1. An information processing system comprising:
a plurality of information processing apparatuses, each of the information processing apparatuses including a transmission unit and a verification unit; and
a plurality of authentication servers communicably connected to the plurality of information processing apparatuses via one or more networks,
the plurality of information processing apparatuses and the plurality of authentication servers grouped into a plurality of groups including at least a first group and a second group,
the first group including a plurality of information processing apparatuses and a first authentication server communicably connected to each other via a network, the first authentication server storing user information of one or more users that use the information processing apparatuses in the first group, the first authentication server being adapted to conduct user authentication of users that use each of the information processing apparatuses in the first group by comparing the stored user information and user information input by a user to any one of the plurality of information processing apparatuses, and when the stored user information and the input user information input are identical, the first authentication server issues a user verification success to the information processing apparatuses that has transmitted the user information to the first authentication server, and the information processing apparatus that receives the user verification success allows the user to use the information processing apparatus,
the second group including a plurality of information processing apparatuses and a second authentication server connected to each other via a network, the second authentication server storing user information of one or more users that use the information processing apparatuses in the second group, the second authentication server being adapted to conduct user authentication of users that use each of the information processing apparatuses in the second group by comparing the stored user information and user information input by a user to any one of information processing apparatuses, and when the stored user information and the input user information input being identical, the second authentication server issues a user verification success to the information processing apparatuses that has transmitted the user information to the second authentication server, and the information processing apparatus that receives the user verification success allows the user to use the information processing apparatus,
wherein the information processing apparatuses and first authentication server in the first group and the information processing apparatuses and second authentication server in the second group are communicably connected to each other,
wherein when one information processing apparatus disposed in the first group receives a request of executing a given processing at the one information processing apparatus from other information processing apparatus disposed in either the first group or the second group,
the transmission unit of the other information processing apparatus transmits identification information of the authentication server that the other information processing apparatus uses for the user authentication of the other information processing apparatus to the one information processing apparatus disposed in the first group together with the execution request of given processing, in which the one information processing apparatus disposed in the first group is used as a receiving apparatus, and the other information processing apparatus disposed in the first group or the second group is used as a requesting apparatus,
wherein when the receiving apparatus receives the identification information of the authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, the verification unit of the receiving apparatus compares the identification information of the authentication server received from the requesting apparatus and identification information of the authentication server that the receiving apparatus uses for the user authentication of the receiving apparatus,
when the verification unit of the receiving apparatus determines that the identification information of the authentication server received from the requesting apparatus and the identification information of the authentication server for the user authentication of the receiving apparatus are identical, verification success of the user of the requesting apparatus at the receiving apparatus is confirmed, and
the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing.
2. The information processing system of claim 1, wherein when the verification unit of the receiving apparatus determines that the authentication server of the receiving apparatus and the authentication server of the requesting apparatus are not identical based on a comparison of the identification information of the authentication server of the receiving apparatus and the authentication server of the requesting apparatus,
the receiving apparatus demands user information of the requesting apparatus to conduct the user authentication of the user of the requesting apparatus at the receiving apparatus that receives the execution request of given processing, and transmits the user information, received from the requesting apparatus, to the first authentication server,
the first authentication server used for user authentication of the receiving apparatus conducts the user authentication at the receiving apparatus based on the user information received from the requesting apparatus via the receiving apparatus, and
the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing when the verification success is confirmed by the first authentication server.
3. The information processing system of claim 1, wherein when the transmission unit of the requesting apparatus transmits the execution request of given processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits user information of a user that uses the requesting apparatus connectable to the authentication server for user authentication of the requesting apparatus together with the identification information of the authentication server of the requesting apparatus that the requesting apparatus uses for the user authentication of the requesting apparatus and the execution request of given processing, to the receiving apparatus disposed in the first group,
when the verification unit of the receiving apparatus determines that the authentication server of the receiving apparatus and the authentication server of the requesting apparatus are not identical based on a comparison of the identification information of the authentication server of the receiving apparatus and the authentication server of the requesting apparatus, the first authentication server used for user authentication of the receiving apparatus conducts the user authentication at the receiving apparatus based on the user information received from the requesting apparatus via the receiving apparatus, and
when the verification success is confirmed by the first authentication server, the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing.
4. The information processing system of claim 3, wherein when verification failure is confirmed by the first authentication server, other information is input to the requesting apparatus, with which to conduct the user authentication of the user of the requesting apparatus at the receiving apparatus that receives the execution request of given processing,
the first authentication server used for user authentication of the receiving apparatus conducts the user authentication at the receiving apparatus based on the input other information transmitted to the first authentication server via the receiving apparatus, and
when the verification success is confirmed by the first authentication server, the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing.
5. The information processing system of claim 1, wherein each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
wherein when the transmission unit of the requesting apparatus requests the execution of the requested processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits user identification information to identify a user that uses the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group,
when the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing, the verification unit of the receiving apparatus determines, based on the user identification information received from the requesting apparatus and use-allowable function information stored in the receiving apparatus that receives the execution request of given processing, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information, and
when the verification unit of the receiving apparatus determines that the use of the function is allowed at the receiving apparatus, the requested process is executed at the receiving apparatus, and when the verification unit of the receiving apparatus determines that the use of the function is not allowed at the receiving apparatus, the requested process is not executed at the receiving apparatus.
6. The information processing system of claim 1, wherein each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
wherein when the transmission unit of the requesting apparatus requests the execution of the requested processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits use-allowable function information specifying one or more functions that a user is allowed to use at the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group,
when the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing, the verification unit of the receiving apparatus determines, based on the use-allowable function information received from the requesting apparatus via the receiving apparatus, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information at the requesting apparatus, and
when the verification unit of the receiving apparatus determines that the use of the function is allowed at the requesting apparatus, the requested process is executed at the receiving apparatus, and when the verification unit of the receiving apparatus determines that the use of the function is not allowed at the receiving apparatus, the requested process is not executed at the receiving apparatus.
7. The information processing system of claim 1, wherein each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
wherein when the transmission unit of the requesting apparatus requests the execution of the requested processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits user identification information to identify a user that uses the requesting apparatus, and use-allowable function information set to the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group,
when the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing, the verification unit of the receiving apparatus determines, based on the user identification information and use-allowable function information received from the requesting apparatus and use-allowable function information stored in the receiving apparatus that receives the execution request of given processing, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information at both of the requesting apparatus and the receiving apparatus, and
when the verification unit of the receiving apparatus determines that the use of the function is allowed at both of the requesting apparatus and the receiving apparatus, the requested process is executed at the receiving apparatus, and when the verification unit of the receiving apparatus determines that the use of the function is not allowed at any one of the process requester apparatus and the receiving apparatus, the requested process is not executed at the receiving apparatus.
8. An information processing apparatus useable for an information processing system including a plurality of information processing apparatuses communicably connected to a plurality of authentication servers via one or more networks, the information processing apparatus comprising:
a transmission unit; and
a verification unit,
wherein the plurality of information processing apparatuses and the plurality of authentication servers are grouped into a plurality of groups including at least a first group and a second group,
wherein the first group includes a plurality of information processing apparatuses and a first authentication server communicably connected to each other via a network, the first authentication server storing user information of one or more users that use the information processing apparatuses in the first group, the first authentication server being adapted to conduct user authentication of users that use each of the information processing apparatuses in the first group by comparing the stored user information and user information input by a user to any one of information processing apparatuses, and when the stored user information and the input user information input being identical, the first authentication server issues a user verification success to the information processing apparatuses that has transmitted the user information to the first authentication server, and the information processing apparatus that receives the user verification success allows the user to use the information processing apparatus,
wherein the second group including a plurality of information processing apparatuses and a second authentication server connected to each other via a network, the second authentication server storing user information of one or more users that use the information processing apparatuses in the second group, the second authentication server being adapted to conduct user authentication of users that use each of the information processing apparatuses in the second group by comparing the stored user information and user information input by a user to any one of information processing apparatuses, and when the stored user information and the input user information input being identical, the second authentication server issues a user verification success to the information processing apparatuses that has transmitted the user information to the second authentication server, and the information processing apparatus that receives the user verification success allows the user to use the information processing apparatus,
wherein the information processing apparatuses and first authentication server of the first group and the information processing apparatuses and second authentication server of the second group are communicably connected to each other,
wherein when one information processing apparatus disposed in the first group receives a request of executing a given processing at the one information processing apparatus from other information processing apparatus disposed in either the first group or the second group,
the transmission unit of the other information processing apparatus transmits identification information of an authentication server that the other information processing apparatus uses for the user authentication of the other information processing apparatus to the one information processing apparatus disposed in the first group together with the execution request of given processing, in which the one information processing apparatus disposed in the first group is used as a receiving apparatus and the other information processing apparatus disposed in the first group or the second group is used as a requesting apparatus,
wherein when the receiving apparatus receives the identification information of the authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, the verification unit of the receiving apparatus compares the identification information of the authentication server received from the requesting apparatus and identification information of the authentication server that the receiving apparatus uses for the user authentication of the receiving apparatus,
when the verification unit of the receiving apparatus determines that the identification information of the authentication server received from the requesting apparatus and the identification information of the authentication server for the user authentication of the receiving apparatus are identical, verification success of the user of the requesting apparatus at the receiving apparatus is confirmed, and
the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing.
9. The information processing apparatus of claim 8, wherein when the verification unit of the receiving apparatus determines that the authentication server of the receiving apparatus and the authentication server of the requesting apparatus are not identical based on a comparison of the identification information of the authentication server of the receiving apparatus and the authentication server of the requesting apparatus,
the receiving apparatus demands user information of the requesting apparatus to conduct the user authentication of the user of the requesting apparatus at the receiving apparatus that receives the execution request of given processing, and transmits the user information, received from the requesting apparatus, to the first authentication server,
the first authentication server used for user authentication of the receiving apparatus conducts the user authentication at the receiving apparatus based on the user information received from the requesting apparatus via the receiving apparatus, and
when the verification success is confirmed by the first authentication server, the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing.
10. The information processing apparatus of claim 8, wherein when the transmission unit of the requesting apparatus transmits the execution request of given processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits user information of a user that uses the requesting apparatus connectable to the authentication server for user authentication of the requesting apparatus together with the identification information of the authentication server of the requesting apparatus that the requesting apparatus uses for the user authentication of the requesting apparatus and the execution request of given processing, to the receiving apparatus disposed in the first group,
when the verification unit of the receiving apparatus determines that the authentication server of the receiving apparatus and the authentication server of the requesting apparatus are not identical based on a comparison of the identification information of the authentication server of the receiving apparatus and the authentication server of the requesting apparatus, the first authentication server used for user authentication of the receiving apparatus conducts the user authentication at the receiving apparatus based on the user information received from the requesting apparatus via the receiving apparatus, and
when the verification success is confirmed by the first authentication server, the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing.
11. The information processing apparatus of claim 10, wherein when verification failure is confirmed by the first authentication server, other information is input to the requesting apparatus, with which to conduct the user authentication of the user of the requesting apparatus at the receiving apparatus that receives the execution request of given processing,
the first authentication server used for user authentication of the receiving apparatus conducts the user authentication at the receiving apparatus based on the input other information transmitted to the first authentication server via the receiving apparatus, and
when the verification success is confirmed by the first authentication server, the verification unit of the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing.
12. The information processing apparatus of claim 8, wherein each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
wherein when the transmission unit of the requesting apparatus requests the execution of the requested processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits user identification information to identify a user that uses the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group,
when the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing, the verification unit of the receiving apparatus determines, based on the user identification information received from the requesting apparatus and use-allowable function information stored in the receiving apparatus that receives the execution request of given processing, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information, and
when the verification unit of the receiving apparatus determines that the use of the function is allowed at the receiving apparatus, the requested process is executed at the receiving apparatus, and when the verification unit of the receiving apparatus determines that the use of the function is not allowed at the receiving apparatus, the requested process is not executed at the receiving apparatus.
13. The information processing apparatus of claim 8, wherein each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
wherein when the transmission unit of the requesting apparatus requests the execution of the requested processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits use-allowable function information specifying one or more functions that a user is allowed to use at the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group,
when the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing, the verification unit of the receiving apparatus determines, based on the use-allowable function information received from the requesting apparatus via the receiving apparatus, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information at the requesting apparatus, and
when the verification unit of the receiving apparatus determines that the use of the function is allowed at the requesting apparatus, the requested process is executed at the receiving apparatus, and when the verification unit of the receiving apparatus determines that the use of the function is not allowed at the receiving apparatus, the requested process is not executed at the receiving apparatus.
14. The information processing apparatus of claim 8, wherein each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
wherein when the transmission unit of the requesting apparatus requests the execution of the requested processing to the receiving apparatus, the transmission unit of the requesting apparatus transmits user identification information to identify a user that uses the requesting apparatus and use-allowable function information set to the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group,
when the receiving apparatus allows the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing, the verification unit of the receiving apparatus determines, based on the user identification information and use-allowable function information received from the requesting apparatus, and use-allowable function information stored in the receiving apparatus that receives the execution request of given processing, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information at both of the requesting apparatus and the receiving apparatus, and
when the verification unit of the receiving apparatus determines that the use of the function is allowed at both of the requesting apparatus and the receiving apparatus, the requested process is executed at the receiving apparatus, and when the verification unit of the receiving apparatus determines that the use of the function is not allowed at any one of the process requester apparatus and the receiving apparatus, the requested process is not executed at the receiving apparatus.
15. A non-transitory computer-readable medium storing a program product for processing information on an information processing system configured to cause a computer to perform a method of processing information, the information processing system including a plurality of information processing apparatuses, each of the information processing apparatuses including a transmission unit and a verification unit, and a plurality of authentication servers connectable to the plurality of information processing apparatuses via one or more networks,
wherein the plurality of information processing apparatuses and the plurality of authentication servers are grouped into a plurality of groups including at least a first group and a second group,
wherein the first group includes a plurality of information processing apparatuses and a first authentication server communicably connected to each other via a network, the first authentication server storing user information of one or more users that use the information processing apparatuses in the first group, the first authentication server being adapted to conduct user authentication of users that use each of the information processing apparatuses in the first group by comparing the stored user information and user information input by a user to any one of information processing apparatuses, when the stored user information and the input user information input being identical, the first authentication server issues a user verification success to the information processing apparatuses that has transmitted the user information to the first authentication server, and the information processing apparatus that receives the user verification success allows the user to use the information processing apparatus,
wherein the second group includes a plurality of information processing apparatuses and a second authentication server connected to each other via a network, the second authentication server storing user information of one or more users that use the information processing apparatuses in the second group, the second authentication server being adapted to conduct user authentication of users that use each of the information processing apparatuses in the second group by comparing the stored user information and user information input by a user to any one of information processing apparatuses, when the stored user information and the input user information input being identical, the second authentication server issues a user verification success to the information processing apparatuses that has transmitted the user information to the second authentication server, and the information processing apparatus that receives the user verification success allows the user to use the information processing apparatus,
wherein the information processing apparatuses and first authentication server of the first group and the information processing apparatuses and second authentication server of the second group are communicably connected to each other,
the method comprising the steps of:
receiving a request of executing a given processing at one information processing apparatus disposed in the first group from other information processing apparatus disposed in either the first group or the second group;
transmitting identification information of an authentication server that the other information processing apparatus uses for the user authentication of the other information processing apparatus to the one information processing apparatus disposed in the first group together with the execution request of given processing, in which the one information processing apparatus disposed in the first group is used as a receiving apparatus, and the other information processing apparatus disposed in the first group or the second group is used as a requesting apparatus;
receiving the identification information of the authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus at the receiving apparatus;
comparing the identification information of the authentication server received from the requesting apparatus and identification information of the authentication server that the receiving apparatus uses for the user authentication of the receiving apparatus by using the verification unit of the receiving apparatus;
determining whether the identification information of the authentication server received from the requesting apparatus and the identification information of the authentication server for the user authentication of the receiving apparatus are identical by using the verification unit of the receiving apparatus; and
allowing the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing when a user verification success of the user of the requesting apparatus at the receiving apparatus is confirmed at the determining step.
16. The non-transitory computer-readable medium of claim 15, wherein the method further comprises the steps of:
demanding user information of the requesting apparatus to conduct the user authentication of the user of the requesting apparatus at the receiving apparatus that receives the execution request of given processing when it is determined that the authentication server of the receiving apparatus and the authentication server of the requesting apparatus are not identical based on a comparison of the identification information of the authentication server of the receiving apparatus and the authentication server of the requesting apparatus;
transmitting the user information, received from the requesting apparatus, to the first authentication server via the receiving apparatus;
conducting the user authentication for the receiving apparatus using the first authentication server used for user authentication of the receiving apparatus based on the user information received from the requesting apparatus via the receiving apparatus; and
allowing the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing when verification success is confirmed by the first authentication server.
17. The non-transitory computer-readable medium of claim 15, the method further comprising the steps of:
when transmitting the execution request of given processing to the receiving apparatus using the transmission unit of the requesting apparatus,
further transmitting user information of a user that uses the requesting apparatus connectable to the authentication server for user authentication of the requesting apparatus together with the identification information of the authentication server of the requesting apparatus that the requesting apparatus uses for the user authentication of the requesting apparatus and the execution request of given processing, to the receiving apparatus disposed in the first group;
when it is determined that the authentication server of the receiving apparatus and the authentication server of the requesting apparatus are not identical based on a comparison of the identification information of the authentication server of the receiving apparatus and the authentication server of the requesting apparatus by using the verification unit of the receiving apparatus,
conducting the user authentication for the receiving apparatus using the first authentication server used for user authentication of the receiving apparatus based on the user information received from the requesting apparatus via the receiving apparatus; and
allowing the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing when verification success is confirmed by the first authentication server.
18. The non-transitory computer-readable medium of claim 17, the method further comprising the step of:
when verification failure is confirmed by the first authentication server,
inputting other information to the receiving apparatus to conduct the user authentication of the user of the requesting apparatus at the receiving apparatus that receives the execution request of given processing;
conducting the user authentication for the receiving apparatus using the first authentication server used for user authentication of the receiving apparatus based on the input other information; and
allowing the user of the requesting apparatus to use the receiving apparatus to execute the requested given processing when verification success is confirmed by the first authentication server.
19. The non-transitory computer-readable medium of claim 15, wherein each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
the method further comprising the steps of:
when requesting the execution of the requested processing to the receiving apparatus by using the transmission unit of the requesting apparatus,
transmitting user identification information to identify a user that uses the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group by using the transmission unit of the requesting apparatus;
when the user of the requesting apparatus is allowed to use the receiving apparatus to execute the requested given processing,
determining, based on the user identification information received from the requesting apparatus and use-allowable function information stored in the receiving apparatus that receives the execution request of given processing, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information by using the verification unit of the receiving apparatus; and
executing the requested process at the receiving apparatus when the use of the function is allowed at the receiving apparatus at the determining step, and not executing the requested process at the receiving apparatus when the use of the function is not allowed at the receiving apparatus at the determining step.
20. The non-transitory computer-readable medium of claim 15, each of the information processing apparatuses includes a storing unit to store use-allowable function information specifying one or more functions that each user is allowed to use at each of the information processing apparatuses,
the method further comprising the steps of:
when requesting the execution of the requested processing to the receiving apparatus by using the transmission unit of the requesting apparatus,
transmitting use-allowable function information specifying one or more functions that a user is allowed to be used at the requesting apparatus together with the execution request of given processing and the identification information of an authentication server that the requesting apparatus uses for the user authentication of the requesting apparatus, to the receiving apparatus disposed in the first group by using the transmission unit of the requesting apparatus;
when the user of the requesting apparatus is allowed to use the receiving apparatus to execute the requested given processing,
determining, based on the use-allowable function information received from the requesting apparatus via the receiving apparatus, whether a function to be used for executing the requested given processing at the receiving apparatus is allowed to be used by the user designated by the user identification information at the requesting apparatus by using the verification unit of the receiving apparatus; and
executing the requested process at the receiving apparatus when the use of the function is allowed at the receiving apparatus at the determining step, and not executing the requested process at the receiving apparatus when the use of the function is not allowed at the receiving apparatus at the determining step.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.
1. A ubiquitin protease-1 (UBP1) mutant characterised in that the mutant contains an amino-acid sequence containing at least one of the following modifications numbered according to the amino acid sequence of FIG. 6:
a substitution of proline at position 415 of the UBP1 sequence for leucine,
a substitution of phenyloalanine at position 739 of the UBP1 sequence for leucine,
a substitution of glutamine at position 754 of the UBP1 sequence for leucine,
fusion with a peptide bond of the ubiquitin polypeptide to an N-terminal amino-acid,
deletion of at least a portion of the amino-acid residues from positions 1 through 54 of the UBP1 sequence.
2. The mutant according to claim 1 wherein the deletion encompasses all amino-acids found in positions 1 through 54 of the UBP1 sequence.
3. The mutant according to one of the preceding claim 1 wherein the mutant contains one of the amino-acid sequence mutants represented in FIGS. 6, 8-10.
4. A nucleotide sequence coding a UBP1 protease mutant, wherein the protease mutant is comprised of an amino acid numbered according to the amino acid sequence of FIG. 6, and wherein the nucleotide sequence characterised in that the nucleotide sequence contains at least one of the following mutations:
a substitution of the proline codon at position 415 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the phenyloalanine codon at position 739 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the glutamine codon at position 754 of the UBP1 amino-acid sequence with a leucine codon,
fusion of the sequence coding ubiquitin, preferentially in the starting region of the open reading frame,
deletion of at least a portion of the first 54 codons of the sequence coding UBP1.
5. A nucleotide sequence according to claim 4 characterised in that the deletion encompasses the initial 132 nucleotides.
6. The nucleotide sequence according to claim 4 characterised in that it also contains codon substitutions accounting for the requirements of the designated expression system.
7. The nucleotide sequence according to claim 4 wherein the designated expression host is E. coli, and the codon changes a encompass substitutions of at least one of the arginine codons in positions 96, 476, 482, 487, 702, 705, 710, 796 and 801 of the UBP1 amino-acid sequence with either the CGT or CGC codon.
8. The nucleotide sequence according to one of claim 7 characterised in that it contains one of the nucleotide sequences represented in FIGS. 1, 5, 8-10.
9. A method of severing ubiquitin from a hybrid protein wherein the hybrid protein is comprised of ubiquitin and a protein or polypeptide of interest, comprising bringing a UBP1 protease mutant into contact with the hybrid protein, wherein the mutant applied contains an amino-acid sequence containing at least one of the following modifications numbered according to the amino acid sequence of FIG. 6:
a substitution of proline at position 415 of the UBP1 sequence for leucine,
a substitution of phenyloalanine at position 739 of the UBP1 sequence for leucine,
a substitution of glutamine at position 754 of the UBP1 sequence for leucine,
fusion with a peptide bond of the ubiquitin polypeptide to an N-terminal amino-acid,
deletion of at least a portion of the amino-acids from positions 1 through 54 of the UBP1 sequence.
10. The method of claim 9 characterised in that the deletion encompasses all amino-acids in positions 1 through 54 of the UBP1 sequence.
11. The method of claim 9 characterised in that, the mutant applied contains one of the amino-acid sequences of the mutants represented in FIGS. 6, 8-10.
12. The method of claim 9 characterised in that, the obtained enzyme severing ubiquitin is used to produce proteins of interest from hybrid proteins composed of ubiquitin and a protein of interest.
13. The method according to claim 12 characterised in that the protein of interest is a medicinal protein, preferentially interleukin, interferon, growth hormone, insulin or erythropoetin.
14. A method for producing a UBP1 protease mutant for severing ubiquitin from a hybrid protein, wherein the hybrid protein is comprised of ubiquitin and a protein or polypeptide of interesting, comprising expressing the UBP1 protease mutant from a nucleotide sequence encoding the UBP1 protease mutant, where the sequence used contains at least one of the following mutations numbered according to the amino acid sequence of FIG. 6:
a substitution of the proline codon at position 415 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the phenyloalanine codon at position 739 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the glutamine codon at position 754 of the UBP1 amino-acid sequence with a leucine codon,
fusion of the sequence coding ubiquitin, preferentially in the starting region of the open reading frame,
deletion of at least a portion of the first 54 codons of the sequence coding UBP1.
15. The method of claim 14 characterised in that the deletion encompasses the initial 132 nucleotides.
16. The method of claim 14 characterised in that, the nucleotide sequence also contains codon substitutions accounting for the requirements of the designated expression system.
17. The method of claim 16 characterised in that the enzyme is produced through the expression of the nucleotide sequence in E. coli.
18. The method of claim 17 characterised in that, the desiganted host is E. coli, and codon substitutions oncompass at least one of the arginine codons in positions 96, 476, 482, 487, 702, 705, 710, 796 and 801 of the UBP1 amino-acid sequence with either the CGT or CGC codon.
19. The method of claim 14 characterised in that the applied sequence contains one of the nucleotide sequences represented in FIGS. 1, 5, 8-10.
20. An expression vector characterised in that it contains the nucleotide sequence coding the UBP1 protease mutant containing at least one of the following mutations numbered according to the amino acid sequence of FIG. 6:
a substitution of the proline codon at position 415 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the phenyloalanine codon at position 739 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the glutamine codon at position 754 of the UBP1 amino-acid sequence with a leucine codon,
fusion of the sequence coding ubiquitin, preferentially in the starting region of the open reading frame,
deletion of at least a portion of the first 54 codons of the sequence coding UBP1.
21. An expression vector according to claim 20 characterised in that the deletion encompasses the initial 132 nucleotides.
22. An expression vector according to claim 20 characterised in that the nucleotide sequence coding the UBP1 protease mutant also contains codon substitutions accounting for the requirements of the designated expression system.
23. An expression vector according to claim 22 characterised in that the designated host is E. coli, and the codon changes encompass at least one of the arginine codons in positions 96, 476, 482, 487, 702, 705, 710, 796 and 801 of the UBP1 amino-acid sequence with either the CGT or CGC codon.
24. An expression vector according to claim 20 characterised in that it contains one of the nucleotide sequences represented in FIGS. 1, 5, 8-10.
25. An expression vector according to claim 20 characterised in that the nucleotide sequence coding the UBP1 protease mutant is contained in the pT7-7ArgStop plasmid.
26. A host cell transformed with an expression vector containing the nucleotide sequence of a UBP1 protease mutant containing at least one of the following mutations numbered according to the amino acid sequence of FIG. 6:
a substitution of the proline codon at position 415 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the phenylalanine codon at position 739 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the glutamine codon at position 754 of the UBP1 amino-acid sequence with a leucine codon,
fusion of the sequence coding ubiquitin, preferentially in the starting region of the open reading frame,
deletion of at least a portion of the first 54 codons of the sequence coding UBP1.
27. A cell according to claim 26 characterised in that the deletion encompasses the initial 132 nucleotides.
28. A cell according to claim 26 characterised in that the nucleotide sequence coding the UBP1 protease mutant also contains codon substitutions accounting for the requirements of this cell.
29. A cell according to claim 28 characterised in that it is an E. coli cell, and that the codon substitutions encompass the substitution of at least one of the arginine codons in positions 96, 476, 482, 487, 702, 705, 710, 796 and 801 of the UBP1 amino-acid sequence with either the CGT or CGC codon.
30. A cell according to claim 26 characterised in that it contains one of the nucleotide sequences represented in FIGS. 1, 5, 8-10.
31. A method of producing a protein severing ubiquitin characterised in that a host cell is cultured which has been transformed with an expression vector containing the nucleotide sequence coding the UBP1 protease mutant, and then the desired enzyme or a fraction containing it are isolated, where the nucleotide sequence coding the UBP1 protease mutant contains at least one of the following mutations:
a substitution of the proline codon at position 415 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the phenyloalanine codon at position 739 of the UBP1 amino-acid sequence with a leucine codon,
a substitution of the glutamine codon at position 754 of the UBP1 amino-acid sequence with a leucine codon,
fusion of the sequence coding ubiquitin, preferentially in the starting region of the open reading frame,
deletion of at least a portion of the first 54 codons of the sequence coding UBP1.
32. A method of according to claim 31 characterised in that the deletion encompasses the initial 132 nucleotides.
33. A method of according to claim 31 characterised in that the applied nucleotide sequence also contains codon substitutions accounting for the requirements of the designated expression system.
34. A method according to claim 33 characterised in that the applied host is E. coli and the codon substitutions encompass the substitution of at least one of the codons that code for arginine in positions 96, 476, 482, 487, 702, 705, 710, 796 and 801 of the UBP1 amino-acid sequence with either the CGT or CGC codon.
35. A method according to claim 31 characterised in that the applied nucleotide sequence contains one of the nucleotide sequences represented in FIGS. 1, 5, 8-10.