Method and system for using a selected peripheral of a network

ABSTRACT

Disclosed is a network peripheral access method. A device on a network registers with a server that peripheral access requests of a specific type be directed to a specific peripheral. When the device creates a request of the specified type, rather than sending the request directly to the peripheral, the device sends the request to the server. The server receives the request, associates the request with the peripheral registered for that type of request, and sends the request to the registered peripheral. In an alternate embodiment, the device sends an abbreviated request to the server, the server responds with an access identifier (e.g., a network address) of the registered peripheral, and the device sends the request directly to the registered peripheral. The presence of the server decreases the amount of peripheral-specific configuration information kept on the requesting device.

FIELD OF THE INVENTION

[0001] The invention relates to the use of peripherals of a network.

[0002] In the present text, “peripheral” means any piece of hardwareand/or software which can receive data from, and/or emit data to, acomputer.

[0003] And more precisely, the invention relates to a method forallowing a user having a terminal connected to a network, to select agiven peripheral of the network (i.e. a given peripheral connected tothe network), in order to direct to the peripheral an output requestissued by the computer and to have the peripheral performing a graphicaledition of data corresponding to the output request.

[0004] The invention also concerns a system for implementing such amethod.

[0005] A peripheral as mentioned above must be able to perform agraphical edition of data it can be a printer, but also a facsimile, acomputer screen, a light projector, etc.

BACKGROUND OF THE INVENTION

[0006] A first trend in the field of computer use is that computers andperipherals are widely used in network architectures. Such networkarchitectures are often provided by private or public organizations totheir members, to allow shared access to a number of common resources.

[0007] These networks comprise at least one server to which severalterminals and/or peripherals can be connected.

[0008] A second trend concerns portable laptop computers. Such laptopcomputers have become of common use. They allow increased mobility ofthe users of a network: for example, in the case of a network spreadover several physical premises, a user can connect his laptop computerto the network while being physically located in any one of the premisescovered by the network.

[0009] And instead of a laptop computer, the user can connect to thenetwork with any portable (or even non-portable) terminal comprising anoperating system and connection means to the network.

[0010] Such terminals can be any terminal (computer, but also electronicnotebook or Personal Digital Assistant, etc. . . . ).

[0011] In the present specification, the generic term of “terminal” willthus refer to any device as mentioned above. Preferably, the terminal isportable (even though the invention could be embodied with a fixedterminal).

[0012] In this context of network architecture and increased mobility,it is often desirable for a user to be able to connect his terminal toany given one of several peripherals of a network, for the purpose oftransmitting to the peripheral an electronic output of data, which theuser wishes to graphically edit on the desired peripheral.

[0013] Such graphical edition can result in the printing of a documentif the peripheral has printing means (peripheral is e.g. a printer), orin any other form of graphical edition (edition of the output on thedisplay of the peripheral, projection on a screen of the graphical imageof the file, etc. . . . ).

[0014] To enable the terminal of the user to transmit such output to theselected peripheral, and to enable the peripheral to perform thegraphical edition, the terminal must be configured in accordance to thespecific parameters of the peripheral.

[0015] With known methods and devices, this requires the loading, in theportable computer, of an adapted driver containing said specificparameters of the peripheral.

[0016] It is reminded that a driver is a piece of hardware and/orsoftware which builds a link between a terminal and a peripheral, so asto allow files and/or data to be exchanged between the terminal and theperipheral.

[0017] Thus, if a use e.g. attending a meeting wishes to graphicallyedit a document stored in his terminal on a given peripheral (e.g. aprinter located in the room), the terminal has to be configured inaccordance to the specific parameters of this particular peripheral.

[0018] In the above example, the meeting room might well not correspondto the usual physical environment of the user.

[0019] And typically, the terminal of the user is not always configuredin accordance to the specific parameters of the desired peripheral.

[0020] In such a case, to actually perform the graphical edition, theuser has to load in his terminal the driver corresponding to the desiredperipheral.

[0021] To allow the user to output data from his terminal to anyperipheral of the network, a first possible solution would then be toload all the corresponding peripheral drivers in the terminal memory.

[0022] But this would rapidly become burdensome and complex to manage(the fleet of peripherals being not static, the drivers should thereforebe regularly updated) especially in the case of a large network having alarge number of possible peripheral) for a terminal connected to thenetwork.

[0023] Furthermore, this would lead to an unjustified load in theterminal memory.

[0024] Another solution could then be to load a driver only when thecorresponding peripheral is needed.

[0025] Yet, it is sometimes difficult to find the right driver at therequired moment, especially in “real time” (during a meeting forexample.) Moreover, the loading of the driver is in any case a timeconsuming and burdensome operation.

[0026] Thus, it appears that there is a need for a solution allowing auser to select any desired peripheral of a network, and output data tothis peripheral from the user's terminal.

SUMMARY OF THE INVENTION

[0027] It is an object of the invention to enable a user having datastored in a terminal to have data output requests to be directed to andexecuted by a selected peripheral of a network, this being achievedwithout bearing the above mentioned drawbacks.

[0028] It is another object of the invention to fully use the featuresof some of the state-of-the-art peripherals, in particular of some ofthe state-of-the-art printers.

[0029] Thus, and as will be explained in more details below, it ispossible for a user to select any desired peripheral connected to anetwork, and to output data memorized in his terminal on this selectedperipheral without bearing the above mentioned drawbacks associated tothe known techniques.

[0030] And as will be explained below, the implementation of theinvention only requires a minimum installation of additional software onthe user's terminal (even none for some embodiments of the invention).

BRIEF DESCRIPTION OF THE DRAWINGS

[0031]FIG. 1 is a schematic representation of a network for implementingthe invention, network to which a number of peripherals and/orcomputers, and at least a user terminal and a server are connected;

[0032]FIG. 2 is a diagram of the main steps performed by the methodaccording to the invention—this diagram containing differentalternatives which can be selected by a user to implement the invention;

DETAILED DESCRIPTION OF THE INVENTION

[0033] A schematic representation of a network 1—for instance a networkof a public or private organization—is shown in FIG. 1.

[0034] The network 1 comprises a main branch 10 connecting a server S todifferent elements through side branches—referred by numbers from 11 to14. The server S has memory means associated to it. The server Soperates the network 1.

[0035] These elements include a terminal T connected to the server Sthrough the side branch 11 and the main branch 10.

[0036] The other elements include:

[0037] two peripherals P1, P2 which are connected to the server Sthrough the respective side branches 12 and 14 and the main branch 10 ofthe network 1,

[0038] as well as an additional terminal—which can be a computer Cconnected to the server S through the side branch 13 and the main branch10.

[0039] The network 1 may comprise private and/or public parts (includingparts of the internet.) All the elements of the network 1 can bespatially gathered within a same building, or scattered across differentpremises.

[0040] The network can comprise a large number of branches, as well as alarge number of connected peripherals (the simplified example of FIG. 1showing only two peripherals for clarity).

[0041] The specific “shape” of the network is of course not a specificfeature of the invention. The very schematic drawing of FIG. 1 is notlimitative in that regard.

[0042] In FIG. 1, a user U is also represented. The terminal T belongsto the user U, and is personal to him (which means that the user knows asecret code to start a session with the terminal and use it).

[0043] Moreover, an information identifying the user can be memorized ina first table of the memory means of the server S, in association withan information identifying the terminal. Thus, the memory means of theserver have the information that the user U is associated with theterminal T.

[0044] And the terminal T is known from the server S.

[0045] According to the invention, the terminal T of the user U ispermanently configured to direct its output requests for a graphicaledition to the server S.

[0046] The server S is thus known by the terminal T as its dedicatedperipheral, and none of the respective drivers of peripherals P1 or P2has to be loaded in the memory of the terminal.

[0047] As will appear below, the user U will nevertheless be able todirect output requests from its terminal T to any desired peripheral ofthe network (i.e., in the present example to either P1 or P2), and thiswithout reconfiguraton of his terminal or loading in the terminal of aspecific driver for the desired peripheral.

[0048] The server S may be integrated within a printer so as to be atthe same time a server and a printer, or not. Some state of the artprinters indeed are now configured to be at the same time a server S.Informations about such printers can be found e.g. athttp://www.hp.ccm/products1/embedded/whatischai.html.

[0049] The server S can also be integrated into any type of peripheral,in particular a peripheral able to perform a graphical edition It can bee.g. a projector, a copier, or a monitor or TV.

[0050] Typically, the server S can be such a state of the art printer,and be the usual office printer of the user.

[0051] Starting from a situation where the user U wishes to perform agraphical edition from his terminal to, say, the peripheral P1, it willnow be described how the invention allows such graphical edition to beactually performed by P1.

[0052] Of course, the following description would also apply whateverperipheral of the network (P2, or any other if available) the userwishes to select to perform his graphical edition.

[0053] In the following example, the peripheral P1 is a printer. Itcould be any other type of peripheral as mentioned above.

[0054] As will appear in the present text, the invention can beimplemented in two main different modes.

[0055] More specifically, and in reference to FIG. 2, some details willbe given on the steps of the method according to the invention, FIG. 2showing the two main modes which can be chosen by the user to implementthe invention.

[0056] In 21, the user chooses a selection mode for selecting a desiredperipheral which is to execute the output requests that will begenerated by the terminal T when the terminal T is connected to thenetwork 1.

[0057] Indeed, there are two main selection modes that can be offered tothe user, these two selection modes corresponding to the two main modesof the invention.

[0058] Description of a First Embodiment

[0059] The user can choose to select the peripheral P1 “locally”, i.e.through a selection action which is physically directly executed on P1.

[0060] In this first mode of selection, the terminal T does not have tobe connected to the network at the time of selection of a peripheral.

[0061] On the other hand, this first selection mode requires that P beassociated with an identification device, as will be explained below.

[0062] If in step 22 the user selects this first mode, the sequence 22of steps 221 to 223 shall be executed.

[0063] In 221, the user provides the selected peripheral P1 withidentification information relative to the user and/or to the terminal,by a direct input on the identification device associated to P1.

[0064] An identification relative to the user can be e.g. a string ofcharacters which is personally associated to the user.

[0065] An identification relative to the terminal can be e.g. a serialnumber, or any number associated to the terminal. It is specified thatthe “association” between P1 and its identification device means thatthe identification device is dedicated to P1—or can be selectivelydedicated to P1.

[0066] The identification device P1ID can be of any type, such as forexample:

[0067] a keypad for allowing the user to enter one or moreidentification code(s),

[0068] a sensor able to sense a biometry information specific to theuser. Such a sensor can be able to characterize a physical feature ofthe user such as his fingerprints, voice, eye, etc. . . .

[0069] a card reader for reading the identification informationcontained in a card personal to the user (card with a microchip whichcan be read with an electrical contact, or through contactless meanssuch as e.g. a radiowave reader or an infrared reader of theidentification device),

[0070] an infrared receiver for receiving identification informationwhich have been beamed by the user from a device personal to the userand having an infrared port (such as a portable telephone, a personaldigital assistant . . . ), using e.g. the keypad of said personaldevice,

[0071] etc. . . . any identification means can be used in theidentification device.

[0072] More generally, the identification device P1ID can comprise anymeans allowing unambiguous identification of the user and/or of theterminal.

[0073] Indeed, the role of P1ID is to receive an identificationinformation of the user and/or the terminal T, and to transmit it to theserver S (step 222), together with an information identifying theselected peripheral P1. To do this, P1ID is connected to the network 1,via the peripheral P1 for instance.

[0074] The information identifying the peripheral can be, e.g. thenetwork address of the peripheral in network 1. It can be expressed as aURL (Universal Resource Locator), or as a IP (Internet Protocol)address.

[0075] As said above, the identification information entered into theidentification device is specific to the user, and/or to the terminal.

[0076] Indeed, the purpose of the identification step performed in 221is to update a second table of the memory means of the server S, saidsecond table associating each terminal which is known by the server toone of the peripherals of the network, for the purpose of redirectingoutput requests from a given terminal to the associated peripheral.

[0077] This update operation corresponds to step 223.

[0078] If the information provided to the identification device onlyallows identification of the user, step 223 will comprise the followingsubsteps:

[0079] the server S receives the information identifying the user,

[0080] the server S scans a reference table of its memory means to checkthat the received information corresponds to a declared user,

[0081] the server S scans the first table of its memory means todetermine which is the terminal associated to the identified user, andretrieves from this first table an information identifying the terminalT,

[0082] the server S updates the second table of its memory means,associating in this second table the information identifying theterminal T with the peripheral P1.

[0083] In the above case (the information provided to the identificationdevice only allows identification of the user) an informationidentifying the user must be memorized in the above-mentioned firsttable of the memory means of the server S, in association with aninformation identifying the terminal.

[0084] If the information provided to the identification device allowsidentification of the terminal (e.g. the user has entered on a keyboardof the identification device of P1 a code associated to the terminal Tor has fed into this device a smartcard with information identifying T),step 223 will only comprise the updating by the server S of the secondtable of its memory means.

[0085] The first and second tables can form a single table in the memorymeans of the server S.

[0086] And in the case where the information provided to theidentification device directly allows identification of the terminal,the first table is not necessary.

[0087] The identification device P1ID can be physically integrated intothe peripheral P1 (with a physical input interface accessible to theuser for allowing him to enter the identification information). P1 canbe e.g. a printer with an integrated identification device.

[0088] The identification device P1ID can also be physically separatedfrom the peripheral P1.

[0089] In this case, either:

[0090] the identification device is exclusively dedicated to P1 (andpossibly bears a visual sign indicating this to the user),

[0091] or the identification device can be associated with a number ofdifferent peripherals, but comprises means to allow the user to selectone of these peripherals before entering the information identifying theuser and/or his terminal. The identification device will then send tothe server, along with said information identifying the user and/or histerminal, an information identifying the selected peripheral.

[0092] After steps 221 to 223, step 24 (described further in this text)shall be executed.

[0093] Description of a Second Embodiment

[0094] If now the user chooses in 21 the second mode for selecting aperipheral, the sequence 23 of steps 231 to 233 shall be executed.

[0095] This second mode can be chosen in particular if the user wants toselect a peripheral which is not associated to any identification device(e.g. classical standard printer).

[0096] In step 231, the user connects its terminal to the network 1 forestablishing a connection between the terminal T and the server S.

[0097] This connection can have been already established—it is possiblethat the terminal has been connected even before initial step 21.

[0098] The connection to the server through the network 1 can bereplaced by a connection through any network common to the terminal andto the server S. It is thus possible that the network 1 is e.g. aprivate intranet, and the network used in step 231 is another network,e.g. the internet.

[0099] In step 232, once the terminal T has been connected to the serverS through a network and a network session has been initiated between Tand S, the user sends to the server S:

[0100] information identifying the selected peripheral P1, indicatingthat P1 is the peripheral to which output requests issued from theterminal T must be directed,

[0101] as well as an information identifying the terminal itself. Thisinformation can have been already stored by the server at the initiationof the network session between the terminal and the server.

[0102] To perform steps 231 and 232, the user can browse a resource listfrom a display imported on his terminal screen from the server S toselect the desired peripheral.

[0103] Such a list can be logically organized and visually presented tothe user, in different ways.

[0104] A possible solution for this would be to have the display of thedifferent peripherals which can be selected by the user be organized asa “geographical” representation of the actual spatial distribution ofthe peripherals across the network.

[0105] In this case, the display of the list would represent thedifferent buildings covered by the network 1, and prompt the user forselecting one of these buildings.

[0106] Then the display could show the user a representation of thechosen building with its different areas, floors, etc. . . . And hereagain, the user would be prompted to choose one of these.

[0107] Finally, the display could show the different rooms availablewithin the chosen area/floor, and indicate which peripherals can beselected within these rooms. The user would be prompted again forchoosing a peripheral.

[0108] For avoiding any ambiguity on the peripheral to be selected, thedisplay could even show an image (e.g. a picture) of the selectedperipheral, said picture representing the peripheral in its realphysical environment (in the room).

[0109] This would constitute a very ergonomic and natural interfacemeans for guiding the user in order to help him select the rightperipheral next to him, or anywhere in the network (the user might wantto select e.g. his own printer located in his office, while he is awayfrom his office).

[0110] And the number of successive displays offering “zooms” atdifferent levels of detail, on different parts of the network, can beadapted.

[0111] Other types of representation of the peripherals of the networkcan of course be used.

[0112] In step 233, the server S updates the second table of its memory,as in step 223 described in reference to the first mode. Steps 223 and233 are thus equivalent.

[0113] Step 24 globally represents the redirecting of the outputrequests issued by the terminal T to the selected peripheral P1.

[0114] For the execution of this step, the terminal of the user must beconnected to the network 1.

[0115] Such connection to the network 1 can have been established fromthe beginning of the process, before the choice of a selection mode bythe user. In some cases, we have seen that the terminal had to beconnected to the server through a network—and possibly through thenetwork 1—in order that the server receives the information identifyingthe selected peripheral for the terminal T.

[0116] In any case, if the terminal is not connected to the network 1yet (in particular in the first embodiment described above), suchconnection must be established before step 24.

[0117] An “output request” as generated by the terminal basicallycomprises:

[0118] an information identifying the emitter of the request (i.e. theterminal in the present case),

[0119] information defining the data to be edited on a peripheral (i.e.data content and arrangement, in the form e.g. of a data file),

[0120] as well as parameters concerning the graphical edition (printingor other) to be performed.

[0121] At this stage, the server has memorized an information thatassociates the terminal T with the peripheral P1.

[0122] And as said before, S is the declared peripheral in the terminal:all output requests generated by the terminal should then in the firstplace be directed to the server S.

[0123] Step 25 can be executed in different ways, to redirect suchrequests to the selected peripheral P1.

[0124] Redirecting of Output Requests

[0125] Step 24 is executed either after steps 221 to 223 or after steps231 to 233.

[0126] A first way to execute step 24 is to have the server S simplyreceiving the output requests coming from the terminal T and thenrerouting them to the selected peripheral P1.

[0127] To do this, the server S uses the second table of its memorymeans. When receiving an output request from the network 1, the server Sscans said second table to determine which peripheral is associated withthe terminal having generated the output request (the server S receivesin the output request an information identifying the terminal T).

[0128] Once this peripheral is determined, the server knows the networkaddress of this selected peripheral (said network address beingpreferably used in the second table to identify the peripheral, andbeing in any case memorized in association with the informationidentifying the peripheral if this identifying information is adifferent one).

[0129] The network address can be e.g. a IP address, an U.R.L. or ae-mail address.

[0130] Then, the server can reroute the output request received from theterminal T to the selected peripheral P1.

[0131] The above implies that an application software for managinggraphical output requests is implemented on the server S.

[0132] It is specified that the “server” S is a server in the broadmeaning.

[0133] The server S can be any device having a network address in thenetwork 1. It can be for example a state of the art printer as mentionedabove, and in this case it does not need any additional software formanaging graphical output requests.

[0134] It can also be another type of device such as a personalcomputer—in this case a specific piece of software for managing theoutput requests must be implemented on the server S.

[0135] According to this first way of executing step 24, the outputrequest (including the content of the data to be edited) is received bythe server S, and then rerouted by the server to the selected peripheralP1.

[0136] Such rerouting of the output requests allows the user to have anyperipheral of the network execute an output request, while:

[0137] the only one and same item is declared in the terminal as beingthe recipient of the output requests (the “print queue” in the terminalcontains only the server S), and

[0138] no special configuration of the terminal is required - noinstallation of any plug-in or hardware connection: the terminal can beof any standard type (e.g. a standard laptop computer).

[0139] According to a second way to execute step 24, the user's terminalT does not allow the direct sending of a full output request to theserver S when the user enters on his terminal a command to output dataon the selected peripheral.

[0140] Instead, when the user enters such a command the followingoccurs:

[0141] a plug-in which has been installed on the terminal builds amessage to be sent to the server through the network 1, said message:

[0142] containing an information identifying the terminal T, and

[0143] requesting a network address for sending to such an address theactual and full output request (including the data to be edited). Butthe actual output request is not sent to the server S,

[0144] the plug-in sends this message to the server through the network1,

[0145] when receiving this message from the terminal T, the server Sscans the second table in its memory means, to determine whichperipheral is associated to the terminal T. It is recalled that apreferred information for identifying the selected peripheral in thesecond table is the network address of the peripheral, and that ifanother type of identifying information is used to identify the selectedperipheral, the server S nevertheless knows the network address of allperipherals, and is thus able to send back to the terminal T the networkaddress of the peripheral associated to the terminal,

[0146] the plug-in then receives from the server—always through thenetwork 1—the network address of the selected peripheral,

[0147] the plug-in builds a full output request directed to the networkaddress received from the server S—i.e. to the selected peripheral P1and sends it to this address.

[0148] Thus, the request will be executed by the selected peripheral P1.

[0149] This second way to execute step 24 corresponds to a “peer topeer” approach. It avoids unnecessary loading of the network 1 with thetransfer of full output requests, including the data to be edited. It isthus advantageous especially for the redirecting of requests concerninglarge data files.

[0150] According to a third way to execute step 24, another type ofplug-in is implemented in the user's terminal. This plug-in does notallow the direct sending of a complete output request to the server Swhen the user enters on his terminal a command to output data on theselected peripheral, as in the second way described above.

[0151] Instead, the following occurs:

[0152] the plug-in builds a message to be sent to the server through thenetwork 1, said message containing an information identifying theterminal T and all information necessary to build the full outputrequest (including the data to be edited). This message is built by theplug-in as an e-mail,

[0153] the plug-in sends this e-mail to the server S, through thenetwork 1,

[0154] the server, when receiving the e-mail, extracts from the e-mailthe information identifying the terminal T

[0155] the server S then scans the second table in its memory means, asin the second way of executing step 24 described above. The server Sthus identifies the network address of the selected peripheral P1,

[0156] the server S then builds another e-mail, directed to P1, andcontaining all information for executing the output request, (includingall necessary data)

[0157] the selected peripheral has means to extract the request whenreceiving the email from the server, extracts it and executes it.

[0158] This third way of executing step 24 is specially well adaptedwhen the server S is distant from the terminal and/or from the selectedperipheral, and when there is between them a network firewall preventingthe server to receive full output requests.

[0159] It can be implemented using classical protocols for transferringe-mails, such as SMTP (Simple Mail Transfer Protocol), with e.g. POP3servers.

[0160] In this third way, the output request is “hidden” from thefirewall within the exchanged e-mails and is thus not stopped by thenetwork firewall on its way to the server, all data necessary to buildthe full output request and to perform the graphical edition of the databeing included in these e-mails.

[0161] All the embodiments can also comprise a step of encryption of thedata or the identifying information. The relevant pieces of software orplug-ins are thus implemented in the Server S and/or terminal T.

[0162] In its different embodiments, the invention allows a user toselect any peripheral of a network for performing a graphical edition ofdata.

[0163] The invention provides a flexible and powerful solution for usingvarious resources of a network.

[0164] And as seen above, it can be implemented with no, or minimum,software adaptation of standard terminals (e.g. laptops) and printers(see the second mode described above).

What is claimed is:
 1. A method for enabling a user to select and use aperipheral connected to a network operated by a server for the purposeof having the selected peripheral execute data output requests emittedby a terminal of the user connected to the network, the peripheral beingselected by the user from a plurality of peripherals connected to thesame network, wherein said terminal of the user is permanentlyconfigured to the parameters of the server, so as to direct in the firstinstance the output requests generated by the terminal to the server,the user sends to the server an information identifying the selectedperipheral, together with an information identifying the user and histerminal, the server updates a table of memory associated to the server,to associate the terminal of the user to the selected peripheral, sothat subsequent output requests generated by the terminal of the usershall be directed by the server to the selected peripheral.
 2. A methodaccording to claim 1, wherein the user indicates to the server theselected peripheral on an identification device associated to theperipheral.
 3. A method according to claim 2, wherein the identificationdevice is selectively associated to the peripheral.
 4. A methodaccording to claim 1, wherein the user indicates to the server theselected peripheral on a display of his terminal, a network connectionbeing established between the terminal and the server.
 5. A methodaccording to claim 1, wherein the information identifying the peripheralcan be the network address of the peripheral.
 6. A method according toclaim 1, wherein memory means of the server comprise two tables,including a first table listing all the users and all the terminalsassociated to the users, and a second table listing all the associationsof the terminals or users with the selected peripherals.
 7. A methodaccording to claim 6, wherein the two tables are gathered in a singletable.
 8. A method according to claim 2, wherein: the user provides theselected peripheral with identification information relative to the userand/or to the terminal, by a direct input on the identification deviceassociated to the peripheral; the device transmits to the server theidentification information, together with an information identifying theselected peripheral; the server updates said table of a memoryassociated to the server associating each terminal which is known by theserver to one of the peripherals of the network, for the purpose ofredirecting output requests from a given terminal to the associatedperipheral.
 9. A method according to claim 8, wherein the update of thetable in the server comprises the step of updating the association ofthe given terminal to associate the terminal to the selected peripheral.10. A method according to claim 2, wherein the identification devicecomprises a keypad for allowing the user to enter one or moreidentification code(s).
 11. A method according to claim 2, wherein theidentification device comprises a sensor able to sense a biometryinformation specific to the user.
 12. A method according to claim 2,wherein the identification device comprises a card reader for readingthe identification information contained in a card personal to the user13. A method according to claim 2, wherein the identification devicecomprises an infrared receiver for receiving identification informationwhich have been beamed by the user from a device personal to the userand having an infrared port.
 14. A method according to claim 2, whereinthe identification device allows the identification of the user.
 15. Amethod according to claim 2, wherein the identification device allowsthe identification of the terminal.
 16. A method according to claim 14,wherein the server receives the information identifying the user, theserver scans a reference table of its memory means to check that thereceived information corresponds to a declared user, the server scansthe first table of its memory means to determine which is the terminalassociated to the identified user, and retrieves from this first tablean information identifying the terminal, the server updates the secondtable of its memory means, associating in this second table theinformation identifying the terminal with the peripheral.
 17. A methodaccording to claim 15, wherein the server receives the informationidentifying the user, the server scans a reference table of its memorymeans to check that the received information corresponds to a declareduser, the server updates the second table of its memory means,associating in this second table the information identifying theterminal with the peripheral.
 18. A method according to claim 14,wherein The terminal sends an information identifying the selectedperipheral, indicating that said peripheral is the peripheral to whichoutput requests issued from the terminal must be directed, The terminalsends as well an information identifying the terminal itself.
 19. Amethod according to claim 18, wherein the user can browse a resourcelist from a display imported on his terminal screen from the server, toselect the desired peripheral.
 20. A method according to claim 19,wherein the list of peripherals is organized as a geographicalrepresentation of the actual spatial distribution of the peripheralsacross the network.
 21. A method according to claim 19, wherein the listof peripherals is organized to show the different rooms available withinthe chosen area and/or floor, and indicate which peripherals can beselected within these rooms.
 22. A method according to claim 21, whereinthe displays shows an image of the peripheral in its physicalenvironment.
 23. A method according to claim 18, wherein the serverreceives the information identifying the user, the server scans areference table of its memory means to check that the receivedinformation corresponds to a declared user, the server scans the firsttable of its memory means to determine which is the terminal associatedto the identified user, and retrieves from this first table aninformation identifying the terminal, the server updates the secondtable of its memory means, associating in this second table theinformation identifying the terminal with the peripheral.
 24. A methodaccording to claim 1, wherein the server is comprised in a printer. 25.A method for enabling a user to select and use a peripheral connected toa network operated by a server for the purpose of having the selectedperipheral execute data output requests emitted by a terminal of theuser connected to the network, the peripheral being selected by the userfrom a plurality of peripherals connected to the same network, thisselection updating a table comprised in memory means of the server, thistable containing the associations of the terminal and the peripheralswherein when receiving an output request from the network, the serverscans said table to determine which peripheral is associated with theterminal having generated the output request, the server rerouting thenthe output request received from the terminal, to the selectedperipheral.
 26. A method for enabling a user to select and use aperipheral connected to a network operated by a server for the purposeof having the selected peripheral execute data output requests emittedby a terminal of the user connected to the network, the peripheral beingselected by the user from a plurality of peripherals connected to thesame network, this selection updating a table comprised in memory meansof the server, this table containing the associations of the terminaland the peripherals wherein the user's terminal does not allow thedirect sending of a full output request to the server when the userenters on his terminal a command to output data on the selectedperipheral.
 27. A method according to claim 26, wherein when the userenters a command of output, the following steps occur: a plug-in whichhas been installed on the terminal builds a message to be sent to theserver through the network, said message: containing an informationidentifying the terminal, and requesting a network address for sendingto such an address the actual and full output request the server scansthe table in his memory means, to determine which peripheral isassociated to the terminal, using the network address of the peripheralas an information for identifying the selected peripheral the serversends back to the terminal the network address of the peripheralassociated to the terminal, the plug-in then receives the networkaddress of the selected peripheral, the plug-in builds a full outputrequest directed to the network address received from the server andsends it to this address.
 28. A method according to claim 26, whereinwhen the user enters a command of output, the following steps occur: aplug-in which has been installed on the terminal builds a message to besent to the server through the network, said message containing aninformation identifying the terminal and all information necessary tobuild the full output request, said message being built by the plug-inas an e-mail, the plug-in sends this e-mail to the server through thenetwork, the server, when receiving the e-mail, extracts from the e-mailthe information identifying the terminal, the server then scans thetable in its memory means, to determine which peripheral is associatedto the terminal, using the network address of the peripheral as aninformation for identifying the selected peripheral, the server thenbuilds another e-mail, directed to the peripheral, and containing allinformation for executing the output request, the selected peripheralhaving means to extract the request when receiving the e-mail from theserver, extracting it and executing it.
 29. A method according to claim28, wherein the peripheral and/or the server and/or the terminal havemeans to operate classical protocols for transferring e-mails, such asSMTP (Simple Mail Transfer Protocol).
 30. A method according to any ofclaim 25, wherein it comprises a step of encryption of the data to beoutput.
 31. A method according to any of claim 26, wherein it comprisesa step of encryption of the data to be output.