Abstract:
An information processing apparatus includes an authenticating unit, an acquiring unit, a first specifying unit, and a first display unit. The authenticating unit, when accepting first user information used for authentication of determining whether a user has an authority to use the information processing apparatus, compares the first user information and second user information identifying a user who has the authority to use the information processing apparatus so as to perform the authentication. The acquiring unit acquires an application list screen, in which each of applications is associated with display information for giving an instruction to introduce the application in the information processing apparatus, in accordance with an operation performed by the user authenticated by the authenticating unit. The first specifying unit, when the acquiring unit acquires the application list screen, specifies authority information corresponding to the second user information identifying the user authenticated by the authenticating unit, based on first information indicating a correspondence relation between the second user information and the authority information. The first display unit changes a display content of the application list screen and displays the changed content in accordance with the authority information specified by the first specifying unit.
Abstract:
An image processing apparatus serving as a master device and a plurality of local image processing apparatus serving as local devices are connected to one another via a network, and each of the devices includes an authentication information storage unit and an authentication unit. The master device stores, as master authentication information, authentication information necessary for an authentication on each of users who are able to use each of the devices, for each of the devices, and allows editing of the master authentication information. When the authentication information on the local device in the master authentication information is edited, the edited authentication information is transmitted to the local device, and the authentication information stored in local device is updated. When a user login operation is performed on the local device, an authentication is performed by using the authentication information in the local device.
Abstract:
An image photographic apparatus which includes an information recording medium capable of communicating by use of a communication protocol and recording an image of a subject, and is configured to function as a server to transmit the image of the subject stored in the information recording medium to a client connected to a network by establishing communication based on a request for communication start from the client, the image photographic apparatus including a detection device to detect the request for communication start from the client, a display unit to display other client who transmits a request for communication start based on detection results of the detection device, and a selection-input device to select and input whether allowing communication to the other client transmitting the request for communication start based on the display of the display unit.
Abstract:
A digital camera has a microprocessor, which has installed therein an encryption algorithm. The algorithm has associated with it, a unique camera identification number (UCIN), the UCIN being recognisable by a remotely held decryption key. The decryption key is typically held by an authorised image processor who, on receipt of the camera, decrypts the images and publishes, distributes or prints the decrypted images as instructed by the camera owner. After the images have been processed, the authorised image processor may update the encryption algorithm and return the camera to the owner for re-use. typically the camera will be provided at very low cost and a charge made to the owner for each image processing order made.
Abstract:
Data is protected from unauthorized copying by rescrambling an unauthorized version of the data, but descrambling an authorized version of the data. This is done using a trigger signal. The trigger signal is embbeded into the data to form watermarked data. The possibly protected data or watermarked data is converted to possibly usable data by extracting the trigger signal and checking the value as show in the figure. The possibly protected data is passed through a descrambler (30), where the trigger signal, if present, is extracted. A descrambling key and a descrambling algorithm (40) are applied to the possibly protected data if the trigger signal is present, but not applied to the possibly protected data if the trigger signal is not present. One property of the trigger signal is that it is preserved through signal transformation, such as one or more compression, decompression, analog to digital conversion, and digital to analog conversion. As a result of this property the trigger signal can be detected in either scrambled or descrambled data.