×

Peripheral device, network system, communication processing method

  • US 8,689,002 B2
  • Filed: 01/21/2011
  • Issued: 04/01/2014
  • Est. Priority Date: 01/27/2010
  • Status: Active Grant
First Claim
Patent Images

1. A peripheral device, comprising:

  • an interface for connection to a wired or wireless LAN;

    a local interface for wireless connection; and

    a central processing unit configured to check a legitimacy of a user based on a user-specific certificate stored in a communication-function-equipped device upon being accessed through the local interface by the communication-function-equipped device using near-field wireless communication, and to allow a predetermined process to be performed upon successful authentication of the legitimacy,wherein the central processing unit is configured to allow the user to decide whether a process of disabling a lost user-specific certificate is performed when the lost user-specific certificate is used,wherein, when the process of disabling the lost user-specific certificate is performed, the peripheral device displays a notification for a disabled user-specific certificate on an operation display unit of the peripheral device, and registers a disabled status in the user-specific certificate,wherein, when the process of disabling the lost user-specific certificate is not performed, the authentication of the legitimacy is performed by the lost user-specific certificate, and a history of use of the lost user-specific certificate is checked upon establishing a successful authentication,wherein the central processing unit is further configured to determine whether the lost user-specific certificate is used in a predetermined period of time based on the history of the use of the lost user-specific certificate,wherein if the lost user-specific certificate is not used in the predetermined period of time it is determined whether a user for which the authentication is successful is a legitimate user, the user is authenticated as the legitimate user, and a completion of the authentication is displayed in the operation display unit, andwherein if the lost user-specific certificate is used in the predetermined period of time it is determined that the user for which the authentication is successful is the legitimate user, and the completion of the authentication is displayed in the operation display unit.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×