Control method of image communication apparatus, data distribution system, export apparatus, and import apparatus

ABSTRACT

An image communication apparatus includes a storage unit including a shared address book area and an individual address book area, a communication unit configured to receive an import file including shared address book data shared among a plurality of users or private address book data limiting users who can utilize the data, and a CPU, and if the import file includes the private address book data and the shared address book area is designated as an import destination, the CPU warns the user that the private address book data may be shared and prevents the user from importing the import file.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation, and claims the benefit, of U.S.patent application Ser. No. 14/228,112, presently pending and filed onMar. 27, 2014, and claims the benefit of, and priority to, JapanesePatent Application No. 2013-075963 filed Apr. 1, 2013, which is herebyincorporated by reference herein in its entirety.

BACKGROUND OF THE INVENTION Field of the Invention

The present invention relates to a data export/import technique of animage communication apparatus such as a multifunction peripheral or afax machine.

Description of the Related Art

Generally, image communication apparatuses store various types of dataassociated with communication. Such data includes, for example, addressbook data including address information of fax machines and otherelectronic apparatuses as well as data for network settings. If an imagecommunication apparatus is used by a plurality of users, the addressbook data can be managed by each user. In such a case, it is possible tocause the image communication apparatus to manage the address book datadivided into address book data which can be disclosed to and shared by aplurality of users and address book data used by specific users.

As one method, when a new image communication apparatus is added, theaddress book data is distributed from the existing image communicationapparatus to the new image communication apparatus or via an externalapparatus. When the address book data is distributed, import/export ofthe address book data is performed between the image communicationapparatuses. However, not all the image communication apparatusessupport the management of address book data in each user. For example,even if the image communication apparatus which exports the address bookdata supports the management of the address book data for each user, theimage communication apparatus which imports the address book data maynot support the management of the address book data for each user. Insuch a case, the address information in the address book data which islimited only to specific users may be disclosed.

Japanese Patent Application Laid-Open No. 2007-81578 discusses aninvention of an image communication apparatus configured to exportaddress book data only when an image communication apparatus whichimports the address book data is capable of managing the address bookdata for each user. Since the import operation is permitted only whenthe address book data can be managed for each user, it is possible toprevent the address information of the address book data which is notavailable to all users from being disclosed.

Meanwhile, imported/export of address book data is not always directlyperformed between the image communication apparatuses. For example,importing/exporting of the address book data is also conceivable, inwhich one image communication apparatus exports the address book data toa transportable media and the other image communication apparatusimports the exported address book data from the transportable media.This method is especially useful when the address book data stored inone image communication apparatus is used by a plurality of imagecommunication apparatuses. However, it is not possible to directly applythe image communication apparatus discussed in Japanese PatentApplication Laid-Open No. 2007-81578 to this case, in which the imagecommunication apparatus exporting the address book data determineswhether the image communication apparatus importing the address bookdata can manage the address book data for each user.

SUMMARY OF THE INVENTION

The present invention is directed to provide a technique for preventingthe disclosure of address book data managed in each user and limited touse by a specific user, to an apparatus to which the data is to beexported.

According to an aspect of the present invention, a control method for animage communication apparatus is executed by a first image communicationapparatus and a second image communication apparatus. The first imagecommunication apparatus is configured to output shared address book dataincluding address information of a destination where image data is to betransmitted and shared among a plurality of users and private addressbook data limiting users who can utilize the data, and the second imagecommunication apparatus has a storage unit including a shared area whichis a storage area of data shared among the plurality of users and aprivate area which is a storage area of data limiting users who canutilize the data, and stores the shared address book data and theprivate address book data output from the first image communicationapparatus in the storage unit. According to the method, the first imagecommunication apparatus generates an export file including the sharedaddress book data or the private address book data, and adds, to theexport file which has been generated, type data indicating which of theshared address book data and the private address book data is includedin the export file.

According to another aspect of the present invention, the second imagecommunication apparatus includes accepting designation indicating whichof the shared area and the private area is an import destination of theexport file, determining whether the export file includes either of theshared address book data and the private address book data according tothe type data added to the export file, if the export file includes theshared address book data, writing the shared address book data in theimport destination which has been designated, if the export fileincludes the private address book data and the private area isdesignated as the import destination, writing the private address bookdata in the private area, and if the export file includes the privateaddress book data and the shared area is designated as the importdestination, warning the user that the private address book data will beshared.

Further features of the present invention will become apparent from thefollowing description of exemplary embodiments with reference to theattached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a hardware configuration of an image communicationapparatus.

FIG. 2 illustrates a configuration example of a data distributionsystem.

FIG. 3 illustrates an example of an address book area.

FIG. 4 is a flowchart illustrating export/import processing of theaddress book data.

FIG. 5 illustrates an example of an authentication screen.

FIG. 6 illustrates an example of a processing selection screen.

FIG. 7 is a flowchart illustrating export processing.

FIG. 8 illustrates an example of an export operation screen.

FIG. 9 illustrates an example of a header added to an export file.

FIG. 10 is a flowchart illustrating import processing.

FIG. 11 illustrates an example of an import operation screen.

FIG. 12 is a flowchart illustrating import processing.

FIG. 13 is a flowchart illustrating import processing.

FIG. 14 is another flowchart illustrating import processing.

FIG. 15 illustrates an example of a key ring table.

FIG. 16 is a flowchart illustrating import processing.

FIG. 17 illustrates an example of a warning message.

DESCRIPTION OF THE EMBODIMENTS

Various exemplary embodiments, features, and aspects of the inventionwill be described in detail below with reference to the drawings.

A first exemplary embodiment will be described. FIG. 1 illustrates ahardware configuration of an image communication apparatus according tothe present embodiment. An image communication apparatus 1 includes acentral processing unit (CPU) 11, a random access memory (RAM) 12, astorage unit 13, a reading unit 15, and a communication unit 16. Thesecomponents are data-communicably connected via a bus 18.

The CPU 11 which uses the RAM 12 as a work area reads out and executesvarious programs stored in the storage unit 13 to control the entireoperation of the image communication apparatus 1. Especially, the CPU 11executes a program to import and export address book data includingaddress information. In addition to the above-described program, thestorage unit 13 stores address data book to be exported, authenticationinformation of a user who can use the image communication apparatus 1,and various types of setting data of the image communication apparatus1. The imported address book data is stored in the storage unit 13.

The reading unit 15 having a scanner function optically reads andconverts a document into image data. The communication unit 16 performscommunication with an external device via a network 2. If the imagecommunication apparatus 1 functions as a network scanner or a faxmachine, the image data of the document read by the reading unit 15 istransmitted to the external device. Further, when the communication unit16 exports/imports the address book data, it transmits/receives theaddress book data. The CPU 11 controls the operation of each unit of theimage communication apparatus 1 for a series of the above-mentionedoperations.

FIG. 2 illustrates a configuration example of a data distribution systemincluding the image communication apparatus 1. The image communicationapparatus 1 is data-communicably connected to another imagecommunication apparatus 1 and an electronic apparatus 3 via the network2. The electronic apparatus 3, which is an information processingapparatus such as a personal computer, can access a remote userinterface (remote UI) of the image communication apparatus 1 using ahypertext transfer protocol (HTTP). For that purpose, the electronicapparatus 3 includes a display device and an input device, and canremotely control the image communication apparatus 1 using thesedevices.

When distributing address book data from a first image communicationapparatus 1 to a second image communication apparatus 1, the first imagecommunication apparatus 1 serves as an export apparatus which exportsaddress book data, and the second image communication apparatus 1 servesas an import apparatus which imports the exported address book data.Further, the exported address book data can be temporarily stored in theelectronic apparatus 3, and then imported from the electronic apparatus3. Further, the first image communication apparatus 1 can export theaddress book data to a transportable medium (not illustrated, while thesecond image communication apparatus 1 can import the exported addressbook data.

FIG. 3 illustrates an example of an address book area 301 which is astorage area where the address book data is stored in the storage unit13. The address book area 301 is provided with a shared address bookarea 302 and a private address book area 303.

The shared address book area 302 is a shared area where address bookdata which can be shared by a plurality of users of the imagecommunication apparatus 1 (hereinafter referred to as “shared addressbook data”) is stored. The private address book area 303 is a privatearea where address book data which only a specified user can use(hereinafter referred to as “private address book data”) is stored.According to the example in FIG. 3, private address book data includingaddress information individually used by a user A is stored in anaddress book area of the user A. Similarly, private address book dataincluding address information individually used by a user B is stored inan address book area of the user B. Address information included in theaddress book data which can be individually used by a specified userincludes an identifier and a password. The identifier and password areauthentication information used when authenticating the user in theapparatus (i.e., another image communication apparatuses or anelectronic apparatus) identified by the address information.

If the image communication apparatus 1 functions as a network scanner ora fax machine, image data of a document read by the reading unit 15 istransmitted to an apparatus designated by the address informationincluded in the shared address book data and the private address bookdata.

FIG. 4 is a flowchart illustrating the export/import processing of theaddress book data performed by the image communication apparatus 1,which is operated by the user via the remote UI.

In step S101, if the electronic apparatus 3 accesses the imagecommunication apparatus 1 via the remote UI after the imagecommunication apparatus 1 is started, the CPU 11 of the imagecommunication apparatus 1 causes the display device of the electronicapparatus 3 to display a UI screen such as the one illustrated in FIG.5. This UI screen is an authentication screen displayed for the imagecommunication apparatus 1 to authenticate. A registered user of theimage communication apparatus 1 enters identification (ID) and apassword for personal identification. In step S102, the CPU 11authenticates the user based on the ID and the password entered via theauthentication screen, and further determines whether the authenticationis successful. If the authentication is successful (YES in step S102),the processing proceeds to step S103. If the authentication fails (NO instep S102), the processing returns to step S101.

In step S103, the CPU 11 displays a UI screen such as the oneillustrated in FIG. 6 on the display device of the electronic apparatus3. The UI screen is a processing selection screen 401 for selecting theprocessing to be executed by the image communication apparatus 1. Theuser can select whether to export/import the address book data orlog-out via the screen. The processing selection screen 401 is displayedon the display device of the electronic apparatus 3 until any of theitems is selected (NO in steps S104, S106, and S108).

In step S104, the CPU 11 determines whether an “export” button 402 onthe processing selection screen 401 is selected by the user. If the“export” button 402 is selected (YES in step S104), the processingproceeds to step S105. If the “export” button 402 is not selected (NO instep S104), the processing proceeds to step S106. In step S105, the CPU11 exports the address book data. In step S106, the CPU 11 determineswhether an “import” button 403 on the processing selection screen 401 isselected by the user. If the “import” button 403 is selected (YES instep S106), the processing proceeds to step S107. If the “export” button402 is not selected (NO in step S106), the processing proceeds to stepS108. In step S107, the CPU 11 imports the address book data.

In step S108, the CPU 11 determines whether a “log-out” button 404 onthe processing selection screen 401 is selected by the user. If the“log-out” button 404 is selected (YES in step S108), then theexport/import processing of the address book data ends. If the “log-out”button 404 is not selected (NO in step S108), the processing returns tostep S103.

FIG. 7 is a flowchart illustrating the export processing. In step S201,when the export is started, the CPU 11 of the image communicationapparatus 1 displays a UI screen, such as the one illustrated in FIG. 8,on the display device of the electronic apparatus 3. The UI screen is anexport operation screen 501 for performing the export operation. Byoperating the export operation screen 501, the user designates addressbook data to be exported, enters a password, and submits an export startinstruction.

In step S202, the CPU 11 determines whether the address book data to beexported is selected by the user via the export operation screen 501.The address book data to be exported indicates the address book datafrom which the address information to be exported is acquired. The usercan select the address book data to be exported from a dropdown listhaving two options: shared address book data and private address bookdata. When designating the private address book data, it is possible todesignate only the private address book data which can be used by theuser authenticated via the authentication screen.

In step S202, if the address book data to be exported is selected (YESin step S202), the processing proceeds to step S203. If the address bookdata to be exported is not selected (NO in step S202), the processingreturns to step S201. In step S203, the CPU 11 determines whether apassword is entered in the field “password” on the export operationscreen 501. This password is used for generating an encryption key forencrypting password information in the address information of theaddress book data to be exported. If the password information in theaddress information is exported without being encrypted, informationleak may occur. For that reason, the CPU 11 generates an encryption keyusing the entered password. Further, the CPU 11 encrypts the passwordinformation in the address information using the encryption key.Accordingly, the information leak can be prevented.

In step S203, if a password is entered in the field (YES in step S203),the processing proceeds to step S204. If a password is not yet enteredin the field (NO in step S203), the processing returns to step S201. Instep S204, the CPU 11 determines whether the “start export” instructionis submitted on the export operation screen 501. The export operationscreen 501 is displayed on the display device of the electronicapparatus 3 until the address book data to be exported is designated,the password is entered, and the start export instruction is submitted.If the start export instruction is submitted (YES in step S204), theprocessing proceeds to step S205. If the start export instruction is notyet submitted (NO in step S204), the processing returns to step S201. Instep S205, the CPU 11 generates an export file for storing the addressinformation in the address book data to be exported.

In step S206, after the export file is generated, the CPU 11 determineswhether the address book data to be exported is private address bookdata. If the data is private address book data (YES in step S206), theprocessing proceeds to step S207. If the address book data of the exportsource is not private address book data (NO in step S206), theprocessing proceeds to step S208. In step S207, the CPU 11 adds, to theexport file, a header which is type data indicating that the data isprivate address book data. FIG. 9 illustrates an example of the header.

In step S208, the CPU 11 generates an encryption key using the passwordentered in the field “password”.

After the generation of the encryption key, the CPU 11 writes theaddress information, which is in the address book data to be exported,in the export file. More specifically, in step S209, the CPU 11determines whether the address information to be exported still remainsin the address book data to be exported. If the address informationremains (YES in step S209), the processing proceeds to step S210. If theaddress information does not remain (NO in step S209), the processingproceeds to step S214. In step S210, the CPU 11 acquires the addressinformation from the address book data to be exported. In step S211, theCPU 11 determines whether the password information is included in theacquired address information. If the password information is included(YES in step S211), the processing proceeds to step S212. If thepassword information is not included (NO in step S211), the processingproceeds to step S213. In step S212, the CPU 11 encodes the passwordinformation in the address information using the encryption key.

In step S213, the CPU 11 outputs the address information to the exportfile. More specifically, the CPU 11 outputs all address information inthe address book data to be exported to the export file. In step S214,the CPU 11 transmits the export file to the electronic apparatus 3. Inthis manner, the address book data is exported from the imagecommunication apparatus 1 to the electronic apparatus 3. The export filecan be directly transmitted to another image communication apparatus 1that imports the file.

FIG. 10 is a flowchart illustrating the import processing. In step S301,the CPU 11 of the image communication apparatus 1 causes the displaydevice of the electronic apparatus 3 to display a UI screen such as animport operation screen 601 illustrated in FIG. 11. The user designatesthe file to be imported (hereinafter referred to as an “import file”),designates the address book area 301 where the import file is to bestored, enters a password, and submits an import start instruction viathe import operation screen 601. The import file is a file exported froma different image communication apparatus. The password is used forgenerating a decoding key for decoding the encrypted passwordinformation included in the import file.

In step S302, the CPU 11 determines whether the import file isdesignated by the user. If the import file is designated (YES in stepS302), the processing proceeds to step S303. If the import file is notyet designated (NO in step S302), the processing returns to step S301.In step S303, the CPU 11 determines whether the address book area 301where the import file is to be stored is designated by the user. If theaddress book area 301 is designated (YES in step S303), the processingproceeds to step S304. If the address book area 301 is not yetdesignated (NO in step S303), the processing returns to step S301. Instep S304, the CPU 11 determines whether the password for generating thedecoding key is entered by the user. If the password is entered (YES instep S304), the processing proceeds to step S304. If the password is notyet entered (NO in step S304), the processing returns to step S301. Instep S305, the CPU 11 determines whether the “start import” instructionis submitted on the export operation screen 601 by the user. If thestart import instruction is submitted (YES in step S305), the processingproceeds to step S306. If the start import instruction is not yetsubmitted (NO in step S305), the processing returns to step S301.

In step S306, the CPU 11 acquires the import file from the electronicapparatus 3 and determines whether the import file is created in anacceptable form by the image communication apparatus 1. If the importfile is not created in an acceptable form (NO in step S306), theprocessing proceeds to step S307. In step S307, the CPU 11 displays awarning message informing the user that the import file designated onthe import operation screen 601 is based on an invalid file format.Then, the processing returns to step S301.

In step S306, if the import file is acceptable by the imagecommunication apparatus 1 (YES in step S306), the processing proceeds tostep S308. In step S308, the CPU 11 determines whether the headerindicating that the address information in the import file correspondsto private address book data is added to the import file.

If the header is added to the import file (YES in step S308), theprocessing proceeds to step S309. If the header is not added to theimport file (NO in step S308), the processing proceeds to step S311. Instep S309, the CPU 11 determines whether the address book area 301 wherethe import file is to be stored is set to be the shared address bookarea 302. If the address book area 301 where the import file is to bestored is set to be the shared address book area 302 (YES in step S309),the processing proceeds to step S310. If the address book area 301 wherethe import file is to be stored is not set to be the shared address bookarea 302 (NO in step S309), the processing proceeds to step S311. Instep S310, the CPU 11 displays a warning message informing the user thatthe address information exported from the private address book area 303will be stored in the shared address book area 302 and disclosed. Afterthe warning message is displayed, the processing returns to step S301.

In step S311, the CPU 11 generates a decoding key using the passwordinput in step S304.

After the decoding key is generated, the CPU 11 writes the addressinformation, which is included in the import file, in the address bookarea 301 where the import file is to be stored. In step S312, the CPU 11determines whether address information to be imported remains in theimport file. If address information remains in the import file (YES instep S312), the processing proceeds to step S313. In step S313, the CPU11 acquires the address information from the import file. In step S314,the CPU 11 determines whether password information is included in theacquired address information. If password information is included (YESin step S314), the processing proceeds to step S315. If passwordinformation is not included (NO in step S314), the processing proceedsto step S316. In step S315, the CPU 11 decodes the password informationin the address information using the decoding key. Then, the processingproceeds to step S316.

In step S316, the CPU 11 writes the address information in thedesignated address book area 301 where the import file is to be stored.Then, the processing returns to step S312. In step S312, if addressinformation no longer remains in the import file (NO in step S312), thenthe import processing ends.

As described above, if the address book data to be imported is theprivate address book data, a warning message is displayed so as not tostore the private address book data in the shared address book area 302.Accordingly, it is possible to prevent the address information frombeing disclosed. Further, since the password information is encryptedand decrypted using the password, it is possible to prevent the passwordinformation from being disclosed when it is exported/imported.

FIG. 12 is a flowchart illustrating the import processing according tothe second exemplary embodiment. The second exemplary embodiment isdifferent from the first exemplary embodiment in that the addressinformation of the import file is exported from the private address bookdata and the area where the import file is to be stored is the sharedaddress book area 302. As for the configuration of the imagecommunication apparatus 1 and other processing, since they are similarto those of the first exemplary embodiment, their description is notrepeated.

In step S309, if the area where the import file is to be stored is theshared address book area 302 (YES in step S309), the processing proceedsto step S401. In step S401, the CPU 11 of the image communicationapparatus 1 deletes the identifier and the password information in theaddress information of the import file. After the identifier and thepassword information are deleted, the CPU 11 writes the addressinformation, which is included in the import file, in the shared addressbook area 302 of the area where the import file is to be stored.

According to the second exemplary embodiment, when the shared addressbook area 302 is designated as the area where the import file is to bestored, the identifier and the password information in the addressinformation will be deleted, and thus such information is not disclosed.

FIGS. 13 and 14 are flowcharts illustrating the import processingaccording to the third exemplary embodiment. The third exemplaryembodiment is different from the first exemplary embodiment in that theaddress information of the import file is exported from the privateaddress book data and the area where the import file is to be stored isthe shared address book area 302. As for the configuration of the imagecommunication apparatus 1 and other processing, since they are similarto those of the first exemplary embodiment, their description is notrepeated.

According to the third exemplary embodiment, the identifier and thepassword information included in the address information of an importfile is stored in a table of the storage unit 13 (hereinafter referredto as a “key ring table”). FIG. 15 illustrates an example of the keyring table. The CPU 11 extracts the identifier and the passwordinformation from the address information including the identifier andthe password information and stores them in a key ring table bycorrelating the extracted identifier and password information to theaddress information.

According to the example in FIG. 15, the address information isinformation that identifies an electronic apparatus as a communicationtarget. The identifier is information for identifying the user by theelectronic apparatus. The password information is authenticationinformation for authenticating the user by the electronic apparatus. AnID as a user identifier for identifying the user by the imagecommunication apparatus 1 is correlated to the key ring table. Accordingto the example in FIG. 15, the ID is “user 1”. Only the user of this IDcan use the key ring table. This ID is same as the one input via theauthentication screen in FIG. 5.

In step S309 in FIG. 13, if the area where the import file is to bestored is the shared address book area 302 (YES in step S309), theprocessing proceeds to step S501 in FIG. 14. In step S504, the CPU 11generates a decryption key for decrypting the password information usingthe password input in step S304. After the generation of the decryptionkey, the CPU 11 writes the address information, which is included in theimport file, in the shared address book area 302 of the area where theimport file is to be stored. In step S502, the CPU 11 determines whetheraddress information to be imported still remains in the import file. Ifsuch address information remains (YES in step S502), the processingproceeds to step S503. If such address information does not remain (NOin step S502), then the processing ends. In step S503, the CPU 11acquires the address information from the import file.

In step S504, the CPU 11 determines whether the password information isincluded in the acquired address information. If the passwordinformation is included (YES in step S504), the processing proceeds tostep S505. If the password information is not included (NO in stepS504), the processing proceeds to step S508. In step S505, the CPU 11decrypts the password information in the address information using thedecryption key. In step S506, the CPU 11 registers the identifier andthe password information in the key ring table after correlating them tothe address information. In step S507, the CPU 11 deletes the identifierand the password information from the address information. Then, theprocessing proceeds to step S508.

In step S508, the CPU 11 writes the designated address information inthe shared address book area 302. When the CPU finishes writing alladdress information, which is included in the import file, in the sharedaddress book area 302, the processing ends.

According to the third exemplary embodiment, since the identifier andthe password information in the address information are deleted, theinformation is not disclosed. Further, all identifiers and passwordinformation included in the import file are registered in the key ringtable. Since the key ring table can be referenced only by theauthenticated user, the identifier and the password information are notdisclosed to other users.

FIG. 16 is a flowchart illustrating the import processing according tothe fourth exemplary embodiment. The fourth exemplary embodiment isdifferent from the first exemplary embodiment in that after displayingthe warning message informing the user that the address information maybe disclosed, the address information is imported with the consent ofthe user. As for the configuration of the image communication apparatus1 and other processing, since they are similar to those of the firstexemplary embodiment, their description is not repeated.

In step S309, if the address book area 301 where the import file is tobe stored is the shared address book area 302 (YES in step S309), theprocessing proceeds to step S310. In step S310, the CPU 11 displays awarning message, on the import operation screen 601, informing the userthat the address information may be disclosed.

An example of the message displayed by the CPU 11 on the importoperation screen 601 is illustrated in FIG. 17. The CPU 11 displays thewarning message 701 to determine whether the user is willing to continuethe import operation while warning the user of the possibility that theidentifier and the password information may be disclosed. An “executeimport” button 702 and a “cancel import” button 703 are provided withthe warning message 701. In step S601, the CPU 11 determines whether the“execute import” button 702 is selected by the user. If the “executeimport” button 702 is selected (YES in step S601), the processingproceeds to step S312 and the CPU 11 imports the address informationsince the user has permitted the disclosure of the address information.

On the other hand, in step S601, if the “cancel import” button 703 isselected (NO in step S601), the CPU 11 determines that the user did notpermit the disclosure of the address information, and the processingreturns to step S301.

According to the fourth exemplary embodiment, the address information isdisclosed only when the user permits the disclosure of the addressinformation. According to the consent of the user, address informationcan be flexibly imported.

According to the present invention, if the import of the private data tothe shared area is instructed, a warning message informing the user thatthe private data will be shared is displayed. Thus, it is possible toprevent the private data from being disclosed and shared by unspecifiedusers by mistake.

According to the above-described exemplary embodiment, although theimage communication apparatus 1 is described as an apparatus including ascanner function, a network communication function, and a fax machinefunction, it can be an apparatus including functions such as a printfunction and a copy function. Further, the present invention is alsoapplicable to an image communication apparatus including not all of suchfunctions.

Other Embodiments

Embodiments of the present invention can also be realized by a computerof a system or apparatus that reads out and executes computer executableinstructions recorded on a storage medium (e.g., non-transitorycomputer-readable storage medium) to perform the functions of one ormore of the above-described embodiment(s) of the present invention, andby a method performed by the computer of the system or apparatus by, forexample, reading out and executing the computer executable instructionsfrom the storage medium to perform the functions of one or more of theabove-described embodiment(s). The computer may comprise one or more ofa central processing unit (CPU), micro processing unit (MPU), or othercircuitry, and may include a network of separate computers or separatecomputer processors. The computer executable instructions may beprovided to the computer, for example, from a network or the storagemedium. The storage medium may include, for example, one or more of ahard disk, a random-access memory (RAM), a read only memory (ROM), astorage of distributed computing systems, an optical disk (such as acompact disc (CD), digital versatile disc (DVD), or Blu-ray Disc (BD)™),a flash memory device, a memory card, and the like.

While the present invention has been described with reference toexemplary embodiments, it is to be understood that the invention is notlimited to the disclosed exemplary embodiments. The scope of thefollowing claims is to be accorded the broadest interpretation so as toencompass all such modifications and equivalent structures andfunctions.

What is claimed is:
 1. An import apparatus comprising: a storage unit; amemory device that stores a set of instructions; and at least oneprocessor that executes the instructions to: manage data shared among aplurality of users as shared data in the storage unit; manage dataindividually provided for each user as individual data in the storageunit; accept a file including data to be imported via a user interfacewhich the import apparatus provides to an electronic apparatus by usinga hypertext transfer protocol, determine whether the accepted file is afirst file including private data according to type data added to theaccepted file; store the private data included in the accepted file asthe individual data in the storage unit if it is determined that theaccepted file is the first file and a designation for causing the importapparatus to manage the data included in the accepted file as theindividual data is further accepted via the user interface; store thedata included in the accepted file as the shared data in the storageunit if it is determined that the accepted file is a second file towhich the type data has not been added and a designation for causing theimport apparatus to manage the data included in the accepted file as theshared data is further accepted via the user interface, and display awarning message via the user interface without storing the private dataincluded in the accepted file in the storage unit if it is determinedthat the accepted file is the first file and the designation for causingthe import apparatus to manage the data included in the accepted file asthe shared data is further accepted via the user interface.
 2. Theimport apparatus according to claim 1, wherein the private data isaddress data individually used by a user of an export apparatus whichhas exported the file accepted via the user interface.
 3. The importapparatus according to claim 1, wherein the type data is added to thefirst file as a file header.
 4. The import apparatus according to claim1, wherein the designation for causing the import apparatus to managethe data included in the accepted file as the individual data is adesignation indicating a private address book.
 5. The import apparatusaccording to claim 1, wherein the designation for causing the importapparatus to manage the data included in the accepted file as the shareddata is a designation indicating a shared address book.
 6. A controlmethod for an import apparatus having a storage unit, the control methodcomprising: managing data shared among a plurality of users as shareddata in the storage unit; managing data individually provided for eachuser as individual data in the storage unit; accepting a file includingdata to be imported via a user interface which the import apparatusprovides to an electronic apparatus by using a hypertext transferprotocol, determining whether the accepted file is a first fileincluding private data according to type data added to the acceptedfile; storing the private data included in the accepted file as theindividual data in the storage unit if it is determined that theaccepted file is the first file and a designation for causing the importapparatus to manage the data included in the accepted file as theindividual data is further accepted via the user interface; storing dataincluded in the accepted file as the shared data in the storage unit ifit is determined that the accepted file is a second file to which thetype data has not been added and a designation for causing the importapparatus to manage the data included in the accepted file as the shareddata is further accepted via the user interface, and displaying awarning message via the user interface without storing the private dataincluded in the accepted file in the storage unit if it is determinedthat the accepted file is the first file and the designation for causingthe import apparatus to manage the data included in the accepted file asthe shared data is further accepted via the user interface.
 7. Anon-transitory computer readable storage medium storing a programcausing a computer having a storage unit to execute a control methodcomprising: managing data shared among a plurality of users as shareddata in the storage unit; managing data individually provided for eachuser as individual data in the storage unit; accepting a file includingdata to be imported via a user interface which the import apparatusprovides to an electronic apparatus by using a hypertext transferprotocol, determining whether the accepted file is a first fileincluding private data according to type data added to the acceptedfile; storing the private data included in the accepted file as theindividual data in the storage unit if it is determined that theaccepted file is the first file and a designation for causing the importapparatus to manage the data included in the accepted file as theindividual data is further accepted via the user interface; storing dataincluded in the accepted file as the shared data in the storage unit ifit is determined that the accepted file is a second file to which thetype data has not been added and a designation for causing the importapparatus to manage the data included in the accepted file as the shareddata is further accepted via the user interface, and displaying awarning message via the user interface without storing the private dataincluded in the accepted file in the storage unit if it is determinedthat the accepted file is the first file and the designation for causingthe import apparatus to manage the data included in the accepted file asthe shared data is further accepted via the user interface.