Image processing apparatus, authentication method, and recording medium

Abstract

An image processing apparatus includes: an authentication information requesting portion that transmits one or more requests for authentication information to a portable terminal apparatus upon receipt of a connection request therefrom, the connection request not requiring user identification; a first authentication portion that performs first authentication not requiring user identification by comparing authentication information to first reference data, the authentication information being received in return for the request; a second authentication portion that performs second authentication by comparing the authentication information to second reference data for user identification; and a processor that takes one piece of authentication information or any one of multiple pieces of authentication information received in return for the one or more requests, according to a predetermined rule, and that makes the second authentication portion perform the second authentication using the one piece of authentication information or the any one of the multiple pieces of authentication information.

Claims

What is claimed is: 1 . An image processing apparatus comprising: an authentication information requesting portion that transmits one or more requests for authentication information to a portable terminal apparatus upon receipt of a connection request from the portable terminal apparatus, the connection request not requiring user identification; a first authentication portion that performs first authentication for the judgment whether or not to permit a connection with the portable terminal apparatus, the first authentication not requiring user identification, by comparing authentication information to first reference data, the authentication information being received from the portable terminal apparatus in return for the request being transmitted by the authentication information requesting portion; a second authentication portion that performs second authentication for the judgment whether or not it is an authenticated user of the image processing apparatus, by comparing the authentication information to second reference data for user identification; and a processor that takes one piece of authentication information or any one of multiple pieces of authentication information according to a predetermined rule, the one piece of authentication information or the multiple pieces of authentication information, respectively, being received from the portable terminal apparatus in return for the one or more requests, and that makes the second authentication portion perform the second authentication using the one piece of authentication information or the any one of the multiple pieces of authentication information being taken. 2 . The image processing apparatus according to claim 1 , wherein, when the first authentication portion completes the first authentication unsuccessfully using authentication information, the authentication information being received from the portable terminal apparatus, the processor then makes the second authentication portion perform the second authentication using the authentication information. 3 . The image processing apparatus according to claim 1 , wherein, when the first authentication portion is disabled, the processor then makes the second authentication portion perform the second authentication using authentication information, the authentication information being received from the portable terminal apparatus. 4 . The image processing apparatus according to claim 1 , wherein: after the first authentication portion successfully completes the first authentication using authentication information, the authentication information being received from the portable terminal apparatus, the authentication information requesting portion transmits a request for next authentication information to the portable terminal apparatus; and the processor makes the second authentication portion perform the second authentication using next authentication information, the next authentication information being received from the portable terminal apparatus. 5 . The image processing apparatus according to claim 4 , wherein: the second authentication portion needs to perform the second authentication of multiple subjects; and after the second authentication portion completes the second authentication of one subject, the authentication information requesting portion transmits a request for other next authentication information to be used for the second authentication of another subject. 6 . The image processing apparatus according to claim 1 , wherein: the portable terminal apparatus transmits a connection request using a specific protocol; and the first authentication portion performs the first authentication using authentication information, the authentication information being received using the specific protocol. 7 . The image processing apparatus according to claim 1 , wherein: multiple protocols are workable for establishing a connection with the portable terminal apparatus; and the processor makes the second authentication portion perform the second authentication only when a connection with the portable terminal apparatus is established using one of the workable protocols, the one workable protocol being specific. 8 . The image processing apparatus according to claim 1 , wherein: the authentication information consists of multiple elements of authentication information according to a predetermined rule; and the second authentication portion extracts the elements of authentication information therefrom and performs the second authentication of different subjects using the elements of authentication information extracted therefrom. 9 . The image processing apparatus according to claim 1 , wherein: the authentication information consists of a title of authentication information and an element of authentication information according to a predetermined rule; and the second authentication portion extracts the title of authentication information and the element of authentication information therefrom and performs the second authentication of a subject using the element of authentication information extracted therefrom, the subject being indicated by the title of authentication information extracted therefrom. 10 . The image processing apparatus according to claim 1 , wherein, when the second authentication portion completes the second authentication unsuccessfully, the processor denies a connection with the portable terminal apparatus. 11 . The image processing apparatus according to claim 10 , further comprising an allowable limit setting portion that determines an allowable limit of the number of authentication failures, the authentication failures to be made by the second authentication portion, wherein: if the second authentication portion completes the second authentication unsuccessfully and the number of the authentication failures does not reach the allowable limit determined by the allowable setting portion, the authentication information requesting portion transmits a request for authentication information and the second authentication portion performs the second authentication using authentication information, the authentication information being received from the portable terminal apparatus in return for the request; or if the second authentication portion completes the second authentication unsuccessfully and the number of the authentication failures reaches the allowable limit, the processor denies a connection with the portable terminal apparatus. 12 . The image processing apparatus according to claim 1 , wherein: the second authentication portion judges whether or not a print job received from the portable terminal apparatus is an authorized activity of the user; and the second authentication portion comprises an accepting portion that accepts the print job only if the second authentication portion judges that the print job is an authorized activity of the user. 13 . A non-transitory computer-readable recording medium storing an authentication program to make a computer of an image processing apparatus execute: transmitting one or more requests for authentication information to a portable terminal apparatus upon receipt of a connection request from the portable terminal apparatus, the connection request not requiring user identification; performing first authentication for the judgment whether or not to permit a connection with the portable terminal apparatus, the first authentication not requiring user identification, by comparing authentication information to first reference data, the authentication information being received from the portable terminal apparatus in return for the request being transmitted; performing second authentication for the judgment whether or not it is an authenticated user of the image processing apparatus, by comparing the authentication information to second reference data for user identification; and taking one piece of authentication information or any one of multiple pieces of authentication information according to a predetermined rule, the one piece of authentication information or the multiple pieces of authentication information, respectively, being received from the portable terminal apparatus in return for the one or more requests, and performing the second authentication using the one piece of authentication information or the any one of the multiple pieces of authentication information being extracted being taken. 14 . The non-transitory computer-readable recording medium according to claim 13 , wherein, when the first authentication is completed unsuccessfully using authentication information, the authentication information being received from the portable terminal apparatus, the second authentication is performed using the authentication information. 15 . The non-transitory computer-readable recording medium according to claim 13 , wherein, when the first authentication is disabled, the second authentication is performed using authentication information, the authentication information being received from the portable terminal apparatus. 16 . The non-transitory computer-readable recording medium according to claim 13 , wherein: after the first authentication is successfully completed using authentication information, the authentication information being received from the portable terminal apparatus, a request for authentication information is transmitted to the portable terminal apparatus; and the second authentication is performed using authentication information, the authentication information being received from the portable terminal apparatus. 17 . The non-transitory computer-readable recording medium according to claim 16 , wherein: the second authentication of multiple subjects needs to be performed; and after the second authentication of a first subject is completed, a request for authentication information serving for the second authentication of a second subject is transmitted to the portable terminal apparatus. 18 . The non-transitory computer-readable recording medium according to claim 13 , wherein: a connection request is transmitted from the portable terminal apparatus using a specific protocol; and the first authentication is performed using authentication information, the authentication information being received using the specific protocol. 19 . The non-transitory computer-readable recording medium according to claim 13 , wherein: multiple protocols are workable for establishing a connection with the portable terminal apparatus; and the second authentication is performed only when a connection with the portable terminal apparatus is established using one of the workable protocols, the one workable protocol being specific. 20 . The non-transitory computer-readable recording medium according to claim 13 , storing the authentication program, wherein: the authentication information consists of multiple elements of authentication information according to a predetermined rule; and the elements of authentication information are extracted therefrom, and the second authentication of different subjects is performed using the elements of authentication information extracted therefrom. 21 . The non-transitory computer-readable recording medium according to claim 13 , wherein: the authentication information consists of a title of authentication information and an element of authentication information according to a predetermined rule; and the title of authentication information and the element of authentication information are extracted therefrom, and the second authentication of a subject is performed using the element of authentication information extracted therefrom, the subject being indicated by the title of authentication information extracted therefrom. 22 . The non-transitory computer-readable recording medium according to claim 13 , wherein, when the second authentication is completed unsuccessfully, a connection with the portable terminal apparatus is denied. 23 . The non-transitory computer-readable recording medium according to claim 22 , storing the authentication program to make the computer further execute determining an allowable limit of the number of authentication failures, the authentication failures to be made in the second authentication, wherein: if the second authentication is completed unsuccessfully and the number of the authentication failures does not reach the determined allowable limit yet, a request for authentication information is transmitted and the second authentication is performed using authentication information, the authentication information being received from the portable terminal apparatus in return for the request; or if the second authentication is completed unsuccessfully and the number of the authentication failures reaches the determined allowable limit, a connection with the portable terminal apparatus is denied. 24 . The non-transitory computer-readable recording medium according to claim 13 , wherein it is judged whether or not a print job received from the portable terminal apparatus is an authorized activity of the user, the non-transitory computer-readable recording medium storing the authentication program to make the computer further execute accepting the print job only if it is judged that the print job is an authorized activity of the user. 25 . An authentication method for an image processing apparatus, comprising: transmitting one or more requests for authentication information to a portable terminal apparatus upon receipt of a connection request from the portable terminal apparatus, the connection request not requiring user identification; performing first authentication for the judgment whether or not to permit a connection with the portable terminal apparatus, the first authentication not requiring user identification, by comparing authentication information to first reference data, the authentication information being received from the portable terminal apparatus in return for the request being transmitted; performing second authentication for the judgment whether or not it is an authenticated user of the image processing apparatus, by comparing the authentication information to second reference data for user identification; and taking one piece of authentication information or any one of multiple pieces of authentication information according to a predetermined rule, the one piece of authentication information or the multiple pieces of authentication information, respectively, being received from the portable terminal apparatus in return for the one or more requests, and performing the second authentication using the one piece of authentication information or the any one of the multiple pieces of authentication information being extracted being taken.
[0001] This application claims priority under 35 U.S.C. §119 to Japanese Patent Application No. 2015-163606 filed on Aug. 21, 2015, the entire disclosure of which is incorporated herein by reference in its entirety. BACKGROUND OF THE INVENTION [0002] Field of the Invention [0003] The present invention relates to: an image processing apparatus such as a multifunctional digital image processing apparatus (i.e., a multi-function peripheral abbreviated as MFP) having printer function, copier function, facsimile function, scanner function, and other functions; an authentication method for the image processing apparatus to implement when receiving a connection request from a portable terminal apparatus; and a recording medium. [0004] Description of the Related Art [0005] The following description sets forth the inventor's knowledge of related art and problems therein and should not be construed as an admission of knowledge in the prior art. [0006] Printer drivers and printing applications allowing users to use an image processing apparatuses such as a MFP as described above are extensively installed on user terminals such as personal computers. Such a printer driver or printing application is configured to give to print data authentication information such as user identification information or department identification information in a printer job language (PJL) that works with the function of an image processing apparatus, and to transmit the print data to the image processing apparatus. Receiving the print data, the image processing apparatus prohibits the use by unauthenticated users by performing user authentication or department authentication using the authentication information described in PJL. That is, the image processing apparatus permits the use by only authenticated users registered in advance on the image processing apparatus itself. [0007] In contrast, operating system (OS) standard printing applications called AIRPRINT and MOPRIA PLUG-IN, for example, are installed on portable terminal apparatuses such as smartphones. Such an OS standard printing application is not configured to give to print data authentication information such as user information in a form that works with the configuration of an image processing apparatus. The image processing apparatus cannot receive the authentication information accordingly. Here, there is a problem as described below. [0008] With such an OS standard printing application as described above, the image processing apparatus cannot identify the user properly and cannot manage the authorized activities of the user. [0009] Specifically, the image processing apparatus may be configured to permit printing by only registered users. In this case, the image processing apparatus will have an authentication error because of absence of user information and discard print data. Alternatively, the image processing apparatus may be configured to perform user authentication but permit the use also by public users. In this case, the image processing apparatus will recognize all print jobs as being given by public users. In whichever example, the image processing apparatus cannot manage the authorized activities of users (e.g., print volume use imitations and color printing restrictions) properly. [0010] Alternatively, with such an OS standard printing application as described above, the image processing apparatus may be configured to store authentication information serving only for the judgment whether or not to permit a connection with the portable terminal apparatus and to judge whether or not to permit such a connection by comparing authentication information received from the portable terminal apparatus to the registered authentication information. [0011] In this case, since the authentication information serves only for the judgment whether or not to permit a connection with the portable terminal apparatus, the image processing apparatus still cannot identify users and cannot manage the authorized activities of users. [0012] According to a technique suggested in Japanese Unexamined Patent Publication No. 2010-034822, an image forming apparatus is configured to prompt for input of authentication information such as a user name and password before direct printing, and to compare input authentication information to authority information registered on the image forming apparatus itself. The image processing apparatus is further configured to perform charging and restrict printing without sacrificing the advantages of direct printing. [0013] According to the technique described in Japanese Unexamined Patent Publication No. 2010-034822, however, the image forming apparatus performs user authentication for direct printing, not for remote printing from an OS standard printing application. Receiving a print job from an OS standard printing application, the image processing apparatus still cannot perform user authentication and cannot manage the authorized activities of users, which means that the above-described problem remains unresolved. SUMMARY OF THE INVENTION [0014] The description herein of advantages and disadvantages of various features, embodiments, methods, and apparatus disclosed in other publications is in no way intended to limit the present invention. Indeed, certain features of the invention may be capable of overcoming certain disadvantages, while still retaining some or all of the features, embodiments, methods, and apparatus disclosed therein. [0015] A first aspect of the present invention relates to an image processing apparatus including: [0016] an authentication information requesting portion that transmits one or more requests for authentication information to a portable terminal apparatus upon receipt of a connection request from the portable terminal apparatus, the connection request not requiring user identification; [0017] a first authentication portion that performs first authentication for the judgment whether or not to permit a connection with the portable terminal apparatus, the first authentication not requiring user identification, by comparing authentication information to first reference data, the authentication information being received from the portable terminal apparatus in return for the request being transmitted by the authentication information requesting portion; [0018] a second authentication portion that performs second authentication for the judgment whether or not it is an authenticated user of the image processing apparatus, by comparing the authentication information to second reference data for user identification; and [0019] a processor that takes one piece of authentication information or any one of multiple pieces of authentication information according to a predetermined rule, the one piece of authentication information or the multiple pieces of authentication information, respectively, being received from the portable terminal apparatus in return for the one or more requests, and that makes the second authentication portion perform the second authentication using the one piece of authentication information or the any one of the multiple pieces of authentication information being taken. [0020] A second aspect of the present invention relates to a non-transitory computer-readable recording medium storing an authentication program to make a computer of an image processing apparatus execute: [0021] transmitting one or more requests for authentication information to a portable terminal apparatus upon receipt of a connection request from the portable terminal apparatus, the connection request not requiring user identification; [0022] performing first authentication for the judgment whether or not to permit a connection with the portable terminal apparatus, the first authentication not requiring user identification, by comparing authentication information to first reference data, the authentication information being received from the portable terminal apparatus in return for the request being transmitted; [0023] performing second authentication for the judgment whether or not it is an authenticated user of the image processing apparatus, by comparing the authentication information to second reference data for user identification; and [0024] taking one piece of authentication information or any one of multiple pieces of authentication information according to a predetermined rule, the one piece of authentication information or the multiple pieces of authentication information, respectively, being received from the portable terminal apparatus in return for the one or more requests, and performing the second authentication using the one piece of authentication information or the any one of the multiple pieces of authentication information being extracted being taken. [0025] A third aspect of the present invention relates to an authentication method for an image processing apparatus, including: [0026] transmitting one or more requests for authentication information to a portable terminal apparatus upon receipt of a connection request from the portable terminal apparatus, the connection request not requiring user identification; [0027] performing first authentication for the judgment whether or not to permit a connection with the portable terminal apparatus, the first authentication not requiring user identification, by comparing authentication information to first reference data, the authentication information being received from the portable terminal apparatus in return for the request being transmitted; [0028] performing second authentication for the judgment whether or not it is an authenticated user of the image processing apparatus, by comparing the authentication information to second reference data for user identification; and [0029] taking one piece of authentication information or any one of multiple pieces of authentication information according to a predetermined rule, the one piece of authentication information or the multiple pieces of authentication information, respectively, being received from the portable terminal apparatus in return for the one or more requests, and performing the second authentication using the one piece of authentication information or the any one of the multiple pieces of authentication information being extracted being taken. [0030] The above and/or other aspects, features and/or advantages of various embodiments will be further appreciated in view of the following description in conjunction with the accompanying figures. Various embodiments can include and/or exclude different aspects, features and/or advantages where applicable. In addition, various embodiments can combine one or more aspect or feature of other embodiments where applicable. The descriptions of aspects, features and/or advantages of particular embodiments should not be construed as limiting other embodiments or the claims. BRIEF DESCRIPTION OF THE DRAWINGS [0031] The preferred embodiments of the present invention are shown by way of example, and not limitation, in the accompanying drawings, in which: [0032] FIG. 1 illustrates a configuration of an image processing system provided with an image processing apparatus according to one embodiment of the present invention; [0033] FIG. 2 illustrates an internal configuration of the image processing apparatus; [0034] FIG. 3 is a block diagram illustrating a configuration of a portable terminal apparatus; [0035] FIG. 4 illustrates an example of the conventional operations to be performed by the image processing apparatus and the portable terminal apparatus when the image processing apparatus receives a connection request from the portable terminal apparatus; [0036] FIG. 5 illustrates an example of the operations to be performed by the image processing apparatus and the portable terminal apparatus according to this embodiment when the image processing apparatus receives a connection request from the portable terminal apparatus; [0037] FIG. 6 illustrates another example of the operations to be performed by the image processing apparatus and the portable terminal apparatus according to this embodiment when the portable terminal apparatus transmits a connection request to the image processing apparatus; [0038] FIG. 7 is a flowchart representing the operations of the image processing apparatus, described in the embodiment of FIGS. 5 and 6 ; [0039] FIG. 8 is a flowchart representing a variation of the operations described in the embodiment of FIG. 7 ; [0040] FIG. 9 relates to another embodiment of the present invention, illustrating a flowchart representing operations of the image processing apparatus; [0041] FIG. 10 is an explanatory diagram of the authentication of multiple subjects, to be performed by the image processing apparatus and the portable terminal apparatus according to this embodiment when the image processing apparatus receives a connection request from the portable terminal apparatus; [0042] FIG. 11 is a flowchart representing the authentication using IPP authentication information received from the portable terminal apparatus, to be performed by the image processing apparatus only when receiving a request for a connection using IPP from the portable terminal apparatus; [0043] FIG. 12 indicates one piece of authentication information that consists of multiple elements of authentication information; [0044] FIG. 13 is an explanatory diagram of the user authentication and department authentication using elements of authentication information separated and extracted from the authentication information of FIG. 12 , to be performed by the image processing apparatus and the portable terminal apparatus; [0045] FIG. 14 indicates two pieces of authentication information that each consist of a title of authentication information and an element of authentication information; [0046] FIG. 15 is an explanatory diagram of the user authentication and project authentication using titles of authentication information and elements of authentication information separated and extracted from the two pieces of authentication information of FIG. 14 , to be performed by the image processing apparatus and the portable terminal apparatus; [0047] FIG. 16 relates to yet another embodiment of the present invention, illustrating a flowchart representing operations of the image processing apparatus; [0048] FIG. 17 is an explanatory diagram of the timing of when the portable terminal apparatus transmits print data; and [0049] FIG. 18 indicates an example of the operations of consolidating the print data received from the portable terminal apparatus to the authentication information and store. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS [0050] In the following paragraphs, some preferred embodiments of the invention will be described by way of example and not limitation. It should be understood based on this disclosure that various other modifications can be made by those in the art based on these illustrated embodiments. [0051] Hereinafter, some embodiments of the present invention will be described with reference to the accompanying drawings. [0052] FIG. 1 illustrates a configuration of an image processing system provided with an image processing apparatus according to one embodiment of the present invention. [0053] The image processing system is comprised of an image processing apparatus 1 and a portable terminal apparatus 2 . The image processing apparatus 1 and the portable terminal apparatus 2 are configured to connect to each other in a wireless manner, for example, through a wireless local area network (wireless LAN) 3 . [0054] The image processing apparatus 1 generates a copy image from print data obtained by document scanning or print data received from the portable terminal apparatus 2 and forms the copy image on paper. In this embodiment, an MFP, i.e., a multifunctional digital image processing apparatus having printer function, copier function, facsimile function, scanner function, and other functions, as described above, is employed as the image processing apparatus 1 . Hereinafter, image processing apparatuses will also be referred to as “MFPs”. [0055] The portable terminal apparatus 2 is a portable computer terminal such as a tablet computer or a smartphone, essentially provided with a CPU, a RAM, a fixed storage device (a hard disk drive, for example), a monitor, and a touch-enabled liquid-crystal display panel. Users can carry their own portable terminal apparatuses 2 with them to view and edit electronic documents stored thereon anywhere. The portable terminal apparatus 2 is further provided with a wireless communication means such that the portable terminal apparatus 2 can exchange data with the MFP 1 and transmit print data to the MFP 1 to have it printed. Hereinafter, portable terminal apparatuses will also be referred to as “portable terminals” for the sake of simplicity. [0056] FIG. 2 illustrates an internal structure of the MFP 1 . The MFP 1 is provided with a controller 100 that controls the MFP 1 in a unified and systematic manner. The controller 100 is composed of: a CPU 101 ; a ROM 102 that stores control programs; a static random access memory (S-RAM) 103 for fast processing; and a battery-backed non-volatile memory (NV-RAM) 104 that stores various settings for image forming, all of which are connected to each other through a bus network. [0057] The controller 100 is connected to the following portions through a bus network: an image reading device 120 for document scanning; an operation panel 130 having a display 131 and various operation keys such as numeric keys, a print key, and a log-out key; a network interface (network I/F) 160 that exchanges various pieces of information with external apparatuses including personal computers (PCs) connected to the image processing apparatus 1 through the network; a printer controller 150 that generates a copy image from print data received by the network interface 160 ; and an imaging device 140 that forms the copy image on paper. [0058] The controller 100 is further connected to a fixed storage device 110 through the bus network. The fixed storage device 110 is a hard disk drive, for example. The fixed storage 110 stores data of various types. [0059] The image processing apparatus 1 is further provided with a wireless interface (wireless I/F) 170 that is connected to the fixed storage device 110 through the bus network. The wireless interface 170 serves for wireless communications with networks and with the portable terminal apparatus 2 . [0060] The MFP 1 prints a file created on a PC application and an electronic document from a storage by its printer function. There are various print instruction methods as introduced below. In a method, a printer driver or printing application installed on a client PC transmits a print instruction to the MFP 1 along with a specified print mode. In another method, a mailer installed on a client PC or the portable terminal 2 attaches a document file to an email message having a description of a specified print mode and transmits a print instruction by transmitting the email message (email to print). In yet another method, an OS standard printing application (e.g., AIRPRINT for IOS, AIRPRINT for MAC OS, or MOPRIA PLUG-IN for ANDROID) transmits a print instruction to the MFP 1 . The MFP 1 has various network ports and protocols available for its printer function. Here, AIRPRINT or MOPRIA PLUG-IN transmits a print instruction using internet printing protocol (IPP). [0061] IPP serves for authentication of a protocol. Receiving a connection request using a protocol, the MFP 1 performs authentication of the protocol to judge whether or not to permit a connection. Authentication of a protocol serves for the judgement whether or not to permit a connection, but never serves for user identification. [0062] FIG. 3 is a block diagram illustrating a configuration of the portable terminal 2 . The portable terminal apparatus 2 is provided with a CPU 201 , a ROM 202 that stores control programs, and a RAM 203 for fast processing. The ROM 202 and the RAM 203 are connected to the CPU 201 through a bus network. The CPU 201 , the ROM 202 , and the RAM 203 constitute a controller 200 that controls the portable terminal 2 in a unified and systematic manner. [0063] The controller 200 is connected to the following portions through a bus network: a display 205 that is a liquid-crystal display, for example, and that displays information of various types; a touch panel 206 that is disposed on the surface of the display 205 and that allows users to operate by physically touching a screen on the display; and a wireless LAN interface 207 . The wireless LAN interface 207 serves for wireless communications with networks and with the MFP 1 . [0064] The controller 200 is further connected to a fixed storage device 204 is through the bus network. The fixed storage device 204 is a hard disk drive, for example. The fixed storage device 204 stores data of various types. [0065] The MFP 1 performs operations as described below when receiving a request for a connection using IPP (to be also referred to as “IPP connection request”) from AIRPRINT or MOPRIA PLUG-IN installed on the portable terminal 2 . OS standard printing applications installed on the portable terminal 2 are designed to transmit an IPP connection request, and IPP connection requests do not require user identification. [0066] FIG. 4 illustrates an example of the conventional operations to be performed by the MFP 1 and the portable terminal 2 when the MFP 1 receives an IPP connection request from the portable terminal 2 . [0067] The controller 100 of the MFP 1 receives an IPP connection request from the portable terminal 2 (Step S 01 ) and returns a request for information for IPP authentication (hereinafter to be referred to as “IPP authentication information”) to the portable terminal 2 (Step S 02 ). [0068] A user of the portable terminal 2 transmits fixed IPP authentication information 300 that consists of a predetermined user name and password, to the MFP 1 (Step S 03 ). The controller 100 performs IPP authentication by comparing the IPP authentication information 300 received from the portable terminal 2 to IPP authentication reference data 301 stored on a recording medium such as the NV-RAM 104 (Step S 04 ). If it matches the data as a result of comparison, IPP authentication is successfully completed. The controller 100 then permits a connection with the portable terminal 2 (Step S 05 ). In this example, the MFP 1 cannot manage the authorized activities of the user because the IPP authentication information does not include user identification information or other information serving for the judgment whether or not it is an authenticated user. [0069] The user of the portable terminal 2 may accidentally transmit user authentication information including his/her user identification information, instead of the IPP authentication information 300 . In this case, the MFP 1 denies an IPP connection because it does not match the IPP authentication reference data 301 . [0070] FIG. 5 illustrates an example of the operations to be performed by the MFP 1 and the portable terminal 2 according to this embodiment when the MFP 1 receives an IPP connection request from the portable terminal 2 . In this example, the MFP 1 is already configured by an administrator-privileged user not to compare authentication information received from the portable terminal 2 to the IPP authentication reference data 301 , that is, not to perform IPP authentication (IPP authentication is disabled). In other words, the MFP 1 is configured to perform user authentication by comparing authentication information received from the portable terminal 2 to user authentication reference data 401 for user identification. [0071] Referring to FIG. 5 , the controller 100 of the MFP 1 receives an IPP connection request from the portable terminal 2 (Step S 01 ) and returns a request for IPP authentication information to the portable terminal 2 (Step S 02 ). [0072] A user of the portable terminal 2 transmits user authentication information 400 including his/her user identification information and password, instead of the fixed IPP authentication information 300 , to the MFP 1 (Step S 03 ). The controller 100 compares the user authentication information 400 received therefrom to user authentication reference data 401 stored on a recording medium such as the fixed storage device 110 (Step S 06 ). That is, the controller 100 performs user authentication. If it matches the data as a result of comparison, authentication is successfully completed. The controller 100 then permits a connection with the portable terminal 2 (Step S 05 ). In this example, the MFP 1 performs user identification and judges whether or not it is an authenticated user. So, the MFP 1 is able to manage the authorized activities of the user. [0073] As described above, in this embodiment, the MFP 1 transmits a request for IPP authentication information to the portable terminal 2 in response to an IPP connection request, but the MFP 1 may accidentally receive user authentication information from the portable terminal 2 . Even in this case, the MFP 1 performs user authentication using this user authentication information. So, the MFP 1 is able to manage the authorized activities of the user. [0074] In the example of FIG. 5 , the user of the portable terminal 2 may accidentally transmit the IPP authentication information 300 . In this case, the MFP 1 compares the IPP authentication information 300 to the user authentication reference data 401 . Since it does not match the data, the MFP 1 denies a connection with the portable terminal 2 . [0075] FIG. 6 illustrates another example of the operations to be performed by the MFP 1 and the portable terminal 2 according to this embodiment when the MFP 1 receives a connection request from the portable terminal 2 . In this example, the MFP 1 cannot perform IPP authentication because of absence of the IPP authentication reference data 301 . In other words, IPP authentication is disabled. Also in this example, the MFP 1 is configured to perform user authentication by comparing authentication information received from the portable terminal 2 to the user authentication reference data 401 . [0076] Referring to FIG. 6 , the controller 100 of the MFP 1 receives an IPP connection request from the portable terminal 2 (Step S 01 ) and returns a request for IPP authentication information to the portable terminal 2 (Step S 02 ). [0077] A user of the portable terminal 2 transmits the user authentication information 400 including his/her user identification information and password, instead of the fixed IPP authentication information 300 , to the MFP 1 (Step S 03 ). The controller 100 fails to compare the user authentication information 400 received therefrom to the IPP authentication reference data 301 (Step S 04 ) because of absence of the IPP authentication reference data 301 . The controller 100 then compares the same to the user authentication reference data 401 (Step S 06 ). If it matches the data as a result of comparison, authentication is successfully completed. The controller 100 then permits a connection with the portable terminal 2 (Step S 05 ). Also in this example, the MFP 1 judges whether or not it is an authenticated user. So, the MFP 1 is able to manage the authorized activities of the user. [0078] As described above, also in the embodiment of FIG. 6 , the MFP 1 transmits a request for IPP authentication information to the portable terminal 2 in response to an IPP connection request, but the MFP 1 may accidentally receive user authentication information from the portable terminal 2 . Even in this case, the MFP 1 performs user authentication using this user authentication information. So, the MFP 1 is able to manage the authorized activities of the user. [0079] FIG. 7 is a flowchart representing the operations of the MFP 1 , described in the embodiment of FIGS. 5 and 6 . The MFP 1 performs the operations represented by the FIG. 7 flowchart and the following flowcharts, by the CPU 101 running operation programs stored on a recording medium such as the ROM 12 . [0080] In Step S 101 , a request for IPP authentication information is transmitted from the MFP 1 to the portable terminal 2 . In Step S 102 , it is judged whether or not authentication information is received. If authentication information is not received (NO in Step S 102 ), a connection with the portable terminal 2 is denied. [0081] If authentication information is received (YES in Step S 102 ), it is then judged in Step S 103 whether or not IPP authentication (hereinafter to be also referred to as “first authentication”) is enabled, i.e., whether or not first authentication is enabled. If it is enabled (YES in Step S 103 ), the authentication information received from the portable terminal 2 is compared to the IPP authentication reference data (hereinafter to be also referred to as “first authentication reference data”) 301 in Step S 104 . In Step S 105 , it is judged whether or not authentication is successfully completed. [0082] If authentication is successfully completed (YES in Step S 105 ), a connection with the portable terminal 2 is permitted in Step S 106 . If authentication is not completed successfully (NO in Step S 105 ), a connection with the portable terminal 2 is denied. [0083] Back to Step S 103 , first authentication may be disabled (NO in Step S 103 ). In other words, first authentication may be disabled or may not be possible because of absence of the first authentication reference data 301 . In this case, the flowchart proceeds to Step S 107 , in which it is judged whether or not user authentication (hereinafter to be also referred to as “second authentication”) for the judgment whether or not it is an authenticated user of the image processing apparatus, is enabled [0084] If second authentication is enabled (YES in Step S 107 ), the authentication information received from the portable terminal 2 is compared to the user authentication reference data 401 in Step S 108 . In Step S 109 , it is judged whether or not authentication is successfully completed. [0085] If authentication is successfully completed (YES in Step S 109 ), a connection with the portable terminal 2 is permitted in Step S 106 . If authentication is not completed successfully (NO in Step S 109 ), a connection with the portable terminal 2 is denied. [0086] Back to Step S 107 , if user authentication is disabled (NO in Step S 107 ), the MFP 1 does not require authentication. In Step S 106 , a connection with the portable terminal 2 is permitted accordingly. [0087] Back to Step S 105 of FIG. 7 , if IPP authentication is not completed successfully (NO in Step S 105 ), the flowchart may proceed to Step S 107 for user authentication. As in the case where IPP authentication is disabled, the MFP 1 transmits a request for IPP authentication information to the portable terminal 2 in response to an IPP connection request, but the MFP 1 may accidentally receive the authentication information 400 including user information of the user of the portable terminal 2 . Even in this case, the MFP 1 performs user authentication using this authentication information 400 . So, the MFP 1 is able to manage the authorized activities of the user. [0088] FIG. 8 is a flowchart representing a variation of the operations described in the embodiment of FIG. 7 . In the example of FIG. 7 , the MFP 1 is configured to judge whether or not user authentication is enabled after transmitting a request for IPP authentication information to the portable terminal 2 . In contrast, in the example of FIG. 8 , the MFP 1 is configured to transmit a request for IPP authentication information to the portable terminal 2 after judging whether or not IPP authentication or user authentication is enabled. [0089] In Step S 110 , it is judged whether or not first authentication (IPP authentication) is enabled. If it is enabled (YES in Step S 110 ), a request for IPP authentication information is transmitted in Step S 111 . In Step S 102 , it is judged whether or not authentication information is received. If authentication information is not received (NO in Step S 112 ), the MFP 1 waits until it is received. If it is received (YES in Step S 112 , the authentication information received from the portable terminal 2 is compared to the first authentication reference data 301 in Step S 113 . In Step S 114 , it is judged whether or not authentication is successfully completed. [0090] If authentication is successfully completed (YES in Step S 114 ), a connection with the portable terminal 2 is permitted in Step S 115 . If authentication is not completed successfully (NO in Step S 114 ), a connection with the portable terminal 2 is denied. [0091] Back to Step S 110 , if first authentication is disabled (NO in Step S 110 ), it is then judged in Step S 116 whether or not second authentication (user authentication) is enabled. [0092] If second authentication is enabled (YES in Step S 116 ), a request for IPP authentication information is transmitted in Step S 117 . In Step S 118 , it is judged whether or not authentication information is received. If authentication information is not received (NO in Step S 118 ), the MFP 1 waits until it is received. If it is received (YES in Step S 118 ), the authentication information received from the portable terminal 2 is compared to the second authentication reference data 401 in Step S 119 . In Step S 120 , it is judged whether or not authentication is successfully completed. [0093] If authentication is successfully completed (YES in Step S 120 ), a connection with the portable terminal 2 is permitted in Step S 115 . If authentication is not completed successfully (NO in Step S 120 ), a connection with the portable terminal 2 is denied. [0094] Back to Step S 116 , if second authentication is disabled (NO in Step S 116 ), the MFP 1 does not require authentication. In Step S 115 , a connection with the portable terminal 2 is permitted accordingly. [0095] Back to Step S 114 of FIG. 8 , if first authentication is not completed successfully (NO in Step S 114 ), the flowchart may proceed to Step S 116 for second authentication, as in the embodiment of FIG. 7 . [0096] FIG. 9 relates to another embodiment of the present invention, illustrating a flowchart representing operations of the MFP 1 . In this embodiment, the MFP 1 is configured to perform authentication of different subjects. For example, the MFP 1 may be configured to perform user authentication after a successful completion of IPP authentication. For another example, the MFP 1 may be configured to further perform department authentication after IPP authentication and user authentication. In whichever case, after a successful completion of authentication of a subject, the MFP 1 transmits a request for authentication information on another subject. The MFP 1 transmits such a request repeatedly until completing authentication of all subjects. [0097] In Step S 121 , a request for authentication information is transmitted. In Step S 122 , it is judged whether or not authentication information is received. If it is not received (NO in Step S 122 ), the MFP 1 waits until it is received. If it is received (YES in Step S 122 ), authentication of an initial subject is performed in Step S 123 by judging whether or not it satisfies all requested elements. For example, it may be lacking in a password. If it does not satisfy all requested elements (NO in Step S 123 ), a connection with the portable terminal 2 is denied. [0098] If it satisfies all requested elements (YES in Step S 123 ), authentication is successfully completed. In Step S 124 , it is further judged whether or not authentication information on another subject needs to be received. If authentication information on another subject needs to be received (YES in Step S 124 ), the flowchart returns to Step S 121 in which a request for authentication information on another subject is transmitted. If authentication information on another subject do not need to be received (NO in Step S 112 ), in other words, if authentication information on all subjects are already received, the authentication process is terminated. [0099] FIG. 10 is an explanatory diagram of the authentication of multiple subjects, to be performed by the MFP 1 and the portable terminal 2 according to this embodiment when the MFP 1 receives a connection request from the portable terminal 2 . [0100] In this embodiment, the MFP 1 is configured to perform user authentication and department authentication under the condition of a successful completion of IPP authentication. [0101] The controller 100 of the MFP 1 receives an IPP connection request from the portable terminal 2 (Step S 01 ) and returns a request for IPP authentication information to the portable terminal 2 (Step S 02 ). [0102] A user of the portable terminal 2 transmits the fixed IPP authentication information 300 to the MFP 1 (Step S 03 ). The controller 100 performs first authentication (IPP authentication) by comparing the IPP authentication information 300 received therefrom to the first authentication reference data 301 (Step S 04 ). If it matches the data as a result of comparison, first authentication is successfully completed. The MFP 1 then transmits a request for other IPP authentication information serving for user authentication coming next, to the portable terminal 2 (Step S 07 ). [0103] The user of the portable terminal 2 transmits the user authentication information 400 including his/her user identification information and password to the MFP 1 (Step S 08 ). The controller 10 compares the user authentication information 400 received therefrom to the second authentication reference data 401 (Step S 09 ). That is, the controller 100 performs second authentication (user authentication). If it matches the data as a result of comparison, authentication is successfully completed. The MFP 1 then transmits a request for other IPP authentication information serving for department authentication coming next, to the portable terminal 2 (Step S 10 ). [0104] The user of the portable terminal 2 transmits department authentication information 410 including his/her department identification information and password to the MFP 1 (Step S 11 ). The controller 10 compares the department authentication information 410 received from the portable terminal 2 to department authentication reference data 411 (Step S 12 ). That is, the controller 100 performs department authentication. If it matches the data as a result of comparison, authentication is successfully completed. The controller 100 then permits a connection with the portable terminal 2 (Step S 13 ). [0105] As described above, after a successful completion of authentication of a subject, the MFP 1 transmits a request for IPP authentication information on another subject. Using authentication information received from the portable terminal 2 , the MFP 1 performs user authentication and authentication of other subjects. [0106] In FIG. 10 , the MFP 1 may be configured to skip IPP authentication and perform only user authentication and department authentication in order. [0107] Print data received from a printer driver or printing application suitable for the MFP 1 includes user identification information described in PJL. In contrast, as described above, print data received from an OS standard printing application such as AIRPRINT or MORPIA PLUG-IN does not include user identification information or department information because OS standard printing applications installed on the portable terminal 2 are designed to transmit a request for a connection using IPP to the MFP 1 . OS standard printing apparatus have multiple protocols workable for establishing a connection with the MFP 1 , including a specific protocol just like IPP. To solve this problem, for example, the MPF 1 may be configured to transmit a request for IPP authentication information to the portable terminal 2 only when receiving a connection request using IPP from the portable terminal 2 , and to perform user authentication or department authentication using IPP authentication information received therefrom. [0108] FIG. 11 is a flowchart representing the user authentication or department authentication using IPP authentication information received from the portable terminal 2 , to be performed by the MFP 1 only when receiving a request for a connection using IPP from the portable terminal 2 . [0109] In Step S 131 , it is judged whether or not it is an IPP connection request. If it is an IPP connection request (YES in Step S 131 ), a request for IPP authentication information is transmitted in Step S 132 . In Step S 133 , it is judged whether or not authentication information is received. If it is not received (NO in Step S 133 ), the MFP 1 waits until it is received. If it is received (YES in Step S 133 ), it is compared to the user authentication reference data 401 in Step S 134 . In Step S 135 , it is judged whether or not authentication is successfully completed. [0110] If authentication is successfully completed (YES in Step S 135 ), a connection with the portable terminal 2 is permitted in Step S 136 . If authentication is not completed successfully (NO in Step S 135 ), a connection with the portable terminal 2 is denied in Step S 137 . [0111] Back to Step S 131 , if it is not an IPP connection request (NO in Step S 131 ), a conventional connecting process using other protocols than IPP is executed in Step S 138 . [0112] Hereinafter, yet another embodiment of the present invention will be described. In this embodiment, one piece of authentication information consists of multiple elements of authentication information according to a predetermined rule, and the MFP 1 is configured to extract the elements of authentication information therefrom and perform authentication of different subjects using the elements of authentication information. [0113] FIG. 12 indicates one piece of authentication information 420 that consists of multiple elements of authentication information. The authentication information 420 consists of a user name (as “Name” in this figure) and password (as “Password” in this figure). The user name and password each contains multiple elements of authentication information. [0114] Specifically, the user name contains elements of authentication information “Suzuki” and “GroupA”, which are joined together by a punctuation mark “:” that is a predetermined combinator. Similarly, the password contains elements of authentication information “00001111” and “00002222”, which are also joined together by a punctuation mark “:” that is predetermined combinator. The MFP 1 separates and extracts these elements of authentication information from the user name and password of the authentication information, and recognizes user identification information “Suzuki”, its corresponding password “00001111”, department information “GroupA”, and its corresponding password “00002222”. The MFP 1 then performs user authentication and department authentication using the elements of authentication information extracted therefrom. [0115] FIG. 13 is an explanatory diagram of the user authentication and department authentication using elements of authentication information separated and extracted from the authentication information of FIG. 12 , to be performed by the MFP 1 and the portable terminal 2 . [0116] The controller 100 of the MFP 1 receives an IPP connection request from the portable terminal 2 (Step S 01 ) and returns a request for IPP authentication information to the portable terminal 2 (Step S 02 ). [0117] A user of the portable terminal 2 transmits the fixed IPP authentication information 300 to the MFP 1 (Step S 03 ). The controller 100 performs IPP authentication by comparing the IPP authentication information 300 received therefrom to the IPP authentication reference data 301 (Step S 04 ). If it matches the data as a result of comparison, IPP authentication is successfully completed. The MFP 1 then transmits a request for other IPP authentication information serving for user authentication coming next, to the portable terminal 2 (Step S 07 ). [0118] The user of the portable terminal 2 transmits the authentication information 420 that consists of multiple elements of authentication information as indicated in FIG. 12 , to the MFP 1 (Step S 08 ). Receiving the authentication information 420 , the controller 100 separates the elements of authentication information therefrom and extracts user authentication information 420 a that consists user identification information “Suzuki” and its corresponding password “00001111” and department authentication information 420 b that consists of department authentication information “GroupA” and its corresponding password “00002222” (Step S 14 ). [0119] The MFP 1 perform user authentication by comparing the user authentication information 420 a to the user authentication reference data 401 (Step S 15 ), and performs department authentication by comparing the department authentication information 420 b to the department authentication reference data 411 (Step S 16 ). When user authentication and department authentication are both successfully completed as a result of completion, a connection with the portable terminal 2 is permitted (Step S 17 ). [0120] As described above, in this embodiment, one piece of authentication information consists of multiple elements of authentication information, and the MFP 1 separates and extracts the elements of authentication information therefrom and performs authentication of multiple subjects, without the need of transmitting a request for authentication information again and again. This will make the authentication process simpler. [0121] Hereinafter, yet another embodiment of the present invention will be described. In this embodiment, one piece of authentication information consists of a title of authentication information and an element of authentication information according to a predetermined rule. The MFP 1 is configured to extract the title of authentication information and the element of authentication information therefrom and perform authentication of a subject indicated by the title of authentication information extracted therefrom. [0122] FIG. 14 indicates two pieces of authentication information 430 and 440 that each consist of a title of authentication information and an element of authentication information. The authentication information 430 and 440 each consist of a user name (as “Name” in this figure) and password (as “Password” in this figure). The user name and password each contains a title of authentication information and an element of authentication information. [0123] Specifically, as for the authentication information 430 , the user name contains a title of authentication information “User” and an element of authentication information “Suzuki”, which are joined together by a punctuation mark “:” that is a predetermined combinator. Similarly, the password contains a title of authentication information “User” and an element of authentication information “00001111”, which are joined together also by a punctuation mark “:” that is a predetermined combinator. [0124] The MFP 1 separates and extracts these titles and elements of authentication information from the authentication information 430 , and recognizes a title of authentication “User” (user authentication), user identification information “Suzuki”, and its corresponding password “00001111”. [0125] As for the authentication information 440 , the user name contains a title of authentication information “Project” and an element of authentication information “ProjectB”, which are joined together by a punctuation mark “:” that is a predetermined combinator. Similarly, the password contains a title of authentication information “Project” and an element of authentication information “00003333”, which are joined together also by a punctuation mark “:” that is a predetermined combinator. [0126] The MFP 1 separates and extracts these titles and elements of authentication information from the authentication information 440 , and recognizes a title of authentication “Project” (project authentication), a project name “ProjectB”, and its corresponding password as “00003333”. [0127] The MFP 1 then performs user authentication and project authentication using the titles and elements of authentication information extracted therefrom. [0128] FIG. 15 is an explanatory diagram of the user authentication and project authentication using titles of authentication information and elements of authentication information separated and extracted from the authentication information of FIG. 14 , to be performed by the MFP 1 and the portable terminal 2 . [0129] The controller 100 of the MFP 1 receives an IPP connection request from the portable terminal 2 (Step S 01 ) and returns a request for IPP authentication information to the portable terminal 2 (Step S 02 ). [0130] A user of the portable terminal 2 transmits the fixed IPP authentication information 300 to the MFP 1 (Step S 03 ). The controller 100 performs IPP authentication by comparing the IPP authentication information 300 received therefrom to the IPP authentication reference data 301 (Step S 04 ). If it matches the data as a result of comparison, IPP authentication is successfully completed. The MFP 1 then transmits a request for other IPP authentication information serving for user authentication coming next, to the portable terminal 2 (Step S 07 ). [0131] In response to the request, the user of the portable terminal 2 transmits the authentication information 430 including a user name and password, i.e., a title and element of authentication information, as indicated in FIG. 14 , to the MFP 1 (Step S 08 ). The controller 100 separates the title and element of authentication information from the authentication information 430 received therefrom (Step S 18 ). The controller 100 recognizes the authentication information 430 as user authentication information from the title of authentication information “User” (Step S 19 ), and extracts authentication information 430 a that consists of user identification information “Suzuki” and its corresponding password “00001111”, from the authentication information 430 . [0132] The controller 100 then perform user authentication by comparing the authentication information 430 a to the user authentication reference data 401 (Step S 20 ). After a successful completion of authentication, the MFP 1 transmits a request for other IPP authentication information serving for next authentication (Step S 21 ). [0133] In response to the request, the user of the portable terminal 2 transmits the authentication information 440 that consists of a title and element of authentication information as indicated in FIG. 14 , to the MFP 1 (Step S 22 ). The controller 100 extracts the title and element of authentication information from the authentication information 440 received therefrom (Step S 23 ). The controller 100 recognizes the authentication information 440 as project authentication information from the authentication information “Project” (Step S 24 ), and extracts authentication information 440 a that consists of a project name “ProjectB” and its corresponding password “00003333”, from the authentication information 440 . [0134] The controller 100 then perform project authentication by comparing authentication information 440 a to project authentication reference data 441 (Step S 25 ). After a successful completion of authentication, the controller 100 permits a connection with the portable terminal 2 (Step S 26 ). [0135] As described above, in this embodiment, two pieces of authentication information each consist of a title and element of authentication information, and the MFP 1 separates and extracts the titles and elements of authentication information therefrom and perform authentication of multiple subjects using the elements of authentication information, without the need of presetting the order of authentication. This will make the authentication process simpler. [0136] FIG. 16 illustrates still yet another embodiment of the present invention, and is a flowchart representing operations of the MFP 1 . In this example, the MFP 1 is configured to store a predetermined allowable limit of the number of user authentication failures and to transmit a request for IPP authentication information repeatedly until the number of authentication failures reaches the allowable limit. [0137] In Step S 141 , a request for IPP authentication information is transmitted from the MFP 1 to the portable terminal 2 . In Step S 142 , it is judged whether or not authentication information is received. If it is not received (NO in Step S 142 ), the MFP 1 waits until it is received. If it is received (YES in Step S 142 ), it is then judged in Step S 143 whether or not authentication is successfully completed. If authentication is successfully completed (YES in Step S 143 ), a connection with the portable terminal 2 is permitted in Step S 144 . [0138] If authentication is not completed successfully (NO in Step S 144 ), it is then judged in Step S 145 whether or not the number of authentication failures reaches an allowable limit. If it does not reach an allowable limit yet (NO in Step S 145 ), the flowchart returns to Step S 141 in which a request for IPP authentication information is transmitted again. If it reaches an allowable limit (YES in Step S 145 ), a connection with the portable terminal 2 is denied. [0139] As described above, in this embodiment, the portable terminal 2 returns authentication information in response to a request for IPP authentication information, and the MFP 1 performs user authentication, department authentication, and project authentication using the authentication information received therefrom. After a successful completion of authentication of all predetermined subjects, the portable terminal 2 transmits print data, as indicated in FIG. 17 (Step S 31 ). The controller 100 of the MFP 1 receives the print data and makes the imaging device 140 perform printing (Step S 32 ). [0140] As referred to FIG. 18 , after the portable terminal 2 transmits the print data (Step S 33 ), the controller 100 of the MFP 1 may merge the print data and the authentication information of the relevant user into consolidated data 500 and store the consolidated data 500 on a recording medium such as the fixed storage device 110 . [0141] Here, a detailed description on Steps S 01 to S 05 of FIG. 6 is omitted because of these steps being the same as Steps S 01 to S 05 of FIG. 6 . [0142] Referring to FIGS. 17 and 18 , the controller 100 of the MFP 1 may be further configured to judge whether or not a print job is an authorized activity of the user of the portable terminal 2 and to receive the print job only if it is one of the authorized activities of the user. [0143] While the present invention may be embodied in many different forms, a number of illustrative embodiments are described herein with the understanding that the present disclosure is to be considered as providing examples of the principles of the invention and such examples are not intended to limit the invention to preferred embodiments described herein and/or illustrated herein. [0144] While illustrative embodiments of the invention have been described herein, the present invention is not limited to the various preferred embodiments described herein, but includes any and all embodiments having equivalent elements, modifications, omissions, combinations (e.g. of aspects across various embodiments), adaptations and/or alterations as would be appreciated by those in the art based on the present disclosure. The limitations in the claims are to be interpreted broadly based on the language employed in the claims and not limited to examples described in the present specification or during the prosecution of the application, which examples are to be construed as non-exclusive. For example, in the present disclosure, the term “preferably” is non-exclusive and means “preferably, but not limited to”. In this disclosure and during the prosecution of this application, means-plus-function or step-plus-function limitations will only be employed where for a specific claim limitation all of the following conditions are present In that limitation: a) “means for” or “step for” is expressly recited; b) a corresponding function is expressly recited; and c) structure, material or acts that support that structure are not recited. In this disclosure and during the prosecution of this application, the terminology “present invention” or “invention” may be used as a reference to one or more aspect within the present disclosure. The language present invention or invention should not be improperly interpreted as an identification of criticality, should not be improperly interpreted as applying across all aspects or embodiments (i.e., it should be understood that the present invention has a number of aspects and embodiments), and should not be improperly interpreted as limiting the scope of the application or claims. In this disclosure and during the prosecution of this application, the terminology “embodiment” can be used to describe any aspect, feature, process or step, any combination thereof, and/or any portion thereof, etc. In some examples, various embodiments may include overlapping features. In this disclosure and during the prosecution of this case, the following abbreviated terminology may be employed: “e.g.” which means “for example”, and “NB” which means “note well”.

Description

Topics

Download Full PDF Version (Non-Commercial Use)

Patent Citations (3)

    Publication numberPublication dateAssigneeTitle
    US-2003067624-A1April 10, 2003Anderson Jeff M., Hall David M., David StaasSystem and method for mobile printing
    US-2006192990-A1August 31, 2006Nobuyuki TonegawaImage communication method and apparatus
    US-9088961-B1July 21, 2015Qualcomm IncorporatedMethod for selecting and configuring wireless connections in an electronic device

NO-Patent Citations (0)

    Title

Cited By (0)

    Publication numberPublication dateAssigneeTitle