Image forming apparatus and control method for same
First Claim
1. An image processing apparatus capable of communicating with a server which provides a directory service via a network, the apparatus comprising:
- establishing means for establishing a connection to the server using encrypted communication;
first verification means for automatically selecting a first verification protocol out of a plurality of verification protocols having different security levels from each other upon establishing the connection, and attempting verification to the server using the first verification protocol;
second verification means for automatically selecting a second verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgment from the server when said first verification means attempt verification to the server using the first verification protocol, and retrying verification to the server using the second verification protocol;
third verification means for automatically selecting a third verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgment from the server when said second verification means attempt verification to the server using the second verification protocol, and retrying verification to the server using the third verification protocol; and
operation means for, in a case in which a positive acknowledgment is received from the server when the verification is attempted to the server by said first, second, or third verification means, performing operations for the directory service under an access authority corresponding to the selected verification protocol,wherein the first verification protocol has the highest security level in the plurality of verification protocols, the second verification protocol has the second-highest security level in the plurality of verification protocols, and the third verification protocol has a security level lower than the first and second verification protocols,and wherein the first verification protocol is an encrypted password protocol, the second verification protocol is a plain text password protocol, and the third verification protocol is an anonymous authentication protocol,and wherein, in a case in which a positive acknowledgment is not received from the server when the verification attempted to the server by said first, second, and third verification means, the connection established by said establishing means is disconnected.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for enabling a user to obtain verification and gain access to a network server accessible only after verification without the user having to be aware of the communications method and verification protocol involve an image forming apparatus selecting a verification protocol having the highest level of security from among a plurality of previously determined verification protocols. The process of selecting the verification protocol with the highest level of security is then repeated with the verification protocol having the next highest level of security from among the remaining verification protocols until a connection to the network server is successfully established.
16 Citations
6 Claims
-
1. An image processing apparatus capable of communicating with a server which provides a directory service via a network, the apparatus comprising:
-
establishing means for establishing a connection to the server using encrypted communication; first verification means for automatically selecting a first verification protocol out of a plurality of verification protocols having different security levels from each other upon establishing the connection, and attempting verification to the server using the first verification protocol; second verification means for automatically selecting a second verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgment from the server when said first verification means attempt verification to the server using the first verification protocol, and retrying verification to the server using the second verification protocol; third verification means for automatically selecting a third verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgment from the server when said second verification means attempt verification to the server using the second verification protocol, and retrying verification to the server using the third verification protocol; and operation means for, in a case in which a positive acknowledgment is received from the server when the verification is attempted to the server by said first, second, or third verification means, performing operations for the directory service under an access authority corresponding to the selected verification protocol, wherein the first verification protocol has the highest security level in the plurality of verification protocols, the second verification protocol has the second-highest security level in the plurality of verification protocols, and the third verification protocol has a security level lower than the first and second verification protocols, and wherein the first verification protocol is an encrypted password protocol, the second verification protocol is a plain text password protocol, and the third verification protocol is an anonymous authentication protocol, and wherein, in a case in which a positive acknowledgment is not received from the server when the verification attempted to the server by said first, second, and third verification means, the connection established by said establishing means is disconnected. - View Dependent Claims (2)
-
-
3. A method of communicating with a server which provides a directory service via a network, the method comprising:
-
establishing a connection to the server using encrypted communication; automatically selecting a first verification protocol out of a plurality of verification protocols having different security levels from each other upon establishing the connection, and attempting verification to the server using the first verification protocol; automatically selecting a second verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgement from the server when attempting verification to the server using the first verification protocol, and retrying verification to the server using the second verification protocol; automatically selecting a third verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgement from the server when attempting verification to the server using the second verification protocol, and retrying verification to the server using the third verification protocol; performing operations for, in a case in which a positive acknowledgement is received from the server when attempting the verification to the server using the first, second, or third verification protocol, the directory service under an access authority corresponding to the verification protocol being used, wherein the first verification protocol has the highest security level in the plurality of verification protocols, the second verification protocol has the second-highest security level in the plurality of verification protocols, and the third verification protocol has a security level lower than the first and second verification protocols, and wherein the first verification protocol is an encrypted password protocol, the second verification protocol is a plain text password protocol, and the third verification protocol is an anonymous authentication protocol, and wherein, in a case in which a positive acknowledgement is not received from the server when the verification attempted to the server by said first, second, and third verification protocols, the established connection is disconnected. - View Dependent Claims (4)
-
-
5. A computer-readable medium having control logic stored therein for a computer program that causes a computer to communicate with a server which provides a directory service via a network, the control logic comprising:
-
first computer-readable program code for causing the computer to establish a connection to the server using encrypted communication; second computer-readable program code for causing the computer to automatically select a first verification protocol out of a plurality of verification protocols having different security levels from each other upon establishing the connection, and attempting verification to the server using the first verification protocol; third computer-readable program code for causing the computer to automatically select a second verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgement from the server when attempting verification to the server using the first verification protocol, and retrying verification to the server using the second verification protocol; fourth computer-readable program code for causing the computer to automatically select a third verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgement from the server when attempting verification to the server using the second verification protocol, and retrying verification to the server using the third verification protocol; fifth computer-readable program code for, in a case in which a positive acknowledgement is received from the server when the verification is attempted to the server by said first, second, or third verification protocols, causing the computer to perform operations for the directory service under an access authority corresponding to the verification protocol being used, wherein the first verification protocol has the highest security level in the plurality of verification protocols, and the second verification protocol has the second-highest security level in the plurality of verification protocols, and the third verification protocol has a security level lower than the first and second verification protocols, and wherein the first verification protocol is an encrypted password protocol, the second verification protocol is a plain text password protocol, and the third verification protocol is an anonymous authentication protocol, and wherein, in a case in which a positive acknowledgement is not received from the server when the verification attempted to the server by said first, second, and third verification protocols, the established connection is disconnected. - View Dependent Claims (6)
-
Specification