Device Access Based on Centralized Authentication
0 Assignments
0 Petitions
Accused Products
Abstract
Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at the networked peripheral device a level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access the determined user-available features of the networked peripheral device based on the determined level of access.
104 Citations
28 Claims
-
1-16. -16. (canceled)
-
17. An information processing apparatus for controlling access to a peripheral device by a user, the peripheral device being accessible by the user based on access management information, the peripheral device providing the user with a plurality of features and/or services including at least one of a printer service, a scanner service, a facsimile service and a copy service, the information processing apparatus comprising:
-
a reception unit configured to receive, from a computer, authentication information corresponding to a user; an authentication unit configured to authenticate the user using the received authentication information; and a transmission unit configured to transmit, to the computer, access management information which specifies a feature and/or a service of the peripheral device available to the authenticated user from among the plurality of features and/or services of the peripheral device, or which specifies a feature and/or a service of the peripheral device not available to the authenticated user from among the plurality of features and/or services of the peripheral device, wherein the access management information and a job are transmitted from the computer to the peripheral device, wherein the transmitted access management information is used for determining by the peripheral device whether the user can use the feature and/or the service of the peripheral device necessary to perform the job. - View Dependent Claims (18, 19)
-
-
20. A computer which transmits a job to a peripheral device, the peripheral device being accessible by a user based on access management information, and the peripheral device providing the user with a plurality of features and/or services including at least one of a printer service, a scanner service, a facsimile service and a copy service, the computer comprising:
-
a reception unit configured to receive, from an information processing apparatus, access management information which specifies a feature and/or a service of the peripheral device available to a user from among the plurality of features and/or services of the peripheral device, or which specifies a feature and/or a service of the peripheral device not available to the user from among the plurality of features and/or services of the peripheral device; and a transmission unit configured to transmit the received access management information and a job to the peripheral device, wherein the transmitted access management information is used by the peripheral device for determining whether the user can use the feature and/or the service of the peripheral device necessary to perform the job. - View Dependent Claims (21, 22)
-
-
23. A control method in an information processing apparatus for controlling access to a peripheral device by a user, the peripheral device being accessible by the user based on access management information, the peripheral device providing the user with a plurality of features and/or services including at least one of a printer service, a scanner service, a facsimile service and a copy service, the control method comprising:
-
receiving, from a computer, authentication information corresponding to a user; authenticating the user using the received authentication information; and transmitting, to the computer, access management information which specifies a feature and/or a service of the peripheral device available to the authenticated user from among the plurality of features and/or services of the peripheral device, or which specifies a feature and/or a service of the peripheral device not available to the authenticated user from among the plurality of features and/or services of the peripheral device, wherein the access management information and a job are transmitted from the computer to the peripheral device, wherein the transmitted access management information is used for determining by the peripheral device whether the user can use the feature and/or the service of the peripheral device necessary to perform the job. - View Dependent Claims (24, 25)
-
-
26. A control method in a computer which transmits a job to a peripheral device, the peripheral device being accessible by a user based on access management information, and the peripheral device providing the user with a plurality of features and/or services including at least one of a printer service, a scanner service, a facsimile service and a copy service, the method comprising:
-
receiving, from an information processing apparatus, access management information which specifies a feature and/or a service of the peripheral device available to a user from among the plurality of features and/or services of the peripheral device, or which specifies a feature and/or a service of the peripheral device not available to the user from among the plurality of features and/or services of the peripheral device; and transmitting the received access management information and a job to the peripheral device, wherein the transmitted access management information is used by the peripheral device for determining whether the user can use the feature and/or the service of the peripheral device necessary to perform the job. - View Dependent Claims (27, 28)
-
Specification