Patent application number | Description | Published |
20080291490 | METHOD AND SYSTEM FOR PRINT JOB PROCESSING - Print jobs received at a printer are assigned a reference which is incorporated as a representation of the reference in the printed print job. When the user recovers the printjob, the part of said print job incorporating said representation of said reference. is scanned back into the printer, which is then able to read the representation. By monitoring the time intervening between the printing of the print job and the scanning of the part of the print job incorporating the representation, the system is able to monitor the delay, and in a case where this exceeds a threshold to notify the user accordingly. | 11-27-2008 |
20080291491 | METHOD AND SYSTEM FOR PRINT JOB PROCESSING - Print jobs received at a printer are assigned a reference which is incorporated as a visible representation of the reference in the printed print job. When the user recovers the print job, the reusable print job addendum. is fed back into the printer, for reuse in later print jobs. | 11-27-2008 |
20090094463 | Double Authentication for Controlling Disruptive Operations on Storage Resources - A method, data processing system and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied. | 04-09-2009 |
20130212400 | DOUBLE AUTHENTICATION FOR CONTROLLING DISRUPTIVE OPERATIONS ON STORAGE RESOURCES - A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied. | 08-15-2013 |
20130212651 | Double Authentication for Controlling Disruptive Operations on Storage Resources - A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied. | 08-15-2013 |