HP LaserJet Enterprise 500 HP Color LaserJet Enterprise 500 Color M551, 600/M6
HP LaserJet Enterprise 500 Manual
View all HP LaserJet Enterprise 500 manuals
Add to My Manuals
Save this manual to your list of manuals |
HP LaserJet Enterprise 500 manual content summary:
- HP LaserJet Enterprise 500 | HP Color LaserJet Enterprise 500 Color M551, 600/M6 - Page 1
SECURE VOLATILE STORAGE Software Encryption of Customer Data on FutureSmart Firmware Single Function Printers CONTENTS Description ...2 Data Encryption...2 Key Management ...2 Secure Cryptographic Erase of Customer Job Data 2 Customer Data Encrypted ...2 Erase Job Data ...3 Secure Volatile storage - HP LaserJet Enterprise 500 | HP Color LaserJet Enterprise 500 Color M551, 600/M6 - Page 2
HP printing devices do not support data overwrite or native encryption. Files deleted from these storage devices are not immune from forensic recovery. To protect customer data, HP firmware single function printer without a HDD, which stores job data in volatile system memory. Customers are assured - HP LaserJet Enterprise 500 | HP Color LaserJet Enterprise 500 Color M551, 600/M6 - Page 3
selections will be unavailable. SECURE VOLATILE STORAGE REPLACES THE RAM DISK Secure Volatile Storage replaces the RAM Disk feature on single function printers for storing job data. Since encrypted data partitions are cryptographically erased at system restart the behavior is similar to a RAM Disk - HP LaserJet Enterprise 500 | HP Color LaserJet Enterprise 500 Color M551, 600/M6 - Page 4
LIST The following devices implement the Secure Volatile Storage: • HP LaserJet Enterprise 600 M601n,dn, x; M602n,dn; M603n,dn • HP LaserJet Enterprise 500 color M551n,dn Implemented with CPE 11.3 firmware: • HP Color LaserJet Enterprise CP5525n,dn (Firmware version TBD) © 2011 Hewlett-Packard
August 2011
Public
Version 1.0
SECURE VOLATILE STORAGE
Software Encryption of Customer Data on FutureSmart Firmware Single Function Printers
CONTENTS
Description
...........................................................................................................................
2
Data Encryption
.....................................................................................................................
2
Key Management
...............................................................................................................
2
Secure Cryptographic Erase of Customer Job Data
..................................................................
2
Customer Data Encrypted
.......................................................................................................
2
Erase Job Data
......................................................................................................................
3
Secure Volatile storage replaces the Ram Disk
...........................................................................
3
Backup/Restore Feature
..........................................................................................................
3
Device List
............................................................................................................................
4