摘要 |
When a command packet for an image forming apparatus is received, the image forming apparatus extracts information for specifying a source from the received packet, specifies the user who sends the command from the information, and decides the presence of the right to execute the command. When the user has the right, the command is received. When the user does not have the right, the command is not received. Thereby, an unintentional access from an outsider is rejected so that confidential information can be prevented from leaking.
|