Two-pass device access management
First Claim
1. A method for controlling access to a peripheral device by a user, wherein the peripheral device is accessible by the user based on centralized access management information accessible by a server, the method comprising:
- authenticating a user of a computer based on authentication information corresponding to the user;
determining, at the server, whether the user is authorized to use at least one portion of features and/or services of the peripheral device;
transmitting access management information for the user from the server to the computer, in case that authentication of the user is successful and the user is authorized to use at least one portion of the features and/or services of the peripheral device;
transmitting the access management information for the user and a job requested by the user from the computer to the peripheral device;
determining, at the peripheral device, whether a level of access to the peripheral device available to the user based on the transmitted access management information provides access to a feature and/or a service necessary to perform the job requested by the user; and
performing the job requested by the user at the peripheral device in a case that the level of access provides access to the feature and/or service necessary to perform the job requested by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.
-
Citations
15 Claims
-
1. A method for controlling access to a peripheral device by a user, wherein the peripheral device is accessible by the user based on centralized access management information accessible by a server, the method comprising:
-
authenticating a user of a computer based on authentication information corresponding to the user; determining, at the server, whether the user is authorized to use at least one portion of features and/or services of the peripheral device; transmitting access management information for the user from the server to the computer, in case that authentication of the user is successful and the user is authorized to use at least one portion of the features and/or services of the peripheral device; transmitting the access management information for the user and a job requested by the user from the computer to the peripheral device; determining, at the peripheral device, whether a level of access to the peripheral device available to the user based on the transmitted access management information provides access to a feature and/or a service necessary to perform the job requested by the user; and performing the job requested by the user at the peripheral device in a case that the level of access provides access to the feature and/or service necessary to perform the job requested by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A server for use in controlling access to a peripheral device by a user, wherein the peripheral device is accessible by the user based on access management information accessible by the server, the server comprising a processor executing steps of:
-
receiving authentication information corresponding to a user, from a computer for transmitting a job to the peripheral device; authenticating the user using the authentication information; determining whether the user is authorized to use at least one portion of features and/or services of the peripheral device; and transmitting access management information for the user to the computer, in case that authentication of the user is successful and the user is authorized to use at least one portion of the features and/or the services of the peripheral device, wherein the transmitted access management information is used to determine whether a feature and/or a service of the peripheral device necessary to perform the job is available to the user. - View Dependent Claims (11, 12, 13)
-
-
14. A method for controlling access to a peripheral device by a user, wherein the peripheral device is accessible by the user based on centralized access management information accessible by a server, the method comprising:
-
receiving, at the server, authentication information corresponding to a user, from a computer for transmitting a job to the peripheral device; authenticating, at the server, the user using the authentication information; determining, at the server, whether the user is authorized to use at least one portion of features and/or services of the peripheral device, and transmitting, at the server, access management information for the user to the computer in case that authentication of the user is successful and the user is authorized to use at least one portion of the features and/or the services of the peripheral device, wherein the transmitted access management information is used to determine whether a feature and/or a service of the peripheral device necessary to perform the job is available to the user. - View Dependent Claims (15)
-
Specification