Ricoh Aficio SP C820DN Design Guide - Page 75

Data Flow

Page 75 highlights

Print Controller Design Guide for Information Security visible when a copy of the document is made. This optional text field can be set to a number of different character strings to suit the operator's needs, such as "Copying of this document is prohibited", the date on which the document was created, or the name of the user who created the document. By making this information visible, it is possible to further deter the unauthorized copying of documents. Note: - The exact appearance of the optional text string (size, image density, etc.) will depend on the type and condition of the machine duplicating the image. - Even while the optional Copy Data Security Unit is still installed, the Machine Administrator can disable the detection/graying function using the machine settings (there is no need to remove the unit to do so). 3-2-2 Data Flow Marking: The data flow for when the Copy Data Security feature is selected at the time a print job is performed is virtually the same as that of regular print jobs (see 2.2 Printer). The printer language-encoded data sent from the host computer is interpreted by the language processing subsystem, after which it is converted into image data. It is then combined with the background pattern selected by the user and stored temporarily in the Page Memory in binary bitmap format. Detection, replacing image with vertical line pattern: The optional Copy Data Security Unit functions as an image processing component during the scanning of the image. As the scanning engine scans the image, the Copy Data Security Unit examines the data for the presence of an embedded pattern. If the unit detects the presence of the pattern, which in effect alerts the MFP that this is a confidential document, the buzzer is sounded and the image is replaced with the vertical line pattern. Following this, an entry for the event itself is stored in the access log, along with the username. Page 75 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 75 of 86
visible when a copy of the document is made. This optional text field can be set to a number of
different character strings to suit the operator’s needs, such as “Copying of this document is
prohibited”, the date on which the document was created, or the name of the user who created the
document. By making this information visible, it is possible to further deter the unauthorized copying of
documents.
Note:
-
The exact appearance of the optional text string (size, image density, etc.) will depend on the type
and condition of the machine duplicating the image.
-
Even while the optional Copy Data Security Unit is still installed, the Machine Administrator can
disable the detection/graying function using the machine settings (there is no need to remove
the unit to do so).
3-2-2 Data Flow
°
Marking:
The data flow for when the Copy Data Security feature is selected at the time a print job is performed is
virtually the same as that of regular print jobs (see 2.2 Printer
). The printer language-encoded data
sent from the host computer is interpreted by the language processing subsystem, after which it is
converted into image data. It is then combined with the background pattern selected by the user and
stored temporarily in the Page Memory in binary bitmap format.
°
Detection, replacing image with vertical line pattern:
The optional Copy Data Security Unit functions as an image processing component during the
scanning of the image. As the scanning engine scans the image, the Copy Data Security Unit
examines the data for the presence of an embedded pattern. If the unit detects the presence of the
pattern, which in effect alerts the MFP that this is a confidential document, the buzzer is sounded and
the image is replaced with the vertical line pattern. Following this, an entry for the event itself is stored
in the access log, along with the username.