Document management system, management device, recording medium storing document management program, document management method and data signal

ABSTRACT

A document management system, which includes a management section that manages identification information corresponding to a component included in a document; a setting section that sets the identification information managed by the management section to the component included in the document; and a history management section that manages history information of the component corresponding to the identification information that is set to the component by the setting section.

CROSS-REFERENCE TO RELATED APPLICATION

This application is based on and claims priority under 35 USC 119 fromJapanese Patent Application No. 2007-221089 filed on Aug. 28, 2007.

BACKGROUND

1. Technical Field

The present invention relates to a document management system, amanagement device, a recording medium storing a document managementprogram, a document management method and a data signal.

2. Related Art

Recently, as the security for a paper document or an electronic document(hereinafter, collectively also referred to as “document”) is consideredas the most important issues, a demand for making the document traceablehas become increasingly strong. The wording “making the documenttraceable” herein refers to tracing and recording a series of documentlife cycle (from electronic document to paper, or from paper toelectronic document), such as who prints out the electronic documentwhen, and how the state of the printed paper document is. For example,the document is made up of a table, diagram, image, text or othervarious kinds of components. There may exist a case where thosecomponents are separately decomposed and/or a different document isgenerated from them.

SUMMARY

An aspect of the present invention provides a document managementsystem, which includes a management section that manages identificationinformation corresponding to a component included in a document; asetting section that sets the identification information managed by themanagement section to the component included in the document; and ahistory management section that manages history information of thecomponent corresponding to the identification information that is set tothe component by the setting section.

BRIEF DESCRIPTION OF THE INVENTION

An exemplary embodiment of the present invention will be described indetail based on the following figures, wherein:

FIG. 1 is a diagram showing an example of an overall configuration of adocument management system according to one exemplary embodiment of thepresent invention;

FIG. 2 is a diagram showing examples of an electronic document and apaper document;

FIG. 3 is a diagram showing an example of a configuration of objectinformation;

FIG. 4 is a diagram showing an example of a table configuration of asetting method management table;

FIGS. 5A to 5C are diagrams showing table configurations of tables thatmanage information related to the objects;

FIG. 6 is a diagram showing an example of a life cycle flow of adocument in the document management system shown in FIG. 1;

FIG. 7 is a diagram showing an example of a functional configuration ofeach device in the document management system shown in FIG. 1.

FIG. 8 is a flow chart showing a flow of operation in a client 10 shownin FIGS. 1 and 7;

FIG. 9 is a flow chart showing a flow of operation in an imageprocessing device 20 shown in FIGS. 1 and 7;

FIG. 10 is a flow chart showing a flow of operation in a managementserver 30 shown in FIGS. 1 and 7; and

FIG. 11 is a diagram showing an example of modification.

DETAILED DESCRIPTION

Hereinbelow, with reference to the attached drawings, an example of adocument management system, a management device, a recording mediumstoring a document management program, a document management method anda data signal according to the present invention will be described indetail.

FIG. 1 is a diagram showing an example of an overall configuration ofthe document management system according to one exemplary embodiment ofthe present invention.

In the document management system, a client 10, an image processingdevice 20, a management server 30 and a document storage server 40 areconnected through a network formed with a LAN (Local Area Network), aWAN (Wide Area Network) and so on. It should be noted that this networkconfiguration is just one example. In addition to the networkconfiguration above, a printer or various servers may be connected tothe network.

The client 10 is a computer or the like that is used by a user. In thisexample, the client 10 especially performs a function of generating anelectronic document, providing an instruction to print out theelectronic document and so on. At the time of printing out, theinstruction to print out is given, for example, via a printer driver.

The image processing device 20 has, in whole or in part, a printingfunction, copying function, scanning function and so on. In thisexample, the image processing device 20 especially performs a functionof printing out based on the instruction from the user, reading andcopying a paper document or changing the paper document into anelectronic form.

The management server 30 performs a function of managing a document andso on in this system. In this example, the management server 30especially manages information related to an electronic document, apaper document and each object (for example, graphic, table, image, textand so on) forming the documents, information related to securityapplied to each of the objects and so on.

The document storage server 40 performs a function of storing theelectronic document. The document storage server 40 stores an electronicdocument for which an order to store is given from the client 10, anelectronic document that is changed into an electronic form by the imageprocessing device 20 and so on.

These are the description of the overall configuration of the documentmanagement system according to the present invention. It should be notedthat each of the client 10, the image processing device 20, themanagement server 30, the document storage server 40 and so on includesa computer In the computer, a CPU (Central Processing Unit) and so onfunctioning as a main controlling unit; a ROM (Read Only Memory), a RAM(Random Access Memory), a HDD (Hard Disk Drive) and so on, whichfunction as a storing unit; a keyboard, a mouse, a display and so on,which function as an inputting unit; and a network card and so on, whichfunction as a communication unit are connected through a bus. Each ofthe units stated above is controlled through executing, by the maincontrolling unit, a program stored in the storing unit.

Now, a document ID is set to a document managed in the documentmanagement system. Additionally, a page ID is set to each page in thedocument. Then, an object ID is set to each object in the document.

FIG. 2 illustrates examples of an electronic document and a paperdocument. The electronic document shown in the upper part of FIG. 2includes such object as a title, text A, an organization chart, text B,a budget table and a picture. To each of the objects, object informationin a format according to a property (type of the object in this example)of the object is embedded. For example, since the title, the text A andthe text B are formed with textual information, the object informationis embedded to a space between characters or using jaggy of a characterand so on. Additionally, for example, since the organization chart andthe picture are formed with graphic or image, the object information isembedded using digital watermarking. Additionally, for example, in thetable, the object information is embedded to a margin of a cell and soon using watermarking. Furthermore, the document ID and the page ID ofthe electronic document are embedded using a two-dimensional bar code.

Additionally, an example of a paper document is shown in the lowerportion of FIG. 2. This paper document is obtained by printing out theelectronic document described above. As is the case with the electronicdocument above, the paper document includes objects. Furthermore, as isthe case with the electronic document above, the object information isembedded in each of the objects. In the paper document, the objectinformation is embedded in a form different from the electronic documentas described above. For example, in the organization chart and thepicture, the object information is embedded using an invisible toner(e.g. yellow) rather than the digital watermarking. In the table, forexample, the object information is embedded using a hybrid watermarkingwith a visible toner and so on rather than the watermarking. In thetitle, the text A and the text B, for example, the object information isembedded to a space between characters and so on as is the case with theelectronic document above. It should be noted that the reason that themethod of embedding the object information is changed depending on theproperty of the object, embedding destination (i.e. whether paperdocument or electronic document) or the like is, for example, to preventthe appearance of the document from deteriorating, avoid informationfrom missing and so on.

Here, the object information described above contains the object ID foridentifying at least the object. As shown in FIG. 3, the objectinformation includes, for example, the document ID, the page ID, theobject ID, a security level, the text, the table, the image, historyinformation and so on. It should be noted that areas for the text, thetable and the image contain a flag indicating a type of the object andso on. For example, if the object is text, the flag is set in the areafor the text.

The method of embedding the object information in the document ismanaged by the management server 30 using a setting method managementtable shown in FIG. 4. In the setting method management table, themethod of embedding the object information is stipulated incorrespondence with the type of the object. There are two types of thesetting method management tables, in other words, the table for thepaper document (from the electronic document to the paper document; andfrom the paper document to the paper document) and the table for theelectronic document (newly generated electronic document; and from thepaper document to the electronic document). For example, when theelectronic document is printed out, the object information is embeddedin each object based on the information stipulated in the setting methodmanagement table for the paper document.

Additionally, the management server 30 manages information on eachobject using tables shown in FIGS. 5A to 5C. In an object locationmanagement table shown in FIG. 5A, the object ID corresponding to thedocument ID and the page ID, and a type of the object are managed. Theobject location management table provides information on what kind ofform the object exits on which page in which document.

In a security management table shown in FIG. 5B, a security level of theobject ID is managed in correspondence with the object ID. The securitymanagement table provides a confidential level specified to each object.For example, if the user who is not given a sufficient security levelattempts to printing out, such object is blacked out, erased or thelike, and the object becomes no longer readable (which means the objectis replaced with a meaningless form). It should be noted that thesecurity level may be formed so as to provide information concerning therange of application/operation of the object.

In a history information management table shown in FIG. 5C, historyinformation is managed in correspondence with the object ID. The historyinformation management table provides a history corresponding to theobject, such as which object is cut from which page in which document,and the cut object is pasted to and exists on which page in whichdocument.

Next, using FIG. 6, a lifecycle flow of a document in the documentmanagement system will be described briefly.

Initially, there exits an electronic document in which objectinformation is embedded in each object (first-generation document). Itis assumed that the electronic document is printed out by a user who hasan authority corresponding to a manager. The paper document obtained asa result of the printing (second-generation document) is a printed outdocument in which the information similar to the electronic document,which is a source of the printing, is printed and visualized. Then, itis assumed that the paper document is changed into an electronic formagain. The electronic document obtained as a result of the changing(third-generation document) is an electronic document similar to theoriginal electronic document. Furthermore, it is assumed that a user whohas an authority corresponding to a general employee makes a copy ofthis electronic document. In the paper document obtained as a result ofthe copying (fourth-generation document), objects (an organization chartand an image) to which permission is not given are made unreadable bybeing blacked out and so on.

As described above, in the document management system, even if printing,copying, scanning and/or the like is repeatedly performed in the lifecycle of a document, the security of each object in the document istransferred and maintained.

Next, using FIG. 7, one example of a functional configuration of thedocument management system shown in FIG. 1 above in each of the deviceswill be described.

The client 10 includes an electronic document generation section 11 thatgenerate an electronic document, a printing instruction section 12 thatinstructs to print out the electronic document and so on, and anauthentication section 13 that performs user authentication in responseto the printing-out instruction and so on. The electronic documentgeneration section 11 includes an ID request section 14 that requests adocument ID and a page ID at the time of generating the electronicdocument, an ID setting section 15 that sets and embed the document IDand the page ID to the electronic document based on the request, anobject ID request section 16 that requests an object ID of an object inthe electronic document, and an object information setting section 17that embeds and sets to the object the object information including theobject ID based on the request. The object information setting section17 includes an object ID setting section 17 a that sets the object ID,and a security level setting section 17 b that sets a security level ofthe object based on user input.

The management server 30 includes an ID generation section 31, an objectID generation section 32, and an object information management section33. The ID generation section 31 generates and sends back the documentID and the page ID in response to the request from the client 10. Theobject information generation section 32 generates and sends back theobject ID in response to the request from the client 10. The objectinformation management section 33 manages information related to theobject and so on using a setting method management table 33 a, an objectlocation management table 33 b, a security management table 33 c and ahistory information management table 33 d, and responds to the requestfrom the client 10, the image processing device 20 and so on.

The image processing device 20 includes an authentication section 21that performs user authentication in response to the instruction to copyor read such as scan and so on, an reading section 22 that reads imageinformation from the paper document, an image processing section 23 thatperforms image processing of the read image information and so on, anelectronic document sending section 24 that sends the processed imageinformation as an electronic document to the document storage server 40and so on, a printing section 25 that forms an image based on theprocessed image information and performs printing, and a historyinformation sending section 26 that sends a history of the object to themanagement server 30. The image processing section 23 includes an objectseparation section 51 that separates the object from the imageinformation, an object information extraction section 52 that extractsthe object information including the object ID from the separated object(the object information is removed from the object that is an extractionsource), a security level obtainment section 53 that obtains a securitylevel corresponding to the extracted object ID, a security processingsection 54 that applies security processing to the object based on theobtained security level, and an object information setting section 55that embeds and sets the object information to the object.

The document storage server 40 includes a document storage section 41that stores the electronic document sent from the image processingdevice 20 and so on. These are the description of each of the devices.It should be noted that, although the functional configurations of theclient 10, the image processing device 20, the management server 30 andthe document storage server 40 are described above using FIG. 7, thefunctional configuration provided to each of the devices is not limitedto the configuration as illustrated above and in the figures. It may bepossible to realize the whole of the functional configurations byforming a whole or part of the functional configuration in any of thedevices above. For example, the management server 30 may be omitted byrealizing the whole functions of the management server 30 in the imageprocessing device 20.

Next, using FIGS. 8 to 10, the operation of each of the devices in thedocument management system as shown in FIG. 1 will be described.

Initially, using FIG. 8, an operational flow in the client 10 will bedescribed.

The client 10 is on standby until a document is generated or printing isinstructed (No in step S102 after NO in step S101). If a user generatesa document in this mode (YES in step S101), the ID request section 14 inthe client 10 requests a document ID and a page ID from the server 30(step S103) and the ID setting section 15 embeds and sets the documentID and the page ID sent in response to the request in the electronicdocument in a form of, for example, two dimensional bar code and so on(step S104).

Then, the object ID request section 16 in the client 10 requests anobject ID of each object from the management server 30 (step S105). Thisrequest includes a type of the object existing in the electronicdocument. Then, upon receiving the object ID in response to the request,the client 10 requests the user to input a security level to be attachedto the object (step S106). Once the user inputs the security level forthe object in response to the request, the object information settingsection 17 in the client 10 embeds and sets to the object the objectinformation including the object ID received from the management server30 and the inputted security level in accordance with the embeddingmethod, which is sent from the management server 30 together with theobject ID (step S107). After the setting is completed, the objectinformation setting section 17 sends the embedded object information tothe management server 30 (step S108). Then, the processing ends. If theobject information is embedded and set to plural pages, processingsimilar to the processing as described above is repeated for each page.

Upon receiving a printing instruction from the user at the time of thestandby mode in step S101 and step S102 above (YES in step S102 after NOin step S101), the client 10 requests the user to performauthentication. Once the user inputs authentication information using anIC card and so on in response to the request, the authentication section13 in the client 10 performs user authentication (step S109), and theprinting instruction section 12 sends the printing instruction includingthe electronic document and authority information to the imageprocessing device 20 (step S110). Then, the processing ends.

Next, using FIG. 9, an operation flow in the image processing device 20will be described. It should be noted that the description here will bemade by giving an example of operation at the time of obtaining thesecurity level of the object from the management server 30 rather thanobtaining it from the object information embedded in the object in thedocument.

The image processing device 20 is on standby until it receives theprinting instruction or an instruction to read the paper document (forexample, scanning or copying; NO in step S202 after NO in step S201).Upon receiving the printing instruction from the client 10 in this mode(YES in step S201), the object separation section 51 in the imageprocessing device 20 separate the object from the electronic documentincluded in the instruction, and the object information extractionsection 52 extracts the object information from the separated object(step S203).

Upon completing the extraction of the object information, the securitylevel obtainment section 53 in the image processing device 20 sends asecurity request including the extracted one or more object IDs to themanagement server 30, and obtains the security level corresponding toeach object from the management server 30 (step S204).

Then, the security processing section 54 in the image processing device20 performs processing of the object based on the obtained securitylevel and the authority information of the user, who instructs to printout, included in the printing instruction above (step S205). In thisprocessing, for example, if there exists an object in which userauthority is not satisfied, the object is made unreadable through beingblacked out and so on.

Upon completing this processing, the object information setting section55 in the image processing device 20 obtains the embedding methodcorresponding to the type of the separated object from the managementserver 30 (step S206), and embeds and sets the object information toeach object in accordance with the obtained embedding method (stepS207). And, the printing section 25 performs printing based on theprinting instruction received in step S201 (step S208), while thehistory information sending section 26 sends the history of the objectrelated to the processing above to the management server 30 (step S209).Then, the processing ends.

Upon receiving an instruction to read a paper document from the user atthe time of the standby mode in step S201 and step S202 above (YES instep S202 after NO in step S201), the image processing device 20requests the user to perform authentication. Once the user inputsauthentication information using an IC card and so on in response to therequest, the authentication section 21 in the image processing device 20performs user authentication (step S210), while the reading section 22reads the paper document for which the reading instruction is given instep 202 (step S211). Then, the object separation section 51 separateseach object in the read paper document, and the object informationextraction section 52 extracts the object information from the separatedobjects (step S212).

Upon completing extracting the object information, the security levelobtainment section 53 in the image processing device 20 sends a securityrequest including the extracted one or more object IDs to the managementserver 30, and obtains the security level corresponding to each objectfrom the management server 30 (step S213).

The security processing section 54 in the image processing device 20performs processing of each object based on the obtained security leveland the authority information of the user, which is specified throughthe authentication in step S210 (step S214). In this processing, forexample, if there exists an object in which user authentication is notsatisfied, the object is made unreadable through being blacked out andso on.

Upon completing the processing, the object information setting sectionin the image processing device 20 obtains the embedding methodcorresponding to the type of the separated object from the managementserver 30 (step S215), and embeds and sets the object information toeach object in accordance with the obtained embedding method (step3216). If the reading instruction in step S202 is based on copying (YESin step 217), the printing section 25 performs printing out based on thecopying instructed in step S202 (step S218). If the reading instructionin step S202 is based on the instruction to change the paper documentinto an electronic form (NO in step S217), the electronic documentsending section 24 in the image processing device 20 sends the processedimage information as an electronic document to the document storageserver 40 (step S219). Then, the history information sending section 26in the image processing device 20 sends a history of the object relatedto the processing above to the management server 30 (step S209), and theprocessing ends. It should be noted that, in step S219, the electronicdocument may be sent to a sending destination other than the documentstorage server 40, and may be sent, for example, to a storage region inthe image processing device 20 itself and so on.

Next, using FIG. 10, an operational flow in the management server 30will be described.

The management server 30 is on standby until it receives informationrequest and so on from each of the devices (NO in steps S301 to S305).Upon receiving a request for a document ID and a page ID from the client10 in this state (YES in step S301), the management server 30 generates,in the ID generation section 31, the document ID and the page ID (stepS306), and sends the generated document ID and the page ID to the client10 (step S307). Then, the processing ends.

Upon receiving a request for an object ID from the client 10 in thestandby mode in the steps S301 to S305 above (YES in step S302 after NOin step S301), the management server 30 generates, in the object IDgeneration section 32, the object ID (step S308), and sends thegenerated object ID and the embedding method corresponding to the typeof the object to the client 10 (step S309). Then, the processing ends.

Additionally, upon receiving the object information from the client 10or the history from the image processing device 20 in the standby modein steps S301 to S305 above (YES in step S303 after NO in steps S301 andS302), the management server 30 updates, in the object informationmanagement section 33, each of the tables based on the receivedinformation (step S310). Then, the processing ends.

Additionally, upon receiving the security request from the imageprocessing device 20 in the standby mode in steps S301 to S305 above(YES in step S304 after NO in steps S301 to S303), the management server30 obtains, in the object information management section 33, one or moreobject IDs included in the request (step S311), and sends the securitylevel corresponding to each of the one or more object IDs to the imageprocessing device 20 (step S312). Then, the processing ends.

Additionally, upon receiving a request for a embedding method of objectinformation from the image processing device 20 in the standby mode insteps S301 to S305 above (YES in step S305 after NO in steps S301 toS304), the management server 30 obtains, in the object informationmanagement section 33, the embedding method corresponding to the type ofthe object included in the request (step S313), and sends the obtainedembedding method to the image processing device 20 (step S314). Then,the processing ends.

These are descriptions of one example of a typical exemplary embodimentof the present invention. However, the present invention is not limitedto the example as described above and illustrated in figures, and may berealized through modification as appropriate without departing from thespirit and scope thereof.

For example, in the description above, the security level is managed incorrespondence with each object (see FIGS. 5A to 5C). However, it may bepossible to manage the security level corresponding to a group of theobject.

Additionally, in the description above, the object is made unreadablethrough being blacked out and so on if a higher authority is required tomeet a security level attached to the object (steps S205 and S214 inFIG. 9). However, it may be possible to employ a configuration in which,if a higher authority is required for the object, an authority thatmeets the security level of the object is temporarily provided. Theprocessing in this case will be described using FIG. 11. It should benoted that the processing shown in FIG. 11 is implemented in steps S205and S214 in FIG. 9.

In this processing, the security level attached to the object iscompared with authority information of the user (step 8401). If theauthority of the user is sufficient (YES in step S402), the processingproceeds to the comparing step for the next object (step S409). However,if the authority is not sufficient (NO in step S402), the imageprocessing device 20 displays a message to the effect that “Do you askan administrator for permission to use?” (step S403). If the userchooses not to ask the permission to use (NO in step S404), the imageprocessing device 20 makes the object unreadable through blacking outand so on (step S408), and the processing proceeds to the next. If theuser chooses to ask the permission to use (YES in step S404), the imageprocessing device 20 requests the permission to use from theadministrator via the management server 30 (step S405). For example, theadministrator checks through a mail and so on describing who makes therequest for which object.

If the permission to use is granted (YES in step S406), the managementserver 30 temporarily provides the authority for the object (step S407),and the image processing device 20 proceeds to the comparison step ofthe next object (step S409). If the permission is not granted (NO instep S406), the image processing device 20 makes the object unreadablethrough blacking out and so on (step S408), and proceeds to theprocessing of the next object. It should be noted that, in theprocessing in step S407 above, it may be possible to employ aconfiguration in which the authority for the object is temporarilyprovided in accordance with a period or frequency. Additionally, thepermission to use plural objects may be requested in a collectivemanner. Furthermore, the permission to use may be requestedsimultaneously for plural administrators. These are descriptions of theoperational flow in the case where the authority for the object istemporarily provided to the user whose authority is not sufficient.

It should be noted that a program operable in the client 10, the imageprocessing device 20, the management server 30 and the document storageserver 40 may be provided by being recorded in an external recordingmedium such as a CD-ROM and so on as well as through communication meanssuch as network and so on.

The foregoing description of the exemplary embodiment of the presentinvention is provided for the purposes of illustration and description.It is not intended to be exhaustive or to limit the invention to theprecise forms disclosed. Obviously, many modifications and variationswill be apparent to practitioners skilled in the art The exemplaryembodiment was chosen and described in order to best explain theprinciples of the invention and its practical applications, therebyenabling others skilled in the art to understand the invention forvarious embodiments and with the various modifications as are suited tothe particular use contemplated. It is intended that the scope of theinvention be defined by the following claims and their equivalents.

What is claimed is:
 1. A document management system, comprising: amanagement device that manages unique identification information andconfidentiality level information, each of which correspond to acomponent of a plurality of components in an electronic document or in apaper document, the electronic document or the paper document having theplurality of components that are at least one of a graphic, a table, animage, and a text; a setting device that sets the unique identificationinformation to each component of the plurality of components included inthe electronic document or included in the paper document; aninstruction receiving device that receives an instruction from a user toprint the electronic document or an instruction from the user to readthe paper document; an authority information receiving device thatreceives authority information of the user; a confidentiality levelinformation obtainment device that obtains the confidentiality levelinformation corresponding to each component of the plurality ofcomponents of the electronic document or the paper document; and aconfidentiality processing device that performs image processing on eachcomponent of the plurality of components of the electronic document orthe paper document based on a comparison between the confidentialitylevel information corresponding to the unique identification informationof the component and the authority information of the user, wherein thesetting device sets the unique identification information to eachcomponent of the plurality of components after the image processing iscompleted by the confidentiality processing device.
 2. The documentmanagement system according to claim 1, wherein the setting device setsthe unique identification information in the electronic document or inthe paper document to the space between characters or using jaggy of acharacter when the component is a text component.
 3. The documentmanagement system according to claim 1, wherein the setting device setsthe unique identification information to each component of the pluralityof components in a manner according to the document managed by themanagement device, the document being the electronic document or theprinted document.
 4. The document management system according to claim1, wherein the confidentiality processing device compares theconfidentiality level information of each component of the plurality ofcomponents with the authority information of the user, and for eachcomponent of the plurality of components, if an authority of theauthority information of the user is insufficient, the confidentialityprocessing device temporarily rants a sufficient authority for the cornorient to the user based on a request of the user.
 5. A managementapparatus, comprising: a management device that manages uniqueidentification information and confidentiality level information, eachof which correspond to a component of a plurality of components in anelectronic document or in a paper document, the electronic document orthe paper document having the plurality of components that are at leastone of a graphic, a table, an image, and a text; a confidential levelmanagement device that manages the confidentiality level information ofeach component of the plurality of the components corresponding to theunique identification information managed by the management device; aconfidentiality processing device that performs image processing on eachcomponent of the plurality of components of the electronic document orthe paper document based on the confidentiality level informationmanaged by the confidential level management device.
 6. A non-transitorycomputer readable recording medium storing a document management programthat causes a computer to execute a process, the process comprising:managing unique identification information and confidentiality levelinformation, each of which correspond to a component of a plurality ofcomponents in an electronic document or in a paper document, theelectronic document or the paper document having the plurality ofcomponents that are at least one of a graphic, a table, an image, and atext; setting the unique identification information to each component ofthe plurality of components included in the electronic document orincluded in the paper document; receiving an instruction from a user toprint the electronic document or an instruction form the user to printthe paper document; receiving authority information of the user;obtaining the confidentiality level information corresponding to eachcomponent of the plurality of components of the electronic document orthe paper document; comparing the confidentiality level informationcorresponding to the unique identification information of the componentand the authority information of the user; and performing imageprocessing on each component of the plurality of components of theelectronic document or the paper document based on the comparison,wherein the unique identification information is set after the imageprocessing is performed.
 7. A microprocessor implemented documentmanagement method, comprising: managing unique identificationinformation and confidentiality level information, each of whichcorrespond to a component of a plurality of components in an electronicdocument or in a paper document, the electronic document or the paperdocument having the plurality of components that are at least one of agraphic, a table, an image, and a text; setting, via the microprocessor,the unique identification information to each component of the pluralityof components included in the electronic document or included in thepaper document; receiving an instruction from a user to print theelectronic document or an instruction form the user to print the paperdocument; receiving authority information of the user; obtaining theconfidentiality level information corresponding to each component of theplurality of components of the electronic document or the paperdocument; comparing the confidentiality level information correspondingto the unique identification information of the component and theauthority information of the user; and performing image processing oneach component of the plurality of components of the electronic documentor the paper document based on the comparison, wherein the uniqueidentification information is set after the image processing isperformed.
 8. The document management system according to claim 1,wherein the confidentiality processing device compares theconfidentiality level information of each component of the plurality ofcomponents with authority information of the user, and for eachcomponent of the plurality of components, if the authority informationof the user is insufficient, the confidentiality processing device makesthe unauthorized component unreadable by performing an image processingto black out or erase the component from the electronic document or fromthe paper document.
 9. The microprocessor implemented documentmanagement method according to claim 7, further comprising: if incomparing the confidentiality level information corresponding to theunique identification information of the component and the authorityinformation of the user, the authority information of the user isinsufficient, making the unauthorized component unreadable by performingan image processing to black out or erase the component from theelectronic document or from the paper document.
 10. The documentmanagement system according to claim 1, further comprising a historymanagement device that manages history information of each component ofthe plurality of components that correspond to the unique identificationinformation that is set to each of the component by the setting device.11. The non-transitory computer readable recording medium according toclaim 6, further comprising managing history information of eachcomponent of the plurality of components that correspond to the uniqueidentification information that is set to each of the component.
 12. Themicroprocessor implemented document management method according to claim7, further comprising managing history information of each component ofthe plurality of components that correspond to the unique identificationinformation that is set to each of the component.
 13. The documentmanagement system according to claim 10, wherein the history informationfurther includes information specifying, within the electronic documentor the paper document, a page from which the component is removed, and apage to which the cut component is pasted.
 14. The processor implementeddocument management method according to claim 11, wherein the historyinformation further includes information specifying, within theelectronic document or the paper document, a page from which thecomponent is removed; and a page to which the cut component is pasted.15. The non-transitory computer readable recording medium according toclaim 12, wherein the history information further includes informationspecifying, within the electronic document or the paper document, a pagefrom which the component is removed, and a page to which the cutcomponent is pasted.
 16. The document management system according toclaim 4, further comprising a display device that displays an output tothe user, wherein if the authority of the authority information of theuser is insufficient, the display device prompts the user for authorityinformation of an administrator level.
 17. A document management systemcomprising: a management device that manages unique identificationinformation and confidential level information, both of which correspondto a component of a plurality of components in a document, the documenthaving the plurality of components that are at least one of a graphic, atable, an image, and a text; a setting device that sets the uniqueidentification information to each component of the plurality ofcomponents included in the document; and a confidentiality processingdevice that performs image processing on each component of the pluralityof components of the document based on confidentiality level informationwhich is set to each component of the plurality of components, whereinthe setting device sets the unique identification information to eachcomponent of the plurality of components when the image processing iscompleted by the confidentiality processing device.
 18. The documentmanagement system according to claim 17, wherein the setting device setsthe unique identification information to, in the document, the spacebetween characters or using jaggy of a character, when the component istext component.
 19. The document management system according to claim 1,wherein the confidentiality processing device compares theconfidentiality level information of each component of the plurality ofcomponents with authority information of a user, and for each componentof the plurality of components, if the authority of the user is notsufficient, the confidentiality processing device makes the unauthorizedcomponent unreadable by performing an image processing.