Image forming apparatus performing image formation on print data, image processing system including plurality of image forming apparatuses, print data output method executed on image forming apparatus, and print data output program product

ABSTRACT

In order to prevent leakage of confidential information, MFP includes a communication I/F to receive print data, an image forming portion to perform image formation on print data, and a CPU to prohibit the image forming portion from performing image formation on the print data before the print data is subjected to image formation by the image forming portion, when a prescribed time has passed since the print data was received or when an input of an instruction to protect the print data is accepted, and to store the print data in a storage device, and to allow the image forming portion to perform image formation on the print data in response to accepting a log-in instruction.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional of U.S. Ser. No. 11/585,808, filed onOct. 25, 2006, which is based on Japanese Patent Application No.2006-127135 filed with the Japan Patent Office on Apr. 29, 2006, theentire contents of which are hereby incorporated by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an image forming apparatus, an imageprocessing system, a print data output method, and a print data outputprogram product. More particularly, the present invention relates to animage forming apparatus performing image formation on print data, animage processing system including a plurality of image formingapparatuses, a print data output method executed on the image formingapparatus, and a print data output program product.

2. Description of the Related Art

Recently, image forming apparatuses such as printers are generally usedin such a manner that they are connected to a network. In this manner,an image forming apparatus is shared by a plurality of users. Therefore,when a user allows a computer connected to a network to transmit printdata to an image forming apparatus which is installed at a locationdistant from the computer, another user can pick up paper having animage formed thereon by the image forming apparatus before the userdoes. In order to cope with this problem, the image forming apparatusincludes a confidential print function that prevents print data fromundergoing image formation before a password received with the printdata is input. In this confidential print function, the image formingapparatus is allowed to perform image formation in the state in whichthe user who allows the computer to transmit print data is in thevicinity of the image forming apparatus, thereby preventing paper havingan image formed thereon from being examined by other people. In order toallow the image forming apparatus to do printing with this confidentialprint function set valid, it is necessary to input an instruction into acomputer to transmit a password together with print data. Thus, if auser fails to input such an instruction, print data is subjected toimage formation even in the absence of the user in the vicinity of theimage forming apparatus, and confidentiality thus cannot be preserved.

Japanese Laid-Open Patent Publication No. 6-124177 discloses a scheme ofprotecting an output of secret print data. In this scheme, an outputattribute of transmission print data stored in first storage means andsecret condition data set and input beforehand for each user arecompared with each other. Print data having an output attribute thatdoes not agree with the secret condition data is allowed to be output byprinting means while print data having an output attribute that agreeswith the secret condition data is determined as secret print data andthen prevented from being output to the printing means. The outputattribute of the secret print data and the secret condition are comparedwith each other according to an input of user password data to displayinput means, and the secret print data that agrees with the secretcondition data is allowed to be output by the printing means. In theoutput protection scheme disclosed in Japanese Laid-Open PatentPublication No. 6-123177, however, secret condition data has to be setbeforehand for each user. Moreover, print data that does not agree withthe secret condition data is not protected.

On the other hand, Japanese Laid-Open Patent Publication No. 2001-47700discloses an image processing apparatus characterized in that anunprocessed job to be processed and a job being processed, which havealready been accepted by a control portion, are stored in a removablerecording medium when a fatal failure occurs in an image input/outputapparatus, and the job stored in the recording medium is read forexecution by a control portion of another image input/output apparatushaving the recording medium attached thereto by a user. In the imageforming apparatus disclosed in Japanese Laid-Open Patent Publication No.2001-47700, without a fatal failure, a job is executed so that paper isoutput even when a user is not present in the vicinity of the imageinput/output device. Accordingly, confidentiality cannot be preserved.

SUMMARY OF THE INVENTION

The present invention is made to solve the aforementioned problem. Anobject of the present invention is to provide an image forming apparatusin which leakage of confidential information is prevented.

Another object of the present invention is to provide an image formingsystem in which leakage of confidential information is prevented.

A further object of the present invention is to provide a print dataoutput method in which leakage of confidential information is prevented.

Yet another object of the present invention is to provide a print dataoutput program product in which leakage of confidential information isprevented.

In order to solve the aforementioned problem, in accordance with anaspect of the present invention, an image forming apparatus includes: aprint data reception portion to receive print data; an image formingportion to perform image formation on print data; a prohibition portionto prohibit the image forming portion from performing image formation onthe received print data and store the received print data in a storagedevice before the received print data is subjected to image formation bythe image forming portion, when a prescribed time has passed since theprint data was received or when an input of an instruction to protectthe print data is accepted; a print instruction accepting portion toaccept an input of a print instruction; and an output portion to allowthe image forming portion to perform image formation on the stored printdata in response to accepting the input of a print instruction.

In accordance with this aspect, image formation of print data isprohibited and print data is stored in a storage device before thereceived print data is subjected to image formation when a prescribedtime has passed after the print data was received or when an input of aninstruction to protect print data is accepted. Therefore, if print datahas not yet been output when a user who gave an instruction to transmitprint data goes to an image forming apparatus believing that print datawas subjected to image formation, print data will not be subjected toimage formation even if the user thereafter moves away from the imageforming apparatus. Therefore, it is possible to prevent paper havingprint data subjected to image formation from being seen by other people.In addition, upon acceptance of an input of a print instruction, printdata is subjected to image formation, so that the user who gave aninstruction to transmit print data can pick up paper having print datasubjected to image formation when moving to the installation place ofthe image forming apparatus later. As a result, it is possible toprovide an image forming apparatus in which leakage of confidentialinformation is prevented.

In accordance with another aspect of the present invention, an imageprocessing system includes a plurality of image forming apparatuses eachconnected to a network. Each of the plurality of image formingapparatuses includes: a print data reception portion to receive printdata and user identification information for identifying a user; animage forming portion to perform image formation on print data; aprohibition portion to prohibit the image forming portion fromperforming image formation on the received print data, relate the printdata with the user identification information received together with theprint data, and store the received print data in a storage device beforethe received print data is subjected to image formation by the imageforming portion, when a prescribed time has passed since the print datawas received or when an input of an instruction to protect the printdata is accepted; an operation accepting portion to accept an input ofan operation by a user; an authentication portion to authenticate theuser identification information accepted by the operation acceptingportion; a print data obtaining portion to obtain print data relatedwith the authenticated user identification information from anotherimage forming apparatus connected via the network; and an output portionto allow the image forming portion to perform image formation on theprint data obtained by the print data obtaining portion.

In accordance with this aspect, it is possible to provide an imageprocessing system in which leakage of confidential information isprevented.

In accordance with a further aspect of the present invention, a printdata output method is executed in an image forming apparatus including astorage device and an image forming portion to perform image formationon print data. The method includes the steps of: receiving print data;prohibiting the image forming portion from performing image formation onthe received print data before the received print data is subjected toimage formation by the image forming portion, when a prescribed time haspassed since the print data was received or when an input of aninstruction to protect the print data is accepted; storing the receivedprint data into the storage device; accepting an input of a printinstruction; and allowing the image forming portion to perform imageformation on the stored print data in response to accepting the input ofa print instruction.

In accordance with this aspect, it is possible to provide a print dataoutput method in which leakage of confidential information is prevented.

In accordance with yet another aspect of the present invention, a printdata output method is executed in each of a plurality of image formingapparatuses connected to a network. Each of the plurality of imageforming apparatuses includes a storage device, and an image formingportion to perform image formation on print data. The method includesthe steps of: in inputting print data, receiving print data and useridentification information for identifying a user; prohibiting the imageforming portion from performing image formation on the received printdata before the received print data is subjected to image formation bythe image forming portion, when a prescribed time has passed since theprint data was received or when an input of an instruction to protectthe print data is accepted; and relating the print data with the useridentification information received together with the print data andstoring the received print data; and in outputting print data, acceptingan input of user identification information; authenticating the accepteduser identification information; obtaining the print data related withthe authenticated user identification information from another imageforming apparatus connected via the network; and allowing the imageforming portion to perform image formation on the obtained print data.

In accordance with this aspect, it is possible to provide a print dataoutput method in which leakage of confidential information is prevented.

In accordance with a still further aspect of the present invention, aprint data output program product is executed in an image formingapparatus including a storage device and an image forming portion toperform image formation on print data. The program product causes theimage forming apparatus to execute the steps of: receiving print data;prohibiting the image forming portion from performing image formation onthe received print data before the received print data is subjected toimage formation by the image forming portion, when a prescribed time haspassed since the print data was received or when an input of aninstruction to protect the print data is accepted; storing the receivedprint data into the storage device; accepting an input of a printinstruction; and allowing the image forming portion to perform imageformation on the stored print data in response to accepting the input ofa print instruction.

In accordance with this aspect, it is possible to provide a print dataoutput program product in which leakage of confidential information isprevented.

In accordance with a further aspect of the present invention, a printdata output program product is executed in each of a plurality of imageforming apparatuses connected to a network. Each of the plurality ofimage forming apparatuses includes a storage device, and an imageforming portion to perform image formation on print data. The programproduct causes the image forming apparatus to execute the steps of: ininputting print data, receiving print data and user identificationinformation for identifying a user; prohibiting the image formingportion from performing image formation on the received print databefore the received print data is subjected to image formation by theimage forming portion, when a prescribed time has passed since the printdata was received or when an input of an instruction to protect theprint data is accepted; and relating the print data with the useridentification information received together with the print data andstoring the received print data; and in outputting print data, acceptingan input of user identification information; authenticating the accepteduser identification information; obtaining the print data related withthe authenticated user identification information from another imageforming apparatus connected via the network; and allowing the imageforming portion to perform image formation on the obtained print data.

In accordance with this aspect, it is possible to provide a print dataoutput program product in which leakage of confidential information isprevented.

The foregoing and other objects, features, aspects and advantages of thepresent invention will become more apparent from the following detaileddescription of the present invention when taken in conjunction with theaccompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an overall schematic diagram of a image processing systemaccording to an embodiment of the present invention.

FIG. 2 is a block diagram showing an exemplary hardware configuration ofan MFP according to the present embodiment.

FIG. 3A is a flowchart illustrating an exemplary flow of an initialsetting process.

FIG. 3B is a flowchart illustrating an exemplary flow of a connectionprocess.

FIG. 4A to FIG. 4F are diagrams illustrating registered user informationand first and second user data.

FIG. 5 is a functional block diagram showing an overall function of CPUof MFP.

FIG. 6 is a flowchart illustrating an exemplary flow of a printingprocess.

FIG. 7 is a flowchart illustrating an exemplary flow of a job protectionprocess.

FIG. 8 is a diagram showing an exemplary a job management table.

FIG. 9 is a flowchart illustrating an exemplary flow of a log-inprocess.

DETAILED DESCRIPTION OF THE INVENTION

The embodiment of the present invention will be described below withreference to the drawings. In the following description, the same orcorresponding parts are denoted by the same reference characters. Theirnames and function are also the same. Thus, a detailed descriptionthereof will not be repeated.

FIG. 1 is an overall schematic diagram showing a image processing systemaccording to an embodiment of the present invention. With reference toFIG. 1, an image processing system 1 includes multi function peripherals(referred to as “MFP” hereinafter) 100, 100A, 100B, and 100C and apersonal computer (referred to as “PC” hereinafter), each connected to anetwork 2. The configuration and the function of MFP 100, 100A, 100B,and 100C are the same, and therefore MFP 100 will be described here asan example unless otherwise noted.

MFP (Multi Function Peripheral) 100 includes a scanner for scanning asheet of original manuscript, an image forming portion for forming animage on recording media such as a sheet of paper based on image data,and a facsimile, and has an image scanning function, a copying function,and a facsimile transmission and reception function. Moreover, althoughMFP 100 is described as an example in the this embodiment, MFP 100 canbe replaced by, for instance, a printer, a facsimile, and the likeincluding an image forming function.

Network 2 is a local area network (LAN) and the form of connection canbe fixed-line or wireless. In addition, network 2 is not limited to aLAN and can be a wide area network (WAN), the Internet, and so on. MFPs100, 100A, 100B, and 100C can communicate with each other via network 2.In addition, MFPs 100, 100A, 100B, 100C each can communicate with PC 200connected via network 2.

PC 200 is a general computer. The hardware configuration and thefunction of PC 200 are well known and therefore description thereof willnot be repeated here. PC 200 at least has a printer driver programinstalled therein for controlling each of MFPs 100, 100A, 100B, 100C. Atleast user identification information for identifying a user of PC 200is registered in the printer driver program. When the printer driverprogram is executed in PC 200, PC 200 transmit to any of MFPs 100, 100A,100B, 100C a print job including data generated by executing anapplication program different from the printer driver program. The printjob includes print data and job information.

Print data is data produced by converting the data generated byexecuting an application program into print data described, for example,in PDL (Page Description Language) such as PCL (Printer ControlLanguage). Job information is data of image formation conditions and thelike, such as user identification information registered in the printerdriver program and number of copies, described for example in PJL(Printer Job Language). For example, if PC 200 transmits a print job toMFP 100, MFP 100 performs image formation on print data according to jobinformation in the print job.

It is noted that in the following description, PC 200 transmits a printjob to MFP 100 by way of example, unless otherwise specified. In thiscase, MFP 100 receives a print job from PC 200 to perform imageformation on print data included in the print job according to jobinformation.

It is noted that FIG. 1 shows one PC 200. However, the number of PCs isnot limited and one or more PCs may be connected to network 2.

FIG. 2 is a block diagram showing an exemplary hardware configuration ofMFP 100 according to this embodiment. With reference to FIG. 2, MFP 100includes, each connected to a bus 120, a central processing unit (CPU)101, a ROM (Read Only Memory) 103 that stores a program or the like tobe executed by CPU 101, a RAM (Random Access Memory) 105 for loading aprogram to be executed and for storing data during execution of theprogram, a hard disk drive (HDD) 107 for storing data in a nonvolatilemanner, a card interface (I/F) 109 to which a flash memory 108 isattached, a communication I/F 111 for connecting MFP 100 to network 2, ascanner 113, an image forming portion 115, a facsimile (FAX) 117, and anoperation panel 119 as an interface with a user.

CPU 101 loads into RAM 105 and executes a print data output programstored in flash memory 108 attached to card I/F 109. Moreover, theprogram executed by CPU 101 is not limited to the print data outputprogram stored in flash memory 108, and a program stored in an EEPROM(Electrically Erasable/Programmable Read Only Memory) connectedadditionally to CPU 101 can be loaded into RAM 105 and be executed. Theuse of an EEPROM makes it possible to rewrite or additionally write aprint data output program. Thus, another computer connected to network 2can rewrite the print data output program stored in the EEPROM of MFP100 or additionally write a new print data output program into theEEPROM. Furthermore, MFP 100 can download a print data output programfrom another computer connected to network 2 and store the print dataoutput program in an EEPROM.

Moreover, these programs may not always be read from flash memory 108for execution. The program stored in ROM 103 may be read. Furthermore,by saving a print data output program stored in the flash memory intoHDD 107 first, the program can be loaded from HDD 107 into RAM 105 andbe executed. The program referred to here not only includes a programdirectly executable by CPU 101, but also a source program, a compressedprogram, an encrypted program, and the like.

Image forming portion 115 is a laser printer, an ink jet printer, or thelike, and makes image data visible on recording media such as a sheet ofpaper. Scanner 113 includes a photoelectric transducer such as a CCD(Charge Coupled Device) and the like, and optically reads a sheet oforiginal manuscript and outputs electronic data that is the image data.FAX 117 transmits and receives the image data according to the facsimileprotocol via Public Switched Telephone Network (PSTN).

Operation panel 119 includes an input portion 119A and a display portion119B. Input portion 119A is an input device such as a touch panel, akeyboard, or a mouse for accepting an input of operation by a user ofMFP 100. Display portion 119B is a liquid crystal display or an organicEL (Electro-Luminescence) display panel. When using a touch panel formedof a transparent member for input portion 119A, the touch panel isprovided to overlap display portion 119B so that an instruction to abutton displayed on display portion 119B can be detected. Thus, input ofa variety of operations becomes possible.

Communication I/F 111 is a communication interface for connecting MFP100 to network 2. MFP 100 can communicate with PC 200 and other MFPs100A, 100B, 100C. Although MFP 100 is connected to other MFPs 100A,100B, and 100C via network 2, it can also be connected directly using aserial interface or a parallel interface. Communication I/F 111 uses aninterface that corresponds to the form of connection between MFP 100 andother MFPs 100A, 100B, and 100C.

The input of data into MFP 100 includes the following cases: (1) whenscanner 113 scans a sheet of original manuscript and the image data isinput; (2) when image data is received from another computer or fromother MFPs 100A, 100B, and 100C connected to network 2 via communicationI/F; (3) when image data stored in flash memory 108 is read via cardI/F; and (4) when facsimile data is received in FAX 117.

The output of data from MFP 100 includes the following cases: (1) datais made visible on recording media such as a sheet of paper by imageforming portion 115; (2) data is transmitted to another computer or toother MFPs 100A, 100B, and 100C connected to the network viacommunication I/F 111; (3) data is stored in flash memory 108; (4) datais output as facsimile data by FAX 117; and (5) data is displayed ondisplay portion 119B.

Moreover, a storage medium that stores a print data output program isnot limited to flash memory 108 and can also be media such as a flexibledisk, a cassette tape, an optical disk (CD-ROM (Compact Disc-ROM)/MO(Magnetic Optical Disc)/MD (Mini Disc)/DVD (Digital Versatile Disc)), anIC card (including a memory card), an optical card, and a semiconductormemory such as a mask ROM, an EPROM (Erasable Programmable ROM), anEEPROM (Electronically Erasable and Programmable ROM).

In image processing system 1 according to this embodiment, for each ofMFPs 100, 100A, 100B, and 100C, a user who mainly uses the apparatus isfixed. Thus, each of MFPs 100, 100A, 100B, and 100C stores registereduser information in order to register the user who mainly uses it. Theregistered user information, which will be described later, includes atleast user identification information for identifying a user and apassword as authentication information. The name of the user can be usedas the user identification information. Here, based on the user, any oneor more of MFPs 100, 100A, 100B, and 100C which store the registereduser information of that user are referred to as “home terminals.” Forinstance, if the registered user information of the user “David” isstored in MFP 100, a home terminal of the user “David” is MFP 100.Moreover, registered user information is stored in each of MFPs 100,100A, 100B, and 100C to define a user who mainly uses the apparatus butnot to prohibit the user whose registered user information is not storedtherein from using it.

Furthermore, each of MFPs 100, 100A, 100B, 100C store user dataincluding registered user information stored in all the other MPS suchthat a user having his registered user information stored in a hometerminal can log in a terminal other than the home terminal. In the userdata, user identification information is related with apparatusidentification information of a home terminal.

Here, a process of generating user data will be described. It is assumedthat MFP 100 is newly connected to network 2 where MFPs 100A, 100B, and100C have already been connected network 2. For MFP 100, it is necessaryto set apparatus identification information for identifying MFP 100 andthe above-described registered user information. When the apparatusidentification information and the registered user information are setfor MFP 100, MFP 100 transmits the apparatus identification informationand the registered user information to other MFPs 100A, 100B, and 100C.Thus, image processing system 1 configured with MFPs 100, 100A, 100B,and 100C is formed.

FIG. 3A is a flowchart illustrating an exemplary flow of an initialsetting process. The initial setting process is executed in MFP 100 whenMFP 100 is newly connected to network 2. FIG. 3B is a flowchartillustrating an exemplary flow of a connection process. The connectionprocess is executed in each of MFPs 100A, 100B, and 100C alreadyconnected to network 2 when MFP 100 is newly connected to network 2. Theinitial setting process and the connection process are implemented byhaving an initial setting program and a connection program that arestored in flash memory 108 loaded into RAM 105 and executed by CPU 101,in each of MFPs 100, 100A, 100B, and 100C. The initial setting programand the connection program are a part of the print data output program.

With reference to FIG. 3A, terminal information is registered in MFP 100(step S01). The terminal information is accepted by MFP 100 andregistered by the user inputting the terminal information to operationpanel 119 according to a terminal registration window appearing ondisplay portion 119B. The terminal information at least includesapparatus identification information for identifying MFP 100. Theapparatus identification information is preferably location informationassigned to MFP 100 in network 2, and is here an IP (Internet Protocol)address. The terminal information can include information showing thelocation where MFP 100 is disposed.

Next, registered user information of a user who uses MFP 100 as a hometerminal is input into MFP 100 (step S02). The registered userinformation is accepted by MFP 100 by the user inputting the registereduser information to operation panel 119 according to a registered userinformation input window appearing on display portion 119B. When aplurality of users use MFP 100 as a home terminal, registered userinformation of each of the plurality of users is input. The registereduser information at least includes user identification information foridentifying the user. The user identification information needs only tobe unique information such as a user ID including characters or symbolsand a name of the user. Here, a user name is used as the useridentification information. The registered user information can alsoinclude accompanying information and authentication information inaddition to the user identification information.

The user inputs the terminal information, and upon completion of theuser registration process, the user gives an instruction to inputportion 119A on a completion button displayed on display portion 119B,so that it is detected in MFP 100 that the initial setting has beencompleted. The registration of the terminal information in step S01 andthe input of the registered user information in step S02 are usuallyperformed by the administrator of the terminal.

Then, it is determined whether the initial setting is completed or not(step S03). If the initial setting is completed, the process proceeds tostep S04, and if it is not completed, the process goes back to step S01.In step S04, the terminal information and the registered userinformation for which initial setting has already been performed aretransmitted to the terminals in the same group. The same group refers toa set of terminals which form image processing system 1. Here, MFPs 100,100A, 100B, and 100C connected to network 2 are considered to be of thesame group. Thus, by transmitting an inquiry by broadcast on network 2,MFP 100 receives the IP addresses of terminals respectively transmittedback from MFPs 100A, 100B, and 100C in the same group in response to theinquiry. In this manner, the IP addresses of the terminals that form thesame group are obtained. Moreover, by grouping, a plurality of terminalsconnected to network 2 can be divided into different groups. Forinstance, MFPs 100 and 100A can form one group, while MFPs 100B and 100Ccan form another group. Such grouping is set by a user. Morespecifically, as described above, MFP 100 receives the respective IPaddresses of MFPs 100A, 100B, and 100C connected to network 2 anddetects MFPs 100A, 100B, and 100C, and the user designates which of MFPs100A, 100B, and 100C should be in the same group as MFP 100, whereby anapparatus to be included in the group is specified.

MFP 100 transmits terminal information and registered user informationto one terminal chosen from MFPs 100A, 100B, and 100C set as the samegroup. Here, MFP 100A is selected, and the terminal information and theregistered user information of MFP 100 are transmitted from MFP 100 toMFP 100A, by way of example.

Now, with reference to FIG. 3B, MFP 100A receives the terminalinformation and the registered user information of MFP 100 transmittedfrom MFP 100 (step S11). In response to this reception, MFP 100Atransmits to MFP 100 the terminal information and the registered userinformation stored in HDD 107 of MFP 100A (step S12). In other words,the connection process is a process performed on condition that arequest is received from MFP 100 that performs the initial settingprocess. In the next step S13, user data is generated based on theterminal information and the registered user information of MFP 100received in step S11, and the generated user data is added to user dataalready stored in HDD 107.

Going back to FIG. 3A, MFP 100 receives the terminal information and theregistered user information of MFP 100A transmitted from MFP 100A (stepS05). Then, it is determined whether or not a terminal to which theterminal information and the registered user information have not yetbeen transmitted exists among the terminals of the same group (stepS06). If such a terminal exists, that terminal is selected and theprocess goes back to step S04, but if not, the process proceeds to stepS07. Here, since the terminal information and the registered userinformation have not yet been transmitted to MFPs 100B and 100C, eitherof these two is selected and the process goes back to step S04. Thus,MFP 100 transmits the terminal information and the registered userinformation of MFP 100 to the terminals of the same group one by one(step S04), and receives from each terminal the terminal information andthe registered user information of that terminal (step S05). Moreover,although, here, the terminals of the same group are selected one by oneand the terminal information and the registered user information aretransmitted accordingly, the terminal information and the registereduser information can be transmitted by broadcast, and the terminalinformation and the registered user information stored in MFPs 100A,100B, and 100C can be received from MFPs 100A, 100B, and 100C,respectively.

In step S07, it is determined whether or not the registered userinformation of the apparatus itself is to be used for the user datageneration. This determination can be based on a selection made by auser, or it can be predetermined. If it is determined that theregistered user information of the apparatus itself is to be used, theprocess proceeds to step S08, and if it is determined that it is not tobe used, step S08 is skipped and the process proceeds to step S09. Instep S08, the registered user information stored in MFP 100 is read.Then, in step S09, the user data is generated from the terminalinformation and the registered user information. If step S08 is skipped,user data is generated from the registered user information and theterminal information received from each of terminal MFPs 100A, 100B,100C. If step S08 is executed, user data is generated from theregistered user information received from each of terminal MFPs 100A,100B, 100C and the registered user information stored in MFP 100 and theterminal information of each of MFPs 100, 100A, 100B, 100C. The userdata includes the terminal information and the registered userinformation. Moreover, although the user data includes the terminalinformation and the registered user information in this embodiment, theuser data needs only to include at least the registered userinformation. Here, the user data generated when MFP 100 determines thatthe registered user information of its own is used in step S07 isreferred to as first user data, and the user data generated when MFP 100determines that the registered user information of its own is not usedin step S07 is referred to as second user data. Then, the generated userdata is stored in HDD 107.

When the first user data is generated in all of MFPs 100, 100A, 100B,and 100C, all of MFPs 100, 100A, 100B, 100C store the same user data. Onthe other hand, when MFP 100A generates the second user data, thatsecond user data includes user data in which terminal information ofMFPs 100, 100B, 100C are related with the registered user informationstored in MFPs 100, 100B, 100C, respectively. When MFP 100B generatesthe second user data, that second user data includes user data in whichterminal information of MFPs 100, 100A, 100C are related with theregistered user information stored in MFPs 100, 100A, 100C,respectively. When MFP 100C generates the second user data, that seconduser data includes user data in which terminal information of MFPs 100,100A, 100B are related with the registered user information stored inMFPs 100, 100A, 100B, respectively.

Moreover, here, while the terminal information registration process andthe registered user information input process are performed in theinitial setting process executed in MFP 100, a process similar to thisinitial setting process is also executed in the case where MFP 100 hasalready been connected to network 2 and a user is to be added. In such acase, however, the terminal information registration process in step S01is not required.

In addition, the initial setting process can be performed not only wheneach of MFPs 100, 100A, 100B, and 100C is connected to network 2 butalso after the power is turned on in each of MFPs 100, 100A, 100B, and100C, or at prescribed time intervals. For instance, when a user isnewly registered in MFP 100, the registered user information of thenewly registered user is transmitted to other MFPs 100A, 100B, 100C sothat the latest user data is stored in other MFPs 100A, 100B, 100C. Inthis case, without executing steps S01 and S03 of the initial settingprocess shown in FIG. 3A, MFP 100 performs the registered userinformation input process in step S02. Accordingly, MFP 100 obtains theregistered user information of the user newly registered in any otherMFP 100A, 100B, 100C, conversely, in order to store the latest user datain MFP 100. In this case, without executing the process in steps S01 toS03 of the initial setting process shown in FIG. 3A, MFP 100 executes aprocess of requesting transmission of the registered user informationfrom other MFPs 100A, 100B, 100C. This transmission request for theregistered user information at least includes apparatus identificationinformation. In response to this transmission request, each of otherMFPs 100A, 100B, and 100C executes the connection process shown in FIG.3B, and in step S11 in response to the transmission request beingreceived, transmits the registered user information stored in its HDD107 to MFP 100 that transmitted the transmission request. Thus, evenwhen the registered user information stored in HDDs 107 of other MFPs100A, 100B, and 100C is altered, user data will be generated from thealtered registered user information and stored in HDD 107. In this case,each of MFPs 100A, 100B, 100C needs not execute step S13 in theconnection process.

FIGS. 4A to 4F are diagrams illustrating the registered user informationand the first and second user data. FIG. 4A is a diagram showing anexample of registered user information stored in MFP 100, FIG. 4B is adiagram showing an example of registered user information stored in MFP100A, FIG. 4C is a diagram showing an example of registered userinformation stored in MFP 100B, and FIG. 4D is a diagram showing anexample of registered user information stored in MFP 100C. Theregistered user information includes user identification information,accompanying information, and authentication information. Theaccompanying information is the information related to a user, such asthe name of the division the user belongs to, an email address assignedto that user, face image data obtained by capturing the face of thatuser, and so on. The authentication information is the information usedfor authentication of the user at log-in, and here, a password is used.It is also possible to use the face image data as the authenticationinformation. When biometrics authentication is used, a fingerprint,sound spectrogram, iris, vein pattern, and the like are used forauthentication information.

Furthermore, FIG. 4E is a diagram showing an example of first user data,and FIG. 4F is a diagram showing an example of second user data storedin MFP 100A. The first user data or the second user data is generatedand stored in each of MFPs 100, 100A, 100B, 100C when the initialsetting process shown in FIG. 3A is performed in MFP 100 and theconnection process shown in FIG. 3B is performed in each of MFPs 100A,100B, 100C. The first and second user data includes a number, registereduser information, apparatus identification information of a hometerminal, and the location where the home terminal is disposed. The userdata needs only to include at least the user identification informationand the apparatus identification information of a home terminal.

In this manner, when the initial setting process is executed in MFP 100,in MFPs 100, 100A, 100B, and 100C set to be of the same group, the samefirst user data is generated and stored, or second user data includingall of the registered user information of other terminals of the samegroup is generated. Thus, image processing system 1 constructed by MFPs100, 100A, 100B, and 100C is formed. When image processing system 1 isformed, the user who uses one of MFPs 100, 100A, 100B, and 100C as ahome terminal can be specified based on the user data. Therefore, a userwhose home terminal is any of MFPs 100, 100A, 100B, 100C inputs useridentification information and a password in any of MFPs 100, 100A,100B, 100C, so that that MFP performs authentication using user data andpermits log-in.

FIG. 5 is a functional block diagram showing an overall function of CPUof MFP. With reference to FIG. 5, CPU 101 includes a print job acceptingportion 151 accepting a print job, a print setting informationinterpretation portion 152 interpreting print setting information basedon job information included in a print job, a print execution portion153 allowing image formation portion 115 to perform image formation onprint data included in a print job according to print settinginformation, a prohibition portion 154 prohibiting image formationportion 115 from performing image formation on print data, a user typedetermination portion 155 determining a user type based on jobinformation included in a print job, a jot storing portion 156temporarily storing a print job, a password generation portion 158generating a password, a password notification portion 159 fortransmitting a password to an apparatus that transmitted a print job, abox management portion 157 for managing a box formed in HDD 107, and apanel control portion 160 for controlling operation panel 119.

When the communication I/F receives print data and job information fromPC 200, print job accepting portion 151 accepts the print data and thejob information from the communication I/F. Print job accepting portion151 outputs the accepted print data and job information to print settinginformation interpretation portion 152 and outputs user identificationinformation included in the job information to user type determinationportion 155. If user identification information is not included in thejob information, user identification information is not output to usertype determination portion 155.

Print setting information interpretation portion 152 interprets printdata and job information to generate a print job including print dataand a print condition and store them in job storing portion 156. Here, aprint job stored in job storing portion 156 is referred to as a waitingjob. Print execution portion 153 reads a waiting job stored in jobstoring portion 156 for execution. Specifically, image formation portion115 is controlled such that print data is subjected to image formationaccording to a print condition. Print execution portion 153 does notread a waiting job while image formation portion 115 cannot be drivendue to a trouble, while image formation portion 115 cannot be driven dueto an error, or while a previous print job is being executed. Therefore,if a new print job is generated by print setting informationinterpretation portion 152 while image formation portion 115 cannot bedriven due to a trouble, while image formation portion 115 cannot bedriven due to an error, or while a previous print job is being executed,that print job is additionally stored in job storing portion 156. Atrouble is a failure that cannot be repaired by the user of MFP 100,such as a damage on a photoconductive drum and a damage on a transferroller. An error includes an event from which recovery can be made bythe user of MFP 100, such as paper-out, exhaustion of consumablesincluding toner shortage, and paper jam. If a plurality of waiting jobsare stored in job storing portion 156, print execution portion 153 readsand executes waiting jobs in order of storage.

Prohibition portion 154 includes a trouble detection portion 161, anelapsed time management portion 162, and a protection instructionaccepting portion 163. Trouble detection portion 161 detects a troublein MFP 100. Upon detection of a trouble in MFP 100, trouble detectionportion 161 outputs to job storing portion 156 a signal prohibitingexecution of all the waiting jobs stored therein. This is because in theevent of a trouble, print execution portion 153 cannot execute a job forimage formation.

Elapsed time management portion 162 counts the time elapsed since printdata was accepted for each waiting job corresponding to that print data.If the elapsed time exceeds a predetermined threshold value, elapsedtime management portion 162 outputs to job storing portion 156 jobidentification information for identifying a waiting job for whichelapsed time exceeds the threshold value and a signal prohibitingexecution of that waiting job. This aims to prevent such a waiting jobfrom being subjected to image formation that is not executed even when aprescribed time has passed since print data was accepted, so that otherpeople cannot see paper having an image of print data formed thereon.The threshold value is set in MFP 100 by an administrator. It is notedthat the threshold value may be included in job information and thethreshold value may vary among waiting jobs. In this case, the user ofPC 200 who gives an instruction to transmit print data can define athreshold value.

When job identification information and a protection instruction arereceived from panel control portion 160 or communication I/F 111,protection instruction accepting portion 163 outputs to job storingportion 156 the job identification information and a signal prohibitingexecution of a waiting job. When an instruction to display a list ofwaiting jobs is input to input portion 119A, panel control portion 160displays job identification information for identifying each of all thewaiting jobs stored in job storing portion 156 on display portion 119B.The job identification information includes a job number, useridentification information of the user who transmitted a job, the timeat which the job is accepted, and the like. When designation of jobidentification information and a protection instruction are input toinput portion 119A, protection instruction accepting portion 163 acceptsthe designated job identification information and the protectioninstruction from input portion 119A. If MFP 100 is remotely operatedfrom PC 200, panel control portion 160 transmits the same window asappearing on display portion 119B to PC 200 through communication I/F111 and receives designation of job identification information and aprotection instruction from PC 200 through communication I/F 111,similarly to when they are input to input portion 119A. When jobidentification information and a protection instruction are received bycommunication I/F 111, protection instruction accepting portion 163accepts the job identification information and the protectioninstruction from communication I/F 111.

If user type determination portion 155 accepts user identificationinformation from print job accepting portion 151, it outputs that useridentification information to job storing portion 156. If user typedetermination portion 155 accepts no user identification information, itoutputs user identification information indicating a guest user to jobstoring portion 156.

Job storing portion 156 relates a print job output by print settinginformation interpretation portion 152 with user identificationinformation input from user type determination portion 155 and storesthe job as a waiting job. When a signal prohibiting execution of awaiting job is input from prohibition portion 154, job storing portion156 outputs a set of the stored waiting job and user identificationinformation to box management portion 157. Job storing portion 156outputs all the sets of waiting job and user identification informationto box management portion 157 when a signal prohibiting execution of allthe waiting jobs is input from prohibition portion 154. If jobidentification information and a signal prohibiting execution of awaiting job are input from prohibition portion 154, job storing portion156 outputs a set of waiting job specified by that job identificationinformation and user identification information to box managementportion 157. In outputting a waiting job to box management portion 157,job storing portion 156 outputs a set of a waiting job and useridentification information as well as a password to box managementportion 157, if the waiting job is related with user identificationinformation of a guest user. Job storing portion 156 asks passwordgeneration portion 158 to generate a password to obtain a password.

When asked by job storing portion 156 to generate a password, passwordgeneration portion 158 generates a password and outputs the generatedpassword to job storing portion 156 and password notification portion159.

Upon input of a password from password generation portion 158, passwordnotification portion 159 transmits a set of job identificationinformation for identifying a waiting job and the password to theapparatus that transmitted print data included in the waiting job. Thewaiting job is one of the waiting jobs stored by job storing portion 156which is to be transmitted to box management portion 157. At the time ofreception of a print job, print job accepting portion 151 obtainsapparatus identification information for identifying the party at theother end, for example, an IP address, job storing portion 156 storesthe IP address and the waiting job in relation with each other, andpassword notification portion 159 obtains the apparatus identificationinformation of the apparatus that transmitted the waiting job from jobstoring portion 156.

If the accepted user identification information indicates a guest user,user authentication portion 173 does not authenticate the useridentification information. If user identification information is notauthenticated by user authentication portion 173, it is handled as aguest user by box management portion 157. Here, the authenticated useridentification information is called authenticated user. Furthermore, ofthe authenticated users, the user whose registered user information,including user identification information, is stored in HDD 107 isspecifically referred to as a registered user.

HDD 107 includes a personal storage area allocated for each user and ashared storage area allocated for a guest user. In the following, thepersonal storage area is referred to as a personal box and the sharedstorage area is referred to as a confidential box. Here, since useridentification information “David” is registered in the registered userinformation in MFP 100, a personal box allocated to user identificationinformation “David” is provided in HDD 107. Box management portion 157permits access to the personal box allocated for user identificationinformation “David” on condition that user identification information“David” is authenticated by user authentication portion 173. Access to apersonal box is made by an operation input to operation panel 119 or bya remote operation from PC 200 through communication I/F 111. Therefore,a personal box can be accessed based on an operation by theauthenticated user authenticated by user authentication portion 173.

Upon input of a set of a waiting job and user identification informationfrom job storing portion 156, box management portion 157 stores thewaiting job in the personal box allocated to user identificationinformation in HDD 107, if registered user information including thatuser identification information is stored in HDD 107. If registered userinformation including user identification information is not stored inHDD 107, a home terminal is specified based on the user data includingthe user identification information, and the waiting job and useridentification information are transmitted to that home terminal. At thehome terminal receiving the waiting job and the user identificationinformation, the waiting job is stored in a personal box related withthe received user identification information. It is noted that ifregistered user information including user identification information isnot stored, the similar process as for a guest user, which will bedescribed below, may be performed without transmitting the waiting joband the user identification information to the home terminal.

Upon input of a set of a waiting job, user identification information ofuser identification information of a guest user and a password from jobstoring portion 156, box management portion 157 relates the waiting joband the password with each other and stores the waiting job in theconfidential box provided in HDD 107. Box management portion 157 permitsa guest user not subjected to user authentication to access to theconfidential box in HDD 107. Here, if a waiting job stored in theconfidential box is related with a password, access to that waiting jobis permitted on condition that the same password as that password isinput to password accepting portion 172.

Furthermore, box management portion 157 deletes a waiting job stored ina personal box if the same waiting job as the waiting job stored in thepersonal box is executed by print execution portion 153. This preventsthe same job from being executed many times.

FIG. 6 is a flowchart illustrating an exemplary flow of a printingprocess. The printing process is executed by CPU 101 of MFP 100executing the print data output program. With reference to FIG. 6, CPU101 determines whether or not print data is received (step S21). Thestand-by state continues until print data is received (NO in step S21).If print data is received, the process proceeds to step S22 (YES in stepS22). More specifically, the printing process is a process executed oncondition that print data is received. In step S22, a print job isgenerated based on the received print data and the job informationreceived therewith, and that print job is added to waiting jobs.Specifically, the print job is stored in job storing portion 156 as awaiting job.

Then, the timer is started (step S23). This timer counts the elapsedtime since reception of print data. The timer is provided for eachwaiting job, and if a plurality of waiting jobs exist, the elapsed timessince reception of print jobs are counted by a plurality of timers.Then, the elapsed time counted by the timer is displayed on displayportion 119B (step S24). Thus, the user of MFP 100 can be notified ofthe elapsed time for each waiting job during stand-by. It is noted thatthe elapsed time may be transmitted to PC 200 so that the elapsed timeis displayed on PC 200.

In step S25, it is detected whether or not any trouble occurs. If atrouble is detected, the process proceeds to step S33, and if notdetected, the process proceeds to step S26. In step S26, it isdetermined whether or not the elapsed time counted by the timer exceedsa prescribed time. If the elapsed time exceeds it, the process proceedsto step S33, and if not exceeding, the process proceeds to step S27. Instep S27, it is determined whether or not a protection instruction isaccepted. When a user operates operation panel 119 to input designationof a waiting job and a protection instruction, the protectioninstruction is accepted. If the protection instruction is accepted, theprocess proceeds to step S33, and if not, the process proceeds to stepS28.

In step S28, it is determined whether or not execution of a waiting jobis completed. If the waiting job is completed, the process proceeds tostep S29, and if not completed, the process returns to step S25.

In step S29, it is determined whether or not the user who transmittedprint data is a registered user. If registered user informationincluding user identification information included in the jobinformation received with the print data is stored in HDD 107, the useris determined as a registered user, and if not, it is determined thatthe user is not a registered user. If the user who transmitted a printjob is a registered user, the process proceeds to step S30, and if not,the process proceeds to step S32. In step S30, it is determined whetheror not an instant execution job is stored in the personal box allocatedfor the user who transmitted the print job. If an instant execution jobis stored, the process proceeds to step S31, and if not, step S31 isskipped and the process proceeds to step S32. The instant execution job,which will be described later, is a waiting job stored in a personal boxupon execution of a job protection process as described later. In stepS32, display of the elapsed time, which was started in step S24, isended, and the process then ends.

On the other hand, in step S33, a job protection process is executed,and the process proceeds to step S34. In step S34, the waiting jobstored in job storing portion 156 is deleted. This prohibits the waitingjob from being subjected to image formation. This aims to prevent awaiting job from being subjected to image formation without the userbeing aware of it.

The process proceeds to step S33 in any of the following cases: if atrouble occurs before print data is subjected to image formation; if aprescribed time has passed since print data was received; and if a useroperates operation panel 119 to input a protection instruction. Time issometimes required between transmission of print data and execution of ajob generated from that print data. In such a case, a user who gives aninstruction to perform image formation on print data cannot pick up theoutput paper when moving to the installation place of MFP 100 to pick upthe output paper. The instruction to print data cannot be changed sinceit has already been issued. However, the paper having print datasubjected to image formation can be prevented from being seen by otherpeople since the job is protected in step S33.

FIG. 7 is a flowchart illustrating an exemplary flow of a job protectionprocess. The job protection process is a process executed in step S33 ofFIG. 6. With reference to FIG. 7, it is determined whether or not theuser who transmitted a print job is a registered user (step S41). If theuser who transmitted a print job is a registered user, the processproceeds to step S42, and if not, the process proceeds to step S43. Instep S42, the waiting job is stored as an instant execution job in apersonal box, and then the process returns to the printing process.

Print data is stored as an instant execution job rather than as a normaljob for the following reasons. Specifically, this print job should beprotected in the circumstance in which confidentiality is not assured,although an instruction of printing has already been issued. Then, whenthe user operates an apparatus next time, specifically, when the useroperates the operation panel to input user identification information,is authenticated, and then logs in, the previous print instruction isvalid even without a print instruction operation, assuming thatconfidentiality is assured. Therefore, the operation procedure for theuser is simplified with increased convenience. In order to differentiatean instant execution job from a normal job, a variety of methods may beemployed. For example, such information is described in job information,a flag is set, or a mark as an instant execution job is provided.

FIG. 8 is a diagram showing a job management table stored in a personalbox by way of example. With reference to FIG. 8, print data is stored inassociation with a job number, and managed as job management informationthereof are owner information such as user identificationinformation/password, the accepting date and time at which it is storedin a personal box, job information indicating job conditions, andinformation indicating whether or not it is an instant execution job.Here, if print data is stored as an instant execution job, * mark is putin the field of the instant execution job of the job managementinformation. When the user operates the operation panel to log in theapparatus next time, the waiting job with this * mark is searched for,and if the corresponding one exists, it is read and printing isautomatically done.

Returning to FIG. 7, in step S42, the personal box storing an instantexecution job is a personal box allocated in HDD 107 for the user whotransmitted print data. In other words, it is a personal box allocatedbeforehand for user identification information included in the jobinformation received together with print data. Since a waiting job isstored in a personal box, it is possible to prevent print data frombeing subjected to image formation before the user who gave aninstruction of printing is aware, and to make print data ready for imageformation as desired by the user. In addition, since a password isrequired to access a waiting job stored in a personal box, it ispossible to prevent print data from being seen by other people.

In step S43, it is determined whether or not the user who transmitted aprint job is an authenticated user. If the user who transmitted printdata is an authenticated user, the process proceeds to step S44, and ifnot, the process proceeds to step S45. Specifically, if there existsuser data including user identification information included in the jobinformation received together with the print data, the user isdetermined as an authenticated user. If not, it is determined that theuser is not an authenticated user. Here, a user other than a registereduser is determined as an authenticated user. In other words, if the userwho transmitted print data is an authenticated user other than aregistered user, the process proceeds to step S44. Instead, if the useris a guest user, the process proceeds to step S45.

In step S44, a waiting job and user identification information aretransmitted to a home terminal. A home terminal is specified based onuser data including user identification information included in the jobinformation received together with the print data, so that the waitingjob and the user identification information are transmitted to that hometerminal. At the home terminal receiving the waiting job and the useridentification information, that waiting job is stored as an instantexecution job in a personal box allocated in HDD 107 for the receiveduser identification information. Accordingly, it is possible to preventprint data from being subjected to image formation before the user whogave an instruction of printing becomes aware and to make print dataready for image formation as desired by a user.

In step S45, a password is generated. A password may be, for example, aplurality of character strings which are arbitrarily extracted fromalphanumerics. Then, the waiting job is related with the generatedpassword (step S46), and the waiting job is then stored as aconfidential job in the confidential box (step S47). Accordingly, it ispossible to prevent print data from being subjected to image formationbefore the user who gave an instruction of printing becomes aware, andto make print data ready for printing as desired by the user. Althoughuser authentication is not required to access the confidential box, apassword is required to access a waiting job as the waiting job isstored in relation with the password. Therefore, the user who can accessto the waiting job can be limited to the one who knows the password.

Therefore, the generated password is transmitted to the apparatus thattransmitted print data (step S48), and the process returns to theprinting process. When print data is received, the IP (InternetProtocol) address of the apparatus that transmitted it is received, sothat the password can be transmitted to that IP address. Therefore, theuser who gave an instruction to transmit print data can be notified of apassword for execution of a confidential job.

FIG. 9 is a flowchart illustrating an exemplary flow of a log-inprocess. The log-in process is a process executed by CPU 101 of MFP 100executing the print data output program. With reference to FIG. 9, CPU101 determines whether or not a log-in instruction is accepted (stepS51). A log-in window for accepting inputs of user identificationinformation and a password appears on display portion 119B, and whenuser identification information and a password are input through inputportion 119A, it is determined that a log-in instruction is accepted.Furthermore, when user identification information and a password arereceived through a remote operation from PC 200, it is determined that alog-in instruction is accepted. Then, it is determined whether or notthe user identification information indicates a guest user (step S52),if a guest user is indicated, the process proceeds to step S64, and ifnot a guest user, the process proceeds to step S53. In step S53, useridentification information is authenticated and it is determined whetheror not the authentication is successful. If the authentication issuccessful, the process proceeds to step S54. If the authentication isfailed, the process returns to step S51. In step S54, it is determinedwhether or not the log-in user has logged in to a home terminal.Specifically, if registered user data including the user identificationinformation is stored in HDD 107, it is determined that the log-in useris a registered user who has logged in to the home terminal, and theprocess proceeds to step S55. If not, it is determined that the log-inuser is an authenticated user who has logged in to a terminal other thanthe home terminal, and the process proceeds to step S60.

In step S55, it is determined whether or not an instant execution jobexists. Specifically, it is determined whether or not an instantexecution job is stored in the personal box allocated for the useridentification information accepted in step S51. If an instant executionjob is stored, the process proceeds to step S56, and if it is notstored, the process ends.

In step S56, it is determined whether or not a log-in instruction isgiven through a remote operation. If a log-in instruction is receivedfrom PC 200, the process proceeds to step S57, and if it is input frominput portion 119A, the process proceeds to step S59. In step S57, thejob identification information for identifying an instant execution jobstored in the personal box allocated for the user identificationinformation accepted in step S51 is transmitted to PC 200 whichtransmitted the log-in instruction. At PC 200, the job identificationinformation is received and then displayed in a list. PC 200 accepts aselection of a job and an execution instruction from a user and thentransmits the selected job identification information and a command togive an instruction for execution to MFP 100.

In step S58, it is determined whether or not the job identificationinformation and the command to give an instruction for execution arereceived from PC 200. If received, the process proceeds to step S59, andif not received, the process ends. Therefore, if MFP 100 is logged in tofrom PC 200 through a remote operation, the instant execution job storedin a home terminal can be selected and executed.

In step S59, an instant execution job is executed. Since the instantexecution job is executed, print data that was transmitted previouslyand has not been subjected to image formation is subjected to imageformation. Since an instant execution job is executed upon log-in to ahome terminal, an operation to execute an instant execution job needsnot be input, thereby simplifying the operation. If there are aplurality of instant execution jobs, a plurality of instant executionjobs are executed one by one.

In the next step S34, the executed instant execution job is deleted fromthe personal box. This prevents an instant execution job from stayingstored in a personal box for a long time and prevents an instantexecution job from being executed every time a home terminal is loggedin.

If the process proceeds to step S61, the log-in user is an authenticateduser. In the job protection process as described above, the instantexecution job is stored in a personal box of a home terminal, so thatthe instant execution job corresponding to the authenticated user is notstored in the log-in terminal. Therefore, in step S61, it is determinedwhether or not an instant execution job stored in a home terminal whichis a different apparatus connected via network 2 is searched for.Whether or not a home terminal is searched may be preset in MFP 100 ormay be selected by the user in step S61. If it is determined that a hometerminal is to be searched, the process proceeds to step S62, and ifnot, the process ends. It is possible to respect the user's intentionnot to execute an instant execution job at a terminal other than thehome terminal.

In step S62, an inquiry about an instant execution job is made to thehome terminal which is a different apparatus connected via network 2.Specifically, a request to transmit an instant execution job includinguser identification information is transmitted to the home terminal ofthe log-in user. At the home terminal, upon reception of the request totransmit an instant execution job, the personal box allocated for theuser identification information included in the transmission request issearched. If an instant execution job is stored, that instant executionjob is sent back, and if an instant execution job is not stored, asignal is sent back to indicate that no instant execution job exists. Ifthe instant execution job is transmitted, that instant execution job isdeleted from HDD 107.

In step S63, it is determined whether or not an instant execution job isreceived, and if it is received, the process proceeds to step S59. If itis not received, the process ends. When the process proceeds to stepS59, the instant execution job received from the home terminal isexecuted and therefore print data that was transmitted previously andhas not been subjected to image formation is subjected to imageformation. Thus, when a terminal other than a home terminal is loggedin, an instant execution job is executed, so that an instant executionjob can be executed as long as any of MFPs 100, 100A, 100B, 100C islogged in. In addition, no special operation is required to execute aninstant execution job, thereby simplifying an input of an operation.

On the other hand, in step S64, confidential jobs stored in theconfidential box are displayed in a list. Specifically, jobidentification information of confidential jobs is listed and displayedon display portion 119B. Then, it is determined whether or not one ofthe displayed job identification information is selected (step S65), andif selected, the process proceeds to step S66. If not selected, theprocess ends. In step S66, the stand-by state continues until a passwordis input (NO in step S66). When a password is input, the processproceeds to step S67. A password input window for accepting an input ofa password appears on display portion 119B. When a password is input toinput portion 119A, that password is accepted.

Then, it is determined whether or not the input password matches thepassword related with the confidential job selected in step S65 (stepS67). If both match each other, the process proceeds to step S68, and ifthey do not match, the process ends. In step S68, the confidential jobselected in step S65 is executed. A confidential job is stored inrelation with a password, and the confidential job is executed oncondition that that password is input. Therefore, it is possible toprevent other people from executing a confidential job and pick up paperhaving print data subjected to image formation thereon. Thus, it ispossible to prevent leakage of confidential information included inprint data.

In the next step S69, the executed confidential job is deleted from theconfidential box (step S69). This can prevent a confidential job fromstaying stored in the confidential box.

As described above, MFP in accordance with the present embodimentprohibits print data from being subjected to image formation and storesprint data in a personal box or stores print data in relation with apassword in a confidential box before the received print data issubjected to image formation, when a prescribed time has passed sinceprint data was received or when an input of an instruction to protectprint data is accepted. Therefore, when the user who gave an instructionto transmit print data moves to an image forming apparatus as believingthat print data, which is not yet output, was subjected to imageformation, and thereafter moves away from the image forming apparatus,paper having print data subjected to image formation is not seen byother people, because the print data is not subjected to imageformation. Thus, leakage of confidential information can be prevented.In particular, if print data related with user identificationinformation is protected, when the user operates the operation panel forlog-in next time, the print data is protected as an instant executionjob in which printing is automatically started in the logged-inapparatus. Therefore, the user needs not newly perform a job selectionoperation for printing instruction or a job execution instructionoperation, thereby simplifying the user's operation procedure andimproving the convenience.

Furthermore, when the user logs in to any of MFPs 100, 100A, 100B, 100C,print data stored in a personal box is subjected to image formation sothat the user who gave an instruction to transmit print data can pick uppaper having the print data subjected to image formation later.

In addition, when print data is stored in a confidential box, it isstored in relation with a password. This can prevent print data frombeing seen by other people. Moreover, the password related with printdata is transmitted to the apparatus that transmitted the print data, sothat the user who gave an instruction to transmit print data can obtainthe password. The user who gave an instruction to transmit print datainputs the password to allow the print data stored in the confidentialbox to be subjected to image formation.

It is noted that although, in the present embodiment, an instantexecution job is stored in a personal box of a home terminal, thepresent invention is not limited thereto. For example, an instantexecution job may be stored in relation with user identificationinformation in any of the apparatuses included in the same networkgroup, and when the user inputs the user identification information intoanother apparatus for authentication, the instant execution job relatedwith that user identification information may be broadcasted for inquiryfrom that apparatus to each apparatus in the same network group, so thatthe instant executed job is searched for and received.

Furthermore, although, in the embodiment described above, descriptionhas been made to MFPs 100, 100A, 100B, 100C and image processing system1, it is needless to say that the present invention can be understood asa print data output method and a print data output program executed byeach of MFPs 100, 100A, 100B, 100C.

Although the present invention has been described and illustrated indetail, it is clearly understood that the same is by way of illustrationand example only and is not to be taken by way of limitation, the spiritand scope of the present invention being limited only by the terms ofthe appended claims.

1. An image foiming apparatus comprising: a print data reception portionto receive print data; an image forming portion to perform imageformation on print data; a prohibition portion to prohibit said imageforming portion from performing image formation on said received printdata and store said received print data in a storage device before saidreceived print data is subjected to image formation by said imageforming portion, when a prescribed time has passed since said print datawas received; a print instruction accepting portion to accept an inputof a print instruction; and an output portion to allow said imageforming portion to perform image formation on said stored print data inresponse to accepting said input of a print instruction.
 2. The imageforming apparatus according to claim 1, further comprising a passwordobtaining portion to obtain a password, wherein said prohibition portionfurther includes a protection portion to relate said print data withsaid obtained password, said print instruction accepting portionincludes a password accepting portion to accept an input of a password,and said output portion allows said image forming portion to performimage formation on said print data on condition that the passwordrelated with said print data by said protection portion is accepted bysaid password accepting portion.
 3. The image forming apparatusaccording to claim 2, further comprising a user data storing portion tostore user data in which user identification information for identifyinga user is related with a password, wherein when user identificationinformation is received together with said print data, said passwordobtaining portion obtains the password related with the useridentification information.
 4. The image forming apparatus according toclaim 3, wherein said password obtaining portion further includes apassword generation portion to generate a password when useridentification information is not received together with said printdata, and a notification portion to transmit said generated password andprint data identification information for identifying said print data toan apparatus that transmitted said print data.
 5. The image formingapparatus according to claim 1, further comprising: a determinationportion to determine whether or not print data identical to the printdata received by said print data reception portion is stored in saidstorage device; and a deletion portion to delete said print data storedin said storage device, based on a determination result by saiddetermination portion.
 6. The image forming apparatus according to claim1, further comprising: a user authentication portion to authenticateuser identification information for identifying a user; and a useridentification information reception portion to receive useridentification information together with said print data, wherein saidprohibition portion further includes a relation portion to relate saidprint data with said received user identification information, saidprint instruction accepting portion includes an operation acceptingportion to accept an input of an operation by a user, and if the useridentification information accepted by said operation accepting portionis authenticated by said authentication portion, said output portionincludes a print data obtaining portion to obtain print data relatedwith said authenticated user identification information and allows saidimage forming portion to perform image formation on said obtained printdata.
 7. The image forming apparatus according to claim 1, furthercomprising a user authentication portion to authenticate useridentification information for identifying a user, wherein said storagedevice includes a personal storage area which is related with each of aplurality of user identification information and to which access ispermitted on condition that user identification information isauthenticated by said user authentication portion, when said useridentification information is received together with said print data,said prohibition portion includes a first storing portion to store saidprint data in said personal storage area related with said received useridentification information, said print instruction accepting portionincludes a user identification information accepting portion to acceptan input of user identification information, and when said accepted useridentification information is authenticated by said user authenticationportion, said output portion includes a determination portion todetermine whether or not said print data is stored in said personalstorage area related with said accepted user identification informationand allows said image forming portion to perform image formation on saidprint data, based on a determination result by said determinationportion.
 8. The image forming apparatus according to claim 7, whereinsaid storage device further includes a shared storage area to whichaccess is permitted without authentication by said user authenticationportion, said prohibition portion further includes a second storingportion to generate a password, relate said print data with saidgenerated password, and store said print data into said shared storagearea, when said user identification information is not received, and anotification portion to transmit said generated password and print dataidentification information for identifying said print data to anapparatus that transmitted said print data, when a password isgenerated, said print instruction accepting portion further includes apassword accepting portion to accept an input of a password, and whensaid accepted user identification information is not authenticated bysaid user authentication portion, said output portion allows said imageforming portion to perform image formation on said print data oncondition that the password related with said print data stored in saidshared storage area is input by said password accepting portion.
 9. Theimage forming apparatus according to claim 7, further comprising: adetermination portion to determine whether or not print data identicalto the print data received by said print data reception portion isstored in said personal storage area related with said useridentification information, when said user identification information isreceived together with the print data received by said print datareception portion; and a deletion portion to delete said print datastored in said personal storage area, based on a determination result bysaid determination portion.
 10. The image forming apparatus according toclaim 1, further comprising a communication portion to accept a remoteoperation, wherein said prohibition portion further includes a relationportion to relate said print data with user identification informationreceived together with the print data, said print instruction acceptingportion includes an authentication portion to authenticate useridentification information received by the communication portion, whenuser identification information is received by said communicationportion, a print data identification information transmission portion totransmit data identification information for identifying print datarelated with said authenticated user identification information to anapparatus that transmitted said user identification information, and aprint instruction reception portion to receive a print instruction fromthe apparatus that transmitted said user identification informationthrough said communication portion, and said output portion allows saidimage forming portion to perform image formation on print data relatedwith the user identification information received by said communicationportion, on condition that said print instruction is received.
 11. Aprint data output method executed in an image forming apparatusincluding a storage device and an image forming portion to perform imageformation on print data, comprising the steps of: receiving print data;prohibiting said image forming portion from performing image formationon said received print data before said received print data is subjectedto image formation by said image forming portion, when a prescribed timehas passed since said print data was received; storing said receivedprint data into the storage device when a prescribed time has passedsince said print data was received; accepting an input of a printinstruction; and allowing said image forming portion to perform imageformation on said stored print data in response to accepting said inputof a print instruction.
 12. A print data output program product embodiedon a non-transitory computer-readable medium and executable in an imageforming apparatus including a storage device and an image formingportion to perform image formation on print data, said program productcausing the image forming apparatus to execute the steps of: receivingprint data; prohibiting said image forming portion from performing imageformation on said received print data before said received print data issubjected to image formation by said image forming portion, when aprescribed time has passed since said print data was received; storingsaid received print data into the storage device when a prescribed timehas passed since said print data was received; accepting an input of aprint instruction; and allowing said image forming portion to performimage formation on said stored print data in response to accepting saidinput of a print instruction.