Printing system, printing apparatus and non-transitory computer-readable medium storing instructions to terminal apparatus

ABSTRACT

A printing system includes a terminal apparatus and a printing apparatus. The terminal apparatus includes: a first inputting section; and a processor configured to: transmit a print request for printing an object image indicated by object data to the printing apparatus; receive first input authentication information inputted by a user; and transmit the first input authentication information to the printing apparatus. The printing apparatus includes: a second inputting section; a printing section; a processor configured to: receive the print request; store the object data and associated authentication information included in the print request while associating with each other in a first memory; receive the first input authentication information; determine whether the first input authentication information matches the associated authentication information; receive input of second input authentication information from the user; and determine whether the second input authentication information matches the associated authentication information.

CROSS REFERENCE TO RELATED APPLICATION

The present application claims priority from Japanese Patent ApplicationNo. 2016-002329 filed on Jan. 8, 2016 the disclosure of which isincorporated herein by reference in its entirety.

BACKGROUND

Field of the Invention

The present invention relates to a printing system, a printing apparatusand a non-temporary and computer-readable medium storing instruction toa terminal apparatus, capable of communicating with the printingapparatus, which are configured to delete an object data stored in amemory.

Description of the Related Art

Conventionally, there is known a configuration wherein an image formingapparatus stores an image data to which a password is added. In thisimage forming apparatus, the image data can be printed under a conditionthat a password is inputted by a user and the authentication(verification) for the inputted password is successful. Further, in acase that deletion of the image data added with the password and thestored in the image forming apparatus is instructed, the image formingapparatus displays a screen urging the input of the password. Then, in acase that the password is inputted by the user via the screen, the imageforming apparatus determines whether or not the inputted password is thepassword added to the image data, and deletes the image data under acondition that the inputted password matches the password added to theimage data.

SUMMARY

In the technique described in Japanese Patent Application Laid-open No.H11-045034, in a case that the user wishes to delete the image data, theuser is required to go in front of the image forming apparatus, and toinput the password via the screen of the image forming apparatus.Namely, the user is required to go to in front of the image formingapparatus for the sole purpose of deleting the image data. Accordingly,it takes the user's time and labor to delete the image data which isadded with the password and stored in the image forming apparatus.

The present teaching has been made in view of the above-describedsituation, and an object of the present teaching is to provide atechnique for reducing the time and labor of the user in a case ofdeleting data as an object to be deleted (object data) which is storedin the memory while being associated with associated (related)authentication information.

The present teaching has been made for solving at least a part of theabove task, and can be realized by an aspect as described in thefollowing.

According to a first aspect of the present teaching, there is provided aprinting system including a terminal apparatus and a printing apparatuscommunicable with each other,

wherein the terminal apparatus includes:

-   -   a first inputting section;    -   a first network interface; and    -   a processor configured to:        -   transmit a print request for printing an object image            indicated by object data via the first network interface to            the printing apparatus, the print request including            associated authentication information associated with the            object data;        -   receive first input authentication information inputted by a            user via the first inputting section, after the print            request has been transmitted; and        -   transmit the received first input authentication information            via the first network interface to the printing apparatus,            and

the printing apparatus includes:

-   -   a second inputting section;    -   a second network interface;    -   a printing section; and    -   a processor configured to:        -   receive the print request via the second network interface            from the terminal apparatus;        -   store the object data and the associated authentication            information included in the print request while associating            with each other in a first memory;        -   receive second input authentication information inputted by            the user via the second inputting section, after the object            data and the associated authentication information have been            stored in the first memory;        -   determine whether the received second input authentication            information inputted by the user via the second inputting            section matches the associated authentication information            stored in the first memory;        -   print the object image indicated by the object data by using            the printing section, if the processor of the printing            apparatus determines that the second input authentication            information matches the associated authentication            information;        -   receive the first input authentication information via the            second network interface from the terminal apparatus, after            the object data and the associated authentication            information have been stored in the first memory;        -   determine whether the first input authentication information            received from the terminal apparatus matches the associated            authentication information stored in the first memory; and        -   delete the object data from the first memory without            printing the object image indicated by the object data, if            the processor of the printing apparatus determines that the            first input authentication information matches the            associated authentication information.

In the printing system according to the first aspect of the presentteaching, the terminal apparatus transmits the first inputauthentication information inputted in the terminal apparatus to theprinting apparatus. The printing apparatus deletes the object dataassociated with the associated authentication information from the firstmemory, if the received first input authentication information matchesthe associated authentication information stored in the first memory.Namely, the user can delete the object data from the first memory byinputting the first input authentication information to the terminalapparatus, without having to go in front of the printing apparatus andinput the first input authentication information to the printingapparatus. Accordingly, it is possible to reduce the time and labor ofthe user in a case that the user wishes to delete the object data whichis stored in the first memory while being associated with the associatedauthentication information.

According to a second aspect of the present teaching, there is provideda printing apparatus communicable with a terminal apparatus, theprinting apparatus including:

an inputting section;

a network interface;

a printing section; and

a processor configured to:

-   -   receive a print request for printing an object image indicated        by object data from the terminal apparatus via the network        interface, the print request including associated authentication        information associated with the object data;    -   store the object data and the associated authentication        information included in the print request while associating with        each other in a memory;    -   receive, from the terminal apparatus via the network interface,        first input authentication information which is inputted to the        terminal apparatus, after the object data and the associated        authentication information have been stored in the memory;    -   determine whether the first input authentication information        received from the terminal apparatus matches the associated        authentication information stored in the memory;    -   receive second input authentication information inputted by a        user via the inputting section, after the object data and the        associated authentication information have been stored in the        memory;    -   determine whether the received second input authentication        information inputted via the inputting section matches the        associated authentication information stored in the memory;    -   print the object image indicated by the object data by using the        printing section, if the processor determines that the second        input authentication information matches the associated        authentication information; and    -   delete the object data from the memory without printing the        object image indicated by the object data, if the processor        determines that the first input authentication information        matches the associated authentication information.

The printing apparatus according to the second aspect of the presentteaching deletes, similarly to the first aspect, the object dataassociated with the associated authentication information, if the firstinput authentication information received from the terminal apparatusmatches the associated authentication information stored in the memory.Namely, the user can delete the object data from the memory by inputtingthe first input authentication information to the terminal apparatus,without having to go in front of the printing apparatus and input thefirst input authentication information to the printing apparatus.Accordingly, it is possible to reduce the time and labor of the user ina case that the user wishes to delete the object data which is stored inthe memory while being associated with the associated authenticationinformation.

According to a third aspect of the present teaching, there is provided anon-transitory computer-readable medium storing instructions to aterminal apparatus which includes an inputting section, a display, and anetwork interface and which is communicable with a printing apparatus,the instructions, when executed by a processor of the terminalapparatus, causing the terminal apparatus to:

display, on the display, a deletion screen which is for a user toinstruct deletion of object data from a first memory and which includesan item indicating identification information for identifying the objectdata, after a print request including associated authenticationinformation associated with the object data and the identificationinformation for identifying the object data has been received by theprinting apparatus and then the object data, the associatedauthentication information, and the identification information have beenstored in the first memory while being associated with one another, theprint request being a request for printing an object image indicated bythe object data;

receive input authentication information inputted by the user via theinputting section; and

transmit, to the printing apparatus via the network interface, a deleterequest including the identification information and the inputauthentication information, if the deletion of the object data has beeninstructed via the deletion screen and then the input authenticationinformation inputted by the user has been received,

wherein the delete request is a request for deleting the object datafrom the first memory without printing the object image indicate by theobject data if the input authenticating information included in thedelete request matches the associated authentication information storedin the first memory while being associated with the identificationinformation.

The instructions stored in the medium according to the third aspect ofthe present teaching cause the terminal apparatus to transmit, to theprinting apparatus, the delete request for deleting the object data andincluding the input authentication information inputted via theinputting section of the terminal apparatus. Namely, the user cantransmit, to the printing apparatus, the request for deleting delete theobject data from the memory by inputting the input authenticationinformation to the terminal apparatus, without having to go in front ofthe printing apparatus and input the input authentication information tothe printing apparatus. Accordingly, it is possible to reduce the timeand labor of the user in a case that the user wishes to delete theobject data which is stored in the memory while being associated withthe associated authentication information. Further, this configurationallows the user to instruct the object data to be deleted, based on theidentification information included in the deletion screen displayed bythe terminal apparatus.

Further, the terminal apparatus of the present teaching, and acontrolling method, a computer program and a computer-readable recordingmedium storing the computer program which are configured to realize thefunctions of the printing system, the printing apparatus and theterminal apparatus of the present teaching are also novel and effective.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A and 1B are views depicting the configuration of a printingsystem.

FIGS. 2A and 2B are a sequence diagram of a data storage processing.

FIG. 3 is a flow chart of a data print processing.

FIGS. 4A and 4B are a sequence diagram of a data deletion processing ofa first embodiment.

FIG. 5 is a view depicting a deletion screen.

FIGS. 6A to 6C are a sequence diagram of a data deletion processing of asecond embodiment.

DESCRIPTION OF THE EMBODIMENTS First Embodiment

With reference to FIGS. 1A and 1B, an explanation will be given aboutthe configuration of a printing system 2. The printing system 2 includesa PC 100, a mobile terminal 200, a printer 300 and Access Point (AP)400. The PC 100, the printer 300 and the AP 400 belong to a same localarea network (LAN) 5. Further, the mobile terminal 200 belongs to theLAN 5 by wirelessly connecting to the AP 400. Accordingly, the PC 100can communicate with the mobile terminal 200 and the printer 300 via theLAN 5, without via the Internet. Similarly, the mobile terminal 200 alsocan communicate with the PC 100 and the printer 300 via the LAN 5,without via the Internet. Note that although FIG. 1B depicts the PC 100and the mobile terminal 200 each as one unit, actually a plurality ofpieces of each of the PC 100 and the mobile terminal 200 areconnectable. Here, the configuration depicted in FIGS. 1A and 1B with adotted rectangle does not appear in the configuration of the firstembodiment, and thus the explanation therefor will be described in asecond embodiment to be described later on.

<Configuration of PC 100>

The PC 100 is a terminal usable by a user for causing the printer 300 toprint an image data. The PC 100 is provided with a network interface(network I/F) 110, a controller 120, a displaying section 130, and anoperating section 140. The network I/F 110 is an interface fortransmitting and receiving a signal via a network such as the LAN,Internet, etc.

The controller 120 is provided with a CPU 122 and a memory 124. Aprogram 126 is stored in the memory 124. The memory 124 is, for example,a RAM, a ROM, a HDD, etc. The CPU 122 executes a various kinds ofoperations (processings) in accordance with the program 126 stored inthe memory 124. Note that the program 126 includes a printingapplication 127 for printing a print data (to be described in detaillater on). Note that in the second embodiment (to be described lateron), the memory 124 stores a deleting application 128 and a standardformat 129 which are included in the program 126 depicted in FIG. 1B.However, the deleting application 128 and the standard format 129 arenot used (do not appear) in the configuration of the first embodiment,and thus the deleting application 128 and the standard format 129 willbe explained in relation to the second embodiment which will bedescribed later on.

The displaying section 130 is a display configured to display a variouskinds of information. The operating section 140 is provided with akeyboard and a mouse. The user can input a various kinds of instructionsto the PC 100 by operating the operating section 140.

<Configuration of Mobile Terminal 200>

The mobile terminal 200 is a terminal usable by the user for causing theprinter 300 to print an image data, similarly to the PC 100. The mobileterminal 200 is provided with a network I/F 210, a controller 220 and adisplaying section 230. The network I/F 210 is an interface fortransmitting and receiving a signal via a network such as the LAN,Internet, etc., and is an interface for wireless connection to anexternal apparatus or device.

The controller 220 is provided with a CPU 222 and a memory 224. Aprogram 226 is stored in the memory 224. The memory 224 is, for example,a RAM, a ROM, a HDD, etc. The CPU 222 executes a various kinds ofoperations (processings) in accordance with the program 226 stored inthe memory 224. Note that the program 226 includes a printingapplication 227 for printing a print data (to be described in detaillater on). Note that in the second embodiment (to be described lateron), the memory 224 stores a deleting application 228 and a standardformat 229 which are included in the program 226 depicted in FIG. 1B.However, the deleting application 228 and the standard format 229 arenot used (do not appear) in the configuration of the first embodiment,and thus the deleting application 228 and the standard format 229 willbe explained in relation to the second embodiment which will bedescribed later on.

The displaying section 230 is a display configured to display a variouskinds of information. Note that the displaying section 230 functionsalso as a touch panel configured to receive (accept) an operation by theuser.

<Configuration of Printer 300>

The printer 300 is a laser printer. The printer 300 is provided with anetwork I/F 310, a controller 320, a displaying section 330, anoperating section 340, and a print executing section 350. The networkI/F 310 is an interface for transmitting and receiving a signal via anetwork such as the LAN, Internet, etc.

The controller 320 is provided with a CPU 322 and a memory 324. Aprogram 326, a job table 327, a printer screen data 328, and a terminalscreen data 329 are stored in the memory 324. The memory 324 is, forexample, a RAM, a ROM, a HDD, etc. The CPU 322 executes a various kindsof operations (processings) in accordance with the program 326 stored inthe memory 324.

The job table 327 stores a job ID, a user name, a file name, and aPersonal Identification Number code (PIN code). The job ID isidentification information which is unique to a job generated inaccordance with a request from the PC and by which the job isidentified. The user name is identification information for identifyingthe user operating the PC from which the request is transmitted. Thefile name is identification information for identifying a print databased on an image data associated with the job. The PIN code isauthentication information which is utilized when a print data is to beprinted, and which is composed, for example, of a four-digit number.Note that in the second embodiment (to be described later on), aprotocol name is stored in the job table 327. The protocol name,however, does not appear in the configuration of the first embodiment,and thus the explanation therefor will be given in relation to thesecond embodiment.

As will be explained in detail later on, the printer 300 is capable ofexecuting a secure printing. The secure printing is a printing methodwherein an input of a PIN code associated to a print data from the uservia the displaying section 330 and the operating section 340 isreceived; and under a condition that the inputted PIN code matches a PINcode stored in the job table 327, the print data associated with thematched PIN code is printed. Note that the job table 327 depicted inFIG. 1A indicates a state that two jobs are already registered.

The printer screen data 328 is a page data indicating a screen which isdisplayed in the displaying section 330 of the printer 300 for executingthe secure printing. The printer screen data 328 includes a job listscreen and a PIN code input screen (to be described later on).

The terminal screen data 329 is a page data indicating a screendisplayed in the displaying section 130 of the PC 100 or the displayingsection 230 of the mobile terminal 200. Specifically, the printer 300 iscapable of functioning as a web server, and is capable of transmittingthe terminal screen data 329 which is a web page data having a HyperText Markup Language (HTML) format to the PC 100 and the mobile terminal200, to thereby cause the displaying section of each of the PC 100 andthe mobile terminal 200 to display a screen indicated by the terminalscreen data 329. Note that a part of the image indicated by the terminalscreen data 329 becomes displayable (visible) by a successful login tothe printer 300 by the PC 100 and the mobile terminal 200.

The terminal screen data 329 includes a home screen data, a login screendata, a login-success screen data, a login-failure screen data, adeletion screen data, a delete-success screen data, and a delete-failurescreen data (which will be described later on). Note that the homescreen data, the login screen data, the delete-success screen data, andthe delete-failure screen data are stored in advance in the memory 329as the terminal screen data 329. The login-success screen data and thelogin-failure screen data are generated in response respectively to theoccurrences of successful login and failed login by the PC 100, etc. tothe printer 300 (to be described in detail later on). The deletionscreen data is generated in response to reception, by the printer 300,of a deletion screen obtaining request from the PC 100, etc. (to bedescribed in detail later on).

The displaying section 330 is a display configured to display a variouskinds of information thereon. Note that the displaying section 330functions also as a touch panel for receiving (accepting) an operationfrom the user. The operating section 340 is provided with a plurality ofkeys. The user can input a various kinds of instructions to the printer300 by operating the displaying section 330 and/or the operating section340. The print executing section 350 executes a processing for printingan externally obtained data on a recording medium by a knownelectro-photographic system.

<Operation of Printing System 2> (Data Storage Processing)

With reference to FIGS. 2A and 2B, a data storage processing executed bythe printing system 2 will be explained.

In a case that a secure printing is desired by a user, at first, theprinting system 2 executes the data storage processing including theprocessings of steps T10 to T22 in response to the user's operation ofthe PC 100. Here, the secure printing is a printing method for executingprinting under a condition that the PIN code is inputted to the printer300, as described above. Specifically, in a case that the printer 300receives the PIN code and an image data from the PC 100, the printer 300does not immediately print the image data, and in a case that the PINcode is inputted by the user, the printer 300 prints the image dataassociated with the PIN code inputted by the user.

In step T10, the PC 100 receives (accepts), from the user, an executioninstruction for executing the secure printing. Specifically, at first,the PC 100 activates the printing application 127, triggered by theuser's selection of printing of an image data img1 with an imagebrowsing application (not depicted in the drawings) included in theprogram 126, and the PC 100 causes the displaying section 130 to displaya print setting screen.

The print setting screen is a screen for allowing the user to makesettings for the printing of the image data img1. The PC 100 obtainssetting information st1 composed of a number of copies to be printed, asetting regarding double-sided printing and a sheet size for the imagedata img1, based on input made by the user in the print setting screen.Further, the PC 100 obtains a user name us1 and a PIN code pin1 forexecuting the secure printing for the image img1, based on the inputmade by the user in the print setting screen. Note that it is allowableto designate the user name us1 by using a user name used during thelogin to the PC 100 by the user when the PC 100 has been activated,rather than the user name specified with the input by the user.

In step T12, the PC 100 transmits a job generating request req1 to theprinter 300, in accordance with a protocol 1. The protocol 1 is, forexample, Web Service on Devices (WSD). The job generating request req1is a request for causing the printer 300 to generate a print job for aprint data pimg1 based on the image data img1. The job generatingrequest req1 includes a file name file1 as the file name of the imagedata img1, and the user name us1 obtained in step T10. Note that insteps T12 to T22, the PC 100 and the printer 300 communicate with eachother in accordance with the protocol 1.

In step T14, the printer 300 generates a job 1 based on the jobgenerating request 1. The job 1 includes the user name us1 and the filename file1. After the printer 300 has generated the job 1, the printer300 imparts a job ID jb1 to the job 1; and the printer 300 stores, inthe job table 327, the job ID jb1, the user name us1 and the file namefile1 as the job 1 in which the job ID jb1, the user name us1 and thefile name file1 are associated to one another.

In step T16, the printer 300 transmits a response res1 to the PC 100, inaccordance with the protocol 1. The response res1 is a response withrespect to the job generating request req1, and indicates that the job 1has been generated successfully.

In step T18, the PC 100 transmits a print data generating request req2to the printer 300 in accordance with the protocol 1. The print datagenerating request req2 is a request for causing the printer 300 togenerate a print data based on the setting information st1 obtained inthe step T10. The print data generating request req2 includes the imagedata img1, the setting information st1 and the PIN code pin1.

In step T20, the printer 300 generates a print data based on the printdata generating request req2. Specifically, the printer 300 generates,from the image data img1, a RGB output data in which RGB value in arange of 0 to 255 is imparted to each of pixels. Note that the printer300 generates the RGB output data based on the setting information st1.Next, the printer 300 executes a color conversion processing forconverting the RGB value, of each of the pixels contained in the RGBoutput data, into a CMYK value. With this, a CMYK output data in which aCMYK value in a range of 0 to 255 is imparted to each of pixels isgenerated. Next, the printer 300 executes a binarization processing forthe CMYK output data. As the binarization processing, for example, thedithering method, the error diffusion method, etc. is used. Thisgenerates print data pimg1 in which each of the pixels has atwo-gradation pixel value that is 1 or 0. Note that “1” indicates that adot is formed on a recording medium, and “0” indicates that no dot isformed on the recording medium. The printer 300 stores the generatedprint data pimg1 in the memory 324, while associating the generatedprint data pimg1 with the job ID jb1.

Further, the printer 300 stores the PIN code pin1 in the job table 327while associating the PIN code pin1 with the job ID jb1. By doing so,the print data pimg1 and the job 1 (the job ID jb1, user name us1, filename file1, and PIN code pin1) are stored in the memory 324 while beingassociated with each other.

In step T22, the printer 300 transmits a response res2 to the PC 100, inaccordance with the protocol 1. The response res2 is a response withrespect to the print data generating request req2 and indicates that theprint data pimg1 has been generated successfully.

Steps T30 to T42 indicate a case that a user, different from the useroperating the PC 100, operates the mobile terminal 200 to instruct theprinter 300 to execute the secure printing, at a different timing fromthe timing at step T10.

In steps T30 to T42, the mobile terminal 200 transmits, to the printer300, a job generating request req3 and a print data generating requestreq4 in a similar manner as those in steps T10 to T22, which in turncauses the printer 300 to generate a job 2 and a print data pimg2, andto store the generated job 2 and print data pimg2 in the memory 324while associating the generated job 2 and print data pimg2 with a job IDjb2.

The PC 100 transmits, in step T12, the job generating request req1including the user name us1 and the file name file1 to the printer 300,and the PC transmits, in step T18, the print data generating requestreq2 including the image data img1, the setting information st1 and thePIN code pin1 to the printer 300. On the other hand, the mobile terminal200 transmits, in step T32, a job generating request req3 for generatingthe job 2 including a user name us2, a file name file2, and a PIN codepin2 in accordance with a protocol 2 (for example, Internet PrintingProtocol (IPP)) which is different from the protocol 1, to the printer300. Further, the mobile terminal 200 transmits, in step T38, a printdata generating request req4 including an image data img2 and settinginformation st2, to the printer 300. Namely, it is allowable that thePIN code is contained in either one of the job generating request andthe print data generating request.

With this, the print data pimg2 and the job 2 (the job ID jb2, user nameus2, file name file2, and PIN code pin2) are stored in the memory 324while being associated with each other. Note that in steps T32 to T42,the mobile terminal 200 and the printer 300 communicate with each otherin accordance with the protocol 2.

Note that in the embodiment as described above, each of the PC 100 andthe mobile terminal 200 transmits the job generating request and theprint data generating request separately to the printer 300. Instead ofdoing so, however, it is allowable that each of the PC 100 and themobile terminal 200 transmits one generating request in which the jobgenerating request and the print data generating request are combined(bundled). In this case, the generating request includes the user name,the file name, the PIN code, the image data and the setting information.After the printer 300 receives the generating request, the printer 300stores, in the job table 327, the user name, the file name and the PINcode while associating the user name, the file name and the PIN codewith the job ID. Further, the printer 300 generates a print data basedon the image data and the setting information, and stores the generatedprint data in the memory 324 while associating the print data with thejob ID. With this, the print data and the job are stored in the memory324 while being associated with each other.

In the above-described manner, the two jobs are registered in the jobtable 327 as depicted in FIG. 1A. Note that these requests may beexecuted with respect to the printer 300 by another terminal apparatusor unit different from the PC 100 and the mobile terminal 200. Note thatalthough the jobs registered by the print instructions from differentusers, respectively, are indicated in the job table 327 depicted in FIG.1A by way of example, in a case that a same user (for example, the username us1) issues another print instruction, a job different from the job1 (for example, a job 3) is further registered in the job table 327while being associated with the user name us1.

(Data Print Processing)

Next, an explanation will be given about a data print processingexecuted by the printer 300, with reference to FIG. 3. The data printprocessing is a processing for printing a print data of a job generatedand stored by the data storage processing.

The printer 300 starts the data print processing under a condition thatthe printer 300 receives, form a user, an operation of selecting abutton, for the execution of secure printing, which is displayed in thedisplaying section 330.

In step S110, the CPU 322 causes the displaying section 330 to display ajob list screen, and receives a selection of a job to be executed. Thejob list screen includes a list of all the file names of the jobs storedin the job table 327, boxes each for selecting one of the stored jobsfor of which execution is instructed, an execution button forinstructing the execution of the job, and a stop button for stopping thejob selection for the secure printing. Note that in the presentembodiment, although the job list screen displays the list of the filenames of all the jobs stored in the job table 327, regardless of theuser name, there is no limitation to this. It is allowable, for example,in a case that the user name is inputted by a login operation to theprinter 300, etc., before selecting the button for executing the secureprinting, job(s) associated with the inputted user name is (are)extracted from the job table 327 and is displayed in the job listscreen.

In step S112, the CPU 322 determines whether or not a job is selected inthe job list screen, and whether or not execution of the selected job isinstructed. The CPU 322 determines that no job is selected (S112: NO) ina case that the execution button is not depressed in the job listscreen, or that the execution button is depressed in a state that anybox for selecting the job is not selected, and the CPU 322 executes theprocessing of step S110. On the other hand, the CPU 322 determines thatthe job is selected (S112: YES) in a case that the execution button isdepressed in a state that a box for selecting the job is selected, andthe CPU 322 executes the processing of step S114. Note that the CPU 322ends the data print processing in a case that the stop button isdepressed (not depicted in the drawings).

In step S114, the CPU 322 displays a PIN code input screen for executinga job selected in the job list screen (hereinafter referred to as “printjob”), and receives (accepts) input of the PIN code. The PIN code inputscreen includes a box for inputting the PIN code, an instruction buttonfor instructing the authentication of the PIN code, and a stop buttonfor stopping the authentication of the PIN code.

In step S116, the CPU 332 determines whether or not the PIN codeinputted in the PIN code input screen matches the PIN code associatedwith the print job. The CPU 322 executes the authentication of the PINcode, in response to the input of the PIN code to the box for inputtingthe PIN code thereto, and the depression of the button for instructingthe authentication. Specifically, the CPU 322 determines whether or notthe inputted PIN code matches the PIN code stored in the job table 327while being associated with the print job.

In a case that the inputted PIN code does not match the PIN codeassociated with the print job (S116: NO), the CPU 322 executes theprocessing of step S114. On the other hand, in a case that the inputtedPIN code matches the PIN code associated with the print job (S116: YES),the CPU 322 executes the processing of step S118. Note that in a casethat the stop button is depressed (not depicted in the drawings), theCPU 322 executes the processing of step S110, and again receives the jobselection.

In step S118, the CPU 322 prints a print data associated with the printjob. Here, the CPU 322 uses a print executing section 350 so as to printthe print data on a recording medium, based on the setting informationincluded in the print request at the time when the print job has beengenerated.

In step S120, the CPU 322 deletes the print job. Specifically, the CPU322 deletes the job ID, the user name, the file name and the PIN code,which are associated with the print job, from the job table 327.Further, the CPU 322 deletes the print data associated with the job IDof the print job, from the memory 324. In response to the completion ofthe processing of step S120, the data print processing is ended.

(Data Deletion Processing)

Next, an explanation will be given about a data deletion processingexecuted by the printing system 2, with reference to FIGS. 4A and 4B.The data deletion processing is a processing for deleting a jobgenerated and stored by the data storage processing. In the embodiment,although the data deletion processing is explained after the explanationof the data print processing, the execution sequence of the data printprocessing and the data deletion processing is not limited to this. Thedata deletion processing may be executed after the execution of dataprint processing, or may be executed before the execution of data printprocessing. Namely, the printer 300 is capable of executing deletion ofa certain print data, regardless of the printing of a specific printdata which is different from the certain data.

The data deletion processing is started in a case that the user issuesan instruction to login to the printer 300 via the PC 100. Specifically,at first, the user operates the operating section 140 of the PC 100 soas to activate a web browser (not depicted in the drawings) included inthe program 126. Further, the user inputs, in the web browser, an IPaddress of the printer 300 to an address bar for specifying the address.The PC 100 makes access to the printer 300 in accordance with theinputted IP address, and obtains a home screen data included in theterminal screen data 329. The user depresses a login button in a homescreen indicated by the home screen data and displayed in the PC 100.With this, the data deletion processing is started. Note that in thepresent embodiment, it is assumed that the combination of the user nameus1 and a password psi for allowing the user corresponding to the username us1 to login to the printer 300, via the PC 100, etc., is stored inthe memory 324 of the printer 300 in advance.

In step T210, the PC 100 transmits a login screen obtaining requestreq11 to the printer 300. The login screen obtaining request req11 is arequest for allowing the PC 100 to obtain a login screen for login tothe printer 300.

In step T212, the printer 300 transmits, to the PC 100, a response res11with respect to the login screen obtaining request req11. The responseres11 includes the login screen data included in the terminal screendata 329.

In step T214, the PC 100 displays the login screen in the displayingsection 130, based on the login screen data. The login screen includes abox for inputting the user name, a box for inputting a password, and abutton for executing the login.

In step T215, the PC 100 receives inputs of the user name and thepassword by the user. The PC 100 obtains, in the login screen, the username us1, the password psw1 and a login execution instruction inresponse to depressing of the button for instructing the login after theuser name us1 has been inputted to the box for inputting the user name,and the password psw1 has been inputted to the box for inputting thepassword.

In step T216, the PC 100 transmits a login request req12 to the printer300. The login request req12 is a request for allowing the PC 100 tologin to the printer 300. The login request req12 includes the user nameus1 and the password pw1 which have been inputted in step T215.

In step T218, the printer 300 determines whether or not the login of thePC 100 has been successful. Specifically, the printer 300 determineswhether or not the combination of the user name us1 and the password pw1included in the login request req12 has been stored in the memory 324 inadvance. Here, since the combination of the user name us1 and thepassword pw1 has been stored in the memory 324 in advance, the printer300 determines that the login of the PC 100 has been successful (T218:YES), and executes the processing of step T220.

In step T220, the printer 300 generates a login-success screen dataincluded in the terminal screen data 329. The login-success screen dataindicates that the login of the PC 100 (to the printer 300) has beensuccessful.

In step T224, the printer 300 transmits, to the PC 100, a response res12with respect to the login request req12. The response res12 includes thelogin-success screen data indicating that the login of the PC 100 to theprinter 300 has been successful.

In step T226, the PC 100 displays the login-success screen, based on thelogin-success screen data received from the printer 300, in thedisplaying section 130.

Note that in step T218, in a case that the combination of the user nameus1 and the password pw1 included in the login request req12 has notbeen stored in the memory 324 in advance, the printer 300 determinesthat the login of the PC 100 (to the printer 300) has failed (T218: NO),and executes the processing of step T222.

In step T222, the printer 300 generates a login-failure screen dataincluded in the terminal screen data 329. The login-failure screen dataindicates that the login of the PC 100 (to the printer 300) has failed.Further, the response res12 transmitted in step T214 includes thelogin-failure screen data for displaying the login-failure screenindicating that the login of the PC 100 to the printer 300 has failed.Note that the login-failure screen may be a screen for receiving theinput of the user name and the input of the password again. In such acase, the login-failure screen includes a box for inputting the username, a box for inputting the password, and a button for executing thelogin, similarly to the login screen.

The following explanation will be made on the premise that the PC 100displays the login-success screen.

In step T227, the PC 100 receives a deletion screen obtaininginstruction from the user (issued by the user). In response to theselection made by the user, in the login-success screen, so as to selecta button for obtaining a deletion screen SC1 for deleting the job storedin the job table 327 of the printer 300, the PC 100 executes theprocessing of step T228.

In step T228, the PC 100 transmits a deletion screen obtaining requestreq14 to the printer 300.

In step T230, the printer 300 generates a deletion screen data includedin the terminal screen data 329. The deletion screen data is a screendata indicating the deletion screen SC1. The printer 300 generates thedeletion screen data by extracting the job 1 and the job 2 as all thejobs stored in the job table 327. Note that in order to display the filenames of the extracted jobs in the deletion screen SC1, the deletionscreen data includes the file name file1 and the file name file 2.Although not displayed in the deletion screen SC1, the job ID jb1 andthe job ID jb2 corresponding to the extracted jobs are also included inthe deletion screen data. With this, the user can instruct object datato be deleted based on the file names file1 and file2 included in thedeletion screen SC1 displayed by the PC 100. Note that it is allowableto generate the deletion screen data by extracting only the job(s) whichis (are) included in the jobs stored in the job table 327 and which is(are) stored while being associated with the user name us1 inputted atthe time of the login.

In step T232, the printer 300 transmits a response res14 to the PC 100.The response res 14 is a response with respect to the deletion screenobtaining request req14, and includes the deletion screen data generatedin step T230. With this, the printer 100 can display the deletion screenSC1 including the file name(s), even if the PC 100 does not store thefile name(s) included in the print request transmitted to the printer300.

In step T234, the PC 100 displays the deletion screen SC1 in thedisplaying section 130. As described above, the deletion screen SC1 is ascreen via which the job 1 and the job 2 stored in the job table 327 ofthe printer 300 can be deleted.

As depicted in FIG. 5, a checkbox CBX1 in the deletion screen SC1 is abox for selecting the job 1. The user can select the job 1 by checkingthe checkbox CBX1 on (by entering a check to the checkbox CBX1) based onthe file name file1 indicated next to the checkbox CBX1. Further, undera condition that the checkbox CBX1 is checked on, a textbox TBX1 istransformed from being in a display state in which the textbox TBX1 isinput-disabled to a display state in which the textbox TBX1 isinput-enabled. The textbox TBX1 is a box for inputting the PIN code ofthe job 1. As described above, the printer 300 receives the input of thePIN code by the user so as to print the print data corresponding to thejob. Accordingly, the printer 300 is required to receive the input ofthe PIN code by the user also in a case that the job is to be deleted.

A checkbox CBX2 is a checkbox for selecting the job 2. A textbox TBX2 isa box for inputting the PIN code of the job 2. Under a condition thatthe checkbox CBX2 is checked on, the textbox TBX2 is transformed frombeing in a display state in which the textbox TBX2 is input-disabled toa display state in which the textbox TBX2 is input-enabled, similarly tothe textbox TBX1. A button BT1 is a button for instructing the deletionof the selected job(s) to the printer 300. A button BT2 is a button forstopping (cancelling, aborting) the selection of the job(s) to bedeleted.

Returning to FIG. 4B, in step T236, the PC 100 receives the selection ofa job and the input of a PIN code by the user. In the deletion screenSC1 displayed in the displaying section 130 of the PC 100, the userenters a check to a check box corresponding to a job which the userwishes to delete, inputs the PIN code of the selected job in the textbox corresponding to the selected job, and then depresses the buttonBT1. The PC 100 obtains the inputted PIN code, and specifies the job IDcorresponding to the job based on the check entered in the checkbox. Inthe following, an explanation will be given about a case that the userinstructs the deletion of the job 1. Namely, in the deletion screen SC1,the user depresses the button BT1 in a state that the checkbox CBX1 ischecked on and the PIN code pin1 is inputted in the textbox TBX1. Inthis situation, the PC 100 obtains the PIN code pin1 and specifies thejob ID jb1, as well.

In step T238, the PC 100 transmits a job deleting request req15 to theprinter 300. The job deleting request req15 is a request for causing theprinter 300 to delete the job 1 of which deletion is instructed by theuser. The job deleting request req15 includes the job ID jb1 specifiedand the PIN code pin1 obtained by the input made by the user in stepT236.

In step T240, the printer 300 determines whether or not the PIN codeincluded in the job deleting request req15 matches the PIN codecorresponding to the job of which deletion is requested by the user.Specifically, the printer 300 specifies that the job of which deletionis requested by the user is the job 1, based on the job ID jb1 includedin the job deleting request req15. The printer 300 determines whether ornot the PIN code included in the job deleting request req15 matches thePIN code corresponding to the job 1. Here, since each of the PIN codeincluded in the job deleting request req15 and the PIN codecorresponding to the job 1 is the PIN code pin1, the printer 300determines that the PIN codes match to each other (T240: YES), and theprinter 300 executes the processing of T242.

In step T242, the printer 300 deletes the job 1. Specifically, theprinter 300 deletes, from the job table 327, the job ID jb1, the username us1, the file name file1 and the PIN code pin1. Further, theprinter 300 deletes the print data pimg1 associated with the job ID jb1of the job 1 from the memory 324.

In step T244, the printer 300 transmits, to the PC 100, a response res15with respect to the job deleting request req15. The response res15includes a delete-success screen data included in the terminal screendata 329. The delete-success screen data is a screen data for displayinga delete-success screen for indicating the deletion of the job 1, ofwhich deletion has been specified by the user, has been successful.

In step T246, the PC 100 displays the delete-success screen, based onthe delete-success screen data received from the printer 300, in thedisplaying section 130.

Note that in step T240, in a case that the PIN code included in the jobdeletion request req15 does not match the PIN code corresponding to thejob of which deletion has been specified by the user (T240: NO), theprinter 300 executes the processing of step T244, without executing theprocessing of T242. In this case, the response res15 transmitted in stepT244 includes a delete-failure screen data included in the terminalscreen data 329. The delete-failure screen data is a screen data fordisplaying a delete-failure screen indicating that the deletion of thejob of which deletion was specified by the user has been failed.Further, in step T246, the PC 100 displays the deletion-failure screenin the displaying section 130. Note that the deletion-failure screen maybe a screen for receiving (accepting) the PIN code, corresponding to thejob of which deletion has been failed, again. In such a case, thedelete-failure screen includes a box for inputting the PIN code, and abutton for instructing the execution of login.

In response to the completion of the processing of step T246, the datadeletion processing is ended. Note that in a case that the userinstructs, via the deletion screen SC1, the execution of the deletion ofboth of the job 1 and the job 2, then the determination is to be madefor each of the job 1 and the job 2 in step T240 as to whether thecorresponding PIN codes match or not regarding each of the jobs 1 and 2.In such a case, for example, under the condition that the PIN codesmatch regarding each of the jobs 1 and 2, the printer 300 transmits thedelete-success screen data to the PC 100; on the other hand, under acondition that the PIN codes does not match regarding at least one ofthe jobs 1 and 2, the printer 300 transmits the delete-failure screendata to the PC 100.

Note that although the user operates the PC 100 in this embodiment, itis allowable that the user operates the mobile terminal 200, instead ofoperating the PC 100, so as to execute the data deletion processing. Insuch a case, since the processings executed by the mobile terminal 200are similar to those executed by the PC 100, any explanation thereforwill be omitted.

As explained above, in the present embodiment, in a case that the PC 100transmits the PIN code pin1 inputted in step T236 to the printer 300,the printer 300 deletes the print data pimg1 of the job 1 from thememory 324 under a condition that the PIN code pin1 received from the PC100 matches the PIN code pin1 stored in the memory 324 while beingassociated with the job ID jb1. Namely, the user can delete the imagedata pimg1 from the memory 324, without going in front of the printer300 and inputting the PIN code pin1 to the printer 300. Accordingly, itis possible to reduce the time and labor of the user in a case ofdeleting the print data pimg1 which is stored in the memory 324 whilebeing associated with the PIN code pin1.

<Corresponding Relationship>

The PC 100 is an example of the “terminal apparatus”. The printer 300 isan example of the “printing apparatus”.

The print data pimg1 is an example of the “object data”. The PIN codepin1 corresponding to the print data pimg1 is an example of the“associated authentication information”. The PIN code inputted in stepT236 of FIG. 4B is an example of the “first input authenticationinformation”, and the PIN code inputted in step S114 of FIG. 3 is anexample of the “second input authentication information”.

The operating section 140 of the PC 100 is an example of the “firstinputting section”. The operating section 340 of the printer 300 is anexample of the “second inputting section”. The print executing section350 of the printer 300 is an example of the “printing section”. Thememory 324 of the printer 300 is an example of the “first memory” and isan example of the “memory”. The CPU 122 of the PC 100 is an example ofthe “processor”. The CPU 322 of the printer 300 is an example of the“processor”.

The file name file1, file name file2 are an example of the“identification information”. The displaying section 130 of the PC 100is an example of the “display”.

Second Embodiment

Next, an explanation will be given about a printing system 2 in a secondembodiment, with reference to FIGS. 1A and 1B. The printing system 2 ofthe second embodiment is configured by adding the followingconfiguration to the printing system 2 of the first embodiment. Theother (remaining) configuration of the printing system 2 of the secondembodiment is similar to that of the first embodiment, and thus anydetailed explanation therefor will be omitted.

<Configuration of PC 100>

The PC 100 includes, in the program 126, a deleting application 128 fordeleting a job. The deleting application 128 includes a standard format129. The standard format 129 is a format for generating a screendisplayed in the displaying section 130 by the deleting application 128(to be described in detail later on).

<Configuration of Mobile Terminal 200>

The mobile terminal 200 includes, in the program 226, a deletingapplication 228 for deleting a job. The deleting application 228includes a standard format 229. The standard format 229 is a format forgenerating a screen displayed in the displaying section 230 by thedeleting application 228 (to be described in detail later on).

<Configuration of Printer 300>

The Printer 300 stores, in the job table 327, a protocol name whileassociating the protocol name with a job ID, a user name, a file nameand a PIN code. The protocol name is identification information foridentifying a communication protocol which is used when the printer 300communicates with an external apparatus or device such as the PC 100and/or the mobile terminal 200, etc.

<Operation of Printing System 2> (Data Storage Processing)

With reference to FIGS. 2A and 2B, a data storage processing executed bythe printing system 2 of the second embodiment will be explained. In thedata storage processing of the second embodiment, the printer 300 storesalso the protocol name, unlike the data storage processing in the firstembodiment. Specifically, the storage of the protocol name is executedin the following manner.

As described above, in step T12, the PC 100 transmits the job generatingrequest req1 to the printer 300 in accordance with the protocol 1, basedon the execution instruction for executing the secure printing which thePC has received in step T10.

In step T14, the printer 300 generates a job based on the job generatingrequest req1. The job includes a user name us1, a file name file1 and aprotocol name pro1. The protocol name pro1 is identification informationfor identifying the protocol 1 used when the PC 100 transmits the jobgenerating request req1 to the printer 300. The printer 300 is allowedto specify (identify) the protocol name pro1, under a condition that theprinter 300 receives, from the PC 100, the job generating request req1in accordance with the protocol 1. When the printer 300 generates thejob, the printer 300 imparts the job ID jb1 to the generated job, andthe printer 300 stores, in the job table 327, the job ID jb1, the username us1, the file name file1 and the protocol name pro1 whileassociating the job ID jb1, the user name us1, the file name file1 andthe protocol name pro1 to one another.

Since steps T16 to T22 are similar to those in the first embodiment, anyexplanation therefor will be omitted. By the completion of theprocessings up to step T22, the print data pimg1, the user name us1, thefile name file1, the PIN code pin1, and the protocol name pro1 areassociated to one another in the memory 324 of the printer 300.

Further, in steps T30 to T42, the print data pimg2, the user name us2,the file name file2, the PIN code pin2, and the protocol name pro2 areassociated to one another, in the memory 324 of the printer 300, in asimilar manner in steps T10 to T22.

(Data Print Processing)

Since the data print processing of the second embodiment is same as thedata print processing of the first embodiment, any explanation thereforis omitted.

(Data Deletion Processing)

An explanation will be given about a data deletion processing of thesecond embodiment, with reference to FIGS. 6A to 6C. The data deletionprocessing is started in a case that the user issues an instruction toactivate the deleting program 228 in the screen of the displayingsection 230 of the mobile terminal 200. Specifically, the user selectsan icon of the deleting application 228 in the screen of the displayingsection 230 of the mobile terminal 200. In response to this, the mobileterminal 200 activates the deleting program 228 so as to start the datadeletion processing. Note that the mobile terminal 200 is made to becapable of performing communications in accordance with the protocol 1and the protocol 2, respectively, by the deleting application 228.

In step T310, the mobile terminal 200 transmits, to the printer 300, ajob list obtaining request req21 in accordance with the protocol 1. Thejob list obtaining request req12 is a request for obtaining a list ofjob(s) which is (are) generated and stored by a job generation requesttransmitted from an external apparatus or device to the printer 300 inaccordance with the protocol 1.

In step T311, the printer 300 extracts a job list lst1. Specifically,the printer 300 extracts, as the job list, a list of the job ID(s) andthe file name(s) of a job or jobs which is/are included in the jobsstored in the job table 327 and which is/are stored while beingassociated with the protocol name pro1 for specifying (identifying) theprotocol 1. Accordingly, the printer 300 extracts, from the job table327, the job ID jb1 of the job 1, the file name file1 and the protocolname pro1 as the job list lst1.

In step T312, the printer 300 transmits, to the mobile terminal 200, aresponse res21 with respect to the job list obtaining request req21 inaccordance with the protocol 1. The response res21 includes the job listlst1 extracted in step T311.

In step T314, the mobile terminal 200 stores the received job list lst1in the memory 224.

In steps T316 to T320, the mobile terminal 200 obtains a job list lst2from the printer 300 and stores the obtained job list lst2 in the memory224, in a similar manner as regarding steps T310 to T314. Note that instep T316, the mobile terminal 200 transmits, to the printer 300, a joblist obtaining request req22 in accordance with the protocol 2.Accordingly, in step T317, the printer 300 extracts a job list lst2composed of the job ID jb2 of the job 2 and the file name file2 whichare stored in the job table 327 while being associated with the protocolname pro2, and the protocol name pro2. Further, in step T318, theprinter 300 transmits, to the mobile terminal 200, a request res22 withrespect to the job list obtaining request req22, in accordance with theprotocol 2.

In step T322, the mobile terminal 200 generates a deletion screen datafor displaying the deletion screen SC1 (see FIG. 5) based on theobtained job lists lst1 and lst2 and the standard format 229. Further,the mobile terminal 200 displays the deletion screen SC1, based on thegenerated deletion screen data, in the displaying section 230.

Among the items indicated in the deletion screen SC1, items differentfrom the file names file1 and file2 can be displayed based on thestandard format 229. The mobile terminal 200 adds, to the standardformat 229, the file names file1 and file2 included in the obtained joblists lst1 and list2, respectively. With this, the file name file1 andthe file name file2 become displayable in columns or fields fordisplaying the file names in the deletion screen SC1. According to thisconfiguration, even if the mobile terminal 200 does not store the filename(s) included in the print request transmitted to the printer 300,the mobile terminal 200 is capable of displaying the deletion screen SC1including the file name(s). Further, the mobile terminal 200 is capableof displaying the deletion screen SC1 based on the screen informationgenerated by itself.

In step T324, the mobile terminal 200 receives the selection of job andthe input of PIN code by the user. Since the processing of step T324 issimilar to the processing of step T236 of FIG. 4B, any explanationtherefor will be omitted. Note that in the following, an explanationwill be given about a case that the deletion of the job 1 is instructedby the user. Accordingly, the mobile terminal 200 obtains the PIN codepin1, and specifies the job ID jb1.

In step T326, the mobile terminal 200 determines whether or not theprotocol name associated with the specified job ID jb1 is the protocolname pro1. Specifically, the mobile terminal 200 extracts the protocolname(s) which is/are included in all the job lists stored in the memory224, and which is/are associated with the job ID jb1. Here, since theprotocol name pro1 is associated with the job ID jb1 (T326: YES), themobile terminal 200 executes the processing of step T328.

In step T328, the mobile terminal 200 transmits, to the printer 300, ajob deleting request req23 in accordance with the protocol 1 specified(identified) by the protocol name pro1. The job deleting request req23includes the specified job ID jb1 and the PIN code pin1 obtained by theinput made by the user.

In step T330, the printer 300 determines whether or not the PIN codeincluded in the job deleting request req23 matches the PIN codecorresponding to the job of which deletion is requested by the user.Specifically, the printer 300 specifies that the job of which deletionis requested by the user is the job 1, based on the job ID jb1 includedin the job deleting request req23. The printer 300 determines whether ornot the PIN code included in the job deleting request req23 matches thePIN code corresponding to the job 1. Here, since each of the PIN codeincluded in the job deleting request req23 and the PIN codecorresponding to the job 1 is the PIN code pin1, the printer 300determines that the PIN codes match to each other (T330: YES), and theprinter 300 executes the processing of step T332.

In step T332, the printer 300 deletes the job 1. Specifically, theprinter 300 deletes, from the job table 327, the job ID jb1, the username us1, the file name file1 and the PIN code pin1. Further, theprinter 300 deletes the print data pimg1, which is associated with thejob ID jb1 of the job 1, from the memory 324.

In step T334, the printer 300 transmits, to the mobile terminal 200, aresponse res23 with respect to the job deleting request req23. Theresponse res23 includes information indicating that the deletion of thejob 1, of which deletion was specified by the user, has been successful.

In step T336, the mobile terminal 200 determines whether or not theprotocol name associated with the specified job ID jb1 is the protocolname pro2. As described above, since the job ID jb1 is associated withthe protocol name pro1, but not associated with the protocol name pro2(T336: NO), the mobile terminal 200 executes the processing of stepT346.

In step T346, the mobile terminal 200 displays the delete-successscreen, indicating that the deletion of the job has been successful, inthe displaying section 230, in response to a situation that theinformation included in the response res23 indicates that the deletionof the job has been successful. In the present embodiment, thedelete-success screen data for displaying the delete-success screen isincluded in the program 126 in advance, similarly to the standard format129. Instead of the above configuration, however, the delete-successscreen data may be generated by the mobile terminal 200 in response tothe receipt of the response res23 by the mobile terminal 200. Inresponse to the completion of the processing of step T346, the datadeletion processing is ended.

Note that in step T330, in a case that the PIN code included in the jobdeletion request does not match the PIN code corresponding to the job ofwhich deletion has been specified by the user (T330: NO), the printer300 executes the processing of step T334, without executing theprocessing of step T332. In this case, the response res23 transmitted instep T334 includes information indicating that the deletion of the job,of which deletion was specified by the user, has failed. Further, instep T346, the mobile terminal 200 displays a delete-failure screen,indicating that the deletion of the job has failed, in the displayingsection 230. In the present embodiment, the delete-failure screen datafor displaying the delete-failure screen is included in the program 126in advance. Instead of this configuration, however, the delete-failurescreen data may be generated by mobile terminal 200 in response to thereceipt of the response res23 by the mobile terminal 200. Note that thedeletion-failure screen may be a screen for receiving (accepting) thePIN code, corresponding to the job of which deletion has been failed,again. In such a case, the delete-failure screen includes a box forinputting the PIN code, and a button for instructing the execution oflogin.

In the foregoing, the case that the deletion of the job 1 is instructedby user in step T324 has been explained. In the following, anexplanation will be given about a case wherein the deletion of the job 2is instructed by the user in step T324.

In step T324, the mobile terminal 200 receives the selection of job andthe input of PIN code by the user. Here, it is assumed such a case thatin the deletion screen SC1, the user depresses the button BT1 in a statethat the checkbox CBX2 is checked on and the PIN code pin2 is inputtedin the textbox TBX2. In this situation, the mobile terminal 200 obtainsthe PIN code pin2 and specifies the job ID jb2, as well.

In step T326, the mobile terminal 200 determines whether or not theprotocol name associated with the specified job ID jb2 is the protocolname pro1. Here, since the protocol name pro1 is not associated with thejob ID jb2 (T326: NO), the mobile terminal 200 executes the processingof step T336.

In step T336, the mobile terminal 200 determines whether or not theprotocol name associated with the specified job ID jb2 is the protocolname pro2. Here, since the protocol name pro2 is associated with the jobID jb2 (T336: YES), the mobile terminal 200 executes the processing ofstep T338.

In step T338, the mobile terminal 200 transmits, to the printer 300, ajob deleting request req24 in accordance with the protocol 2 specifiedby the protocol name pro2. The job deleting request req24 includes thejob ID jb2 specified and the PIN code pin1 obtained by the input made bythe user in step T324.

In step T340, the printer 300 determines whether or not the PIN codeincluded in the job deleting request req24 matches the PIN codecorresponding to the job of which deletion is requested by the user.Since the specific determining method in step T340 is similar to that inT330, any explanation therefor will be omitted. Here, since each of thePIN code included in the job deleting request req24 and the PIN codecorresponding to the job 2 is the PIN code pin2, the printer 300determines that the PIN codes match to each other (T340: YES), and theprinter 300 executes the processing of step T342.

In step T342, the printer 300 deletes the job 2. Specifically, theprinter 300 deletes, from the job table 327, the job ID jb2, the username us2, the file name file2 and the PIN code pin2. Further, theprinter 300 deletes the print data pimg2 associated with the job ID jb2of the job 2 from the memory 324.

In step T344, the printer 300 transmits, to the mobile terminal 200, aresponse res24 with respect to the job deleting request req24. Theresponse res24 includes information indicating that the deletion of thejob2, of which deletion was specified by the user, has been successful.

In step T346, the mobile terminal 200 displays, in the displayingsection 230, the delete-success screen indicating that the deletion ofthe job has been successful, in response to a situation that theinformation included in the response res24 indicates that the deletionof the job has been successful. In response to the completion of theprocessing of step T346, the data deletion processing is ended.

Note that in step T340, in a case that the PIN code included in the jobdeletion request req24 does not match the PIN code corresponding to thejob of which deletion has been specified by the user (T340: NO), theprinter 300 executes the processing of step T344, without executing theprocessing of step T342. In this case, the response res24 transmitted instep T344 includes information indicating that the deletion of the job,of which deletion was instructed by the user, has failed. Further, instep T346, the mobile terminal 200 displays, in the displaying section230, the delete-failure screen.

In the foregoing, the case that the deletion of the job 2 is instructedby user in step T324 has been explained. Note that in a case that thedeletion of both of the jobs 1 and 2 is instructed in the deletionscreen SC1 by the user, then the processings from steps T326 to T344 areto be repeated by the number of the job of which deletion is instructed.In such a case, for example, in step T346, the mobile terminal 200 maycause the displaying section 230 to display the delete-success screen,under a condition that the mobile terminal 200 receives, in step T334 orT344, the information from the printer 300 indicating that the deletionhas succeeded for each of the jobs; on the other hand, in step T346, themobile terminal 200 may cause the displaying section 230 to display thedelete-failure screen, under a condition that the mobile terminal 200receives, in step T334 or T344, the information from the printer 300indicating that the deletion has failed for at least one of the jobs.

Further, in a case that the deleting application 228 also supports aprotocol(s) different from the protocol 1 and the protocol 2, theprocessings similar to those in steps T326 to T334, or in steps T336 toT344 are also executed before step T346 for all the protocol(s) which is(are) supported by the deleting application and which is (are) differentfrom the protocols 1 and 2.

Note that in the present embodiment, the user operates the mobileterminal 200. It is allowable, however, that the data deletionprocessing is executed by operating the PC 100, rather than operatingthe mobile terminal 200. Since the processings executed by the PC 100are similar to the processings executed by the mobile terminal 200, anyexplanation therefor will be omitted. Note that, however, the deletionscreen data indicating the deletion screen SC1 is generated by the PC100 based on the standard format 129 included in the deletingapplication 128 and the obtained job lists lst1 and lst2. The specificdeleting method is similar to the method indicated in step T322.

As explained above, in the present embodiment, in a case that the mobileterminal 200 transmits the PIN code pin1 inputted in step T324 to theprinter 300, the printer 300 deletes the print data pimg1 of the job 1from the memory 324 under the condition that the PIN code pin1 receivedfrom the mobile terminal 200 matches the PIN code pin1 stored in thememory 324 while being associated with the job ID jb1. Namely, the usercan delete the image data pimg1 from the memory 324 by inputting the PINcode pin1 in the mobile terminal 200, without going in front of theprinter 300 and inputting the PIN code pin1 to the printer 300.Accordingly, it is possible to reduce the time and labor of the user ina case of deleting the print data pimg1 which is stored in the memory324 while being associated with the PIN code pin1.

<Corresponding Relationship>

The mobile terminal 200 is an example of the “terminal apparatus” andthe “first terminal apparatus”. The PC 100 is an example of the “secondterminal apparatus”. The printer 300 is an example of the “printingapparatus”.

The print data pimg1 is an example of the “object data”. The PIN codepin1 corresponding to the print data pimg1 is an example of the“associated authentication information”. The PIN code inputted in stepT324 of FIG. 6B is an example of the “first input authenticationinformation”, and the PIN code inputted in step S114 of FIG. 3 is anexample of the “second input authentication information”.

The displaying section 230 of the mobile terminal 200 is an example ofthe “first inputting section” and is an example of the “display”. Theoperating section 340 of the printer 300 is an example of the “secondinputting section”. The print executing section 350 of the printer 300is an example of the “printing section”.

The file name file1, file name file2 are an example of the“identification information”.

The memory 324 of the printer 300 is an example of the “first memory”and is an example of the “memory”. The memory 124 of the PC 100 and thememory 224 of the mobile terminal 200 are examples of the “secondmemory”. The CPU 122 of the PC 100 and the CPU 222 of the mobileterminal 200 are examples of the “processor”. The CPU 322 of the printer300 is an example of the “processor”.

In the foregoing, the specific examples of the present teaching havebeen explained in detail. These examples, however, are provided for theillustrative purposes only, and are not intended to limit or restrictthe scope of the claims. The technique described in the scope of theclaims includes various modifications, changes, etc., of theabove-described embodiments, in various manners.

[Modification 1]

In the above-described first and second embodiments, the PC 100 and themobile terminal 200 display, in step T234 of FIG. 4B and step T322 ofFIG. 6A, respectively, the deletion screen SC1 including the check boxeseach for selecting a job and text boxes each for inputting a PIN code.Instead of this configuration, however, each of the PC 100 and themobile terminal 200 may display deletion screens for allowing the userto perform the job selection and the input of PIN code via separatescreens, respectively. In this case, each of the PC 100 and the mobileterminal 200 displays, at first, a screen which includes the check boxeseach for selecting a job but does not include text boxes each forinputting a PIN code. In a case that the user enters a check to a checkbox corresponding to a job which the user wishes to delete, anddepresses a button for instructing the execution, then in response tothis, each of the PC 100 and the mobile terminal 200 displays a screenincluding a text box for inputting the PIN code of the selected job. Ingeneral, the terminal apparatus may cause the displaying section todisplay a deletion screen for allowing the user to issue an instructionto delete an object data from the first memory.

[Modification 2]

In the above-described first and second embodiments, the printer 300stores the job table 327 in the memory 324. Instead of thisconfiguration, however, it is allowable that a memory inside an externalserver communicable with the printer 300 stores the job table 327. Inthis case, the printer 300 receives the job generating request req1 instep T12 of FIG. 2A, and in response to this, the printer 300 generatesthe job 1 in step T14. The printer 300 transmits the generated job 1 tothe external server, and causes the memory in the external server tostore the job 1. Further, the printer 300 receives the print datagenerating request req2 in step T18, and in response to this, theprinter 300 generates the print data pimg1 in step T20. The printer 300transmits the generated print data pimg1 to the external server, andcauses the memory in the external server to store the print data pimg1.Furthermore, the printer 300 receives the job generating request req1and the print data generating request req2, and in response to this, theprinter 300 may transmit the job generating request req1 and the printdata generating request req2 to the external server, and the externalserver may generate the job 1 and the print data pimg1, and may storethe generated job 1 and print data pimg1 in the memory in the externalserver. Alternatively, an external memory such as a USB memory connectedto the printer 300 may store the job table 327. In this case, theprinter 300 may transmit the generated job 1 and print data pimg1 to theexternal memory, and may cause the external memory to store the job 1and the print data pimg1. In general, the printing apparatus may store,in the first memory, the object data and the associated authenticationinformation included in the print request, while associating the objectdata and the associated authentication information to each other.

[Modification 3]

In the above-described first embodiment, the PC 100 transmits the jobdeleting request req15 including the job ID and the PIN code to theprinter 300 in step T238 of FIG. 4B. Instead of this configuration,however, it is allowable that the PC 100 transmits, to the printer 300,a job deleting request including the job ID, the PIN code and the username operating the PC 100. For example, the user name included in thisjob deleting request is the user name us1 inputted during the login tothe PC 100 in step T215. In this case, the printer 300 may determine, instep T240, whether or not the combination of the PIN code and the username included in the job deleting request req15 matches the combinationof the PIN code and the user name corresponding to the job of whichdeletion has been request by the user. In a case that the combination ofthe PIN code and the user name included in the job deleting requestreq15 matches the combination of the PIN code and the user namecorresponding to the job of which deletion has been request by the user,the job is deleted. Accordingly, the user operating the PC 100 candelete only the job corresponding to the user. In other words, it ispossible to prevent a certain user operating the PC 100 from deleting ajob corresponding to another user different from the certain user.

Further, in the above-described second embodiment, in steps T328 andT338 of FIGS. 6B and 6C, the mobile terminal 200 transmits, to theprinter 300, the job deleting requests req23 and req24 each includingthe job ID and the PIN code. Instead of this configuration, however, themobile terminal 200 may transmit, to the printer 300, a job deletingrequest including the job ID, the PIN code and the user name operatingthe mobile terminal 200, similarly to the PC 100 as the above-describedmodification 3. In this case, the mobile terminal 200 may receive theinput of the user name, in addition to the selection of job and theinput of PIN code by the user, for example in step T324 in order toobtain the user name included in the job deleting request. Further, theoperation of the printer 300 in such a case is similar to that in theabove-described modification 3. Accordingly, the user operating themobile terminal 200 can delete only the job corresponding to the user.In other words, it is possible to prevent a certain user operating themobile terminal 200 from deleting a job corresponding to another userdifferent from the certain user.

[Modification 4]

In the above-described second embodiment, the mobile terminal 200obtains the job lists from the printer 300 in steps T310 and T312, andin steps T316 and T318 of FIG. 6A, respectively. Instead of thisconfiguration, however, the mobile terminal 200 may store the joblist(s) in the memory 224 in advance. In this case, the mobile terminal200 stores, in the memory 224, the user name us2, the file name file2and the PIN code pin2 obtained in step T32 of FIG. 2B as the job list.Note that in a case that the mobile terminal 200 further obtains theexecuting instruction for executing the secure printing, the mobileterminal 200 adds the inputted user name, file name and PIN code to thejob list, and stores the inputted user name, file name and PIN codeadded to the job list in the memory 224. Further, the mobile terminal200 does not execute the steps T310 to T320 of FIG. 6A; rather, in stepT322 of FIG. 6A, the mobile terminal 200 generates the deletion screenbased on the job list stored in the memory 224, and displays thegenerated deletion screen. With this, consequently, the user issues, inthe deletion screen, an instruction for deleting the job which istransmitted from the mobile terminal 200. Accordingly, for example, in acase that the mobile terminal 200 is a portable terminal which isassumed to be used only by the user, it is possible to ensure thesecurity. Further, the above configuration may be provided also on thePC 100, in a similar manner regarding the mobile terminal 200. Ingeneral, the terminal apparatus may cause the displaying section todisplay a deletion screen for allowing the user to issue an instructionto delete an object data from the first memory.

[Modification 5]

In the mobile terminal 200 of the above-described second embodiment, theprogram 226 includes the printing application 227 and the deletingapplication 228. Namely, the mobile terminal 200 instructs the printingof print data and the deletion of job to the printer 300, by usingdifferent applications, respectively. Instead of this configuration,however, the mobile terminal 200 may have a program 226 including amulti-application which is provided with both of the functions of theprinting application 227 and the deleting application 228 and which iscapable of performing both of the printing of print data and thedeletion of job. In this case, under a condition that the image dataimg1 is selected in step T30 of FIG. 2B, the mobile terminal 200activates the multi-application, instead of the printing application227, so as to display the print setting screen in the displaying section130. Further, in FIG. 6A, the mobile terminal 200 starts the datadeletion processing in response to the user's instruction to activatethe multi-application in the screen of the displaying section 230 of themobile terminal 200.

Further, the multi-application may be provided with the functions of theimage browsing application, the printing application 227 and thedeleting application 228. In such a situation, in a case that the userissues an instruction to execute the printing of the image data img1 byusing the multi-application in step T30 of FIG. 2B, then themulti-application displays the print setting screen in the displayingsection 130. Further, in FIG. 6A, the mobile terminal 200 starts thedata deletion processing in response to the user's instruction toactivate the multi-application in the screen of the displaying section230 of the mobile terminal 200. Note that the deleting application inthe second embodiment may be an example of the “computer program”, orthe multi-application of the above-described modification 5 may be anexample of the “computer program”.

[Modification 6]

In the above-described first and second embodiments, in step T20 of FIG.2A, the printer 300 stores the print data pimg1 in the memory 224, whileassociating the print image pimg1 to the job ID jb1. Instead of thisconfiguration, however, the print 300 may store the image data img1received in step T18, or the RGB output data generated in step T20. Inthis case, the printer 300 generates the print data pimg1 from the imagedata img1, or the RGB output data, and perform printing, in step S118 ofFIG. 3.

Further, instead of allowing the printer 300 to generate the print datapimg1, it is allowable that PC 100 generates the print data pimg1. Inthis case, the PC 100 receives the response res1 in step T16, and thenthe PC 100 generates the RGB output data from the image data img1 basedon the setting information st1. Further, the PC 100 generates the printdata pimg1 from the RGB output data. The specific method for generatingthe print data pimg1 is same as the method described in relation to stepT20. Afterwards, the PC 100 transmits the print data pimg1 to theprinter 300 in step T18. Note that since the print data pimg1 isgenerated based on the setting information st1, the PC 100 is notrequired to transmit the print setting information st1 in step T18. Instep T20, the printer 300 stores the print data pimg1 in the memory 324,while associating the print data pimg1 with the job ID jb1.

[Modification 7]

In the above-described first and second embodiments, the printer 300 isa laser printer. Instead of this configuration, however, the printer 300may be an ink-jet printer. In general, the printing apparatus may beprovided with a printing section.

[Modification 8]

Each of the processings in the above-described first and secondembodiments is realized by performing the processings, in accordancewith the softwares (namely, the program 126, the program 226 and theprogram 326), by the CPU 122 of the PC 100, the CPU 222 of the mobileterminal 200, and the CPU 322 of the printer 300, respectively. Insteadof this configuration, however, the processings in the above-describedfirst and second embodiments may be realized by hardware such as alogical circuit, etc.

What is claimed is:
 1. A printing system comprising a terminal apparatusand a printing apparatus communicable with each other, wherein theterminal apparatus includes: a first inputting section; a first networkinterface; and a processor configured to: transmit a print request forprinting an object image indicated by object data via the first networkinterface to the printing apparatus, the print request includingassociated authentication information associated with the object data;receive first input authentication information inputted by a user viathe first inputting section, after the print request has beentransmitted; and transmit the received first input authenticationinformation via the first network interface to the printing apparatus,and the printing apparatus includes: a second inputting section; asecond network interface; a printing section; and a processor configuredto: receive the print request via the second network interface from theterminal apparatus; store the object data and the associatedauthentication information included in the print request whileassociating with each other in a first memory; receive second inputauthentication information inputted by the user via the second inputtingsection, after the object data and the associated authenticationinformation have been stored in the first memory; determine whether thereceived second input authentication information inputted by the uservia the second inputting section matches the associated authenticationinformation stored in the first memory; print the object image indicatedby the object data by using the printing section, if the processor ofthe printing apparatus determines that the second input authenticationinformation matches the associated authentication information; receivethe first input authentication information via the second networkinterface from the terminal apparatus, after the object data and theassociated authentication information have been stored in the firstmemory; determine whether the first input authentication informationreceived from the terminal apparatus matches the associatedauthentication information stored in the first memory; and delete theobject data from the first memory without printing the object imageindicated by the object data, if the processor of the printing apparatusdetermines that the first input authentication information matches theassociated authentication information.
 2. The printing system accordingto claim 1, wherein the print request further includes identificationinformation for identifying the object data, the processor of theprinting apparatus stores the object data, the associated authenticationinformation and the identification information while associating withone another in the first memory, the terminal apparatus further includesa display, the processor of the terminal apparatus is further configuredto display on the display a deletion screen for the user to instructdeletion of the object data from the first memory, the deletion screenincluding an item indicating the identification information, theprocessor of the terminal apparatus transmits, to the printingapparatus, a delete request for deleting the object data from the firstmemory via the first network interface, if the deletion of the objectdata has been instructed via the deletion screen and then the processorof the terminal apparatus has received the first input authenticationinformation inputted by the user, the delete request including theidentification information and the first input authenticationinformation, the processor of the printing apparatus receives the deleterequest from the terminal apparatus via the second network interface,and the processor of the printing apparatus determines whether the firstinput authentication information included in the delete request matchesthe associated authentication information which is stored in the firstmemory while being associated with the identification information. 3.The printing system according to claim 2, wherein the processor of theterminal apparatus is further configured to obtain the identificationinformation stored in the first memory, and the deletion screen includesthe item indicating the identification information obtained by theprocessor of the terminal apparatus.
 4. The printing system according toclaim 3, wherein the printing apparatus further includes the firstmemory, the first memory further stores screen information indicatingthe deletion screen, and the processor of the terminal apparatus isconfigured to obtain the screen information, which includes theidentification information, from the printing apparatus.
 5. The printingsystem according to claim 2, wherein the terminal apparatus furtherincludes a second memory, the second memory stores a standard format fordisplaying the deletion screen, the processor of the terminal apparatusis further configured to: generate screen information indicating thedeletion screen by adding the identification information to the standardformat; and display, on the display, the deletion screen indicated bythe screen information generated by the processor of the terminalapparatus.
 6. The printing system according to claim 5, wherein theprinting system comprises a first terminal apparatus and a secondterminal apparatus, as the terminal apparatus, a processor of the firstterminal apparatus is configured to transmit, to the printing apparatusin accordance with a first protocol, a first print request for printinga first object image indicated by first object data, the first printrequest including first associated authentication information which isassociated with the first object data and first identificationinformation for identifying the first object data, a processor of thesecond terminal apparatus is configured to transmit, to the printingapparatus in accordance with a second protocol, a second print requestfor printing a second object image indicated by second object data, thesecond print request including second associated authenticationinformation which is associated with the second object data and secondidentification information for identifying the second object data, ifthe processor of the printing apparatus receives the first print requestvia the second network interface, the processor of the printingapparatus stores the first object data, the first associatedauthentication information, the first identification information, andthe first protocol while associating with one another in the firstmemory, if the processor of the printing apparatus receives the secondprint request via the second network interface, the processor of theprinting apparatus stores the second object data, the second associatedauthentication information, the second identification information, andthe second protocol while associating with one another in the firstmemory, the processor of the first terminal apparatus is furtherconfigured to: obtain, from the first memory in accordance with thefirst protocol, the first identification information stored in the firstmemory while being associated with the first protocol; obtain, from thefirst memory in accordance with the second protocol, the secondidentification information stored in the first memory while beingassociated with the second protocol; store the first identificationinformation and the first protocol while associating with each other ina memory of the first terminal apparatus, if the first identificationinformation has been obtained from the first memory; and store thesecond identification information and the second protocol whileassociating with each other in the memory of the first terminalapparatus, if the second identification information has been obtainedfrom the first memory, the processor of the first terminal apparatus isconfigured to display, on a display of the first terminal apparatus, thedeletion screen including a first item indicating the firstidentification information and a second item indicating the secondidentification information, the processor of the first terminalapparatus is further configured to: specify, from the memory of thefirst terminal, the first protocol associated with the firstidentification information for identifying the first object data, ifdeletion of the first object data has been instructed in the deletionscreen; and specify, from the memory of the first terminal, the secondprotocol associated with the second identification information foridentifying the second object data, if deletion of the second objectdata has been instructed in the deletion screen, the processor of thefirst terminal apparatus is configured to transmit, to the printingapparatus in accordance with the first protocol, a first delete requestfor deleting the first object data from the first memory, if the firstprotocol has been specified by the processor of the first terminalapparatus, and the processor of the first terminal apparatus isconfigured to transmit, to the printing apparatus in accordance with thesecond protocol, a second delete request for deleting the second objectdata from the first memory, if the second protocol has been specified bythe processor of the first terminal apparatus.
 7. A printing apparatuscommunicable with a terminal apparatus, the printing apparatuscomprising: an inputting section; a network interface; a printingsection; and a processor configured to: receive a print request forprinting an object image indicated by object data from the terminalapparatus via the network interface, the print request includingassociated authentication information associated with the object data;store the object data and the associated authentication informationincluded in the print request while associating with each other in amemory; receive, from the terminal apparatus via the network interface,first input authentication information which is inputted to the terminalapparatus, after the object data and the associated authenticationinformation have been stored in the memory; determine whether the firstinput authentication information received from the terminal apparatusmatches the associated authentication information stored in the memory;receive second input authentication information inputted by a user viathe inputting section, after the object data and the associatedauthentication information have been stored in the memory; determinewhether the received second input authentication information inputtedvia the inputting section matches the associated authenticationinformation stored in the memory; print the object image indicated bythe object data by using the printing section, if the processordetermines that the second input authentication information matches theassociated authentication information; and delete the object data fromthe memory without printing the object image indicated by the objectdata, if the processor determines that the first input authenticationinformation matches the associated authentication information.
 8. Theprinting apparatus according to claim 7, wherein the print requestfurther includes identification information for identifying the objectdata, the processor stores the object data, the associatedauthentication information and the identification information whileassociating with one another in the memory, the processor receives, fromthe terminal apparatus via the network interface, a delete request fordeleting the object data from the memory, the delete request includingthe identification information and the first input authenticationinformation, and the processor determines whether the first inputauthentication information included in the delete request matches theassociated authentication information which is stored in the memorywhile being associated with the identification information.
 9. Theprinting apparatus according to claim 8, further comprising the memory,the memory further storing screen information indicating a deletionscreen, and the processor is configured to transmit the screeninformation including the identification information to the terminalapparatus via the network interface.
 10. A non-transitorycomputer-readable medium storing instructions to a terminal apparatuswhich includes an inputting section, a display, and a network interfaceand which is communicable with a printing apparatus, the instructions,when executed by a processor of the terminal apparatus, causing theterminal apparatus to: display, on the display, a deletion screen whichis for a user to instruct deletion of object data from a first memoryand which includes an item indicating identification information foridentifying the object data, after a print request including associatedauthentication information associated with the object data and theidentification information for identifying the object data has beenreceived by the printing apparatus and then the object data, theassociated authentication information, and the identificationinformation have been stored in the first memory while being associatedwith one another, the print request being a request for printing anobject image indicated by the object data; receive input authenticationinformation inputted by the user via the inputting section; andtransmit, to the printing apparatus via the network interface, a deleterequest including the identification information and the inputauthentication information, if the deletion of the object data has beeninstructed via the deletion screen and then the input authenticationinformation inputted by the user has been received, wherein the deleterequest is a request for deleting the object data from the first memorywithout printing the object image indicate by the object data if theinput authenticating information included in the delete request matchesthe associated authentication information stored in the first memorywhile being associated with the identification information.
 11. Themedium according to claim 10, wherein the instructions further cause theterminal apparatus to obtain the identification information stored inthe first memory.
 12. The medium according to claim 11, wherein theterminal apparatus further includes a second memory, the second memorystores a standard format for displaying the deletion screen, theinstructions further cause the terminal apparatus to generate screeninformation indicating the deletion screen by adding, to the standardformat, the identification information obtained from the first memory,and the terminal apparatus displays, on the display, the deletion screenindicated by the screen information.
 13. The medium according to claim12, wherein the instructions further cause the terminal apparatus to:obtain, from the first memory in accordance with a first protocol, afirst identification information for identifying first object data andstored in the first memory while being associated with the firstprotocol; obtain, from the first memory in accordance with a secondprotocol, a second identification information for identifying secondobject data and stored in the first memory while being associated withthe second protocol; store the first identification information and thefirst protocol while associating with each other in the second memory,if the first identification information has been obtained from the firstmemory; and store the second identification information and the secondprotocol while associating with each other in the second memory, if thesecond identification information has been obtained from the firstmemory; the instructions cause the terminal apparatus to display thedeletion screen including a first item indicating the firstidentification information and a second item indicating the secondidentification information, on the display, the instructions furthercause the terminal apparatus to: specify, from the second memory, thefirst protocol associated with the first identification information foridentifying the first object data, if deletion of the first object datahas been instructed via the deletion screen; and specify, from thesecond memory, the second protocol associated with the secondidentification information for identifying the second object data, ifdeletion of the second object data has been instructed via the deletionscreen, the instructions cause the terminal apparatus to transmit, tothe printing apparatus via the network interface in accordance with thefirst protocol, a first delete request for deleting the first objectdata from the first memory, if the first protocol has been specified,and the instructions cause the terminal apparatus to transmit, to theprinting apparatus via the network interface in accordance with thesecond protocol, a second delete request for deleting the second objectdata from the first memory, if the second protocol has been specified.14. The medium according to claim 10, wherein the instructions furthercause the terminal apparatus to transmit the print request to theprinting apparatus via the network interface.