MXPA01000832A - System and method for authentication of a user of a multi-function peripheral - Google Patents
System and method for authentication of a user of a multi-function peripheralInfo
- Publication number
- MXPA01000832A MXPA01000832A MXPA/A/2001/000832A MXPA01000832A MXPA01000832A MX PA01000832 A MXPA01000832 A MX PA01000832A MX PA01000832 A MXPA01000832 A MX PA01000832A MX PA01000832 A MXPA01000832 A MX PA01000832A
- Authority
- MX
- Mexico
- Prior art keywords
- user
- logic
- password
- function peripheral
- authentication
- Prior art date
Links
- 230000002093 peripheral Effects 0.000 title abstract description 68
- 230000015654 memory Effects 0.000 claims abstract description 33
- 230000005540 biological transmission Effects 0.000 claims abstract description 31
- 230000000903 blocking Effects 0.000 claims description 2
- 230000001702 transmitter Effects 0.000 description 32
- 230000004044 response Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 5
- 230000000875 corresponding Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000006011 modification reaction Methods 0.000 description 2
- 230000003287 optical Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000035899 viability Effects 0.000 description 1
Abstract
A system and method are provided in a multi-function peripheral to authenticate a user. The system includes a processor and a memory that are coupled to a local network. The system also includes send logic stored on the memory and executable by the processor. The send logic includes logic to input a password associated with a user, and logic to authenticate the password and to obtain a FORM field identifier associated with the user. The system also features logic to lock the FORM field identifier into a FORM field associated with a data transmission.
Description
METHOD AND SYSTEM FOR THE AUTHENTICATION OF A USER OF A PERIPHERAL OF MULTIPLE FUNCTIONS
TECHNICAL FIELD The present invention relates generally to the field of multi-function peripherals and, more particularly, relates to a system and method for the authentication of a user of a multi-functional peripheral. BACKGROUND OF THE INVENTION Document management technology has undertaken the task of integrating the functions of a printer, a scanner, a copying machine into a single multi-function peripheral. In an office environment, the aforementioned multi-functional peripherals are often linked to a computer or a communications network that allows users to print documents from their computers on the same network. Staff can also use the multi-function peripheral as an office copier and as a scanner. In addition, multi-functional peripherals can also include a digital transmitter to transmit documents
'as an email or as a facsimile. In an office environment, the digital sending functionality of a multi-function peripheral provides a public access point for the transmission of documents. That is, multiple parties can use the multi-function peripheral to scan a document for transmission to a third party. This functionality differs from the e-mail function, for example, from a typical computer in an office environment in which the computer is usually assigned to a particular person, often with limited access to the computer by the required passwords, etc. So a computer is dedicated to a single person, a user that transmits a document via email, for example, usually does not have to specify who sent the document as email the functionality contained in it will automatically indicate the user as the sender of the transmission of the document. In this case, the computer identifies who sent the document, that is, the user associated with the particular computer. In the case of a multi-function peripheral, the user transmitting a data transmission is not automatically identified. Consequently, multi-function peripherals provide users with the ability to enter their names or email addresses together with the transmission of a scanned document using the digital transmission capability. Unfortunately, this can cause problems. In particular, an intriguing user may unlawfully transmit documents to another under a supposed name to defraud with the normal operation of a particular organization. Also, users can gain unauthorized access to such equipment to send information.
SUMMARY OF THE INVENTION In light of the foregoing, a system and method is provided in a multi-function peripheral to authenticate a user. In this regard, the system includes a processor and a memory that are coupled to a local network. The system also includes sending the logic stored in the memory and is executable by the processor. The transmission logic includes the logic for entering a password associated with a user, and the logic for authenticating the password and for obtaining a FROM field identifier associated with the user. The system also offers the logic to block the FROM field identifier in a FROM field associated with a data transmission.
The present invention can also be viewed as a method for authenticating a user of a multi-function peripheral. Widely stated, the method comprises the steps of: entering a password associated with a user in a device, authenticating the password to obtain a FROM field identifier associated with the user, and, block the FROM field identifier in a FROM field associated with a transmission of data that is transmitted from the device. In accordance with another aspect of the present invention, a system and method for authenticating a user is provided. The system comprises a processor and a memory that are coupled to a local network. Also, the logical authentication is stored in the memory and is executable by the processor. Logical authentication includes logic to verify a password associated with a user, and logic to obtain a FROM field identifier associated with the user. The present invention can also be viewed as a method for authenticating a user. It is widely expressed that the method comprises the steps of verifying a password associated with a user, and obtaining a FROM field identifier associated with the user. Other features and advantages of the present invention will be apparent to a person with ordinary experience in view of the following drawings and the detailed description. It is intended that all additional features and advantages be included in this instance within the scope of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS The invention can be understood with reference to the following drawings. The components in the drawings are not necessarily to scale. Also, in the drawings, like reference numbers designate the corresponding parts through several views. FIG. 1 is a block diagram of an office network in accordance with the present invention; FIG. 2A is a flowchart of the digital logic transmitter executed in a multi-function peripheral in the office network of FIG.l;
FIG. 2B is a flow chart of the logical send authentication executed in conjunction with the digital logic transmitter of FIG. 2A; and FIG. 3 is a flow chart of the logical authentication executed on a server in the office network of FIG.l. DETAILED DESCRIPTION OF THE INVENTION With reference to FIG. 1, which shows an office network
100 in accordance with the present invention. The office network
100 includes a multi-function peripheral (PFM) 105, a server 110, a domain controller 115, and a directory 120 server. The Multiple Function Peripheral 105, the server 110, the domain controller 115, and the server of the directory 120 are all coupled to a network 125 and are in data communication with each other via network 125. Network 125 may be, for example, a local area network, etc. The Peripheral of
Multiple Functions 105 includes the functions of a copier, a printer, and a scanner. The multi-function peripheral 105 includes a circuit
• Processor to implement and control the copying, printing, and scanning functions. The processor circuit includes a processor 130 a memory 135, which are coupled to a local interface 140. The local interface 140 can be a data connection cable (data bus) with an accompanying control bus as is known to those with an ordinary experience in the art.
The multi-function peripheral 105 also includes a network interface 145 which couples the local interface 140 to the network 125. The network interface 145 can be, for example, an interface card or another interface that includes a buffer (buffer) appropriate or other circuits that link the local interface 140 to the network 125 based on the data communication protocol of the network 125. In addition to the network interface 145, the multi-functional peripheral 105 also includes the input / output interfaces 150 which couple the local interface 140 with a number of input / output devices 155. The input / output devices 155 can include user input devices such as, for example, a keyboard, a touch keyboard, a control screen touch, microphone, a joystick, one or more button switches, etc. The user's output devices may include display devices, speakers, printers, etc. Screen devices may include, for example, a cathode ray tube (CRT), a liquid crystal display screen, a plasma-gas-based flat panel screen, light indicator, light-emitting diodes, and other devices of exhibition. Other input / output devices 155 of the user may also be employed beyond those listed above. Note that there are also other input / output devices that are controlled by the processor 130 performing the various functions of the multi-function peripheral 105 / including motors and other equipment, etc. , as is known to those of ordinary skill in the art. The server 110 also includes a processor circuit that includes a processor 160 and a memory 165, both of which are coupled to an interface 170. Similar to the local interface 140, the local interface 170 may be a data bus with a bus companion control as is known to those with ordinary skill in the art. The local interface 170 is coupled to the network 125 by a network interface 175. Also, the server 110 may include one or more input / output devices 180 that are linked to the local interface 170 by one or more input / output interfaces. 185. The input / output devices 180 may include, for example, devices similar to the input / output devices 155 discussed above. In addition, the 130/160 processors and the 135/165 memories can represent multiple processors and memories that operate in parallel. In a similar case, the local interfaces 140/170 can each be an appropriate network that facilitates communication between any of the two multiple processors or between any one of the multiple processors and any of the memories, etc. In addition, the processors 130/160, the memories 135/165 and the local interfaces 140/170 can be electrical or optical in nature. Also, memories 135/165 may include both components of volatile and non-volatile memories. Volatile components are those that do not retain data values during a loss of electrical power. Reciprocally, the non-volatile components retain the values of the data during a loss of electrical force. In this way, memories 135/165 may comprise, for example, random access memories (RAM), read-only memories (ROM), hard disk drives, soft disk drives, compact disk drives, tape drives, and other memory components, or a combination of two or more of these memory components. The multi-function peripheral 105 also includes the operation logic of the multi-function peripheral 190 which is stored in the memory 135 and is executable by the processor 130. The operation logic of the multi-function peripheral 190 includes the digital logic transmitter 195 which is executed to transmit a document from the multi-function peripheral 105 to another device in the network 125 or to another device in an external network, for example, through a normal mail sending protocol (SMTP) server (not shown) ) coupled to the network 125. The digital logic transmitter 195 includes the logic that is executed to authenticate a particular user who wishes to transmit a document using the multi-function peripheral 105 as will be discussed. The server 110 includes the operation logic 198 and the logical authentication 200. The operation logic 198 maintains the functionality of the server 110 in its general role in the network 125 as is known to those of ordinary skill in the art. The logical authentication 200 is executed by the processor 160 to authenticate a user together with an authentication request transmitted from the multi-function peripheral 105. A discussion of the general operation of the office network 100 is included below. a user goes to the multi-function peripheral 105 with the desire to scan one or more copies of documents in digital form to be transmitted to one or more recipients. It assumes that the authentication functionality of the multi-function peripheral 105 is active, the user places the documents to be scanned into the machine and manipulates the appropriate input devices 155 to initiate the digital transmission viability of the multi-functional peripheral 105. The The multi-function peripheral 105 then requires the user to enter their user name and password using an appropriate input device 155. Note that the user's name is defined here as the name by which a user is identified in the network 125 different from the real name of the user which is the name by which they are usually addressed. The multi-function peripheral 105 then determines whether the user's name and password that were stored in memory 135 are valid and can be reused. That is, each time a user is authenticated by the multi-function peripheral 105, the multi-function peripheral 105 stores the user's name and password only in the event that the user has more than one scan / send job to be performed. consecutively. For each subsequent scan / send job performed by the user, the user's name and password are entered into the multi-function peripheral 105. The multi-function peripheral 105 will authenticate the user by those subsequent scan / send jobs by comparing the name and user password stored in the previous scan / send jobs with the credentials currently entered. I watchedHowever, for this authentication path to be carried out, the previous work of scanning / sending does not have to be one or the other pending or being transmitted at the moment that initiates the subsequent work of scanning / sending. Note that a previous scan / send job is pending if the digital document that was scanned into memory 135 is the last document in a send list waiting to be transmitted after other pending scan / send jobs. It is assumed, however, that the user's name and password can not be authenticated based on a previous scan / send job, the multi-function peripheral 105 then encrypts both the user's password and the user's name, although the password of the user user can be encrypted alone. The user's password and the user's name are encrypted to prevent the password from being misused in the network 125 by an unscrupulous individual having access to the network 125. The multi-function peripheral 105 then transmits an authentication request to the server 110. together with the encrypted name and password of the user. If the multi-function peripheral 105 is currently transmitting a digital document to several recipients from a previous scan / send job when the authentication request is transmitted to the server 110, then a parallel channel is used to transmit the authentication request concurrently with the transmission of the digital document. This prevents a user from having to wait for a previous scan / send job to finish being transmitted before they can start a subsequent scan / send job. The server 110 responds to the authentication request by deciphering the user's password and the user's name. The server 110 then communicates with the domain controller 115 to verify in agreement the user's password and the user's name, if the user's password and the user's name are valid, the domain controller 115 informs the server 110 and it also transmits a secure identification code (SID) which is associated with the user of the server 110. If the user's password and the user's name are not valid, then the domain controller 115 reports as such to the server 110 and the server 110 , however, informs the multi-function peripheral 105 that the user can not be verified. Consequently, the multi-function peripheral 105 then prevents the user from scanning and transmitting the documents. It is assumed that the user's password and the user's name were verified and that the secure identification code of the domain controller 115 was received, the server 110 then supplies the secure identification code to the server of the directory 120 together with the request for a email address and / or a name that is associated with the user. The directory server 120 identifies this information based on the secure identification code. The directory server 120 then transmits the e-mail address and / or the user's name to the server 110. The server 110 then transmits a response to the multi-function peripheral 105 that includes the e-mail address and / or the user's name. Note if an email address and / or name could not be identified by the directory server 120 based on the secure identification code, the server 110 will transmit a response to the multi-function peripheral 105 which indicates that the user could not be verified and that therefore the scanning and transmission of the document are denied. Assuming that the server 110 has responded to the multi-function peripheral 105 that verifies the user with a corresponding email address and / or name, the multi-function peripheral 105 associates either the email address, the name of the user, or both with the transmission of the pending document. In particular, each transmission of the multi-function peripheral 105 includes a "FROM" field in which the email address, the user's name, or other identifying information may be entered. In this regard, the e-mail address, the name of the user, or other identification information are called an identifier "FROM" that identifies the sender to the recipient. The association of a particular FROM identifier with a transmission involves placing the FROM identifier within the FROM field. For example, in the case that the scanned document is sent by email, the FROM identifier can be the email address that is included in the FROM field of the email. In the case that the scanned document is sent by facsimile, the FROM identifier may be the name of the user that is included in a FROM field that is finally included in a page of the facsimile cover. Note that if a user was authenticated based on a previous scan / send job as discussed above. The previous email address and / or the user name stored in the memory 135 are placed within the FROM field, therefore the need for communication with the server 110 to authenticate the user's name and password is omitted.
In addition, the multi-function peripheral 105"blocks" the FROM identifier within the FROM field so that the user is prevented from entering or in some way altering the FROM identifier. This is to prevent an unscrupulous person from entering a FROM identifier other than their own to send an illicit transmission from the multi-function peripheral 105 without personal accounting and with negative consequences for the person who was associated with the transmission. The blocking function ensures that only the FROM identifier associated with the password of the previously entered user appears in the FROM field, preventing a user from altering or entering a new FROM identifier. Once the FROM identifier is blocked within the FROM field, the user then enters the address (es) and / or telephone numbers of the recipients. The multi-function peripheral 105 starts the scanning function and then places the document in the sending list for transmission to the respective recipients. The FROM identifier can also be used to inform the user if a particular transmission was not transmitted successfully. For example, if the scanned document was sent by email, the FROM identifier (e-mail address) can be used as the return address for the email that did not reach its destination. In the case that the scanned document is sent by facsimile. The email address that was obtained with the user's name can be used to send a digital confirmation if the fax was transmitted successfully. With the foregoing in mind, reference is made to FIG. 2A depicting a flow chart of the digital logic transmitter 195 in accordance with one embodiment of the present invention. The digital logic transmitter 195 is executed to perform the scanning and digital transmission functions as well as the authentication functions in the multi-function peripheral 105 as discussed above. Starting with block 203, digital logic transmitter 195 determines when a send operation will be performed. A sending operation initiates an occurrence of an appropriate sending entry such as, for example, by pressing a send button either in the form of a button switch or a button on a touch screen as one of the input devices / output (I / O) 155 (FIG 1). If in block 203 an appropriate input is received indicating that a send operation is to be performed, then the digital logic transmitter 195 advances to block 206. In block 206 it is determined when the authentication feature of the multi-function peripheral 105 is has put into service. If the authentication feature has not been put into service, then the digital logic transmitter 195 is moved to block 209 in which the sender and the recipient of a scan / send job are entered by the user. The digital logic transmitter 195 then moves to the connector A which finally diverts the authentication process on the multi-functional peripheral 105. Otherwise, if in the block 206 the authentication feature of the multi-functional peripheral 105 is enabled, then the digital logic transmitter 195 advances to block 213. Therefore, as shown in block 206, digital logic transmitter 195 provides the capability to completely disable the authentication features of multi-function peripheral 105. To do this, for example, it can setting a bit within the memory 135 (FIG.1) in an active or inactive state corresponding to when the authentication function is active or inactive. In block 206, this bit can be examined to determine its status and the digital logic transmitter 195 responds accordingly. In block 213, the digital logic transmitter 195 causes a display to appear on an appropriate output device 155 that provides an interface for a user to register in the multi-function peripheral 105 to perform the scan / send work. Next, in block 216, the digital logic transmitter 195 receives the name of the user and password of the user as inputs that are entered by the user manipulating the interface. Accordingly, in block 219 it is determined when the username and password of the user correspond with a password and user name of a previous scan / send job that is currently pending or in transmission. If this is the case, then the digital logic transmitter 195 is moved to the connector B in which the stored identifier (s) FROM the previous scan / send job are blocked within the FROM field for the current job of scanning / submit. If the previous scan / send job is not pending or transmitted, then the digital logic transmitter 195 moves to block 223. In block 223, digital logic transmitter 195 determines whether the multi-function peripheral 105 is currently transmitting a digital document. to the respective recipients. This may be the case if there were one or more digital documents in the mailing list in the multi-function peripheral 105 that are waiting to be transmitted. If you are currently transmitting a digital document, then digital logic transmitter 195 is moved to block 225 in which a parallel channel is opened by which an authentication request is transmitted to server 110. This is done so that the current user does not have to wait for a previous scan / send job to finish transmitting before they can be authenticated for a subsequent scan / send job. If there is not a digital document currently being transmitted in block 223 or after a parallel channel has been opened in block 226, digital logic transmitter 195 is moved to block 229.
Then, in block 229, the user's password is encrypted for transmission through network 125 (FIG 1) to server 110 (FIG 1). This is done to ensure that unscrupulous users who access the network 125 are not enabled to intercept a user password of a particular user of the multi-function peripheral 105. In addition, the user's name may also be encrypted. On the other hand, the username and password of the user are encrypted in block 229, the digital logic transmitter 195 advances to block 233 in which a request for validation of the user's password and user name is transmitted to the server 110. accompanied by the encrypted password and the user's name. The digital logic transmitter 195 then advances to the connector C. With reference to FIG. 2B, shows that it is a continuation of digital logic transmitter 195. From connector C, digital logic transmitter 195 is moved to block 236 in which digital logic transmitter 195 expects to receive a response from server 110 (FIG 1). Assuming that a response has been received, then the digital logic transmitter 195 is moved to block 239 to determine when the response indicates that the transmitted user credentials have been authenticated or are valid. If it determines that the credentials are not valid, then the digital logic transmitter 195 ends accordingly. However, if it is determined that the credentials are valid, then the digital logic transmitter 195 is moved to block 243 in which an email address or user name is blocked in a "FROM" field that is associated with the pending date of transmission. Note that a "valid" response received from the server 110 is accompanied by the email address and / or the user's name, that is, the FROM identifiers, as discussed above, that information has been obtained from the directory 120 server ( FIG 1). In addition, connector B also leads to block 243 from block 219 (FIG 2A) as discussed above. Once the FROM identifier (s) is / are blocked within the FROM field in block 243, the digital logical transmitter 195 advances to block 246 in which the user's name, the user's password, and the ( the associated FROM identifier (s) are stored in memory 135 for potential future use as determined in block 219 (FIG.2A). Accordingly, the digital logic transmitter 195 moves to block 249 in which the address of the recipient, telephone number, etc. , it is entered in a "TO" field. The TO field is associated with the current scan / send job and indicates the appropriate document recipient (s). Accordingly, digital logic transmitter 195 proceeds to block 253 in which the document is scanned by the multi-function peripheral 105 in memory 135. Next, in block 256 the current scan / send job is placed in the list of sending for transmission to the appropriate recipients. If no previous scan / send job is currently being transmitted, then the scan / send present job is immediately transmitted to the recipients. With reference to FIG. 3 below, a logic authentication flow chart 200 is shown which is executed by the server 110 (FIG.1) to validate a particular user required by the multi-function peripheral 105 (FIG.1) in accordance with a mode of the present invention. The logical authentication 200 is executed by the processor 160 (FIG.1) in communication with the domain controller 115 (FIG.1), the directory server 120 (FIG.l) and the multi-function peripheral 105 performs the task of validation. Starting with block 303, logical authentication 200 determines when an authentication request has been received from the multi-function peripheral 105 together with a user name and the password of the associated user. If this is the case, then the logical authentication 200 advances to block 306 in which the user's password is decrypted and the user's name is also decrypted if necessary. Then, in block 309 the user's password and the user's name are verified with the domain controller 115. The domain controller 115 verifies that the username and password of the user are valid in the network 125 (FIG 1) and also identifies a secure identification code that is associated with the user based on the user's name and / or the user's password. The secure identification card is a globally unique identifier that is associated with the user. If the user's password and the user's name are valid as determined by the domain controller 115, then the domain controller 115 will transmit the secure identification card to the server 110 along with an indication that the user's name and password user are valid. In block 313, the logical authentication 200 determines when the domain controller 115 has supplied a secure identification card. If not, then the logical authentication 200 advances to block 316. On the other hand if a response is received from the domain controller 115 with a valid secure identification card with the indication that the user is a valid user, then the logical authentication advances to the block 319. In block 319 an appropriate name and / or email address corresponding to the secure identification card are requested from the directory server 120 using the lightweight directory access (LDAP) protocol operating in the server directory 120 (FIG 1). The lightweight directory access protocol is generally known to those of ordinary skill in the art and will not be discussed in detail by this means. Accordingly, in block 323 the logical authentication 200 determines when a valid response with an email address or name has been received from the server of the directory 120. If such is the case then the logical authentication 200 advances to block 326. If not , then, the logical authentication 200 moves to block 316. In block 326 a response is transmitted to the multi-function peripheral with the appropriate email address and / or user name. This indicates to the multi-function peripheral 105 that the user authentication was successful and that in addition the scanning and transmission tasks can be completed. Also, the email address and / or user name supplied to the multi-function peripheral 105 may be used in the "FROM" field associated with the particular transmission of the scanned document. Otherwise, in block 316 the logical authentication 200 transmits a failure indication in the authentication to the multi-function peripheral 105 indicating that the user has not been authenticated. This prevents the user from scanning and / or transmitting the document when the user is not validated in the network 125. After the block 326 and / or 316, therefore the logical authentication 200 ends. Although the logic 195 (FIGS. B) and 200 (FIG.3) of the present invention are incorporated into the programming (software) as discussed above, as an alternative the logic 195 and 200 can also be incorporated into the components (hardware) or a combination of programs and components (software and hardware). If incorporated into the hardware, logic 195 and 200 can be implemented as a circuit or state machine employing any one or a combination of a number of technologies. These technologies may include, but are not limited to, discrete logic circuits that have logic gates to implement various logic functions in an application of one or more data signals, application-specific integrated circuits that have appropriate logic gates, programmable gate arrays (PGA), field programmable gate (FPGA) arrays, or other components, etc. Similar technologies are generally well known to those skilled in the art and, consequently, are not described in detail in this medium. The block diagram of FIG. 1 and the flow charts of FIGS. 2A, 2B, and 3 show the architecture, functionality, and operation of an implementation of logic 195 and 200. If incorporated into the software, each block may represent a module, segment, or portion of a code comprising one or more executable instructions to implement the specified logical function (s). If incorporated into the hardware, each block can represent a circuit, or a number of interconnected circuits to implement the specified logical function (s). Although the block diagram of FIG. 1 and the flow charts of FIGS. 2A, 2B, and 3 show a specific order of execution, it is understood that the order of execution may differ from that described. For example, the order of execution of two or more blocks can be modified in relation to the order shown. Also, two or more blocks shown in succession in FIGS. 2A, 2B, and 3 can be executed concurrently or with partial concurrence. It is understood that all similar variations are within the scope of the present invention. Also, logics 195 and 200 can be included in any half-reading computer to be used by or in connection with an instruction execution system such as a computer / processor based system or other system that can draw or obtain logic of a readable computer medium and execute the instructions contained in it. In the context of this document, "a readable computer means" can be any means that can contain, store, or maintain logic 195 and 200 to be used by or in connection with the instruction execution system. The readable computer means may comprise any of many physical media such as, for example, electronic, magnetic, optical, electromagnetic, infrared or semiconductor media. More specific examples of a suitable read-medium computer might include, but are not limited to, a portable magnetic computer diskette such as soft disks or hard drives, a random access memory (RAM), a read-only memory (ROM). ), an erasable programmable read-only memory, or a portable compact disc (CDROM) read-only memory. Many variations and modifications can be made to the above-described embodiment (s) of the invention without departing substantially from the spirit and principles of the invention. All similar modifications and variations are proposed to be included herein within the scope of the present invention.
Claims (10)
1. A system for authenticating a user comprises: a processor coupled to a local network; a memory coupled to the local network; and the sending logic stored in the memory and executable by the processor, the sending logic comprises: the logic for entering a password associated with the user; the logic to authenticate the password and to obtain a FROM field identifier associated with the user; and the logic to block the FROM field identifier in a FROM field associated with a data transmission.
2. The system of claim 1, wherein the sending logic further comprises the logic for entering a user name.
The system of claim 1, wherein the logic for authenticating the password and for obtaining the FROM field identifier associated with the user additionally comprises: the logic for encrypting the password; and the logic to apply the password to the authentication logic to verify the password and to obtain the FROM field identifier associated with the user.
4. A method for authenticating a user, comprising the steps of: entering a password associated with a user in a device; authenticate the password and obtain a FROM field identifier associated with the user; and blocking the FROM field identifier in a FROM field associated with a data transmission to be transmitted from the device.
The method of claim 4, wherein the step of authenticating the password and obtaining a FROM field identifier associated with the user further comprises the steps of: encrypting the password; and apply the password to the logical authentication to verify the password and obtain the field identifier associated with the user.
6. A system for authenticating a user, comprising: a processor coupled to the local network; a memory coupled to the local network; and the logical authentication stored in the memory and executable by the processor, the authentication logic comprises: the logic for verifying a password associated with a user; and the logic to obtain a FROM field identifier associated with the user.
7. The system of claim 6, wherein the authentication logic further comprises the logic for applying the FROM field identifier to the sending logic associated with a data transmission.
The system of claim 6, wherein the logic for verifying a password associated with a user further comprises the logic for deciphering the password.
9. A method on a server for authenticating a user, comprising the steps of: verifying a password associated with the user; and obtain a FROM field identifier associated with the user.
10. The method in the server of claim 9, further comprising the step of applying the identifier of the FROM field to the sending logic that is associated with a data transmission.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09607568 | 2000-06-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
MXPA01000832A true MXPA01000832A (en) | 2002-06-05 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6880091B1 (en) | System and method for authentication of a user of a multi-function peripheral | |
US9106868B2 (en) | Image processing apparatus, control method therefor, and storage medium | |
JP5251752B2 (en) | Method for printing locked print data using user and print data authentication | |
JP5625252B2 (en) | Printing apparatus, method, and computer-readable storage medium | |
JP5332814B2 (en) | Printing apparatus, processing method, and computer program | |
US7865933B2 (en) | Authentication agent apparatus, authentication method, and program product therefor | |
EP2037385B1 (en) | Information processing apparatus, authentication control method, and authentication control program | |
US20030145219A1 (en) | Parameter verification in an authentication system and method | |
US20070115494A1 (en) | Image processing system, information processing device, computer readable recording medium, and information processing method | |
US8537395B2 (en) | Image processing system, image processing apparatus, recording medium and data communication establishing method | |
US20010056538A1 (en) | Information processing apparatus for adding sender information to transmission data and transmitting the transmission data and control method therefor | |
US7304757B2 (en) | System and method for secure printing | |
US7103182B2 (en) | Public encryption of a stored print job | |
US20050219610A1 (en) | Information processing apparatus and method, and printing apparatus and method | |
JP4814348B2 (en) | Image reading apparatus, server apparatus, and system | |
US20090073487A1 (en) | Image forming apparatus and job control method | |
US20080056502A1 (en) | Application program distributing apparatus, image processing apparatus and program, allowing data communications using S/MIME at ease | |
JP7512780B2 (en) | Information processing device and program | |
US8272027B2 (en) | Applying digital rights to newly created electronic | |
US20020112184A1 (en) | System and method for secure transmission of data clients | |
MXPA01000832A (en) | System and method for authentication of a user of a multi-function peripheral | |
US6877028B2 (en) | System and method for transferring a directory in portions of limited size | |
JP2013219411A (en) | Image forming apparatus | |
JP2011142467A (en) | Image forming system and image forming apparatus |