Image processing method and image processing device
An image processing device and image processing technology, applied in printing devices, image communication, electrical digital data processing, etc., can solve problems such as low confidentiality, processing stagnation, and forgotten settings
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0051] FIG. 1 is a block diagram showing the overall configuration of an image forming system according to this embodiment. 100 in the figure is an image forming device, which has the following functions: a scanning function for reading an image of an original document; a copying function for reading an image of an original document and forming an image on a sheet such as paper or OHP film; A printing function for forming an image on a sheet is connected to the image forming apparatus 100 via a communication network N to information processing apparatuses 200 , 200 , and 200 such as personal computers and workstations. In the information processing apparatus 200, a structure is formed in which applications for creating documents, images, etc., and a driver (print driver) for using the image forming apparatus 100 through the communication network N are installed in advance, from any application The print driver is invoked, and the print job generated by the print driver is sent...
Embodiment approach 2
[0083] In the above-mentioned embodiment, the security level and its recommended value are calculated based on the information added to the print job, and the processing to be executed is determined by comparing the two. However, it is also possible to combine the calculated security level and the The processing content is associated in advance, and the processing corresponding to the calculated security level is selected and executed. In this embodiment, the system configuration and the internal configuration of the image forming apparatus 100 are completely the same as those in Embodiment 1, so description thereof will be omitted.
[0084] FIG. 9 is a graph showing the contents of processing to be executed according to the calculated security level. In this embodiment, the security level is calculated from all the information added in the print job. Specifically, the sum of the points (A) to (E) shown in FIGS. 6A-6E is calculated as the security level. In the table shown i...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com