Ricoh Aficio SP C821DNT1 Design Guide - Page 14

Data Security, 3-1 External I/F, 3-2 Protection of Program Data from Illegal Access via an External

Page 14 highlights

Print Controller Design Guide for Information Security 1-3 Data Security 1-3-1 External I/F The MFP/LP is equipped with the following external interfaces: • Serial I/F for connection of external coin/card-operated devices. • Serial I/F for connection of peripheral devices (e.g. DF, Finisher, LCT). • Analog G3 FAX I/F (public telecommunications line), G4 FAX I/F (ISDN). • Standard IEEE 1284 parallel I/F (Host I/F), which can function as a two-way parallel interface when using a USB cable. • Standard IEEE 1394 I/F • 100BASE-TX and 10BASE-T compatible network I/F (Host I/F) • Gigabit Ethernet-compatible network I/F (Host I/F options, external controller I/F board) • Standard IEEE802.11b wireless LAN network I/F (Host I/F option) • Bluetooth I/F (Host I/F option) • USB2.0 Type B I/F (Host I/F) • USB2.0 Type A I/F (IC card, Pictbridge) 1-3-2 Protection of Program Data from Illegal Access via an External Device 1. All of the above principal machine functions, as well as software for all shared service layers, run on the UNIX operating system as independent processes (data/program modules). Memory space is allocated specifically for each module, which makes it impossible for one module to directly access the memory space of any other. 2. Data transfer between modules is Unix socket-based, whereby communication is performed along ID-protected communication paths. This ensures exclusive connections among the modules present in the MFP/LP, thereby preventing access by any module outside this pre-determined set. For example, incoming FAX data will only be sent to those modules designated to perform FAX data operations. This arrangement prevents illegal access to networks and internal programs from an outside line. 3. All image data stored on the HDD or stored temporarily in the Image Memory is managed by a memory control module called the MCS (Memory Control Service), which ensures that the data can only be accessed by specified machine function(s). In addition, this arrangement prevents illegal access to this data from an outside line. User data, such as the Address Book data stored in the HDD/flash ROM and User Code data stored in the NV-RAM, is managed by the UCS module. Access to this data is not possible by any module except those pre-determined modules in the MFP/LP itself. This arrangement ensures that the data stored in the MFP/LP cannot be accessed illegally via an external I/F. Page 14 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 14 of 86
1-3
Data Security
1-3-1 External I/F
The MFP/LP is equipped with the following external interfaces:
Serial I/F for connection of external coin/card-operated devices.
Serial I/F for connection of peripheral devices (e.g. DF, Finisher, LCT).
Analog G3 FAX I/F (public telecommunications line), G4 FAX I/F (ISDN).
Standard IEEE 1284 parallel I/F (Host I/F), which can function as a two-way parallel interface when
using a USB cable.
Standard IEEE 1394 I/F
100BASE-TX and 10BASE-T compatible network I/F (Host I/F)
Gigabit Ethernet-compatible network I/F (Host I/F options, external controller I/F board)
Standard IEEE802.11b wireless LAN network I/F (Host I/F option)
Bluetooth I/F (Host I/F option)
USB2.0 Type B I/F (Host I/F)
USB2.0 Type A I/F (IC card, Pictbridge)
1-3-2 Protection of Program Data from Illegal Access via an External Device
1.
All of the above principal machine functions, as well as software for all shared service layers, run on
the UNIX operating system as independent processes (data/program modules). Memory space is
allocated specifically for each module, which makes it impossible for one module to directly access the
memory space of any other.
2.
Data transfer between modules is Unix socket-based, whereby communication is performed along
ID-protected communication paths. This ensures exclusive connections among the modules present in
the MFP/LP, thereby preventing access by any module outside this pre-determined set. For example,
incoming FAX data will only be sent to those modules designated to perform FAX data operations. This
arrangement prevents illegal access to networks and internal programs from an outside line.
3.
All image data stored on the HDD or stored temporarily in the Image Memory is managed by a memory
control module called the MCS (Memory Control Service), which ensures that the data can only be
accessed by specified machine function(s). In addition, this arrangement prevents illegal access to this
data from an outside line.
User data, such as the Address Book data stored in the HDD/flash ROM and User Code data stored in
the NV-RAM, is managed by the UCS module. Access to this data is not possible by any module
except those pre-determined modules in the MFP/LP itself. This arrangement ensures that the data
stored in the MFP/LP cannot be accessed illegally via an external I/F.