×

Image forming apparatus and control method for same

  • US 7,536,550 B2
  • Filed: 05/27/2003
  • Issued: 05/19/2009
  • Est. Priority Date: 05/29/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. An image processing apparatus capable of communicating with a server which provides a directory service via a network, the apparatus comprising:

  • establishing means for establishing a connection to the server using encrypted communication;

    first verification means for automatically selecting a first verification protocol out of a plurality of verification protocols having different security levels from each other upon establishing the connection, and attempting verification to the server using the first verification protocol;

    second verification means for automatically selecting a second verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgment from the server when said first verification means attempt verification to the server using the first verification protocol, and retrying verification to the server using the second verification protocol;

    third verification means for automatically selecting a third verification protocol out of the plurality of verification protocols upon receiving a negative acknowledgment from the server when said second verification means attempt verification to the server using the second verification protocol, and retrying verification to the server using the third verification protocol; and

    operation means for, in a case in which a positive acknowledgment is received from the server when the verification is attempted to the server by said first, second, or third verification means, performing operations for the directory service under an access authority corresponding to the selected verification protocol,wherein the first verification protocol has the highest security level in the plurality of verification protocols, the second verification protocol has the second-highest security level in the plurality of verification protocols, and the third verification protocol has a security level lower than the first and second verification protocols,and wherein the first verification protocol is an encrypted password protocol, the second verification protocol is a plain text password protocol, and the third verification protocol is an anonymous authentication protocol,and wherein, in a case in which a positive acknowledgment is not received from the server when the verification attempted to the server by said first, second, and third verification means, the connection established by said establishing means is disconnected.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×