Image formation system with authentication function
A user name entered on a user authentication screen is searched and if it found to be an unregistered user name a different, registered image formation apparatus is asked to act as a proxy to perform user authentication. If the apparatus returns "OK" a decision is made that the authenticat...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
17.06.2008
|
Online Access | Get full text |
Cover
Loading…
Summary: | A user name entered on a user authentication screen is searched and if it found to be an unregistered user name a different, registered image formation apparatus is asked to act as a proxy to perform user authentication. If the apparatus returns "OK" a decision is made that the authentication of interest is "OK" and the authentication process ends. If all of the image formation apparatuses registered in a proxy authentication apparatus registration table are requested to perform user authentication do not provide an authentication "OK" a decision is made that the authentication of interest is "NG" and the authentication process ends. Thus in networked environment an image formation apparatus can be provided that can eliminate the necessity of registering information for user authentication with all image formation apparatuses and also prevent improper use by a user registered with an unintended image formation apparatus. |
---|