×

Peripheral equipment and management method thereof

  • US 7,884,954 B2
  • Filed: 09/28/2001
  • Issued: 02/08/2011
  • Est. Priority Date: 10/02/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of controlling peripheral equipment connected to a network and managed by a directory server on the network, comprising:

  • a first receiving step of receiving a print job issued from an information processing apparatus on the network together with a first access ticket issued from the directory server, with the directory server being separate from the information processing apparatus;

    a storing step of storing the print job received in said first receiving step to a storing medium;

    a first decrypting step of decrypting the first access ticket received together with the print job in said first receiving step;

    a first control step of determining validity of the first access ticket received in said first receiving step based on the decrypting result of said first decrypting step and limiting execution of the print job received in said first receiving step;

    a second receiving step of receiving a management command from an information processing apparatus on the network together with a second access ticket issued from the directory server, at timing independent of said first receiving step, with the directory server being separate from the information processing apparatus;

    a second decrypting step of decrypting the second access ticket received together with the management command in said second receiving step; and

    a second control step of determining validity of the second access ticket received in said second receiving step based on the decrypting result of said second decrypting step and limiting execution of the management command,wherein in the case where the management command received in said second receiving step is one for deleting a specified print job stored in the storing medium, said second control step (a) obtains the decryption results of said first decrypting step for the first access ticket received together with the specified print job, (b) compares user information in the decryption results of said second decrypting step for the second access ticket received together with the management command for deleting the specified print job with user information in the obtained decryption results for the first access ticket, (c) limits execution of deleting the specified print job in the storing medium if the comparison indicates that the user information in the decryption results for the second access ticket does not correspond to the user information in the decryption results for the first access ticket, and (d) enables execution of deleting the specified print job in the storing medium if the comparison indicates that the user information in the decryption results for the second ticket corresponds to the user information in the decryption results for the first access ticket.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×