 2004-12-21 Nec Corporation Authentication system using information on position
US20020115426A1 (en) * 2001-01-30 2002-08-22 Erlend Olson Wireless device authentication at mutual reduced transmit power
US7310734B2 (en) * 2001-02-01 2007-12-18 3M Innovative Properties Company Method and system for securing a computer network and personal identification device used therein for controlling access to network components
US20020123325A1 (en) * 2001-03-01 2002-09-05 Cooper Gerald M. Method and apparatus for increasing the security of wireless data services
US20020143634A1 (en) * 2001-03-30 2002-10-03 Kumar K. Anand Wireless payment system
US20020188842A1 (en) * 2001-06-06 2002-12-12 Willeby Tandy G. Client system validation by network address and associated geographic location verification
US20030025603A1 (en) * 2001-08-01 2003-02-06 Smith Edwin Derek Master authenticator
US20030038965A1 (en) * 2001-08-27 2003-02-27 Simpson Shell S. Private printing using network-based imaging
US20030115142A1 (en) * 2001-12-12 2003-06-19 Intel Corporation Identity authentication portfolio system

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040228489A1 (en) * 2003-04-18 2004-11-18 Aisin Aw Co., Ltd. Identification assigning method and apparatus
US20050259288A1 (en) * 2004-05-21 2005-11-24 Junichi Minato Information processing apparatus, information processing method, information processing program and computer readable recording medium
US7663773B2 (en) * 2004-05-21 2010-02-16 Ricoh Company, Ltd. Information processing apparatus, information processing method, information processing program and computer readable recording medium
US7894093B2 (en) 2004-05-21 2011-02-22 Ricoh Company, Ltd. Information processing apparatus, information processing method, information processing program and computer readable recording medium
US20110119755A1 (en) * 2004-05-21 2011-05-19 Junichi Minato Information processing apparatus, information processing method, information processing program and computer readable recording medium
US8334990B2 (en) 2004-05-21 2012-12-18 Ricoh Company, Ltd. Information processing apparatus, information processing method, information processing program and computer readable recording medium
US8056126B2 (en) 2004-09-21 2011-11-08 Konica Minolta Business Technologies, Inc. Authentication system for instruction processing apparatus, image forming apparatus, authentication control method, and authentication control program
US9098716B2 (en) 2004-09-21 2015-08-04 Konica Minolta Business Technologies, Inc. Authentication system for instruction processing apparatus, image forming apparatus, authentication control method, and authentication control program
US20060064753A1 (en) * 2004-09-21 2006-03-23 Konica Minolta Business Technologies, Inc. Authentication system for instruction processing apparatus, image forming apparatus, authentication control method, and authentication control program
EP1892686A1 (en) * 2005-06-17 2008-02-27 Dainippon Printing Co., Ltd. Use management system
EP1892686A4 (en) * 2005-06-17 2010-09-08 Dainippon Printing Co Ltd Use management system
US20090031397A1 (en) * 2005-06-17 2009-01-29 Takayuki Chikada Use management system
EP1777936A1 (en) * 2005-09-30 2007-04-25 Brother Kogyo Kabushiki Kaisha Multi function peripheral
US20070079363A1 (en) * 2005-09-30 2007-04-05 Brother Kogyo Kabushiki Kaisha Multi function peripheral
US20070101153A1 (en) * 2005-10-27 2007-05-03 Sharp Kabushiki Kaisha Authentication apparatus and image forming apparatus
US20070119917A1 (en) * 2005-11-25 2007-05-31 Fujitsu Limited Integrated circuit card, mobile communication terminal device, transaction system, and unauthorized use preventing method
US20090027159A1 (en) * 2005-11-30 2009-01-29 Bruno Bozionek Method and Central Device for Controlling Access to Secure Areas or Devices
WO2007062965A1 (en) * 2005-11-30 2007-06-07 Siemens Aktiengesellschaft Method and central device for access controls to secure areas or devices
US8736418B2 (en) 2005-11-30 2014-05-27 Siemens Aktiengesellschaft Method and central device for controlling access to secure areas or devices
US20210223973A1 (en) * 2005-12-20 2021-07-22 Canon Kabushiki Kaisha Data communication system device and method
US20080192289A1 (en) * 2007-02-13 2008-08-14 Konica Minolta Business Technologies, Inc. Image forming apparatus and image forming system
US8629998B2 (en) * 2007-02-13 2014-01-14 Konica Minolta Business Technologies, Inc. Image forming apparatus and image forming system
US20090185221A1 (en) * 2008-01-22 2009-07-23 Brother Kogyo Kabushiki Kaisha Information processing apparatus and program therefor
US8582134B2 (en) * 2008-01-22 2013-11-12 Brother Kogyo Kabushiki Kaisha Information processing apparatus and program therefor
US20090249002A1 (en) * 2008-03-27 2009-10-01 Kabushiki Kaisha Toshiba Information collection apparatus, method, and program
US8339625B2 (en) * 2009-09-01 2012-12-25 Xerox Corporation Secure print job management using machine-readable markings in an image production device
US20110051163A1 (en) * 2009-09-01 2011-03-03 Xerox Corporation Secure print job management using machine-readable markings in an image production device
US20110075179A1 (en) * 2009-09-29 2011-03-31 Canon Kabushiki Kaisha Image processing apparatus that performs authentication, authentication method therefor, and storage medium
US20130080587A1 (en) * 2011-05-13 2013-03-28 Hideaki Yajima Display apparatus, operation apparatus, apparatus coordination control system, display method, operation method, and apparatus coordination control method
US9310973B2 (en) * 2012-07-30 2016-04-12 Brother Kogyo Kabushiki Kaisha Adaptive user interface for image processing apparatus
US20140033090A1 (en) * 2012-07-30 2014-01-30 Brother Kogyo Kabushiki Kaisha Image processing apparatus and storage medium storing program executable on information processing apparatus
US9300648B2 (en) 2013-01-31 2016-03-29 Brother Kogyo Kabushiki Kaisha Image processing apparatus and image processing system
US9769020B2 (en) 2014-10-21 2017-09-19 At&T Intellectual Property I, L.P. Method and apparatus for responding to events affecting communications in a communication network
CN104636777A (en) * 2015-01-15 2015-05-20 李明 Identity card information obtaining system
US20160253133A1 (en) * 2015-02-26 2016-09-01 Brother Kogyo Kabushiki Kaisha Image recording apparatus
US11237778B2 (en) 2015-02-26 2022-02-01 Brother Kogyo Kabushiki Kaisha Image recording apparatus communicable with mobile terminal for identification of the image recording apparatus
US9727284B2 (en) * 2015-02-26 2017-08-08 Brother Kogyo Kabushiki Kaisha Image recording apparatus communicable with mobile terminal for identification of the image recording apparatus
US10235108B2 (en) 2015-02-26 2019-03-19 Brother Kogyo Kabushiki Kaisha Image recording apparatus communicable with mobile terminal for identification of the image recording apparatus
US10671330B2 (en) 2015-02-26 2020-06-02 Brother Kogyo Kabushiki Kaisha Image recording apparatus communicable with mobile terminal for identification of the image recording apparatus
US20160301815A1 (en) * 2015-04-10 2016-10-13 Canon Kabushiki Kaisha Information processing system, mobile terminal, and method of controlling the same
US9769336B2 (en) * 2015-04-10 2017-09-19 Canon Kabushiki Kaisha Information processing system, mobile terminal, and method of controlling the same
CN104899621A (en) * 2015-05-20 2015-09-09 李明 Method, apparatus and system for acquiring identify card information
US9462111B1 (en) * 2015-12-31 2016-10-04 FuelStation Inc. Wearable electronic device having short-range wireless communication element for updating information
US11449631B2 (en) * 2019-03-21 2022-09-20 Samsung Electronics Co., Ltd. Electronic device for managing personal information and operating method thereof
CN111563983A (en) * 2020-05-27 2020-08-21 南京东屋电气有限公司 Multi-lock unlocking authorization control method and system based on dynamic password and lockset

Also Published As

Publication number Publication date
US8340293B2 (en) 2012-12-25
US20080093446A1 (en) 2008-04-24

Similar Documents

Publication Publication Date Title
US8340293B2 (en) Verification system, server, and electronic instrument
CN1984213B (en) Authentication apparatus and image forming apparatus
US9268932B2 (en) Authentication of devices in a wireless network
CN104935776B (en) Communication system, communication means, image forming apparatus, digital camera, information processing unit
EP1566719A2 (en) Image forming apparatus, information processing apparatus, information processing system, authentication method and computer-readable storage medium
EP1785909A1 (en) Information processing apparatus and authentication method
US20070136820A1 (en) Server apparatus, client apparatus, control method therefor, and computer program
US20080137138A1 (en) Image forming apparatus and image forming system
JP2002183093A (en) Controller, method for controlling the same and storage medium
US20090158410A1 (en) Network system, its control method, and program
JP4189571B2 (en) Authentication system
US8856866B2 (en) Image forming apparatus to restrict use of a hard disc drive and a method thereof
US20060265596A1 (en) User authentication system, storage medium that stores a user authentication program, and service equipment
CN101277348A (en) Information processing apparatus, information processing method and computer readable medium
JP2008129956A (en) Authentication system and authenticating method in image forming apparatus
JP4420467B2 (en) Information processing apparatus and information processing system
US20090097068A1 (en) Device authorization system using optical scanner
US6819446B1 (en) Image forming system
JPH08314805A (en) System for preventing portable radio terminal from being illegally used and method for executing the same
JP2003233596A (en) Authentication system, server device and electronic equipment
JP2004199521A (en) Information output system and information output program
US10178272B2 (en) Image forming apparatus
JP3600089B2 (en) IC card user authentication system and method, and recording medium storing program for determining authentication method in said system
US20080252920A1 (en) Printing system and control method thereof
JP4158229B2 (en) Wireless communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: MINOLTA COMPANY, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TOMITA, ATSUSHI;TAJIMA, KATSUAKI;MATSUMOTO, KENICHI;AND OTHERS;REEL/FRAME:013979/0815;SIGNING DATES FROM 20030226 TO 20030318

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION