Image forming apparatus and control method for same
First Claim
1. A control method for an image forming apparatus connected via a network to a server device, the server device controlling access thereto by a verification process, the control method comprising the steps of:
- (a) conducting verification according to a verification protocol having the highest security selected from among a plurality of verification protocols having different levels of security;
(b) determining whether or not verification has succeeded;
(c) if verification has failed, conducting verification according to a verification protocol having the next highest level of security; and
(d) repeating steps (a), (b) and (c) until verification to the server device is successful.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for enabling a user to obtain verification and gain access a network server accessible only after verification without the user having to be aware of the communications method and verification protocol involves an image forming apparatus selecting a verification protocol having the highest level of security from among a plurality of previously determined verification protocols. The process of selecting the verification protocol with the highest level of security is then repeated with the verification protocol having the next highest level of security from among the remaining verification protocols until a connection to the network server is successfully established.
-
Citations
7 Claims
-
1. A control method for an image forming apparatus connected via a network to a server device, the server device controlling access thereto by a verification process, the control method comprising the steps of:
-
(a) conducting verification according to a verification protocol having the highest security selected from among a plurality of verification protocols having different levels of security;
(b) determining whether or not verification has succeeded;
(c) if verification has failed, conducting verification according to a verification protocol having the next highest level of security; and
(d) repeating steps (a), (b) and (c) until verification to the server device is successful. - View Dependent Claims (2, 3)
-
-
4. A control program for an image forming apparatus connected via a network to a server device, the server device controlling access thereto by a verification process, the control program comprising program code for executing the steps of:
-
(a) conducting verification according to a verification protocol having the highest security selected from among a plurality of verification protocols having different levels of security;
(b) determining whether or not verification has succeeded;
(c) if verification has failed, conducting verification according to a verification protocol having the next highest level of security; and
(d) repeating steps (a), (b) and (c) until verification to the server device is successful.
-
-
5. An image forming apparatus connected via a network to a server device, the server device controlling access thereto by a verification process, the image forming apparatus comprising:
-
verification means for conducting verification according to a verification protocol having the highest security selected from among a plurality of verification protocols having different levels of security; and
control means for controlling the verification means so that, if verification has failed, the verification protocol having the highest level of security is continuously selected from among a plurality of verification protocols until verification is successful.
-
-
6. A computer-readable medium storing program code for causing a computer to execute the steps of:
-
(a) conducting verification according to a verification protocol having the highest security selected from among a plurality of verification protocols having different levels of security;
(b) determining whether or not verification has succeeded;
(c) if verification has failed, conducting verification according to a verification protocol having the next highest level of security; and
(d) repeating steps (a), (b) and (c) until verification to the server device is successful. - View Dependent Claims (7)
-
Specification