Unauthorized usage monitoring system for image processing devices and method for controlling unauthorized usage monitoring system

ABSTRACT

An unauthorized usage monitoring system for image processing devices of the present invention sets a higher information storage ratio for a smaller number of people present in an office when determining, based on an information storage ratio, whether or not to store to a storage portion  15  information in which a user ID code and image data are associated. The information ratio is compared with a random number, and information in which the image data and the ID code of the user who requested image processing are associated is stored to the storage portion  15  only when the information storage ratio is higher than the random number.

CROSS-REFERENCE TO RELATED APPLICATION/PRIORITY

This Nonprovisional application claims priority under 35 U.S.C. § 119(a)on patent application Ser. No. 2003-012462 filed in Japan on Jan. 21,2003, the entire contents of which are hereby incorporated by reference.

FIELD OF THE INVENTION

The present invention relates to unauthorized usage monitoring systemsfor monitoring unauthorized usage of image processing devices such asprinters, scanners, copying machines, and multifunctional machinesthereof.

BACKGROUND OF THE INVENTION

Many offices and the like in recent years are configured as systems inwhich terminals such as personal computers are connected via a networkto image processing devices such as digital multifunctional machines. Itis typical for these kinds of image processing devices to be configuredas multifunctional machines that serve such roles as a printer, ascanner, and a copying machine. In functioning as a printer, such amultifunctional machine receives print data (image data or text data)via the network from a terminal and, based on the print data, recordsthe images and text onto recording paper. Or, when functioning as ascanner, it displays an image of a scanned original on the display of aterminal. Moreover, when functioning as a copying machine, it recordsonto recording paper the image of the original that was scanned with thescanning function.

Image processing devices such as these greatly contribute to improvedwork efficiency in offices. However, as they can be used simply andeasily, they are sometimes subjected to unauthorized usage for private(personal) purposes other than work.

Conventional technology that focuses on inhibiting such unauthorizedusage of image processing devices is disclosed in Japanese Laid-OpenPatent Publication No. Hei 11-24859 (hereafter “patent document 1”) andJapanese Laid-Open Patent Publication No. 2002-116901 (hereafter “patentdocument 2”).

A configuration is disclosed in patent document 1 in which a pluralityof personal cards are provided on which individual informationcorresponding to users of a system is recorded, and a key counter with aplurality of insertion slots for the personal cards is connected to amultifunction printer. One of the insertion slots is for the copyingfunction of the printer, and another insertion slot is for the printingfunction of the printer, and when a personal card is read at theinsertion slot of the key counter for the printing function, theindividual information that is read out is verified against theindividual information at the time of logging on to the network. Theresult of this verification is that the print data saved by a server canbe printed by a printer on the condition that the individual informationis in agreement. Furthermore, the number of sheets printed by each usercan be recorded in a data storage portion when a print operation iscarried out.

The invention in patent document 2 has been proposed by the inventor ofthe present invention. When data is to be recorded onto recording paper,the ID code of the user who requested the data to be recorded is storedin association with the recorded data, thus enabling an administrator toknow which users have recorded which data, and making it possible toascertain unauthorized usage of an image processing device. Furthermore,in patent document 2, whether or not to store data in which the ID codeof the user is associated with the recorded image data is determinedbased on preset storage ratios for each user.

However, with the techniques disclosed in the above-described patentdocuments, it is possible that a large volume of image data that doesnot need to be recorded, that is, even information that does not involveunauthorized usage, is nonetheless recorded. And for this reason, notonly is a storage device with a large storage capacity required, butnumerous tasks become required to carry out the job of monitoring withan administrator distinguishing whether or not unauthorized usage hasbeen made of recorded information, thus increasing the burden on theadministrator.

It should be noted that consideration is given in patent document 2 topresetting storage ratios on a per-user basis and recording informationthat has a high probability for unauthorized usage, but theeffectiveness therein was as yet insufficient and further improvementswere required.

SUMMARY OF THE INVENTION

In the present invention, consideration is given to the fact that thenumber of people in a space where the users are (an environmentalcondition of the user vicinity) affects “the tendency for unauthorizedusage of an image processing device,” and the information storage ratiosare varied in accordance with this environmental condition to determinewhether or not to carry out information storage to the storage means. Inother words, the greater the tendency for unauthorized usage of theimage processing device can occur in an environment, the higher theinformation storage ratio is set, and this enables image data with ahigh potential for unauthorized usage to be stored with a high ratio.

Specifically, an unauthorized usage monitoring system for monitoringunauthorized usage of an image processing device, which performs imageprocessing in response to a request for image processing is provided.This unauthorized usage monitoring system is provided with anidentification means, a storage means, and a determination means. Theidentification means is for identifying a user who requests imageprocessing. The storage means is capable of storing information in whichthe user identified by the identification means is associated with atleast a portion of the image data for which the user requested imageprocessing. The determination means is for determining whether or not tocarry out information storage to the storage means. Also, thedetermination means uses an information storage ratio that is set basedon a tendency for unauthorized usage of the image processing devicecorresponding to an environmental condition (the number of people in thevicinity of the user who requested image processing, for example) todetermine whether or not to carry out information storage to the storagemeans.

Furthermore, the following configuration can also be provided as anotherconfiguration of the unauthorized usage monitoring system of the presentinvention. Namely, an unauthorized usage monitoring system formonitoring unauthorized usage of an image processing device, whichperforms image processing in response to a request for image processingis provided. This unauthorized usage monitoring system is provided withan identification means, a storage means, and a determination means. Theidentification means is for identifying an ID code a user who requestsimage processing. The storage means is capable of storing information inwhich the ID code of the user identified by the identification means isassociated with at least a portion of the image data for which the userrequested image processing. The determination means is for determiningwhether or not to carry out information storage to the storage means.Also, the determination means uses an information storage ratio that isset based on a tendency for unauthorized usage of the image processingdevice corresponding to an environmental condition to determine whetheror not to carry out information storage to the storage means.

With these specified items, the information storage ratio is set basedon a tendency for unauthorized usage of the image processing devicecorresponding to an environmental condition at the time when a usermakes a request for image processing to the image processing device. Inother words, the greater the tendency for unauthorized usage of theimage processing device can occur in an environment, the higher theinformation storage ratio is set. Then, when the determination meanscarries out a determination operation in which the information storageratio is used, and it is determined to carry out information storage tothe storage means, information in which the user (user ID code)identified by the identification means, and at least a portion of theimage data for which the user requested image processing are associatedis stored in the storage means. After this, an administrator canascertain whether or not there has been unauthorized usage of the imageprocessing device, and any user involved, by viewing the informationstored in the storage means, and further unauthorized usage can beinhibited in such ways as warning the user involved.

In this way, such a configuration of the present invention enables imagedata with a high potential for unauthorized usage to be stored with ahigh ratio, the result of which is that it is possible to achievesavings of the storage capacity of the storage means, a lighter burdenon the administrator for monitoring, and improved efficiency in the taskof monitoring.

The unauthorized usage monitoring system of the present invention mayalso be configured so that the image processing device can send andreceive information to and from a monitoring server, with the storagemeans being provided in the monitoring server. The followingconfiguration is possible in this case. Namely, an unauthorized usagemonitoring system for monitoring unauthorized usage of an imageprocessing device, which is configured to be capable of sending andreceiving information to and from a monitoring server, is provided. Theunauthorized usage monitoring system is provided with an identificationmeans, a storage means, and a determination means. The identificationmeans is for identifying a user who requests image processing. Thestorage means is provided in the monitoring server and is capable ofstoring information in which the user identified by the identificationmeans is associated with at least a portion of the image data for whichthe user requested image processing. The determination means is fordetermining whether or not to carry out information storage to thestorage means. Also, the determination means determines whether or notto carry out information storage to the storage means with aninformation storage ratio that is set based on a tendency forunauthorized usage of the image processing device corresponding to anenvironmental condition.

This configuration is effective, for example, in situations in which anetwork is configured with multiple image processing devices and amonitoring server. That is, it is possible for the administrator tocentrally manage any unauthorized usage made of the respective imageprocessing devices based on information stored in the monitoring server.

The following is a specific example of a determination operation by thedetermination means. First, the determination means determines whetheror not to carry out information storage to the storage means bycomparing a set information storage ratio with a random number.

Furthermore, one of the environmental conditions for setting theinformation storage ratio may be the number of people in a space inwhich the image processing device is installed. In this case, indetermining whether or not to carry out information storage to thestorage means, the determination means uses an information storage ratiothat is higher for lower numbers of people (fewer people) in the spacein which the image processing device is installed. That is, the smallerthe number of people in a space in which the image processing device isinstalled, the greater the tendency for unauthorized usage of the imageprocessing device can occur, and therefore by giving consideration tothis, image data with a high potential for unauthorized usage can bestored with a high ratio.

Furthermore, one of the environmental conditions for setting theinformation storage ratio may be the date and time. In this case, indetermining whether or not to carry out information storage to thestorage means, the determination means uses an information storage ratiothat is higher for days and times in which “the tendency forunauthorized usage of the image processing device” is higher. In thiscase too, by giving consideration to the fact that the smaller thenumber of people in a space in which the image processing device isinstalled, the greater the tendency for unauthorized usage of the imageprocessing device can occur, and by estimating the number of peopledepending on the date and time, it is possible based on this to storeimage data with a high potential for unauthorized usage with a highratio.

It should be noted that in this configuration of the present invention,the number of people present is estimated by recognizing the date andtime, and determining with this the tendency for unauthorized usage ofthe image processing device can occur. However, even in offices or thelike, for example, the tendency for unauthorized usage of the imageprocessing device can occur may vary depending on the time period or thelike regardless of the number of people present. Examples of such timeperiods include holidays, during breaks, and times outside office hours.Accordingly, by recognizing the date and time, it is possible todirectly determine the tendency for unauthorized usage of the imageprocessing device can occur, and with an information storage ratio thatis set based on this, it is thus possible to determine whether or not tocarry out information storage to the storage means.

Further still, with an unauthorized usage monitoring system for an imageprocessing device that is installed in an office, it is also possiblethat, in determining whether or not to carry out information storage tothe storage means, the determination means obtains informationconcerning signing in to and signing out from work at the office, anduses an information storage ratio that is higher for lower numbers ofpeople signed in at the office. For example, even in cases in which thenumber of people present in the vicinity in the same time period variesremarkably due to office holidays, uneven attendance levels for work onholidays, flextime systems and the like, the number of people presentcan be accurately estimated, thus enabling improved monitoringefficiency to be achieved. It should be noted that the informationconcerning signing in to and signing out from work referred to here maybe the number of employees in the space in which the image processingdevice is installed, and it may be the number of employees within agroup of users (users within the same department for example) who areauthorized to use that image processing device.

Furthermore, with an unauthorized usage monitoring system for an imageprocessing device that is installed in an office, it is also possiblethat, in determining whether or not to carry out information storage tothe storage means, the determination means obtains informationconcerning entering and exiting a room at the office, and uses aninformation storage ratio that is higher for lower numbers of peoplepresent in the office. For example, even in cases in which equipment isinstalled in numerous departments and common-use locations such asmeeting rooms, reception rooms, laboratories, and the like, the numberof people present in the rooms can be accurately estimated, thusenabling improved monitoring efficiency to be achieved.

Also, with an unauthorized usage monitoring system for image processingdevices connected to an office network, it is possible that, indetermining whether or not to carry out information storage to thestorage means, the determination means obtains information concerningthe number of currently operating host machines that are connected tothe network, and uses an information storage ratio that is higher forlower numbers of currently operating host machines. In this way, as longas the devices are connected to the network, the number of people in avicinity can be estimated without any special added system, thusenabling improved monitoring efficiency to be achieved.

Furthermore, in this case, the determination means may obtaininformation concerning the history of image processing requests to theimage processing device by host machines connected to the network(requests for image processing from users using the host machines),recognize from the history information the frequency of requests forimage processing of currently operating host machines other than thehost machine that is requesting image processing, and use an informationstorage ratio that is higher for lower frequencies of requests for imageprocessing in determining whether or not to carry out informationstorage to the storage means.

In other words, when the frequency of image processing requests fromhost machines other than the host machine that is requesting imageprocessing is high, there is a high probability that the users of thosehost machines (host machines not currently requesting image processing)will subsequently request image processing and move to the locationwhere the image processing device is installed. That is, the act ofthese users moving to the location where the image processing device isinstalled acts as a deterrent against unauthorized usage by other users.Therefore, since the probability of unauthorized usage occurring in thiscase is low, the storage ratio is set low. Conversely, when thefrequency of image processing requests from host machines other than thehost machine that is requesting image processing is low, there is a lowprobability that the users of those host machines (host machines notcurrently requesting image processing) will subsequently request imageprocessing and move to the location where the image processing device isinstalled. That is, the situation is such that it is difficult for theact of these users moving to the location where the image processingdevice is installed to be used as a deterrent against unauthorized usageby other users. Therefore, since the probability of unauthorized usageoccurring in this case is high, the storage ratio is set high. Thus, byvarying the information storage ratio in response to the frequency(history) of image processing requests in the past (within apredetermined recent period) by users of host machines who are notrequesting image processing, it is possible to factor in the degree ofdeterrent against unauthorized usage to the user to derive higher ratiosfor image data that has a high potential for unauthorized usage, thusenabling further improvements in monitoring efficiency to be achieved.

Furthermore, color imaging or monochrome imaging can be selected in theimage processing device, and, in determining whether or not to carry outinformation storage to the storage means, the determination means mayuse an information storage ratio that is higher for the times ofperforming color imaging than for the times of performing monochromeimaging. That is, since the costs for recording onto recording paper arehigher for color imaging in comparison to monochrome imaging, by makingthe storage ratio for color higher than the storage ratio for monochromeeven for the same environmental conditions, the ratio of color datastored in the storage means increases, thus unauthorized usage of theimage processing device can be strictly monitored.

It should be noted that a control method that is executed on theunauthorized usage monitoring system according to the above-describedconfigurations of the present invention is also within the scope of thetechnical idea of the present invention. With this method, first adetermination operation is performed in which whether or not to carryout information storage to the storage means is determined using aninformation storage ratio that is set based on a tendency forunauthorized usage of the image processing device corresponding to anenvironmental condition. Then a storage operation is performed in whichinformation in which a user who requested image processing and at leasta portion of the image data for which image processing was requested bythat user are associated and stored in the storage means when adetermination has been made to carry out information storage to thestorage means.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram showing the configuration of a network systemaccording to a first embodiment.

FIG. 2 is a flowchart showing the operation of a copying processaccording to the first embodiment.

FIG. 3 is a flowchart showing the operation of a printing processaccording to the first embodiment.

FIG. 4 is a data table of basic storage ratios in the first embodiment.

FIG. 5 is table of user data.

FIG. 6 is a block diagram showing the configuration of a network systemaccording to a second embodiment.

FIG. 7 is a block diagram showing the configuration of a network systemaccording to a third embodiment.

FIG. 8A shows an example of user data, and FIG. 8B shows an example ofdepartment data.

FIG. 9 is a data table of basic storage ratios in the third embodiment.

FIG. 10 is a flowchart showing a portion of the control operation in thethird embodiment.

FIG. 11 is a data table of basic storage ratios in a fourth embodiment.

FIG. 12 is a diagram of pass-through detectors according to the fourthembodiment.

FIG. 13 is a flowchart showing a verification operation for the enteringand exiting of each user.

FIG. 14 shows a basic storage ratio data table for setting the basicstorage ratios based on the number of currently operating host machines.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Hereinafter, embodiments of the invention are described with referenceto the appended drawings.

First Embodiment

Firstly, a first embodiment is described. The embodiment is describedfor the case of the present invention being applied to a network systemsuch that a plurality of user terminals (information processing devices)and one image processing device (digital copying machine) are connectedto a network (a so-called LAN (Local Area Network)).

Description of Network System Configuration

FIG. 1 is a block diagram showing a network system provided with anunauthorized usage monitoring system according to the present invention.The network system shown in FIG. 1 is used in an office or the like andis constituted by an image processing device (digital copying machine) 1serving as a copying machine (hereinafter also referred to as a“copier”), a printer, and a scanner; personal computers, workstations orthe like as first and second user terminals 2 and 3; and a shareddocument server 4 or the like, all interconnected via network cabling 5.

The image processing device 1 is configured to full the function of acopier, which records a scanned original on paper, the function of aprinter, which records image data received from the first and seconduser terminals 2 and 3 on paper, and the function of a scanner, whichsends image data of a scanned original to the first and second userterminals 2 and 3.

When the image processing device 1 is used as a copier, an original isplaced in an image reading portion 11, and a request to copy theoriginal is made by an input operation at a user interface 16. Inresponse to this, a control portion 14 activates the image readingportion 11 to copy the original. The image reading portion 11 scans theoriginal, then generates image data based on this and outputs to animage processing portion 12. Based on the image data, an image formingportion 13 records an image onto recording paper, and discharges therecording paper.

The image processing device 1 is capable of copying monochrome imagesand color images. When copying an original onto recording paper, alongwith requesting copying, a user also selects either monochrome imagingor color imaging by operating the user interface 16. When color imagingis specified, image data representing a color image is output from theimage reading portion 11, then the image data is processed by the imageprocessing portion 12, and a color image is recorded onto the recordingpaper by the image forming portion 13. On the other hand, whenmonochrome imaging is specified, image data representing a monochromeimage is output from the image reading portion 11, then the image datais processed by the image processing portion 12, and a monochrome imageis recorded onto the recording paper by the image forming portion 13.

Furthermore, when the image processing device 1 is used as a printer,image data representing images, text, and the like, is sent from thefirst user terminal 2, for example, to the image processing device 1 viathe network cabling 5. The image processing device 1 receives print datathrough a network interface 17, then language analysis is performed onthe print data by a language analysis portion 14 j that is provided inthe control portion 14 and, based on the results of the languageanalysis, the print data is developed by a print data developing portion14 k. After various kinds of image processing are performed on the printdata, the image forming portion 13 records the image onto recordingpaper.

Alternatively, when a request to record one set of image data is givenfrom the second user terminal 3 to the shared document server 4 via thenetwork cabling 5, a control portion 41 of the shared document server 4receives this request via a network interface 42 and activates adocument access management portion 41 a. The document access managementportion 41 a searches a storage portion 43 for the image data and sendsthe image data to the image processing device 1 via the network cabling5. The image processing device 1 receives this image data via thenetwork interface 17 and supplies it to the image processing portion 12via the control portion 14. The image data is processed by the imageprocessing portion 12, and then supplied to the image forming portion13. The image forming portion 13 records the image represented by thisimage data onto recording paper.

Thus, monochrome images and color images can also be recorded when theimage processing device serves as a printer, and therefore eithermonochrome imaging or color imaging is requested from a terminal (thefirst and second user terminals 2 and 3, or the shared document server4) to the image processing device 1.

Furthermore, when the image processing device 1 is used as a scanner, anoriginal is placed in the image reading portion 11, and a request toscan the original is made by an input operation at the user interface16. The image reading portion 11 scans the original and the controlportion 14 performs image processing on the image data, which is basedon the scan, so that it is in a format that the first user terminal 2,for example, can recognize, and then sends the data via the networkcabling 5 to the first user terminal 2. The first user terminal 2 uses apreview program to display the image data on a display device of theuser interface.

As described above, the image processing device 1 can serve as a copier,a printer, and a scanner. Consequently, although it improves workefficiency in the office, it is also possible to make unauthorized useof it for private purposes other than work.

For this reason, the unauthorized usage monitoring system of the presentembodiment executes the processing operation of the flowchart shown inFIG. 2 in parallel when the device serves as a copying machine, so thatat least a portion of the image data will be stored in association withan ID code of the user of the image processing device 1. Similarly, whenthe device serves as a printer, the unauthorized usage monitoring systemof the present embodiment executes the processing operation of theflowchart shown in FIG. 3 in parallel, so that at least a portion of theimage data will be stored in association with an ID code of the user.When at least a portion of the image data has been stored in associationwith a user ID code in this way, it is possible to know at any timewhich user used the device for what kind of data, and therefore byascertaining a user who has made unauthorized usage of the imageprocessing device 1 and warning that user, unauthorized usage can beinhibited.

Operation Descriptions

Copying Operation

The following is a description of the processing operation when theimage processing device 1 serves as a copier, using the flowchart shownin FIG. 2.

To carry out a copying operation, the user first inserts an IC card 18a, which has been given in advance, into a user ID input portion 18 ofthe image processing device 1. Alternatively, a non-contact tag 18 b,which is able to transmit the user ID in a non-contact manner, isbrought into the vicinity of the user ID input portion 18.

The user ID input portion 18 is standing by for the insertion of an ICcard (“not inserted” status at step S1), and once an IC card is inserted(“inserted” status at step S1), the ID code of the user is read from theIC card, and this ID code is then output to the control portion 14. Auser ID identification portion (an identification means) 14 a of thecontrol portion 14 receives the ID code and verifies it against thepreviously stored ID code (step S2). If the ID code does not match theprevious ID code (determined to be “different” at step S2), the ID codeis stored and the previous ID code is deleted so as to renew the ID code(step S3). If the ID code matches the previous ID (determined to be“same” at step S2), step S3 is skipped. Then, the user ID identificationportion 14 a notifies an image storage management portion 14 b of the IDcode of the IC card.

Thereafter, the original image is placed in the image reading portion 11and the user interface 16 is operated to command a copy of the originalwith monochrome imaging specified, for example. When a copying commandis given (determined to be “given” at step S4) and monochrome imagecopying is specified (determined to be “no” at step S5), a mode portion14 c of the control portion 14 notifies the image storage managementportion 14 b, the image reading portion 11, the image processing portion12, and the image forming portion 13 that the copying operation is to beperformed with monochrome imaging.

In response to this, the image reading portion 11 scans the originalimage and outputs image data representing a monochrome image. This imagedata is processed by the image processing portion 12 and then suppliedto the image forming portion 13, where the monochrome image is recordedonto recording paper.

The image processing portion 12 outputs the image data also to the imagestorage management portion 14 b of the control portion 14. Furthermore,a specified pattern detector 12 a of the image processing portion 12attempts to detect a specified pattern (an authentication pattern) thathas been preset for the image data. If a specified pattern is detectedfrom the image data, the specified pattern is output to the imagestorage management portion 14 b of the control portion 14.

On the other hand, in response to the notification for monochrome imagecopying from the mode portion 14 c, a storage determination portion (adetermination means) 14 d of the image storage management portion 14 bdetermines a storage ratio for monochrome imaging (step S8). Todetermine this storage ratio, the storage determination portion 14 dreferences a basic storage ratio data table 14 e, which is shown in FIG.4. The basic storage ratios for monochrome imaging and color imaging areregistered respectively in the basic storage ratio data table 14 e inregard to “During office hours of a business day,” “Outside office hoursof a business day,” and “Holiday” for the office. Specifically, thebasic storage ratio is set higher for “Outside office hours of abusiness day” than for “During office hours of a business day,” and thebasic storage ratio is set higher for “Holiday” than for “Outside officehours of a business day.”

This is because consideration is given to conditions such as the numberof people in an office space where the users are (environmentalconditions of the user vicinity) and the date and time (time-relatedenvironmental conditions) that affect the tendency for unauthorizedusage of an image processing device, and the information storage ratios(basic storage ratios) are varied in accordance with such environmentalconditions. In other words, the greater the tendency for unauthorizedusage of the image processing device 1 can occur in an environment (thesmaller the number of people present), the higher the informationstorage ratio is set. This enables image data with a high potential forunauthorized usage to be stored with a high ratio.

The control portion 14 is provided with a clock/calendar portion 14 m,which recognizes the current date/time, and a holiday/office hourstorage portion 14 n, which stores information about office holidays andoffice hours, and the above-described “During office hours of a businessday,” “Outside office hours of a business day,” and “Holiday” items aredifferentiated by comparing the information stored in the holiday/officehour storage portion 14 n with the current date/time.

Furthermore, the basic storage ratios are set higher (10 times) for“coloring imaging” than for “monochrome imaging.”

This is because the cost is generally higher when recording color imagesas compared to recording monochrome images, and in order to allowstricter monitoring of color imaging by saving color images with agenerally higher likelihood than monochrome images.

In accordance with the date/time and monochrome/color classification ofwhen a copying operation is carried out, the storage determinationportion 14 d reads out a basic storage ratio from the basic storageratio data table 14 e and generates a random number RND at random thatvaries in the range of 0 to 1.00 with 0.01 increments, and this randomnumber RND is compared with the basic storage ratio for monochromeimaging (for example 0.06 for monochrome image copying for “Outsideoffice hours of a business day”) (step S9). Then, if the random RND<thebasic storage ratio (determined to be “yes” at step S9), the procedureproceeds to the processes that start from step S10 so that informationin which the image data and the ID code of the user who requested thecopy are associated and stored in the storage portion (storage means) 15to be saved. Furthermore, if the random number>the basic storage ratio(determined to be “no” at step S9), the procedure returns to step S1without saving the image data.

When the random number RDN<the basic storage ratio (determined to be“yes” at step S9), and the procedure has proceeded to the processes thatstart from step S10, an image reducing portion 14 g of the image storagemanagement portion 14 b performs a reduction process (a compressionprocess) on the image data from the image processing portion 12 (stepS10). Any existing method for reducing images may be applied for thisreduction process, even the simplest of such methods such as eliminatingpixels from the image as appropriate.

When a specified pattern is detected in the image data by the specifiedpattern detector 12 a of the image processing portion 12 (“detected” atstep S11) in the course of reducing the image, and this is notified tothe image reducing portion 14 g, the image reducing portion 14 gsuspends the reduction process being performed on that image data (stepS12). This is because the specified pattern is appended to image datashared by multiple users, and is not appended to private-use image data,so that copying an image to which this specified pattern is appendedwill not result in unauthorized usage of the image processing device 1,and it is not necessary to reduce and save such image data.

Prior to the completion of image reduction (prior to “completed” at stepS13), if no specified pattern is detected in the image data(“undetected” is maintained at step S11), the image storage managementportion 14 b associates the reduced image data with the ID code of theIC card and stores them in the storage portion 15 (step S14).

On the other hand, when a copying command is given at the user interface16 (determined to be “given” at step S4) and color image copying isspecified (determined to be “yes” at step S5), notification is sent fromthe mode portion 14 c to the image storage management portion 14 b, theimage reading portion 11, the image processing portion 12, and the imageforming portion 13 that the copying operation is to be performed withcolor imaging.

In response to this, the image reading portion 11 scans the original andoutputs image data representing a color image. This image data isprocessed by the image processing portion 12 and the color image isrecorded onto recording paper by the image forming portion 13.

The image processing portion 12 outputs the image data to the imagestorage management portion 14 b of the control portion 14, and thespecified pattern detector 12 a of the image processing portion 12attempts to detect a specified pattern in the image data.

On the other hand, in response to the notification for color imagecopying from the mode portion 14 c, the storage determination portion 14d of the image storage management portion 14 b, determines a storageratio for color imaging (steps S6 and S7). To determine this storageratio, the storage determination portion 14 d references the basicstorage ratio data table 14 e, which is shown in FIG. 4, and a user datatable 14o, which is shown in FIG. 5. Stored in this user data table 14 oare the names of a plurality of users and their degree of need for colorimaging associated with their user ID code. For example, for the case of“Outside office hours of a business day,” the storage determinationportion 14 d reads out the basic storage ratio for color imaging, 0.60,from the basic storage ratio data table 14 e, and also reads out thedegree of need for color that corresponds to the ID code of that IC cardfrom the user data table 14 o, and then calculates (1—degree of need forcolor)×basic storage ratio of 0.60 to determine the applicable storageratio. For example, if the degree of need for color is 0.60, then theapplicable storage ratio is determined as (1−0.60)×0.60=0.24.

Further still, the storage determination portion 14 d generates a randomnumber RDN at random that varies in the range of 0 to 1.00 with 0.01increments, and this random number RND is compared with the applicablestorage ratio, 0.24 (step S9). Then, if the random RND<the applicablestorage ratio of 0.24 (if determined to be “yes” at step S9), theprocedure proceeds to the processes that start from step S10 so thatimage data that represents the color image can be stored and saved.Furthermore, if the random number≧the applicable storage ratio of 0.24(if determined to be “no” at step S9), the procedure returns to step S1without saving the image data.

When image data representing the color image is stored and saved, theimage data from the image processing portion 12 undergoes a reductionprocess in the same manner as for monochrome images (step S10). When aspecified pattern is detected in the image data by the specified patterndetector 12 a of the image processing portion 12 (“detected” at stepS11) in the course of reducing the image, the reduction process beingperformed on that image data is suspended (step S12) since this imagedata is shared by multiple users. Furthermore, prior to the completionof image reduction (prior to “completed” at step S13), if no specifiedpattern is detected in the image data (“undetected” is maintained atstep S11), the image storage management portion 14 b associates thereduced image data with the ID code of the IC card and stores them inthe storage portion 15.

Print operation

The following is a description of the processing operation when theimage processing device 1 serves as a printer, using the flowchart shownin FIG. 3.

As noted above, the image processing device 1 receives image data fromthe first or second user terminals 2 and 3 or the shared document server4 and records the image represented by the image data. In the imageprocessing device 1, a data identification portion 14 h of the controlportion 14 stands by to receive image data from the network cabling 5via the network interface 17 (“not received” status at step S21), andonce the data identification portion receives image data (“received”status at step S21), it extracts the header that is appended to theimage data and reads from the header the address of the user terminal 2,which sent the image data. The data identification portion 14 h thendetermines whether or not the address belongs to the shared documentserver 4 (step S22). If the address belongs to the shared documentserver 4 (determined to be “yes” at step S22), the data identificationportion 14 h reads the header and notifies the image processing portion12 of whether monochrome imaging or color imaging is specified (stepS23). A specified pattern appending portion 14i of the controller 14appends pattern data that represents a specified pattern to the imagedata and sends this image data to the image processing portion 12, thenthe procedure returns to step S21.

The image data is processed by the image processing portion 12 and thensupplied to the image forming portion 13, where either a monochrome orcolor image is reproduced on recording paper. A specified pattern isappended to the recorded image.

In other words, an image with a specified pattern appended is recordedwithout saving the image data in the case of image data received fromthe shared document server 4. This is because image data from the shareddocument server 4 is data that is shared by multiple users and carryingout recording of such images does not involve unauthorized usage of theimage processing device 1, and it is therefore unnecessary to save suchimage data.

It should be noted that when the recording paper printed here (recordingpaper on which is printed an image that has a specified patternattached) is copied, the specified pattern will be detected as describedabove at step 11 in FIG. 2, and therefore the image data representingthis image will not be saved.

When the address read from the header does not belong to the shareddocument server 4 (determined to be “no” at step S22), the dataidentification portion 14 h reads the header to determine whethermonochrome imaging or color imaging has been specified, and notifies theimage processing portion 12 and the print image storage managementportion 14 b of whether it is monochrome imaging or color imaging, thensupplies the image data to the image processing portion 12 and the printimage storage management portion 14 b (step S24). The image processingportion 12 processes the image data and supplies it to the image formingportion 13. The image forming portion 13 records onto recording papereither a monochrome image or a color image that represents the imagedata.

If the address that is read from the header does not belong to theshared document server 4, the image data will have been sent from eitherthe first or second user terminals 2 and 3. In this case, the headercontains the address of the user terminal, as well as the ID code of theuser at the user terminal. The data identification portion 14 h readsthe ID code from the header and notifies this to the image storagemanagement portion 14 b (step S25).

Then, if monochrome imaging is specified (determined to be “no” at stepS26), the storage determination portion 14 d of the image storagemanagement portion 14 b carries out the same process as that describedabove for step S8 in FIG. 2 to determine a basic storage ratio formonochrome imaging (step S29). Furthermore, when the random numberRDN<the basic storage ratio (determined to be “yes” at step S30), theprocedure proceeds to the processes that start from step S31 so that theimage data that represents the monochrome image can be stored and saved.Furthermore, if the random number≧the basic storage ratio (determined tobe “no” at step S30), the procedure returns to step S21 without savingthe image data.

At step S31, the image reducing portion 14 g of the image storagemanagement portion 14 b performs a reduction process on the image data.Then, once reduction of the image is completed (determined to be“completed” at step S32), the image storage management portion 14 bassociates the image data that has been reduced with the ID code of theIC card, and stores these in the storage portion 15 (step S33).

On the other hand, if a request for color imaging is read from theheader of the image data that is received (determined to be “yes” atstep S26), the storage determination portion 14 d of the image storagemanagement portion 14 b carries out the same processes as describedabove steps S6 and S7 in FIG. 2 to determine an applicable storage ratiofor color imaging (steps S27 and S28). Then, if the random numberRDN<the applicable storage ratio (determined to be “yes” at step S30),the procedure proceeds to the processes that start from step S31 so thatthe image data that represents the color image can be stored and saved.Furthermore, if the random number>the applicable storage ratio(determined to be “no” at step S30), the procedure returns to step S21without saving the image data.

Image data reduction is also performed in the case of saving image datathat represents a color image (steps S31 and S32), with the reducedimage data being associated with the ID code of the IC card, and theseare stored in the storage portion 15 (step S33).

In using the image processing device 1 in this way, at least a portionof the recorded data is stored in the storage portion 15 in associationwith the ID code of the user. And thus, by reading out the contentsstored in the storage portion 15, it is possible to know which userrecorded what kind of data, therefore enabling unauthorized usage of theimage processing device 1 to be ascertained and such unauthorized usageto be inhibited.

Copying and printing operations are carried out as described above. Andto achieve these, an unauthorized usage monitoring system according tothe present invention is configured with the above-described user IDidentification portion 14 a, the storage portion 15, and the storagedetermination portion 14 d.

As described above, the present embodiment gives consideration toconditions such as the number of people in an office space where theusers are (environmental conditions of the user vicinity) and the dateand time (time-related environmental conditions) that affect thetendency for unauthorized usage of an image processing device, and thestorage ratios are varied in accordance with such environmentalconditions, with the storage determination portion 14 d determiningwhether or not to store information in the storage portion 15. In otherwords, the greater the tendency for unauthorized usage of the imageprocessing device 1 can occur in an environment, the higher the storageratio is set. This enables image data with a high potential forunauthorized usage to be stored with a high ratio. And in this way it ispossible to avoid a situation in which large volumes of information notinvolved with unauthorized usage ends up being stored in the storageportion 15, and thus it is possible to achieve reduction in the volumeof data stored in the storage portion 15, a lighter burden on theadministrator for monitoring, and improved efficiency in the task ofmonitoring.

Furthermore, when carrying out color imaging, the storage determinationportion 14 d determines whether or not to store information to thestorage portion 15 using a higher information storage ratio than forwhen monochrome imaging is carried out. This is in consideration of thefact that color data, in comparison to monochrome data, involvesincreased costs for recording onto recording paper, and by making thestorage ratio for color higher than the storage ratio for monochromeeven for the same environmental conditions, the likelihood of color databeing stored in the storage portion 15 increases, and in this way it ispossible to achieve reductions in the losses caused by unauthorizedusage by strictly monitoring the unauthorized usage of image processingdevices.

Furthermore, in the present embodiment, the information storage ratiosalso vary according to users who have a need for color imaging as partof their work, and users who do not have such a need. For example, auser employed for accounting duties or the like in an office has fewoccasions for recording color images, but a user employed in planning ordesign has many occasions for recording color images. Therefore, asdescribed above, a basic storage ratio for color imaging in the basicstorage ratio data table 14 e of FIG. 4 and a degree of need for colorimaging of a user in the user data table 14 o shown in FIG. 5 are readout to calculate (1—degree of need for color) x the basic storage ratio,thus determining an applicable storage ratio that reflects the number ofpeople in the user's vicinity and corresponds to that user, and anycolor images are saved in accordance with the applicable storage ratio.

This processing operation also reduces the volume of stored data, andenables the storage capacity of the storage portion 15 to be saved, thusmaking easier the administrative task of reading out the contents of thestorage portion 15 and ascertaining unauthorized usage of the imageprocessing device 1.

Furthermore, since image data is stored in the present embodiment aftera reduction process has been carried out on the image data, the volumeof data that is stored is reduced, thus making easier the administrativetask of ascertaining unauthorized usage.

Second Embodiment

Next, a second embodiment is described. The embodiment is described forthe case, as shown in FIG. 6, of the present invention being applied toa network system such that a plurality of user terminals 2 and 3, aplurality of image processing devices 1 and 7, a shared document server4, and a monitoring server 6 are connected to a network (LAN). The samereference numerals are used in FIG. 6 for components that are the sameas in the above-described first embodiment. And only the points thatdiffer from the first embodiment are described below.

As shown in FIG. 6, the network system according to the presentembodiment is arranged with the separate monitoring server 6, and thestorage portion 15 is provided in this monitoring server 6. That is,information in which the user (ID code) and image data are associated isstored in the monitoring server 6, not the image processing device 1.

When it is determined that information is to be stored to the storageportion 15 (when determined to be “yes” at step S9 and “completed” atstep S13 in the flowchart of FIG. 2, and when determined to be “yes” atstep S30 and “completed” at step S32 in the flowchart of FIG. 3), themonitoring server 6 receives at a network interface 61 the informationin which image data and the user ID code are associated from the imageprocessing device 1 via the network cabling 5, and supplies this to acontrol portion 62. The control portion 62 stores in the storage portion15 the information in which image data and the user ID code areassociated, thus enabling monitoring by an administrator.

In the present embodiment, the storage determination portion 14 d thatmakes the determination (the determination of whether or not to store inthe storage portion 15 the information in which image data and the userID code are associated) may be provided in each of the image processingdevices 1 and 7, or may be provided in the monitoring server 6.

In the network system shown in FIG. 6, not only the image processingdevice 1, but also another image processing device 7 or the like isconnected to the network cabling 5, and these image processing devices 1and 7 serve in roles such as copying machines and printers. The task ofsupervising unauthorized usage becomes complex when information in whichimage data and the user ID code are associated is stored for each ofthese image processing devices 1 and 7. However, in the presentembodiment, only the settings for the information in which image dataand the user ID code are associated are provided in each of the imageprocessing devices 1 and 7, and all the image data and user ID codesthat need to be saved are centrally stored in the storage portion 15 ofthe monitoring server 6, and therefore the task of supervising can beperformed without inviting complexity.

Third Embodiment

Next, a third embodiment is described. The embodiment is described forthe case, as shown in FIG. 7, of the present invention being applied toa network system such that a plurality of user terminals 2 and 3, aplurality of image processing devices 1 and 7, a shared document server4, a monitoring server 6, and a sign in/sign out management server 8 areconnected to a network (LAN). Here also, the same reference numerals areused in FIG. 7 for components that are the same as in the firstembodiment and the second embodiment. And only the points that differfrom the first embodiment and the second embodiment are described below.

As shown in FIG. 7, the network system according to the presentembodiment is arranged with the separate sign in/sign out managementserver 8, and the storage portion 15 is provided in this sign in/signout management server 8. That is, information in which the user (IDcode) and image data are associated is stored in the sign in/sign outmanagement server 8, the image processing devices 1 and 7 or themonitoring server 6.

When it is determined that information is to be stored to the storageportion 15 (when determined to be “yes” at step S9 and “completed” atstep S13 in the flowchart of FIG. 2, and when determined to be “yes” atstep S30 and “completed” at step S32 in the flowchart of FIG. 3), thesign in/sign out management server 8 receives at a network interface 81the information in which image data and the user ID code are associatedfrom the image processing device 1 via the network cabling 5, andsupplies this to a control portion 82. The control portion 82 stores inthe storage portion 15 the information in which image data and the userID code are associated.

In the present embodiment, the storage determination portion 14 d thatmakes the determination (the determination of whether or not to store inthe storage portion 15 the information in which image data and the userID code are associated) may be provided in the image processing devices1 and 7, and may be provided in the sign in/sign out management server8.

Furthermore, the sign in/sign out management server 8 is provided with asign in/sign out processing portion 83, a request/approval processingportion 84, and an employee counter 85.

The sign in/sign out processing portion 83 recognizes the signing in andsigning out of the users in the office. For example, it receives signin/sign out data that is output from the user terminals 2 and 3, andstores this in the storage portion 15 as user data. Department dataconcerning the department to which each user is assigned is also storedin the storage portion 15.

FIG. 8A shows an example of the user data in which the “userID,”“name,”“department ID,”“supervisor ID,”“host name,”“sign in/sign outtime data,” and so on are stored for each user. The signing in andsigning out of each user can be distinguished using the “sign in/signout time data” of the user data. FIG. 8B shows an example of thedepartment data in which the “department ID,”“departmentname,”“location,”“facilities equipment data,” and so on are stored foreach department.

The employee counter 85 reads the user data in the storage portion 15and totals the current number of employees present. The number ofemployees present is used to set the basic storage ratios. FIG. 9 showsa basic storage ratio data table 86. Basic storage ratios are registeredin the basic storage ratio data table 86 for monochrome imaging andcolor imaging respectively corresponding to “more than threepeople,”“one or two people,” and “no people” as the number of employeespresent (the number of employees present other than the user who isabout to execute image processing). Specifically, the basic storageratio is set higher for “one or two people” than for “more than threepeople” as the number of employees present, and the basic storage ratiois set higher for “no people” than for “one or two people” as the numberof employees present.

This is because, as in the case of the first embodiment, considerationis given to conditions such as the number of people in an office spacewhere the users are (environmental conditions of the user vicinity) thataffect the tendency for unauthorized usage of an image processingdevice, and the information storage ratios (basic storage ratios) arevaried in accordance with such environmental conditions. In other words,the greater the tendency for unauthorized usage of the image processingdevice 1 can occur in an environment (the smaller the number of peoplepresent), the higher the information storage ratio is set. This enablesimage data with a high potential for unauthorized usage to be storedwith a high ratio.

In the present embodiment, whether or not to store information in thestorage portion 15 is determined using basic storage ratios that are setbased on the basic storage ratio data table 86, and information in whichimage data and the user ID code are associated is stored in the storageportion 15 as required.

FIG. 10 shows a portion of the flowchart of the control operationcarried out in the present embodiment and takes the place of steps S5 toS8 in the flowchart (operation at the time of copying) shown in FIG. 2.That is, after the storage ratio is determined in step S7 or step S8,the procedure proceeds to step S40, and storageratio×{(0.8+1.2/(1+number of other people)} is calculated to determinethe applicable storage ratio. After this applicable storage ratio isdetermined, the processes starting from the above-mentioned step S9 arecarried out.

Furthermore, this is the same for the operation at the time of printing,and the flowchart of FIG. 10 takes the place of steps S26 to S29 in theflowchart shown in FIG. 3. That is, after the storage ratio isdetermined in step S28 or step S29, the procedure proceeds to step S40,and storage ratio×{0.8+1.2/(1+number of other people)} is calculated todetermine the applicable storage ratio. After this applicable storageratio is determined, the processes starting from the above-mentionedstep S30 are carried out.

With the present embodiment, even in cases in which the number of peoplepresent in the vicinity in the same time period varies remarkably dueto, for example, office holidays, uneven attendance levels for work onholidays, flextime systems and the like, the number of people presentcan be accurately estimated, thus enabling improved monitoringefficiency to be achieved.

Fourth Embodiment

Next, a fourth embodiment is described.. The embodiment is described forthe case, as shown in FIG. 11, of the present invention being applied toa network system such that a plurality of user terminals 2 and 3, aplurality of image processing devices 1 and 7, a shared document server4, a monitoring server 6, room entrance/exit management devices 100provided for each room, and a room entrance/exit management server 9 areconnected to a network (LAN). Here also, the same reference numerals areused in FIG. 11 for components that are the same as in theabove-described embodiments. And only the points that differ from theabove-described embodiments are described below.

As shown in FIG. 11, the network system according to the presentembodiment is arranged with the room entrance/exit management server 9,and the storage portion 15 is provided in this room entrance/exitmanagement server 9. That is, information in which the user (ID code)and image data are associated is stored in the room entrance/exitmanagement server 9, not the image processing devices 1 and 7 or themonitoring server 6.

When it is determined that information is to be stored to the storageportion 15 (when determined to be “yes” at step S9 and “completed” atstep S13 in the flowchart of FIG. 2, and when determined to be “yes” atstep S30 and “completed” at step S32 in the flowchart of FIG. 3), theroom entrance/exit management server 9 receives at a network interface91 the information in which image data and the user ID code areassociated from the image processing device 1 via the network cabling 5,and supplies this to a control portion 92. The control portion 92 storesin the storage portion 15 the information in which image data and theuser ID code are associated.

In the present embodiment, the storage determination portion 14 d thatmakes the determination (the determination of whether or not to store inthe storage portion 15 the information in which image data and the userID code are associated) may be provided in the image processing devices1 and 7, and may be provided in the room entrance/exit management server9.

Furthermore, the room entrance/exit management server 9 is provided witha room entrance/exit processing portion 93 and a counter 94 for countingpeople present in a room.

The room entrance/exit processing portion 93 recognizes the entering andexiting of each user in the office. Specifically, a pass-throughdetector 90 (see FIG. 12), which is made of the above-mentioned roomentrance/exit management devices 100, is provided in the vicinity of theoffice entrance. The pass-through detector 90 is made of an outsidedetector 90 a, which is arranged outside the room, and an insidedetector 90 b, which is arranged inside the room. Each user carries atransmitter that transmits a transmission signal by which the detectors90 a and 90 b are able to recognize the user ID.

FIG. 13 is a flowchart showing an operation in which the entering andexiting of each user in an office are recognized using the outsidedetector 90 a and the inside detector 90 b. In FIGS. 12 and 13, thedetection of a user by the outside detector 90 a is indicated as“pass-through detection 1,” and the detection of a user by the insidedetector 90 b is indicated as “pass-through detection 2.”

First, when the presence of a user is detected by the inside detector 90b as a room-entering detection operation, the detected user ID isrecorded (steps S51 to S53). Then it is determined whether or not thepresence of the user to whom the detected user ID belongs has beendetected by the outside detector 90 a within a predetermined time. Thatis, it is determined whether or not the user has made a transition fromthe outside to the inside (steps S54 and S55). When this is determinedto be “yes,” it is determined that the user to whom the user ID belongshas entered the room (step S56), and “1” is added to the count of thecounter 94 for counting people present in a room.

On the other hand, when the presence of a user is detected by the insidedetector 90 a as a room-exiting detection operation, the detected userID is recorded (steps S61 to S63). Then it is determined whether or notthe presence of the user to whom the detected user ID belongs has beendetected by the inside detector 90 b within a predetermined time. Thatis, it is determined whether or not the user has made a transition fromthe inside to the outside (steps S64 and S65). When this is determinedto be “yes,” it is determined that the user to whom the user ID belongshas exited the room (step S66), and “1” is subtracted from the count ofthe counter 94 for counting people present in a room. With theseoperations, the counter 94 for counting people present in a room is ableto recognize the current number of people present in the office.

The basic storage ratio is then set based on the number of peoplepresent, this number being recognized by the counter 94 for countingpeople present in a room. In the present embodiment, as in theabove-described third embodiment, whether or not to store information inthe storage portion 15 is determined using basic storage ratios that areset based on the basic storage ratio data table 86 shown in FIG. 9, andinformation in which image data and the user ID code are associated isstored in the storage portion 15 as required. In the present embodiment,whether or not to store information in the storage portion 15 isdetermined in the same way as in the above-described third embodiment.

With the present embodiment, even in cases in which equipment isinstalled in numerous departments and common-use locations such asmeeting rooms, reception rooms, laboratories, and the like, the numberof people present in the rooms can be accurately estimated, thusenabling improved monitoring efficiency to be achieved.

Other Embodiments

In the above-described embodiments, the basic storage ratios were setusing the date/time, the number of employees in the office, and thenumber of people present in the room, but it is also possible todetermine whether or not to store information in the storage portion 15by obtaining information concerning the number of currently operatinghost machines (user terminals 2 and 3) that are connected to thenetwork, and using an information storage ratio that is higher for fewercurrently operating host machines. FIG. 14 shows a basic storage ratiodata table for setting the basic storage ratios based on the number ofcurrently operating host machines. Basic storage ratios are registeredin this basic storage ratio data table for monochrome imaging and colorimaging respectively corresponding to “four or more machines,”“two orthree machines,” and “one or no machines” as the number of operatinghost machines. Specifically, the basic storage ratio is set higher for“two or three machines” than for “four or more machines” as the numberof operating host machines, and the basic storage ratio is set higherfor “one or no machines” than for “two or three machines.” In this way,as long as the devices are connected to the network, the number ofpeople in a vicinity can be estimated without any special added system,thus enabling improved monitoring efficiency to be achieved.

Furthermore, when varying the storage ratio in response to the number ofcurrently operating host machines (user terminals 2 and 3) in this way,the storage determination portion 14 d is arranged to obtain informationconcerning the history of image processing requests (image processingrequests from users using a host machine) to the image processing device1 by each host machine connected to the network. The storage ratio usedin the determination operation carried out by the storage determinationportion 14 d is based on the frequency of image processing requests fromcurrently operating host machines other than the host machine that isrequesting image processing, this frequency of image processing requestsbeing recognized from the above-mentioned history information, and thestorage ratio is set higher for lower frequencies of image processingrequests. In other words, when the frequency of image processingrequests from host machines other than the host machine that isrequesting image processing is high, there is a high probability thatthe users of those host machines (host machines not currently requestingimage processing) will subsequently request image processing and move tothe location where the image processing device 1 is installed. That is,the act of these users moving to the location where the image processingdevice 1 is installed acts as a deterrent against unauthorized usage byother users. Therefore, since the probability of unauthorized usageoccurring in this case is low, the storage ratio is set low.Specifically, as stated above, the set storage ratio is adjusted downdepending on the number of currently operating host machines.Conversely, when the frequency of image processing requests from hostmachines other than the host machine that is requesting image processingis low, there is a low probability that the users of those host machines(host machines not currently requesting image processing) willsubsequently request image processing and move to the location where theimage processing device 1 is installed. That is, the situation is suchthat it is difficult for the act of these users moving to the locationwhere the image processing device 1 is installed to be used as adeterrent against unauthorized usage by other users. Therefore, sincethe probability of unauthorized usage occurring in this case is high,the storage ratio is set high. Specifically, as stated above, the setstorage ratio is adjusted up depending on the number of currentlyoperating host machines. By setting the storage ratio in this way, it ispossible to factor in the degree of deterrent against unauthorized usageto the user to derive higher ratios for image data that has a highprobability for unauthorized usage, thus enabling further improvementsin monitoring efficiency to be achieved.

The image processing device 1 in the above-described embodiments servedas a copying machine, a printer, and a scanner. However, there is nolimitation to this in the present invention, and it may also serve as aso-called “PC fax,” which is capable of sending facsimiles from the userterminals 2 and 3. Furthermore, the present invention may be used for animage processing device 1 that is provided with at least one of thesefunctions.

Also, as strictly controlled items, the IC cards or the like in theabove-described embodiments are used with user identificationinformation such as an entered user ID being supplied as it is to theuser ID identification portion 14 a. However, there is no limitation tothis in the present invention, and in order to prepare againstunauthorized usage such as that involving theft of an IC card, it isalso possible to provide the user ID identification portion 14 a with auser verification function that checks the user ID against a passwordentered using the user interface 16 for example, so that only verifiedusers are able to use the functions of the image processing device 1.This makes the match between users and user identification informationsuch as user IDs more reliable. Moreover, for adding a user verificationfunction, it is possible to provide a verification server on the network(for example one which uses a protocol such as LDAP, LightweightDirectory Access Protocol) so that user ID codes and passwords arecentrally managed using the verification server. It should be noted thatit is preferable for the verification server to be provided not onlywith user ID codes and passwords, but also high-level verificationalgorithms, and for functions that can be used to be managed on aper-user basis.

The present invention can be practiced in various other forms withoutdeparting from the sprit or essential characteristics thereof.Therefore, the above embodiments were described in all respects by wayof example only and should not be construed as limiting. The scope ofthe present invention is defined by the appended claims, and is by nomeans restricted to the text of the specification. Furthermore, all thealterations or modifications covered by the scope of the claims andequivalents thereof fall within the scope of the present invention.

1. An unauthorized usage monitoring system for monitoring unauthorizedusage of an image processing device, which performs image processing inresponse to a request for image processing, comprising: anidentification means for identifying a user who requests imageprocessing; a storage means capable of storing information in which theuser identified by the identification means is associated with at leasta portion of the image data for which the user requested imageprocessing; and a determination means for determining whether or not tocarry out information storage to the storage means; wherein thedetermination means uses an information storage ratio that is set basedon a tendency for unauthorized usage of the image processing devicecorresponding to an environmental condition to determine whether or notto carry out information storage to the storage means.
 2. Anunauthorized usage monitoring system for monitoring unauthorized usageof an image processing device, which performs image processing inresponse to a request for image processing, comprising: anidentification means for identifying an ID code of a user who requestsimage processing; a storage means capable of storing information inwhich the ID code of the user identified by the identification means isassociated with at least a portion of the image data for which the userrequested image processing; and a determination means for determiningwhether or not to carry out information storage to the storage means;wherein the determination means uses an information storage ratio thatis set based on a tendency for unauthorized usage of the imageprocessing device corresponding to an environmental condition todetermine whether or not to carry out information storage to the storagemeans.
 3. An unauthorized usage monitoring system for monitoringunauthorized usage of an image processing device, which is configured tobe capable of sending and receiving information to and from a monitoringserver, comprising: an identification means for identifying a user whorequests image processing; a storage means that is provided in themonitoring server and is capable of storing information in which theuser identified by the identification means is associated with at leasta portion of the image data for which the user requested imageprocessing; and a determination means for determining whether or not tocarry out information storage to the storage means; wherein thedetermination means determines whether or not to carry out informationstorage to the storage means with an information storage ratio that isset based on a tendency for unauthorized usage of the image processingdevice corresponding to an environmental condition.
 4. The unauthorizedusage monitoring system for image processing devices according to any ofclaims 1, 2, and 3, wherein the determination means determines whetheror not to carry out information storage to the storage means bycomparing a set information storage ratio with a random number.
 5. Theunauthorized usage monitoring system for image processing devicesaccording to any of claims 1, 2, and 3, wherein the environmentalcondition for setting the information storage ratio is the number ofpeople in a space in which the image processing device is installed, andwherein, in determining whether or not to carry out information storageto the storage means, the determination means uses an informationstorage ratio that is higher for lower numbers of people in the space inwhich the image processing device is installed.
 6. The unauthorizedusage monitoring system for image processing devices according to claim4, wherein the environmental condition for setting the informationstorage ratio is the number of people in a space in which the imageprocessing device is installed, and wherein, in determining whether ornot to carry out information storage to the storage means, thedetermination means uses an information storage ratio that is higher forlower numbers of people in the space in which the image processingdevice is installed.
 7. The unauthorized usage monitoring system forimage processing devices according to any of claims 1, 2, and 3, whereinthe environmental condition for setting the information storage ratio isat least one of a date and a time, and wherein, in determining whetheror not to carry out information storage to the storage means, thedetermination means uses an information storage ratio that is higher fordays and times in which “the tendency for unauthorized usage of theimage processing device” is higher.
 8. The unauthorized usage monitoringsystem for image processing devices according to claim 4, wherein theenvironmental condition for setting the information storage ratio is atleast one of a date and a time, and wherein, in determining whether ornot to carry out information storage to th storage means, thedetermination means uses an information storage ratio that is higher fordays and times in which “the tendency for unauthorized usage of theimage processing device” is higher.
 9. The unauthorized usage monitoringsystem for image processing devices according to any of claims 1, 2, and3, wherein the unauthorized usage monitoring system is installed in anoffice, and wherein, in determining whether or not to carry outinformation storage to the storage means, the determination meansobtains information concerning signing in to and signing out from workat the office, and uses an information storage ratio that is higher forlower numbers of people signed in at the office.
 10. The unauthorizedusage monitoring system for image processing devices according to claim4, wherein the unauthorized usage monitoring system is installed in anoffice, and wherein, in determining whether or not to carry outinformation storage to the storage means, the determination meansobtains information concerning signing in to and signing out from workat the office, and uses an information storage ratio that is higher forlower numbers of people signed in at the office.
 11. The unauthorizedusage monitoring system for image processing devices according to any ofclaims 1, 2, and 3, wherein the unauthorized usage monitoring system isinstalled in an office, and wherein, in determining whether or not tocarry out information storage to the storage means, the determinationmeans obtains information concerning entering and exiting a room at theoffice, and uses an information storage ratio that is higher for lowernumbers of people present in the office.
 12. The unauthorized usagemonitoring system for image processing devices according to claim 4,wherein the unauthorized usage monitoring system is installed in anoffice, and wherein, in determining whether or not to carry outinformation storage to the storage means, the determination meansobtains information concerning entering and exiting a room at theoffice, and uses an information storage ratio that is higher for lowernumbers of people present in the office.
 13. The unauthorized usagemonitoring system for image processing devices according to any ofclaims 1, 2, and 3, wherein the unauthorized usage monitoring system isconnected to an office network, and wherein, in determining whether ornot to carry out information storage to the storage means, thedetermination means obtains information concerning the number ofcurrently operating host machines that are connected to the network, anduses an information storage ratio that is higher for lower numbers ofcurrently operating host machines.
 14. The unauthorized usage monitoringsystem for image processing devices according to claim 4, wherein theunauthorized usage monitoring system is connected to an office network,and wherein, in determining whether or not to carry out informationstorage to the storage means, the determination means obtainsinformation concerning the number of currently operating host machinesthat are connected to the network, and uses an information storage ratiothat is higher for lower numbers of currently operating host machines.15. The unauthorized usage monitoring system for image processingdevices according to claim 13, wherein, the determination means obtainsinformation concerning the history of image processing requests to theimage processing device by host machines connected to the network,recognizes from the history information the frequency of requests forimage processing of currently operating host machines other than thehost machine that is requesting image processing, and uses aninformation storage ratio that is higher for lower frequencies ofrequests for image processing in determining whether or not to carry outinformation storage to the storage means.
 16. The unauthorized usagemonitoring system for image processing devices according to claim 14,wherein, the determination means obtains information concerning thehistory of image processing requests to the image processing device byhost machines connected to the network, recognizes from the historyinformation the frequency of requests for image processing of currentlyoperating host machines other than the host machine that is requestingimage processing, and uses an information storage ratio that is higherfor lower frequencies of requests for image processing in determiningwhether or not to carry out information storage to the storage means.17. The unauthorized usage monitoring system for image processingdevices according to any of claims 1, 2, and 3, wherein color imaging ormonochrome imaging can be selected in the image processing device, andwherein in determining whether or not to carry out information storageto the storage means, the determination means uses an informationstorage ratio that is higher for the times of performing color imagingthan for the times of performing monochrome imaging.
 18. Theunauthorized usage monitoring system for image processing devicesaccording to claim 4, wherein color imaging or monochrome imaging can beselected in the image processing device, and wherein in determiningwhether or not to carry out information storage to the storage means,the determination means uses an information storage ratio that is higherfor the times of performing color imaging than for the times ofperforming monochrome imaging.
 19. A control method that is executed onthe unauthorized usage monitoring system of any of claims 1 to 18,wherein a determination operation is performed in which whether or notto carry out information storage to the storage means is determinedusing an information storage ratio that is set based on a tendency forunauthorized usage of the image processing device corresponding to anenvironmental condition, and wherein a storage operation is performed inwhich information in which a user who requested image processing and atleast a portion of the image data for which image processing wasrequested by that user are associated and stored in the storage meanswhen a determination has been made to carry out information storage tothe storage means.