Ricoh Aficio 1027 [27/27] User code and password protected data flow for stored image files

Ricoh Company, Ltd
27/27
User code and password protected data flow for stored image files
When a stored document is password protected, the password entry is required of any operation performed with
SmartNet Monitor on a PC connected to the network. In the mutual data transfer between SmartNet Monitor and the
machine, text exchange is accomplished with text in an XML file using an http protocol. The machine passes the
correct password to SmartNet Monitor in this XML text file. However, the user codes and passwords are converted to
code when they are passed to provide SmartNet Monitor only a brief glimpse of these codes and passwords, there is
no danger of having the passwords and codes revealed as a result of this transfer.
1.3.3 Network Security Considerations
z Receiving illegal data from an external I/F.
If data received is not of an approved protocol between Net File and SmartNet Monitor, only a message is
returned to the source of the illegal data to inform that illegal data was received, and no further operation is
executed
z Restrictions on accessing user code and password protected stored documents.
A stored document can be protected by a password. A stored document that is password-protected cannot be
accessed without entering the password. Similarly, the thumbnail for a password-protected document cannot be
referenced.
z User access to some functions on the machine can be limited with setup features.
SmartNet Monitor can also be used to set up limited user access to SmartNet Monitor functions, and the user
access limits set up on the machine always remain in effect in SmartNet Monitor, but the SmartNet Monitor user
must also be registered for use on the machine.
Possibility of mixing illegal data program data.
The Net File application operates by mutual data exchange between a PC connected to the network and
operating SmartNet Monitor. As this mutual data exchange between SmartNet Monitor allows only the exchange
of data that is the correct format required by the protocol, data in a form that does not meet the requirements of
the protocol cannot be received. There is no possibility of mixing illegal data during the acquisition of image data
and other data on the PC side.

Содержание

Скачать