Image transmission apparatus
10560589 ยท 2020-02-11
Assignee
Inventors
- Syouichirou Yoshiura (Sakai, JP)
- Yuji Okamoto (Sakai, JP)
- Katsuyoshi Fujiwara (Sakai, JP)
- Naofumi Ueda (Sakai, JP)
Cpc classification
H04N2201/3205
ELECTRICITY
H04N1/00209
ELECTRICITY
H04N1/00411
ELECTRICITY
H04N1/00212
ELECTRICITY
H04N2201/3276
ELECTRICITY
H04N1/32776
ELECTRICITY
H04N1/4413
ELECTRICITY
International classification
H04N1/00
ELECTRICITY
H04N1/327
ELECTRICITY
Abstract
When an address is inputted through input means for inputting an address of a receiving end, an image transmission apparatus carries out an authentication process that determines whether or not the inputting person is a right authorized person. When it is determined that the corresponding operation is right through the authentication process, the image transmission apparatus transmits image data to the address of the receiving end thus inputted.
Claims
1. An image transmission apparatus which transmits image data, comprising: an input unit through which an address of a receiving end is inputted; a transmitting unit transmitting image data to an address of a receiving end inputted through the input unit; a storing unit storing an address of a receiving end inputted through the input unit; a receiving unit receiving a setting of enabling or disabling of a security environment; and a controller carrying out an authentication process as to whether or not an operator is an authorized person before the receiving unit receives the setting, wherein the address includes a FAX number and an electronic mail address, and when enabling of a security environment is set, the controller permits transmission of image data to an electronic mail address stored in the storing unit, and carries out an authentication process as to whether or not an inputting person is an authorized person before an electronic mail address inputted through the input unit by the inputting person is stored in the storing unit or before an electronic mail address stored in the storing unit is edited based on the electronic mail address inputted through the input unit by the inputting person.
2. A method of transmitting image data using an apparatus comprising: a transmitting unit transmitting image data to an address of a receiving end inputted through an input unit; and a storing unit storing an address of a receiving end inputted through the input unit, wherein the address includes a FAX number and an electronic mail address, and the method comprises: carrying out an authentication process as to whether or not an operator is an authorized person before receiving a setting of enabling or disabling of a security environment; when enabling of a security environment is set, permitting transmission of image data to an electronic mail address stored in the storing unit; and when enabling of a security environment is set, carrying out an authentication process as to whether or not an inputting person is an authorized person before an electronic mail address inputted through the input unit by the inputting person is stored in the storing unit or before an electronic mail address stored in the storing unit is edited based on the electronic mail address inputted through the input unit by the inputting person.
3. A computer-readable non-transitory recording medium storing a computer program to be executed by a computer comprising a storing unit storing an address of a receiving end inputted through an input unit, wherein the address includes a FAX number and an electronic mail address, and the computer program comprises: causing the computer to carry out an authentication process as to whether or not an operator is an authorized person before receiving a setting of enabling or disabling of a security environment; causing the computer to, when enabling of a security environment is set, permit transmission of image data to an electronic mail address stored in the storing unit; and causing the computer to, when enabling of a security environment is set, carry out an authentication process as to whether or not an inputting person is an authorized person before an electronic mail address inputted through the input unit by the inputting person is stored in the storing unit or before an electronic mail address stored in the storing unit is edited based on the electronic mail address inputted through the input unit by the inputting person.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
BEST MODE FOR CARRYING OUT THE INVENTION
(20) The following description will specifically explain the present invention, based on the drawings illustrating an embodiment thereof.
Embodiment 1
(21)
(22) The CPU 11, which is connected to the above-mentioned hardware units of the Internet facsimile device 1 through the bus 17, controls those units, and also executes various software functions in accordance with a control program 15P and a security program 151P stored in the storing unit 15. The reading unit 19 reads a document by using a scanner in which, for example, CCDs (Charge Couple Devices) are utilized, and outputs the image data thus read. The recording unit 110, which is an electrophotographic printing apparatus, is used for printing out data, such as image data received through facsimile communication, document image data read by the reading unit 19 and image data sent from a personal computer (not shown) through the LAN interface 163.
(23) The display unit 14, which is a display device such as a liquid crystal display, is used for displaying the operation state of the Internet facsimile apparatus 1 of the present invention, image data of a document that has been read for transmission, image data received from another facsimile apparatus, and image data sent from a personal computer, or the like. The operation unit 13, serving as input means, is provided with character keys, ten keys, shortened dial keys, one-touch dial keys, various function keys and the like required for operating the Internet facsimile device 1 of the present invention. Here, the display unit 14 may comprise a touch panel, so that one portion or the entire portions of the various keys of the operation unit 13 can be substituted thereby. The coding-decoding unit 18 code-compresses an image signal, and also decodes image data that has been code-compressed into the original image signal.
(24) The storing unit 15, configured by a hard disk or the like, preliminarily stores the control program 15P and the security program 151P that are required for operations of the Internet facsimile device 1 of the present invention. The security program 151P, which is a program that executes an authentication process (authentication means) or the like according to the present invention, is installed when desired by the user. Here, an address of a receiving end, inputted from the operation unit 13, is registered in an address data file 152 of the storing unit 15. Although the address is a FAX number, an electronic mail address or the like, in the following, description will be given by exemplifying a case where the address is an electronic mail address.
(25) The RAM 12, which is configured by a SRAM (Static Random Access Memory), a flash memory or the like, stores temporary data that is generated upon executing a software program. The image memory 151, which is configured by a DRAM (Dynamic Random Access Memory) or the like, stores data such as image data read for transmission, image data received from another facsimile apparatus and image data sent from a computer.
(26) The modem 162, which is connected to the bus 17, is configured by a facsimile modem capable of performing facsimile communication. Moreover, the modem 162 is also directly connected to the NCU 161 connected to the bus 17. The NCU 161, which is a hardware device that opens and closes the communication line with the telephone line network, connects the modem 162 to the telephone line network, if necessary.
(27)
(28) On the center portion adjacent to the touch panel 139 of the operation unit 13, a printer button 135, a FAX button 136, a copy button 137 and a user-setting button 138 are prepared. As described above, the Internet facsimile apparatus 1 according to this embodiment has a printer function, a facsimile function and a copy function; therefore, when the user operates the printer button 135, the FAX button 136 or the copy button 137 depending on the desired usage, the Internet facsimile apparatus 1 is allowed to function as a printer, a facsimile apparatus or a copying machine. The user-setting button 138 is operated when registering, selecting and editing operations of an address of a receiving end, which will be described later, or various setting operations such as settings of date and time are carried out.
(29) When the operation unit 13 provided with the above-mentioned buttons is operated, a signal corresponding to the operated button is outputted to the CPU 11. In accordance with the control program 15P stored in the storing unit 15, the CPU 11 executes the process corresponding to the output from the operation unit 13, and reads out required guide information from the storing unit 15, and outputs the information to the display unit 14. In the following, description will be given of a sequence of displaying operations on the display unit 14.
(30)
(31) In contrast, when E-MAIL address button is operated in
(32) After the authentication process, the user inputs an electronic mail address of a receiving end through the ten keys 131. After the input of the electronic mail address, the user presses OK button through the touch panel 139. When the OK button is operated, the CPU 11 displays a screen shown in
(33) In the following, description will be given of a newly registering process of an electronic mail address of a receiving end and an editing process for a registered address. When user setting button 138 in
(34) When it is determined to be right by the authentication process, the CPU 11 displays a screen shown in
(35) In
(36) Here, the above-mentioned authentication can be cancelled by a user's setup. In the following, description will be given of the contents of the setup procedure. When key operator program button is operated on the menu screen in
(37) In the above-mentioned configuration, referring to a flow chart, the sequence of authentication processes of the present invention will be described.
(38) Upon receiving a password in step S152, the CPU 11 determines whether or not the password is the right one (step S153). The CPU 11 compares the received password with the password preliminarily stored in the storing unit 15, and when it is determined that the received password is not right (NO in step S153), the sequence of processes is completed. In contrast, when it is determined that the received password is right (YES in step S153), the CPU 11 reads out a screen shown in
(39) When it is determined that the authentication process should be carried out (YES in step S155), that is, when the CPU 11 has received a signal corresponding to the security environment button from the operation unit 13, a flag 1 is set in the storing unit 15 (step S156). In contrast, when it is determined that the authentication process need not be carried out (NO in step S155), that is, when the CPU 11 has received a signal corresponding to the normal button shown in
(40)
(41) More specifically, the CPU 11 determines whether or not the flag stored in the storing unit 15 is 1. When it is determined that the security environment is on (YES in step S163), the CPU 11 accepts an input of a password through the ten keys 131 (step S164). The CPU 11 determines whether or not the password is the right one (step S165). The CPU 11 compares the received password with the password preliminarily stored in the storing unit 15, and when it is determined that the received password is not right (NO in step S165), the sequence of processes is completed. In contrast, when it is determined that the received password is right (YES in step S165), the CPU 11 reads out a screen shown in
(42) Then, the CPU 11 accepts an input of an electronic mail address from the ten keys 131 (step S167). In contrast, when it is determined that the security environment is not on in step S163 (NO in step S163), that is, when the CPU 11 determines that the flag in the storing unit 15 is 0, the sequence proceeds to step S167 by skipping processes of steps S164 and S165.
(43) When, an electronic mail address is not directly inputted in step S162 (NO in step S162), that is, when the CPU 11 determines that the receiving end list button has been operated by the user so as to call for already registered addresses as shown in
(44) Thereafter, the CPU 11 reads out image data to be transmitted, from the image memory 151 (step S1612), so that the image data is transmitted to the corresponding electronic mail address (step S1613). In this manner, the authentication process is carried out appropriately in accordance with the setting of the security environment, and in the case where the receiving end has already been registered, the authentication process is omitted; thus, it becomes possible to provide an image transmission apparatus that is more convenient in use, while the security function is properly maintained.
(45)
(46) The CPU 11 determines whether or not the password is the right one (step S174). The CPU 11 compares the received password with the password preliminarily stored in the storing unit 15, and when it is determined that the received password is not right (NO in step S174), the sequence of processes is completed. In contrast, when it is determined that the received password is right (YES in step S174), the CPU 11 reads out a screen shown in
(47) When it is determined that the corresponding process is not a newly registering process in step S171 (NO in step S171), that is, when the CPU 11 has received a signal corresponding to the registered address editing button shown in
(48) The CPU 11 determines whether or not the password is the right one (step S179). The CPU 11 compares the received password with the password preliminarily stored in the storing unit 15, and when it is determined that the received password is not right (NO in step S179), the sequence of processes is completed. In contrast, when it is determined that the received password is right (YES in step S179), the sequence proceeds to step S1710. When it is determined that the security environment has not been set in step S177 (NO in step S177), processes in steps S178 and S179 are skipped.
(49) Next, the CPU 11 reads out names of receiving ends from the address data file 152 onto the RAM 12 (step S1710). The CPU 11 displays the names of receiving ends read out onto the RAM 12 on the display unit 14 as shown in
Embodiment 2
(50) Although Embodiment 1 has an arrangement in which the security program 151P used for carrying out the authentication process is preliminarily installed in the storing unit 15, another arrangement in which a recording medium such as a cartridge ROM that stores the security program 151P is separately attached may be used to achieve functions of the image transmission apparatus according to the present invention.
(51) Embodiment 2 has the above-mentioned arrangement, and since the other structures and functions are the same as those of Embodiment 1, the corresponding parts are indicated by the same reference numerals, and the detailed description thereof is omitted.
INDUSTRIAL APPLICABILITY
(52) As described above, in the present invention, upon input of an address through input means used for inputting an address of a receiving end, an image transmission apparatus carries out an authentication process that determines whether or not the inputting person is a right authorized person. When it is determined that the corresponding operation is right through the authentication process, the image transmission apparatus transmits image data to the address of the receiving end thus inputted. With this arrangement, it becomes possible to prevent the problem that image data might be leaked to the third person through a network.
(53) Moreover, in the present invention, when it is determined that the corresponding operation is right through the authentication process, the image transmission apparatus registers the inputted address in the address data file. Upon editing an already registered address, the image transmission apparatus reads out the address that has been registered in the address data file, and when the address thus read out is edited, the authentication process is again carried out. When it is determined that the corresponding operation is right through the authentication process, the edited address is updated and registered in the address data file. With this arrangement, it becomes possible to prevent the problem that the third person with an ill intention might freely alter the receiving end.
(54) Moreover, in the present invention, when an already registered address of a receiving end is read out from the address data file, the image transmission apparatus transmits image data to the corresponding address without carrying out the authentication process. Therefore, it becomes possible to provide an image transmission apparatus that is more convenient in use with superior security.
(55) Furthermore, in the present invention, upon raising the level of security, the image transmission apparatus is allowed to execute the authentication process, while, when emphasis is placed on convenience in use rather than security, the image transmission apparatus is not allowed to execute the authentication process. With this arrangement, it becomes possible to provide an image transmission apparatus that is suitable for the use environment of the user; thus, the present invention exerts superior effects.