Ricoh Aficio SP C821DNT1 Design Guide - Page 83

Data Security Considerations, 3-1 Preventing the Installation of Illegal Applications, 3-2

Page 83 highlights

Print Controller Design Guide for Information Security 4-3 Data Security Considerations 4-3-1 Preventing the Installation of Illegal Applications The following are used to prevent the installation of illegal SDK applications or altering of authorized SDK applications already installed in the MFP/LP: Product ID (comprised of a vendor code, country code and code representing the application type) Digital Authentication (Type 2) SDK Authentication (Types 1 and 2) Note: The "SDK Authentication" listed here refers to an internal authentication process developed by Ricoh in order to certify the SDK application as described in section 4.3.6 below. This is not related to any of the functions described in section 4.2.6 above. When the Vendor begins developing an SDK application for installation on the MFP/LP, a contract is created between the Vendor and Ricoh. In addition to the necessity for strict confidentiality of information, this contract specifies the scope of responsibilities regarding product quality, as well as the details of sales-related agreements made between both sides. Having agreed to the terms of the contract, the Vendor requests Ricoh to assign and provide a product ID for the proposed application. In addition to being a completely unique number by which the Vendor can be identified should the need arise, the product ID is also used by the Vendor to create an installation directory for the SDK application and by Ricoh to authenticate the application through SDK Authentication. As explained below, without the correct product ID, there is no way to install the SDK application on the MFP/LP. The MFP/LP is designed so that each SDK application, once authenticated, is installed in its own unique directory. This ensures that the objects, data files and other contents of one SDK application cannot be overwritten or accessed by another. 4-3-2 Authentication of SDK Applications at Installation The following two processes are performed in order to authenticate SDK applications. This ensures that only authorized applications can be installed in the MFP/LP, and also controls the range of operations and extent of access granted to the applications once installed. SDK Authentication (Types 1 and 2) Once the development of the SDK application has been completed, and Ricoh has authorized its installation on the MFP/LP model(s) in question, Ricoh provides the Vendor with: 1) a file containing the unique product ID mentioned above in its raw form, and 2) a "key file," which contains two hash values generated from the product ID and SDK application object code, which are then embedded Page 83 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 83 of 86
4-3
Data Security Considerations
4-3-1 Preventing the Installation of Illegal Applications
°
The following are used to prevent the installation of illegal SDK applications or altering of authorized
SDK applications already installed in the MFP/LP:
±
Product ID (comprised of a vendor code, country code and code representing the application
type)
±
Digital Authentication (Type 2)
±
SDK Authentication (Types 1 and 2)
Note:
The “SDK Authentication” listed here refers to an internal authentication process developed
by Ricoh in order to certify the SDK application as described in section 4.3.6 below. This is
not related to any of the functions described in section 4.2.6 above.
°
When the Vendor begins developing an SDK application for installation on the MFP/LP, a contract is
created between the Vendor and Ricoh. In addition to the necessity for strict confidentiality of
information, this contract specifies the scope of responsibilities regarding product quality, as well as
the details of sales-related agreements made between both sides.
°
Having agreed to the terms of the contract, the Vendor requests Ricoh to assign and provide a product
ID for the proposed application. In addition to being a completely unique number by which the Vendor
can be identified should the need arise, the product ID is also used by the Vendor to create an
installation directory for the SDK application and by Ricoh to authenticate the application through SDK
Authentication. As explained below, without the correct product ID, there is no way to install the SDK
application on the MFP/LP.
°
The MFP/LP is designed so that each SDK application, once authenticated, is installed in its own
unique directory. This ensures that the objects, data files and other contents of one SDK application
cannot be overwritten or accessed by another.
4-3-2 Authentication of SDK Applications at Installation
The following two processes are performed in order to authenticate SDK applications. This ensures that
only authorized applications can be installed in the MFP/LP, and also controls the range of operations and
extent of access granted to the applications once installed.
SDK Authentication (Types 1 and 2)
°
Once the development of the SDK application has been completed, and Ricoh has authorized its
installation on the MFP/LP model(s) in question, Ricoh provides the Vendor with: 1) a file containing
the unique product ID mentioned above in its raw form, and 2) a “key file,” which contains two hash
values generated from the product ID and SDK application object code, which are then embedded