Method and system for authenticating users in an image processing apparatus and/or image processing system

ABSTRACT

In a multifunction peripheral (MFP) including an operation key for setting a folder of an authenticated user as an address of image data, setting received authentication information or setting pre-registered authentication information that has been associated with a user is selected, and when the operation key is operated, the authentication information is set according to the selected content. The image data is then processed using the set authentication information.

BACKGROUND

Field

Aspects of the present invention generally relate to an image processingsystem capable of processing image data, an image processing apparatus,a control method therefor, and a computer readable storage medium.

Description of the Related Art

Conventionally, an image processing apparatus including an operation keyof “e-mail to yourself” has been known (Japanese Patent ApplicationLaid-Open No. 2006-101484). According to Japanese Patent ApplicationLaid-Open No. 2006-101484, when the operation key of “e-mail toyourself” is operated, an e-mail address of a user operating the imageprocessing apparatus is set as an address of image data. With thissetting, when the user wants to transmit the image data to his/her owne-mail address, the user does not need to input it, thereby reducing theuser's works.

Japanese Patent Application Laid-Open No. 2006-101484 indicates theoperation key of “e-mail to yourself” for setting the e-mail address. Inaddition to this operation key, another operation key of “transmit fileto yourself” may be provided for the image processing apparatus. Theterm of “transmit file” means to transmit the image data using aprotocol such as Server Message Block (SMB) and File Transfer Protocol(FTP). In addition, distributed authoring and versioning protocol forthe World Wide Web (WWW) (Web DAV) is also known as one of the protocolsfor transmitting a file.

In the image processing apparatus including the operation key of“transmit file to yourself”, in response to an operation by theoperation key of “transmit file to yourself”, a folder of the useroperating the image processing apparatus is set as an address of theimage data. With this setting, when the user wants to transmit the imagedata to his/her own folder (to store in the own folder), the user doesnot need to input folder information indicating the own folder, therebyreducing the user's works.

When the file is transmitted, in addition to information (host name)indicating an apparatus managing the folder that is a storagedestination of the image data and location information (path) about thefolder, authentication information (user name and password) foraccessing an addressed apparatus is required.

When the addressed apparatus to which the image data is transmitted islocated in the same domain as the image processing apparatus from whichthe image data is transmitted, the user's authentication information isoften managed in an integrated manner in the domain. In such a case, theauthentication information used to login to the image processingapparatus may be the same as the authentication information required toaccess the addressed apparatus to which the file is transmitted.

When the same authentication information can be used, a useridentification (ID) and the password input by the user to login to theimage processing apparatus can be continuously used as the user name andthe password for transmitting the image data in a file. With thisarrangement, the authentication information for logging into the imageprocessing apparatus and the authentication information as the addressfor the file transmission are not required to be individually input,thereby reducing the user's works.

On the other hand, in recent years, using an integrated circuit (IC)card to login to the image processing apparatus has been known. The useris not requested to input the password, when using the IC card to loginto the apparatus. That is because the fact that a person holds the ICcard certifies that the person is the user himself/herself.

When the above-described authentication information is to becontinuously used, and if the IC card is used to login, a problem willarise. That is because, since the user does not input the password whenlogging into the apparatus using the IC card, the password to becontinuously used does not exist so that the file cannot be transmitted.Further, if the user inputs the password when logging in or transmittingthe file, the file can be transmitted, while the user needs to input thepassword each time logging into the apparatus or transmitting the file.

SUMMARY

An aspect of the present invention generally relates to a mechanism forsetting authentication information by an appropriate method whenprocessing is performed on image data with a user's folder set as anaddress.

One aspect of the present invention provides an image processing systemincluding a reception unit configured to receive authenticationinformation, an authentication unit configured to authenticate a userbased on the authentication information received by the reception unit,an operation key configured to set a folder of the user as an address ofimage data, a selection unit configured to select whether to set theauthentication information received by the reception unit orpre-registered authentication information associated with the user, asetting unit configured to set, when the operation key is operated,according to content selected by the selection unit, the authenticationinformation received by the reception unit or the pre-registeredauthentication information, and a processing unit configured to processthe image data using the authentication information set by the settingunit.

Further features and aspects of the present invention will becomeapparent from the following detailed description of exemplaryembodiments with reference to the attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of the specification, illustrate exemplary embodiments, features,and aspects of the invention and, together with the description, serveto explain the principles of the invention.

FIG. 1 illustrates an image processing system according to an exemplaryembodiment.

FIG. 2 is a block diagram illustrating a configuration of amultifunction peripheral (MFP) according to the exemplary embodiment.

FIG. 3 is a block diagram illustrating a configuration of anauthentication server and a file server according to the exemplaryembodiment.

FIG. 4 illustrates information managed by the authentication serveraccording to the exemplary embodiment.

FIG. 5 illustrates an operation screen of the MFP according to theexemplary embodiment.

FIG. 6 illustrates an operation screen of the MFP according to theexemplary embodiment.

FIG. 7 illustrates an operation screen of the MFP according to theexemplary embodiment.

FIG. 8 is a flowchart illustrating a login operation performed by theMFP according to the exemplary embodiment.

FIG. 9 illustrates an operation screen of the MFP according to theexemplary embodiment.

FIGS. 10A and 10B illustrate operation screens of the MFP according tothe exemplary embodiment.

FIG. 11 is a flowchart illustrating an operation performed by the MFPwhen “transmit file to yourself” is selected according to the exemplaryembodiment.

FIG. 12 illustrates an operation screen of the MFP according to theexemplary embodiment.

FIG. 13 is a flowchart illustrating an operation performed by the MFPwhen “transmit file to yourself” is selected according to the exemplaryembodiment.

DESCRIPTION OF THE EMBODIMENTS

Various exemplary embodiments, features, and aspects of the inventionwill be described in detail below with reference to the drawings.

Exemplary embodiments described below are not limiting, and allcombinations of the features described in the exemplary embodiments arenot essential for the solutions of the invention.

A first exemplary embodiment will now be described. FIG. 1 illustratesan image processing system according to the first exemplary embodiment.

On a local area network (LAN) 100, an MFP 101, an authentication server102, and a file server 103 are communicably connected with one another.The MFP 101 is an example of the image processing apparatus. Theauthentication server 102 is an example of an authentication apparatus.The file server 103 is an example of a file management device. The MFP101 can transmit a file of image data using SMB, FTP, and WebDAV with afolder in the file server 103 set as an address. A folder in the MFP 101in addition to the file server 103 can also be set as an address.Further, the MFP 101 can transmit the image data by an e-mail via a mailserver (not illustrated). In another exemplary embodiment, the imageprocessing system includes just the MFP 101 and the authenticationserver 102.

FIG. 2 is a block diagram illustrating a configuration of the MFP 101.

A control unit 210 including a central processing unit (CPU) 211controls operation of the MFP 101. The CPU 211 reads a control programstored in a read-only memory (ROM) 212 to perform various types ofcontrols such as reading control and transmission control. A randomaccess memory (RAM) 213 is used as a temporary storage region of a mainmemory and a work area of the CPU 211. In a case of the MFP 101, one CPU211 executes each processing illustrated in the flowchart describedbelow using one memory (RAM 213 or hard disk (HDD) 214). However, otherexemplary embodiments may be adopted. For example, each processingillustrated in the flowchart described below can be executed using aplurality of CPUs and a plurality of RAMs or HDDs that cooperate withone another.

The HDD 214 stores image data and various types of programs. Anoperation unit interface (I/F) 215 connects an operation unit 220 with acontrol unit 210. The operation unit 220 includes a liquid crystaldisplay unit having a touch panel function and a keyboard.

A printer I/F 216 connects a printer 221 with the control unit 210. Theimage data to be printed by the printer 221 is transferred from thecontrol unit 210 via the printer I/F 216, and then printed onto arecording medium by the printer 221.

A scanner I/F 217 connects a scanner 222 with the control unit 210. Thescanner 222 reads an image on a document to generate image data (imagefile), and then inputs it to the control unit 210 via the scanner I/F217. The MFP 101 can transmit the image data (image file) generated bythe scanner 222 via file transfer or via e-mail.

A card reader I/F 218 connects a card reader 223 with the control unit210. The card reader 223 reads a user ID recorded in a mobile recordingmedium (IC card), and then inputs it into the control unit 210. The cardreader 223 can be a contact type or a non-contact type reader.

A network I/F 219 connects the control unit 210 (MFP 101) with the LAN100. The network I/F 219 transmits the image data and information to anexternal apparatus (e.g., authentication server 102 and file server 103)on the LAN 100 and receives various types of information from theexternal apparatus thereon.

FIG. 3 is a block diagram illustrating the authentication server 102.

A control unit 310 including a CPU 311 controls operation of theauthentication server 102. The CPU 311 reads a control program stored ina ROM 312 to execute various types of control processing. A RAM 313 isused as a temporary storage region of a main memory and a work area ofthe CPU 311. An HDD 314 stores image data and various types of programs.

A network I/F 315 connects the control unit 310 (authentication server102) with the LAN 100. The network I/F 315 transmits/receives varioustypes of information to/from another apparatus on the LAN 100. Since aconfiguration of the file server 103 is the same as that of theauthentication server 102, a detailed description of the file server 103is not provided herein.

FIG. 4 illustrates information in the HDD 314 managed by theauthentication server 102.

The authentication server 102 manages the domains including the imageprocessing system illustrated in FIG. 1, and further manages information401 and 402 required to authenticate the user, and information 403 to409 about the user for each user. The information 401 indicates the userIDs for uniquely indicating the user and can be, for example, employeecodes of a company where the MFP 101 is installed.

FIG. 4 illustrates information about the user corresponding to the userID of A1001. When the keyboard authentication is performed as describedbelow, and when the user of A1001 starts to use the MFP 101, the user isrequested to input “A1001” as the user ID and “secret33” as thepassword. The authentication information (user ID and password) input tothe MFP 101 is transmitted to the authentication server 102. Theauthentication server 102 checks whether the authentication information(user ID and password) transmitted from the MFP 101 corresponds to theinformation managed as the information 401 and 402. If they correspondto each other, the authentication server 102 notifies the MFP 101 of theauthentication “OK”. On the other hand, if the authenticationinformation does not correspond to the information 401 and 402, theauthentication “NG” is notified to the MFP 101.

When the card authentication is performed as described below, the userID read from the IC card is transmitted to the authentication server102. The authentication server 102 checks whether the user IDtransmitted from the MFP 101 corresponds to the information managed asthe information 401. If they correspond to each other, theauthentication “OK” is notified to the MFP 101. On the other hand, ifthe user ID does not correspond to the information 401, theauthentication “NG” is notified to the MFP 101. The user is notrequested to input the password when logging in using the IC card. Thatis because the fact that a person holds the IC card certifies that theperson is the user.

When the user is normally authenticated, information 403 to 409 isnotified to the MFP 101 with the authentication “OK”. The information403 indicates that a name of the user of A1001 is “Taro Tanaka”. Theinformation 404 indicates that the user of A1001 belongs to a group of“users”. The information 405 indicates whether the user of A1001 canchange the password managed as the information 402. When the information405 indicates “NO”, only a system administrator can change the passwordof the information 402.

The information 406 indicates an expiration date of the password managedas the information 402. When the information 406 indicates “unlimited”,the password of the information 402 can be used for an unlimited time.When the time limit is set for the information 406, and when the timelimit approaches, the user is requested to change the password. Theinformation 407 indicates an e-mail address of the user of A1001. Theuser of A1001 can receive an e-mail transmitted with the e-mail addressthat is managed as the information 407 and set as the address.Information 408 and 409 indicates the host name and the path of a devicewhere the folder of the user of A1001 is located. The user of A1001 canaccess the folder indicated by the information 408 and 409, and acquirethe data stored in the folder.

FIG. 5 illustrates an example of an operation screen displayed on theoperation unit 220.

The user can select a function by operating any of operation keys 501 to503 on the screen illustrated in FIG. 5. FIG. 5 illustrates a statewhere the operation key 501 is selected. FIG. 5 illustrates “scan andtransmission”, “copy”, and “fax” as functions. However, the MFP 101 mayinclude other functions in addition to those functions.

The user selecting the operation key 501 can set the address of theimage data to be transmitted by operating any of operation keys 511 to515. When the operation key 511 is operated, content of an address bookheld in the HDD 214 is displayed, and then the user can set the contentas the address of the image data with reference to the contentregistered in the address book.

When the operation key 512 is operated, a list of one-touch keys isdisplayed. One or a plurality of addresses is pre-associated with eachone-touch key, and thus the user can set the content associated with theone-touch key as the address of the image data by operating the desiredone-touch key. When the operation key 513 is operated, a screen forreceiving a new input of address information from the user is displayed.The user inputs the address information via the displayed screen, andcan set the address information as the address of the image data.

An operation key 514 is operated when the user wants to set his/her ownfolder as the address of the image data. When the user operates theoperation key 514, a folder of his/her own is automatically set as theaddress of the image data (details will be described below). Anoperation key 515 is operated when the user wants to set his/her e-mailaddress as the address of the image data. When the user operates theoperation key 515, the e-mail address of his/her own is automaticallyset as the address of the image data.

An operation key 521 is used to set reading color/black and white. Anoperation key 522 is used to set a reading resolution. An operation key523 is used to set a file format of the image data to be transmitted. Anoperation key 524 is used to set one-sided/two-sided reading. Anoperation key 525 is used to set a reading size.

FIG. 6 illustrates an example of the operation screen (first operationscreen) displayed on the operation unit 220.

The screen illustrated in FIG. 6 can be operated only by a systemadministrator, and is not displayed when general users operate the MFP101. The system administrator can select a method for setting the folderwhen the operation key 514 is operated by an operation of any ofoperation keys 601 to 603.

The MFP 101 is provided with three methods of setting the folder: “homefolder”, “register for each user”, and “manage by server”. “Home folder”indicates a method in which system administrator pre-registers a part ofthe host names and the paths of the folders to the MFP 101 as theinformation to be shared by a plurality of users, and such informationis set as an address of the image data. A system administratorpre-registers the part of the host names 610 and the paths 620 of thefolders to be used when “home folder” is selected. This setting methodhas an advantage that, since each user's folder can be located in thesame host and/or the same folder, for example, a system administratorcan easily manage the folders.

“Register for each user” indicates a method in which the general userspre-register folder information (host name, path, user name, andpassword) about each user to MFP 101, and then such information is setas an address of the image data. Details of the registration will bedescribed below with respect to FIG. 7. Since the user can register anarbitrary folder as the user's own folder using this setting method,this method is user-friendly.

“Manage by server” indicates a method in which the information managedby the authentication server 102 as the information 408 and 409illustrated in FIG. 4 is set as an address of the image data. By thissetting method, since the folder for each user is integrally managed bythe server, a user's work of updating the folder information can bereduced when the folder information is required to be updated.

Since the MFP 101 is provided with the “home folder”, “register for eachuser”, and “manage by server” methods, the method for setting the foldercan be selectively switched. More specifically, “home folder” can beselected for easy management of the folder, “register for each user” canbe selected for user's convenient usage having a higher priority, and“manage by server” can be selected for the integral management of thefolders by the server. The selection can be made based on a number offactors like, for example, the environment where the MFP 101 islocated/installed.

The authentication information can be continuously used by the MFP 101.When the apparatus to which the image data is addressed is located inthe same domain as the MFP 101 from which the image data is transmitted,the user's authentication information is often managed in an integratedmanner in the domain. In such a case, the authentication informationused to login to the MFP 101 may be the same as the authenticationinformation required to access the addressed apparatus to which theimage data is to be transmitted. When the same authenticationinformation is used, the user ID and the password input by the user tologin to the MFP 101 can be continuously used as the user name and thepassword for transmitting the image data. With this arrangement, theauthentication information for logging into the MFP 101 and theauthentication information as the address for the file transmission arenot required to be individually input, thereby reducing the user'sworkload.

When the IC card is used to login to the MFP 101, the user ID can beacquired by reading the user ID recorded in the IC card, but thepassword cannot be acquired. Therefore, even if the authenticationinformation is to be continuously used, since the password to becontinuously used does not exist, the file cannot be transmitted and atransmission error results.

According to the first exemplary embodiment, the screen illustrated inFIG. 6 includes operation keys 604 and 605. The operation key 604alternately switches between “refer to authentication information” and“not refer to authentication information” each time it is operated.Similarly, the operation key 605 also alternately switches between“refer to authentication information” and “not refer to authenticationinformation” each time it is operated. When “not refer to authenticationinformation” is selected, the user ID and the password input by the userto login to the MFP 101 are continuously used as the user name and thepassword for transmitting the image data.

When “refer to authentication information” is selected, the user ID andthe password input by the user to login to the MFP 101 are notcontinuously used. Instead, with reference to the folder informationillustrated in FIG. 7 and registered for “register for each user”, theuser name (information 703) and the password (information 704) includedin the folder information are used as the user name and the password fortransmitting the image data in a file.

The operation key 604 can be operated only when “home folder” isselected using the operation key 601. Similarly, the operation key 605can be operated only when “manage by server” is selected using theoperation key 603. When “register for each user” is selected using theoperation key 602, “refer to authentication information” and “not referto authentication information” cannot be selected. That is because, when“register for each user” is selected, the user ID and the password inputby the user to login to the MFP 101 are not continuously used, but theusername and the password registered on the screen illustrated in FIG. 7are used.

FIG. 7 illustrates an example of the operation screen displayed on theoperation unit 220.

The screen illustrated in FIG. 7 is displayed when a general useroperates the MFP 101. The user can register the host name and the pathof the user's own folder (the user of A1001 in the example illustratedin FIG. 7) as information 701 and 702. Further, as information 703 and704, the authentication information (user name and password) foraccessing the folder indicated by the information 701 and 702 can beregistered. The information registered herein is used when “register foreach user” (operation key 602 illustrated in FIG. 6) is selected.

FIG. 8 is a flowchart illustrating a login operation (a series ofoperations when the user starts to use the MFP 101) performed by the MFP101. Each operation (step) in the flowchart illustrated in FIG. 8 can berealized when the CPU 211 of the MFP 101 executes the control programstored in the HDD 214.

In step S801, it is determined whether the authentication methodpre-selected by a system administrator is “keyboard authentication” or“card authentication”.

FIG. 9 illustrates an example of an operation screen displayed on theoperation unit 220 enabling the system administrator to select either“keyboard authentication” (operation key 901) or “card authentication”(operation key 902).

When a system administrator pre-selects the operation key 901, it isdetermined that the authentication method is “keyboard authentication”,and the processing proceeds to step S802 to display a screen (receptionscreen) illustrated in FIG. 10A. On the screen illustrated in FIG. 10A,the user who is going to use the MFP 101 inputs the user's user ID asinformation 1001 and the user's password as information 1002. Thisinformation can be entered by typing in alphanumeric characters andnumeral figures using a keyboard (not illustrated). The keyboard may bea hardware keyboard included in the operation unit 220 or a softwarekeyboard displayed on the operation unit 220.

When a system administrator pre-selects the operation key 902, it isdetermined that the authentication method is “card authentication”, andthe processing proceeds to step S803 to display a screen illustrated inFIG. 10B. The screen illustrated in FIG. 10B displays a messageprompting the user who is going to use the MFP 101 to hold the user's ICcard over the card reader 223.

In step S804, the user ID and the password input by the user in steps802 or the user ID read from the IC card via the card reader 223 instep S803 is transmitted to the authentication server 102 to requestuser authentication. In step S805, it is determined whether the contentnotified from the authentication server 102 is “authentication OK” or“authentication NG”. When “authentication OK” is determined (YES in stepS805), the processing proceeds to step S806 to permit the user to usethe MFP 101. When “authentication NG” is determined (NO in step S805),the processing ends.

FIG. 11 is a flowchart illustrating a series of operations performed bythe MFP 101 when the operation key 514 illustrated in FIG. 5 isoperated. Each operation (step) of the flowchart illustrated in FIG. 11can be realized when the CPU 211 of the MFP 101 executes the controlprogram stored in the HDD 214.

In step S1101, the selected folder setting method is determined. Whenthe selected folder setting method is “home folder”, the processingproceeds to step S1102, when it is “register for each user”, theprocessing proceeds to step S1108, and when it is “manage by server”,the processing proceeds to step S1112.

In step S1102, the information 610 illustrated in FIG. 6 is set as “hostname” for transmitting the file. In step S1103, it is determined whetherthe setting using the operation key 604 is “refer to authenticationinformation” or “not refer to authentication information”. If thesetting is “refer to authentication information” (YES in step S1103),the processing proceeds to step S1104. In step S1104, a combination ofthe information 620 illustrated in FIG. 6 and the information 703illustrated in FIG. 7 is set as the “path” for transmitting the file. Inthe example illustrated in FIGS. 6 and 7, “/home/tanaka” is set.

If the setting is “not to refer to authentication information” (NO instep S1103), the processing proceeds to step S1105. In step S1105, acombination of the information 620 illustrated in FIG. 6 and theinformation 1001 illustrated in FIG. 10 is set as the “path” fortransmitting the file.

In step S1106, the information 1001 illustrated in FIG. 10A is set asthe “user name” for transmitting the file. In step S1107, information1002 illustrated in FIG. 10A is set as the “password” for transmittingthe file. More specifically, in steps S1106 and S1107, the user ID andthe password input by the user to login to the MFP 101 are continuouslyused as the user name and the password for transmitting the image datain a file.

In step S1108, the information 701 illustrated in FIG. 7 is set as the“host name” for transmitting the file. In step S1109, the information702 illustrated in FIG. 7 is set as the “path” for transmitting thefile. In step S1110, the information 703 illustrated in FIG. 7 is set asthe “user name” for transmitting the file. In step S1111, theinformation 704 illustrated in FIG. 7 is set as the “password” fortransmitting the file.

In step S1112, the information 408 illustrated in FIG. 4 is set as the“host name” for transmitting the file. In step S1113, the information409 illustrated in FIG. 4 is set as the “path” for transmitting thefile.

In step S1114, it is determined whether the setting using the operationkey 605 indicates “refer to authentication information” or “not refer toauthentication information”. If the setting is “refer to authenticationinformation” (YES in step S1114), the processing proceeds to step S1110.If the setting is “not refer to authentication information” (NO in stepS1114), the processing proceeds to step S1115.

In step S1115, the information 1001 illustrated in FIG. 10A is set asthe “user name” for transmitting the file. In step S1116, theinformation 1002 illustrated in FIG. 10A is set as the “password” fortransmitting the file. More specifically, in steps S1115 and S1116, theuser ID and the password input by the user to login to the MFP 101 arecontinuously used as the user name and the password for transmitting theimage data in a file.

As described above, when either “home folder” or “manage by server” isselected and when “not refer to authentication information” is selected,the user ID and the password input by the user to login to the MFP 101are set. With this setting, the authentication information for logginginto the MFP 101 and the authentication information as the address ofthe file transmission are not required to be individually input, therebyreducing the user's works.

When either “home folder” or “manage by server” is selected and “referto authentication information” is selected, the user name and thepassword for “manage for each user” are set. With this setting, evenwhen the card authentication, in which the password cannot becontinuously used, is performed, the file can be transmitted without thenecessity of inputting the password for each login or each filetransmission.

Returning to FIG. 11, in step S1117, it is determined whether atransmission instruction (pressing start button) has been received fromthe user. When the transmission instruction has been received (YES instep S1117), the processing proceeds to step S1118, where the image onthe document is read by the scanner 222 so as to generate the imagedata. In step S1119, using the host name, the path, the user name, andthe password that are set in steps S1101 to S1116, the image data istransmitted in a file.

Next, a second exemplary embodiment will be described. The firstexemplary embodiment describes the example where an instruction isprovided for either “refer to authentication information” or “not referto authentication information” using the operation keys 604 and 605. Thesecond exemplary embodiment will describe an example where, according towhether the authentication method is “keyboard authentication” or “cardauthentication”, to refer and not to refer the authenticationinformation for “register for each user” are automatically switched.

FIG. 12 illustrates an example of an operation screen displayed on theoperation unit 220 according to the second exemplary embodiment in placeof the screen illustrated in FIG. 6. The screen illustrated in FIG. 12can be operated only by a system administrator and, when a general useroperates the MFP 101, the screen is not displayed.

In comparing the screen illustrated in FIG. 12 with screen illustratedin FIG. 6, the operation keys 604 and 605 are not displayed in FIG. 12.In other words, “refer to authentication information” and “not refer toauthentication information” cannot be selected via the screenillustrated in FIG. 12.

FIG. 13 is a flowchart illustrating a series of operations performed bythe MFP 101 when the operation key 514 illustrated in FIG. 5 isoperated. Each operation (step) of the flowchart illustrated in FIG. 13can be realized when the CPU 211 of the MFP 101 executes the controlprogram stored in the HDD 214.

The operation (steps) of FIG. 13 are identical to those of FIG. 11,except that steps 1301 and 1302 in FIG. 13 replace steps S1103 and S1114from FIG. 11. Thus only descriptions of steps 1301 and 1302 will beprovided.

In step S1301, it is determined whether the authentication method thathas been pre-selected by a system administrator is “keyboardauthentication” or “card authentication”. When the system administratorhas pre-selected the operation key 901, it is determined that theauthentication method is “keyboard authentication”, and the processingproceeds to step S1105. When the system administrator has pre-selectedthe operation key 902, it is determined that the authentication methodis “card authentication”, and the processing proceeds to step S1104.

In step S1302, it is determined whether the authentication method thathas been pre-selected by a system administrator is “keyboardauthentication” or “card authentication”. When the system administratorhas pre-selected the operation key 901, it is determined that theauthentication method is “keyboard authentication”, and the processingproceeds to step S1115. On the other hand, when the system administratorhas pre-selected the operation key 902, it is determined that theauthentication method is “card authentication”, and the processingproceeds to step S1110.

As described above, according to the second exemplary embodiment, wheneither “home folder” or “manage by server” is selected, and when“keyboard authentication” is performed, the user ID and the passwordinput by the user to login to the MFP 101 are set. With this setting,the authentication information for logging into the MFP 101 and theauthentication information as the address for the file transmission arenot required to be individually input, thereby reducing the user'sworkload.

When either “home folder” or “manage by server” is selected, and when“card authentication” is performed, the user name and the password for“manage for each user” are set. With this setting, even when the cardauthentication, in which the password cannot be continuously used, isperformed, the file can be transmitted without the necessity ofinputting the password for each login or each file transmission.

The above-described first and second exemplary embodiments provideexamples of setting authentication information used to transmit imagedata. However, setting of the authentication information as described inthe first and second exemplary embodiments can be applied to varioustypes of processing on the image data, including the transmissionthereof. For example, if the authentication information is required tostore the image data in a memory inside the image processing system, themethods described in the first and second exemplary embodiments can beapplied to the setting of the authentication information.

Embodiments can also be realized by a computer of a system or apparatusthat reads out and executes computer executable instructions recorded ona storage medium (e.g., computer-readable storage medium) to perform thefunctions of one or more of the above-described embodiment(s), and by amethod performed by the computer of the system or apparatus by, forexample, reading out and executing the computer executable instructionsfrom the storage medium to perform the functions of one or more of theabove-described embodiment(s). The computer may comprise one or more ofa central processing unit (CPU), micro processing unit (MPU), or othercircuitry, and may include a network of separate computers or separatecomputer processors. The computer executable instructions may beprovided to the computer, for example, from a network or the storagemedium. The storage medium may include, for example, one or more of ahard disk, a random-access memory (RAM), a read only memory (ROM), astorage of distributed computing systems, an optical disk (such as acompact disc (CD), digital versatile disc (DVD), or Blu-ray Disc (BD)™),a flash memory device, a memory card, and the like.

While the present invention has been described with reference toexemplary embodiments, it is to be understood that the invention is notlimited to the disclosed exemplary embodiments. The scope of thefollowing claims is to be accorded the broadest interpretation so as toencompass all modifications, equivalent structures, and functions.

This application claims priority from Japanese Patent Application No.2012-100974 filed Apr. 26, 2012, which is hereby incorporated byreference herein in its entirety.

What is claimed is:
 1. An image processing system comprising: areceiving unit configured to receive authentication information from auser; a performing unit configured to perform login of a user based onthe authentication information received by the receiving unit; anoperation key configured to set a folder which has been pre-registeredin association with the user as a transmission destination of imagedata; a transmission unit configured to transmit image data usingauthentication information to the transmission destination set byoperation of the operation key; and a selection unit configured toselect whether to set, as authentication information to be used whenaccessing the transmission destination set by operation of the operationkey, the authentication information which is received by the receivingunit or to set, as authentication information to be used when accessingthe transmission destination set by the operation key, authenticationinformation which has been pre-registered in association with the user.2. An image processing apparatus comprising: a receiving unit configuredto receive authentication information from a user; a performing unitconfigured to perform login of a user based on the authenticationinformation received by the receiving unit; an operation key configuredto set a folder which has been pre-registered in association with theuser as a transmission destination of image data; a selection unitconfigured to select whether to set, as authentication information to beused when accessing the transmission destination set by operation of theoperation key, the authentication information which is received by thereceiving unit or to set, as authentication information to be used whenaccessing the transmission destination set by operation of the operationkey, authentication information which has been pre-registered inassociation with the user.
 3. The image processing apparatus accordingto claim 2, further comprising a display unit configured to display anoperation screen for selecting whether to set the authenticationinformation which is received by the receiving unit or to setauthentication information which has been pre-registered in associationwith the user, wherein the selection unit is configured to perform theselection according to an instruction received by the operation screendisplayed by the display unit.
 4. The image processing apparatusaccording to claim 2, further comprising a setting unit configured toset, when the transmission destination of the image data is set byoperation of the operation key, authentication information according toselection by the selection unit.
 5. The image processing apparatusaccording to claim 2, wherein the transmission destination is a hostname and a path of a folder.
 6. The image processing apparatus accordingto claim 2, wherein the authentication information includes a user IDand a password.
 7. The image processing apparatus according to claim 2,wherein, in a case where the user is authenticated based onauthentication information input using a keyboard, the selection unitselects to set the authentication information which is received by thereceiving unit, and in a case where the user is authenticated based oninformation recorded in a mobile recording medium, the selection unitselects to set the authentication information which has beenpre-registered in association with the user.
 8. A method for controllingan image processing apparatus, the method comprising: receivingauthentication information from a user; performing login of a user basedon the received authentication information; setting, by operation of anoperation key, a folder which has been pre-registered in associationwith the user as a transmission destination of image data; transmittingimage data using authentication information to the transmissiondestination set by operation of the operation key; and selecting whetherto set, as authentication information to be used when accessing thedesignated transmission destination set by operation of the operationkey, the authentication information which is received by the receivingunit or to set as authentication information to be used when accessingthe transmission destination set by operation of the operation key,authentication information which has been pre-registered in associationwith the user.
 9. The method for controlling the image processingapparatus according to claim 8, further comprising displaying anoperation screen for selecting whether to set the receivedauthentication information or to set authentication information whichhas been pre-registered in association with the user, wherein theselecting is performed according to an instruction received by thedisplayed operation screen.
 10. The method for controlling the imageprocessing apparatus according to claim 8, further comprising, setting,when the transmission destination of the image data is set by operationof the operation key, authentication information according to theselection.
 11. The method for controlling the image processing apparatusaccording to claim 8, wherein the transmission destination is a hostname and a path of a folder.
 12. The method for controlling the imageprocessing apparatus according to claim 8, wherein the authenticationinformation includes a user ID and a password.
 13. The method forcontrolling the image processing apparatus according to claim 8, whereinin the selecting, in a case where the user is authenticated based on theauthentication information input using a keyboard, setting theauthentication information which is received by the receiving unit isselected, and in a case where the user is authenticated based oninformation recorded in a mobile recording medium, setting theauthentication information which has been pre-registered in associationwith the user is selected.
 14. A non-transitory computer readablestorage medium storing a program for causing a computer to execute amethod for controlling an image processing apparatus, the methodcomprising: receiving authentication information from a user; performinglogin of process of a user based on the received authenticationinformation; setting, by operation of an operation key, a folder whichhas been pre-registered in association with the user as a transmissiondestination of image data; transmitting image data using authenticationinformation to the transmission destination set by operation of theoperation key; and selecting whether to set, as authenticationinformation to be used when accessing the designated transmissiondestination set by operation of the operation key, the authenticationinformation which is received by the receiving unit or to set asauthentication information to be used when accessing the designatedtransmission destination set by operation of the operation key,authentication information which has been pre-registered in associationwith the user.