Image forming apparatus and method of setting security policy thereof
First Claim
1. A method of setting security policy of an image forming apparatus which is connectable to an external device via a communication interface, is print related to a printing job and includes an open framework on which applications corresponding to at least one of a printing function, a copying function, a faxing function, a scanning function, a scan to personal computer (PC) function, and a scan to file transfer protocol (FTP) function are installed, the method comprising:
- accessing the external device storing at least one security provider corresponding to user authentication via the communication interface;
selecting the security provider;
receiving the selected security provider at the image forming apparatus;
installing the received security provider in the image forming apparatus;
selecting at least one application to apply the installed security provider and setting the installed security provider as a user authenticator for the at least one selected application;
mapping the at least one selected application onto the installed security provider and storing mapping information as a database;
displaying the stored database;
receiving a request to perform a function provided by the image forming apparatus;
performing authentication for the request function using a security provider corresponding to the requested function and a security information which is used to determine if a user requesting a function is an authenticated user and if the authenticated user has the authority to use the function; and
providing the requested function using an application corresponding to the request when the request is authenticated,wherein the security provider can indicate and/or identify a program which performs authentication and authorization control in the image forming apparatus.
6 Assignments
0 Petitions
Accused Products
Abstract
An image forming apparatus including a communication interface unit to access an external device storing at least one security provider corresponding to user authentication, a user interface (UI) unit to select the security provider, a storage unit to receive the selected security provider from the external device and store the received security provider, a control unit to install the stored security provider in the image forming apparatus, select at least one application to apply the installed security provider, and set the installed security provider as a user authenticator for the at least one selected application.
13 Citations
24 Claims
-
1. A method of setting security policy of an image forming apparatus which is connectable to an external device via a communication interface, is print related to a printing job and includes an open framework on which applications corresponding to at least one of a printing function, a copying function, a faxing function, a scanning function, a scan to personal computer (PC) function, and a scan to file transfer protocol (FTP) function are installed, the method comprising:
-
accessing the external device storing at least one security provider corresponding to user authentication via the communication interface; selecting the security provider; receiving the selected security provider at the image forming apparatus; installing the received security provider in the image forming apparatus; selecting at least one application to apply the installed security provider and setting the installed security provider as a user authenticator for the at least one selected application; mapping the at least one selected application onto the installed security provider and storing mapping information as a database; displaying the stored database; receiving a request to perform a function provided by the image forming apparatus; performing authentication for the request function using a security provider corresponding to the requested function and a security information which is used to determine if a user requesting a function is an authenticated user and if the authenticated user has the authority to use the function; and providing the requested function using an application corresponding to the request when the request is authenticated, wherein the security provider can indicate and/or identify a program which performs authentication and authorization control in the image forming apparatus. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of setting security policy of an image forming apparatus having a user interface unit and a control unit, the image forming apparatus being connectable to an external device via a communication interface and includes an open framework on which applications corresponding to at least one of a printing function, a copying function, a faxing function, a scanning function, a scan to personal computer (PC) function, and a scan to file transfer protocol (FTP) function are installed, the method comprising:
-
receiving a command to change the security policy of the image forming apparatus and receiving a request to perform a function provided by the image forming apparatus with the user interface unit; displaying the security policy set for the image forming apparatus and security providers installed in the image forming apparatus with the user interface unit; selecting at least one of the displayed security providers with the user interface unit; setting the selected security provider as a user authenticator for the plurality of applications with the control unit; selecting at least one application with the user interface unit to apply the selected security provider with the control unit, mapping the at least one selected application onto the selected security provider and storing mapping information as a database; displaying the stored database; receiving a request to perform a function provided by the image forming apparatus; and performing an authentication for the request using a security provider corresponding to the requested function and a security function which is used to determine if a user requesting a function is an authenticated user and if the authenticated user has the authority to use the function with the control unit; wherein the security provider can indicate and/or identify a program which performs authentication and authorization control in the image forming apparatus, and wherein the authentication is performed for a plurality of applications using different security providers. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An image forming apparatus which is connectable to an external device and includes an open framework on which applications corresponding to at least one of a printing function, a copying function, a faxing function, a scanning function, a scan to personal computer (PC) function, and a scan to file transfer protocol (FTP) function are installed, the image forming apparatus comprising:
-
a communication interface unit to access the external device storing at least one security provider corresponding to user authentication; a user interface (UI) unit to select the security provider; a storage unit to receive the selected security provider from the external device and store the received security provider; and a microprocessor to install the stored security provider in the image forming apparatus, select at least one application to apply the installed security provider, and set the installed security provider as a user authenticator for the at least one selected application, wherein the security provider can indicate and/or identify a program which performs authentication and authorization control in the image forming apparatus, wherein the storage unit maps the at least one selected application onto the installed security provider, stores mapping information as a database, and displays the stored database, and wherein the microprocessor performs authentication for a request function using a security provider corresponding to the requested function and a security information which is used to determine if a user requesting a function is an authenticated user and if the authenticated user has the authority to use the function when a request to perform a function provided by the image forming apparatus is received, and to provide the requested function using an application corresponding to the request when the request is authenticated. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method of setting security policy of an image forming apparatus which performs at least one of a printing function, a copying function, a faxing function, a scanning function, a scan to personal computer (PC) function, and a scan to file transfer protocol (FTP) function, the method comprising:
-
receiving a selection of at least one security provider stored on an external device that is communicatively coupled to the image forming apparatus, the at least one security provider to be installed on the image forming apparatus; installing the selected at least one security provider; selecting at least one application to apply the installed security provider; mapping the at least one selected application onto the installed security provider and storing mapping information as a database; displaying the stored database; setting the selected security provider as a user authenticator for at least one function of the image forming apparatus; receiving a request to perform a function provided by the image forming apparatus; performing authentication for the request function using a security provider corresponding to the requested function and a security information which is used to determine if a user requesting a function is an authenticated user and if the authenticated user has the authority to use the function; and providing the requested function using an application corresponding to the request when the request is authenticated, wherein the security provider can indicate and/or identify a program which performs authentication and authorization control in the image forming apparatus. - View Dependent Claims (18, 19, 20)
-
-
21. An image forming apparatus which performs at least one of a printing function, a copying function, a faxing function, a scanning function, a scan to personal computer (PC) function, and a scan to file transfer protocol (FTP) function, comprising:
-
an interface to receive a selection of at least one security provider stored on an external device that is communicatively coupled to the image forming apparatus, the at least one security provider to be installed on the image forming apparatus; and a microprocessor to install the selected at least one security provider on the image forming apparatus, and to set the selected security provider as a user authenticator for at least one function of the image forming apparatus, wherein the security provider can indicate and/or identify a program which performs authentication and authorization control in the image forming apparatus, and a storage unit maps the indicated and/or identified program onto the installed security provider, stores mapping information as a database, and displays the stored database, wherein the microprocessor performs authentication for a request function using a security provider corresponding to the requested function and a security information which is used to determine if a user requesting a function is an authenticated user and if the authenticated user has the authority to use the function when a request to perform a function provided by the image forming apparatus is received, and to provide the requested function using an application corresponding to the request when the request is authenticated. - View Dependent Claims (22, 23, 24)
-
Specification