Ricoh Aficio 1027 [20/27] Fax data security considerations

Ricoh Company, Ltd
20/27
2.5 Fax Application
2.5.1 Overview of Fax Application Operation
Standard G3 fax image information from the scanner is sent to the other party’s fax machine as a standard G4 fax
through the telephone line. Conversely, standard G3 image information received as standard G4 fax data is output to
the scanner unit.
User access to fax sending is determined by the user code settings. For example, special code settings can determine
that faxes be received only from designated fax machines. Records of TX and RX transactions are recorded in the
non-volatile memory of the FCU, allowing confirmation of the TX/RX Management Report.
2.5.2 Fax Data Flow
In a TX operation, a scan request is sent through the FCS to the ECS and starts the scanning engine. At the same
time, the TX request is sent through the FCUH to the FCU , the image information is acquired, and the TX command
is issued. The image information is sent to the FCU from the scanning engine, and is then sent over the telephone
line.
In the RX operation, a print request is sent to the fax application from the FCU through the FCUH and the FCS. A print
request is sent to the ECS from the fax application through the FCS and starts the scanning engine. The image
information is then sent from the FCU to the scanning engine and printed.
2.5.3 Fax Data Security Considerations
The FCU supports only standard G3 fax and standard G4 fax protocols. If a fax other than a designated party is
connected, the handshake for the transmission is not completed, the transmission is determined to be abnormal, and
the line connection is broken. Therefore, the network cannot be accessed from the telephone line through the FCU,
and there is no possibility of mixing with illegal data.

Содержание

Скачать