Abstract:
In an embodiment, a computer-implemented process comprises, in a computer peripheral device that is configured to be coupled to a computer system, creating and storing one or more user interface modifiers that are defined by the device and configured to be used by the computer system to modify rendering of a user interface in the computer system; and providing the device defined user interface modifiers to the computer system. In an embodiment, the device defined user interface modifiers comprise one or more priority values for one or more features of the device; each of the one or more priority values is associated with an identifier of one of the features; and each of the priority values indicates a relative importance of the associated feature in comparison to other features.
Abstract:
Techniques are provided for efficiently transferring documents (or files) between a client device and a WS-enabled device. A document is divided into a plurality of distinct chunks. Each chunk is packaged in a separate SOAP message. Each SOAP message includes a document identifier and a data transmission serial number (DTSN). The DTSN uniquely identifies a particular chunk of the document relative to the other chunks of the document. After one or more chunks of the document are transferred, the size of one or more subsequent chunks is adjusted based on changes in the client device, the WS-enabled device, and/or the network connection. Thereafter, each of the one or more subsequent chunks of the document is either larger or smaller than the one or more chunks that were already transferred.
Abstract:
A network device includes a content processing module that is configured to perform intelligent document content processing, such as confidential information processing, content optimization and workflow optimization. The network device authenticates a user and determines electronic document data that is to be processed. The electronic document data may be created at the network device, e.g., by a scanning module on the network device, or at a client device, e.g., by a word processing application executing on the client device. The content processing module retrieves particular user preference data based upon the user authentication. The particular user preference data may specify confidential information preferences, content optimization preferences and/or workflow preferences. The content processing module performs intelligent document content processing on the electronic document data based upon the particular user preference data and generates processed electronic document data.
Abstract:
A network device includes a content processing module that is configured to perform intelligent document content processing, such as confidential information processing, content optimization and workflow optimization. The network device authenticates a user and determines electronic document data that is to be processed. The electronic document data may be created at the network device, e.g., by a scanning module on the network device, or at a client device, e.g., by a word processing application executing on the client device. The content processing module retrieves particular user preference data based upon the user authentication. The particular user preference data may specify confidential information preferences, content optimization preferences and/or workflow preferences. The content processing module performs intelligent document content processing on the electronic document data based upon the particular user preference data and generates processed electronic document data.
Abstract:
A method and apparatus for processing electronic documents is provided. A request, from a first user, to issue an alert to a second user that may have submitted a print request to the printing device is received at the printing device. The printing device may be attempting to process the print request submitted by the second user when the printing device receives the request from the first user. The first user may not know the identity of the second user. The printing device consults contact data that identifies how to contact the second user. The printing device thereafter issues the alert to the second user in accordance with the contact data. Upon receiving the alert, the second user is informed of the current condition of the printing device, e.g., the printing device may be experiencing a problem that prevents the second user's print request from being fully processed.
Abstract:
Techniques are provided for managing multiple Web services on a single device. The device includes device metadata and a service manager. Each Web service registers with the service manager. Registration includes providing service metadata to the service manager. The service manager may generate (e.g., at least some) service relationship data based on the service metadata. The service relationship data indicates (either explicitly or implicitly) a relationship (e.g., a dependency) between a first Web service of the multiple Web services and a second Web service. In response to one or more criteria being satisfied with respect to the first Web service, the service manager uses the service relationship data and/or the device metadata to determine that one or more actions should be initiated with respective to the second Web service.
Abstract:
The systems and method herein provide a design logic that extends Distributed Scan Management (DSM) by integrating the scan setting features of a network scanner with DSM and enhances DSM by providing a means for quickly locating Post Scan Processes (PSP) based on specified search criteria. In this regard, a network scanner is controllable via the PSPs of a DSM protocol. A user interface of the network scanner is operable to receive login information associated with a user that is used to grant access to one or more of the PSPs. The network scanner also includes a storage module operable to store scanner software instructions that direct a processor to determine whether the one or more accessed PSPs have settings that are overrideable and present the one or more accessed PSPs to the user for selection. The user may then override settings of a selected PSP via the user interface.
Abstract:
Techniques are provided for reducing the amount of event notifications within a Web Service Application (WSA) of a device such as a multi-functional peripheral (MFP). In one technique, a Subscription ID is linked with a Job ID within a reduced notification table. When an event occurs related to a specific job, an event notification is sent only to the subscriber associated with that job.
Abstract:
Techniques are provided for implementing the WS-DeviceProfile standard as a multi-threaded process (“DFM”) executing on a multi-function peripheral (“MFP”). The DFM takes care of the discovery of devices and services on a network. The DFM also acts as a facility manager. The DFM implements various web services in a single component that applications can re-use. The DFM insulates these applications from some of the more complex details of the web services that the DFM implements. The MFP may comprise several different applications that each use web services provided by the DFM. The threads of the DFM can handle separate tasks concurrently. For example, one thread, of the multi-threaded DFM, may perform one or more functions specified by the WS-DeviceProfile protocol, while another thread may perform one or more functions specified by a WS-Discovery protocol.
Abstract:
Techniques and systems for controlling resources used by a device's web services applications are disclosed. In one technique, web services applications release their allocated resources and enter a “sleep mode” after being inactive for a specified period of time. In one technique, a device maintains a shared pool of memory resources. The pool contains data structures that web services applications are likely to re-use. Before allocating a new instance of a needed data structure from free memory, a web services application first determines whether the shared pool already contains a currently unused but allocated instance of a data structure of the needed type, and, if the shared pool does, then the web service application uses that instance, overwriting existing data in the instance as needed. Web services applications return such data structures to the shared pool when those web services applications are finished using those data structures.