Computer peripheral apparatus and method of controlling the same
a peripheral device and computer technology, applied in the field of anti-virus technique, can solve the problems of destroying data such as fonts and programs stored in specific areas, causing damage to the apparatus, and causing damage to the apparatus, and achieve the effect of minimizing damag
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
first embodiment
[0035]FIG. 1 is a block diagram showing the arrangement of a printer as a computer peripheral apparatus of this embodiment.
[0036]A printer 100 is connected to a client PC 120 as an external apparatus so as to be able to communicate with the client PC 120. Note that although only one client PC connected to the printer 100 is illustrated in FIG. 1, a plurality of client PCs can exist in practice. Since these client PCs are sources of supplying data to the printer 100, they will be also called “supply source computers” hereinafter. Note also that the form of connection between the client PC and printer can be either wired or wireless.
[0037]Basically, the printer 100 prints on the basis of data supplied from the client PC 120. In the printer 100, a main CPU 101 is a central control unit for controlling the whole apparatus. A network controller 102 controls transmission and reception. That is, the network controller 102 receives a print request, print data, storage request, storage data,...
second embodiment
[0062]The second embodiment controls the execution timing of virus check on the basis of attribute information of supplied data.
[0063]FIG. 9 is a block diagram showing the arrangement of a printer of this embodiment. The same reference numerals as the components shown in FIG. 1 of the first embodiment denote the same components in FIG. 9. As shown in FIG. 9, the arrangement of this printer is almost the same as the printer of the first embodiment, so a description of each part will be omitted. The difference from the printer of the first embodiment is that a hard disk unit 106 further stores a safety check table 60.
[0064]More specifically, a client PC 120 of this embodiment is arranged as shown in FIG. 10.
[0065]Referring to FIG. 10, a CPU 1 controls the whole computer, a ROM 2 stores a boot program and the like, a RAM 3 functions as a main memory, and a hard disk driver (HDD) 4 stores various programs and data. A memory (VRAM) 5 is used to rasterize image data to be displayed. Image...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


