Job allocation control apparatus and job allocation control method

ABSTRACT

In a job allocation control apparatus, whether or not a job has security setting is discriminated, if it is decided that the job has the security setting, this job is set to a scheduling target to a clean device, and if it is decided that the job does not have the security setting, this job is set to a scheduling target to a non-clean device. When a process of the job having the security setting as a scheduling target to the clean device cannot be executed, the job having the security setting is set to the scheduling target to the non-clean device. Whether or not the non-clean device satisfies a predetermined condition is discriminated. If the predetermined condition is satisfied, the job having the security setting is transmitted to the non-clean device.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to job allocation control apparatus and method forcontrolling allocation of print jobs to a plurality of apparatuses.

2. Related Background Art

In what is called conventional commercial print industry in which arequest to form printed matter such as magazine, newspaper, catalog,advertisement, photogravure, or the like is received from the thirdparty such as customer or client, desired printed matter of the clientis formed and delivered to the client, thereby obtaining a compensationfrom the client, it is a main stream even now that a large-scaleprinting apparatus or the like such as an offset photoengraving printeror the like is used.

In such print industry, the printed matter is subjected to processingsteps such as sending a manuscript to a printer, design, layout,comprehensive layout (presentation by a printer output), proofreading(layout correction and color correction), proofreading printing (proofprint), block copy forming, printing, post-processing modification, anddispatch until the printed matter is delivered. When the printer isused, the above block copy forming step is indispensable. Once a blockcopy is formed, it is not easy to correct it and the correction isfairly disadvantage in terms of costs. Therefore, careful proofreading,that is, the operation to check the layout and confirm the color isindispensable.

In such print industry as mentioned above, the large-scale apparatus isnecessary and, in order to form the printed matter which the clientdesires, a certain time is also necessary. Moreover, a special knowledgeis necessary in each of the operations in those steps and know-how ofthe experienced and skillful person called a specialist is necessary.

In recent years, in association with the realization of a high speed andhigh picture quality of a printing apparatus of an electrophotographicsystem and a printing apparatus of an ink jet system, a market called“Print On Demand” (hereinafter, abbreviated to a “POD”) has alsoappeared in opposition to the print industry as mentioned above. Thatis, in the POD, in order to enable a large number of print copies orjobs to be handled in a short period of time without using a large-scaleapparatus or system, by making the most of a digital image formingapparatus such as digital copying apparatus, digital multi-functionapparatus, or the like in place of the large-scale printer or theprinting method as mentioned above, a digital print using electronicdata is realized, thereby doing business.

In the POD market, as compared with the conventional print industry, thedigitization is united, management and control using a computer begin tospread, and a printing technique is approaching the level of the printindustry to a certain extent by using the computer. In such abackground, a PFP (Print For Pay) called a print service of a copy/printshop print company, a CRD (Centralized Reproduction Department) calledan in-house print service in an enterprise, and the like exist in thePOD market.

However, in the print industry and the POD market as mentioned above,although it is intended to provide such a service as to execute businessthat the printed matter is handled as goods and all of the operationssuch as ordering and reception of the goods, packaging, delivery,after-sales services, inventory control, and deposit management areexecuted as a proxy in a lump, a room for investigation still remains.

In the print industry and the POD market as mentioned above, a system inwhich a management plan and administration business are supportedthrough collection, modification, and report of production-related data,information is accumulated, and it can be provided to necessarydivisions in accordance with necessity is also examined. However,actually, it is still difficult to realize and operate the optimumsystem.

Further, in the POD market as mentioned above, actually, it is difficultto employ skillful workers as compared with the conventional printindustry. Although there are such demands that it is intended to finishthe job at low costs, do business at a small investment, reduce a TCO(Total Cost of Ownership), and the like, actually, such demands cannotbe sufficiently satisfied because the POD market is still a new market.Problems to be solved are left.

In JP-A-H03-269756, a technique in which when a security requirement toprint jobs is high, for example, in the case where it includes personalinformation or information for in-company use only, a personalidentification number is allocated to the job has been disclosed. InJP-A-H04-331175, a technique in which access control by a password ismade has been disclosed. In JP-A-H05-213519, a technique in which a keyis physically provided for a stacker has been disclosed.

In the case of the print job, even if the access control is made by anelectronic method such as a personal identification number or the like,product matter is paper, such access control is insufficient whensecurity is assured.

Even if the access to the paper is restricted by locking, such arestriction is not interlocked with an access restriction of theelectronic data, so that it is still insufficient to assure thesecurity.

Further, even if an environment where a clean room serving as a spatialpartition in which only the person whose entering/leaving has beenpermitted can enter and leave is prepared and specific apparatuses aremade operative in the clean room is constructed, in the case where thenumber of jobs which need the security increases and the jobs cannot befully processed even if only the specific apparatuses in the clean roomare used or in the case where a device in the clean room is out oforder, there is a situation that a short deadline for delivery cannot beassured.

SUMMARY OF THE INVENTION

It is, therefore, an object of the invention to provide workflow controlapparatus and method which can control distribution of jobs whileassuring security to the job whose security is necessary.

According to the invention, there is provided a job allocation controlapparatus for controlling allocation of jobs to a clean device whosesecurity has been assured and a non-clean device whose security is notassured, comprising: a security discrimination unit for discriminatingwhether or not the job has security setting; a target devicedetermination unit for setting the job to a scheduling target to theclean device if it is discriminated by the security discrimination unitthat the job has the security setting and setting the job to ascheduling target to the non-clean device if it is discriminated by thesecurity discrimination unit that the job does not have the securitysetting; a rescheduling unit for setting the job having the securitysetting to the scheduling target to the non-clean device when a processof the job having the security setting which has been determined to bethe scheduling target to the clean device by the target devicedetermination unit cannot be executed; and a transmission control unitfor discriminating whether or not the non-clean device satisfies apredetermined condition if the job having the security setting is set tothe scheduling target to the non-clean device by the rescheduling unitand transmitting the job having the security setting to the non-cleandevice if the predetermined condition is satisfied.

Other features and advantages of the present invention will be apparentfrom the following description taken in conjunction with theaccompanying drawings, in which like reference characters designate thesame or similar parts throughout the figures thereof.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing an embodiment of the invention;

FIG. 2 is a block diagram showing a construction of a step managing unit101 in FIG. 1;

FIG. 3 is a block diagram showing a construction of a prepress unit 102in FIG. 1;

FIG. 4 is a block diagram showing a construction of a digital print unit103 FIG. 1;

FIG. 5 is an explanatory diagram for explaining a construction to assurethe security by a clean room;

FIG. 6 is an explanatory diagram for explaining a flow for jobs havingno security setting;

FIG. 7 is a flowchart showing an example of a workflow control procedureby an MIS server 201;

FIG. 8 is a flowchart showing an example of a rescheduling procedurebetween a clean device and a non-clean device;

FIG. 9 is a flowchart showing a process of step S803 in FIG. 8 in moredetail;

FIG. 10 is an explanatory diagram for explaining a flow of a job in thecase where a fault occurs in the clean device;

FIG. 11 is an explanatory diagram for explaining scheduling by the MISserver 201 in the case where the fault occurs in the clean device;

FIG. 12 is an explanatory diagram for explaining the scheduling by theMIS server 201 in the case where the fault occurs in the clean device;

FIG. 13 is a flowchart showing an example of a proxy processingprocedure when a fault occurs;

FIG. 14 is a flowchart showing an example of a job data transmittingprocess by the MIS server 201;

FIG. 15 is a flowchart showing a procedure of step S1405 in FIG. 14 inmore detail;

FIG. 16 is a diagram showing an example of a GUI for log-in; and

FIG. 17 is a flowchart showing an example of a post-process which isexecuted to the non-clean device by a workflow manager.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Embodiments of the invention will be described in detail hereinbelowwith reference to the drawings.

First Embodiment

(Construction of System)

FIG. 1 shows a construction of a system. In this system, end userenvironments A and B and a POD (Print On Demand) site environment 1 aremutually connected through the Internet.

In each of the end user environments A and B, an orderer who requeststhe ordering of printing exists and a confirmation of a status of a joband the like as well as a request of a print job can be performed byusing each client PC.

In the POD site environment 1, a step managing unit 101, a prepress unit102, a digital print unit 103, and a postpress unit 104 are mutuallyconnected through a network.

The step managing unit 101 instructs operations to the prepress unit102, digital print unit 103, and postpress unit 104 in the POD siteenvironment 1, unitarily manages a workflow of the present systemconstructed by a computer and various devices, and plays the followingroles. That is, jobs are received from the end user environments A andB; the jobs from the end user environments A and B are held. On thebasis of designation of the jobs from the end user environments A and B,the operations of the units of the POD site environment are assembled asa workflow. The operations in the devices or workers are scheduled so asto be efficiently executed.

The prepress unit 102 plays the following roles on the basis ofoperating instructions of a prepress job received from the step managingunit 101. That is, paper originals received from the end userenvironments A and B are scanned by a scanning device such asscanner/MFP or the like. Image data of the scanned paper originals isfetched as scan image files into a prepress server or a client PC. Imagecorrection, merging of the files, insertion/deletion of pages, variouspage layout editions, or page layout process are executed. As necessary,a proof output to confirm a layout and coloring of a final product isexecuted.

The digital print unit 103 plays the following roles in accordance withthe operating instructions of the prepress job received from the stepmanaging unit 101 or the prepress unit 102. That is, the paper originalsreceived from the end user environments A and B are copied by ascanning/printing device such as monochromatic MFP, color MFP, or thelike. Document/image files received from the end user environments A andB from the client PC through a printer driver or a hot folder, scanimage files obtained by scanning the paper originals by the scanningdevice, or the document/image files obtained by editing those files areprinted out by the printing device such as monochromatic MFP, color MFP,or the like.

The postpress unit 104 plays the following roles in accordance with theoperating instructions of a postpress job received from the stepmanaging unit 101, prepress unit 102, or digital print unit 103. Thatis, post-processing devices such as paper-folding machine, saddle stitchbook-binding machine, walnut book-binding machine, paper cutter,enclosing apparatus, collator, and the like are controlled. Finishingprocesses such as paper folding, saddle stitch book-binding, walnutbook-binding, paper cutting, enclosing, collation, and the like areexecuted to recording paper outputted from the digital print unit 103.

(Construction of Step Managing Unit 101)

FIG. 2 shows a construction of the step managing unit 101 in FIG. 1. Inthe step managing unit 101, an MIS server 201, an order receiving server202, a file server 203, and a client PC 204 are mutually connectedthrough the network. A job received by the step managing unit 101 isprocessed by transferring the job or issuing a control command.Naturally, the step managing unit 101 may be also constructed as aphysically-one step managing server 101 (step managing apparatus) havingfunctions of the MIS server 201, order receiving server 202, file server203, and client PC 204. In the embodiment, explanation will be made onthe assumption that step managing server 101 is constructed by aplurality of servers for every function.

As one of the principle functions of the step managing unit 101, thereis a function as a system called an administration information system oran MIS (Management Information System) for collecting and analyzinginformation necessary for the decision making in management,administration, or the like of an enterprise. Generally, the MIS is asystem for integratedly managing various management information andsales information including advertisement, order reception, estimation,scheduling, production, shipping, purchase, and sales. In particular,the MIS in the print industry has an aspect as a print producing stepmanagement system. The MIS can provide a mechanism for unitarilymanaging print production facilities and print production resources andautomatizing a total workflow from the order reception to the deliveryor cost collection by a job ticket called JDF (Job Definition Format)describing operating instructions in a job.

The MIS server 201 is a server computer functioning as a main device ofthe management information system. On the basis of designation of thejobs from the end user environments A and B, the MIS server 201 issuesthe JDF describing the operating instructions in the job to each unit inthe POD site environment 1, thereby controlling the workflow of thesystem constructed by the computer and various devices.

The MIS server 201 exchanges a message called JMF (Job Messaging Format)between the MIS server 201 and each unit in the POD site environment 1and unitarily manages the workflow of the system by obtaining functioninformation and ability information which each device has, statusinformation of each device, progress information of the received job,and the like.

Further, the MIS server 201 has functions as a workflow editor, aworkflow engine, and a job scheduler. The MIS server 201 assembles theoperations in each unit as a workflow, instructs to execute them, andefficiently schedules the operations in the devices or operators, sothat the workflow in each unit can be also automatized.

A part of those functions can be also realized by an applicationinstalled in the client PC which is used by another worker differentfrom the worker of the MIS server 201 in the step managing unit 101.

The order receiving server 202 is what is called a mediator of anelectronic commerce (EC) in the POD and is a server for ordering andreceiving the jobs from the client PCs of the end user environments Aand B through a communicating medium such as Internet or the like. Whenthe order receiving server 202 is seen from the end user environments Aand B, it is a cyber shop using a Web page on the internet.

For example, if the job which the operator wants to request the orderingis a print job, user authentication is made by Browsers of the clientPCs of the end user environments A and B. Thereafter, by inputting printcondition setting to designate by which print condition the data shouldbe outputted, other print request information, and the like, thedocument/image file serving as a print target is sent as electronic datatogether with the print condition setting, other print requestinformation, and the like to the order receiving server 202 from theclient PCs of the end user environments A and B through the Internet.The print job is ordered to the order receiving server 202 functioningas a Web server.

It is also possible to construct in such a manner that by providing thehot folder (not shown) for the order receiving server 202 or each clientPC of the end user environments A and B, the document/image file servingas a print target and the print condition setting, other print requestinformation, and the like associated by such a file can be transferredas data. The hot folder is a virtual folder including the printcondition setting, other print request information, and the like asattributes. A plurality of hot folders can be formed in a memory unit(not shown) such as a hard disk or the like equipped for the orderreceiving server 202 or each client PC of the end user environments Aand B. For example, when the end user environments A and B drag and dropthe document/image file whose printing is requested to the hot foldersfrom each client PC of the end user environments A and B, a monitoringprogram of the order receiving server 202 or each client PC of the enduser environments A and B recognizes the existence of the document/imagefile and makes the print condition setting, other print requestinformation, and the like be associated, thereby enabling the orderreceiving server 202 to read out those information.

If the job which the operator wants to order is a copy job, thedocument/image file is not transmitted as electronic data but, in placeof it, the paper original serving as a copy target is separately sent asa physical medium by a home delivery service or the like and only copycondition setting to designate by which copy condition the data shouldbe outputted and other copy request information are inputted from thebrowser of each client PC of the end user environments A and B. In thiscase, the operator judges the relationship between the paper originalserving as a copy target which has separately been sent and the copycondition setting, other copy request information, and the like whichhave been transmitted to the order receiving server 202.

The file server 203 is a file server to store the jobs (thedocument/image file serving as a print target and the print conditionsetting, other print request information, and the like which areassociated by such a file; the scan image file obtained by scanning thepaper original serving as a copy target and the copy condition setting,other copy request information, and the like which are associated bysuch a file) received from the end user environments A and B in order toprepare for re-ordering according to the same original from the end userenvironments A and B.

For example, the order receiving server 202 stores the document/imagefiles, as an inherent original as it is, of the print jobs received fromthe client PCs of the end user environments A and B into the memory unit(not shown) such as a hard disk or the like equipped for the file server203 and holds them for a predetermined period of time. By this process,when the print jobs according to the same original from the end userenvironments A and B are re-ordered, the re-ordering can be processedwithout requesting the end user environments A and B to transmit thedocument/image files again.

The paper originals of the copy jobs received from the end userenvironments A and B are scanned, fetched as scan image files, afterthat, stored into the memory unit (not shown) such as a hard disk or thelike equipped for the file server 203, and held for the predeterminedperiod of time. By this process, when the copy jobs according to thesame original from the end user environments A and B are re-ordered, there-ordering can be processed without requesting the end userenvironments A and B to send the paper originals again.

Further, after the print jobs or the copy jobs were print-processed inoutput formats (the print condition setting, other print requestinformation, and the like; the copy condition setting, other copyrequest information, and the like) which are desired by the end userenvironments A and B, the operator stores the edition-modified finaldocument/image files or the print-processed final print data into thememory unit (not shown) such as a hard disk or the like equipped for thefile server 203 and holds them for a predetermined period of time. Bythis process, the operartions of the post-processing steps uponre-ordering from the end user environments A and B can be reduced.

(Construction of Prepress Unit 102)

FIG. 3 shows a construction of the prepress unit 102 in FIG. 1. In theprepress unit 102, a scanner 301, a prepress server 302, client PCs 303and 304, and an MFP 305 are mutually connected through a network. Bytransferring a job or issuing a control command, the received job isprocessed in the prepress unit 102.

The prepress server 302 is a server constructed in such a manner thatthe paper originals received from the end user environments A and B arescanned by the scanning device such as scanner/MFP or the like, theimage data of the scanned paper originals is fetched as scan imagefiles, the image correction such as oblique movement correction, blackdot removal, or the like is executed, a plurality of document/imagefiles received from the end user environments A and B or a plurality ofscan image files obtained by scanning the paper originals by thescanning device are merged, pages are inserted or deleted, and variouskinds of page layout editions and page layout processes such as additionof page numbers or annotations, insertion of index paper, a paper cover,or insert sheet, designation of Nin1 printing or page repeat print, andthe like are executed.

Although the prepress unit 102 in FIG. 3 has been described with respectto an example in which it includes one prepress server 302 and aplurality of client PCs 303 and 304, it can be also constructed only bya plurality of client PCs without using the prepress server.

If the job received from each of the end user environments A and B is acopy job, first, the operator scans the paper originals by the scanningdevice such as scanner/MFP or the like and fetches the obtained imagedata as scan image files into the prepress server 302 or the client PCs303 and 304. If the fetched scan image is obliquely inclined, byexecuting the oblique movement correcting process, the inclination ofthe scan image is corrected. If the fetched scan image has punch holesor dust, by executing the black dot removing process, the punch holes ordust of the scan image can be removed.

If the job received from each of the end user environments A and B is aprint job, first, the operator fetches the document/image files receivedfrom the end user environments A and B into the prepress server 302 orthe client PCs 303 and 304.

If there are a plurality of document/image files received from the enduser environments A and B or a plurality of scan image files obtained byscanning the paper originals by the scanning device, those files aremerged.

Further, if it is necessary to further edit the document/image filesreceived from the end user environments A and B or the scan image filesobtained by scanning the paper originals by the scanning device, forexample, the operator inserts pages from another file into an editiontarget file or deletes the pages of the edition target file whileconfirming the layout of a plurality of pages.

For example, the operator executes the following various kinds of pagelayout editions and page layout processes. That is, the page numbers orannotations (characters or an image such as watermark, logotype, or thelike showing secret information) are added, the Nin1 printing or pagerepeat print (printing in which a plurality of pages are arranged on oneprint surface) is designated, the index paper, paper cover, or insertsheet is inserted, and a post-process such as stapling, punching,Z-folding, or the like is designated, and the like.

In the prepress unit 102, in order to realize one-to-one marketing suchas address printing of direct mail or pamphlet per customer, it is alsopossible to construct a variable print system which exchanges addressesor related data and prints while printing a plurality of copies of thesame document in an interlocking relational manner with a databaseconstructed in the prepress server 302 or another server.

In the print industry, there is an output style called “colorcomprehensive layout” to make presentation to an advertiser prior toentering the book-binding and printing steps. In recent years, a colorhard copy in which a digital color image processed by a DTP (Desk TopPublishing) to form a publication by using a personal computer or a CEPS(Color Electronic Prepress System) which is used for correction,synthesis, or the like of the image in a printing step is outputted by acolor printer such as a color MFP or the like or a color plotter is usedfor the above color comprehensive layout.

In the POD using the printer such as an MFP or the like, the digitalcolor image can be proof-outputted by the same color printer such as acolor MFP or the like while including layout confirmation and simplecoloring confirmation corresponding to the color comprehensive layoutand detailed coloring confirmation corresponding to the proof.

In the prepress unit 102, the digital color image can be alsoproof-outputted to the MFP in order to confirm the layout and coloringof such a final product as necessary.

(Construction of Digital Print Unit 103)

FIG. 4 shows a construction of the digital print unit 103 in FIG. 1). Inthe digital print unit 103, a print server 401, client PCs 402 and 403,monochromatic MFPs 404 and 405, and color MFPs 406 to 408 are mutuallyconnected through a network.

The print server 401 has the following two roles. First, it has the roleof transmitting and receiving information to/from the outside of thedigital print unit 103. First, the image information, settinginformation, and the like of the job which is sent are inputted to theprint server 401. When the job is finished, information such as a statusor the like is notified to the outside. Second, it has the role ofmanagement control in the digital print unit 103. Jobs inputted from theoutside and jobs generated in the digital print unit 103 are unitarilymanaged by the print server 401. Situations of all devices and all jobsprovided in the digital print unit 103 can be monitored. Temporary stopof the job, setting change, print restart, or control of copy, movement,deletion, or the like of the job can be performed.

The client PCs 402 and 403 have a role of editing an inputtedapplication file, instructing the printing, or inputting a print readyfile and a role of assisting the monitoring and control of the devicesand jobs which are managed in the print server 401.

Each of the monochromatic MFPs 404 and 405 and the color MFPs 406 to 408is an image forming apparatus having various functions for scanning,printing, copying, and the like. Since print speeds, costs, and the likeof the color MFPs 406 to 408 and those of the monochromatic MFPs 404 and405 are different, it is necessary to selectively use them in accordancewith the use fields.

(Assuring of Security)

Even in the POD site environment 1, for example, in the case of a job inwhich personal information such as a customer address and the like orinformation for in-company use only has been disclosed, since it isdemanded to enhance the security for the job, it is necessary to preventoutflow of those information. Therefore, to prevent the outflow of thoseinformation, there is considered a method whereby apparatuses such asoutput printer, folding machine, and the like in which a possibility ofleakage of the information included in the job is high are arranged in aspace such as a room or the like where only the persons who werepermitted to enter and leave the room can enter and leave (such a spaceis called a “clean room” and a space other the clean room is called a“non-clean room” hereinbelow), the jobs in which it is demanded toassure the security are sent to the apparatuses in such a room, and thejobs are processed by those apparatuses. For example, in FIG. 5, thereis considered a method whereby if there is security setting in theinputted job, this job is sent to the apparatuses in the clean room bythe MIS server 201.

It is assumed that each of the prepress apparatuses, press apparatuses,and postpress apparatuses arranged in the clean room is called a “cleandevice” or “security printing apparatus (or security printer)” and eachof the apparatuses arranged in the “non-clean room” is called a“non-clean device” or “non-security printing apparatus (or non-securityprinter)”. Further, the human operator who was permitted to enter andleave the clean room is called a “clean operator” and each of otherhuman operators is called a “non-clean operator”.

FIG. 7 is a flowchart showing an example of a workflow control procedureby the MIS server 201 in the step managing server 101. First, in stepS001, the MIS server 201 analyzes the job received from the client PC ofthe end user environment through the Internet by the order receivingserver 202, thereby discriminating whether or not there is securitysetting in the job. It is assumed that the security setting of the jobhas been defined as one attribute of the job like postpress setting suchas the number of print copies, deadline for delivery, staple, or thelike. If it is determined that there is the security setting, the job isset to a scheduling target to the clean device in step S002.

On the other hand, if it is determined that there is no securitysetting, in step S003, the MIS server 201 examines a balance of anamount of jobs distributed to the clean devices and an amount of jobsdistributed to the non-clean devices, thereby discriminating whether ornot an amount of jobs allocated to the clean room is small. In the MISserver 201, job allocation tables of the jobs allocated to the cleandevices and the non-clean devices have been stored in a memory and aremanaged. Therefore, the MIS server 201 can recognize the amount of jobsallocated to the clean devices and the amount of jobs allocated to thenon-clean devices (can recognize a print amount from a paper size, thenumber of pages, and the number of print copies). If it is decided thatthe amount of jobs distributed to the clean devices is small and, evenif an additional job is inputted to the clean devices, the jobs whichhave already been distributed to the clean devices will be processed inthe deadline for delivery by the clean devices, the relevant job is setto the scheduling target to the clean device in step S004. On the otherhand, if there is no difference between the amount of jobs distributedto the clean devices and the amount of jobs distributed to the non-cleandevices or the amount of jobs distributed to the clean devices is largerthan the amount of jobs distributed to the non-clean devices, therelevant job is set to the scheduling target to the non-clean device instep S005. A flow for the jobs having no security setting mentionedabove is shown in FIG. 6.

If the amount of jobs distributed to the non-clean devices is notproper, the jobs having no security setting are controlled anddistributed to the clean devices as mentioned above. However, thenon-clean operator cannot enter and leave the clean room where the cleandevices have been arranged but only the clean operator can enter andleave the clean room as mentioned above. Therefore, in such a case, thesecurity to other clean devices in the clean room is assured.

FIG. 8 is a flowchart showing an example of a rescheduling procedurebetween the clean device and the non-clean device. First, in step S801,the MIS server 201 discriminates whether or not the jobs having nosecurity setting have been scheduled in the present schedule of theclean device. In the present schedule to the clean device, if the jobshaving no security setting exist, the processing routine advances tostep S802. In step S802, the MIS server 201 examines an amount of jobsscheduled to the clean devices and the non-clean devices on the basis ofthe job allocation tables managed in its own memory. If the amount ofjobs scheduled to the clean devices is larger because of the addition tothe new job, the jobs having no security setting are selected from theschedule of the present clean device in step S803. The rescheduling forsetting the selected job to the scheduling target to the non-cleandevices is executed in step S804.

On the other hand, in step S802, if the amount of jobs to the cleandevices does not reach the maximum job amount even if the new job isadded, that is, if there is a surplus of the amount of jobs to beprocessed of the clean devices, the present processing routine isfinished.

On the other hand, in step S801, if the jobs having no security settingare not scheduled to the clean devices, since there is no schedulingtarget to the non-clean devices, the present processing routine isfinished.

FIG. 9 is a flowchart showing a process of step S803 in FIG. 8 in moredetail. In step S901, on the basis of the job allocation table, the MISserver 201 discriminates whether or not the jobs which cannot be in timeof the deadline for delivery in the schedule to the clean devices exist.The job allocation table has been prepared every device. The amount ofallocated jobs and processing time (prediction time) of each job havebeen described in the table. The MIS server 201 can make schedulemanagement of each job by using the job allocation table. If it isdecided that there are no jobs which cannot be in time of the deadlinefor delivery, the rescheduling of the jobs to the non-clean devices isnot performed on the assumption that the rescheduling is avoided as muchas possible. After that, the present processing routine is finished.

On the other hand, if it is decided in step S901 that there are the jobswhich cannot be in time of the deadline for delivery, the MIS server 201discriminates whether or not the jobs having no security setting havebeen scheduled to the clean devices in step S902. If the jobs having nosecurity setting are not scheduled to the clean devices, since there areno expelling targets to the non-clean devices, the present processingroutine is finished after that.

On the other hand, in step S902, if the jobs having no security settinghave been scheduled to the clean devices, the MIS server 201 sorts thejobs having no security setting in descending order of the job amounts(job data sizes) in step S903. In step S904, the job of the maximum jobamount is selected from the sorted jobs and set to the scheduling targetto the non-clean devices. By selecting the job of the maximum jobamount, even if there is an additional job later, a possibility that thedelivery time exceeds the deadline for delivery due to the processes bythe clean devices is low by the discrimination of step S901. Therefore,a frequency of the rescheduling can be decreased.

In step S905, the MIS server 201 executes the rescheduling to theresidual jobs removed from the schedule of the clean devices in stepS904. After that, the processing routine is returned to step S901. Instep S901, the MIS server 201 discriminates whether or not the jobswhich cannot be in time of the schedule exist. The reason why theprocessing routine is looped as mentioned above is that there is a casewhere even if one job was expelled, the imbalance is not eliminated yetwhen a size of job newly added to the clean devices is large. By loopingthe processing routine, the jobs of an amount enough to eliminate theimbalance can be set to the expelling targets.

(Fault Occurrence in Clean Device)

When a fault occurs in the clean device, if the jobs having the securitysetting are scheduled to the non-clean devices, a meaning that thesecurity is assured by arranging the clean devices into the clean roomis lost and the security to those jobs becomes low. In the embodiment,therefore, when the fault occurs in the clean device, the followingcountermeasure is taken. That is, explanation will be made withreference to FIG. 10.

(1) When the fault occurs in the clean device, the clean operator whofound the fault occurrence logs in the non-clean device. Thus, the MISserver 201 is notified that this non-clean device functions as a cleandevice in which the security has been assured by the clean operator(hereinbelow, such a device which functions as a clean device is calleda “cleaned device”).

(2) The MIS server 201 which received such a notification interrupts aworkflow of the jobs having no security setting which has been made tothe clean device. That is, the MIS server 201 sends a cancellinginstruction of the print job which has already been transmitted to theclean device and, thereafter, stops the schedule of the print jobshaving no security setting which have been scheduled to this deviceuntil predetermined conditions are satisfied.

(3) The MIS server 201 preferentially schedules the jobs having thesecurity setting to this cleaned device.

(4) Job data of the jobs having the security setting is pulled from thiscleaned device side. This point differs from the ordinary job flow.

A scheduling change by the MIS server 201 in the case where the faultoccurred in the clean device will now be described with reference toFIGS. 11 and 12. FIG. 11 shows schedules of the jobs just before theoccurrence of the fault. The schedule of the clean devices is shown inthe upper half. The schedule of the non-clean devices is shown in thelower half. It is now assumed that two processing steps can be executedby two kinds of devices.

According to those schedules, two jobs of JobA and JobB havesequentially been scheduled for the clean devices which play roles ofsteps 1 and 2. The jobs to each of which an asterisk (*) has been addedare jobs having the security setting and other jobs are jobs having nosecurity setting. Similarly, two jobs of JobC and JobD have also beenscheduled for the non-clean devices which play the roles of steps 1 and2.

For example, if a fault occurred in the first clean device which playsthe role of step 1 (for example, in the case where step 1 is a pressprocess (printing process)), the MIS server 201 detects the occurrenceof the fault of the clean device, and it is determined that a proxyprocess of the job is necessary, the MIS server 201 searches for thenon-clean device which can proxy-process the job JobA which has beenscheduled in the clean device (which plays the role of step 1) in whichsuch a fault occurred, that is, the non-clean device which plays therole of step 1. When the non-clean device which plays the role of step 1is searched for, the MIS server 201 notifies the clean operator that thesearched non-clean device can be used as a clean device. As a notifyingmethod, such a fact can be displayed on a display of the MIS server 201or it is also possible to call a personal digital assistant of the cleanoperator and notify him of such a fact. When the clean operator logs inthe notified non-clean device and the MIS server 201 is notified thatthe non-clean device has been logged in, the MIS server 201 sets thenon-clean device which has been logged in by the clean operator to thecleaned device and instructs the cleaned device to interrupt the jobwhich is at present being processed. Thus, although step 1 of the jobJobC is interrupted during the process, this non-clean device cannot beimmediately stopped and the processes of the number as many as thenumber of print copies which are being executed are executed to the end.A part of the job JobC remains in the non-clean device which plays therole of step 1 due to switching preparation or the like of the jobs.

After that, the job JobA which has been scheduled to the clean device isscheduled to the searched non-clean device by the MIS server 201 and thejob allocation table of each device is updated. In the schedule (referto FIG. 12) after the rescheduling, the clean device in which the faulthas occurred is shown by an icon of a triangle. The asterisk showing thejob in which the security has been set is added and an icon (i) showingthat the scheduling is not the ordinary scheduling is added to the jobJobA.

When the process of the job JobA is normally finished and the fault ofthe clean device is recovered during such a period of time, in theschedule of the cleaned device (non-clean device), a residual part ofthe job JobC and the job JobD mentioned above are shifted. Since the jobJobC and the job JobD are shifted, the schedule of step 2 as a postprocess is also shifted back.

Since no fault occurs in the second clean device which plays the role ofstep 2 (for example, in the case where step 2 is a postpress process(finishing process or the like)), there is no need to schedule the jobto the non-clean device. However, the start time of the job JobA isshifted in accordance with the end time of step 1 of the job JobA.

Since the job JobB has been allocated to the clean device having thefault at present (refer to FIG. 1), if the fault of the first cleandevice is not recovered even after the start time comes, therescheduling is executed in a manner similar to the case of the jobJobA. A job name of the job in which a possibility of the reschedulingremains is shown by an italic type.

FIG. 13 is a flowchart showing an example of a proxy processingprocedure when the fault of the clean device occurs. When the occurrenceof the fault of the clean device is detected by the MIS server 201, theproxy process is started. In step S1301, whether or not the processes ofthe job allocated to the clean device in which the fault occurred can beproxy-processed by another clean device is discriminated. If it isdetermined that they can be proxy-processed by another clean device,step S1302 follows. For example, in the case where a staple process isbeing executed in an on-line manner, if another clean device which canperform the on-line staple process exists or a clean device having aprinter and an off-line stapler exists, similar processes can beexecuted even if the non-clean device is not used. In step S1302, therescheduling for allowing the proxy process to be performed by anotherclean device is executed. As for the job which was rescheduled to theclean device, when the scheduling time comes, the MIS server 201push-transmits the job having the security setting to the clean device,thereby allowing the clean device to execute the processes.

If there are no other clean devices which can perform the proxy-process,the MIS server 201 discriminates whether or not the processes can beproxy-processed by the non-clean device. In the case of the job whichneeds a step using a special device which exists only in the cleandevices, the processes cannot be proxy-processed. If they can beproxy-processed by the non-clean device, in step S1304, the MIS server201 discriminates whether or not the deadline for delivery cannot beassured due to the fault occurrence on the basis of the schedule of thejob having the security setting in the job allocation table. This isbecause if the deadline for delivery can be assured, it is sufficient tomerely shift the schedule back after waiting until the fault isrecovered.

If it is decided that the deadline for delivery cannot be assured, theMIS server 201 executes the rescheduling of all of the devices includingthe non-clean devices in step S1305. On the other hand, if it is decidedthat the deadline for delivery can be assured, the MIS server 201discriminates whether or not the device fault has been recovered in stepS1306. If it is recovered, the schedule is merely shifted to the timingby the stop time of the device caused by the fault and the proxy processis not executed. After that, the processing routine is finished. On theother hand, if the device fault is not recovered, the processing routineis returned to step S1304 and whether or not the deadline for deliverycannot be assured is discriminated again in step S1304. It is sufficientto periodically execute a loop of steps S1304 and S1306 at predeterminedtime intervals.

On the other hand, if it is decided in step S1303 that the processescannot be proxy-processed by the non-clean device, an exceptionalprocess is executed in step S1307. A message showing that they cannot beproxy-processed is displayed to the operator and, thereafter, theprocessing routine is finished. In this case, the operator takes acountermeasure such as proxy to another branch or subcontractor,notification of the schedule delay to the ordering source, or the likeor takes a countermeasure such as waiting for the recovery of the deviceor the like.

FIG. 14 is a flowchart showing an example of a job data transmittingprocess by the MIS server 201. In step S1401, the present time isconfirmed. In step S1402, the operator examines in which step thepresent time indicates the start time. If the present time is not timewhen the step can be newly started, the processing routine is returnedto step S1401. The time is confirmed again after the elapse of thepredetermined time in step S1401.

If the present time is the time when the step can be started, the MISserver 201 discriminates whether or not the job in which the step can bestarted has the security setting. If there is no security setting, thejob is transmitted to a transmission destination device (deviceallocated by the job allocation table: corresponds to the non-cleandevice here) in step S1409. The processes of this job are executed bythe transmission destination device.

On the other hand, if it is decided in step S1403 that the job has thesecurity setting, whether or not the transmission destination of the jobis the clean device is discriminated in step S1404. If it is determinedthat the transmission destination of the job is the clean device, thatis, if the security for the device has been assured, the processingroutine advances to step S1409.

On the other hand, if it is decided that the transmission destination ofthe job is not the clean device due to the fault of the clean device asmentioned above, in step S1405, the MIS server 201 discriminates whetheror not the conditions in which the job having the security setting canbe processed in the non-clean device are satisfied. For example, the MISserver 201 discriminates whether or not the operator who cannot handlethe job having the security setting, that is, the non-clean operator isoperating the device of the transmission destination by checking whetheror not the non-clean operator has logged off from the device of thetransmission destination. The MIS server 201 also discriminates whetheror not the clean operator has logged in the device of the transmissiondestination. If the non-clean operator does not log off from the deviceof the transmission destination yet and is operating the device of thetransmission destination, the conditions are not satisfied. Therefore,in step S1406, it is confirmed again that the conditions in which thejob having the security setting can be processed in the non-clean deviceare satisfied, then step S1405 follows. After that, the loop of stepsS1405 and S1406 is repeated until the conditions are satisfied.

If it is determined in step S1405 that the non-clean operator does notlog in and the clean operator has logged in and the conditions aresatisfied, step S1407 follows. In step S1407, the MIS server 201discriminates whether or not there is a data pull request from the cleanoperator. When the clean operator logs in the cleaned device, a list ofthe scheduled jobs having the security setting is obtained from the MISserver 201 and displayed on a display unit of the cleaned device, thejobs are selected from the displayed job list, and it is instructed toobtain them, so that the data pull request is issued from the cleaneddevice to the MIS server 201. If the data pull request is received, stepS1409 follows. If the data pull request is not issued, job datatransmission is suspended in step S1408 and step S1407 follows. Afterthat, the loop of steps S1407 and S1408 is repeated until the pullrequest is issued from the clean operator.

As mentioned above, by making the double check in steps S1405 and S1407with respect to the security, the security to the job having thesecurity setting can be assured.

FIG. 15 is a flowchart showing in more detail step S1405 in FIG. 14,that is, the process to discriminate whether or not the conditions inwhich the job having the security setting can be processed in thenon-clean device are satisfied. In step S1501, the MIS server 201discriminates whether or not the non-clean operator has already loggedin the device of the transmission destination. In the embodiment, alldevices have log-in means and the log-in and log-off by the operator ismanaged by the log-in means. If the non-clean operator has alreadylogged in, it is decided in step S1504 that the security conditions arenot satisfied.

On the other hand, if the non-clean operator does not log in, whether ornot the clean operator has logged in is discriminated in step S1502. Ifthe clean operator does not log in, nobody logs in the relevant device.However, since the log-in by the non-clean operator is also possible forthe clean operator, the processing routine advances to step S1504.

If the clean operator has already logged in in step S1502, it is decidedin step S1503 that the security conditions are satisfied.

Although the log-in situation is examined in steps S1501 and S1502 asmentioned above, the discrimination target is not limited to the deviceto which the steps are distributed but can be set to a plurality ofgroups of devices. This is because, for example, in the case where threenon-clean devices are arranged in a certain non-clean room, when the jobhaving the security setting is transmitted to one of the three non-cleandevices, in all of the three non-clean devices, whether or not thesecurity conditions are satisfied should be confirmed.

In a step such as a wrapping step in which concealment of data is high,there is also a case where it is sufficient if the security conditionsare discriminated only in a wrapping device.

To decide a range where the conditions are discriminated, it isnecessary to make grouping setting in dependence on a kind of device anda layout method.

To log in the device, for example, a GUI (Graphic User Interface) asshown in FIG. 16 is displayed on an operation unit of each device andthe log-in can be performed in an interactive manner by the GUI, or thelog-in can be also performed by an IC card or the like.

FIG. 17 is a flowchart showing an example of a post-process which isexecuted to the non-clean device by a workflow manager in the case wherethe clean operator leaves this working spot because of the recovery orthe like of the fault of the clean device. In step S1701, when thesecurity conditions are broken by the log-off of the clean operator, thelog-in of the non-clean operator to the group devices, or the like,whether or not the security job has been transmitted to the non-cleandevice is discriminated in step S1702. If the job having the securitysetting is not proxy-processed, this process is finished after that. Ifthe job having the security setting has been proxy-processed, data ofthe job having the security setting is deleted from a hard disk providedin the apparatus or an external storage device such as a memory or thelike in step S1703.

As many apparently widely different embodiments of the present inventioncan be made without departing from the spirit and scope thereof, it isto be understood that the invention is not limited to the specificembodiments thereof except as defined in the appended claims.

According to the invention, since the system has been constructed asmentioned above, after the security to the jobs which need the securityis assured, the distribution of the jobs can be controlled.

This application claims priority from Japanese Patent Application No.2005-039720 filed on Feb. 16, 2005, which is hereby incorporated byreference herein.

1. A job allocation control apparatus for controlling allocation ofjobs, comprising: a secure device whose security is assured; and aseparate normal device whose security is not assured a securitydiscrimination unit adapted to discriminate whether or not a job hassecurity setting; a device determination unit adapted to set the job toa scheduling target to the secure device if it is discriminated by saidsecurity discrimination unit that the job has the security setting andset the job to a scheduling target to the normal device if it isdiscriminated by said security discrimination unit that the job does nothave the security setting; a job specifying unit adapted to, when afault occurs in the secure device, specify a job that cannot be executedby a job deadline due to the fault from among jobs set to the schedulingtarget to the secure device by said device determination unit; adetermination unit adapted to determine who is operating the normaldevice and; a transmission control unit adapted to transmit the jobspecified by said job specifying unit to normal device if it isdetermined by said determination unit that an operator of the securedevice is operating the normal device and suspend transmission of thespecified job if it is determined by said determination unit that anoperator of the normal device is operating the normal device.
 2. Anapparatus according to claim 1, wherein if it is discriminated by saidsecurity discrimination unit that the job does not have the securitysetting, said device determination unit sets the job to the schedulingtarget to either the secure device or the normal device on the basis ofa predetermined attribute of the job so that a balance between an amountof jobs which are distributed to the secure device and an amount of jobswhich are distributed to the normal device is kept.
 3. An apparatusaccording to claim 2, wherein the predetermined attribute of the job isa job deadline.
 4. An apparatus according to claim 3, furthercomprising: a rescheduling unit adapted to set the job having thesecurity setting to the scheduling target to the normal device when aprocess of the job having the security setting which has been determinedto be the scheduling target to the secure device by said devicedetermination unit cannot be executed; and a device searching unitadapted to search for a device which cannot assure the job deadline fromthe devices as scheduling targets to the secure device, wherein if thedevice which cannot assure the job deadline is searched for by saiddevice searching unit, said rescheduling unit sets the job having themaximum job amount among the jobs having no security setting serving asscheduling targets to the secure device to the scheduling target to thenormal device.
 5. A job allocation control method of controllingallocation of jobs comprising: a secure device whose security isassured; and a separate normal device whose security is not assured asecurity discrimination step of discriminating whether or not the jobhas security setting; a device determination step of setting the job toa scheduling target to the clean device if it is discriminated in saidsecurity discrimination step that the job has the security setting andsetting the job to a scheduling target to the normal device if it isdiscriminated in said security discrimination step that the job does nothave the security setting; a job specifying step adapted to, when afault occurs in the secure device, specify a job that cannot be executedby a job deadline due to the fault from among jobs set to the schedulingtarget to the secure device by said device determination step; adetermination step adapted to determine who is operating the normaldevice; a transmission control step of transmitting the job specified bysaid job specifying step to the normal device if it is determined bysaid determination step that an operator of the secure device isoperating the normal device and suspend transmission of the specifiedjob if it is determined by said determination step that an operator ofthe normal device is operating the normal device.
 6. A method accordingto claim 5, wherein in said device decision step, if it is discriminatedin said security discrimination step that the job does not have thesecurity setting, the job is set to the scheduling target to either thesecure device or the normal device on the basis of a predeterminedattribute of the job so that a balance between an amount of jobs whichare distributed to the secure device and an amount of jobs which aredistributed to the normal device is kept.
 7. A method according to claim6, wherein the predetermined attribute of the job is a job deadline. 8.A method according to claim 7, further comprising: a rescheduling stepadapted to set the job having the security setting to the schedulingtarget to the normal device when a process of the job having thesecurity setting which has been determined to be the scheduling targetto the secure device in said device determination step cannot beexecuted; and a device searching step of searching for a device whichcannot assure the job deadline from the devices as scheduling targets tothe secure device, wherein in said rescheduling step, if the devicewhich cannot assure the job deadline is searched for in said devicesearching step, the job having the maximum job amount among the jobshaving no security setting serving as scheduling targets to the securedevice is set to the scheduling target to the normal device.