[go: up one dir, main page]

CN115866145B - Image forming control method, device, system and storage medium - Google Patents

Image forming control method, device, system and storage medium

Info

Publication number
CN115866145B
CN115866145B CN202111124210.8A CN202111124210A CN115866145B CN 115866145 B CN115866145 B CN 115866145B CN 202111124210 A CN202111124210 A CN 202111124210A CN 115866145 B CN115866145 B CN 115866145B
Authority
CN
China
Prior art keywords
image forming
user
identity information
forming apparatus
user identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111124210.8A
Other languages
Chinese (zh)
Other versions
CN115866145A (en
Inventor
丁大军
肖志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Pantum Electronics Co Ltd
Original Assignee
Zhuhai Pantum Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Pantum Electronics Co Ltd filed Critical Zhuhai Pantum Electronics Co Ltd
Priority to CN202111124210.8A priority Critical patent/CN115866145B/en
Publication of CN115866145A publication Critical patent/CN115866145A/en
Application granted granted Critical
Publication of CN115866145B publication Critical patent/CN115866145B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Facsimiles In General (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

本申请提供一种图像形成控制方法、装置、系统及存储介质,涉及图像形成技术领域。图像形成控制方法,包括:验证图像形成装置的用户身份信息;在所述用户身份信息验证成功后,当未操作所述图像形成装置超过预设时间,锁定所述图像形成装置或者锁定当前使用所述图像形成装置的用户账号。在图像形成装置未被操作一段时间,通过锁定图像形成装置或者锁定当前使用所述图像形成装置的用户账号,避免非授权用户对图像形成装置进行非法操作的问题,从而增强图像形成装置的安全防护措施,提高图像形成装置的安全性。

The present application provides an image formation control method, device, system, and storage medium, relating to the field of image formation technology. The image formation control method includes: verifying the user identity information of an image forming device; after the user identity information is successfully verified, if the image forming device has not been operated for a preset time, locking the image forming device or locking the user account currently using the image forming device. When the image forming device has not been operated for a period of time, by locking the image forming device or locking the user account currently using the image forming device, the problem of unauthorized users illegally operating the image forming device is avoided, thereby enhancing the security protection measures of the image forming device and improving the security of the image forming device.

Description

Image forming control method, device, system and storage medium
Technical Field
The present invention relates to the field of image forming technologies, and in particular, to an image forming control method, apparatus, system, and storage medium.
Background
With advances in electronic science and technology, image forming apparatuses (Image forming apparatus) have also grown in development, but are being used as a type of computer peripheral device. At present, there are many cases where an image forming apparatus is used, and there are demands for use safety of the image forming apparatus, for example, some jobs are accompanied with secret information, and if the job is printed or copied by the image forming apparatus, the secret information is leaked when the job is taken out of the safety case.
Therefore, security control of the image forming apparatus is very important, especially in applications where security requirements are high. In the prior art, an image forming apparatus performs identity authentication on a user, and the image forming apparatus can be used after authentication, but sometimes, after the user is authenticated, the image forming apparatus is separated from the image forming apparatus due to special reasons or emergency matters, and is in an unlocked state, so that anyone can operate the image forming apparatus on behalf of the user, and the problem that an unauthorized user performs illegal operation on the image forming apparatus is easily caused. Therefore, the above-described image forming apparatus is insufficient in safety measures, and thus the user information, history print data, and safety information of the image forming apparatus are liable to be leaked.
Disclosure of Invention
In order to solve the problem that in the prior art, insufficient safety protection measures of an image forming device cause illegal operation of the image forming device by an unauthorized user, and leakage of user information, historical printing data and safety information of the image forming device is caused.
The application provides an image forming control method, comprising the following steps:
verifying user identity information of the image forming apparatus;
After the user identity information is successfully verified, when the image forming device is not operated for more than a preset time, locking the image forming device or locking a user account currently using the image forming device.
In one embodiment, the user identity information binds the functional rights of the image forming apparatus, the user identity information fails to verify, the remaining number of verifications reaches a first predetermined number, and the functional rights of the image forming apparatus are reduced.
In one embodiment, the first predetermined number of times includes at least one time threshold;
the reduction of the functional rights of the image forming apparatus includes reducing the functional rights of at least one of the image forming apparatuses;
And the user identity information verification fails, the residual verification times reach a first time threshold value of the first preset times, and at least one functional authority of the image forming device is reduced.
In one embodiment, the remaining number of authentications reaches a second predetermined number of times, a user is prohibited from using a functional right of the image forming apparatus, and/or the user identification information is deleted.
In one embodiment, the user identity information authentication failure is a continuous authentication failure.
In one embodiment, the user identity information verification is successful, and when the user identity information verification has the locking function authority, the image forming device can be remotely locked, and when the user identity information verification is successful, the image forming device can be remotely unlocked.
The present application also provides an image forming apparatus including:
A verification unit configured to verify user identity information of the image forming apparatus;
and the control unit is used for controlling to lock the image forming device or lock a user account currently using the image forming device when the image forming device is not operated for more than a preset time after the user identity information is successfully verified.
In one embodiment, the storage unit is used for storing the binding relation between the user identity information and the function authority of the image forming device;
and the control unit is used for controlling and reducing the functional authority of the image forming device when the user identity information fails to verify and the residual verification times reach the first preset times.
In one embodiment, the first predetermined number of times includes at least one time threshold;
the reduction of the functional rights of the image forming apparatus includes reducing the functional rights of at least one of the image forming apparatuses;
The control unit is used for controlling to reduce at least one functional authority of the image forming device when the user identity information is verified by the verification unit and the user identity information is failed to verify, and the residual verification times reach a first time threshold value of the first preset times.
In one embodiment, the control unit prohibits the user from using the function authority of the image forming apparatus and/or deletes the user identity information when the remaining number of times of authentication reaches a second predetermined number of times when the authentication unit authenticates the user identity information.
In one embodiment, the user identity information authentication failure is a continuous authentication failure.
In one embodiment, the remote locking unit is used for successfully verifying the user identity information, and can remotely lock the image forming device when the user identity information has the locking function authority, and the remote unlocking unit is used for successfully verifying the user identity information, and can remotely unlock the image forming device when the user identity information has the unlocking function authority.
The present application provides an image forming system including:
a mobile device for transmitting an instruction for controlling the image forming apparatus to the server according to a user instruction;
the server is used for verifying the user identity information, and controlling the image forming device according to the user instruction if the user identity information is verified;
The image forming apparatus unlocks or locks the image forming apparatus body according to an instruction of the server.
In one embodiment, the server is configured to store a binding relationship between the user identity information and a function authority of the image forming apparatus.
In one embodiment, the binding relationship between the user identity information and the functional rights of the image forming apparatus includes:
The user identification information, the unique identification information of the image forming apparatus, the functional rights authorized to use the image forming apparatus.
The present application also provides a computer readable storage medium comprising a stored program, wherein the program when run controls a device in which the computer readable storage medium is located to perform any one of the methods described above.
The image forming control method, the device, the system and the storage medium can conveniently and efficiently control the unlocking and locking of the image forming device, avoid the problem that an unauthorized user illegally operates the image forming device, further enhance the safety protection measures of the image forming device, improve the safety of the image forming device, limit the functional authority of the image forming device for users when the user identity information verification errors reach the preset times, form a safety protection mechanism for the image forming device, prevent the illegal personnel from maliciously using the image forming device, avoid the problem of data information leakage and protect the output information safety of the image forming device.
Drawings
For a clearer description of embodiments of the application or of the prior art, the drawings that are used in the description of the embodiments or of the prior art will be briefly described, it being apparent that the drawings in the description below are only some embodiments of the application, and that other drawings can be obtained from them without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an image forming control method according to an embodiment of the application;
FIG. 2 is a schematic diagram illustrating a connection between an image forming apparatus and a host device according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating an image forming control method according to an embodiment of the present application;
FIG. 4A is a schematic diagram of an image forming apparatus according to an embodiment of the present application;
FIG. 4B is a schematic diagram of another image forming apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of an image forming system according to an embodiment of the present application.
Detailed Description
In order that the application may be readily understood, a more complete description of the application will be rendered by reference to the appended drawings. The drawings illustrate preferred embodiments of the application. This application may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features in the embodiments may be combined with each other without conflict.
In the prior art, an image forming apparatus performs identity authentication on a user, and the image forming apparatus can be used after authentication, but sometimes, after the user is authenticated, the image forming apparatus is separated from the image forming apparatus due to special reasons or emergency matters, and is in an unlocked state, so that anyone can operate the image forming apparatus on behalf of the user, and the problem that an unauthorized user performs illegal operation on the image forming apparatus is easily caused.
Accordingly, the present application provides an image forming control method, apparatus, system, and storage medium, which prevent an unauthorized user from illegally operating an image forming apparatus by locking the image forming apparatus or locking a user account currently using the image forming apparatus when the user does not operate the image forming apparatus for a period of time, thereby enhancing security measures of the image forming apparatus and improving security of the image forming apparatus.
Referring to fig. 1, fig. 1 is a schematic diagram of an image forming control method according to an embodiment of the application, including:
S101, verifying user identity information of an image forming device;
the user identity information may be verified through an operation panel of the image forming apparatus or a connected external device. The external device may be one or more combinations of smart phones, mobile devices, computers, servers, wireless radio frequency authentication devices, biometric information authentication devices, and the like. The connection mode can be wire connection or wireless connection. For example, a user inputs a user ID and a password on an operation panel, or performs wireless Radio Frequency (RF) authentication through an external device, and authenticates biometric information of the user (fingerprint, iris, face recognition, etc.).
In one possible implementation, the user identity information may also be verified by verifying the external device identification information, for example, the mobile device is that the user identity information is bound to the mobile device identification information, and the mobile device identification information may be information that uniquely identifies the mobile device, such as a mobile device serial number. For example, the user X binds the mobile device a and the mobile device B, and the user X operates the image forming apparatus through the mobile device B, and only needs to obtain the identification information of the mobile device B at this time, the corresponding user X can be found, so as to verify the user identity information of the user X.
Image forming apparatuses include, but are not limited to, printers, copiers, facsimile machines, scanners, and multi-function peripherals that perform the above functions in a single device.
And S102, after the user identity information is successfully verified, when the unoperated image forming device exceeds a preset time, locking the image forming device or locking a user account currently using the image forming device.
Specifically, after the user identity information of the image forming apparatus is successfully verified, sometimes the user leaves the image forming apparatus for a special reason or emergency, and at this time, the image forming apparatus is still in an unlocked state, so that anyone can operate the image forming apparatus on behalf of the user, and the problem that an unauthorized user performs illegal operation on the image forming apparatus is easily caused. Thereby, a preset time can be set, and when the user does not operate the image forming apparatus for the preset time, the image forming apparatus is controlled to be locked or the user account currently using the image forming apparatus is controlled to be locked. The user wants to perform the image forming operation again, and needs to verify the user identification information again, and the image forming operation can be performed again after the verification. The image forming apparatus is locked, that is, the image forming apparatus is locked so as not to be used by all persons, and the user account currently using the image forming apparatus, in other words, the user account currently using the image forming apparatus is locked, but after the authentication of other users is successful, the image forming apparatus can still be operated.
The image forming control method can avoid the problem that an unauthorized user performs illegal operation on the image forming device, thereby enhancing the safety protection measures of the image forming device and improving the safety of the image forming device.
In one possible implementation manner, the image forming apparatus or the user account currently using the image forming apparatus can be controlled conveniently and efficiently by means of a mobile device or a server or the like to unlock or lock the image forming apparatus after passing the authentication. When the image forming device is possibly used maliciously by illegal personnel, the image forming device is better prevented from being used maliciously by the illegal personnel, and the protection safety of the image forming device is enhanced.
In addition, the image forming apparatus has only a simple function of authenticating a user, and the image forming apparatus can be used by authentication, such as inputting a user ID and a password, performing Radio Frequency (RF) authentication, authenticating biometric information of the user (fingerprint, iris, face recognition, etc.), and there is no limitation on the number of times of authentication, and if a cracking program is used to make a plurality of attempts, the image forming apparatus can be used illegally by an unauthorized user through the cracking program, and safety measures of the image forming apparatus are insufficient, thereby causing problems of leakage of user information, history print data, and safety information of the image forming apparatus.
In one implementation mode of the application, the image forming control method comprises the steps that user identity information is bound with the function authority of the image forming device, user identity information verification fails, the residual verification times reach a first preset times, and the function authority of the image forming device is reduced.
When the image forming device is started for the first time, a system administrator is arranged, after the passwords are forcedly modified, the system administrator sets the function authorities of the image forming devices of a plurality of users, each user identity information is bound with at least one function authority of the image forming device, and then when the image forming device is used, the image forming device acquires the binding relation between the user identity information and the function authorities of the image forming device according to the user identity information input by the user, and provides the function of the corresponding function authorities, for example, an interface for providing the corresponding function authorities on a display panel, and drives the function for providing corresponding function authority support. Wherein the user identity information may comprise a password.
In one possible implementation, each user identity information binds the functional authority of at least one image forming apparatus and the unique identification information of the image forming apparatus, and each image forming apparatus to which the user identity information is bound may be one or more, which is not limited herein.
Therefore, the embodiment of the application binds the functional authority of the image forming device through the user identity information, fails to verify the user identity information, and the residual verification times reach the first preset times, so that the functional authority of the image forming device of the user is reduced. Thereby enhancing the safety protection measures of the image forming device and avoiding the problems of leakage of user information, historical printing data and safety information.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating connection between an image forming apparatus 200 and host devices 201, 202 in an image forming control method according to an embodiment of the present application. The image forming apparatus 200 is connected to a host-side device, that is, an external device connected to the image forming apparatus, by way of a wired network, a wireless network, or a USB connection. After the user establishes a connection between his host device and the image forming apparatus 200, the user authentication is successful, and the image forming apparatus 200 is used according to the user's functional rights. Specifically, for example, when the user has the print function right, the image forming operation can be realized by outputting the file to be printed to the image forming apparatus through the print driver installed in the host side device. The host device may be one or more (e.g., 201, 202) that may be connected to one image forming apparatus 200 at a time, i.e., one or more users may use one image forming apparatus 200 at a time, and the number of host devices is not limited in the present application. The image forming control method according to the embodiment of the present application may be implemented in the image forming apparatus, or may be implemented in software, external links, hardware, or the like.
Referring to fig. 3, fig. 3 is a flowchart illustrating an image forming control method according to an embodiment of the present application, in which step S301 is performed to verify user identity information of an image forming apparatus, step S302 is performed when the user identity information is verified, step S302 is performed to skip step S303 when the user identity information is verified and the remaining verification times reach a first predetermined number, and step S303 is performed to reduce the functional authority of a user to use at least one image forming apparatus. In step S301, when the user identity information of the image forming apparatus is verified, the step S304 is skipped, and S304, the image forming apparatus is used according to the function authority after the user identity information is verified, i.e. according to the user identity information input by the user, the image forming apparatus can provide the function of the corresponding function authority, for example, an interface providing the corresponding function authority on the display panel, and the function providing the support of the corresponding function authority is driven.
Specifically, the functional rights of the image forming apparatus include, but are not limited to:
Basic functions include printing, copying, scanning, faxing, wire transmission (such as USB, etc.), wireless transmission (such as network, wi-Fi, etc.)
The safety function is data safety, transmission safety and panel lock;
the device management function is that firmware version information is checked, log inquiry and firmware update are carried out;
User management functions, including user data inquiry, modification, authority setting, restriction and release, unlocking and locking, user addition and deletion.
In one possible implementation, the user identity information may include a user level, e.g., the highest user level (i.e., system administrator) has all of the rights of the image forming apparatus, the higher user level (i.e., general administrator) has other rights than the user management function, the general user level (i.e., general user) has the rights of the security function and the base function, or only the rights of one or more base functions. If the user performs unauthorized operation on the image forming device, namely, performs operation except the function authority possessed by the user, the image forming device prompts that the user does not accord with the function authority, and audit log alarm information is generated for the unauthorized operation. For example, the user's functional rights are only provided with a print function, and the user initiates a scan function.
In one possible implementation, the first predetermined number of times may set at least one time threshold, and when the remaining number of authentications reaches the one time threshold, the user's functional rights to use the at least one image forming apparatus are reduced. For example, when authentication of the higher user level (i.e., a general administrator) fails and the remaining authentication times reach a first threshold of a first predetermined number of times, the first threshold of times may be set to 5 times, and the user is reduced from using the device management function authority in the image forming apparatus, i.e., the user is restricted from being able to use the device management function including firmware version information viewing, log inquiry, and firmware update, and then a second threshold of the first predetermined number of times is set to 3 times, and authentication of the higher user level still fails, and the remaining authentication times reach the first predetermined number of times again, i.e., the remaining authentication times are 3 times, at this time, the user is further reduced from using the security function authority in the image forming apparatus. Of course, the first predetermined number of times and the initial remaining verification number of times may be flexibly set according to security requirements at first, and the first predetermined number of times may set at least one or more number of times threshold.
The limitation of the user's inability to use includes, but is not limited to, cases where the limitation is not performed once, i.e., within a short period of time, e.g., within 1 hour, or on the day of the operation, i.e., 24 days before the day of the natural day, i.e., automatic release of the limitation from 0 to the next day, or within a predetermined period of time, e.g., 24 hours from the start of the operation of the image forming apparatus, and if the operation of the image forming apparatus is performed at 8 am, the automatic release of the limitation is performed at 8 am, or the limitation is performed since the operation of the image forming apparatus. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In addition, in one possible implementation, limiting the user from being able to use may also include limiting the image forming apparatus from being able to be used, i.e., limiting the image forming apparatus from being able to be used by the user and other users when the user authentication fails. In other words, the application comprises 1, limiting the function authority of the image forming device of the single user when the authentication of the identity information of the single user fails, and continuing to use the image forming device after the authentication of the identity information of other users succeeds, and 2, directly limiting the image forming device not to be used by the user and other users when the authentication of the identity information of the single user fails. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In one possible implementation, the initial remaining authentication number may be set according to a user level, the higher the user level, the safer the user is represented, the less likely the image forming apparatus is used illegally, so the highest user level (i.e., system administrator) is set to have the maximum initial remaining authentication number, while the general user level (i.e., general user) represents the user with a certain probability of having the image forming apparatus used illegally, so the initial remaining authentication number is set to be smaller. Of course, the initial remaining verification times can also be adjusted according to actual conditions.
In another possible implementation, the user's use of the function authority in the image forming apparatus is reduced, and the setting may be performed according to actual demands. For example, when the remaining verification times reach a first preset times, namely reach a first time threshold value of the first preset times, the firmware updating authority of the user in the equipment management function authority is reduced, and then when the remaining verification times reach the first preset times again, namely reach a second time threshold value of the first preset times, the log inquiry authority of the equipment management function authority is further reduced. The first predetermined number of times may set at least one or more times threshold, and reducing the user's use of the functional rights in the image forming apparatus may also reduce one or more functional rights.
Specifically, in step S304, the user identity information is successfully verified, and the image forming apparatus is used according to the function authority. That is, according to user identity information input by a user, the function authority of at least one image forming device bound with the user identity information is obtained, and the image forming device can provide functions of corresponding function authorities, including but not limited to an option interface for providing corresponding function authorities on a display panel, a function for providing corresponding function authority support is driven, and functions not in the range of the user function authorities can be turned off or gray display is disabled, so that the user cannot click normally.
In addition, in steps S301-S303, after the authentication of the user identity information fails and the functional authority of the user to use at least one image forming apparatus is reduced, step S305 further judges whether the remaining authentication number reaches a second predetermined number, and when judging whether the remaining authentication number reaches the second predetermined number, jumps to step S306 to prohibit the user from using the functional authority of the image forming apparatus and/or delete the user identity information. For example, the second predetermined number of times is set to 0 times, and when the number of times of remaining authentication of the user is 0 times, the user may be prohibited from using the function authority of the image forming apparatus for a higher user class (i.e., a general administrator), and for a general user class (i.e., a general user), the user may be retracted from using the function authority of the image forming apparatus and the user identification information may be deleted when the number of times of remaining authentication is 0 times.
In one possible implementation, when the verification time of the user identity information exceeds the second preset time, the user identity information may be regarded as failed to be verified, so as to reduce the functional authority of the user to use the at least one image forming apparatus.
In one possible implementation manner, the user identity information verification failure may be set as a continuous verification failure, that is, in the implementation manner of the foregoing embodiment, when the user identity information is continuously verified, it is judged whether the remaining verification times reach the first predetermined times and the second predetermined times, and the protection measures of the foregoing implementation manner are adopted.
In one possible implementation, the user identity information verification failure may include the following cases:
1. user identity information exists, but verification fails, and protective measures of the implementation mode can be adopted. For example, the system administrator sets that the user identity information is bound with the function authority, and the user identity information exists, but the password input fails during the user authentication.
2. The user identity information is completely absent, e.g. the system administrator does not set the user identity information, which is completely absent.
In view of the 2 nd situation, in the image forming control method according to the embodiment of the present application, all functions of the image forming apparatus may be locked or restricted until the highest user level (i.e., the system administrator) is unlocked or the user having the authority to release the restriction function is released, and audit log alarm information may be generated for this illegal operation. For example, illegitimate operations, user identity information does not exist.
In addition, when the maximum user-level remaining authentication number is too small to limit the authority to use the image forming apparatus or all functions of the image forming apparatus are prohibited from being used, the limit can be released by authentication of another maximum user level, and the remaining authentication number can be restored. Or when all the rights of the highest user level are limited or forbidden to be used, the image forming device can send warning information to the server of the manufacturer of the image forming device or inform the user of contacting the manufacturer of the image forming device through panel display, so that the user can conveniently and timely process the rights of the manufacturer of the image forming device, and the limitations are released on site or remotely, and the remote limitation releasing modes comprise modes including, but not limited to, mobile equipment, a cloud server and the like.
Similarly, when the authority of the higher user level or the general user level to limit the use of the image forming apparatus is too small or all functions of the image forming apparatus are prohibited from being used, it may be set to cancel the limitation by the authentication of the highest user level (i.e., the system administrator) and restore the remaining authentication number thereof. Of course, the authority to release the restriction of the higher user level may be granted according to actual needs.
The image forming control method provided by the application binds the functional authority of the image forming device through the user identity information, fails to verify the user identity information, and the residual verification times reach the first preset times, so that the functional authority of the image forming device of the user is reduced, the use of the functional authority of the image forming device by the user is limited, a safety protection mechanism is formed for the image forming device, the problem that data information is revealed due to malicious use of the image forming device by illegal personnel can be prevented, the self protection safety of the image forming device is enhanced, and the safety of the output information of the image forming device is protected.
Referring to fig. 4A, in a specific implementation, the present application further provides an image forming apparatus 400, including a verification unit 401 for verifying user identity information of the image forming apparatus 400, and a control unit 402 for controlling to lock the image forming apparatus 400 or to lock a user account currently using the image forming apparatus 400 when the image forming apparatus 400 is not operated for more than a preset time after the user identity information is verified successfully.
An authentication unit 401 for authenticating user identification information of the image forming apparatus 400. The user identity information may be verified through an operation panel of the image forming apparatus 400 or a connected external device. The external device may be one or more combinations of smart phones, mobile devices, computers, servers, wireless radio frequency authentication devices, biometric information authentication devices, and the like. The connection mode can be wire connection or wireless connection. For example, a user inputs a user ID and a password on an operation panel, or performs wireless Radio Frequency (RF) authentication through an external device, and authenticates biometric information of the user (fingerprint, iris, face recognition, etc.).
In one possible implementation, the user identity information may also be verified by verifying the external device identification information, for example, the mobile device is that the user identity information is bound to the mobile device identification information, and the mobile device identification information may be information that uniquely identifies the mobile device, such as a mobile device serial number. For example, the user X binds the mobile device a and the mobile device B, and the user X operates the image forming apparatus 400 through the mobile device B, and only needs to obtain the identification information of the mobile device B at this time, the corresponding user X can be found, so as to verify the user identity information of the user X.
The image forming apparatus 400 includes, but is not limited to, a printer, a copier, a facsimile machine, a scanner, and a multi-functional peripheral that performs the above functions in a single device.
And a control unit 402 for controlling to lock the image forming apparatus 400 or to lock a user account currently using the image forming apparatus 400 when the image forming apparatus 400 is not operated for more than a preset time after the user identity information is successfully verified. Specifically, after the user identification information of the image forming apparatus 400 is successfully verified, the user may leave the image forming apparatus 400 for a special reason or emergency, and the image forming apparatus 400 is still in an unlocked state, so that anyone can operate the image forming apparatus 400 on behalf of the user, and there is a problem that an unauthorized user may perform illegal operation on the image forming apparatus 400. Thereby, a preset time can be set, and when the user does not operate the image forming apparatus 400 for the preset time, the image forming apparatus 400 is controlled to be locked or the user account currently using the image forming apparatus 400 is locked. The user wants to perform the image forming operation again, and needs to verify the user identification information again, and the image forming operation can be performed again after the verification. Wherein the image forming apparatus 400 is locked, i.e., the image forming apparatus 400 is locked not to be used by the owner, and the user account currently using the image forming apparatus 400, in other words, the user account currently using the image forming apparatus 400 is locked, but after authentication of other users is successful, the image forming apparatus 400 can still be operated.
The image forming device can avoid the problem that an unauthorized user illegally operates the image forming device, thereby enhancing the safety protection measures of the image forming device and improving the safety of the image forming device.
In one possible implementation manner, the image forming apparatus 400 or the user account currently using the image forming apparatus 400 can be controlled conveniently and efficiently by remotely controlling the unlocking or locking of the image forming apparatus 400 by means of a mobile device or a server after passing the authentication. When the image forming device is possibly used maliciously by illegal personnel, the image forming device is better prevented from being used maliciously by the illegal personnel, and the protection safety of the image forming device is enhanced.
Referring to fig. 4B, in one possible implementation, the image forming apparatus 400 further includes a storage unit 403.
The control unit 402 is further configured to control to reduce the functional rights of the image forming apparatus 400 when the user identity information fails to verify, and the remaining number of times of verification reaches a first predetermined number of times.
When the image forming apparatus 400 is turned on for the first time, a system administrator is set, after the password is forcedly modified, the system administrator sets the functional rights of the image forming apparatus 400 for a plurality of users, each user identity information binds at least one functional right of the image forming apparatus 400, and the binding relationship between the user identity information and the functional rights of the image forming apparatus 400 is stored in the storage unit. Subsequently, when using the image forming apparatus 400, the image forming apparatus 400 acquires the binding relationship between the user identity information and the function rights of the image forming apparatus 400 from the storage unit 403 according to the user identity information input by the user, and provides the function of the corresponding function rights. For example, an interface for providing corresponding function rights on the display panel drives a function for providing corresponding function rights support. Wherein the user identity information may comprise a password.
In one possible implementation, each user identity information binds at least one of the functional rights of the image forming apparatus 400 and the unique identification information of the image forming apparatus 400, and each user identity information-bound image forming apparatus may be one or more, which is not limited herein.
Therefore, the binding relation between the user identity information and the function authority of the image forming apparatus 400 is stored by the storage unit 403, and the control unit 402 controls to reduce the function authority of the image forming apparatus 400 when the user identity information fails to verify and the remaining verification times reach the first predetermined times. Therefore, the safety protection measures of the image forming device are enhanced, illegal users are prevented from illegally operating the image forming device, and the safety of the image forming device is improved.
The memory unit 403 may also be used to store instructions for execution by a controller, and the memory unit 403 may be implemented by any type or combination of volatile or nonvolatile memory devices, such as a Static Random Access Memory (SRAM), an electrically erasable programmable read-only memory (EEPROM), an erasable programmable read-only memory (EPROM), a programmable read-only memory (PROM), a read-only memory (ROM), a magnetic memory unit, a flash memory unit, a magnetic or optical disk.
The authentication unit 401 includes an operation panel of the image forming apparatus or a connected external device to authenticate user identity information. The external device may be one or more combinations of smart phones, mobile devices, computers, servers, wireless radio frequency authentication devices, biometric information authentication devices, and the like. The connection mode can be wire connection or wireless connection. For example, a user inputs a user ID and a password on an operation panel, or performs wireless Radio Frequency (RF) authentication through an external device, and authenticates biometric information of the user (fingerprint, iris, face recognition, etc.).
When the authentication of the user identity information fails and the remaining authentication number reaches the first predetermined number, the control unit 402 controls to decrease the function authority of the image forming apparatus of the user. The control unit 402 may also connect various parts of the entire system using various interfaces and lines, by running or executing software programs and/or modules stored in the storage unit 403, and invoking data stored in the storage unit 403 to perform various functions of the image forming apparatus 400 and/or process data. The control unit 402 may be comprised of integrated circuits (INTEGRATED CIRCUIT, ICs), for example, a single packaged IC, or may be comprised of packaged ICs that connect multiple identical or different functions.
The image forming apparatus 400 may further include a communication unit (not shown in the drawing) for establishing a communication channel so that the storage unit 403 can communicate with other devices. Receiving user data sent by other devices or sending user data to other devices.
The components may communicate via one or more buses, and those skilled in the art will appreciate that the configuration of image forming apparatus 400 shown in the figures is not limiting of embodiments of the invention, and that it may be a bus-like structure, a star-like structure, or may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. The execution of the instructions in the memory unit 403, when executed by the control unit 402, enables the image forming apparatus 400 to perform some or all of the steps in the method embodiments described above.
When the authentication unit 401 authenticates the user identity information of the image forming apparatus 400, the user identity information authentication fails, and the remaining authentication number reaches the first predetermined number, the control unit 402 controls to decrease the function authority of at least one image forming apparatus 400. When the user identity information is successfully verified, the image forming apparatus 400 is used according to the function rights, that is, according to the user identity information input by the user, the image forming apparatus 400 provides the function of the corresponding function rights, for example, an interface for providing the corresponding function rights on the display panel drives the function for providing the support of the corresponding function rights.
Specifically, the functional rights of the image forming apparatus 400 include, but are not limited to:
basic functions, printing, copying, scanning, faxing, wired transmission (such as USB, etc.), wireless transmission (such as network, wi-Fi, etc.);
the safety function is data safety, transmission safety and panel lock;
the device management function is that firmware version information is checked, log inquiry and firmware update are carried out;
User management functions, including user data inquiry, modification, authority setting, restriction removal, unlocking, locking, user addition and deletion.
In one possible implementation, the user identity information may include a user level, e.g., the highest user level (i.e., system administrator) has all of the rights of image forming apparatus 400, the higher user level (i.e., general administrator) has other rights than the user management functions, the general user level (i.e., general user) has the rights of security functions and basic functions, or only one or more basic functions. If the user performs an operation of unauthorized authority on the image forming apparatus 400, that is, an operation other than the function authority possessed by the user, the image forming apparatus 400 prompts the user to be out of compliance with the function authority, and generates audit log alarm information for the operation of unauthorized authority. For example, the user's functional rights are only provided with a print function, and the user initiates a scan function.
In one possible implementation, the first predetermined number of times may set at least one time threshold, and when the remaining number of authentications reaches the one time threshold, the user's functional rights to use the at least one image forming apparatus are reduced. For example, when authentication of the higher user-level (i.e., general administrator) identity information fails by the authentication unit 401 and the remaining authentication number reaches a first number threshold of a first predetermined number of times, the first number threshold may be set to 5 times, the control unit 402 controls to reduce the authority of the user to use the device management function in the image forming apparatus 400, that is, to limit the user from being able to use the device management function including firmware version information viewing, log inquiry, firmware update, and then, sets a second number threshold of the first predetermined number of times to 3 times, and the higher user-level identity information authentication still fails, and the remaining authentication number reaches the first predetermined number of times again, that is, the remaining authentication number of times is 3 times, at which time the authority of the user to use the security function in the image forming apparatus 400 is further reduced. Of course, the first predetermined number of times and the initial remaining verification number of times may be flexibly set according to security requirements at first, and the first predetermined number of times may set at least one or more number of times threshold.
The limitation of the user's inability to use includes, but is not limited to, cases where the limitation is not performed once, i.e., within a short period of time, e.g., within 1 hour, or on the day of the operation, i.e., 24 days before the day of the natural day, i.e., automatic release of the limitation from 0 to the next day, or within a predetermined period of time, e.g., 24 hours from the start of the operation of the image forming apparatus, and if the operation of the image forming apparatus is performed at 8 am, the automatic release of the limitation is performed at 8 am, or the limitation is performed since the operation of the image forming apparatus. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In addition, in one possible implementation, limiting the user from being able to use may also include limiting the image forming apparatus from being able to be used, i.e., limiting the image forming apparatus from being able to be used by the user and other users when the user authentication fails. In other words, the application comprises 1, limiting the function authority of the image forming device of the single user when the authentication of the identity information of the single user fails, and continuing to use the image forming device after the authentication of the identity information of other users succeeds, and 2, directly limiting the image forming device not to be used by the user and other users when the authentication of the identity information of the single user fails. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In one possible implementation, the initial remaining authentication number may be set according to a user level, the higher the user level, the safer the user is represented, the less likely the image forming apparatus is used illegally, so the highest user level (i.e., system administrator) is set to have the maximum initial remaining authentication number, while the general user level (i.e., general user) represents the user with a certain probability of having the image forming apparatus used illegally, so the initial remaining authentication number is set to be smaller. Of course, the initial remaining verification times can also be adjusted according to actual conditions.
In another possible implementation, the reduction of the user's use of the function rights in the image forming apparatus 400 may also be set according to actual needs. For example, the verification unit 401 fails to verify the user identity information, and when the remaining verification times reach a first predetermined number of times, that is, reach a first time threshold of the first predetermined number of times, the control unit 402 reduces the firmware update authority in the user's use device management function authority, and then when the remaining verification times reach the first predetermined number of times again, that is, reach a second time threshold of the first predetermined number of times, the control unit 402 further reduces the log query authority in the device management function authority. The first predetermined number of times may set at least one or more times threshold, and reducing the user's use of the functional rights in the image forming apparatus 400 may also reduce one or more functional rights.
Specifically, when the user identification information verification is successful, the image forming apparatus 400 is used according to the function authority. That is, according to user identity information input by a user, at least one function authority of the image forming apparatus 400 bound with the user identity information is obtained, the image forming apparatus 400 can provide functions of corresponding function authorities, including but not limited to an option interface providing corresponding function authorities on a display panel, a function providing corresponding function authority support is driven, and functions not within the range of the user function authorities can be turned off or gray display is disabled, so that the user cannot click normally.
In addition, when the user identity information fails to be authenticated in the authentication unit 401, and after the functional authority of the user to use at least one image forming apparatus is reduced, the authentication unit 401 further judges whether the remaining authentication number reaches a second predetermined number, and when the remaining authentication number reaches the second predetermined number, the control unit 402 prohibits the user from using the functional authority of the image forming apparatus 400, and/or deletes the user identity information. For example, the second predetermined number of times is set to 0 times, and when the number of times of remaining authentication of the user is 0 times, the user may be prohibited from using the function authority of the image forming apparatus 400 for a higher user class (i.e., a general administrator), and for a general user class (i.e., a general user), the user may be retracted from using the function authority of the image forming apparatus 400 and the user identification information may be deleted when the number of times of remaining authentication is 0 times.
In one possible implementation, when the authentication time of the user identity information in the authentication unit 401 exceeds the second preset time, it may be regarded as a failure of authentication of the user identity information, and the control unit 402 controls to reduce the functional authority of the user to use the at least one image forming apparatus.
In one possible implementation manner, the user identity information verification failure may be set as a continuous verification failure, that is, in the implementation manner of the foregoing embodiment, when the user identity information is continuously verified, it is judged whether the remaining verification times reach the first predetermined times and the second predetermined times, and the protection measures of the foregoing implementation manner are adopted.
In one possible implementation, the user identity information verification failure may include the following cases:
1. user identity information exists, but verification fails, and protective measures of the implementation mode can be adopted. For example, the system administrator sets that the user identity information is bound with the function authority, and the user identity information exists, but the password input fails during the user authentication.
2. The user identity information is completely absent, e.g. the system administrator does not set the user identity information, which is completely absent.
In view of the 2 nd situation, in the image forming control method according to the embodiment of the present application, all functions of the image forming apparatus 400 may be locked or limited until the highest user level (i.e., the system administrator) is unlocked or the user with the authority to release the limitation function is released, and audit log alarm information may be generated for this illegal operation. For example, illegitimate operations, user identity information does not exist.
In addition, when the maximum user-level remaining authentication number is too small to limit the authority to use the image forming apparatus 400 or all functions of the image forming apparatus 400 are prohibited from being used, the limit can be released by authentication of another maximum user level, and the remaining authentication number can be restored. Or when all of the rights of the highest user level are restricted or prohibited from being used, the image forming apparatus 400 may send a warning message to the image forming apparatus manufacturer server or notify the user to contact the image forming apparatus manufacturer through a panel display, so that the image forming apparatus manufacturer can conveniently handle the information in time by an operation and maintenance personnel of the image forming apparatus manufacturer, and the restriction is released on site or remotely, and the remote release of the restriction is performed by means including, but not limited to, a mobile device, a cloud server, and the like.
Similarly, when the authority of the higher user level or the general user level to limit the use of the image forming apparatus 400 is too small or all functions of the image forming apparatus 400 are prohibited from being used, it may be set to cancel the limitation by the authentication of the highest user level (i.e., the system administrator) and restore the remaining authentication number thereof. Of course, the authority to release the restriction of the higher user level may be granted according to actual needs.
The image forming device 400 provided by the application has the advantages that the binding relation between the user identity information stored by the storage unit 403 and the functional authority of the image forming device is utilized, the user identity information is verified by the verification unit 401, the control unit 402 fails to verify the user identity information, the residual verification times reach the first preset times, the control unit 402 controls and reduces the functional authority of the image forming device 400, so that the functional authority of the image forming device 400 used by a user is limited, a safety protection mechanism is formed for the image forming device 400, the problem that data information is leaked due to malicious use of the image forming device 400 by an illegal person can be prevented, the self-protection safety of the image forming device 400 is enhanced, and the safety of information output by the image forming device 400 is protected.
Referring to fig. 5, an image forming system according to the present application includes a mobile device 501, a server 502, and an image forming apparatus 503. The mobile device 501 is used for sending an instruction for controlling the image forming device 503 to the server 502 according to a user instruction, the server 502 is used for storing the binding relation between the user identity information and the function authority of the image forming device 503 and verifying the user identity information, and controlling the image forming device 503 according to the instruction when the user identity information is verified, and the image forming device 503 unlocks or locks the body according to the instruction of the server 502.
The binding relationship between the user identity information and the functional authority of the image forming apparatus 503 includes user identity information (which may include a password), unique identification information of the image forming apparatus, and the functional authority to which the user is authorized to use the image forming apparatus 503.
Of course, the binding relationship between the user identity information and the functional authority of the image forming apparatus 503 may also include mobile device identification information. The mobile device identification information may be information that uniquely identifies the mobile device, such as an IP address, a serial number, etc. of the mobile device. Specifically, the user identity information may also be embodied by mobile device identification information, where the user identity information binds the mobile device identification information, and the server 502 may also store a binding relationship between the user identity information and the mobile device identification information, for example, the user X binds the mobile device a and the mobile device B, and the server 502 finds the corresponding user X through the identification information of the mobile device a and the mobile device B, so as to determine the functional authority of the image forming apparatus 503 of the user X according to the stored binding relationship between the user identity information and the functional authority of the image forming apparatus 503.
In addition, the mobile device identification information may be directly bound to the function authority of the image forming apparatus 503, and stored in the server 502, so that it is not necessary to store the user identity information, and whether the mobile device has the function authority of the image forming apparatus 503 or not is directly determined by the mobile device identification information, and the specific implementation manner is similar to the function authority of the image forming apparatus 503 bound to the user identity information, and the user identity information will be described below as an example.
When the image forming apparatus 503 is powered on for the first time, a system administrator is set, after the password is forcedly modified, the system administrator sets the functional rights (or including the initial password) of the image forming apparatus 503 for a plurality of users, each user identity information binds at least one functional rights of the image forming apparatus 503 and unique identification information of the image forming apparatus 503, and each image forming apparatus 503 to which the user identity information is bound may be one or more, which is not limited in this application.
When the user wants to unlock or lock the image forming apparatus 503, user identity information (may include a password) and an unlock or lock instruction are input on the mobile device 501, after the server 502 verifies the user identity information according to the user identity information (may include a password) input by the user, the binding relationship between the user identity information and the functional authority of the image forming apparatus 503 is obtained, and if the user has the functional authority of unlocking or locking, the image forming apparatus 503 is controlled to unlock or lock according to the unlock or lock instruction. When the server 502 fails to verify the user identity information according to the user identity information (which may include a password) input by the user, a message of the user identity information failure is sent to the mobile device 501, and an unlocking or locking instruction is discarded.
Through the image forming system, a user can conveniently and efficiently remotely control the unlocking or locking of the image forming device, so that illegal personnel can be prevented from maliciously using the image forming device, and the protection safety of the image forming device is enhanced.
In a specific implementation, the present application also provides a computer readable storage medium, where the computer readable storage medium may store a program, where the program may include some or all of the steps in the embodiments provided by the present application when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (random access memory RAM), or the like.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relation of association objects, and indicates that there may be three kinds of relations, for example, a and/or B, and may indicate that a alone exists, a and B together, and B alone exists. Wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in the embodiments disclosed herein can be implemented as a combination of electronic hardware, computer software, and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The foregoing is merely exemplary embodiments of the present application, and any person skilled in the art may easily conceive of changes or substitutions within the technical scope of the present application, which should be covered by the present application. The protection scope of the present application shall be subject to the protection scope of the claims.

Claims (14)

1. An image forming control method, characterized by comprising:
verifying user identity information of the image forming apparatus;
if the user identity information is successfully verified, when the image forming device is not operated for more than a preset time, locking the image forming device or locking a user account currently using the image forming device;
The image forming control method further comprises the steps that if the user identity information fails to verify, the residual verification times reach a first preset time, the function authority of the image forming device is reduced, the residual verification times reach a second preset time, the user is forbidden to use the function authority of the image forming device, and/or the user identity information is deleted.
2. The image forming control method according to claim 1, characterized by comprising:
the user identity information binds the functional rights of the image forming apparatus.
3. The image forming control method according to claim 2, characterized by comprising:
the first predetermined number of times includes at least one time threshold;
the reduction of the functional rights of the image forming apparatus includes reducing the functional rights of at least one of the image forming apparatuses;
And the user identity information verification fails, the residual verification times reach a first time threshold value of the first preset times, and at least one functional authority of the image forming device is reduced.
4. The image forming control method according to any one of claims 2 to 3, wherein,
The user identity information verification failure is a continuous verification failure.
5. The image forming control method according to claim 1, characterized by comprising:
The user identity information is successfully verified, and when the user identity information has the authority of a locking function, the image forming device or a user account currently using the image forming device can be remotely locked;
and the user identity information is successfully verified, and when the user identity information has unlocking function authority, the image forming device or a user account currently using the image forming device can be remotely unlocked.
6. An image forming apparatus, comprising:
A verification unit configured to verify user identity information of the image forming apparatus;
The control unit is used for controlling to lock the image forming device or locking a user account currently using the image forming device when the image forming device is not operated for more than a preset time after the user identity information is successfully verified;
The control unit controls to reduce the function authority of the image forming device when the authentication unit authenticates the user identity information, wherein when the authentication unit authenticates the user identity information, the remaining authentication times reach a first preset times, and when the authentication unit authenticates the user identity information, the remaining authentication times reach a second preset times, and the control unit prohibits the user from using the function authority of the image forming device and/or deletes the user identity information.
7. The image forming apparatus according to claim 6, comprising:
and the storage unit is used for storing the binding relation between the user identity information and the functional authority of the image forming device.
8. The image forming apparatus according to claim 7, comprising:
the first predetermined number of times includes at least one time threshold;
the reduction of the functional rights of the image forming apparatus includes reducing the functional rights of at least one of the image forming apparatuses;
The control unit is used for controlling to reduce at least one functional authority of the image forming device when the user identity information is verified by the verification unit and the user identity information is failed to verify, and the residual verification times reach a first time threshold value of the first preset times.
9. The image forming apparatus according to any one of claims 6 to 8, wherein,
The user identity information verification failure is a continuous verification failure.
10. The image forming apparatus according to claim 6, comprising:
the remote locking unit is used for successfully verifying the user identity information and remotely locking the image forming device when the user identity information has the locking function authority;
And the remote unlocking unit is used for successfully verifying the user identity information and remotely unlocking the image forming device when the user identity information has the unlocking function authority.
11. An image forming system, comprising:
a mobile device for transmitting an instruction for controlling the image forming apparatus to the server according to a user instruction;
the server is used for verifying the user identity information, and controlling the image forming device according to the user instruction if the user identity information is verified;
The image forming apparatus unlocks or locks the image forming apparatus body according to an instruction of the server, and executes the image forming control method according to any one of claims 1 to 5.
12. The image forming system according to claim 11, comprising:
the server is used for storing the binding relation between the user identity information and the function authority of the image forming device.
13. The image forming system according to claim 11, wherein the binding relationship of the user identity information and the functional rights of the image forming apparatus includes:
The user identification information, the unique identification information of the image forming apparatus, the functional rights authorized to use the image forming apparatus.
14. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored program, wherein the program, when run, controls a device in which the computer readable storage medium is located to perform the method of any one of claims 1-5.
CN202111124210.8A 2021-09-24 2021-09-24 Image forming control method, device, system and storage medium Active CN115866145B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111124210.8A CN115866145B (en) 2021-09-24 2021-09-24 Image forming control method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111124210.8A CN115866145B (en) 2021-09-24 2021-09-24 Image forming control method, device, system and storage medium

Publications (2)

Publication Number Publication Date
CN115866145A CN115866145A (en) 2023-03-28
CN115866145B true CN115866145B (en) 2025-08-19

Family

ID=85652655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111124210.8A Active CN115866145B (en) 2021-09-24 2021-09-24 Image forming control method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN115866145B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115510418A (en) * 2022-09-23 2022-12-23 珠海奔图电子有限公司 Image forming apparatus and control method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893802A (en) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 Method for locking/unlocking computer screen based on Bluetooth
CN106533861A (en) * 2016-11-18 2017-03-22 郑州信大捷安信息技术股份有限公司 Security control system and authentication method of smart home Internet of Things
CN112506452A (en) * 2020-12-02 2021-03-16 珠海奔图电子有限公司 Control method of control panel for image forming apparatus, and image forming apparatus

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4600268B2 (en) * 2005-12-15 2010-12-15 コニカミノルタビジネステクノロジーズ株式会社 Image forming apparatus
JP2008198028A (en) * 2007-02-14 2008-08-28 Sony Corp Wearable device, authentication method and program
JP2009064336A (en) * 2007-09-07 2009-03-26 Ricoh Co Ltd Image forming apparatus, lockout control method, and information recording medium
JP2016128219A (en) * 2015-01-09 2016-07-14 シャープ株式会社 Image forming apparatus
JP2017034523A (en) * 2015-08-04 2017-02-09 コニカミノルタ株式会社 Image processing device and operation control method and operation control program to be executed by the same device
CN105262823A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Method, apparatus and system for controlling terminal
SG11201908374PA (en) * 2017-03-23 2019-10-30 Jewel Paymentech Pte Ltd Systems and methods for user identity authentication
WO2019041243A1 (en) * 2017-08-31 2019-03-07 华为技术有限公司 Method for verifying function of fingerprint sensor and terminal
WO2019061525A1 (en) * 2017-09-30 2019-04-04 深圳传音通讯有限公司 Anti-theft processing method for mobile terminal, mobile terminal and readable storage medium
CN108810251A (en) * 2018-05-04 2018-11-13 珠海格力电器股份有限公司 Terminal unlocking method and device, storage medium and terminal
JP2020171001A (en) * 2019-04-05 2020-10-15 キヤノン株式会社 Information processing device, system, control method of information processing device, and program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893802A (en) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 Method for locking/unlocking computer screen based on Bluetooth
CN106533861A (en) * 2016-11-18 2017-03-22 郑州信大捷安信息技术股份有限公司 Security control system and authentication method of smart home Internet of Things
CN112506452A (en) * 2020-12-02 2021-03-16 珠海奔图电子有限公司 Control method of control panel for image forming apparatus, and image forming apparatus

Also Published As

Publication number Publication date
CN115866145A (en) 2023-03-28

Similar Documents

Publication Publication Date Title
EP1629624B1 (en) An in-curcuit security system and methods for controlling access to and use of sensitive data
CN100347989C (en) Two-pass device access management
US20060200857A1 (en) Certificate acquisition system, certificate acquisition method, management communication apparatus, certification authority, and computer readable recording medium
US9143328B2 (en) System and method for providing a system management command
JP5521764B2 (en) Information processing apparatus, authentication system, authentication method, authentication program, and recording medium
CN109756446B (en) Access method and system for vehicle-mounted equipment
JP6479723B2 (en) Secret key management system and secret key management method
US8400648B2 (en) Image forming apparatus, authentication method, and program
US9471808B2 (en) File management system and method
CN115866145B (en) Image forming control method, device, system and storage medium
JP4862551B2 (en) Authentication control program and authentication device
US20230179432A1 (en) Policies for hardware changes or cover opening in computing devices
JP2010074431A (en) Authentication function linkage equipment using external authentication, authentication function linkage system, and authentication function linkage program
CN112020718B (en) Integrity check of electronic devices
JP2011128888A (en) Information processor and control method and information processing program for information processor
JP5212718B2 (en) Platform integrity verification system and method
EP2479696A1 (en) Data security
JP7464846B2 (en) Mobile terminal management system and mobile terminal
JP2007179357A (en) Method for installing computer program
JP4836035B2 (en) DATA COMMUNICATION SYSTEM, DATA COMMUNICATION CONTROL METHOD, AND MODEM DEVICE
JP2018063492A (en) Authentication device, terminal device, image forming system and program
CN119513839A (en) Login verification method, device, equipment, medium and program product based on Ukey
JP2007172176A (en) Authentication device
CN107850973B (en) Unlocking method and device for touch equipment
CN120151097A (en) Safety authentication method and device, vehicle, equipment, storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant