Detailed Description
In order that the application may be readily understood, a more complete description of the application will be rendered by reference to the appended drawings. The drawings illustrate preferred embodiments of the application. This application may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features in the embodiments may be combined with each other without conflict.
In the prior art, an image forming apparatus performs identity authentication on a user, and the image forming apparatus can be used after authentication, but sometimes, after the user is authenticated, the image forming apparatus is separated from the image forming apparatus due to special reasons or emergency matters, and is in an unlocked state, so that anyone can operate the image forming apparatus on behalf of the user, and the problem that an unauthorized user performs illegal operation on the image forming apparatus is easily caused.
Accordingly, the present application provides an image forming control method, apparatus, system, and storage medium, which prevent an unauthorized user from illegally operating an image forming apparatus by locking the image forming apparatus or locking a user account currently using the image forming apparatus when the user does not operate the image forming apparatus for a period of time, thereby enhancing security measures of the image forming apparatus and improving security of the image forming apparatus.
Referring to fig. 1, fig. 1 is a schematic diagram of an image forming control method according to an embodiment of the application, including:
S101, verifying user identity information of an image forming device;
the user identity information may be verified through an operation panel of the image forming apparatus or a connected external device. The external device may be one or more combinations of smart phones, mobile devices, computers, servers, wireless radio frequency authentication devices, biometric information authentication devices, and the like. The connection mode can be wire connection or wireless connection. For example, a user inputs a user ID and a password on an operation panel, or performs wireless Radio Frequency (RF) authentication through an external device, and authenticates biometric information of the user (fingerprint, iris, face recognition, etc.).
In one possible implementation, the user identity information may also be verified by verifying the external device identification information, for example, the mobile device is that the user identity information is bound to the mobile device identification information, and the mobile device identification information may be information that uniquely identifies the mobile device, such as a mobile device serial number. For example, the user X binds the mobile device a and the mobile device B, and the user X operates the image forming apparatus through the mobile device B, and only needs to obtain the identification information of the mobile device B at this time, the corresponding user X can be found, so as to verify the user identity information of the user X.
Image forming apparatuses include, but are not limited to, printers, copiers, facsimile machines, scanners, and multi-function peripherals that perform the above functions in a single device.
And S102, after the user identity information is successfully verified, when the unoperated image forming device exceeds a preset time, locking the image forming device or locking a user account currently using the image forming device.
Specifically, after the user identity information of the image forming apparatus is successfully verified, sometimes the user leaves the image forming apparatus for a special reason or emergency, and at this time, the image forming apparatus is still in an unlocked state, so that anyone can operate the image forming apparatus on behalf of the user, and the problem that an unauthorized user performs illegal operation on the image forming apparatus is easily caused. Thereby, a preset time can be set, and when the user does not operate the image forming apparatus for the preset time, the image forming apparatus is controlled to be locked or the user account currently using the image forming apparatus is controlled to be locked. The user wants to perform the image forming operation again, and needs to verify the user identification information again, and the image forming operation can be performed again after the verification. The image forming apparatus is locked, that is, the image forming apparatus is locked so as not to be used by all persons, and the user account currently using the image forming apparatus, in other words, the user account currently using the image forming apparatus is locked, but after the authentication of other users is successful, the image forming apparatus can still be operated.
The image forming control method can avoid the problem that an unauthorized user performs illegal operation on the image forming device, thereby enhancing the safety protection measures of the image forming device and improving the safety of the image forming device.
In one possible implementation manner, the image forming apparatus or the user account currently using the image forming apparatus can be controlled conveniently and efficiently by means of a mobile device or a server or the like to unlock or lock the image forming apparatus after passing the authentication. When the image forming device is possibly used maliciously by illegal personnel, the image forming device is better prevented from being used maliciously by the illegal personnel, and the protection safety of the image forming device is enhanced.
In addition, the image forming apparatus has only a simple function of authenticating a user, and the image forming apparatus can be used by authentication, such as inputting a user ID and a password, performing Radio Frequency (RF) authentication, authenticating biometric information of the user (fingerprint, iris, face recognition, etc.), and there is no limitation on the number of times of authentication, and if a cracking program is used to make a plurality of attempts, the image forming apparatus can be used illegally by an unauthorized user through the cracking program, and safety measures of the image forming apparatus are insufficient, thereby causing problems of leakage of user information, history print data, and safety information of the image forming apparatus.
In one implementation mode of the application, the image forming control method comprises the steps that user identity information is bound with the function authority of the image forming device, user identity information verification fails, the residual verification times reach a first preset times, and the function authority of the image forming device is reduced.
When the image forming device is started for the first time, a system administrator is arranged, after the passwords are forcedly modified, the system administrator sets the function authorities of the image forming devices of a plurality of users, each user identity information is bound with at least one function authority of the image forming device, and then when the image forming device is used, the image forming device acquires the binding relation between the user identity information and the function authorities of the image forming device according to the user identity information input by the user, and provides the function of the corresponding function authorities, for example, an interface for providing the corresponding function authorities on a display panel, and drives the function for providing corresponding function authority support. Wherein the user identity information may comprise a password.
In one possible implementation, each user identity information binds the functional authority of at least one image forming apparatus and the unique identification information of the image forming apparatus, and each image forming apparatus to which the user identity information is bound may be one or more, which is not limited herein.
Therefore, the embodiment of the application binds the functional authority of the image forming device through the user identity information, fails to verify the user identity information, and the residual verification times reach the first preset times, so that the functional authority of the image forming device of the user is reduced. Thereby enhancing the safety protection measures of the image forming device and avoiding the problems of leakage of user information, historical printing data and safety information.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating connection between an image forming apparatus 200 and host devices 201, 202 in an image forming control method according to an embodiment of the present application. The image forming apparatus 200 is connected to a host-side device, that is, an external device connected to the image forming apparatus, by way of a wired network, a wireless network, or a USB connection. After the user establishes a connection between his host device and the image forming apparatus 200, the user authentication is successful, and the image forming apparatus 200 is used according to the user's functional rights. Specifically, for example, when the user has the print function right, the image forming operation can be realized by outputting the file to be printed to the image forming apparatus through the print driver installed in the host side device. The host device may be one or more (e.g., 201, 202) that may be connected to one image forming apparatus 200 at a time, i.e., one or more users may use one image forming apparatus 200 at a time, and the number of host devices is not limited in the present application. The image forming control method according to the embodiment of the present application may be implemented in the image forming apparatus, or may be implemented in software, external links, hardware, or the like.
Referring to fig. 3, fig. 3 is a flowchart illustrating an image forming control method according to an embodiment of the present application, in which step S301 is performed to verify user identity information of an image forming apparatus, step S302 is performed when the user identity information is verified, step S302 is performed to skip step S303 when the user identity information is verified and the remaining verification times reach a first predetermined number, and step S303 is performed to reduce the functional authority of a user to use at least one image forming apparatus. In step S301, when the user identity information of the image forming apparatus is verified, the step S304 is skipped, and S304, the image forming apparatus is used according to the function authority after the user identity information is verified, i.e. according to the user identity information input by the user, the image forming apparatus can provide the function of the corresponding function authority, for example, an interface providing the corresponding function authority on the display panel, and the function providing the support of the corresponding function authority is driven.
Specifically, the functional rights of the image forming apparatus include, but are not limited to:
Basic functions include printing, copying, scanning, faxing, wire transmission (such as USB, etc.), wireless transmission (such as network, wi-Fi, etc.)
The safety function is data safety, transmission safety and panel lock;
the device management function is that firmware version information is checked, log inquiry and firmware update are carried out;
User management functions, including user data inquiry, modification, authority setting, restriction and release, unlocking and locking, user addition and deletion.
In one possible implementation, the user identity information may include a user level, e.g., the highest user level (i.e., system administrator) has all of the rights of the image forming apparatus, the higher user level (i.e., general administrator) has other rights than the user management function, the general user level (i.e., general user) has the rights of the security function and the base function, or only the rights of one or more base functions. If the user performs unauthorized operation on the image forming device, namely, performs operation except the function authority possessed by the user, the image forming device prompts that the user does not accord with the function authority, and audit log alarm information is generated for the unauthorized operation. For example, the user's functional rights are only provided with a print function, and the user initiates a scan function.
In one possible implementation, the first predetermined number of times may set at least one time threshold, and when the remaining number of authentications reaches the one time threshold, the user's functional rights to use the at least one image forming apparatus are reduced. For example, when authentication of the higher user level (i.e., a general administrator) fails and the remaining authentication times reach a first threshold of a first predetermined number of times, the first threshold of times may be set to 5 times, and the user is reduced from using the device management function authority in the image forming apparatus, i.e., the user is restricted from being able to use the device management function including firmware version information viewing, log inquiry, and firmware update, and then a second threshold of the first predetermined number of times is set to 3 times, and authentication of the higher user level still fails, and the remaining authentication times reach the first predetermined number of times again, i.e., the remaining authentication times are 3 times, at this time, the user is further reduced from using the security function authority in the image forming apparatus. Of course, the first predetermined number of times and the initial remaining verification number of times may be flexibly set according to security requirements at first, and the first predetermined number of times may set at least one or more number of times threshold.
The limitation of the user's inability to use includes, but is not limited to, cases where the limitation is not performed once, i.e., within a short period of time, e.g., within 1 hour, or on the day of the operation, i.e., 24 days before the day of the natural day, i.e., automatic release of the limitation from 0 to the next day, or within a predetermined period of time, e.g., 24 hours from the start of the operation of the image forming apparatus, and if the operation of the image forming apparatus is performed at 8 am, the automatic release of the limitation is performed at 8 am, or the limitation is performed since the operation of the image forming apparatus. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In addition, in one possible implementation, limiting the user from being able to use may also include limiting the image forming apparatus from being able to be used, i.e., limiting the image forming apparatus from being able to be used by the user and other users when the user authentication fails. In other words, the application comprises 1, limiting the function authority of the image forming device of the single user when the authentication of the identity information of the single user fails, and continuing to use the image forming device after the authentication of the identity information of other users succeeds, and 2, directly limiting the image forming device not to be used by the user and other users when the authentication of the identity information of the single user fails. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In one possible implementation, the initial remaining authentication number may be set according to a user level, the higher the user level, the safer the user is represented, the less likely the image forming apparatus is used illegally, so the highest user level (i.e., system administrator) is set to have the maximum initial remaining authentication number, while the general user level (i.e., general user) represents the user with a certain probability of having the image forming apparatus used illegally, so the initial remaining authentication number is set to be smaller. Of course, the initial remaining verification times can also be adjusted according to actual conditions.
In another possible implementation, the user's use of the function authority in the image forming apparatus is reduced, and the setting may be performed according to actual demands. For example, when the remaining verification times reach a first preset times, namely reach a first time threshold value of the first preset times, the firmware updating authority of the user in the equipment management function authority is reduced, and then when the remaining verification times reach the first preset times again, namely reach a second time threshold value of the first preset times, the log inquiry authority of the equipment management function authority is further reduced. The first predetermined number of times may set at least one or more times threshold, and reducing the user's use of the functional rights in the image forming apparatus may also reduce one or more functional rights.
Specifically, in step S304, the user identity information is successfully verified, and the image forming apparatus is used according to the function authority. That is, according to user identity information input by a user, the function authority of at least one image forming device bound with the user identity information is obtained, and the image forming device can provide functions of corresponding function authorities, including but not limited to an option interface for providing corresponding function authorities on a display panel, a function for providing corresponding function authority support is driven, and functions not in the range of the user function authorities can be turned off or gray display is disabled, so that the user cannot click normally.
In addition, in steps S301-S303, after the authentication of the user identity information fails and the functional authority of the user to use at least one image forming apparatus is reduced, step S305 further judges whether the remaining authentication number reaches a second predetermined number, and when judging whether the remaining authentication number reaches the second predetermined number, jumps to step S306 to prohibit the user from using the functional authority of the image forming apparatus and/or delete the user identity information. For example, the second predetermined number of times is set to 0 times, and when the number of times of remaining authentication of the user is 0 times, the user may be prohibited from using the function authority of the image forming apparatus for a higher user class (i.e., a general administrator), and for a general user class (i.e., a general user), the user may be retracted from using the function authority of the image forming apparatus and the user identification information may be deleted when the number of times of remaining authentication is 0 times.
In one possible implementation, when the verification time of the user identity information exceeds the second preset time, the user identity information may be regarded as failed to be verified, so as to reduce the functional authority of the user to use the at least one image forming apparatus.
In one possible implementation manner, the user identity information verification failure may be set as a continuous verification failure, that is, in the implementation manner of the foregoing embodiment, when the user identity information is continuously verified, it is judged whether the remaining verification times reach the first predetermined times and the second predetermined times, and the protection measures of the foregoing implementation manner are adopted.
In one possible implementation, the user identity information verification failure may include the following cases:
1. user identity information exists, but verification fails, and protective measures of the implementation mode can be adopted. For example, the system administrator sets that the user identity information is bound with the function authority, and the user identity information exists, but the password input fails during the user authentication.
2. The user identity information is completely absent, e.g. the system administrator does not set the user identity information, which is completely absent.
In view of the 2 nd situation, in the image forming control method according to the embodiment of the present application, all functions of the image forming apparatus may be locked or restricted until the highest user level (i.e., the system administrator) is unlocked or the user having the authority to release the restriction function is released, and audit log alarm information may be generated for this illegal operation. For example, illegitimate operations, user identity information does not exist.
In addition, when the maximum user-level remaining authentication number is too small to limit the authority to use the image forming apparatus or all functions of the image forming apparatus are prohibited from being used, the limit can be released by authentication of another maximum user level, and the remaining authentication number can be restored. Or when all the rights of the highest user level are limited or forbidden to be used, the image forming device can send warning information to the server of the manufacturer of the image forming device or inform the user of contacting the manufacturer of the image forming device through panel display, so that the user can conveniently and timely process the rights of the manufacturer of the image forming device, and the limitations are released on site or remotely, and the remote limitation releasing modes comprise modes including, but not limited to, mobile equipment, a cloud server and the like.
Similarly, when the authority of the higher user level or the general user level to limit the use of the image forming apparatus is too small or all functions of the image forming apparatus are prohibited from being used, it may be set to cancel the limitation by the authentication of the highest user level (i.e., the system administrator) and restore the remaining authentication number thereof. Of course, the authority to release the restriction of the higher user level may be granted according to actual needs.
The image forming control method provided by the application binds the functional authority of the image forming device through the user identity information, fails to verify the user identity information, and the residual verification times reach the first preset times, so that the functional authority of the image forming device of the user is reduced, the use of the functional authority of the image forming device by the user is limited, a safety protection mechanism is formed for the image forming device, the problem that data information is revealed due to malicious use of the image forming device by illegal personnel can be prevented, the self protection safety of the image forming device is enhanced, and the safety of the output information of the image forming device is protected.
Referring to fig. 4A, in a specific implementation, the present application further provides an image forming apparatus 400, including a verification unit 401 for verifying user identity information of the image forming apparatus 400, and a control unit 402 for controlling to lock the image forming apparatus 400 or to lock a user account currently using the image forming apparatus 400 when the image forming apparatus 400 is not operated for more than a preset time after the user identity information is verified successfully.
An authentication unit 401 for authenticating user identification information of the image forming apparatus 400. The user identity information may be verified through an operation panel of the image forming apparatus 400 or a connected external device. The external device may be one or more combinations of smart phones, mobile devices, computers, servers, wireless radio frequency authentication devices, biometric information authentication devices, and the like. The connection mode can be wire connection or wireless connection. For example, a user inputs a user ID and a password on an operation panel, or performs wireless Radio Frequency (RF) authentication through an external device, and authenticates biometric information of the user (fingerprint, iris, face recognition, etc.).
In one possible implementation, the user identity information may also be verified by verifying the external device identification information, for example, the mobile device is that the user identity information is bound to the mobile device identification information, and the mobile device identification information may be information that uniquely identifies the mobile device, such as a mobile device serial number. For example, the user X binds the mobile device a and the mobile device B, and the user X operates the image forming apparatus 400 through the mobile device B, and only needs to obtain the identification information of the mobile device B at this time, the corresponding user X can be found, so as to verify the user identity information of the user X.
The image forming apparatus 400 includes, but is not limited to, a printer, a copier, a facsimile machine, a scanner, and a multi-functional peripheral that performs the above functions in a single device.
And a control unit 402 for controlling to lock the image forming apparatus 400 or to lock a user account currently using the image forming apparatus 400 when the image forming apparatus 400 is not operated for more than a preset time after the user identity information is successfully verified. Specifically, after the user identification information of the image forming apparatus 400 is successfully verified, the user may leave the image forming apparatus 400 for a special reason or emergency, and the image forming apparatus 400 is still in an unlocked state, so that anyone can operate the image forming apparatus 400 on behalf of the user, and there is a problem that an unauthorized user may perform illegal operation on the image forming apparatus 400. Thereby, a preset time can be set, and when the user does not operate the image forming apparatus 400 for the preset time, the image forming apparatus 400 is controlled to be locked or the user account currently using the image forming apparatus 400 is locked. The user wants to perform the image forming operation again, and needs to verify the user identification information again, and the image forming operation can be performed again after the verification. Wherein the image forming apparatus 400 is locked, i.e., the image forming apparatus 400 is locked not to be used by the owner, and the user account currently using the image forming apparatus 400, in other words, the user account currently using the image forming apparatus 400 is locked, but after authentication of other users is successful, the image forming apparatus 400 can still be operated.
The image forming device can avoid the problem that an unauthorized user illegally operates the image forming device, thereby enhancing the safety protection measures of the image forming device and improving the safety of the image forming device.
In one possible implementation manner, the image forming apparatus 400 or the user account currently using the image forming apparatus 400 can be controlled conveniently and efficiently by remotely controlling the unlocking or locking of the image forming apparatus 400 by means of a mobile device or a server after passing the authentication. When the image forming device is possibly used maliciously by illegal personnel, the image forming device is better prevented from being used maliciously by the illegal personnel, and the protection safety of the image forming device is enhanced.
Referring to fig. 4B, in one possible implementation, the image forming apparatus 400 further includes a storage unit 403.
The control unit 402 is further configured to control to reduce the functional rights of the image forming apparatus 400 when the user identity information fails to verify, and the remaining number of times of verification reaches a first predetermined number of times.
When the image forming apparatus 400 is turned on for the first time, a system administrator is set, after the password is forcedly modified, the system administrator sets the functional rights of the image forming apparatus 400 for a plurality of users, each user identity information binds at least one functional right of the image forming apparatus 400, and the binding relationship between the user identity information and the functional rights of the image forming apparatus 400 is stored in the storage unit. Subsequently, when using the image forming apparatus 400, the image forming apparatus 400 acquires the binding relationship between the user identity information and the function rights of the image forming apparatus 400 from the storage unit 403 according to the user identity information input by the user, and provides the function of the corresponding function rights. For example, an interface for providing corresponding function rights on the display panel drives a function for providing corresponding function rights support. Wherein the user identity information may comprise a password.
In one possible implementation, each user identity information binds at least one of the functional rights of the image forming apparatus 400 and the unique identification information of the image forming apparatus 400, and each user identity information-bound image forming apparatus may be one or more, which is not limited herein.
Therefore, the binding relation between the user identity information and the function authority of the image forming apparatus 400 is stored by the storage unit 403, and the control unit 402 controls to reduce the function authority of the image forming apparatus 400 when the user identity information fails to verify and the remaining verification times reach the first predetermined times. Therefore, the safety protection measures of the image forming device are enhanced, illegal users are prevented from illegally operating the image forming device, and the safety of the image forming device is improved.
The memory unit 403 may also be used to store instructions for execution by a controller, and the memory unit 403 may be implemented by any type or combination of volatile or nonvolatile memory devices, such as a Static Random Access Memory (SRAM), an electrically erasable programmable read-only memory (EEPROM), an erasable programmable read-only memory (EPROM), a programmable read-only memory (PROM), a read-only memory (ROM), a magnetic memory unit, a flash memory unit, a magnetic or optical disk.
The authentication unit 401 includes an operation panel of the image forming apparatus or a connected external device to authenticate user identity information. The external device may be one or more combinations of smart phones, mobile devices, computers, servers, wireless radio frequency authentication devices, biometric information authentication devices, and the like. The connection mode can be wire connection or wireless connection. For example, a user inputs a user ID and a password on an operation panel, or performs wireless Radio Frequency (RF) authentication through an external device, and authenticates biometric information of the user (fingerprint, iris, face recognition, etc.).
When the authentication of the user identity information fails and the remaining authentication number reaches the first predetermined number, the control unit 402 controls to decrease the function authority of the image forming apparatus of the user. The control unit 402 may also connect various parts of the entire system using various interfaces and lines, by running or executing software programs and/or modules stored in the storage unit 403, and invoking data stored in the storage unit 403 to perform various functions of the image forming apparatus 400 and/or process data. The control unit 402 may be comprised of integrated circuits (INTEGRATED CIRCUIT, ICs), for example, a single packaged IC, or may be comprised of packaged ICs that connect multiple identical or different functions.
The image forming apparatus 400 may further include a communication unit (not shown in the drawing) for establishing a communication channel so that the storage unit 403 can communicate with other devices. Receiving user data sent by other devices or sending user data to other devices.
The components may communicate via one or more buses, and those skilled in the art will appreciate that the configuration of image forming apparatus 400 shown in the figures is not limiting of embodiments of the invention, and that it may be a bus-like structure, a star-like structure, or may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. The execution of the instructions in the memory unit 403, when executed by the control unit 402, enables the image forming apparatus 400 to perform some or all of the steps in the method embodiments described above.
When the authentication unit 401 authenticates the user identity information of the image forming apparatus 400, the user identity information authentication fails, and the remaining authentication number reaches the first predetermined number, the control unit 402 controls to decrease the function authority of at least one image forming apparatus 400. When the user identity information is successfully verified, the image forming apparatus 400 is used according to the function rights, that is, according to the user identity information input by the user, the image forming apparatus 400 provides the function of the corresponding function rights, for example, an interface for providing the corresponding function rights on the display panel drives the function for providing the support of the corresponding function rights.
Specifically, the functional rights of the image forming apparatus 400 include, but are not limited to:
basic functions, printing, copying, scanning, faxing, wired transmission (such as USB, etc.), wireless transmission (such as network, wi-Fi, etc.);
the safety function is data safety, transmission safety and panel lock;
the device management function is that firmware version information is checked, log inquiry and firmware update are carried out;
User management functions, including user data inquiry, modification, authority setting, restriction removal, unlocking, locking, user addition and deletion.
In one possible implementation, the user identity information may include a user level, e.g., the highest user level (i.e., system administrator) has all of the rights of image forming apparatus 400, the higher user level (i.e., general administrator) has other rights than the user management functions, the general user level (i.e., general user) has the rights of security functions and basic functions, or only one or more basic functions. If the user performs an operation of unauthorized authority on the image forming apparatus 400, that is, an operation other than the function authority possessed by the user, the image forming apparatus 400 prompts the user to be out of compliance with the function authority, and generates audit log alarm information for the operation of unauthorized authority. For example, the user's functional rights are only provided with a print function, and the user initiates a scan function.
In one possible implementation, the first predetermined number of times may set at least one time threshold, and when the remaining number of authentications reaches the one time threshold, the user's functional rights to use the at least one image forming apparatus are reduced. For example, when authentication of the higher user-level (i.e., general administrator) identity information fails by the authentication unit 401 and the remaining authentication number reaches a first number threshold of a first predetermined number of times, the first number threshold may be set to 5 times, the control unit 402 controls to reduce the authority of the user to use the device management function in the image forming apparatus 400, that is, to limit the user from being able to use the device management function including firmware version information viewing, log inquiry, firmware update, and then, sets a second number threshold of the first predetermined number of times to 3 times, and the higher user-level identity information authentication still fails, and the remaining authentication number reaches the first predetermined number of times again, that is, the remaining authentication number of times is 3 times, at which time the authority of the user to use the security function in the image forming apparatus 400 is further reduced. Of course, the first predetermined number of times and the initial remaining verification number of times may be flexibly set according to security requirements at first, and the first predetermined number of times may set at least one or more number of times threshold.
The limitation of the user's inability to use includes, but is not limited to, cases where the limitation is not performed once, i.e., within a short period of time, e.g., within 1 hour, or on the day of the operation, i.e., 24 days before the day of the natural day, i.e., automatic release of the limitation from 0 to the next day, or within a predetermined period of time, e.g., 24 hours from the start of the operation of the image forming apparatus, and if the operation of the image forming apparatus is performed at 8 am, the automatic release of the limitation is performed at 8 am, or the limitation is performed since the operation of the image forming apparatus. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In addition, in one possible implementation, limiting the user from being able to use may also include limiting the image forming apparatus from being able to be used, i.e., limiting the image forming apparatus from being able to be used by the user and other users when the user authentication fails. In other words, the application comprises 1, limiting the function authority of the image forming device of the single user when the authentication of the identity information of the single user fails, and continuing to use the image forming device after the authentication of the identity information of other users succeeds, and 2, directly limiting the image forming device not to be used by the user and other users when the authentication of the identity information of the single user fails. The user is limited to be unable to use, and the adjustment can be carried out according to actual demands.
In one possible implementation, the initial remaining authentication number may be set according to a user level, the higher the user level, the safer the user is represented, the less likely the image forming apparatus is used illegally, so the highest user level (i.e., system administrator) is set to have the maximum initial remaining authentication number, while the general user level (i.e., general user) represents the user with a certain probability of having the image forming apparatus used illegally, so the initial remaining authentication number is set to be smaller. Of course, the initial remaining verification times can also be adjusted according to actual conditions.
In another possible implementation, the reduction of the user's use of the function rights in the image forming apparatus 400 may also be set according to actual needs. For example, the verification unit 401 fails to verify the user identity information, and when the remaining verification times reach a first predetermined number of times, that is, reach a first time threshold of the first predetermined number of times, the control unit 402 reduces the firmware update authority in the user's use device management function authority, and then when the remaining verification times reach the first predetermined number of times again, that is, reach a second time threshold of the first predetermined number of times, the control unit 402 further reduces the log query authority in the device management function authority. The first predetermined number of times may set at least one or more times threshold, and reducing the user's use of the functional rights in the image forming apparatus 400 may also reduce one or more functional rights.
Specifically, when the user identification information verification is successful, the image forming apparatus 400 is used according to the function authority. That is, according to user identity information input by a user, at least one function authority of the image forming apparatus 400 bound with the user identity information is obtained, the image forming apparatus 400 can provide functions of corresponding function authorities, including but not limited to an option interface providing corresponding function authorities on a display panel, a function providing corresponding function authority support is driven, and functions not within the range of the user function authorities can be turned off or gray display is disabled, so that the user cannot click normally.
In addition, when the user identity information fails to be authenticated in the authentication unit 401, and after the functional authority of the user to use at least one image forming apparatus is reduced, the authentication unit 401 further judges whether the remaining authentication number reaches a second predetermined number, and when the remaining authentication number reaches the second predetermined number, the control unit 402 prohibits the user from using the functional authority of the image forming apparatus 400, and/or deletes the user identity information. For example, the second predetermined number of times is set to 0 times, and when the number of times of remaining authentication of the user is 0 times, the user may be prohibited from using the function authority of the image forming apparatus 400 for a higher user class (i.e., a general administrator), and for a general user class (i.e., a general user), the user may be retracted from using the function authority of the image forming apparatus 400 and the user identification information may be deleted when the number of times of remaining authentication is 0 times.
In one possible implementation, when the authentication time of the user identity information in the authentication unit 401 exceeds the second preset time, it may be regarded as a failure of authentication of the user identity information, and the control unit 402 controls to reduce the functional authority of the user to use the at least one image forming apparatus.
In one possible implementation manner, the user identity information verification failure may be set as a continuous verification failure, that is, in the implementation manner of the foregoing embodiment, when the user identity information is continuously verified, it is judged whether the remaining verification times reach the first predetermined times and the second predetermined times, and the protection measures of the foregoing implementation manner are adopted.
In one possible implementation, the user identity information verification failure may include the following cases:
1. user identity information exists, but verification fails, and protective measures of the implementation mode can be adopted. For example, the system administrator sets that the user identity information is bound with the function authority, and the user identity information exists, but the password input fails during the user authentication.
2. The user identity information is completely absent, e.g. the system administrator does not set the user identity information, which is completely absent.
In view of the 2 nd situation, in the image forming control method according to the embodiment of the present application, all functions of the image forming apparatus 400 may be locked or limited until the highest user level (i.e., the system administrator) is unlocked or the user with the authority to release the limitation function is released, and audit log alarm information may be generated for this illegal operation. For example, illegitimate operations, user identity information does not exist.
In addition, when the maximum user-level remaining authentication number is too small to limit the authority to use the image forming apparatus 400 or all functions of the image forming apparatus 400 are prohibited from being used, the limit can be released by authentication of another maximum user level, and the remaining authentication number can be restored. Or when all of the rights of the highest user level are restricted or prohibited from being used, the image forming apparatus 400 may send a warning message to the image forming apparatus manufacturer server or notify the user to contact the image forming apparatus manufacturer through a panel display, so that the image forming apparatus manufacturer can conveniently handle the information in time by an operation and maintenance personnel of the image forming apparatus manufacturer, and the restriction is released on site or remotely, and the remote release of the restriction is performed by means including, but not limited to, a mobile device, a cloud server, and the like.
Similarly, when the authority of the higher user level or the general user level to limit the use of the image forming apparatus 400 is too small or all functions of the image forming apparatus 400 are prohibited from being used, it may be set to cancel the limitation by the authentication of the highest user level (i.e., the system administrator) and restore the remaining authentication number thereof. Of course, the authority to release the restriction of the higher user level may be granted according to actual needs.
The image forming device 400 provided by the application has the advantages that the binding relation between the user identity information stored by the storage unit 403 and the functional authority of the image forming device is utilized, the user identity information is verified by the verification unit 401, the control unit 402 fails to verify the user identity information, the residual verification times reach the first preset times, the control unit 402 controls and reduces the functional authority of the image forming device 400, so that the functional authority of the image forming device 400 used by a user is limited, a safety protection mechanism is formed for the image forming device 400, the problem that data information is leaked due to malicious use of the image forming device 400 by an illegal person can be prevented, the self-protection safety of the image forming device 400 is enhanced, and the safety of information output by the image forming device 400 is protected.
Referring to fig. 5, an image forming system according to the present application includes a mobile device 501, a server 502, and an image forming apparatus 503. The mobile device 501 is used for sending an instruction for controlling the image forming device 503 to the server 502 according to a user instruction, the server 502 is used for storing the binding relation between the user identity information and the function authority of the image forming device 503 and verifying the user identity information, and controlling the image forming device 503 according to the instruction when the user identity information is verified, and the image forming device 503 unlocks or locks the body according to the instruction of the server 502.
The binding relationship between the user identity information and the functional authority of the image forming apparatus 503 includes user identity information (which may include a password), unique identification information of the image forming apparatus, and the functional authority to which the user is authorized to use the image forming apparatus 503.
Of course, the binding relationship between the user identity information and the functional authority of the image forming apparatus 503 may also include mobile device identification information. The mobile device identification information may be information that uniquely identifies the mobile device, such as an IP address, a serial number, etc. of the mobile device. Specifically, the user identity information may also be embodied by mobile device identification information, where the user identity information binds the mobile device identification information, and the server 502 may also store a binding relationship between the user identity information and the mobile device identification information, for example, the user X binds the mobile device a and the mobile device B, and the server 502 finds the corresponding user X through the identification information of the mobile device a and the mobile device B, so as to determine the functional authority of the image forming apparatus 503 of the user X according to the stored binding relationship between the user identity information and the functional authority of the image forming apparatus 503.
In addition, the mobile device identification information may be directly bound to the function authority of the image forming apparatus 503, and stored in the server 502, so that it is not necessary to store the user identity information, and whether the mobile device has the function authority of the image forming apparatus 503 or not is directly determined by the mobile device identification information, and the specific implementation manner is similar to the function authority of the image forming apparatus 503 bound to the user identity information, and the user identity information will be described below as an example.
When the image forming apparatus 503 is powered on for the first time, a system administrator is set, after the password is forcedly modified, the system administrator sets the functional rights (or including the initial password) of the image forming apparatus 503 for a plurality of users, each user identity information binds at least one functional rights of the image forming apparatus 503 and unique identification information of the image forming apparatus 503, and each image forming apparatus 503 to which the user identity information is bound may be one or more, which is not limited in this application.
When the user wants to unlock or lock the image forming apparatus 503, user identity information (may include a password) and an unlock or lock instruction are input on the mobile device 501, after the server 502 verifies the user identity information according to the user identity information (may include a password) input by the user, the binding relationship between the user identity information and the functional authority of the image forming apparatus 503 is obtained, and if the user has the functional authority of unlocking or locking, the image forming apparatus 503 is controlled to unlock or lock according to the unlock or lock instruction. When the server 502 fails to verify the user identity information according to the user identity information (which may include a password) input by the user, a message of the user identity information failure is sent to the mobile device 501, and an unlocking or locking instruction is discarded.
Through the image forming system, a user can conveniently and efficiently remotely control the unlocking or locking of the image forming device, so that illegal personnel can be prevented from maliciously using the image forming device, and the protection safety of the image forming device is enhanced.
In a specific implementation, the present application also provides a computer readable storage medium, where the computer readable storage medium may store a program, where the program may include some or all of the steps in the embodiments provided by the present application when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (random access memory RAM), or the like.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relation of association objects, and indicates that there may be three kinds of relations, for example, a and/or B, and may indicate that a alone exists, a and B together, and B alone exists. Wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in the embodiments disclosed herein can be implemented as a combination of electronic hardware, computer software, and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The foregoing is merely exemplary embodiments of the present application, and any person skilled in the art may easily conceive of changes or substitutions within the technical scope of the present application, which should be covered by the present application. The protection scope of the present application shall be subject to the protection scope of the claims.