Ricoh Aficio SP C820DN Design Guide - Page 85

Prevention of Access to Address Book Data and Machine Management Data

Page 85 highlights

Print Controller Design Guide for Information Security 4-3-3 Prevention of Access to Address Book Data and Machine Management Data By calling the DMP (Device Management Package), SDK applications are able to view and change the contents and settings of the MFP/LP Address Book. However, these operations are limited to those users who have been authenticated by the CCS. As mentioned in section 1.2.1, the Address Book data is managed by the UCS. For details, refer to section 1.7. 4-3-4 Protection Against Attacks on Principal MFP/LP Functions, Prevention of Damage to the System Buffer Overflow Attacks on the MFP/LP VM After completing the development of the SDK application, the Vendor must apply to Ricoh for the items necessary to carry out the SDK Authentication and/or Digital Authentication processes described above, and at that time declare the expected VM consumption of the application. The proper method for measuring VM is described in the SDK Development Kit provided by Ricoh to the Vendor. Ricoh then performs tests on the proposed application to verify that the actual VM consumption matches that which the Vendor has stated on the application form, and then makes a judgment as to whether or not to approve the application and provide the Vendor with the requested authentication items. Alteration or Deletion of MFP/LP Principal Function Program Objects As mentioned above in section 3.1, each SDK application is installed in its own unique directory on the HDD, which is determined by its unique product ID. It is impossible for the application to access any other areas. Even in the event that an SDK application attempted to write a large amount of data to the SD card or MFP/LP HDD, e.g. with the aim of rendering machine principal functions unable to write data, this would not succeed since the application cannot access any area aside of its own isolated partition on the HDD. In addition, as a general rule, Ricoh prohibits SDK applications from writing to any machine media or SD cards. Even in cases where Ricoh has given the application writing capabilities upon request from the Vendor, the application is only able to write to a specialized SD card for SDK applications. 4-3-5 Protection Against Attacks from External Sources As mentioned in section 2.3, an SDK application is able to perform network communication either by using the NCS (Type 1) or by opening and closing its own unique socket (Types 1 and 2). In the latter case, all communication including the content of all messages and data exchanged is encrypted, and specialized protocols and authentication procedures are employed. As a result, these safeguards protect the MFP/LP from any attacks from external sources. Page 85 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 85 of 86
4-3-3 Prevention of Access to Address Book Data and Machine Management Data
°
By calling the DMP (Device Management Package), SDK applications are able to view and change the
contents and settings of the MFP/LP Address Book. However, these operations are limited to those
users who have been authenticated by the CCS.
°
As mentioned in section 1.2.1, the Address Book data is managed by the UCS. For details, refer to
section 1.7.
4-3-4 Protection Against Attacks on Principal MFP/LP Functions, Prevention of
Damage to the System
Buffer Overflow Attacks on the MFP/LP VM
°
After completing the development of the SDK application, the Vendor must apply to Ricoh for the items
necessary to carry out the SDK Authentication and/or Digital Authentication processes described
above, and at that time declare the expected VM consumption of the application. The proper method
for measuring VM is described in the SDK Development Kit provided by Ricoh to the Vendor. Ricoh
then performs tests on the proposed application to verify that the actual VM consumption matches that
which the Vendor has stated on the application form, and then makes a judgment as to whether or not
to approve the application and provide the Vendor with the requested authentication items.
Alteration or Deletion of MFP/LP Principal Function Program Objects
°
As mentioned above in section 3.1, each SDK application is installed in its own unique directory on the
HDD, which is determined by its unique product ID. It is impossible for the application to access any
other areas.
°
Even in the event that an SDK application attempted to write a large amount of data to the SD card or
MFP/LP HDD, e.g. with the aim of rendering machine principal functions unable to write data, this
would not succeed since the application cannot access any area aside of its own isolated partition on
the HDD. In addition, as a general rule, Ricoh prohibits SDK applications from writing to any machine
media or SD cards. Even in cases where Ricoh has given the application writing capabilities upon
request from the Vendor, the application is only able to write to a specialized SD card for SDK
applications.
4-3-5 Protection Against Attacks from External Sources
°
As mentioned in section 2.3, an SDK application is able to perform network communication either by
using the NCS (Type 1) or by opening and closing its own unique socket (Types 1 and 2). In the latter
case, all communication including the content of all messages and data exchanged is encrypted, and
specialized protocols and authentication procedures are employed. As a result, these safeguards
protect the MFP/LP from any attacks from external sources.