Image forming system, image forming apparatus, and image forming method

ABSTRACT

An image forming apparatus that executes a password-protected job includes a function for omitting an input of a job password, manages a user password for keyboard authentication in association with a user, manages a personal identification number for icon authentication in association with the user, accepts login to an account of the user based on the keyboard authentication, permits execution of a password-protected print job associated with the user based on a print instruction without inputting a job password, accepts login to the account of the user based on the icon authentication, and permits execution of a password-protected print job associated with the user based on a print instruction with an input of a job password.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims the benefit of, U.S.patent application Ser. No. 16/148,753 filed Oct. 1, 2018, which claimspriority to Japanese Patent Application No. 2017-196455 filed Oct. 6,2017, which applications are hereby incorporated by reference herein intheir entireties.

BACKGROUND Field

The present disclosure relates to an image forming apparatus that formsan image on a sheet. The image forming apparatus is used as a facsimile(FAX) machine, a copying machine, a printer, and the like.

Description of the Related Art

An image forming apparatus, such as a printer, has been known as anapparatus for forming an image (printing) on a sheet. One function ofthe image forming apparatus is a hold printing function in which printdata is stored in advance and printing is started in response to a printinstruction from a user is known (Japanese Patent Application Laid-OpenNo. 2013-240929). The image forming apparatus discussed in JapanesePatent Application Laid-Open No. 2013-240929 includes a userauthentication function in which the input of a job password for a jobpassword-protected print job for an authenticated user can be omitted.

In the image forming apparatus discussed in Japanese Patent ApplicationLaid-Open No. 2013-240929, only a simple classification, such as anauthenticated or unauthenticated state, is used for a userauthentication state. However, recently, the office environment in whichimage forming apparatuses are located has been complicated. In addition,it is common to set a plurality of user authentication levels.Accordingly, it is preferable for each image forming apparatus to beable to deal with a plurality of levels of authentication states.Allowing the omission of a job password in an authentication state witha low authentication level leads to a deterioration in security.Therefore, it is preferable to appropriately make a job passwordomission setting depending on the authentication level.

SUMMARY

In view of the above, the present disclosure is directed to an imageforming apparatus that makes a job password omission setting dependingon a plurality of authentication methods.

According to an aspect of the present disclosure, an image formingapparatus that executes a password-protected job to permit execution ofprinting based on an input of a job password and is configured to permitthe execution of the password-protected job based on a specificcondition without inputting a job password includes at least one memorythat stores a set of instructions, and at least one processor thatexecutes the instructions to manage a first password used for firstauthentication processing in association with a specific user account,manage a second password used for second authentication processing inassociation with a specific user account, accept login to the specificuser account based on the first authentication processing, permitexecution of a password-protected print job associated with the specificuser account based on a print instruction without inputting a jobpassword, accept login to the specific user account based on the secondauthentication processing, and permit execution of a password-protectedprint job associated with the specific user account based on a printinstruction with an input of a job password.

Further features will become apparent from the following description ofexemplary embodiments with reference to the attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a block diagram illustrating a configuration of a printingsystem according to a first exemplary embodiment. FIG. 1B is a sequencediagram illustrating a use case 1 of the printing system according tothe first exemplary embodiment. FIG. 1C is a sequence diagramillustrating a use case 2 of the printing system according to the firstexemplary embodiment.

FIG. 2A is a block diagram illustrating a hardware configuration of animage forming apparatus. FIG. 2B is a block diagram illustrating asoftware configuration of the image forming apparatus.

FIG. 3A is a block diagram illustrating a hardware configuration of apersonal computer (PC). FIG. 3B is a block diagram illustrating asoftware configuration of the PC.

FIG. 4A is a diagram illustrating a configuration of print data. FIG. 4Bis a diagram illustrating a bibliographic information table. FIG. 4C isa diagram illustrating a user management table. FIG. 4D is a diagramillustrating a main body setting table.

FIG. 5A is a diagram illustrating an authentication screen. FIG. 5B is adiagram illustrating a function selection screen. FIG. 5C is a diagramillustrating a job list screen.

FIG. 6A is a diagram illustrating an authentication setting screen. FIG.6B is a diagram illustrating a setting screen using a personalidentification number. FIG. 6C is a diagram illustrating a personalidentification number setting screen.

FIG. 7A is a diagram illustrating a password omission screen A. FIG. 7Bis a diagram illustrating a password omission screen B. FIG. 7C is adiagram illustrating a password omission screen C.

FIG. 8 is a diagram illustrating a screen transition.

FIG. 9A is a flowchart illustrating print data transmission processing.FIG. 9B is a flowchart illustrating print data reception processing.

FIG. 10 is a flowchart illustrating operation reception processing.

FIG. 11A is a flowchart illustrating printing processing. FIG. 11B is aflowchart illustrating password necessity determination processing.

FIGS. 12A and 12B are tables each illustrating a relationship betweenauthentication levels and various settings according to the firstexemplary embodiment.

FIG. 13A is a block diagram illustrating a configuration of a printingsystem according to a second exemplary embodiment. FIG. 13B is asequence diagram illustrating a use case 1 of the printing systemaccording to the second exemplary embodiment. FIG. 13C is a sequencediagram illustrating a use case 2 of the printing system according tothe second exemplary embodiment.

FIG. 14A is a diagram illustrating a user management table according tothe second exemplary embodiment. FIG. 14B is a table illustrating mainbody setting items according to the second exemplary embodiment.

FIG. 15 is a flowchart illustrating operation reception processingaccording to the second exemplary embodiment.

FIG. 16A is a block diagram illustrating a configuration of a printingsystem according to a third exemplary embodiment. FIG. 16B is a sequencediagram illustrating a use case 1 of the printing system according tothe third exemplary embodiment. FIG. 16C is a sequence diagramillustrating a use case 2 of the printing system according to the thirdexemplary embodiment.

FIG. 17 is a diagram illustrating a user management table according tothe third exemplary embodiment.

DESCRIPTION OF THE EMBODIMENTS

Configurations for implementing the present disclosure will be describedin detail below based on exemplary embodiments and the accompanyingdrawings. The scope of the present disclosure is not limited to theconfiguration described in the exemplary embodiments. Part or all of theconfiguration can be replaced with equivalents as long as similareffects can be obtained.

<Printing System>

In a first exemplary embodiment, a printing system including an imageforming apparatus that performs printing using print data transmittedfrom an external apparatus will be described. FIG. 1A is a block diagramillustrating a configuration of a printing system according to the firstexemplary embodiment. FIG. 1B is a sequence diagram illustrating a usecase 1 of the printing system according to the first exemplaryembodiment. FIG. 1C is a sequence diagram illustrating a use case 2 ofthe printing system according to the first exemplary embodiment.

As illustrated in FIG. 1A, a printing system 100 (image forming system)includes a personal computer (PC) 101 and an image forming apparatus102. The PC 101 and the image forming apparatus 102 are communicablyconnected with each other via a local area network (LAN) 103.

The PC 101 is an information processing apparatus that transmits printdata to the image forming apparatus 102. The PC 101 can be replaced by adevice (e.g., a mobile terminal or another image forming apparatus)other than a personal computer. The image forming apparatus 102 is animage forming apparatus that forms an image on a sheet based on theprint data. In the printing system 100, the image forming apparatus 102receives the print data, which is generated and transmitted by the PC101, and performs printing based on the print data. The printing system100 supports secure printing (password-protected job). Morespecifically, the PC 101 transmits the print data to which a jobpassword is set, and the image forming apparatus 102, by a userinputting the corresponding job password, can perform printing based onthe print data.

The image forming apparatus 102 includes an authentication function andprovides a user with various functions based on an authentication level(authentication state). FIGS. 12A and 12B are tables each illustratingrelationships between authentication levels and various settingsaccording to the first exemplary embodiment. As illustrated in FIGS. 12Aand 12B, the image forming apparatus 102 includes a plurality ofauthentication methods and setting items for authentication. Examples ofthe plurality of authentication methods include keyboard authenticationand icon authentication as described in detail below. In the presentexemplary embodiment, a plurality of authentication levels is allocatedbased on the authentication method, and the authentication levelallocated to the keyboard authentication is higher than theauthentication level allocated to the icon authentication. As describedabove, the image forming apparatus 102 provides the user with functionsbased on the authentication level. Accordingly, in the printing system100, as illustrated in FIGS. 1B and 1C, the image forming apparatus 102is used differently according to each use case.

The use case 1 will be described with reference to FIG. 1B. In the usecase 1, in step S111, information indicating that a password omissionsetting for keyboard authentication is ON and a password omissionsetting for icon authentication is OFF is preliminarily set in the imageforming apparatus 102. In step S112, a user A logs into the PC 101 andissues an instruction to enter a password-protected print job. In stepS113, the PC 101 generates password-protected print data, and in stepS114, the PC 101 transmits the generated password-protected print datato the image forming apparatus 102. In step S115, the image formingapparatus 102 upon receiving the print data, registers the print job.Then, in step S116, the user A performs keyboard login to the imageforming apparatus 102 and selects a print function, and then, in stepS117, the image forming apparatus 102 displays a job list for the loggedin user. In step S118, the user A selects a password-protected print jobfrom the job list and performs a print instruction. In step S119, theimage forming apparatus 102 omits job password input processing based onthe setting in step S111. In step S120, printing based on the print datais started.

The use case 2 will be described with reference to FIG. 1C. In the usecase 2, in step S151, information indicating that the password omissionsetting for keyboard authentication is ON and the password omissionsetting for icon authentication is OFF is preliminarily set in the imageforming apparatus 102. In step S152, the user A logs into the PC 101 andissues an input instruction to input a password-protected print job. Instep S153, the PC 101 generates password-protected print data, and instep S154, the PC 101 transmits the generated password-protected printdata to the image forming apparatus 102. In step S155, the image formingapparatus 102 registers, upon receiving the print data, the print job.Then, in step S156, the user A performs icon login to the image formingapparatus 102 and selects the print function. Then, in step S157, theimage forming apparatus 102 displays the job list for the logged inuser. In step S158, the user A selects the password-protected print jobfrom the job list and issues a print instruction. In step S159, theimage forming apparatus 102 requests the user to input a job passwordaccording to the setting in step S151. In step S160, the user inputs thejob password in response to the request, and in step S161, printingbased on the print data is started.

A combination of alphanumeric characters is used as character types fora user password used for keyboard authentication, while a combination ofnumbers is used as character types for a personal identification numberused for icon authentication. A minimum number of characters for a userpassword used for keyboard authentication is eight (the minimum numberof characters that can be set for a user password used for keyboardauthentication is eight), while a minimum number of characters for apersonal identification number used for icon authentication is four (theminimum number of characters that can be set for a personalidentification number used for icon authentication is four). In thisway, a personal identification number used for icon authentication is asimple password with a relatively simpler configuration than that of auser password used for keyboard authentication. Thus, the authenticationlevel of icon authentication is lower than the authentication level ofkeyboard authentication. In view of this situation, according to thepresent exemplary embodiment, in the keyboard authentication, which isconsidered to have a higher authentication level, a setting for omittingthe input of a job password can be made, while in the iconauthentication, which is considered to have a lower authenticationlevel, a setting for preventing the input of a job password from beingomitted can be made. Therefore, according to the present exemplaryembodiment, it is possible to improve user operability and ensuresecurity. A configuration for implementing the printing system 100 willbe described below.

<Configuration of Image Forming Apparatus>

FIG. 2A is a block diagram illustrating a hardware configuration of theimage forming apparatus 102. As illustrated in FIG. 2A, the imageforming apparatus 102 includes a controller 201, an operation unit 207,a scanner unit 210, and a printer unit 211.

The operation unit 207 is an operation device that displays informationfor the user to prompt the user to perform an operation, and receivesthe operation from the user. The operation unit 207 is, for example, anoperation panel including a touch screen (display), which displaysinformation and receives a touch operation, and a plurality of hardwarekeys. Accordingly, the operation unit 207 functions as a display unit(display device) and an input unit (input device).

The scanner unit 210 is an image reading unit (scan device) that readsan image from a document. The scanner unit 210 can scan a document seton a document pressing plate, or can read an image from a document fedfrom an automatic document feeder (ADF).

The printer unit 211 is an image forming apparatus (image forming unit)that executes image forming processing for forming an image on a sheetbased on print data. The printer unit 211 may be a printer unit thatemploys an electrophotographic method, or may be a printer unit thatemploys an inkjet method.

The controller 201 is a control unit for controlling each unit of theimage forming apparatus 102 in an integrated manner. The controller 201includes a central processing unit (CPU) 202, a random-access memory(RAM) 203, a read-only memory (ROM) 204, a hard disk drive (HDD) 205, anoperation unit interface (I/F) 206, a network I/F 208, and a device I/F209. In the controller 201, the devices described above are arranged ona system bus 212 and thus can communicate with each other.

The CPU 202 is an arithmetic unit for controlling the entire system. TheRAM 203 is a storage unit that stores various data and functions as asystem work memory for the CPU 202 to operate. The RAM 203 alsofunctions as an image memory for temporarily storing image data. The RAM203 also functions as a storage unit that stores an operating system,data, and programs, such as system software and application software.The ROM 204 is a storage unit that stores programs and system bootprograms. The HDD 205 is a storage unit that stores a large volume data.The HDD 205 stores an operating system, system software, applicationsoftware, image data, setting data, and the like. The operation unit I/F206 is an interface unit for exchanging information between theoperation unit 207 and the image forming apparatus 102.

The operation unit I/F 206 outputs, to the operation unit 207, forexample, information to be displayed on the operation unit 207. Theoperation unit I/F 206 acquires, from the operation unit 207,information input by the user's operation. The network I/F 208 is aninterface unit for exchanging information between the external apparatusand the image forming apparatus 102. The network I/F 208 is connectedto, for example, the LAN 103. The network I/F 208 communicates with theexternal apparatus, such as the PC 101, via the LAN 103.

The device I/F 209 is an interface unit for exchanging informationbetween the scanner unit 210 and the image forming apparatus 102. Thedevice I/F 209 outputs, for example, an instruction to the scanner unit210, and receives image data input from the scanner unit 210.

The device I/F 209 is an interface unit for exchanging informationbetween the image forming apparatus 102 and the printer unit 211. Thedevice I/F 209 outputs, for example, an instruction, print data, orimage data to the printer unit 211, and receives a response contentinput from the printer unit 211.

FIG. 2B is a block diagram illustrating a software configuration of theimage forming apparatus 102. As illustrated in FIG. 2B, the controller201 executes various programs by the CPU 202 to thereby implement systemsoftware 251. The system software 251 includes functions of a UI controlunit 252, an authentication unit 253, a data management unit 254, astorage control unit 255, a network control unit 256, a job managementunit 257, a job control unit 258, and a setting management unit 259. Inother words, the controller 201 functions as the UI control unit 252,the authentication unit 253, the data management unit 254, the storagecontrol unit 255, the network control unit 256, the job management unit257, the job control unit 258, and the setting management unit 259.

The UI control unit 252 is a unit for controlling the operation unit207. The UI control unit 252 receives the information, which is input bythe user using the operation unit 207, via the operation unit I/F 206.The UI control unit 252 outputs the information to each of theauthentication unit 253, the data management unit 254, and the jobmanagement unit 257. The UI control unit 252 also receives a responsefrom each of the authentication unit 253, the data management unit 254,and the job management unit 257. The UI control unit 252 outputs theinformation to the operation unit 207 via the operation unit I/F 206.

The authentication unit 253 is a unit for authenticating the user whooperates the image forming apparatus 102. The authentication unit 253performs authentication processing based on authentication informationreceived from the UI control unit 252, and outputs the result to thestorage control unit 255.

The data management unit 254 is a unit for managing input/output ofvarious data including print data. The data management unit 254 receivesa data write request and a data read request from each of the UI controlunit 252, the network control unit 256, and the job management unit 257.The data management unit 254 outputs a data write request and a dataread request to the storage control unit 255. The data management unit254 receives a response from the storage control unit 255. The datamanagement unit 254 outputs the information to each of the UI controlunit 252, the network control unit 256, and the job management unit 257.

The storage control unit 255 is a unit for controlling writing of datato a storage unit and reading of data from the storage unit. The storagecontrol unit 255 receives a data write request and a data read requestfrom the data management unit 254. The storage control unit 255 writesdata to the HDD 205, or reads data from the HDD 205 and outputs theresult to the data management unit 254.

The network control unit 256 is a unit for controlling communication viaa network. The network control unit 256 receives a request from the PC101 or any image forming apparatus connected to the LAN 103 via thenetwork OF 208. The network control unit 256 requests the datamanagement unit 254 and the job management unit 257 to performprocessing based on the received request. The network control unit 256receives a response from both the data management unit 254 and the jobmanagement unit 257. The network control unit 256 outputs the receivedresponse to the PC 101 or any image forming apparatus connected to theLAN 103 via the network OF 208.

The job management unit 257 is a unit for managing the registration andexecution of a print job. The job management unit 257 receives a jobexecution request from both the UI control unit 252 and the networkcontrol unit 256, and manages jobs. The job management unit 257 requeststhe job control unit 258 to execute jobs. The job management unit 257transmits a data write request and a data read request to the datamanagement unit 254. The job management unit 257 receives a responsefrom both the data management unit 254 and the job control unit 258. Thejob management unit 257 transmits a job state to both the UI controlunit 252 and the network control unit 256.

The job control unit 258 is a unit for controlling the scanner unit 210and the printer unit 211 based on a job content. The job control unit258 receives a job execution request from the job management unit 257.The job control unit 258 controls the operation of both the scanner unit210 and the printer unit 211 via the device I/F 209. The job controlunit 258 receives the operation state of both the scanner unit 210 andthe printer unit 211 via the device I/F 209. The job control unit 258transmits the received content to the job management unit 257.

The setting management unit 259 is a unit for managing setting valuesfor various operations to be performed on a main body.

<Configuration of PC>

FIG. 3A is a block diagram illustrating a hardware configuration of thePC 101.

As illustrated in FIG. 3A, the PC 101 includes a CPU 301, a ROM 302, aRAM 303, an HDD 304, an input device 305, a display device 306, and anetwork I/F 307. The devices described above are communicably connectedwith each other via a system bus 308.

The CPU 301 is an arithmetic unit for controlling the entire system ofthe PC 101. The ROM 302 is a storage unit that stores data. The ROM 302stores programs and data related to each processing. The RAM 303 is astorage unit that stores data. The RAM 303 functions as a system workmemory for the CPU 301 to operate. The RAM 303 also functions as astorage memory for temporarily storing data related to each processing.The HDD 304 is a storage unit that stores a large volume of data. TheHDD 304 stores programs and data related to each processing, temporarydata, application data, and the like. The input device 305 is aninterface for receiving an instruction input by the user. The inputdevice 305 is, for example, a keyboard or a pointing device. The displaydevice 306 is a display unit that displays information. The displaydevice 306 displays, for example, the operation status of the apparatusand information to be output from each program running on the apparatus.The network I/F 307 is a communication unit for communicating with theexternal apparatus. The network I/F 307 performs input/output ofinformation to/from other PCs or image forming apparatuses connected tothe LAN 103.

The CPU 301 executes various programs to implement system software 351.FIG. 3B illustrates the system software 351.

The system software 351 includes an application 352, a printer driver353, and a network control unit 354. The application 352 is a tool forthe user to create and edit an image or a document by using the inputdevice 305, such as a pointing device or a keyboard, while viewing, forexample, the display device 306 of the PC 101. The application 352 isalso a tool for user to refer to information within the image formingapparatus 102. The user generates data on an image, a document, or thelike by using the application 352. The user generates print instructiondata by using the printer driver 353. The printer driver 353 transmitsthe print instruction data to the image forming apparatus 102 via thenetwork control unit 354. The printer driver 353 acquires varioussetting information or the like from the image forming apparatus 102 viathe network control unit 354, and refers to the various settinginformation or the like.

<Data Configuration>

In the printing system 100, various pieces of data are used and will nowbe described in detail. FIG. 4A illustrates a configuration of printdata. FIG. 4B illustrates a bibliographic information table. FIG. 4Cillustrates a user management table. FIG. 4D illustrates a main bodysetting table.

Print data 410 is data to be transmitted from the PC 101 to the imageforming apparatus 102. As illustrated in FIG. 4A, the print data 410includes a header portion 411 and a page description language (PDL)command portion 412. The header portion 411 includes various informationto be added by the printer driver 353. Examples of the information to beadded include a user name, a password, a print job name, and a printsetting. A password is attached to only the print data to which apassword is designated in the printer driver 353. The PDL commandportion 412 is a command sequence converted from original document datain the printer driver 353.

A bibliographic information table 420 is a table for registering variousinformation about the acquired print data. The bibliographic informationtable 420 is stored in, for example, the HDD 205. The bibliographicinformation table 420 is managed for, for example, each user, based onthe user name described in the header portion 411 of the print data 410.The bibliographic information table 420 includes a date/time field 422,an IP address field 423, a storage location field 424, a print job namefield 425, a print setting field 426, and a job password field 427. Thedate/time field 422 stores a date and time when print data is received.The IP address field 423 stores information about a transmission sourceof print data. The storage location field 424 stores a storagedestination path of print data. The print job name field 425 stores ajob name acquired from the header portion 411. The print setting field426 stores print setting information acquired from the header portion411. The job password field 427 stores the print setting informationacquired from the header portion 411. The registration of bibliographicinformation is performed by, for example, the job management unit 257.

The user management table 430 is a table for managing information usedfor user authentication, i.e., information about a user account. Theuser management table 430 is stored in, for example, the HDD 205. Theuser management table 430 is used for, for example, the authenticationunit 253. The user management table 430 includes a user name field 431,a user password field 432, a personal identification number field 433,and a role field 434. The user name field 431 stores a user name of auser registered as a user who can log in. The user password field 432stores a user password required for keyboard authentication. The userpassword is input by the user at the time of creating a user account. Inother words, the controller 201 receives a new setting of a userpassword on a user account registration screen (not illustrated). Thepersonal identification number field 433 stores a personalidentification number required for icon authentication. The personalidentification number is set at the time when the user uses the iconauthentication for the first time, or at a user's desired timing. Therole field 434 stores a class of each user.

The main body setting table 440 is a table for managing variousinformation for the image forming apparatus 102. The user managementtable 430 is stored in, for example, the HDD 205. The main body settingtable 440 is used for, for example, the setting management unit 259. Themain body setting table 440 includes a keyboard authentication field441, an icon authentication 442, a personal identification numberrequired field 443, a password (PW) omission field (keyboard) 444, and aPW omission field (icon) 445.

The keyboard authentication field 441 stores ON/OFF informationindicating whether to use the keyboard authentication. The iconauthentication 442 stores ON/OFF information indicating whether to usethe icon authentication. The personal identification number requiredfield 443 stores ON/OFF indicating whether to use a personalidentification number required setting. The PW omission field (keyboard)444 stores ON/OFF information indicating whether to use a password inputomission function for a password-protected job during the keyboardauthentication. The PW omission field (icon) 445 stores ON/OFFinformation indicating whether to use the password input omissionfunction for the password-protected job during the icon authentication.

The ON/OFF information stored in the main body setting table 440 is usedto control the image forming apparatus 102. Accordingly, the imageforming apparatus 102 operates in a plurality of operation modes, suchas modes 1 to 5, depending on a combination of the ON/OFF informationstored in the main body setting table 440.

<Operation Screens>

Various instructions for the image forming apparatus 102 are carried outon operation screens of the operation unit 207. The operation screenwill now be described.

<Basic Operation Screens>

FIG. 5A illustrates an authentication screen. FIG. 5B illustrates afunction selection screen. FIG. 5C illustrates a job list screen.

A user selection screen 510 illustrated in FIG. 5A is a screen (userspecification screen) for specifying the user who is operating the imageforming apparatus 102. The user selection screen 510 includes selectionobjects 501, 502, 503, and 504.

The selection objects 501 and 502 are buttons for performing the iconauthentication. The selection object 501 is associated with a user A,and the selection object 502 is associated with a user B. The selectionobject 503 is a button for implementing a guest utilization function.The selection object 504 is a button (software key) for performing thekeyboard authentication.

A function selection screen 520 illustrated in FIG. 5B is a screen forspecifying a function to be used by the user. The function selectionscreen 520 includes selection objects 511, 512, 513, and 514. Theselection object 511 is a button for calling a copy function. Theselection object 512 is a button for calling a print function. Theselection object 513 is a button for calling a scan function. Theselection object 514 is a button for calling a setting function.

A job list screen 530 illustrated in FIG. 5C is a screen for selectingprint data to be printed and issuing a print instruction. The job listscreen 530 includes selection objects 521, 522, 523, and 524. Theselection object 521 is a selection list for selecting print data to beprinted from among a plurality of print data candidates. The selectionobject 522 is a button for issuing a printing start instruction for theselected print data. The selection object 523 is a button for deletingthe selected print data from the list. The selection object 524 is abutton for selecting all print data displayed in the list.

When a user is selected on the user selection screen 510 and the printfunction is selected on the function selection screen 520, the job listscreen 530 is displayed. The user selection screen 510 can be displayedbefore or after the function selection screen 520 is displayed.

<Setting Screen>

FIG. 6A illustrates an authentication setting screen. FIG. 6Billustrates a setting screen using a personal identification number.FIG. 6C illustrates a personal identification number setting screen.FIG. 7A illustrates a password omission screen A. FIG. 7B illustrates apassword omission screen B. FIG. 7C illustrates a password omissionscreen C.

An authentication setting screen 610 is a screen that makes variousON/OFF settings for the authentication function.

The authentication setting screen 610 includes selection objects 611,612, 613, 614, 615, 616, and 617.

The selection object 611 is a button for turning on the authenticationfunction. When the selection object 611 is selected, the detailedauthentication setting can be made.

The selection object 612 is a button for turning off the authenticationfunction. When the selection object 612 is selected, all theauthentication functions including the icon authentication and thekeyboard authentication are turned off.

The selection object 613 is a button for switching ON/OFF the iconauthentication function. The selection object 616 is a button forswitching ON/OFF the keyboard authentication function.

The selection object 614 is a button for setting a personalidentification number to be input in the icon authentication. When theselection object 614 is selected, a setting screen 620 for using apersonal identification number is displayed. The setting screen 620includes selection objects 621 and 622 and enables an ON/OFF settingindicating whether the input of a personal identification number isrequired in the icon authentication.

When the personal identification number input required setting is ON, apersonal identification number setting screen 630 is display when theuser first logs in. When any password is input to input forms 631 and632 and an OK button is pressed, the personal identification number isregistered in the user account.

When the selection object 617 is selected on the authentication settingscreen 610, a password omission setting screen 710 illustrated in FIG.7A is displayed. The password omission setting screen 710 includesselection objects 711 and 712 and enables an ON/OFF setting indicatingwhether to omit the input of a password for a password-protected printjob associated with the user in the keyboard authentication.

In a state where the icon authentication setting is ON and the personalidentification number utilization setting is ON, when the selectionobject 615 is selected on the authentication setting screen 610, apassword omission setting screen 720 illustrated in FIG. 7B isdisplayed. The password omission setting screen 720 includes selectionobjects 721 and 722 and enables an ON/OFF setting indicating whether toomit the input of a password for a password-protected print jobassociated with the user in the icon authentication.

In a state where the icon authentication setting or the personalidentification number utilization setting is OFF, when the selectionobject 615 is selected on the authentication setting screen 610, apassword omission setting screen 730 illustrated in FIG. 7C isdisplayed. On the password omission setting screen 730, selectionobjects for setting are masked to prevent a setting as to whether toomit the input of a password from being made.

<Screen Transition>

FIG. 8 illustrates a screen transition. A screen transition to theexecution of a password-protected print job in a state where the mainbody setting is set in the mode 2 illustrated in FIG. 4D will bedescribed below for each of the keyboard authentication and the iconauthentication.

First, a case where printing for a job A3 is performed as apassword-protected print job for the user A by using the keyboardauthentication will be described.

When the user starts the operation of the image forming apparatus 102, ascreen 810 is displayed on the display of the operation unit 207. When aselection object 814 is selected on the screen 810, a screen 820 isdisplayed. The keyboard authentication is carried out on the screen 820.When a user name (user A) and a user password (abcd1111) are input toinput forms 821 and 822, respectively, on the screen 820 and a selectionobject 823 is selected, a login state to the account of the user A isobtained. Then, when the print function is selected on the functionselection screen, a screen 840 is displayed. A list of print jobsassociated with the user A is displayed on the screen 840. When a jobpassword-protected print job (job A3) is selected from a job list 841and a selection object 842 is selected, printing for the job A3 isstarted without requesting the input of a job password (withoutinputting a job password).

Next, a case where printing for the job A3 is performed as apassword-protected print job for the user A by using the iconauthentication will be described.

When the user starts the operation of the image forming apparatus 102,the screen 810 is displayed on the display of the operation unit 207.When a selection object 811 is selected on the screen 810, a screen 830is displayed. A personal identification number for icon authenticationis input on the screen 830. When a personal identification number (1234)is input to an input form 831 on the screen 830 and a selection object832 is selected, a login state to the account of the user A is obtained.After that, when the print function is selected on the functionselection screen, a screen 850 is displayed. A list of print jobsassociated with the user A is displayed on the screen 850. When the jobpassword-protected print job (job A3) is selected from a job list 851and a selection object 852 is selected, a screen 870 is displayed torequest the input of a job password. When the job password is input toan input form 871 and a selection object 872 is selected, printing forthe job A3 is started.

Lastly, a case where printing for the job A3 is performed as apassword-protected print job for the user A by using the guestutilization function will be described.

When the user starts the operation of the image forming apparatus 102,the screen 810 is displayed on the display of the operation unit 207.When a selection object 813 is selected on the screen 810, the user canuse the function as a guest user. Then, when the print function isselected on the function selection screen, a screen 860 is displayed.All print jobs registered in the image forming apparatus 102 aredisplayed on the screen 860. A setting for displaying a print job towhich a job password is set can be made. When the job password-protectedprint job (job A3) is selected from a job list 861 and a selectionobject 862 is selected, the screen 870 is displayed to request the inputof a job password. When the job password is input to the input form 871and the selection object 872 is selected, printing for the job A3 isstarted.

<Flowchart>

FIG. 9A is a flowchart illustrating print data transmission processing.The processing illustrated in the flowchart of FIG. 9A is executed bythe CPU 301 of the PC 101.

When the application 352 for generating document data on an image, adocument, or the like issues an instruction to call the print function,in step S901, the CPU 301 starts the reception of a print functionoperation instruction. First, in step S902, the CPU 301 causes thedisplay device 306 to display a list of printer drivers and receives thedesignation of a print data input destination. Then, if a detailedsetting is instructed (YES in step S903), the processing proceeds tostep S904. In step S904, the CPU 301 causes the display device 306 todisplay the setting screen. If a detailed setting is not instructed (NOin step S903), the processing proceeds to step S907.

If password attachment is designated on a detailed setting screen (YESin step S905), the processing proceeds to step S906. In step S906, theCPU 301 receives the input of the job password. If password attachmentis not designated (NO in step S905), the processing proceeds to stepS907. After the processing for print setting is completed, in step S907,the CPU 301 waits for an input start instruction. If the input start isnot instructed (NO in step S907), the CPU 301 terminates the processing.If the input start is instructed (YES in step S907), the processingproceeds to step S908. In step S908, the CPU 301 generates print data bygenerating PDL data according to document data generated by theapplication 352, data on an image or a document, a document attributesuch as a document name, a print setting, a user name, and a password.In step S609, the CPU 301 transmits a print job to the image formingapparatus 102.

FIG. 9B is a flowchart illustrating print data reception processing. Theprocessing illustrated in the flowchart of FIG. 9B is executed by thecontroller 201, more specifically, the CPU 202, of the image formingapparatus 102.

In step S911, the network control unit 256 receives the print data fromthe PC 101 and delivers a processing instruction to the job managementunit 257. Upon receiving the processing instruction, in step S912, thejob management unit 257 determines whether a job password is attached tothe received print data. If the print data is job password-protectedprint data (YES in step S912), the processing proceeds to step S915.

If the print data is not job password-protected print data (NO in stepS912), the processing proceeds to step S913. In step S913, the jobmanagement unit 257 determines whether a print job hold setting is madeas the setting for the image forming apparatus 102. The print job holdsetting is stored by the storage control unit 255 in, for example, theHDD 205 or the RAM 203. If the print job hold setting is not made (NO instep S913), the processing proceeds to step S918. In step S918, the jobmanagement unit 257 requests the job control unit 258 to execute theprint job based on the print data and causes the printer unit 211 toexecute printing (permits execution of printing). If the print job holdsetting is made (YES in step S913), the processing proceeds to stepS914. In step S914, the job management unit 257 analyzes the print dataand determines whether the print job based on the print data is a holdprinting target job. The hold printing target print job described hereinrefers to a print job in which information attached to the originalprint data, such as a job name, a user name, and identificationinformation of a transmission source PC matches a predeterminedcondition.

If the print job is not a hold printing target job (NO in step S914),the processing proceeds to step S918. In step S918, the job managementunit 257 requests the job control unit 258 to execute the print job andcauses the printer unit 211 to execute printing. If the print job is ahold printing target job (YES in step S914), the job management unit 257transmits the print job to the data management unit 254, and theprocessing proceeds to step S915. In step S915, the data management unit254 analyzes the print data received from the job management unit 257,and extracts bibliographic information.

The data management unit 254 transmits the print data and the extractedbibliographic information to the storage control unit 255. In step S916,the storage control unit 255 stores the received print data in the HDD205, and in step S917, the storage control unit 255 stores the extractedbibliographic information in the HDD 205 in association with the user.

In the processing of steps S915, S916, and S917, if the processing isunsuccessful, for example, due to an insufficient free space of the HDD205, the processing is terminated. If the processing up to theregistration of the bibliographic information is successful, the printjob based on the print data can be registered as a hold printing job andprinting can be performed at a timing when a print instruction isreceived from the user. As described above, a series of processingrelated to the print job hold setting is carried out.

FIG. 10 is a flowchart illustrating operation reception processing. Theprocessing illustrated in the flowchart of FIG. 10 is executed by thecontroller 201, more specifically, the CPU 202, of the image formingapparatus 102.

In step S1001, when the user starts an operation on the operation unit207, the controller 201 starts the reception of the operation. When theoperation starts, the controller 201 that functions as the settingmanagement unit 259 checks ON/OFF of the authentication setting. If theauthentication setting is ON (YES in step S1002), the processingproceeds to step S1003. In step S1003, the controller 201 causes theoperation unit 207 to display the user selection screen 510 forauthentication. If the authentication setting is OFF (NO in step S1002),the processing proceeds to step S1016. Then, the controller 201 receivesan instruction to select an authentication method by the user.

If the keyboard authentication is set as the authentication method(keyboard authentication in step S1004), the controller 201 causes theoperation unit 207 to display a keyboard authentication screen andreceives the input of authentication information for keyboardauthentication. More specifically, when the button 504 is selected onthe user selection screen 510, the controller 201 causes the operationunit 207 to display a keyboard authentication screen and receives theinput of authentication information for keyboard authentication. If theauthentication is successful (YES in step S1005), the processingproceeds to step S1006. In step S1006, the controller 201 causes the RAM203 to store flag information indicating a user name and anauthentication level 3 and is brought into a login state. If theauthentication is unsuccessful (NO in step S1005), the processingreturns to step S1003.

If the icon authentication is set as the authentication method (iconauthentication in step S1004), in other words, if the selection objects501 and 502 are selected on the user selection screen 510, theprocessing proceeds to step S1007. In step S1007, the controller 201first checks ON/OFF of the personal identification number requiredsetting. If the personal identification number required setting is ON(YES in step S1007), the processing proceeds to step S1008. If thepersonal identification number required setting is OFF (NO in stepS1007), the processing proceeds to step S1013. In step S1008, thecontroller 201 checks whether the personal identification number isalready set in the selected user account. If the personal identificationnumber is already set (YES in step S1008), the processing proceeds tostep S1011. If the personal identification number is not already set (NOin step S1008), the processing proceeds to step S1009. In step S1009,the controller 201 receives the setting for a new personalidentification number, and then the processing proceeds to step S1011.In step S1011, the controller 201 receives the input of the personalidentification number on a personal identification number input screen,checks whether the input personal identification number matches thepersonal identification number set in the selected user account, andthus determines the authentication. If the authentication is successful(YES in step S1011), the processing proceeds to step S1012. In stepS1012, the controller 201 causes the RAM 203 to store flag informationindicating a user name and an authentication level 2 and is brought intothe login state. If the authentication is unsuccessful (NO in stepS1011), the processing returns to step S1003.

Similarly, in step S1013, if the authentication is successful (YES instep S1013), the processing proceeds to step S1014. In step S1014, thecontroller 201 causes the RAM 203 to store flag information indicating auser name and an authentication level 1 and is brought into the loginstate. If the authentication is unsuccessful (NO in step S1013), theprocessing returns to step S1003.

After the login state is obtained through steps S1006, S1012, and S1014,when the execution of the print function is designated, that is, whenthe button 512 is selected on the function selection screen 520, thecontroller 201 acquires bibliographic information about the print jobassociated with the authenticated user.

If a guest user utilization method is set as the authentication method(guest user utilization in step S1004), the processing proceeds to stepS1016. In step S1016, the controller 201 causes the RAM 203 to storeflag information indicating an authentication level 0. When theexecution of the print function is designated, that is, when the button512 is selected on the function selection screen 520, the controller 201acquires bibliographic information about all print jobs.

In steps S1015 or S1017, if the bibliographic information is acquired,in step S1018, the controller 201 causes the operation unit 207 todisplay a list of acquired bibliographic information (e.g., the job listscreen 530). Then, in step S1019, the controller 201 executes the printinstruction reception processing.

FIG. 11A is a flowchart illustrating print instruction receptionprocessing. The processing illustrated in the flowchart of FIG. 11A isdetailed processing of step S1019 illustrated in FIG. 10. The processingillustrated in the flowchart of FIG. 11A is executed by the controller201, more specifically, the CPU 202, of the image forming apparatus 102.

In step S1101, the controller 201 receives an instruction to select aprint job and start printing on the job list screen 530. In this case,in step S1102, the job management unit 257 analyzes the bibliographicinformation for the selected print job, and performs job password inputnecessity result acquisition processing. Details of the job passwordinput necessity result acquisition processing will be described below.In step S1103, the controller 201 determines whether a job password isrequired based on the acquired result. If the job password is notrequired (NO in step S1103), the processing proceeds to step S1107. Ifthe job password is required (YES in step S1103), the processingproceeds to step S1104. In step S1104, the controller 201 causes theoperation unit 207 to display a screen for requesting the input of thejob password. In step S1105, the controller 201 receives the input ofthe job password. Next, in step S1106, the controller 201 determineswhether the input password matches the job password associated with theprint data. If the input password does not match the job password (NO instep S1106), the processing returns to step S1104. If the input passwordmatches the job password (YES in step S1106), the data management unit254 transmits a request for acquiring the print job. Then, theprocessing proceeds to step S1107. In step S1107, the controller 201acquires the target print data from the storage destination. The datamanagement unit 254 acquires the designated print job from the HDD 205via the storage control unit 255. The data management unit 254 transmitsthe print job to the job control unit 258 via the job management unit257. The job control unit 258 outputs the received print job to theprinter unit 211. In this way, in step S1108, the controller 201 causesthe printer unit 211 to execute image formation based on the acquiredprint data. As described above, a series of processing relating to theprint instruction reception processing is carried out.

FIG. 11B is a flowchart illustrating password necessity determinationprocessing. The processing illustrated in the flowchart of FIG. 11B isdetailed processing of step S1102 illustrated in FIG. 11A. Theprocessing illustrated in the flowchart of FIG. 11B is executed by thecontroller 201, more specifically, the CPU 202, of the image formingapparatus 102.

When a print instruction target job is designated, in step S1111, thejob management unit 257 acquires and analyzes print instruction targetbibliographic information. In step S1112, the controller 201 determineswhether the print job is a password-protected print job based on theanalysis result.

If the print job is not a job password-protected print job (NO in stepS1112), the processing proceeds to step S1109.

If the print job is a job password-protected print job (YES in stepS1112), the processing proceeds to step S1113. In step S1113, thecontroller 201 determines whether the current state indicates that theuser authentication is finished. More specifically, the controller 201determines whether a value other than “0” is set as an authenticationlevel flag. If the user authentication is not finished (NO in stepS1113), that is, if “0” is set as the authentication level flag, theprocessing proceeds to step S1118. If the user authentication isfinished (YES in step S1113), that is, if a value other than “0” is setas the authentication level flag, the processing proceeds to step S1114.

In step S1114, the controller 201 determines whether the print job forwhich printing is designated is a job for an authenticated user. If theprint job is not a job for the authenticated user (NO in step S1114),the processing proceeds to step S1118. If the print job is a job for theauthenticated user (YES in step S1114), the processing proceeds to stepS1115.

In step S1115, the controller 201 checks the authentication level of theauthenticated user. If the flag indicating the authentication level 1 isset (authentication level 1 in step S1115), the processing proceeds tostep S1118. In other words, if the icon authentication is set as theauthentication method and the setting of “make sure to use a personalidentification number” is OFF, the processing proceeds to step S1118.

If the flag indicating the authentication level 2 is set (authenticationlevel 2 in step S1115), the processing proceeds to step S1116. In otherwords, if the icon authentication is set as the authentication methodand the setting of “make sure to use a personal identification number”is ON, the processing proceeds to step S1116.

In step S1116, the controller 201 determines ON/OFF of the job passwordomission setting for icon authentication. If the job password omissionsetting for icon authentication is OFF (NO in step S1116), theprocessing proceeds to step S1118. If the job password omission settingfor icon authentication is ON (YES in step S1116), the processingproceeds to step S1119.

If the flag indicating the authentication level 3 is set (authenticationlevel 3 in step S1115), the processing proceeds to step S1117. In otherwords, if the keyboard authentication is set as the authenticationmethod and the setting of “make sure to use a personal identificationnumber” is ON, the processing proceeds to step S1117.

In step S1117, the controller 201 determines ON/OFF of the job passwordomission setting for keyboard authentication. If the job passwordomission setting for keyboard authentication is OFF (NO in step S1117),the processing proceeds to step S1118. If the job password omissionsetting for keyboard authentication is ON (YES in step S1117), theprocessing proceeds to step S1119.

In step S1118, the controller 201 causes the RAM 203 to store a flagindicating that a job password is required (omission of a job passwordis not allowed), and then terminates the processing.

In step S1119, the controller 201 stores a flag indicating that a jobpassword is not required (omission of a job password is allowed) in theRAM 203, and then terminates the processing.

The flags stored in steps S1118 or S1119 are used for determination instep S1103.

Advantageous Effects

According to the first exemplary embodiment, the setting as to whetherto omit a job password can be changed depending on the authenticationmethod. Accordingly, it ensuring the security and improving useroperability can be achieved.

According to the first exemplary embodiment, a job password omissionsetting for each authentication method can be made. Thus, the settingcan be customized depending on the use environment of the user, andtherefore excellent usability can be obtained.

In the first exemplary embodiment, if the setting of “make sure to use apersonal identification number” is ON in the case of icon selectionlogin, the authentication level is determined to be “2”. In a secondexemplary embodiment, it is determined whether to set the authenticationlevel to “2” or “1” based on whether the personal identification numberis set for the log-in user, regardless of the setting of “make sure touse a personal identification number”. FIG. 12B is a table illustratinga relationship between authentication levels and various settingsaccording to the second exemplary embodiment. As illustrated in FIG.12B, in the second exemplary embodiment, even when the setting of “makesure to use a personal identification number” is OFF, if a personalidentification number is set for the log-in user, the authenticationlevel is set to “2”. Therefore, when the password input omission settingfor icon authentication is ON, the input of a job password for the userwhose personal identification number is set can be omitted in printingfor the user's print job. The input of a job password for the user whosepersonal identification number is not set cannot be omitted in printingfor the user's print job.

In this manner, detailed settings can be made, thereby improving theuser operability and ensuring the security. A printing system 1300according to the second exemplary embodiment is similar to the printingsystem 100 according to the first exemplary embodiment, except for theconfiguration relating to the difference described above. Accordingly,similar components are denoted by the same reference numerals, anddetailed descriptions thereof are omitted.

When the setting of “make sure to use a personal identification number”is OFF, the user selects the setting button 514 on the functionselection screen 520 to call the setting screen. Then, the user sets anypersonal identification number on the personal identification numbersetting screen 630.

FIG. 13A illustrates the configuration of the printing system accordingto the second exemplary embodiment. FIG. 13B illustrates a use case 1 ofthe printing system according to the second exemplary embodiment. FIG.13C illustrates a use case 2 of the printing system according to thesecond exemplary embodiment.

As illustrated in FIG. 13A, the printing system 1300 includes a PC-A1301, a PC-B 1302, and the image forming apparatus 102, which arecommunicably connected with each other via the LAN 103.

The PC-A 1301 is a terminal used by the user A. The PC-B 1302 is aterminal used by the user B. The user A is a user whose personalidentification number is already set, and the user B is a user whosepersonal identification number is not set. The functions andconfigurations of the PC-A 1301 and the PC-B 1302 are similar to thoseof the PC 101, and thus descriptions thereof are omitted. In theprinting system 1300, a case where the user A performs printing usingicon authentication is described as the use case 1, and a case where theuser B performs printing using icon authentication is described as theuse case 2.

First, referring to FIG. 13B, the use case 1 will be described. In FIG.13B, steps S1311, S1312, S1313, S1314, S1315, S1317, S1318, S1319, andS1320 respectively correspond to steps S112, S113, S114, S115, S117,S118, S119, and S120. Step S1311 differs from step S111 in that thepreliminarily set information indicates that “the personalidentification number for the user A is already set and the personalidentification number for the user B is not set”. Step S1316 differsfrom step S116 in that the processing performed in step 13116 is “iconlogin and print function selection processing”. As illustrated in FIG.13B, since the personal identification number for the user A is alreadyset, the input of a job password can be omitted.

Next, the use case 2 will be described with reference to FIG. 13C. InFIG. 13C, steps S1352, S1353, S1354, S1355, S1357, S1358, S1359, S1360,and S1361 respectively correspond to steps S152, S153, S154, S155, S157,S158, S159, S160, and S161. Step S1351 differs from step S151 in thatthe preliminarily set information indicates that “the personalidentification number for the user A is already set and the personalidentification number for the user B is not set”. Step S1356 differsfrom step S156 in that the processing performed in step S1356 is “iconlogin and print function selection processing”. As illustrated in FIG.13B, the personal identification number for the user B in iconauthentication is not set, and thus the input of a job password isrequired.

FIG. 14A is a table illustrating a user management table according tothe second exemplary embodiment. FIG. 14B is a table illustrating mainbody setting items according to the second exemplary embodiment.

In the second exemplary embodiment, since the personal identificationnumber for the user B is not set, the user management table is asillustrated in FIG. 14A. The second exemplary embodiment is based on thepremise that the setting of “make sure to use a personal identificationnumber” is OFF, and thus modes 6, 7, 8, and 9 illustrated in FIG. 14Bare set as related setting modes.

FIG. 15 is a flowchart illustrating operation reception processingaccording to the second exemplary embodiment. In the second exemplaryembodiment, even when the setting of “make sure to use a personalidentification number” is OFF, if a personal identification number isset for the log-in user, the authentication level is set to “2”.Accordingly, step S1501 is added as a determination flow for theoperation reception processing. Therefore, if the personalidentification number is already set, the processing proceeds to stepS1011. If the personal identification number is not set, the processingproceeds to step S1013.

Advantageous Effects

According to the second exemplary embodiment, additional detailedsettings to those in the first exemplary, and thus excellent usabilitycan be obtained.

In the first and second exemplary embodiments, one setting value is setfor all users for the job password omission setting. In a thirdexemplary embodiment, the job password omission setting can be made foreach user. Accordingly, the input of a job password can be omitted inprinting for a print job associated with the user whose job passwordinput omission setting is turned on, while the input of a job passwordcannot be omitted in printing for a print job associated with the userwhose job password input omission setting is turned off. In this manner,detailed settings can be made, thereby improving the user operabilityand ensuring the security. A printing system 1600 according to the thirdexemplary embodiment is similar to the printing system 1300 according tothe second exemplary embodiment, except for the configuration relatingto the difference described above. Therefore, similar components aredenoted by the same reference numerals, and detailed descriptionsthereof are omitted.

As illustrated in FIG. 16A, the printing system 1600 includes the PC-A1301, the PC-B 1302, and the image forming apparatus 102, which arecommunicably connected with each other via the LAN 103.

The PC-A 1301 is a terminal used by the user A. The PC-B 1302 is aterminal used by the user B. The user A is a user whose passwordomission setting is turned on, and the user B is a user whose passwordomission setting is turned off. The functions and configurations of thePC-A 1301 and the PC-B 1302 are similar to those of the PC 101, and thusdescriptions thereof are omitted. In the printing system 1300, a casewhere the user A performs printing using icon authentication isdescribed as the use case 1, and a case where the user B performsprinting using icon authentication is described as the use case 2.

First, the use case 1 will be described with reference to FIG. 16B. InFIG. 16B, steps S1611, S1612, S1613, S1614, S1615, S1616, S1617, S1618,S1619, and S1620 respectively correspond to steps S1311, S1312, S1313,S1314, S1315, S1316, S1317, S1318, S1319, and S1320. Step S1611 differsfrom step S1311 in that the preliminarily set information indicates that“a PW omission setting (for icon authentication for the user A) is ONand a PW omission setting (for icon authentication for the user B) isOFF”. As illustrated in FIG. 16B, since the job password omissionsetting for the user A is ON, the input of a job password can beomitted.

Next, the use case 2 will be described with reference to FIG. 16C. InFIG. 16C, steps S1352, S1353, S1354, S1355, S1357, S1358, S1359, S1360,and S1361 respectively correspond to processing of S152, S153, S154,S155, S157, S158, S159, S160, and S161. Step S1651 differs from stepS1351 in that the preliminarily set information indicates that “the PWomission setting (for icon authentication for the user A) is ON and thePW omission setting (for icon authentication for the user B) is OFF”. Asillustrated in FIG. 16C, since the job password omission setting for theuser B is OFF, the input of a job password is required.

FIG. 17 is a diagram illustrating a user management table according tothe third exemplary embodiment.

In the third exemplary embodiment, the PW omission setting is made foreach user, and thus setting values for the PW omission setting aremanaged in the user management table.

As illustrated in FIG. 17, a user management table 1730 includes theuser name field 431, the user password field 432, the personalidentification number field 433, the role field 434, a PW omission(keyboard) field 1735, a PW omission (icon) field 1736. The user namefield 431, the user password field 432, the personal identificationnumber field 433, and the role field 434 are similar to those in theuser management table 430 according to the first exemplary embodiment.The user management table 1730 differs from the user management table430 according to the first exemplary embodiment in that the PW omission(keyboard) field 1735 and the PW omission (icon) field 1736 are added.

Advantageous Effects

According to the third exemplary embodiment, the PW omission setting canbe managed for each user, and thus excellent usability can be obtained.

As described above, according to the exemplary embodiments describedabove, an image forming apparatus is provided that makes a job passwordomission setting depending on a plurality of authentication levels.

OTHER EMBODIMENTS

Embodiment(s) can also be realized by a computer of a system orapparatus that reads out and executes computer executable instructions(e.g., one or more programs) recorded on a storage medium (which mayalso be referred to more fully as a ‘non-transitory computer-readablestorage medium’) to perform the functions of one or more of theabove-described embodiment(s) and/or that includes one or more circuits(e.g., application specific integrated circuit (ASIC)) for performingthe functions of one or more of the above-described embodiment(s), andby a method performed by the computer of the system or apparatus by, forexample, reading out and executing the computer executable instructionsfrom the storage medium to perform the functions of one or more of theabove-described embodiment(s) and/or controlling the one or morecircuits to perform the functions of one or more of the above-describedembodiment(s). The computer may comprise one or more processors (e.g.,central processing unit (CPU), micro processing unit (MPU)) and mayinclude a network of separate computers or separate processors to readout and execute the computer executable instructions. The computerexecutable instructions may be provided to the computer, for example,from a network or the storage medium. The storage medium may include,for example, one or more of a hard disk, a random-access memory (RAM), aread only memory (ROM), a storage of distributed computing systems, anoptical disk (such as a compact disc (CD), digital versatile disc (DVD),or Blu-ray Disc (BD)™), a flash memory device, a memory card, and thelike.

While exemplary embodiments have been described, it is to be understoodthat the disclosure is not limited to the disclosed exemplaryembodiments. The scope of the following claims is to be accorded thebroadest interpretation so as to encompass all such modifications andequivalent structures and functions.

What is claimed is:
 1. An image forming apparatus comprising: one ormore memories which store a set of instructions; and at least oneprocessor which executes the set of instructions to perform operationsincluding: storing, in a storage device, a print job with a job passwordin association with a user, wherein the print job is received from anexternal device, performing a first log-in process of the user accordingto a designation of user information and input of a password, andperforming a second log-in process of the user according to adesignation of user information without input of a password, wherein, ina case where the first log-in process of the user is performed,performing the first log-in process includes performing the stored printjob with the job password without inputting the job password, andwherein, in a case where the second log-in process of the user isperformed, performing the second log-in process includes performing thestored print job with the job password based on inputting the jobpassword.
 2. The image forming apparatus according to claim 1, whereinperforming the stored print job with the job password is further basedon a print instruction from a print instruction user.
 3. The imageforming apparatus according to claim 1, wherein a setting is stored inthe one or more memories and indicates whether input of a password forlog-in of the user is required, wherein, in a case where the settingindicates that input of the password for the log-in of the user isrequired, the first log-in process of the user is performed, andwherein, in a case where the setting indicates that input of thepassword for the log-in of the user is not required, the second log-inprocess of the user is performed.
 4. The image forming apparatusaccording to claim 3, wherein, in a case where the setting indicatesthat input of the password for the log-in of the user is not requiredand the password for the log-in of the user is stored in associationwith the user information of the user in the one or more memories, thefirst log-in process of the user is performed, even if the settingindicates that input of the password for the log-in of the user is notrequired.
 5. The image forming apparatus according to claim 1, wherein,in a case where one of the first log-in process and the second log-inprocess of the user is performed, an operation device of the imageforming apparatus is controlled to display a list of one or more printjobs in association with a print job user in the storage device, whereinthe one or more print jobs includes the print job with the job password,and wherein at least one print job selected from the list by the user isperformed.
 6. A control method for an image forming apparatus, thecontrol method comprising: storing, in a storage device, a print jobwith a job password in association with a user, wherein the print job isreceived from an external device; performing a first log-in process ofthe user according to a designation of user information and input of apassword; and performing a second log-in process of the user accordingto a designation of user information without input of a password,wherein, in a case where the first log-in process of the user isperformed, performing the first log-in process includes performing thestored print job with the job password without inputting the jobpassword, and wherein, in a case where the second log-in process of theuser performed, performing the second log-in process includes performingthe stored print job with the job password based on inputting the jobpassword.
 7. A non-transitory computer readable storage medium on whichis stored a computer program for making a computer execute a controlmethod for an image forming apparatus, the control method comprising:storing, in a storage device, a print job with a job password inassociation with a user, wherein the print job is received from anexternal device; performing a first log-in process of the user accordingto a designation of user information and an input of a password; andperforming a second log-in process of the user according to adesignation of user information without input of a password, wherein, ina case where the first log-in process of the user is performed,performing the first log-in process includes performing the stored printjob with the job password without inputting the job password, andwherein, in a case where the second log-in process of the user isperformed, performing the second log-in process includes performing thestored print job with the job password based on inputting the jobpassword.