INFORMATION PROCESSING SYSTEM, CONTROL METHOD THEREFOR, IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM STORING CONTROL PROGRAM THEREFOR
First Claim
1. An information processing system comprising:
- a receiving unit configured to receive security policy data in which a security policy is described;
a management unit, configured to manage an extended application that can be added and deleted and that operates in an image processing apparatus; and
a notification unit configured to notify an administrator of error information about a security policy of an extended application managed by said management unit, when the extended application managed by said management unit does not comply with the security policy described in the security policy data, and when an identifier of an extended application that is extracted from the security policy data and that is excepted from applying the security policy does not match with the identifier of the extended application managed by said management unit.
1 Assignment
0 Petitions
Accused Products
Abstract
An information processing system that facilitates management of information security policy even for an extended application installed from exterior. A receiving unit receives security policy data in which a security policy is described. A management unit manages an extended application that can be added and deleted and that operates in an image processing apparatus. A notification unit notifies an administrator of error information about a security policy of an extended application managed by the management unit, when the extended application managed by the management unit does not comply with the security policy described in the security policy data, and when an identifier of an extended application that is extracted from the security policy data and that is excepted from applying the security policy does not match with the identifier of the extended application managed by the management unit.
6 Citations
13 Claims
-
1. An information processing system comprising:
-
a receiving unit configured to receive security policy data in which a security policy is described; a management unit, configured to manage an extended application that can be added and deleted and that operates in an image processing apparatus; and a notification unit configured to notify an administrator of error information about a security policy of an extended application managed by said management unit, when the extended application managed by said management unit does not comply with the security policy described in the security policy data, and when an identifier of an extended application that is extracted from the security policy data and that is excepted from applying the security policy does not match with the identifier of the extended application managed by said management unit. - View Dependent Claims (3, 4)
-
-
2. An information processing system comprising:
-
a receiving unit configured to receive security policy data in which a security policy is described; a management unit configured to manage an extended application that can be added and deleted and that operates in the image processing apparatus; and a stop unit configured to extract an identifier from the security policy data received by said receiving unit of an extended application that is excepted from applying the security policy, and to stop an operation of an extended application managed by the management unit when an identifier of the extended application managed by said management unit does not match with the extracted identifier.
-
-
5. A control method for an information processing system, comprising:
-
receiving security policy data in which a security policy is described; managing an extended application that can be added and deleted and that operates in the image processing apparatus; and notifying an administrator of error information about a security policy of an extended application managed, when the extended application does not comply with the security policy described in the security policy data, and when an identifier of an extended application that is extracted from the security policy data and that is excepted from applying the security policy does not match with the identifier of the extended application managed.
-
-
6. A control method for an information processing system, comprising:
-
receiving the security policy data in which a security policy is described; managing an extended application that can be added and deleted and that operates in the image processing apparatus; and extracting an identifier from the security policy data of an extended application that is excepted from applying the security policy; and stopping an operation of an extended application managed when an identifier of the extended application managed does not match with the extracted identifier.
-
-
7. An image processing apparatus, comprising:
-
a receiving unit configured to receive security policy data in which a security policy is described; a management unit configured to manage an extended application that can be added and deleted and that operates in the image processing apparatus; and a notification unit configured to notify an administrator of error information about a security policy of an extended application managed by said management unit, when the extended application managed by said management unit does not comply with the security policy described in the security policy data, and when an identifier of an extended application that is extracted from the security policy data and that is excepted from applying the security policy does not match with the identifier of the extended application managed by said management unit. - View Dependent Claims (9, 10)
-
-
8. An image processing apparatus, comprising:
-
a receiving unit configured to receive security policy data in which a security policy is described; a management unit configured to manage an extended application that can be added and deleted and that operates in the image processing apparatus; and a stop unit configured to extract an identifier from the security policy data received by said receiving unit of an extended application that is excepted from applying the security policy, and to stop an operation of an extended application managed by the management unit when an identifier of the extended application managed by said management unit does not match with the extracted identifier.
-
-
11. A control method for an image processing apparatus, comprising:
-
receiving security policy data in which a security policy is described; managing an extended application that can be added and deleted and that operates in the image processing apparatus; and notifying an administrator of error information about a security policy of an extended application managed, when the extended application managed does not comply with the security policy described in the security policy data, and when an identifier of an extended application that is extracted from the security policy data and that is excepted from applying the security policy does not match with the identifier of the extended application managed.
-
-
12. A control method for an image processing apparatus, comprising:
-
receiving security policy data in which a security policy is described; managing an extended application that can be added and deleted and that operates in the image processing apparatus; and extracting an identifier from the security policy data received of an extended application that is excepted from applying the security policy; and stopping an operation of an extended application managed when an identifier of the extended application managed does not match with the extracted identifier.
-
-
13. A non-transitory computer-readable storage medium storing a control program causing an image processing apparatus to execute a control method for the image processing apparatus, the control method comprising:
-
receiving security policy data in which a security policy is described; managing an extended application that can be added and deleted and that operates in the image processing apparatus; and notifying an administrator of error information about a security policy of an extended application managed, when the extended application managed does not comply with the security policy described in the security policy data, and when an identifier of an extended application that is extracted from the security policy data and that is excepted from applying the security policy does not match with the identifier of the extended application managed.
-
Specification