Ricoh Aficio 1022 [5/27] External i f

1.3 Data Security
1.3.1 External I/F
The external I/F that connects the machine and external devices comprises the following:
z Analog G3 fax line (public telephone line for fax), ISDN line connection I/F for a G4 fax.
z Serial I/F for LADP connection.
z Serial I/F for connection of an external coin device.
z IEEE 1284 Standard I/F. Used as a parallel bi-directional I/F when a USB connection cable is used.
z 100BASE-TX and 10BASE-T compatible network I/F.
z IEEE 1394 Standard I/F.
1.3.2 Protection of Program Data from Illegal Access from an External Device
1. In addition to the memory protection mechanisms of the UNIX OS, all the shared software service layers and
applications operate as independent processing (data and program modules). Because memory space is
allocated strictly according to processing function, other portions of processing memory cannot be directly
accessed.
2. Data transfer in devices is based on the UNIX OS socket, i.e. every transmission path, in addition to being
assigned a unique ID, is connected exclusively. During processing, data cannot be transferred on any path
other than its assigned path.
For example, any data input from the fax line other than data specified for fax operation cannot be transferred.
Similarly, any data input from the CSS line other than data specified for CSS operation cannot be transferred.
Therefore, this arrangement does not allow illegal access from these external lines to either the network or
internal programs of the devices.
3. All image data stored on the HDD, or stored temporarily in memory, are protected by processing management
control called MCS (Memory Control Service) which ensures that these data can be accessed only by
specified programs.
4. Ricoh independent protocols are used to communicate with the I/Fs of connected peripheral devices, and in
addition to being able to discriminate among the tasks of the devices, these protocols are also used to
exchange specific commands and data.
5. The I/Fs of connected coin devices (PEACE) and connected peripheral devices are handled in the same way.
An external coin device is referenced as if it has been set for limited user access. However, information
regarding user access limits (user codes, etc.) can be exchanged.
5/24 Ricoh Company, Ltd.

Содержание