Ricoh Aficio SP C820DN Design Guide - Page 31

the key is restored to the MFP/LP. The Encryption Key Back-up and Encryption Key Restore functions

Page 31 highlights

Print Controller Design Guide for Information Security to the HDD, it still exists inside de-allocated HDD memory, where it will remain until it is overwritten. If the operator wishes to manually overwrite this data, it is necessary to use the Data Erase/Overwrite option explained in 1.7.1 above. Encryption Key Update: This operation allows the operator to replace the existing encryption key with a new one (the main setting must already be enabled). When Encryption Key Update is executed, a new encryption key is generated. The MFP/LP prompts the operator to create a back-up of the new NVRAM storage key, and the target data is encrypted. Finally, the old key (if the data had already been encrypted) is then deleted. In this sense, the operations performed are identical to those performed when the main setting is changed to "Enabled". Encryption Key Back-up: This operation prints out the NVRAM storage key onto a sheet of paper, for the purpose of ensuring that the encrypted data can be recovered and decrypted in the event that the controller board breaks or otherwise needs to be replaced (in which case, the original key cannot be accessed). This back-up key is an extremely important piece of property, as it protects the personal information of the MFP/LP user. Therefore, it must be handled with the utmost confidentiality and care, and must be stored in a safe location, to ensure that it is not lost or leaked out to a third party. This key is used to decrypt the NVRAM back-up data. Specifically, if the NVRAM data is backed up while encryption is enabled, the encryption back-up key is needed in order to decrypt the NVRAM back-up data. It is therefore necessary to store the NVRAM back-up key and NVRAM back-up data together as a set. Encryption Key Restore: This operation must be performed by a field engineer. The encryption key that was backed-up using the method described above is input into a file, which is then stored on a formatted SD card. Finally, the key is restored to the MFP/LP. The Encryption Key Back-up and Encryption Key Restore functions only apply to the NVRAM storage key, however a copy of the HDD storage key (which is encrypted by the NVRAM storage key) is kept in the NVRAM. Through this arrangement, the copy of the HDD storage key is automatically decrypted once the Encryption Key Restore has been completed. Page 31 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 31 of 86
to the HDD, it still exists inside de-allocated HDD memory, where it will remain until it is
overwritten. If the operator wishes to manually overwrite this data, it is necessary to use the
Data Erase/Overwrite option explained in 1.7.1 above.
°
Encryption Key Update:
This operation allows the operator to replace the existing encryption key with a new one (the main
setting must already be enabled). When Encryption Key Update is executed, a new encryption key is
generated. The MFP/LP prompts the operator to create a back-up of the new NVRAM storage key, and
the target data is encrypted. Finally, the old key (if the data had already been encrypted) is then
deleted. In this sense, the operations performed are identical to those performed when the main
setting is changed to “Enabled”.
°
Encryption Key Back-up:
This operation prints out the NVRAM storage key onto a sheet of paper, for the purpose of ensuring
that the encrypted data can be recovered and decrypted in the event that the controller board breaks
or otherwise needs to be replaced (in which case, the original key cannot be accessed). This back-up
key is an extremely important piece of property, as it protects the personal information of the MFP/LP
user. Therefore, it must be handled with the utmost confidentiality and care, and must be stored in a
safe location, to ensure that it is not lost or leaked out to a third party.
This key is used to decrypt the NVRAM back-up data. Specifically, if the NVRAM data is backed up
while encryption is enabled, the encryption back-up key is needed in order to decrypt the NVRAM
back-up data. It is therefore necessary to store the NVRAM back-up key and NVRAM back-up data
together as a set.
°
Encryption Key Restore:
This operation must be performed by a field engineer. The encryption key that was backed-up using
the method described above is input into a file, which is then stored on a formatted SD card. Finally,
the key is restored to the MFP/LP. The Encryption Key Back-up and Encryption Key Restore functions
only apply to the NVRAM storage key, however a copy of the HDD storage key (which is encrypted by
the NVRAM storage key) is kept in the NVRAM. Through this arrangement, the copy of the HDD
storage key is automatically decrypted once the Encryption Key Restore has been completed.