Abstract:
Example systems, methods, computer-readable mediums, and other forms of a secure foreign enterprise printing system are provided. An example system may include a wireless telephonic logic for communicating with a wireless network web services provider and a wireless network communication logic configured to communicate a print request to the wireless network web services provider using the wireless telephonic logic. The print item may be stored in a first enterprise and may be printed on an image forming device that is located in a second enterprise. The example system may also include an encryption logic configured to facilitate providing security for the print item as it travels from the first enterprise to the image forming device.
Abstract:
A job ticket service center includes features to provide security and to control access to a job ticket and related resources. The service center may include programming or servers to authenticate a processor and to authorize the processor to access a particular job ticket. An authentication server receives authentication information from a processor and an authorization server uses the information to check authorization functionality. The authorization or access rights of the processor may be carried as a part of the job ticket. Using these features, the service center may provide trusted authentication information about the processor to the authorization server, and the authorization server then performs its authority check functions. The job ticket maybe signed with an industry standard public key encryption message digest (MD) signature, and may be protected by a public key encryption system. Hence, any entity that has the public key may validate the job ticket without having to communicate with the authentication server. These features reduce communication between distributed server applications. The features also allow the job ticket to be passed from one processor to another processor, maintaining security, without communicating with the service center.
Abstract:
Methods and systems enable devices to discover each other when the devices are in a common location. Unique identifiers (UIDs) are associated with one or more location and each UID uniquely identifies a location. Devices that are located in a particular location that has a UID can register to create an association between the device and the UID. In turn, this creates an association between the device and a location. Subsequently, when another device (e.g. a laptop computer or PDA) enters the location, the device can discover the UID of the location and then ascertain which other devices are associated with that location.
Abstract:
To control concurrent access problems, the job ticket service may employ branch locking features, that is, the capability to lock a job ticket at the branch level. The branch locking may be accomplished by one of several methods. The work flow controller may assign one or more specific processors to perform the tasks identified with the branch to be locked. Where more than one processor is authorized access to the same branch, the job ticket service may lock the branch when one of the authorized processors actually acquire the branch. The job ticket service may lock the branches by setting a lock/unlock flag for each branch. Processors accessing the job ticket may then review the lock/unlock flag status to determine if the branch may be accessed. In some circumstances, the job ticket service may allow access only to those branches that are unlocked. A processor that has completed a task defined by the branch may need to have the branch unlocked in order to modify the branch.
Abstract:
A bidding service may be used to receive bid information to complete a job request, from processors coupled to a job ticket service center. The processors submit bids in response to posting of job ticket notices at the service center. A work flow controller may post the job ticket notices after receipt of the job request. The job ticket notice may include specific tasks or branches that must be completed to complete the job request. The job ticket notice may include descriptions of specific branches and their interrelationships in sufficient detail to allow the processors to bid for completion of the branches. The bidding service may select bids from the processors based on set criteria. For example, the job request may specify minimum performance requirements (e.g., a maximum cost and a completion deadline). The bidding service may reject any bids that fail to satisfy the minimum performance requirements. Where the work flow controller has established multiple branches, each such branch may include minimum performance requirements. The branch-specific performance requirements may be established by the work flow controller based on overall performance requirements for the job ticket.
Abstract:
A system and method for authorizing electronic messages is provided. One embodiment of the system includes message receiving logic that determines whether a received message comes from an authorized sender based on a pre-assigned token. In another embodiment, a message transmission logic configures a message with a pre-assigned token for transmission to a destination address. The present system and method allows for improved control of electronic messages.
Abstract:
In a web-based imaging environment, a user accesses a destination service representing a production device, which retrieves user's imaging data and configures available processing job options. The user selects production options, after which the destination service estimates the time required to process user's job. The user is provided an option of reserving a deferred start time for the processing job. If the user opts to reserve, then a deferred start time is selected, avoiding periods when the production device is unavailable, for example when previously reserved, and user's job is stored until the deferred start time. Advantageously, resources for the job are estimated, reserved, and monitored, displaying until deferred start time. Other jobs cannot consume these resources, which are reported with a warning message as if already consumed, whenever a reserved resource is depleted to a quantity insufficient for the deferred processing.
Abstract:
This invention relates to a Web-based imaging system that provides print job time estimates. Such systems of this type, generally, tell the user, prior to printing, how long it will take the target printer to print the print job, as expected.
Abstract:
A method and apparatus facilitate printing N collated copies of a document on a printer, where N is an integer greater than one. The method detetermines whether the printer has sufficient capacity to print N collated copies of the document. If the printer has insufficient capacity to store one copy of the document, then the method performs the following step N times: sending a single copy of the document to the printer. The capacity may be memory to store one copy of the document in print ready form. The apparatus comprises a memory, a spooler connected to the memory, a status agent and a control logic connected to the spooler and the status agent. The memory is configured to store the document. The spooler is configured to send an outgoing print job to the printer. The status agent is configured to receive from the printer information regarding whether the printer has sufficient capacity to collate the document. The control logic controls the spooler on the basis of this information.
Abstract:
A method and apparatus select a peripheral for use with a computer. The method comprises the following steps: identifying a network switch to which the computer is connected; determining all peripherals connected to the network switch; and choosing one of the determined peripherals according to a predetermined criteria. According to the predetermined criteria, if the number of predetermined peripherals is one, then the predetermined peripheral is chosen; if the number of predetermined peripherals is more than a predetermined number, then none of the predetermined peripherals is chosen; if the number of predetermined peripherals is less than a predetermined number, then one of the predetermined peripherals is chosen. Optionally, the method also reads a connection table in the network switch. The apparatus comprises a network switch identification module, a peripheral determination agent and a peripheral selection logic. The peripheral determination agent is connected to the network switch identification module. The peripheral selection logic is connected to the peripheral determination agent. Optionally, the apparatus also comprises a switch connection table reader, connected to the peripheral determination agent and/or a secondary criteria agent, connected to the peripheral selection logic. In some embodiments, the apparatus also includes a main control module, connected to the a network switch identification module, the peripheral determination agent, and the peripheral selection logic. In other embodiments, the apparatus is a host computer including a network interface, connected to the network switch identification module and the peripheral determination agent. In yet other embodiments, the apparatus is a computer network, including a network switch and a printer, connected to the network switch.