Disclosure of Invention
In view of the above, it is desirable to provide a document printing control method, a printing control system and an executing apparatus, which can automatically control the printing of documents and the printing process of documents.
A first aspect of the present application provides a print control system comprising:
a first communicator for receiving print request information from a first terminal;
a first processor, coupled to the first communicator, to:
obtaining first classification information of a first file according to the printing request information and the first file requested to be printed;
adding a first identifier to the first file according to the first classification information to form a second file;
and forming a printing instruction according to the second file to instruct an execution device to print the second file.
Preferably, the first processor is further configured to send the first file to a second terminal through the first communicator according to the first classification information;
the first communicator is further configured to receive acknowledgement information from the second terminal in response to the sending of the first file;
the first processor is further used for forming a printing instruction according to the confirmation information and the second file so as to instruct the execution device to print the second file.
Preferably, the first communicator is further configured to receive second classification information from a second terminal;
the first processor is further configured to:
determining that the first classification information is different from the second classification information;
adding a second identifier to the first file to form a third file based on the first classification information and the second classification information being different;
and forming the printing instruction according to the third file to instruct the execution device to print the third file.
Preferably, the first processor is further configured to:
according to the first classification information, backing up the first file to a database;
forming a query instruction;
the first communicator is further to:
sending the query instruction to the first terminal;
receiving confirmation information from the first terminal response in response to the transmission of the inquiry command;
the processor is further configured to:
and clearing the first file in the database according to the determined information.
Preferably, the first processor is further configured to:
according to the first classification information, backing up the first file to a database;
determining a first time to clear the first file;
determining that a current time exceeds the first time;
clearing the first file in the database based on the current time exceeding the first time.
Preferably, the first communicator is further configured to receive sensing information from the actuator;
the first processor is further configured to:
determining a second time for picking up the second file according to the second file;
determining the receiving time of the induction information;
determining that the receive time does not exceed the second time;
and responding to the sensing information to form the printing instruction to instruct the executing device to print the second file based on the fact that the receiving time does not exceed the second time.
Preferably, the first communicator is further configured to:
receiving deferred application information from the first terminal;
sending the deferred application information to a second terminal;
responding to the sending of the deferred application information, and receiving permission information from the second terminal;
the first processor is further configured to:
updating the second time for getting the second file to be a third time according to the permission information;
determining that the current time does not exceed the third time;
and responding to the sensing information to form the printing instruction to instruct the executing device to print the second file based on the fact that the current time does not exceed the third time.
A second aspect of the present application provides an execution apparatus, comprising:
the second communicator is used for receiving the printing instruction and the obtaining request information;
a second processor, coupled to the second communicator, configured to:
caching a second file according to the printing instruction, wherein the second file comprises a first identifier;
determining a fourth time for getting the second file according to the first identifier;
determining that the receiving time of the pickup request information does not exceed the fourth time;
and printing the second file based on the receiving time of the pickup request information not exceeding the fourth time.
A third aspect of the present application provides an execution apparatus, comprising:
a second communicator for receiving a print instruction for instructing the execution apparatus to print a second file containing the first identifier;
a second processor, coupled to the second communicator, configured to:
determining a second time for getting the second file according to the printing instruction;
determining a fifth time at which the first marker is sensed;
determining that the fifth time does not exceed the second time;
printing the second file based on the fifth time not exceeding the second time.
Preferably, the second communicator is further configured to:
receiving permission information from the second terminal in response to the deferred application information;
the second processor is further configured to:
updating the second time to be a third time according to the permission information;
determining that the fifth time does not exceed the third time;
printing the second file based on the fifth time not exceeding the third time.
A fourth aspect of the present application provides an execution apparatus, comprising:
a second communicator for receiving a print instruction;
a receiver for receiving authentication information from the transmitter;
a second processor, coupled to the second communicator and the receiver, configured to:
determining permission range information for permitting to obtain the second file according to the printing instruction;
determining that the permission range information includes the verification information;
printing the second file based on the permission range information including the verification information.
A fifth aspect of the present application provides a file printing control method, including:
receiving printing request information from a first terminal;
obtaining first classification information of a first file according to the printing request information and the first file requested to be printed;
adding a first identifier to the first file according to the first classification information to form a second file;
and forming a printing instruction according to the second file to instruct an execution device to print the second file.
Preferably, the method further comprises:
sending the first file to a second terminal;
responding to the transmission of the first file, and receiving confirmation information from the second terminal;
and forming a printing instruction according to the confirmation information and the second file so as to instruct the execution device to print the second file.
Preferably, the method further comprises:
receiving second classification information from the second terminal;
determining that the first classification information is different from the second classification information;
adding a second identifier to the first file to form a third file based on the first classification information and the second classification information being different;
and forming the printing instruction according to the third file to instruct the execution device to print the third file.
Preferably, the method further comprises:
according to the first classification information, backing up the first file to a database;
forming a query instruction;
sending the query instruction to the first terminal;
receiving confirmation information from the first terminal response in response to the transmission of the inquiry command;
and clearing the first file in the database according to the determined information.
Preferably, the method further comprises:
according to the first classification information, backing up the first file to a database;
determining a first time to clear the first file;
clearing the first file in the database based on the current time exceeding the first time.
A sixth aspect of the present application provides a file printing control method, including:
receiving a printing instruction;
caching a second file according to the printing instruction, wherein the second file comprises a first identifier;
determining a fourth time for getting the second file according to the first identifier;
receiving pickup request information and determining the receiving time of the pickup request information;
determining that the receive time does not exceed the fourth time;
printing the second file based on the receiving time not exceeding the fourth time.
A seventh aspect of the present application provides a file printing control method, including:
receiving a printing instruction, wherein the printing instruction is used for instructing an execution device to print a second file, and the second file contains a first identifier;
determining a second time for getting the second file according to the printing instruction;
determining a fifth time at which the first marker is sensed;
determining that the fifth time does not exceed the second time;
printing the second file based on the fifth time not exceeding the second time.
Preferably, the method further comprises:
receiving permission information from the second terminal in response to the deferred application information;
updating the second time to be a third time according to the permission information;
determining that the fifth time does not exceed the third time;
printing the second file based on the fifth time not exceeding the third time.
An eighth aspect of the present application provides a file printing control method, including:
receiving a printing instruction;
determining permission range information for permitting to obtain the second file according to the printing instruction;
receiving authentication information from a transmitter;
determining that the permission range information includes the verification information;
printing the second file based on the permission range information including the verification information.
The file printing control method, the printing control system and the executing device provide an automatic file printing control process, and reduce manual participation, so that time consumed by file printing control is reduced, the accuracy of file printing control is improved, and the file printing control efficiency is improved.
Detailed Description
In order that the above objects, features and advantages of the present application can be more clearly understood, a detailed description of the present application will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present application, and the described embodiments are merely a subset of the embodiments of the present application and are not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
Fig. 1 is a schematic view of an application environment architecture of a document printing management and control method according to a preferred embodiment of the present application.
The document printing control method is applied to the printing control system 1 and/or the execution device 2. The print control system 1 establishes communication connection with at least one execution apparatus 2, a first terminal 3, and a second terminal 4 via a network. The network may be a wired network or a Wireless network, such as radio, Wireless Fidelity (WIFI), cellular, satellite, broadcast, etc. The cellular network may be a 4G network or a 5G network.
The print control system 1 and the execution apparatus 2 may be installed with a document print management program. The print control system 1 may be a personal computer, a server, or the like. The server may be a single server, a cluster of servers, or a cloud server, etc. The execution device 2 may be a printer or a display.
The first terminal 3 and the second terminal 4 may be a smart phone, a personal computer, a wearable device, or the like.
In one embodiment, the printing control system 1 is installed with a complete document printing management and control program to implement the document printing management and control method of the present application. In another embodiment, the execution device 2 is installed with a complete document printing management and control program to implement the document printing management and control method of the present application. In another embodiment, the printing control system 1 and the execution device 2 are respectively installed with a part of document printing management and control programs, and implement data interaction through communication connection, so as to jointly implement the document printing management and control method of the present application.
Example one
Fig. 2 is a flowchart of a document printing control method according to an embodiment of the present application. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
In one embodiment, a document printing management and control method is applied to the printing control system 1.
In step 101, the print request information from the first terminal 3 is received.
In one embodiment, the print request information from the first terminal 3 is received through the first communicator.
In an embodiment, a document to be printed in the first terminal 3 of the user includes a print option, the user can click the print option through an input device or touch, and the first terminal 3 responds to the user operation to send the requested print information to the print control system 1. Wherein, the input device is a keyboard or a mouse.
In other embodiments, the user may also input a print request by voice, and the first terminal 3 receives and recognizes the voice to transmit the print-requested information to the print control system 1.
And 102, acquiring first classification information of the first file according to the printing request information and the first file requested to be printed.
In one embodiment, the first file is transmitted to the print control system 1 by the first terminal 3 together with the request for printing information. In another embodiment, the first file may be a cache stored in advance in a database of the print control system 1.
In one embodiment, the first classification information is confidentiality level information of the first file. The classification information of the first file includes, but is not limited to, plain, confidential, extremely confidential, and special confidential files. For example, plain parts include only text and/or statements, confidential parts further include pictures, extremely confidential parts further include mechanical drawings, and confidential parts further include processing parameters. It is understood that, in other embodiments, the classification information and the dividing manner of each classification information may also be set according to requirements.
In one embodiment, step 102 comprises: the content of the first file is identified to obtain first classification information of the first file. In one embodiment, when the first file is identified to only contain text and/or a report, the first classification information of the first file is obtained as a common file. And when the first file is identified to contain the picture, acquiring the first classification information of the first file as a confidential file. And when the first file is identified to only contain the mechanical drawing, obtaining the first classification information of the first file as the confidential file. And when the first file is identified to only contain the processing parameters, obtaining the first classification information of the first file as a secret piece.
In one embodiment, step 102 further comprises: and sending the first file to the second terminal 4 through the first communicator according to the first classification information, so that the first file and the corresponding classification information thereof are sent to a manager for auditing.
In one embodiment, step 102 further comprises: in response to the transmission of the first file, acknowledgement information is received from the second terminal 4. Wherein, when the manager checks that the classification information of the first file is correct, the confirmation information is sent to the printing control system 1 through the second terminal 4.
In one embodiment, step 102 further comprises: receives second classification information from the second terminal 4 and determines that the first classification information is different from the second classification information. Wherein, when the manager checks and confirms that the classification information of the first file is wrong, the second classification information is sent to the printing control system 1 through the second terminal 4. Determining that the first classification information is different from the second classification information by comparing the first classification information and the second classification information.
Step 103, adding a first identifier to the first file according to the first classification information to form a second file.
In one embodiment, each classification information has a corresponding identifier to indicate the classification information of the first file. In one embodiment, the identification may be an electronic watermark in the form of a two-dimensional code, a bar code, or a job number.
In one embodiment, step 103 comprises: when receiving the confirmation information from the second terminal 4, adding a first identifier to the first file to form a second file.
In one embodiment, step 103 further comprises: and adding a second identifier to the first file to form a third file based on the first classification information and the second classification information which are different. When the classification information confirmed by the manager is different from the first classification information, the classification information confirmed by the manager is used as a standard, namely, a second identifier corresponding to the second classification information is added to the first file to form a third file.
And 104, forming a printing instruction according to the second file to instruct the execution device 2 to print the second file.
In one embodiment, when the execution device 2 is a printer, the second document may be printed as a paper document. When the execution device 2 is a display, the second file can be printed as a document with a different format, for example, the second file with a word format is printed as a pdf format.
In one embodiment, step 104 comprises: according to the confirmation information and the second file, a printing instruction is formed to instruct the execution device 2 to print the second file. And when the confirmation information of the second terminal 4 is received, sending the second file to the execution device 2, and outputting a printing instruction to control the execution device 2 to print the second file with the first identifier.
In one embodiment, step 104 further comprises: according to the third file, the print instruction is formed to instruct the execution apparatus 2 to print the third file. That is, upon receiving the second classification information different from the first classification information sent by the second terminal 4, the third file is sent to the execution apparatus 2, and a print instruction is output to control the execution apparatus 2 to print the second file having the second identifier.
In one embodiment, step 104 further comprises: and determining a second time for picking up the second file according to the second file.
In one embodiment, the second documents printed from the first documents of different classification information, i.e. the second documents with different identifications, have different pickup times. For example, the second time to retrieve the second document printed in plain, confidential, is eight hours, the second time to retrieve the second document printed in confidential, is one hour, the second time to retrieve the second document printed in extremely confidential, is half an hour, and the second time to retrieve the second document printed in confidential is ten minutes.
In one embodiment, step 104 further comprises: and receiving the induction information from the executing device 2, and determining the receiving time of the induction information, namely determining the time for the user to pick up the second file.
In one embodiment, step 104 further comprises: and determining that the receiving time does not exceed the second time, and responding to the sensing information to form the printing instruction to instruct the executing device 2 to print the second file based on that the receiving time does not exceed the second time. When the time for the user to receive the second file does not exceed the preset receiving time, the execution device 2 is instructed to print the second file, so that the secret of the second file is prevented from being leaked.
In one embodiment, step 104 further comprises: receiving the deferred application information from the first terminal 3, transmitting the deferred application information to the second terminal 4, and receiving the license information from the second terminal 4 in response to the transmission of the deferred application information. When the user cannot retrieve the second document within the preset second time, the user may apply for deferred retrieval and send deferred request information to the print control system 1 through the first terminal 3. When receiving the deferred application information, the print control system 1 transmits the deferred application information to the second terminal 4, and checks and confirms whether the user is allowed to receive the deferred application information or not for the manager. When the manager confirms that the user is permitted to defer the pickup, the permission information is transmitted to the print control system 1 through the second terminal 4.
In one embodiment, step 104 further comprises: and updating the second time for getting the second file to be a third time according to the permission information. Wherein, the second time for getting the second file is delayed to the third time after receiving the license information sent by the second terminal 4.
In one embodiment, step 104 further comprises: and determining that the current time does not exceed the third time, and responding to the sensing information to form the printing instruction to instruct the executing device 2 to print the second file based on that the current time does not exceed the third time.
Step 105, backing up the first file to a database according to the first classification information.
In one embodiment, the cache of the first file and the corresponding first classification information are backed up to a database of a print control system.
And 106, clearing the first file in the database based on a preset condition.
In one embodiment, the predetermined condition is that the determination information of the first terminal 3 is received. Step 106 comprises: forming a query instruction, transmitting the query instruction to the first terminal 3, receiving the determination information from the first terminal 3 response in response to the transmission of the query instruction, and clearing the first file in the database according to the determination information. In one embodiment, the query instruction may be a short message or an email to query whether the user agrees to clear the first file cached in the database. That is, the inquiry command is transmitted to the first terminal 3 by means of a short message or mail. If the user agrees to clear the first file cached in the database, the confirmation information is sent to the print control system through the first terminal 3. When the print control system receives the determination information, the first file in the database is cleared.
In other embodiments, the preset condition is that the current time exceeds a first time. Step 106 comprises: determining a first time to clear the first file, determining that a current time exceeds the first time, and clearing the first file from the database based on the current time exceeding the first time. In the other embodiment, the first time is a buffering time of the first file in the database, for example, 24 hours. When the current time, namely the caching time of the first file in the database exceeds 24 hours, the first file in the database is automatically cleared.
Example two
Fig. 3 is a flowchart of a document printing management and control method according to another embodiment of the present application. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
In another embodiment, a document printing management and control method is applied to the execution apparatus 2.
Step 201, receiving a printing instruction and receiving request information.
In one embodiment, the print command is sent from the print control system 1 to the execution device 2 through a wired network or a wireless network. In other embodiments, the print command may be transmitted from the first terminal 3 to the execution device 2 by a wireless signal. Wherein the wireless signal may be a bluetooth signal.
In one embodiment, the execution device 2 includes a receiver for receiving the pickup request information of the user. Wherein the receiver may be an RFID card reader for sensing an RFID card of a user, such as a work card, to receive the pickup request information. In other embodiments, the receiver may also be a two-dimensional code device for sensing the two-dimensional code scanning of the first terminal 3 to receive the pickup request information.
Step 202, according to the printing instruction, caching a second file, wherein the second file comprises a first identifier.
In one embodiment, when the execution device 2 receives the print command, it receives the second file transmitted from the print control system 1 and buffers the second file in a memory. Wherein the second file contains a first identifier indicating its classification information.
Step 203, determining a fourth time for getting the second file according to the first identifier.
In an embodiment, the retrieving time corresponding to each piece of classified information is preset by the executing device 2, for example, the retrieving time of a plain file is one hour after the second file is cached, the retrieving time of a confidential file is half an hour after the second file is cached, the retrieving time of an extremely confidential file is ten minutes after the second file is cached, and the retrieving time of a confidential file is five minutes after the second file is cached. Therefore, a fourth time for picking up the second file is determined according to the classification information corresponding to the first identifier. The fourth time may be the same as the second time or different from the second time.
Step 204, determining that the receiving time of the pickup request message does not exceed the fourth time.
In one embodiment, when the pickup request message is received, the receiving time of the pickup request message is determined, whether the receiving time is within the fourth time or not is judged, and when the receiving time is judged to be within the fourth time, the receiving time is determined not to exceed the fourth time. For example, when the classification information corresponding to the first identifier is a secret and the receiving time is two minutes after the second file is cached, it is determined that the receiving time does not exceed the fourth time.
Step 205, based on the receiving time of the pickup request information not exceeding the fourth time, printing the second file.
In one embodiment, when the receiving time of the pickup request information does not exceed the fourth time, the second file is printed in response to the print instruction and the pickup request information.
EXAMPLE III
Fig. 4 is a flowchart of a document printing management and control method according to another embodiment of the present application. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
In another embodiment, a document printing management and control method is applied to the execution apparatus 2.
In step 301, a print instruction is received.
In one embodiment, the print instruction is used to instruct the execution apparatus 2 to print a second file, which contains the first identifier. The print instruction is sent from the print control system 1 to the execution apparatus 2 via a wired network or a wireless network. In other embodiments, the print command may be transmitted from the first terminal 3 to the execution device 2 by a wireless signal. Wherein the wireless signal may be a bluetooth signal.
Step 302, determining a second time for retrieving the second file according to the printing instruction.
In one embodiment, the second time is included in the print order, i.e. the second time to retrieve the second document is determined by identifying the print order. In another embodiment, the executing apparatus 2 presets the second time as the pickup time corresponding to each piece of classified information, for example, the second time for picking up normal files is one hour after the second file is cached, the second time for picking up machine-confidential files is half an hour after the second file is cached, the second time for picking up extremely-dense files is ten minutes after the second file is cached, and the second time for picking up special-confidential files is five minutes after the second file is cached. Therefore, according to the printing instruction, the second time for picking up the second file is determined according to the classification information corresponding to the first identifier.
Step 303, determining a fifth time when the first identifier is sensed.
In one embodiment, the second file sent by the print control system 1 is received together when the print instruction is received, the second file is cached in a memory, and a first identifier of the second file is displayed on a display screen. In one embodiment, the first identifier is a two-dimensional code. When the user gets the second file, the first identifier is scanned through the first terminal 3, and the time when the first identifier is scanned is the sensed fifth time.
Step 304, determining that the fifth time does not exceed the second time.
In one embodiment, it is determined whether the fifth time is within the second time, and when it is determined that the fifth time is within the second time, it is determined that the fifth time does not exceed the second time. For example, when the classification information corresponding to the first identifier is a secret piece and the fifth time is two minutes after the second file is cached, it is determined that the fifth time does not exceed the second time.
Step 305, based on the fifth time not exceeding the second time, printing the second file.
In one embodiment, the second file is printed in response to the print instruction when the fifth time does not exceed the second time.
In one embodiment, the method further comprises: permission information is received from the second terminal 4 in response to the deferred application information. It should be noted that, when the user cannot retrieve the second file within the second time, the deferred application information may be sent to the second terminal 4 of the administrator through the first terminal 3. When the manager checks and confirms that the user is allowed to defer to retrieve the second file, the permission information responding to the deferral application information is sent to the execution device 2 through the second terminal 4.
In one embodiment, the method further comprises: and updating the second time to be a third time according to the permission information. Wherein, when the execution device 2 receives the permission information, the second time is postponed to a third time.
Example four
Fig. 5 is a flowchart of a document printing control method according to another embodiment of the present application. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
In another embodiment, a document printing management and control method is applied to the execution apparatus 2.
Step 401, a print instruction is received.
In one embodiment, the print instruction is used to instruct the execution apparatus 2 to print a second file, which contains the first identifier. The print instruction is sent from the print control system 1 to the execution apparatus 2 via a wired network or a wireless network. In other embodiments, the print command may be transmitted from the first terminal 3 to the execution device 2 by a wireless signal. Wherein the wireless signal may be a bluetooth signal.
At step 402, authentication information is received from a transmitter by a receiver.
In one embodiment, the receiver may be an RFID (Radio Frequency Identification) card reader for sensing an RFID card of a user, such as a work card or an Identification card, to receive authentication information of the user. In other embodiments, the receiver may also be a two-dimensional code device for sensing the two-dimensional code scanning of the first terminal 3 to receive the authentication information of the user.
In one embodiment, the verification information includes, but is not limited to, RFID information and pickup location information. The RFID information may be the work number or identification number of the work card. The pickup location information is the location and number of the execution device 2 that received the verification information. In other embodiments, the verification information may also include an identification code and pickup location information. The identification code is a two-dimensional code on the first terminal 3 scanned by the receiver.
Step 403, determining the permission range information of the second file permitted to be obtained according to the printing instruction.
In one embodiment, the print instruction further includes permission range information for permitting the second file to be retrieved. The permission range information includes permission RFID information and permission pickup location information.
In other embodiments, the permission range information may include permission to receive rights and permission to receive location information. The privilege may be a user role level.
Step 404 determines that the permission scope information includes the verification information.
In one embodiment, it is determined whether the RFID information in the verification information is the same as the permission RFID information and whether the pickup location information in the verification information is the same as the permission pickup location information. When it is determined that the RFID information in the verification information is the same as the permission RFID information and that the pickup position information in the verification information is the same as the permission pickup position information, it is determined that the permission range information includes the verification information. And when the RFID information in the verification information is judged to be different from the permission RFID information and/or the picking position information in the verification information is judged to be different from the permission picking position information, determining that the permission range information does not contain the verification information.
In other embodiments, it is determined whether the user right corresponding to the RFID information in the verification information is higher than the permission to receive and whether the receiving location information in the verification information is the same as the permission to receive location information. And when the user right corresponding to the RFID information in the verification information is judged to be higher than the permission receiving right and the receiving position information in the verification information is judged to be the same as the permission receiving position information, determining that the permission range information contains the verification information. And when judging whether the user right corresponding to the RFID information in the verification information is lower than the permission receiving right and/or judging that the receiving position information in the verification information is different from the permission receiving position information, determining that the permission range information does not contain the verification information.
In step 405, the second file is printed based on the permission range information including the authentication information.
In one embodiment, when the permission area information includes authentication information and pickup position information of the user, it is determined that the user is permitted to pickup the second file, thereby printing the second file.
EXAMPLE five
Fig. 6 is a schematic structural diagram of a print control system according to an embodiment of the present application.
The print control system 1 includes, but is not limited to, a first processor 11, a first memory 12, a first computer program 13 stored in the first memory 12 and executable on the first processor 11, and a first communicator 14. For example, the first computer program 13 is a document printing management program. The first processor 11 implements a document printing management and control method, such as steps 101 to 106 shown in fig. 2, when executing the first computer program 13.
Illustratively, the first computer program 13 may be divided into one or more modules/units, which are stored in the first memory 12 and executed by the first processor 11. One or more of the modules/units may be a series of computer program instruction segments capable of performing specific functions, the instruction segments describing the execution process of the first computer program 13 in the print control system 1.
It will be appreciated by those skilled in the art that the schematic diagram is merely an example of the printing control system 1, and does not constitute a limitation of the printing control system 1, and may include more or less components than those shown, or combine some components, or different components, for example, the printing control system 1 may further include an input-output device, a network access device, a bus, etc.
The first memory 12 comprises a database for caching the first file. The first communicator 14 is configured to be communicatively connected to the execution apparatus 2, the first terminal 3, and the second terminal 4, and receive instructions or information from the execution apparatus 2, the first terminal 3, and the second terminal 4.
EXAMPLE six
Fig. 7 is a schematic structural diagram of an execution device according to an embodiment of the present application.
The execution device 2 includes, but is not limited to, a second processor 21, a second memory 22, a second computer program 23 stored in the second memory 22 and executable on the second processor 21, a second communicator 24, a receiver 25, and a display 26. The second computer program 23 is, for example, a document printing management program. The second processor 21 implements a file print management and control method, such as step 201 to step 205 shown in fig. 3, step 301 to step 305 shown in fig. 4, and step 401 to step 405 shown in fig. 5, when executing the second computer program 23.
Illustratively, the second computer program 23 may be divided into one or more modules/units, which are stored in the second memory 22 and executed by the second processor 21. One or more of the modules/units may be a series of computer program instruction segments capable of performing specific functions, the instruction segments being used to describe the execution of the second computer program 23 in the execution apparatus 2.
Those skilled in the art will appreciate that the schematic diagram is merely an example of the executing apparatus 2, and does not constitute a limitation to the executing apparatus 2, and may include more or less components than those shown, or combine some components, or different components, for example, the executing apparatus 2 may further include an input and output device, a network access device, a bus, and the like.
The second communicator 24 is used for communicating with the print control system 1, the first terminal 3, and the second terminal 4, and receiving instructions or information from the print control system 1, the first terminal 3, and the second terminal 4.
The receiver 25 may be an RFID device for receiving the sensed information. The display screen 26 is an LCD or OLED display screen.
The first processor 11 and the second processor 21 may be a Central Processing Unit (CPU), other general-purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), Field-Programmable Gate arrays (FPGA) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. The general-purpose processor may be a microprocessor or any conventional processor, etc., the first processor 11 is a control center of the print control system 1 and connects various parts of the entire print control system 1 with various interfaces and lines, and the second processor 21 is a control center of the execution apparatus 2 and connects various parts of the entire execution apparatus 2 with various interfaces and lines.
The first memory 12 and the second memory 22 may be used to store computer programs and/or modules/units, and the first processor 11 implements various functions of the print control system 1 by running or executing the computer programs and/or modules/units stored in the first memory 12 and calling up data stored in the first memory 12. The second processor 21 implements various functions of the execution apparatus 2 by running or executing computer programs and/or modules/units stored in the second memory 22 and calling data stored in the second memory 22. The first memory 12 and the second memory 22 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating device, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a telephone book, etc.) created according to the use of the print control system 1 or the execution apparatus 2, and the like. In addition, the first memory 12 and the second memory 22 may include volatile memories, and may also include non-volatile memories, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other storage devices.
The modules/units integrated by the print control system 1 and the execution apparatus 2 may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, all or part of the flow in the method according to the embodiments may be implemented by a computer program to instruct related hardware to complete, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM).
The file printing control method, the printing control system and the executing device provided by the application provide an automatic file printing control process, and reduce the process of manual participation, so that the time consumed by file printing control is reduced, the accuracy of file printing control is improved, and the file printing control efficiency is improved.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. Several units or means recited in the apparatus claims may also be embodied by one and the same item or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Although the present application has been described in detail with reference to preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present application.