Ricoh Aficio SP C820DNT1 Design Guide - Page 4

Scanning Functions: Sending Data Over the Network with the Copier and Scanner

Page 4 highlights

Print Controller Design Guide for Information Security 2-4-2 Data Security Considerations 60 2-4-3 Protection of the Journal and Documents in Document Server Storage 61 2-4-4 Protection of FAX Transmission Operations 61 2-4-5 Protection of FAX Features Settings 62 2-4-6 The "Extended Security" Feature 62 2-4-7 Job Log ...62 2-4-8 Protection of Internet FAX Transmissions using S/MIME 62 2-4-9 Preventing FAX Transmission to Unintended Destination(s 63 2-5 NetFile (GWWS) ...64 2-5-1 Overview of NetFile Operations 64 2-5-2 Data Flow...65 2-5-3 Supplementary...65 2-5-4 Data Security Considerations 67 2-6 Web Applications ...69 2-6-1 Web Server Framework 69 2-6-2 WebDocBox (MFP models only 70 3. Optional Features...73 3-1 @Remote...73 3-1-1 Overview of @Remote Operations 73 3-1-2 Data Security Considerations 73 3-2 The "Copy Data Security" Feature 74 3-2-1 Overview of Copy Data Security Operations 74 3-2-2 Data Flow...75 4. Device SDK Applications (DSDK 77 4-1 Overview of Operations 77 4-1-1 Installation...78 4-1-2 Overview of SDK Application Functions 79 4-2 Data Flow...80 4-2-1 Scanning Functions: Sending Data Over the Network with the Copier and Scanner Page 4 of 86

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Print Controller Design Guide for Information Security
Page 4 of 86
2-4-2
Data Security Considerations
...............................................................................
60
2-4-3
Protection of the Journal and Documents in Document Server Storage
...............
61
2-4-4
Protection of FAX Transmission Operations
.........................................................
61
2-4-5
Protection of FAX Features Settings
.....................................................................
62
2-4-6
The “Extended Security” Feature
..........................................................................
62
2-4-7
Job Log
.................................................................................................................
62
2-4-8
Protection of Internet FAX Transmissions using S/MIME
......................................
62
2-4-9
Preventing FAX Transmission to Unintended Destination(s)
.................................
63
2-5
NetFile (GWWS)
......................................................................................................
64
2-5-1
Overview of NetFile Operations
............................................................................
64
2-5-2
Data Flow
..............................................................................................................
65
2-5-3
Supplementary
......................................................................................................
65
2-5-4
Data Security Considerations
...............................................................................
67
2-6
Web Applications
.....................................................................................................
69
2-6-1
Web Server Framework
........................................................................................
69
2-6-2
WebDocBox (MFP models only)
...........................................................................
70
3.
Optional Features
.........................................................................................................
73
3-1
@Remote
.................................................................................................................
73
3-1-1
Overview of @Remote Operations
.......................................................................
73
3-1-2
Data Security Considerations
...............................................................................
73
3-2
The “Copy Data Security” Feature
...........................................................................
74
3-2-1
Overview of Copy Data Security Operations
.........................................................
74
3-2-2
Data Flow
..............................................................................................................
75
4.
Device SDK Applications (DSDK)
................................................................................
77
4-1
Overview of Operations
............................................................................................
77
4-1-1
Installation
.............................................................................................................
78
4-1-2
Overview of SDK Application Functions
................................................................
79
4-2
Data Flow
.................................................................................................................
80
4-2-1
Scanning Functions: Sending Data Over the Network with the Copier and Scanner