Image forming apparatus, control method for the same, and storage medium

ABSTRACT

When attribute information for a user has been acquired by authentication using an authentication apparatus, a restriction on a useable function is imposed according to the attribute information. When a fee has been collected by a fee collection apparatus, a restriction is imposed on preset functions. In either of these cases, use of the image forming apparatus by another user is prohibited until use by the first user in the useable state is finished.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a Continuation of U.S. application Ser. No.12/875,397, filed Sep. 3, 2010, which claims the benefit of JapanesePatent Application No. 2009-209813, filed Sep. 10, 2009 which is herebyincorporated by reference herein in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an image forming apparatus, a controlmethod for the same and a storage medium.

2. Description of the Related Art

Recently, there has been a demand for improving the security features ofinformation processing apparatuses to prevent leakage of information. Aknown image forming apparatus such as a multifunction peripheral (MFP)that handles document information as electrical data includes varioustypes of security functions and controls access by user authenticationor the like. For example, a sequence for user access control includesimposing a restriction on the use by a user of the respective functionsof an image forming apparatus and only executing image formation(printing) of authenticated user data.

For example, Japanese Patent Application Laid-Open No. 11-258954proposes a switchable image forming apparatus that includes a feeinsertion device, and has a charging management mode (general user mode)and a non-charging management mode (for managers and servicingpersonnel). In this image forming apparatus, a suitable restriction isimposed on the functions that can be used by a general user or by amanager by providing a setting for image forming conditions that differaccording to the mode.

Furthermore, an image forming apparatus has been recently developed inwhich a charging apparatus such as a coin vendor and an authenticationapparatus such as a card reader are connected to enable a common-useenvironment by both a general non-specified user and a specified usersuch as an employee. Japanese Patent Application Laid-Open No.2007-65211 proposes a technique of suitably selecting a chargingmanagement apparatus that charges for the execution of a job in an imageforming apparatus connected to a plurality charging managementapparatuses such as a coin vendor or a card reader.

However, the following problems arise when user access is controlled inan image forming apparatus in which both a coin vendor and a card readerare connected in the above manner. For example, when permission to usethe apparatus is given to another user who has inserted a fee into thecoin vendor after a specified user has logged into the image formingapparatus using card authentication via a card reader, the accesscontrol may no longer match the situation. More specifically, when aplurality of users are logged in, who have different user restrictionsimposed on different functions, it is possible that a restriction mustbe imposed on use by another user in relation to functions that aspecified user is permitted to use. In that case, there is the problemthat it is difficult to suitably restrict use of respective functions torespective users.

SUMMARY OF THE INVENTION

An image forming apparatus includes a switching unit configured toswitch to a useable state in an authentication mode in which use of theimage forming apparatus is permitted according to an authenticationresult when authentication is performed using the authenticationapparatus, and configured to switch to a useable state in a feecollection mode in which use of the image forming apparatus is permittedaccording to a collected fee when a fee is collected using the feecollection apparatus, a restriction unit configured to impose arestriction on a useable function according to attribute information foran authenticated user when switching to the authentication mode, andconfigured to impose a restriction on a preset function in the feecollection mode when switching to the fee collection mode, and aprohibition unit configured to prohibit use by another user when arestriction is imposed on the function.

Further features and aspects of the present invention will becomeapparent from the following detailed description of exemplaryembodiments with reference to the attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of the specification, illustrate exemplary embodiments, features,and aspects of the invention and, together with the description, serveto explain the principles of the invention.

FIG. 1 illustrates an example of a system configuration of an MFPaccording to a first exemplary embodiment of the present invention.

FIG. 2 illustrates an example of a configuration of a control unit inthe MFP according to the first exemplary embodiment of the presentinvention.

FIG. 3 illustrates an example of a management table including usepermission information for each function in the MFP according to thefirst exemplary embodiment of the present invention.

FIG. 4 illustrates an example of an operation screen displayed on an LCDdisplay unit of an operation unit in the MFP according to the firstexemplary embodiment of the present invention.

FIG. 5 is a flowchart illustrating a procedure for access control in theMFP according to the first exemplary embodiment of the presentinvention.

FIG. 6 illustrates an example of a management table including usepermission information for each function in the MFP according to asecond exemplary embodiment of the present invention.

FIG. 7 is a flowchart illustrating a procedure for access control in theMFP according to the second exemplary embodiment of the presentinvention.

FIG. 8 illustrates an example of a screen displayed on an LCD displayunit of an operation unit in the MFP according to a third exemplaryembodiment of the present invention.

FIG. 9 illustrates an example of a screen displayed on an LCD displayunit of an operation unit in the MFP according to the third exemplaryembodiment of the present invention.

FIG. 10 illustrates a flowchart of a job execution procedure when anadditional fee is required during execution of a job in the MFPaccording to the third exemplary embodiment of the present invention.

FIG. 11 illustrates a flowchart of a job execution procedure when anadditional fee is required when commencing a job in the MFP according tothe third exemplary embodiment of the present invention.

DESCRIPTION OF THE EMBODIMENTS

Various exemplary embodiments, features, and aspects of the inventionwill be described in detail below with reference to the drawings.

An exemplary embodiment of the present invention will be describedbelow. The exemplary embodiment described below is adapted to facilitatecomprehension of various concepts of the present invention including ageneric concept, an intermediate concept and a specific concept.Furthermore the technical scope of the present invention is determinedby the scope of the patent claims, and is not restricted by thefollowing exemplary embodiments.

A first exemplary embodiment of the present invention will be describedbellow referring to FIG. 1 to FIG. 5. An MFP will be described as anexample of an image forming apparatus in the present embodiment.

Configuration of Image Forming Apparatus

Firstly, an example of a system configuration of an MFP 100 will bedescribed using FIG. 1. As illustrated in FIG. 1, an MFP 100 includes aprinter unit 102, a scanner unit 103, an operation unit 104, and acontrol unit 101, and is connected with an authentication apparatus 130and a charging apparatus 140. The MFP 100 is connected with a hostcomputer (PC) 151, 152 through a local area network (LAN) 150. Anynumber of PCs 151, 152 may be connected to the LAN 150.

The control unit 101 realizes various functions in the MFP 100 bycontrolling the operation of the printer unit 102, the scanner unit 103,and the operation unit 104. The printer unit 102 forms images (prints)on a recording medium (paper) using image data received from the controlunit 101. The scanner unit 103 generates image data (scan image data) byreading an image from an original document. The operation unit 104includes a keyboard and an LCD display unit. The state of variousoperation screens, instruction screens and the MFP 100 is displayed onthe LCD display unit of the operation unit 104.

The authentication apparatus 130 is an apparatus for authenticating auser who uses the MFP 100. The present exemplary embodiment describes anon-contact IC card reader as an example of the authentication apparatus130. Attribute information of a user is prerecorded on the non-contactIC card (hereafter referred to as “IC card”) used in the authenticationprocess. The attribute information of a user read from the IC card inthe authentication apparatus 130 is sent to the control unit 101 to beused in the authentication process.

The charging apparatus 140 is a fee collection apparatus for collectinga fee charged to a user that uses the MFP 100. In the present exemplaryembodiment, the charging apparatus 140 is a coin vendor that receives acash payment (bills or coins) from a user. The charging apparatus 140may be a fee collection apparatus or the like that collects a fee usinga cash card, a prepaid card, electronic money, or the like. When the MFP100 is operated by a fee collected using the coin vendor 140, the fee iscalculated by the control unit 101 and charged to the user according toa number of print copies, a size, a color mode or the like of the jobinput by the user. The calculated fee is collected from the user by thecoin vendor 140.

Configuration of the Control Unit 101

An example of a configuration of the control unit 101 will be describedbelow using FIG. 2. Each device in the control unit 101 is connected toa central processing unit (CPU) 110 through an internal bus 105. The CPU110 reads programs stored in a read only memory (ROM) 121 using a ROMcontroller 113, and controls the overall operation of the control unit101 with the programs. The ROM 121 is a rewritable ROM (Flash ROM). Arandom access memory (RAM) 122 is used as a work memory when the CPU 110executes various processes, or as a buffer that stores image data.Access from the CPU 110 to the RAM 122 is performed via a RAM controller114.

A host I/F unit 111 sends and receives image data or print code datastated in printer-specific language by communication with the PC 151 and152 that are connected via the LAN 150. A scanner I/F unit 112communicates with the scanner unit 103 and receives scanner image datainput from the scanner unit 103. An engine I/F unit 115 communicateswith the printer unit 102 and outputs image data for printing to theprinter unit 102. A HDD 116 temporarily stores image data for printingor a FAX transmission, and stores the store target image data using aBOX function or the like.

The authentication apparatus 130 is connected to an authenticationapparatus I/F unit 119. The CPU 110 controls the authenticationapparatus 130 via the authentication apparatus I/F unit 119, andperforms user authentication based on information received from theauthentication apparatus 130. The CPU 110 permits use of a function ofthe MFP 100 to a user based on the authentication result. The chargingapparatus (coin vendor) 140 is connected to a charging apparatus I/Funit 120. The CPU 110 controls the charging apparatus 140 via thecharging apparatus I/F unit 120, and collects a fee charged to the userwith the charging apparatus 140.

A power saving control unit 117 switches the MFP 110 to power savingmode by placing the power source of the printer unit 102 and acontroller power source unit 118 in the OFF position when apredetermined time is exceeded without an operation performed on theoperation unit 104. The host unit I/F unit 111 is under the supply of anelectrical current also during power saving mode, and monitors receiptof data from an external unit. When the host I/F unit 111 detectsreceipt of data from an external unit, the power saving control unit 117returns the MFP 100 to normal operating mode by returning the powersource for the printer unit 102 and the control power source unit 118 tothe ON position.

The MFP 100 having the above configuration realizes various functions bythe CPU 110 in the control unit 101. The MFP 110 executes a print job inthe following manner. Firstly, a setting and data related to the printjob is received via the host I/F unit 11 through the LAN 150 from theexternal PC 151 or PC 152. The control unit 101 develops the data forthe job that is stated in page description language (PDL) into a bit mapformat, and generates image data as the print object according todesignated information. The control unit 101 sends the generated imagedata to the printer unit 102 via the engine I/F unit 115 and startsprint processing.

A copy job (color or monochrome) is realized in the MFP 100 in thefollowing manner. A user inputs a setting and execution instruction fora copy job via the operation unit 104. The control unit 101 startsexecution of the copy job according to set information such as the inputpaper size information or color mode information. Firstly, image data isproduced by reading an image from the original document in the scannerunit 103 according to the control of the control unit 101. The CPU 110controls the control unit 101 to acquire the produced image data via thescanner I/F unit 112 and execute image processing using the image dataaccording to the set information. The CPU 110 sends the image data viathe engine I/F unit 115 to the printer unit 102 and starts printprocessing.

Access Control in the Image Forming Apparatus

In the present exemplary embodiment, respective users start use of theMFP 100 by authentication via the authentication apparatus 130 using anIC card that records the attribute data of that user, or by inserting afee into the coin vendor 140. When the use of the MFP is started by cardauthentication using an IC card, the MFP 100 restricts the useablefunctions according to the attribute information acquired in theauthentication process to thereby realize user access control. When theuse of the MFP is started by insertion of a fee into the coin vendor140, the MFP 100 realizes access control by permitting use ofpredetermined functions to the user. In either of the above cases, theMFP 100 prohibits its use by another user when the MFP 100 switches to auseable state (log-in state).

Access control using the authentication apparatus 130 and the coinvendor 140 in the MFP 100 according to the present exemplary embodimentwill be described below using FIG. 5. Firstly, when the MFP 100 is in astate in which no user is logged in, (a log-off state), in step S101,the CPU 110 determines whether the use has been started by a user. Theuse of the MFP 100 is started by card authentication using theauthentication apparatus 130 or by insertion of a fee into the coinvendor 140. When using card authentication, the IC card of eachrespective user is used to enable reading by the authenticationapparatus 130 of information (attribute information or the like) that isprerecorded on the card. When the CPU 110 determines that either cardauthentication or insertion of a fee into the coin vendor 140 has beenperformed, the processing proceeds to step S102. On the other hand, whenthe CPU 110 determines that neither card authentication nor insertion ofa fee into the coin vendor 140 has been performed, the determinationprocess is repeated. In step S101, a screen including a messageprompting IC card authentication or fee insertion may be displayed onthe LCD display unit of the operation unit 104. In this manner, the userconvenience can be improved.

In step S102, the CPU 110 determines whether the operation performed instep S101 was card authentication using the authentication apparatus130. When it is determined that the operation was card authentication,the processing proceeds to step S103. On the other hand, when theoperation is determined to be insertion of a fee into the coin vendor140 and not card authentication, the processing proceeds to step S105.After both steps S103 and S105, the CPU 110 places the MFP 100 in auseable state.

Switching to Authentication Mode

In step S103, the CPI 110 switches the MFP 100 to a useable mode (log-instate) in which use of the MFP 100 is permitted to a user according toan authentication mode based on the authentication result of the cardauthentication. In step S104, the CPU 110 restricts the useablefunctions according to the user attribute information acquired from thecard authentication. More specifically, the CPU 110 refers to themanagement table 300 illustrated in FIG. 3 that is pre-stored in therewritable ROM 121 and reads out the use permission information for eachfunction assigned to the acquired attribute information. Furthermore arestriction is imposed on the functions according to the use permissioninformation so that only permitted functions are placed in a useablestate for that user. Then, the processing proceeds to step S107. Insubstitution for user attribute information, the IC card may prerecorduse permission information as illustrated in the management table 300.In this case, the MFP 100 imposes a use restriction according to the usepermission information recorded on the IC card.

The management table 300 associates attribute information for each userusing card authentication with a useable job (function) 301 in the MFP100. According to the management table 300, for example, a user A (302)who has attribute information of “managerial staff” can use allfunctions. In contrast, a user B (303) who has attribute information of“general office employee” can use functions other than color copying.The management table 300 presets use permission information for eachfunction for a user 304 that uses the coin vendor 140. That process isused in fee collection mode as described below.

Although the management table 300 illustrates an example of settingattribute information according to the job category (managerial staff,general office employee) of a user, attribute information an individualuser may be set. For example, management of the functions that can beused by respective departments is enabled by setting attributeinformation for each office department. In this manner, setting ofattribute information and use permission information corresponding tothe attribute information can be freely set in advance by a decisionmade by a manager of the MFP 100.

Switching to Fee Collection Mode

On the other hand, in step S105, the CPU 110 switches the MFP 110 to auseable state in which a user can use the MFP 100 in fee collection modeaccording to a fee collected using a coin vendor 140. Then in step S106,the CPU 110 restricts the useable functions according to the usepermission information in the fee collection mode that is preset in themanagement table 300. In this manner, only functions that are permittedto a user of the coin vendor 140 are placed in a useable state.Thereafter the processing proceeds to step S107.

In accordance with the management table 300, the CPU 110 permits a userto use only the monochrome copy and color copy functions when the useruses the coin vendor 140 conditional upon a payment condition of apredetermined fee, and restricts use of other functions. When the coinvendor 140 is used by a non-specified user, this processing imposes arestriction on use differently from card authentication. In this manner,a risk of leaking information from the MFP 100 can be reduced byimposing a restriction on a transmission or FAX function fortransmitting document data through a network, or on a BOX function thatstores document data in the HDD 116 or the like of the MFP 100.

Then in step S107, the CPU 110 prohibits use of the MFP 100 by anotheruser, in a useable state either in authentication mode or fee collectionmode, until that use is completed. For example, the CPU 110 prohibitslog-in by another user using an IC card by invalidating theauthentication apparatus 130. Furthermore collection of a fee using thecoin vendor 140 is prohibited. More specifically, when a fee is insertedby another user into the coin vendor 140, that fee may be discharged tothe coin return without processing. Furthermore the fee insertion portof the coin vendor 140 may be locked. The processing in step S107prevents a state in which a plurality of users can use the apparatus,and imposes a suitable restriction on use of respective functions toindividual users. Thereafter the processing proceeds to step S108.

In step S108, the CPU 110 receives the input of set information for thejob via the operation unit 104 or the like, and starts the execution ofthe set job. When the job is input into the MFP 100, for example, anoperation screen 400 as illustrated in FIG. 4 is displayed on the LCDdisplay unit of the operation unit 104. A user inputs the setting forthe job, using the operation screen 400 by operating a touch paneldisposed on the LCD display unit.

The operation screen 400 is displayed according to the settings in themanagement table 300. For example, when the user B (303) usesauthentication mode, since color copying is restricted, only themonochrome copy (black and white) can be selected by a button 402.Furthermore when in fee collection mode, “send/FAX” or “BOX” thatcorrespond to the restricted functions are not displayed by a tab 401.Furthermore the processing in step S107 prevents a use state of the MFP100 in which a plurality of users can simultaneously use the apparatus.Consequently, a plurality of users who have a variety of use permissioncannot share use of the operation screen 400. Therefore, suitabledisplay on the operation screen 400 in the MFP 100 according to thepresent exemplary embodiment is performed according to the usepermission information for the user.

When executing a print job that prints image data transmitted throughthe LAN 150 from the PC 151 or the like, setting information for the jobis input to the MFP 100 together with the image data. Therefore inauthentication mode, in substitution for card authentication, the MFP100 may receive authentication information input through the operationscreen displayed on the PC 151 or the like, and may acquire attributeinformation based on this authentication information.

After executing the job in step S108, in step S109, the CPU 110determines whether the use of the MFP 100 is finished. When CPU 100detects that a key instructing switching to a log-off mode, such as acancel key on the operation unit 104, has been pressed by a user, theCPU 100 determines that use has finished and switches to a log-offstate. When the cancel key or the like on the operation unit 104 ispressed during execution of a job, execution of the job may be cancelledand the MPF 100 may switch to log-off mode. On the other hand, in stepS109, when a new job is input, the CPU 110 returns to step S108 bydetermining that use has not finished, and executes the subsequent job.

During fee collection mode, it is determined that use has finished whenthere are no residual funds in the coin vendor 140. Although the feeinserted into the coin vendor 140 is collected for use of respectivefunctions according to the settings in the management table 300, a usermay supplement the fee to the coin vendor 140 during execution of thejob.

As described above, an image forming apparatus according to the presentexemplary embodiment uses both an authentication apparatus thatauthenticates a user and a fee collection apparatus that charges a userand collects a fee from the user to control user access. Morespecifically, when the image forming apparatus acquires attributeinformation for a user by authentication using the authenticationapparatus, the information is used to restrict the useable functions. Onthe other hand, when a fee is collected by the fee collection apparatus,preset functions are restricted. In either of the above cases, in auseable state for that user, until that user finishes the use, use byanother user is prohibited. In this manner, a useable state whichenables use by a plurality of users is prohibited and it is possible tosuitably restrict use of respective functions to respective users.

Next a second exemplary embodiment of the present invention will bedescribed using FIG. 6 and FIG. 7. In the description below, only theaspects of the configuration and techniques that differ from the firstexemplary embodiment will be described. The MFP 100 according to thefirst exemplary embodiment is characterized by restricting the useablefunctions in authentication mode according to acquired attributeinformation for a user and prohibiting use by another user. In contrast,when an additional fee is inserted into the coin vendor 140 by thecurrent user and not another user, it may be desirable that use ofrestricted functions is permitted to the user according to theadditional fee. In addition to the configuration of the first exemplaryembodiment, the present exemplary embodiment is characterized in that acurrent user is permitted to use a restricted function.

Access control using the authentication apparatus 130 and the coinvendor 140 in the MFP 100 according to the present exemplary embodimentwill be described below using FIG. 7. Firstly step S201 and step S202are the same as step S101 and step S102 illustrated in FIG. 5. Afterproceeding to step S203 from step S202, the CPU 110 switches a processto authentication mode in the same manner as step S103 and step S104. Instep S204, the CPU 110 refers to the management table 600 illustrated inFIG. 6 and reads out use permission information for each functionassociated with the attribute information, which is acquired in the userauthentication process. Then the MFP 100 is placed in a useable state inwhich the user can only use permitted functions, by imposing arestriction on the functions according to the use permissioninformation. Thereafter the processing proceeds to step S205.

In step S205, the CPU 110 determines whether an additional fee has beencollected by the coin vendor 140. When an additional fee has beeninserted by a user into the coin vendor 140, the CPU 110 determines thatthe additional fee has been collected and proceeds to step S206. In stepS206, the CPU 110 refers to the functions on which a use restriction wasimposed in step S204 on the basis of the attribute information for theuser and refers to the management table 600 to permit the user to usethe apparatus according to the collected additional fee. Thereafter theprocessing proceeds to step S209. On the other hand, in step S205, whenan additional fee is not inserted into the coin vendor 140, the CPU 110determines that collection of an additional fee has not been executedand proceeds the processing to step S209.

According to the management table 600, although the user B (602) may usefunctions other than color copying in the same manner as the settingsfor the user B (302) in the management table 300, permission to usecolor copying functions is not given. However when user B wishes to usethe color copying function, in step S205 and step S206, use of thatfunction is permitted upon payment of an additional fee that is presetin the management table 600. As can be seen when the use permissioninformation for the user B (602) and the user C (603) in the managementtable 600 is compared, a different additional fee maybe set to each useraccording to the function. Furthermore the use permission informationfor a coin-vendor user can be set in the management table 600 in thesame manner as the management table 300 according to the first exemplaryembodiment.

The switching processing to fee collection mode in step S207 and stepS208 is realized by the same processing as step S105 and step S106. Theprocessing in steps S209 to S211 is realized by processing that is thesame as that insteps S107 to S109. In step S210 and step S211, whenthere is a change in the residual funds in the coin vendor 140 in thecourse of job execution or due to insertion of an additional fee fromthe coin vendor 140, the CPU 110 refers again to the management table600. In this manner, the CPU 110 can determine whether the residualfunds satisfy the conditions set in the management table 600 in relationto functions permitted in step S206, and can enable use of the functionwhen the relevant condition is satisfied.

As described above, when the image forming apparatus according to thepresent exemplary embodiment is switched to a useable state in whichauthentication of a user is executed by the authentication apparatus, afunction on which a restriction is imposed on the basis of userattribute information can be used conditional upon the collection of anpredetermined additional fee. In this manner, in addition to the effectof the first exemplary embodiment, a more flexible response to userpermission in relation to respective functions is possible by collectionof an additional fee and therefore convenience from a management pointof view can be improved in relation to user restrictions on respectivefunctions.

A third exemplary embodiment of the present invention will be describedusing FIG. 5, and FIG. 8 to FIG. 11. In the description below, only theaspects of the configuration and techniques that differ from the firstand the second exemplary embodiments will be described. As amodification of the second exemplary embodiment, the present exemplaryembodiment is characterized in that when a copy job or a print jobincluding image forming (printing) is performed in authentication mode,a restriction is imposed on an upper limit of the number of sheets thatcan be printed according to the user attribute information.

The CPU 110 of the MFP 100 according to the present exemplary embodimentrealizes access control using the authentication apparatus 130 and thecoin vendor 140 according to the procedure illustrated in FIG. 5. Sincethe switching process to fee collection mode is the same as thatdescribed in the first exemplary embodiment, only the switching processto authentication mode will be described.

In step S101 to step S103, the CPU 110 switches to authentication modewhen card authentication is executed using the authentication apparatus130. In step S110, the CPU 110 restricts the useable functions accordingto the user attribute information acquired by the card authentication.At that time, when use is permitted of functions such as a copying jobor a print job including print processing, the CPU 110 uses theattribute information to impose a further restriction on the permittedthe upper limit of the sheets that can be print processed in thatfunction. Information related to the upper limit of the sheets isassociated with user attribute information and is pre-stored in the ROM121. Alternatively, this information may be prerecorded in an IC card.

Then after the processing in step S107, the processing proceeds to stepS108. The details of the processing in step S108 will be described belowbased on the flowcharts illustrated in FIG. 10 and FIG. 11. In thepresent exemplary embodiment, when the printed-sheet number that ispreset for the job exceeds the upper limit of sheet, the MFP 100 chargesan additional fee required for the excess number of sheets to the userand collects the fee using the coin vendor 140. Fee collection may beperformed either after the job is started when the printed-sheet numberreaches the upper limit of sheet, or it may be collected prior tostarting the job. Consequently, these two situations will be describedseparately below.

Collection of Additional Fee during Job Execution

Firstly collection of the additional fee during job execution will bedescribed making reference to FIG. 10. In step S301, the CPU 110receives an input of setting information for a job by displaying theoperation screen 400 on the LCD display unit of the operation unit 104.Then in step S302, the CPU 110 starts execution of the input jobaccording to the start instructions from a user. When job execution hasstarted, in step S303, the CPU 110 determines whether the counter forcalculation of the number of printed sheets has reached the upper limitof sheet. When it is determined that the upper limit of sheet has notbeen reached, the processing proceeds to step S306. However when it isdetermined that the upper limit of sheet has been reached, theprocessing proceeds to step S304. The counter is associated with userattribute information, for example, and is managed by the ROM 121.

In step S304, the CPU 110 as illustrated in FIG. 8 executes displaycontrol to display a screen 801 including a message 802 promptinginsertion of an additional fee into the coin vendor 140 on the LCDdisplay unit of the operation unit 104. In this manner, the CPU 110charges the user an additional fee required for continuing theperformance of the job. Furthermore in step S305, the CPU 110 determineswhether the fee inserted into the coin vendor 140 corresponds to apredetermined amount required for printing of at least one sheet. Whenit is determined that the inserted amount is sufficient, the processingproceeds to step S306, and when it is determined that the insertedamount is not sufficient, the processing returns to step S304, anddisplay of the screen 801 is continued. When the cancel button 803 ofthe screen 801 is pressed by a user, execution of the job may becancelled.

In step S306, the CPU 110 outputs a job execution result by printing anddischarging one sheet. Furthermore in step S307, when the upper limit ofsheet has not been reached, the CPU 110 summates the counter thatcalculates the sheet number. On the other hand, when the upper limit ofsheet has already been reached, a fee is collected by deducting therequired fee for one print from the residual amount of the additionalfee. Thereafter, in step S308, the CPU 110 determines whether to finishjob execution by confirming whether the print number that is set for thejob has been completely executed. When it is determined that the job isfinished, the series of processes illustrated in the flowchart is endedand the processing proceeds to step S109 in FIG. 5. On the other hand,when it is determined that the job has not finished, the processingreturns to step S303, and execution of the job is continued.

Collection of Additional Fee Prior to Job Execution

Collection of the additional fee prior to job execution will bedescribed below making reference to FIG. 11. In step S401, the CPU 110in the same manner as step S301 receives input of setting informationfor a job from the operation screen 400 on the LCD display unit of theoperation unit 104. In step S402, the CPU 110 determines whether thenumber of sheets that is required for execution of the job is availableby calculating the difference between the counter calculating theprinted sheet number and the upper limit of sheet. When it is determinedthat the required sheet number is available, the processing proceeds tostep S407. On the other hand, when it is determined that the requiredsheet number is not available, the processing proceeds to step S403.

In step S403, the CPU 110 calculates the number of sheets exceeding theupper limit of sheet for execution of the job. In step S404, theadditional fee required to print the excess number of sheets iscalculated. Then the processing proceeds to step S405, and the CPU 110as illustrated in FIG. 9 displays a screen 901 including a message 902prompting insertion of the additional fee on the LCD display unit of theoperation unit 104. In this manner, the CPU 110 charges the requiredadditional fee to a user. Furthermore in step S406, the CPU 110determines whether the fee inserted into the coin vendor 140 issufficient for the required amount. When it is determined that the feeis sufficient for the required amount, the processing proceeds to stepS407. When the fee is not sufficient for the required amount, theprocessing returns to step S405, and the display of the screen 901 iscontinued. When the cancel button 903 on the screen 901 is pressed by auser, the execution of the job may be cancelled.

In step S407, the CPU 110 starts execution of the set job and dischargessheets after print processing in sequence. After execution of the job,in step S408, when the job has been executed without collection of anadditional fee, the CPU 110 summates the counter by the number of sheetsprinted in the job. When an additional fee is collected during executionof the job, the fee is collected by deducting the fee required forexecution of the job from the residual amount of the additional fee. Inthis manner, the series of processes illustrated in the flowchart isended and the processing proceeds to step S109 in FIG. 5. The processingin step S109 is the same as that described in the first exemplaryembodiment.

As described above, when the image forming apparatus according to thepresent embodiment switches to a useable state in which userauthentication is performed by the authentication apparatus, the imageforming apparatus restricts the upper limit of the printable number ofsheets according to user attribute information. When the printed numberof sheets set for a job exceeds the upper limit of sheet, a fee ischarged to a user for the excess number of sheets, and the job isexecuted conditional upon collection of the fee for the excess number ofsheets. In this manner, in addition to the effect of the first exemplaryembodiment, when the printed sheet number during execution of a singlejob exceeds the upper limit of sheet, cancellation of the job duringexecution of the job can be prevented. Furthermore as a result, jobexecution can be effectively carried out up to a set upper limit ofsheet without re-inputting the cancelled job by a user.

Other Embodiments

Aspects of the present invention can also be realized by a computer of asystem or apparatus (or devices such as a CPU or MPU) that reads out andexecutes a program recorded on a memory device to perform the functionsof the above-described embodiment (s), and by a method, the steps ofwhich are performed by a computer of a system or apparatus by, forexample, reading out and executing a program recorded on a memory deviceto perform the functions of the above-described embodiment(s). For thispurpose, the program is provided to the computer for example via anetwork or from a recording medium of various types serving as thememory device (e.g., computer-readable medium).

While the present invention has been described with reference toexemplary embodiments, it is to be understood that the invention is notlimited to the disclosed exemplary embodiments. The scope of thefollowing claims is to be accorded the broadest interpretation so as toencompass all such modifications and equivalent structures andfunctions.

What is claimed is:
 1. An image forming apparatus comprising: anauthentication I/F unit configured to connect the image formingapparatus to an authentication apparatus that authenticates a user whouses the image forming apparatus; an charging I/F unit configured toconnect the image forming apparatus to a charging apparatus thatcollects a fee charged to a user who uses the image forming apparatus;and a log-in processing unit configured to allow the user authenticatedby the authentication apparatus to log in the image forming apparatuswhen in an authentication mode or to allow the user who inserted a feeinto the charging apparatus to log in the image forming apparatus whenin a fee collection mode, the authentication mode and the fee collectionmode being switchable, wherein the log-in processing unit controls suchthat another user is not logged in the image forming apparatus while theuser is logging in the image forming apparatus.
 2. The image formingapparatus according to claim 1, wherein the authentication apparatus isan IC card reader configured to read authentication information from auser.
 3. The image forming apparatus according to claim 2, wherein thelog-in processing unit controls such that another user is not logged inthe image forming apparatus, by inhibiting reading of the authenticationinformation from the IC card reader.
 4. The image forming apparatusaccording to claim 1, wherein the charging apparatus is a coin vender.5. The image forming apparatus according to claim 1, further comprisinga control unit configured to, in a case where the authenticationapparatus authenticates a user, restrict usable functions of the imageforming apparatus based on attribute information of the authenticateduser, and in a case where a fee is inserted into the charging apparatus,restrict usable functions of the image forming apparatus based on presetinformation.
 6. The image forming apparatus according to claim 5,wherein the usable functions include a copy function, a print function,a send function, or box function.
 7. A control method for an imageforming apparatus, the method comprising: authenticating, by anauthentication apparatus, a user who uses the image forming apparatus;collecting, by a charging apparatus, a fee charged to a user who usesthe image forming apparatus; allowing the user authenticated by theauthentication apparatus to log in the image forming apparatus when inan authentication mode or allowing the user who inserted a fee into thecharging apparatus to log in the image forming apparatus when in a feecollection mode, the authentication mode and the fee collection modebeing switchable; and controlling such that another user is not loggedin the image forming apparatus while the user is logging in the imageforming apparatus.
 8. The control method according to claim 7, whereinthe authentication apparatus is an IC card reader configured to readauthentication information from a user.
 9. The control method accordingto claim 8, further comprising controlling such that another user is notlogged in the image forming apparatus, by inhibiting reading of theauthentication information from the IC card reader.
 10. The controlmethod according to claim 7, further comprising restricting, in a casewhere the authentication apparatus authenticates a user, usablefunctions of the image forming apparatus based on attribute informationof the authenticated user, and in a case where a fee is inserted intothe charging apparatus, restricting usable functions of the imageforming apparatus based on preset information.
 11. The control methodaccording to claim 10, wherein the usable functions include a copyfunction, a print function, a send function, or box function.
 12. Anon-transitory computer-readable medium storing a computer program forcausing an image forming apparatus to execute a method, the methodcomprising: authenticating, by an authentication apparatus, a user whouses the image forming apparatus; collecting, by a charging apparatus, afee charged to a user who uses the image forming apparatus; allowing theuser authenticated by the authentication apparatus to log in the imageforming apparatus when in an authentication mode or allowing a user whoinserted a fee into the charging apparatus to log in the image formingapparatus when in a fee collection mode, the authentication mode and thefee collection mode being switchable; and controlling such that anotheruser is not logged in the image forming apparatus while the user islogging in the image forming apparatus.
 13. The non-transitorycomputer-readable medium according to claim 12, wherein theauthentication apparatus is an IC card reader configured to readauthentication information from a user.
 14. The non-transitorycomputer-readable medium according to claim 13, further comprisingcontrolling such that another user is not logged in the image formingapparatus, by inhibiting reading of the authentication information fromthe IC card reader.
 15. The non-transitory computer-readable mediumaccording to claim 12, wherein the charging apparatus is a coin vender.16. The non-transitory computer-readable medium according to claim 12,further comprising restricting, in a case where the authenticationapparatus authenticates a user, usable functions of the image formingapparatus based on attribute information of the authenticated user, andin a case where a fee is inserted into the charging apparatus,restricting usable functions of the image forming apparatus based onpreset information.
 17. The non-transitory computer-readable mediumaccording to claim 16, wherein the usable functions include a copyfunction, a print function, a send function, or box function.
 18. Animage forming apparatus comprising: an authentication I/F unitconfigured to connect the image forming apparatus to an authenticationapparatus that authenticates a user who uses the image formingapparatus; an charging I/F unit configured to connect the image formingapparatus to a charging apparatus that collects a fee charged to a userwho uses the image forming apparatus; and a log-in processing unitconfigured to allow the user authenticated by the authenticationapparatus to log in to the image forming apparatus when in anauthentication mode; and a preventing unit configured to prevent thecharging apparatus from collecting a fee while the user logs in to theimage forming apparatus.
 19. The image forming apparatus according toclaim 18, wherein the authentication apparatus is an IC card readerconfigured to read authentication information from a user.
 20. The imageforming apparatus according to claim 18, further comprising a controlunit configured to, in a case where the authentication apparatusauthenticates a user, restrict usable functions of the image formingapparatus based on attribute information of the authenticated user, andin a case where a fee is inserted into the charging apparatus, restrictusable functions of the image forming apparatus based on presetinformation.
 21. The image forming apparatus according to claim 20,wherein the usable functions include a copy function, a print function,a send function, or box function.
 22. The image forming apparatusaccording to claim 18, wherein the prevent unit performs the preventionby discharging a fee if the fee is inserted.
 23. The image formingapparatus according to claim 18, wherein the prevent unit performs theprevention by locking a fee insertion port of the charging unit.
 24. Acontrol method for an image forming apparatus, the method comprising:authenticating, by an authentication apparatus, a user who uses theimage forming apparatus; collecting, by a charging apparatus, a feecharged to a user who uses the image forming apparatus; allowing theuser authenticated by the authentication apparatus to log in to theimage forming apparatus when in an authentication mode; and preventingthe charging apparatus from collecting a fee while the user logs in tothe image forming apparatus.
 25. A non-transitory computer-readablemedium storing a computer program for causing an image forming apparatusto execute a method, the method comprising: authenticating, by anauthentication apparatus, a user who uses the image forming apparatus;collecting, by a charging apparatus, a fee charged to a user who usesthe image forming apparatus; allowing the user authenticated by theauthentication apparatus to log in to the image forming apparatus whenin an authentication mode; and preventing the charging apparatus fromcollecting a fee while the user logs in to the image forming apparatus.