39
Konica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta Version 8.0.7 August 19, 2015 Notice: This White Paper is for the customer. In the White Paper, there is information of specifications that are supported only for unreleased models. When explaining to users, please refer to the attached list of security specifications on each model.

Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

  • Upload
    vannhi

  • View
    240

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper

Security Basic Policies and Technologies

Provided by Konica Minolta

Version 8.0.7 August 19, 2015

Notice: This White Paper is for the customer.

In the White Paper, there is information of specifications that are supported only for unreleased models. When explaining to users, please refer to the attached list of security specifications on each model.

Page 2: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 1 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Version 1 August 2004 First release Version 1.1 September 2004 Added description of applicable models Version 2.0 February 2005 Added description of applicable models Version 2.1 February 2005 Corrected Version2.0 Version 2.2 March 2005 Corrected Version2.1 Version 3.0 October 2005 Revised functions and description of applicable models Version 4.0 May 2007 Revised functions and description of applicable models Version 5.0 October 2007 Revised functions and description of applicable models Version 5.1 August 2008 Addition of applicable models Version 5.2 January 2010 Addition of functions and applicable models Version 5.3 September 2010 Addition of functions and applicable models Version 5.4 May 2011 Added description of applicable models Version 5.5 February 2012 Addition of functions and applicable models Version 5.6 April 2012 Addition of functions and applicable models Version 5.6.1 May 2012 Addition of applicable models Version 6.0 November 2012 Addition of descriptions and applicable models Version 7.0 February 26, 2013 Addition of descriptions and application models Version 7.1 October 18, 2013 Addition of descriptions Version 8.0.1 Jun 10, 2014 Addition of descriptions and application models Version 8.0.3 July 14, 2014 Addition of descriptions for TPM Version 8.0.4 August 26, 2014 Addition of applicable models(C3110、C3100P、4700P、4000P、

3300P)

Version 8.0.6 April 17, 2015 Addition of descriptions for CSRA . Addition of applicable models(bizhub PRESS C71hc)

Version 8.0.7 August 19, 2015 Addition of applicable models (C368、C308、367、287、227) Konica Minolta products come with various security technologies. However, these technologies work effective only when customers use their products based on the Konica Minolta’s security policies. We appreciate your understanding that you use Konica Minolta products based on the contents described here. For each setting, please see User’s Manual of the products. Also, please understand that this document does not assure a complete security. Active Directory is the trademark of Microsoft Corporation. VxWorks is the registered trademark of Wind River Systems, Inc. Adobe Acrobat is the registered trademark of Adobe Systems Incorporated. Felica is the registered trademark of Sony Corporation. Linux is the registered trademark or trademark of Linus Torvalds in Japan and other countries. MFP is standing for Multifunction Product.

Page 3: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 2 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Table of Contents Chapter 1 Introduction

I. Security Basic Policies

1. Equipment of Latest Security Technologies 2. Certification from 3rd party company

Chapter 2 Device -Related Security Items and Technologies Used I. Security from public telephone line

1. Security with FAX line 2. Putting number twice 3. Putting regular number and abbreviation number for preventing miss-sending 4. Display for address confirmation 5. Selecting one address per sending 6. Confirmation of telephone number of fax system to send

II. Security with LAN connection

1. Security with Network protocol 2. User authentication 3. Security of device control from network 4. Encryption of data communication 5. Quarantine Network Support 6. Certificate verification by dual direction 7. Action against virus 8. Protection against virus from USB memory 9. Monitoring of the security of Linux kernel 10. Separation from USB I/F path

III. Security of data stored in MFP

1. Security on image processing and printing 2. User authentication 3. Box security 4. Complete data deletion when discarding HDD 5. Protection of data in HDD by password and encryption 6. Access management by audit log 7. Encryption of data in PDF file 8. Encryption of the data in e-mail 9. Digital signature on the e-mail 10. Scan to Me, Scan to Home & Scan to Authorized Folder 11. Overwrite to delete the temporary data (HDD data) 12. Adoption of the Encrypted modules which received authorization 13. Data protection by using TPM

IV. Security of output data

1. Copy Security Function V. Authentication devices

1. Security of the data for the biometric authentication device

Page 4: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 3 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

2. ID & Print (Secured printing by “One Touch”) VI. Extended functions in cooperation with PageACSES

1. Scan with authentication 2. Print with authentication 3. Access control per file (only Page ACSES Pro)

VII. PKI Card authentication system

1. The login that PKI Card is used 2. LDAP Search that PKI Card is used 3. SMB sender that PKI Card is used 4. E-mail sender(S/MIME)that PKI Card is used 5. PKI Card Print 6. Scan To Me / Scan To Home

VIII. Security about MFP self-protection

1. Verify Function for Firmware IX. Security about CS Remote Care

1. Security when public lines (modem, FAX) are used 2. E-mail security 3. Security on HTTP communication 4. Product authentication 5. Security at DCA

X. Security about bizhub Remote Panel

1. Communication, Connection trigger 2. Authentication 3. Access Code 4. Audit log

XI. Security about bizhub Remote Access

1. Communication, Connection trigger 2. Auto cut-off due to timeout 3. Security on administrator mode 4. Security when cut off during remote operation 5. Security when used in both user authentication and account authentication

XII. Security concerning CSRA (CS Remote Analysis) 1. Security on HTTP communication

Page 5: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 4 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Chapter 1 Introduction

In the current market where network infrastructure has been developed and IT is widely spread, huge amount of information is distributed. And at the center of business, information is gathered in diverse ways and translated into higher-level information assets. It is a significant task for every company to protect these information assets for risks management. This document introduces basic security functions provided with Konica Minolta bizhub, Sitios, and DiALTA series.

I. Security Basic Policies

1. Equipment of Latest Security Technologies Konica Minolta develops and provides all possible and latest security functions from every angle, in order to protect customers’ information assets from various threats that are categorized below. (1) Unauthorized access and/or information leak via network (2) Unauthorized use and/or information leak by direct operation on device (3) Alteration, copying and/or erasing of electronic and/or paper information (4) Information destruction by human disaster or device failure (5) Trace function with logs, etc.

2. Certification from 3rd party company

Konica Minolta has been certified according to ISO15408 on almost all the MFP products (A4/20 or higher PPM) released from March 2004, to objectively prove equipment of security functions. ISO15408 certification is obtained based on the initial Firmware. When ROM such as maintenance release is released, we don’t use the guarantee continuous system anymore, but we will support so that the security functions can be maintained.

And MES (RSA BSAFE Micro Edition Suite) Encrypted modules installed in the machine acquired the certification of FIPS140-2. Thereby, it certify that software is strong and safe and it is possible to sell to the organization which makes the certification of FIPS140-2 indispensable.

Page 6: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 5 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Chapter 2 Device-Related Security Items and Technologies Used

I. Security from public telephone line

1. Security from FAX line Communication with FAX line uses only FAX protocol and does not support other communication protocols. If somebody attempts to intrude from outside with a different protocol via public line or send data that cannot be decompressed as FAX data, Konica Minolta products handle that kind of event as error by software and blocks off the communication.

MFP

2. Response by G3 protocol

4. Check whether correct command response by G3 protocol is made or not

Public Telephone Line

G3 Protocol

1. Call to FAX Line

3 .Response by protocol

5. If G3 protocol is used, the communication is continued. But, if other than G3 protocol is used, the communication is blocked off.

Figure 1-1

2. Putting number twice

When putting the address of fax by use of telephone number, you have to put the number again. By confirmation of matching these two numbers, miss-send from wrong number can be prevented. Also when you register the speed dialing, you have to put the number twice. The correct number can be registered.

3. Putting regular number and abbreviation number for preventing miss-sending

For putting address to send fax, combination of speed dialing and direct ten/key can be used. Wrong number can prevented by registering speed dials for area codes.

4. Display for address confirmation When you enter the destination address (e.g. speed dialing, telephone number etc.), the address will be displayed on the operation panel. Then you confirm and send the fax. By this procedure, you can prevent from sending to wrong address.

Page 7: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 6 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

5. Selecting one address per sending By allowing to set only one address, when sending fax it can be prevented to send to unintentional destination.

6. Confirmation of telephone number of fax system to send When the fax transmission starts, the telephone number of the device to send fax will be confirmed by use of the fax protocol signal (CSI) received from the device. When the numbers are matched, fax will be sent. By this way fax can be sent more safely.

II. Security with LAN connection

1. Security with network protocol Operation can be enabled/disabled for each port. Invasion from outside can be prevented by disabling unnecessary ports.

Figure 2-1

Filtering function of IP address enables selection of access to devices on the network by setting the addresses.

Figure 2-2

Filter for prohibition

OK Permitted addresses 121.121.121.1 to 121.121.121.255 121.121.125.1

121.121.121.127 to 121.121.121.255 121.121.125.8 to 121.121.125.56

MFP

Sample of setting addresses

Prohibited addresses

Filter for permission

to 121.121.125.127

Port No. : 25

Port No. : 80

SMTP Server

Web Server

Page 8: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 7 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

2. User authentication This is available for network related functions using the network authentication function provided by Active Directory service. And not only for network function but also for device function, authentication by Active Directory is available. Authority to use is given by combination of pre-registered user ID and password. Internal data is protected since only the pre-registered users can use the devices.

1. Input user ID and password for authority

MFP

(Server for authentication)

2. Send user ID and password for authority

3. OK/NG 4. When the authority is given, user can use the function of device within the preset limit of use.

Active Directory

( preset) limit of use

Copy :Yes Print :Yes Scan :No Fax :No

Color :No 0

B/W :Yes 500

Upper limitation

Permitted functions

Figure 2-3

3. Security of device control from network

(1) Security on address book data import from network Input of device administrator’s password is required to import address book data collectively from network. If wrong password is input, data cannot be registered. Since the data registration is password-protected, there is no chance to alter the existing address book data at a time.

MFP

4. Send address book

- PS Data Administrator or PS Adress Book Utirity - PS Web Connection

1. Send administrator’s password

2. After checking the password, the result (whether registration has been made or not) is sent.

5. Modify address book 6. Export the modified address book

Abbreviated Address

Group Address

Programmed Address

PC

3. Require to send address

Figure 2-4

Page 9: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 8 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

(2) bizhub OpenAPI bizhub OpenAPI acquires and sets the data of devices via network by SSL encryption protocol. And by using its original password, communication will be made more safely. When managing the important data of the device (e.g. setting information of user authentication) by PageScope Data Administrator, the data is safely protected by bizhub OpenAPI.

Figure 2-5

4. Encryption of data communication

SSL encryption protocol is used for data communications between LDAP server, PageScope Data Administrator or Address Book Utility, and PageScope Web Connection, and the main body. Data is protected as it is encrypted during communications between networks. IPsec that can be encrypted data without communication protocol is adopted for carrying out the communication encrypt corresponding to IPv6.

5. Quarantine Network Support The IEEE802.1x feature allows you to authenticate the device against the RADIUS (Remote Access Dial in User System) server in order to connect to the quarantine network. The connection is carried by the switching hub corresponded. These networks will only allow devices into the network if the RADIUS server approves the authentication

PC 1. Send password of bizhub

OpenAPI MFP

2. After checking the

4. Process the command and send the data.

password, the result (whether registration has been made or not) is sent to PC.

3. Issue commands

authentication

Network setting Address book utility Information of user

Communication by SSL SSL; Secure Socket Layer

Page 10: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 9 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Figure 2-6

6. Certificate verification by dual direction Conventional type of MFP have the certificate in there device, and they transmit it to the devices of destination. The validity of MFP can be certificate in this way. Our MFP products verify the validity of the device of the destination by themselves. And transmission is controlled by confirming the validity by dual direction, we can prevent “Spoofing” adequately this way.

Figure 2-7 7. Action against virus

Differently from usual PCs, controllers that are built-in Konica Minolta products use VxWorks for OS. Therefore, it is considered to be rare that controllers are affected by viruses via LAN.

Network Device (Supplicant)

Managed Port

Unmanaged Port

IEEE802.1X Switching Hub (Authenticator)

RADIUS Server (Authentication Server)

Regular Traffic Authentication Traffic

Other Network Devices

Embed the CA

certificate in MFP

Confirm the Ms. A’s certificate with the CA’s

certificate.

(Ms. A’s private key)

(Ms. C’s private key)

(Pretends to be A)

Mr. C’s public key

Trust Trust

Certificate from CA

Ms. A

Ms. A’s information

and public key

Signature of CA Ms. A’s certificate

Issue a certificate. Certificate

authority (CA)

Mr. C

Page 11: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 10 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Server typed Fiery controllers made by EFI use Windows for OS. However, the vulnerability of Windows is covered by providing necessary Windows security patch on a timely basis.

8. Protection against virus from USB memory

Virus infection from USB memory is caused by program files automatically executing when the USB memory is inserted in the device. Konica Minolta devices do not support functionality to automatically execute files by inserting the USB memory. Therefore, Konica Minolta devices are not affected by these types of viruses. Konica Minolta devices support capability to print image data stored in USB memory, as well as store scanned data and User Box data in the USB memory. However, these tasks are done through user operation and not through automatic execution.

9. Monitoring of the security of Linux kernel

Concerning Linux kernel, R&I division of Konicaminolta is constantly monitoring the information of the security vulnerability and security patch. And it is confirmed whether the public information of vulnerability will effect the function of MFP or not.

10. Separation from USB I/F path

The path of USB I/F and the path of network are separated system structurally. If MFP is connected to USB of the PC connected to the Internet, MFP cannot be accessed from the Internet environment through the PC.

III. Security of data stored in MFP

1. Security on image processing and printing Data read with the scanner is image-processed, compressed, and then written onto main body memory (volatile DRAM). Further, print data is decompressed, sent to printer and then output on paper. Data is overwritten by page on memory. Therefore, re-output of data is not possible. Since job data (compressed data) is deleted from the memory at the same time when it is output or transferred, re-output or retransfer of the data by 3rd person is prevented.

Page 12: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 11 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Compression of scanned images (Konica Minolta unique format) Decompression Printing

Overwrite on the former data

Delete after the job

Figure 3-1

Job data is stored on DRAM or HDD in Konica Minolta unique compression format. Therefore, even if somebody reads out the internal data, it is extremely difficult to analyze it. And even if HDD is taken out, security of data in HDD is protected because the data in HDD is encrypted when stored. (There are some models which support options.) If a lock password is used, even if HDD is taken out, the security of HDD is protected. Further, when using Secure Print function, print job is once stored on the main body memory and print operation takes place after the assigned password is input from the main body operation panel. This function prevents the output from being taken by other people.

Command for secure printing

Waiting print cue at MFP

Input password on the operation panel

Printing PC

Figure 3-2 2. User authentication

The engine supports the user authentication feature. Users can authenticate against the MFP, external authentication server such as Active Directory, or PageScope Authentication Manager. Authentication can be done by entering the User ID and PW, or by using IC Cards/Biometrics.

Page 13: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 12 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Users can limit functions such as copy/print/scan/fax as well as limit the usage of color by user. Also, access to destinations (such as fax or e-mail destinations) can be limited according to authorization levels. (1) Authentication can be done by using external authentication server, however, even if the customer does not have an external authentication server in their network, users can still authenticate by using the authentication feature embedded within the device. (2) Usage of copy/print can be managed per user by presetting upper limit on the device. (3) It is possible to set authentication and upper limitation per user by color and B/W.

3. Box security

In addition to the user authentication, access to the data inside of the box can be protected by password.

Figure 3-3

4. Complete data deletion when discarding HDD

There is a function to erase the internal data of HDD by overwriting with a certain pattern of numbers and/or random numbers. Using this function, customers can prevent confidential data from leaking after MFP main body is disposed.

5. Protection of data in HDD by password and encryption HDD can be locked by password. When HDD is locked, even if HDD is taken out of the MFP main body and set with PC, without password, access to the data becomes not possible. And, the data in HDD can be encrypted with AES. Even if the data is taken out, the data cannot be decrypted without the key of encryption.

6. Access management by audit log All history of MFP operations for security can be stored into audit log data.

Fax

Scan

Box

Password

Taking out the data

Page 14: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 13 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

With this log data, it is possible to trace unauthorized accesses.

User Authentication Department Authentication Administrator Authentication BOX Registration/ modification/deletion Network setting Access to secret documents :

MFP

Log data is registered by kind of operations and settings

Print sample of Audit Log

Date-Time Action OperatorID ObjectID Result 2005/10/20-10:23:30 User Authentication suzuki - NG 2005/10/20-10:23:53 User Authentication suzuki - OK 2005/10/20-10:27:20 Change Pass Word suziki - OK 2005/10/20-10:30:01 Box registration suzuki BOX OK 2005/10/20-10:33:59 Admin.Authentication Admin. BOX OK 2005/10/20-10:40:03 eletion of Box Admin. BOX OK

Print

Audit Log

Figure 3-4

7. Encryption of data in PDF file When storing scanned data as a PDF file, the data can be encrypted by using the common key. In order to open the PDF file with Adobe Acrobat, it is necessary to input the common key.

Figure 3-5

8. Encryption of the data in e-mail

When an e-mail is sent from MFP, the data in the mail can be encrypted by the recipient’s certificate (public key, which can be registered in the address book in MFP), and the recipient can decrypt the data in the mail by his private key. By this procedure, the data in the mail cannot be interrupted by others and secured correspondence will be available. The certificate registered in the LDAP server can be used for the public key on the network.

Scan to Box

PDF Encrypted PDF file with password

Password

Page 15: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 14 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Figure 3-6

9. Digital signature on the e-mail

When an e-mail is sent from MFP, digital signature can be made by use of the private key of MFP, and the recipient can verify the signature by the public key and check whether the data on the mail has been modified illegally or not.

Figure 3-7

10. Scan to Me, Scan to Home & Scan to Authorized Folder

This function allows you to scan data easily back to yourself. When user authentication feature is turned ON, the “Me” button will appear in the Address Book. Also, by enabling in Administrator Mode, the “Home” button can be displayed in the Address Book. By selecting the “Me” button as the scan destination, users can send the scanned data to their own e-mail address. By selecting the “Home” button as the scan destination, users can send the scanned data to their pre-registered PC folder. When registering the SMB destination, by leaving the User ID and PW blank, the login User ID and PW can be carried over to be used as the User ID and PW to access the registered SMB destination. This will prevent the SMB destination to be used by unauthorized users.

Sender Receiver

KMBT Confidential

KMBT Confidential

Encrypted e-mail

Encrypted e-mail

Receiver’s certificate Public

key

Encryption Decryption

Receiver’s Private key

Send

Sender Receiver

KMBT Confidential

KMBT Confidential

Signed e-mail

Signed e-mail

Sender’s certificate Public

key

Signature Signature verification

Sender’s Private key

Send

Page 16: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 15 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Also, the administrator can limit/prohibit users from registering destinations in the Address Book, or manually entering the destination, allowing the administrator to be able to manage destinations that can be sent from the device.

Figure 3-8

11. Overwrite to delete the temporary data (HDD data). When the setting of Overwrite to delete the temporary data (HDD data) is "On", MFP overwrite to delete the data saved temporarily at the hard disk at the time of the end of use of image data, for example, completion of jobs such as a print and a scan, deletion operation of a box document. The risk of the unnecessary image data on a hard disk being reused is reduced.

12. Adoption of the Encrypted modules which received authorization Encryption and the authentication function have been attained by installing Encrypted modules, such as OpenSSL / MES(RSA BSAFE Micro Edition Suite), in MFP. The main functions to use the MES Encrypted modules which received authorization of FIPS140-2 are the following item. 1. Encrypted communication at the time of sending scanning data

At the time of SSL communication of can to WebDAV, TWAIN etc At the time of S/MIME transmission of Scan to E-Mail

2. At the time of SSL communication of PSWC 3. PDF encryption file generating function

13. Data protection by using TPM (1) Purpose

When the MFP is physically analyzed or the network packet is eavesdropped, the password and other information may be in danger of being leaked into a

Page 17: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 16 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

vicious user. It is possibly that the MFP is accessed illegally resulting in a leakage of the important internal data.

Since a root key created inside the TPM cannot be taken out of the TPM, a TPM chip is required for decrypting the data encrypted with the root key. Therefore, by using the TPM, the password and other information are protected from leakage.

[Data to be protected] 1. Certificate to be registered by an administrator 2. An administrator password and a password to be set by an administrator 3. A password to be set when the MFP provides services as a server (2) Structure of the protection by using TPM Normally, to prevent the password and other information in an MFP from

leakage, a 256-bit AES key and a 2048-bit RSA key were used. To efficiently use a TPM for protecting data, use the root key of the TPM to encrypt the RSA key as shown below.

Figure 3-9

Since the root key cannot be taken out of the TPM, a TPM chip is required for decrypting the RSA key. If the RSA key is failed to be decrypted, also the AES key cannot be decrypted, that makes decryption of the password and other encrypted data disabled. Therefore, even when a vicious user tends to analyze or eavesdrop on the password and other information, no leakage of the password and other information will occur, since they are protected by the TPM and disabled to be decrypted despite of using a TPM chip.

(3) Backup of the TPM key

Page 18: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 17 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

The RSA key shall be backed up to a USB memory or other storage devices beforehand to relieve the encrypted data at occurrence of defect on a TPM chip.

(Concerning security, the RSA key shall be stored safely by encryption and etc.)

IV. Security of output data

1. Copy Security Function (1) Copy Protect Function This function is putting the woven pattern on the copied or printed image as the original document. When the original document is copied, the woven pattern of message (e.g. “Copy”) comes up and by that message the copied document can be clearly distinguished from the original one. Besides the message, serial No. of MFP and copied date and time can be set for the pattern. Combination of the information on the woven pattern and audit log helps to trace the person who copied illegally.

Figure 4-1

(2) Copy Guard Function/Password Copy Function This function allows you to embed a Copy Guard security pattern on the output so that when a user tries to make a secondary copy of the output, the device will display a message that says “Copying Prohibited” and will prohibit copying. Also, the Password Copy Function allows you to set a password so that by entering the correct password, the Copy Guard security pattern embedded document can be copied.

Security White Paper indicates the security functions of bizhub, Konica Minolta, Sitios, and DiALTA series.

I. Security Basic Policies II. List of products having

ISO15408 (EAL3 level)

Copy

Original document with the woven pattern

Copied document with message of the woven pattern

I. Security Basic Policies II. List of products having

ISO15408 (EAL3 level)

Security White Paper indicates the security functions of bizhub, Konica Minolta, Sitios, and DiALTA series.

Page 19: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 18 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Figure 4-2

V. Authentication Devices

1. Security of the data for the biometric authentication device The data for the biometric authentication device, AU-101 is handled in a very secure manner, and cannot be used illegally. The Vein on the finger as the biometric data The vein is located in the body and it cannot be scanned/read without notice unlike fingerprint. So, it is very difficult to forge. The way of process hired by this system This system implements the security guide line based upon “U.S. Government Biometric Verification Mode Protection Profile for Medium Robustness Environ- ments (BVMPP-MR) Version 1.0”* Some of the important security/privacy specifications supported by this system are as follows:

<Reconstruction of the biometric data> The data registered into the HDD is the random numbers calculated based on the feature of the scanned data. And it is theoretically impossible to reconstruct the original vein data from the data in the HDD. <Structure of the data in the HDD> The structure of the data in the HDD is not made public. So, it is impossible to forge and pretend somebody. <Erase of the data in the authentication device>

Original

Output with security pattern

Copying prohibited

Protection can be cancelled byentering a password

Copy

Print

Copy guardpattern detected

Password patterndetected

Page 20: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 19 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

The data left in the device is encrypted when storing in the RAM temporarily, and is erased after transferring to MFP.

Figure 5-1

U.S. Government Biometric Verification Mode Protection Profile for Medium Robustness Environments (BVMPP-MR) Version 1.0 : Please refer to http://www.commoncriteriaportal.org/public/files/ppfiles/PP_VID10140-PP.pdf

2. ID & Print (Secured printing by “One Touch”)

By equipped with the biometric authentication device –AU-101-, or with the IC card authentication device –AU-201-, not only easy authentication but also simple and high secured print job (ID & Print) will be available. “ID & Print” will prevent the print from being taken away and also from being intermingled with other prints.

Figure 5-2

(1)Send the print cue. The password stored In the driver will be sent at the same time.

(2) Just by closing the card or scanning the finger to the device in seconds, the job will be printed out.

Page 21: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 20 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

VI. Extended functions in cooperation with PageACSES

By cooperation with PageACSES, the security function of MFP will be extended and the usability will be improved. <Overview>

Authentication functions by file (only PageACSES Pro version) Authorization settings for browse, correction, and printing can be configured per file for respective users. External leakage and falsification of important documents scanned by MFP is prevented by this authentication function and the encryption of image file. User authentication using IC cards User authentication using a noncontact IC card (FeliCa) allows logging in MFP without entering the password.

1. Scan with authentication

It prevents direct external sending of scan data as it is. The data that was encrypted by IC card information and was sent to the client PC is taken out using the IC card. At the same time, you can log operation records about copy, print, and scan.

Figure 6-1

1. Prevention of improper scan by a member without scan authorization 2. Inhibition of improper scan by a member by means of log monitoring 3. Prevention of flow of information by network hacking 4. Prevention of improper acquisition of scan data

Page 22: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 21 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

2. Print with authentication Printed data is encrypted when printing, and you can take out the print job you sent using your IC card.

Figure 6-2

3. Access control per file (only Page ACSES Pro)

Right of access per PDF file can be set with PageACSES Pro. Even if the file is carried out illegally, the data is encrypted and cannot be read.

Figure 6-3

Security of an e-mail with PageACSES Pro

Customer information Tokyo. Pdf Customer information Osaka. Pdf Customer information Nagoya. Pdf Customer information Hiroshima. Pdf

PageACSES Pro

IC card

Only the administrator can browse the encryption key

information and journal.

Mr. A Only browse is allowed.

Ms. B Browse, print, and save are allowed.

Write on a CD and take it out.

Left on a train.

Grant the right for browse, print, and

manipulation of file to each file.

A record on when and how it took action for which file is kept.

If you are outside of the corporate network, the document is not encrypted and you can’t read it.

Public data

An IC card is required for

printing, so only the person who printed can get

the printed material.

External

Internal

IC card IC card Mr. C

Browse, print, and save are allowed.

1. Prevention of improper print by a member without print authorization 2. Prevention of improper print by a member by means of log monitoring 3. Prevention of flow of information by network hacking 4. Prevention of taking away output results

Page 23: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 22 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

VII. PKI Card authentication system

<Summary> PKI Card has the function of Coding/ Decoding, E-signature. You can build the MFP environment of the high security level by using MFP function and PKI card. 1. The login that PKI Card is used

When you insert a PKI card in a card reader and input PIN, MFP carries out the certification to Active Directory. Then, the digital certificate which has been sent to MFP from Active Directory can be inspected in MFP.

Figure 7-1

2. LDAP Search that PKI Card is used When you search address with an LDAP server, you log in to an LDAP server with the Kerberos certification ticket which you acquired by the Active Directory certification. Because you can access it by one certification, you can build the Single Sign-On environment where the convenience is high.

Active Directory

MFP

OCSP Server

(1) insert Card

(2) Certification (4) OK or NG

(5) inspect Server certificate

(3) inspect the certificate of the PKI card

In the Department of Defense, the US federal government, the digital certificate revocation confirmation carry out with an OCSP server.

Page 24: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 23 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Figure 7-2

3. SMB sender that PKI Card is used When SMB transmits the data which you scanned, you log in to the computer of the address with the Kerberos certification ticket which you acquired by the Active Directory certification. Because you can access it by one certification, you can build the Single Sign-On environment where the convenience is high. And, you can perform the SMB transmission of a message safely so that the use that does not cancel a password on a network by using a certification ticket is enabled.

Figure 7-3

MFP

Active Directory (2) A carry out the certification to Active

Directory.

(1) insert Card

(3) acquire a Kerberos certification ticket

(4) log in with a Kerberos

certification ticket

LDAP Server

MFP

Active Directory (2) carry out the certification to

Active Directory.

(3) acquire a Kerberos certification ticket

(4) log in with a Kerberos

certification ticket (1) insert Card

Client PC

Page 25: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 24 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

4. E-mail sender(S/MIME)that PKI Card is used You use a PKI card at the time of the E-mail transmission of a message and can carry out a digital signature. You can prove an origin of transmission of a message of E-mail by carrying out a digital signature. And, If the certificate of the address is registered, you put coding of E-mail together and can transmit a message. You can prevent an information leak to the person on the transmission course of the third by you code E-mail, and transmitting a message.

Figure 7-4 5. PKI Card Print

You code print data with a PKI card from printer driver and transmit a message in MFP. The print data are accumulated in the PKI coding box of MFP and because the same user carries out the PKI card certification in MFP, You decode it and can print it. The print data can maintain the secrecy of data so that a print is enabled only after the certification with the PKI card succeeds in MFP.

Figure 7-5

A coding + digital signature

Wiretapping- Manipulation- pretend to be

MFP

Active Directory (2) carry out the certification to

Active Directory.

(1) you code print data with a PKI card from printer driver, and it is transmitted to MFP (3) Print

Client PC

Page 26: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 25 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

6. Scan To Me / Scan To Home It is a function to transmit the data which you scanned to one's E-mail address and computer. Because you acquire it at the time of the Active Directory certification, one's E-mail address and the pass of the Home folder can easily transmit a message.

Figure 7-6

Figure 7-7

MFP

Active Directory

(3) acquire One's E-mail Address

Client PC

(1) insert Card

(2) carry out the certification to

Active Directory.

(4) transmit E-mail to one's E-mail address.

Using a PKI card, you can carry out coding and a

digital signature.

Scan To Me

MFP

Active Directory

(3) acquire One's Home Folder pass

Client PC

(1) insert Card

(2) carry out the certification to

Active Directory.

(4) log in to one's computer (use Kerberos ticket) and save scan

data in a Home folder.

Scan To Home

Page 27: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 26 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

VIII. Security about MFP self-protection

1. Verify Function for Firmware When MFP Firmware rewriting is performed, hash value is confirmed whether Firmware data is altered. When hash value is not in agreement, Warning is taken out and Firmware rewriting is not performed. And, when the setting of Enhanced Security Mode is enabled, hash value is confirmed also at the time of the main power supply ON. When hash value is not in agreement, Starting of MFP is forbidden.

IX. Security about CS Remote Care

1. Security when public lines (modem, FAX) are used. In the remote diagnosis system using a public line, the communication between the main body and the CS Remote Care (hereinafter called CSRC) host is established to send the main body data and change the setting of the main body. To communicate in the remote diagnosis system, establish a connection communication using the ID that was registered in both the CSRC host and the device in advance. This communication confirms whether the registered content of the CSRC host corresponds with the sent content of the device, and after the communication finishes normally, it’s ready for the remote diagnosis communication. The remote diagnosis communication confirms the ID per communication. If the ID doesn’t coincide, the communication is not established. The data CSRC collects is service information including counter values and does not include the details of FAX addresses and personal information.

Figure 9-1

(2) After confirming the ID, the registration completes.

(3) Call for data

CSRC host

(1) Call for registration communication

Device

Public line

(5) Status notification (6) After confirming the ID, communication starts.

(4) After confirming the ID, communication starts.

Device ID Device ID

Page 28: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 27 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

2. E-mail security - Encryption of transmitted data Data is encrypted using an encryption key (common key) in the main body and the CSRC host. * The main body and the center can set the possibility of encryption. In a common key encryption system, a same key is used for encryption and decryption in the main body and the center. This allows safety sending/receiving of e-mails without interception by others. - Confirmation of IDs, etc. Sent/received e-mails contain information (CenterID or serial No.) that the source and the destination can confirm. The consistency of this information is checked to confirm if the source and the destination are correct. Also, e-mails sent from the center have e-mail IDs. Response e-mails from MFP utilize e-mail IDs of response source e-mails. Check if it corresponds with the e-mail ID sent by the center to confirm the ID.

- Elimination of false e-mails If the information (CenterID or serial No.) that the source and the destination can confirm or the e-mail ID doesn’t coincide, the sent/received e-mail is considered as a false e-mail and eliminated without data registration.

3. Security on HTTP communication

- Encryption of transmitted data Like original e-mails, data is encrypted using an encryption key (common key) in the main body and the CSRC host. * The main body and CSRC host can set the possibility of encryption. By means of a common key encryption system, a same key is used for encryption and decryption in the device and the CSRC host. In addition, in HTTP communication, SSL can be set. (HTTPS) Via SSL, encryption is performed in the communication data between “device and WebDAV server” and “WebDAV server and CSRC host”.

- Many secure functions the HTTP protocol has can be diverted. The HTTP protocol doesn’t rely on the environment, and can use a lot of secure functions such as authentication, Proxy and SSL. In SSL, the combination of security technologies such as public-key cryptography, private-key cryptography, digital certificate, and hash function can prevent wiretapping or manipulation of data and spoofing.

Page 29: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 28 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

At the center as well, security measures suited for the customer’s environment can be taken using these secure functions.

4. Product authentication - End-to-End data security In HTTP communication, reading and writing are carried out for the WebDAV server on the Internet. Therefore, there is a little security vulnerability such as information leakage. In product authentication, in order to make more robust the security, client authentication of SSL is conducted to secure the validity of the communication between the device and the WebDAV server, and the WebDAV server and the CSRC host. In product authentication, the license administrative server issues a unique license code to the user first. Registration of the issued code in the certificate-issuing server allows the issue of a client certificate and a server certificate to the certificate-issuing server. When the client certificate is used in MFP and the center, and the server certificate is sent to the e-mail address of the user to be set to WebDAV, the data security of the communication between the device and the WebDAV server, and the WebDAV server and the CSRC host is enhanced.

HTTP + SSL HTTP + SSL

FireWall FireWall WebDAV

Server

CSRC host Device

Figure 9-2

Page 30: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 29 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

5. Security at DCA - SNMPv3 communication between DCA and device DCA (Device Collection Agent) supports SNMPv1 and SNMPv3 communications as a communication method with a device. In SNMPv1 communication, plain text flows on the network route, therefore if the environment has a risk of packets being captured from the outside, the data during transmission may be sniffed. Because the “community name” which is the only authentication in SNMPv1 communication is also leaked at the same time, all of the data stored in MIB of the device managed by the leaked “community name” can be accessed fraudulently. In SNMPv3 communication, in addition to “user name” corresponding to “community name” of SNMPv1 communication, a mechanism for authentication has been added to enhance the robustness of access to a device. Also, all of the data flowing the communication pathway are encrypted; therefore, it is difficult to sniff the data except when the same encryption system/encryption key is known.

WebDAV server

CA server

Client functions - Root certificate - Client certificate

Server functions - Root certificate - Server certificate

Certificate SSL 2way Auth

communication

Figure 9-3

CSRC host Device

Certificate

SSL 2way Auth communication

Certificate Client functions - Root certificate - Client certificate

Page 31: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 30 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

- Communication between DCA and CSRC host The communication between DCA and the CSRC host is encrypted using SSL on the HTTP protocol. Also, a unique ID is assigned to DCA; data transfer is made after checking the ID per communication. If this ID doesn’t coincide during communication, any data will not be transferred.

X. Security about bizhub Remote Panel 1. Communication, Connection trigger

bizhub Remote Panel cannot perform HTTP communication without cipher. Every communication is enciphered with SSL and performed on HTTPS. In addition, connection from the bizhub Remote Panel Server side to devices is disabled. Since connection is enabled only from devices, the customer's security is ensured.

2. Authentication Further highly secure communication is available by setting the certificate issued by the trusted third party CA (Certificate Authority) to devices and bizhub Remote Panel Server

3. Access Code Multiple devices and multiple users (clients) can use bizhub Remote Panel Server. A user selects a device to connect from the list of multiple devices and input a 4-digit Access Code to connect. The authenticated 4-digit Access Codes displayed on the

Device

CSRC host

DCA

SNMPv3 communication

HTTP + SSL

Figure 9-4

Page 32: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 31 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

device panel are informed to the client who is authorized by the customer (service person and operator) in advance.

4. Audit log When a device is connected to bizhub Remote Panel Server, the log that a client (user) operates the device remotely and logs out is recorded. The administrator can monitor the access to the bizhub Remote Panel user by tracing the log.

Figure 10-1

Device

Customer

Customer's environment Call center

Client (Web browser)

Service person

HTTPS

HTTPS

HTTPS

Client (Web browser) Operator

bizhub Remote Panel Server

Firewall Firewall

Page 33: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 32 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

XI. Security about bizhub Remote Access <Outline> Installing bizhub Remote Access on a smart phone or tablet terminal using GooglePlay or AppStore enables the panel screen of an MFP connected via network to be remotely displayed on the screen of the smart phone or tablet terminal. By touching the screen displayed on the MFP panel, the MFP can be controlled remotely. 1. Communication, Connection trigger

The MFP rejects remote connection from bizhub Remote Access unless the bizhub Remote Access function is enabled. Thus it is possible to prevent the prohibited MFP from being accessed remotely.

Figure 11-1 2. Auto cut-off due to timeout

When the remote connection from bizhub Remote Access has been left for a long time, the MFP automatically cuts off the connection with bizhub Remote Access. This function ensures security even for users who left the terminal during remote operation.

3. Security on administrator mode On administration mode, the MFP rejects a remote connection from bizhub Remote Access, so that security can be ensured on administrator mode.

4. Security when cut off during remote operation

bizhub Remote Access function enabled

bizhub Remote Access function disabled

bizhub Remote Access function enabled

Connectable

Connectable

Not connectable

Page 34: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 33 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

When connection with bizhub Remote Access is cut off during remote operation, the MFP resets the screen, so that security can be ensured even when accessing a user box with password, or entering the password.

Figure 11-2 5. Security when used in both user authentication and account authentication

When the MFP is under user authentication or account authentication, connection from bizihub Remote Access will be rejected. Furthermore, when connection between the MFP and bizhub Remote Access is cut off during authentication, the MFP will log out automatically. Above functions ensure security for authentication user or account.

Terminal (during remote operation on the user box

screen)

MFP (reset) MFP (during remote operation)

Terminal (connection screen)

Connecting Cut off

Page 35: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 34 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

Figurer 11-3

Terminal (Connection screen)

MFP (logging in)

MFP (log out)

Connectable

Not connectable

Page 36: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper PAGE 35 Copyright © 2004 Konica Minolta Inc. All Rights Reserved.

XII. Security concerning CSRA (CS Remote Analysis) <Outline> CSRA (CS Remote Analysis) is a system that periodically collects various data, such as sensor data from MFPs, and analyzes and foresees malfunctions, as well as predicts the life of parts based on the collected data. A remote analysis of the problem enables a field service rep to plan the countermeasure in advance of visiting the site to perform a maintenance operation without any disruption. The CSRA-collected data consists of mechanical control information, such as sensor data values, and does not include any personal information and/or individual data. A field service rep’s service is required in order to activate the CSRA functions. 1. Security on HTTP communication A CSRC communication must be established in advance in order to open a communication with CSRA. The MFP verifies the CSRC server’s authenticity before transmission. Simplex communication CSRA only supports the simplex communication periodically transmitted from MFP to its specified server. It does not have any function for accepting access requests from external servers. Encrypting transmitted data SSL is available in HTTP communication (HTTPS). CSRA encrypts all data bidirectionally transmitted between the output device and the WebDAV server, and the WebDAV server and the CSRC host system. Various security functions of HTTP protocol are appropriable Not dependent on its environment, the HTTP protocol can utilize a variety of security functions including authentication, proxy, and SSL, etc SSL prevents data from being bugged, falsified, and/or spoofed, by combining multiple security technologies, namely public keys, private keys, digital certificates, and hash functions. These security functions allow the remote control center to provide customers with security measures appropriate to each office environment.

Fig. 12-1

HTTP + SSL

Firewall WebDAV server

HTTP + SSL

Firewall

CSRA host system Output device

Page 37: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper Version 8.0.7 Attachment Sheet

Function List for each model

<Color MFP>

CF2002/3102 C350 C450 C450P C351 C250/252/352 C250P/252P/352P C300 8050/C500 C550/451/650 C353/253/203 C200 C652/552/452 C360/280/220 C652DS/552DS C35 C754/654 C364/284/224 C554/454 C353CSC554e/454e/364e

/284e/224eC754e/654e C3850/C3350 C3110 C3100P C368/C308

I. Security from public telephone line

1. Security with FAX line     Yes - Yes Yes - Yes   Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

2. Putting number twice - - - - - - - Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

3. Putting regular number and abbreviation number for preventing miss-sending Yes - Yes Yes - Yes - Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

4. Display for address confirmation Yes - Yes Yes - Yes - Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

5. Selecting one address per sending Yes - Yes Yes - Yes - Yes Yes Yes*6 Yes Yes Yes Yes Yes Yes Yes Yes Yes*1 Yes Yes

6. Confirmation of telephone number of fax system to send Yes - Yes Yes - Yes - Yes Yes Yes*6 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

II. Security with LAN connection

1. Security with Network protocol *1 *1 *1 *1 *1 *1 *1 *1 *1 *1 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

2. User authentication Yes Yes Yes Yes Yes Yes Yes - Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*19 Yes

3. Security of device control from network

 (1) Security on address book data from network Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes *14 Yes Yes Yes Yes N/A Yes

 (2) bizhub OpenAPI Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Partially*20 Yes

4. Encryption of data communication Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*7 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*19 Yes*19 Yes

5. Quarantine Network Support Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*19 Yes*19 Yes

6. Certificate verification by dual direction Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*19 Yes*19 Yes

7. Action against virus Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

8. Protection against virus from USB memory Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

9. Monitoring of the security of Linux kernel Yes Yes Yes Yes Yes Yes Yes Yes

10. Separation from USB I/F path Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

 

III. Security of data stored in MFP

1. Security on image processing and printing Yes*2 Yes*2 Yes*3 Yes*3 Yes*3 Yes*3 Yes*3 Yes*3 Yes*3 Yes*3 Yes*8 Yes Yes Yes Yes Yes Yes Yes Yes*3 Yes Yes Yes Yes Yes Yes

2. User authentication

 (1) Authentication function by external server and device Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*18*19 Yes*18*19 Yes

 (2) Management of upper limitation of copy/print per user Yes Yes Yes Yes Yes Yes Yes Yes*9 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*19 Yes*19 Yes

 (3) Management of authentication and upper limitation by color and B/W Yes Yes Yes Yes Yes Yes Yes Yes*9 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*19 Yes*19 Yes

3. Box security Yes Yes Yes - Yes Yes - Yes Yes Yes - Yes Yes Yes Yes Yes Yes Yes*15 Yes Yes Yes Yes

4. Complete data deletion when discarding HDD Yes Yes Yes Yes Yes Yes Yes Yes Yes - Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

5. Protection of data in HDD by password and encryption Yes*3,4 Yes*3,4 Yes*3,4 Yes*3,4 Yes*3,4 Yes*3,4 Yes*3 Yes*3 - Yes Yes Yes Yes*12 Yes Yes Yes Yes*3 Yes Yes Yes*12 Yes*12 Yes*12 Yes

6. Access management by audit log Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

7. Encryption of data in PDF file Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

8. Encryption of the data in e-mail Yes Yes Yes Yes Yes Yes Yes Yes Yes *16 Yes Yes Yes Yes

9. Digital signature on the e-mail Yes Yes Yes Yes Yes Yes Yes Yes Yes *16 Yes Yes Yes Yes

10. Scan to Me, Scan to Home & Scan to Authorized Folder Yes Yes Yes Yes Yes Yes Yes Yes Yes*2 Yes

11. Overwrite to delete the temporary data (HDD data). Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*2 Yes

12. Adoption of the Encrypted modules which received authorization Yes Yes Yes Yes Yes Yes*2 Yes

13.TPMによるデータ保護 Yes*17 Yes*21 Yes

IV. Security of output data

1. Copy Security Function

(1) Copy Protect Function Yes - Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

(2) Copy Guard Function/Password Copy Function Yes*10 Yes Yes Yes Yes Yes Yes Yes Yes

2. Authentication & print (One operation security) Yes*5 Yes*5 Yes Yes Yes Yes Yes Yes Yes Yes Yes

V. Authentication Devices

1. Security of the data for the biometric authentication device Yes*5-1 Yes*5-1 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

2. ID & Print (Secured printing by "One Touch") Yes*5-2 Yes*5-2 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes*19 Yes*19 Yes

VI. Extended functions in cooperation with PageACSES

1. Scan with authentication

2. Print with authentication

3. Access control per file (only Page ACSES Pro)

VII. PKI Card authentication System

1. The login that PKI Card is used Yes(*11) Yes(*11) Yes(*11) Yes Yes Yes Yes Yes Yes*1 Yes

2. LDAP Search that PKI Card is used Yes(*11) Yes(*11) Yes(*11) Yes Yes Yes Yes Yes Yes*1 Yes

3. SMB sender that PKI Card is used Yes(*11) Yes(*11) Yes(*11) Yes Yes Yes Yes Yes Yes*1 Yes

4. E-mail sender(S/MIME)that PKI Card is used Yes(*11) Yes(*11) Yes(*11) Yes Yes Yes Yes Yes Yes*1 Yes

5. PKI Card Print Yes(*11) Yes(*11) Yes(*11) Yes Yes Yes Yes Yes Yes*1 Yes

6. Scan To Me/Scan To Home Yes(*11) Yes(*11) Yes(*11) Yes Yes Yes Yes Yes Yes*1 Yes

VIII. Security about MFP self-protection

1. Verify Function for Firmware Yes Yes Yes Yes Yes Yes Yes Yes

IX. Security about CS Remote Care

1. Security when public lines (modem, FAX) are used Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

2. E-mail security Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

3. Security on HTTP communication Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

4. Product authentication Yes Yes Yes Yes Yes Yes Yes

5. Security at DCA Yes*13 Yes*13 Yes*13 Yes*13 Yes*13 Yes*13 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

X. Security about Remote Panel

1. Communication, Connection trigger Yes Yes Yes Yes Yes Yes

2. Authentication Yes Yes Yes Yes Yes Yes

3. Access code Yes Yes Yes Yes Yes Yes

4. Audit log Yes Yes Yes Yes Yes Yes

XI. Security about bizhub Remote Access

1. Communication, Connection trigger Yes*21 Yes*21 Yes

2. Auto cut-off due to timeout Yes*21 Yes*21 Yes

3. Security on administrator mode Yes*21 Yes*21 Yes

4. Security when cut off during remote operation Yes*21 Yes*21 Yes

5. Security when used in both user authentication and account authentication Yes*21 Yes*21 Yes

XII. Security concerning CSRA (CS Remote Analysis)

1. Security on HTTP communication

(Reference)

HDD encryption Algorithm (AES 128bits) Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes(AES256) Yes(AES256) Yes(AES256) Yes(AES256) Yes(AES256) Yes(AES256)

*1: Some ports cannot be closed.

*2: "Encryption function of data in HDD" is not supported. Data processed by Scan to HDD is compressed by general format. Only management data is deleted when job data is output or transferred, and the data itself is not deleted.

*3: Only when equipped with Security Kit

*4: Because it depends on version, please use the latest one.

*5-1: Because it depends on version, please use the latest one.

*5-2: Because it depends on version, please use the latest one.

*6: It is necessary to switch in the user settings. Because it depends on version, please use the latest one.

*7: Ipsec, Ipv6 not supported.

*8: HDD not supported

*9: Possible through Account Track function

*10: C652/552:Because it depends on version, please use the latest one.

*11: It is necessary to apply a special firmware of PKI-enabled.

*12: Property for protection in HDD(Image Data and Authentication Data is encrypted. C35 depends on version, please use the latest one.

*13: SNMPv3:Because it depends on version, please use the latest one.

*14: Three program destinations can be registered from PageScope Web Connection (administrative privilege). The function to import/export destinations is unsupported.

*15: Only Compulsory Memory Receive Box is possible. Entry of administrator password is required for operation.

*16: Transmitting and receiving e-mails is unsupported.

*17: Because it depends on version, please use the latest one.

*18: Only authentication by IC card + password.External server authentication is available when using intermediate server ,(PageScope AuthenticationManager).

*19: Only when equipped with HDD

*20: Supports the function of some

*21:Because it depends on version, please use the latest one.

C3850/C3350

**1 :Because it depends on version, please use the latest one.

**2 :Because it depends on version, please use the latest one.

Yes YesYes  Yes*4 Yes*4 Yes*4 Yes*4 Yes*4 Yes*4 Yes*4 Yes Yes -

Page 38: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper Version 8.0.7 Attachment Sheet

Function List for each model

<B/W MFP>

Di2510/3010/3510 7222/7228/7235 7322 7145, Di451 7255 7272160/161/1611/162

/180/210/163/181

/211/220

200/250/350/362

/282/222360/420/500 501/421/361 600/750 751/601 423/363/283/223 652/602/552/502 42/36 754/654

554e/454e/364e

/284e/224e4750/4050 754e/654e 4020 3320 3300P 4700P/4000P 367/287/227

I. Security from public telephone line

1. Security with FAX line Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

2. Putting number twice - - - - - Yes Yes*7 Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

3. Putting regular number and abbreviation number for preventing miss-sending - - - - - Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

4. Display for address confirmation Yes Yes Yes - - Yes*7 Yes*7 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

5. Selecting one address per sending - - - - - Yes*8 Yes Yes Yes Yes Yes Yes Yes Yes****1 Yes ― ― Yes

6. Confirmation of telephone number of fax system to send - - - - - Yes*9 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

II. Security with LAN connection

1. Security with Network protocol Yes Yes Yes Yes Yes *1 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes**1 Yes**1 Yes**1 Yes**1 Yes

2. User authentication Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

3. Security of device control from network

 (1) Security on address book data from network Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

 (2) bizhub OpenAPI *5 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes × ***2 × ***2 Yes

4. Encryption of data communication Yes*10 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ***15 Yes ***15 Yes

5. Quarantine Network Support Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ***15 Yes ***15 Yes

6. Certificate verification by dual direction Yes Yes Yes Yes Yes Yes Yes Yes**3 Yes**3 Yes **3 Yes **3 Yes

7. Action against virus Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes**4 Yes**4 Yes **4 Yes **4 Yes

8. Protection against virus from USB memory Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

9. Monitoring of the security of Linux kernel Yes Yes Yes Yes Yes Yes Yes Yes Yes

10. Separation from USB I/F path Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes

 

III. Security of data stored in MFP

1. Security on image processing and printing Yes*2 Yes Yes Yes Yes Yes Yes*11 Yes*11 Yes*11 Yes Yes Yes Yes Yes Yes Yes Yes**5 Yes**6 Yes**6 Yes**6 Yes

2. User authentication

 (1) Authentication function by external server and device Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Partially **7 Partially **7 Yes

 (2) Management of upper limitation of copy/print per user Yes Yes Yes Yes Yes*3 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes**8 Yes

 (3) Management of authentication and upper limitation by color and B/W Yes Yes Yes Yes Yes Yes Yes Yes**8 Yes**9 Yes

3. Box security Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― × **10 Yes

4. Complete data deletion when discarding HDD Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― ― Yes

5. Protection of data in HDD by password and encryption Yes Yes Yes*11 Yes*11 Yes*11 Yes Yes Yes*15 Yes Yes Yes*12 Yes Yes**11 ― ― ― Yes

6. Access management by audit log Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― Yes **8 Yes

7. Encryption of data in PDF file Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

8. Encryption of the data in e-mail Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― Yes

9. Digital signature on the e-mail Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes**12 ― ― Yes

10. Scan to Me, Scan to Home & Scan to Authorized Folder Yes Yes Yes Yes Yes****2 Yes **13 **13 ― ― Yes

11. Overwrite to delete the temporary data (HDD data). Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes****2 Yes Yes ― ― ― Yes

12. Adoption of the Encrypted modules which received authorization Yes Yes Yes****2 Yes **14 Yes

13.TPMによるデータ保護 Yes*21 Yes*22 Yes

IV. Security of output data

1. Copy Security Function

(1) Copy Protect Function Yes*12 Yes Yes Yes Yes Yes Yes

(2) Copy Guard Function/Password Copy Function Yes Yes Yes Yes Yes Yes

V. Authentication Devices

1. Security of the data for the biometric authentication device Yes Yes Yes Yes Yes Yes Yes

2. ID & Print (Secured printing by "One Touch") Yes Yes Yes Yes Yes Yes Yes Yes Yes

VI. Extended functions in cooperation with PageACSES

1. Scan with authentication

2. Print with authentication

3. Access control per file (only Page ACSES Pro)

VII. PKI Card authentication System

1. The login that PKI Card is used Yes(*11) Yes Yes Yes Yes Yes****1 Yes Yes

2. LDAP Search that PKI Card is used Yes(*11) Yes Yes Yes Yes Yes****1 Yes Yes

3. SMB sender that PKI Card is used Yes(*11) Yes Yes Yes Yes Yes****1 Yes Yes

4. E-mail sender(S/MIME)that PKI Card is used Yes(*11) Yes Yes Yes Yes Yes****1 Yes Yes

5. PKI Card Print Yes(*11) Yes Yes Yes Yes Yes****1 Yes Yes

6. Scan To Me/Scan To Home Yes(*11) Yes Yes Yes Yes Yes****1 Yes Yes

VIII. Security about MFP self-protection

1. Verify Function for Firmware Yes Yes Yes Yes Yes Yes Yes Yes Yes

IX. Security about CS Remote Care

1. Security when public lines (modem, FAX) are used Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― ― ― Yes

2. E-mail security Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes ― ― ― ― Yes

3. Security on HTTP communication Yes Yes Yes Yes Yes Yes Yes ― ― Yes ***15 Yes ***15 Yes

4. Product authentication Yes Yes Yes Yes ― ― Yes **12 Yes **12 Yes

5. Security at DCA Yes*18 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes**20 Yes**20 Yes ***13,***15 Yes ***13,***15 Yes

X. Security about Remote Panel

1. Communication, Connection trigger Yes Yes Yes **21 **21 No ***14 No ***14 Yes

2. Authentication Yes Yes Yes Yes

3. Access code Yes Yes Yes Yes

4. Audit log Yes Yes Yes Yes Yes Yes

XI. Security about bizhub Remote Access

1. Communication, Connection trigger Yes*22 Yes*22 Yes

2. Auto cut-off due to timeout Yes*22 Yes*22 Yes

3. Security on administrator mode Yes*22 Yes*22 Yes

4. Security when cut off during remote operation Yes*22 Yes*22 Yes

5. Security when used in both user authentication and account authentication Yes*22 Yes*22 Yes

XII. Security concerning CSRA (CS Remote Analysis)

1. Security on HTTP communication

(Reference)

HDD encryption Algorithm (AES 128bits) Yes Yes Yes Yes Yes(AES256) Yes(AES256) Yes(AES256) Yes(AES256)

*1: Some ports cannot be closed.

*2: "Encryption function of data in HDD" is not supported. Data processed by Scan to HDD is compressed by general format. Only management data is deleted when job data is output or transferred, and the data itself is not deleted.

*3: "Limitation per user "is not supported.

*4: Di451 does not support.

*5: SSL supported.

*6: Because it depends on version, please use the latest one.

*7: Possible for multiple destinations.

*8: Because it depends on version, please use the latest one.

*9: Because it depends on version, please use the latest one.

*10: Ipsec, Ipv6 not supported.

*11: HDD data is encrypted only when Security Kit option is equipped.

*12: Because it depends on version, please use the latest one.

*13: Because it depends on version, please use the latest one.

*14: Because it depends on version, please use the latest one.

*15: Resources in HDD for protecting (Encrypt image data and authentication data).

*16: Only body authentication is supported.

*17: Can be used for only specific applications.

*18: Only bizhub 362/282/232 supports SNMPv3 communication.

*19: Client certificate is supported.

*20: Security is supported as Windows OS.

*21:Because it depends on version, please use the latest one.

*22:Because it depends on version, please use the latest one.

Reference 4020 / 3320

**1: Some ports cannot be closed without function reduction. .

**3 Device supports upgrade of device certificate to CA signed version

**4 Custom Linux OS, with extensive protections

**5 DRAM page data is overwritten (Wiping is selectable), Automatic wiping of held jobs on hard drive, Encrypted hard drive is selectable, secure print requiring user password for release is selectable.

**6 DRAM page data is overwritten, No HDD supported

**7 No network authentication, local authentication via PIN only.

**8 usage restrictions selectable, limits managed via installed application

**9 limited functional restrictions.

**11 AES 256 encryption unique to the individual device. No password option.

**12 function to be implemented via installed application

**13 No functions available, but Scan function is provided. Scan to PC uses scan profile, Scan to FTP destintations may require userID and password as specified when defined.

**14 Modules are FIPS capable. But not certified

**20 SNMPv1/2 and SNMPv3 support is selectable

**21 Uses VNC for communication.with selectable password option

Reference 3300P / 4000P / 4700P

***1: Some ports cannot be closed without function reduction. .

***2 Settings management via device web page may utilize HTTPS/SSL

***3 Device supports upgrade of device certificate to CA signed version

***4 Custom Linux OS, with extensive protections

***6 DRAM page data is overwritten, No HDD supported

***7 No network authentication, local authentication via PIN only.

***8 Access restrictions not logged to individual

***9 limited functional restrictions.

***10 PIN access restrictions only from panel.

***11 AES 256 encryption unique to the individual device. No password option.

***12 CA signed certificates for the device and all servers can be specified.

***13 SNMPv1/2 and SNMPv3 support is selectable

***14 Uses VNC for communication.with selectable password option

***15 selectable

4750/4050

****1 :Because it depends on version, please use the latest one.

****2 :Because it depends on version, please use the latest one.

YesYes Yes Yes Yes*4 Yes*6Yes Yes YesYes Yes YesYes

Page 39: Konica Minolta Security White Paper - Business Products · PDF fileKonica Minolta Security White Paper Security Basic Policies and Technologies Provided by Konica Minolta. Version

Konica Minolta Security White Paper Version 8.0.7 Attachment Sheet

Function List for each model

<Color/Monochrome production print machine>

PRO C6500 PRO 1050 PRO 920 PRO1200 C7000/C8000+IC-601 C7000/C8000+Fiery C7000/C8000+Creo C7000/C8000 1250/1052/951 1250/1052/951C1070/C1060/C1100/C1085

+IC-602bizhub PRESS C71hc (*22)

+IC-602

I. Security from public telephone line

1. Security with FAX line --- --- --- --- --- --- --- ---

2. Putting number twice - - - --- --- --- --- --- --- --- ---

3. Putting regular number and abbreviation number for preventing miss-sending - - - --- --- --- --- --- --- --- ---

4. Display for address confirmation - - - --- --- --- --- --- --- --- ---

5. Selecting one address per sending - - - --- --- --- --- --- --- --- ---

6. Confirmation of telephone number of fax system to send - - - --- --- --- --- --- --- --- ---

II. Security with LAN connection

1. Security with Network protocol Yes Yes Yes Yes △*19 Yes Yes Yes Yes

2. User authentication Yes Yes △*16 △*16 Yes --- --- Yes

Yes

<Degsa1st>

Main body authentication + external

authentication

<Chagall 1st/Degas2nd>

Main body authentication + external

authentication

+ intermediate authentication

Yes

3. Security of device control from network

(1) Security on address book data from network Yes --- --- --- --- --- --- --- ---

(2) bizhub OpenAPI △*17 △*17 --- --- --- △*17 △*17 △*17 △*17

4. Encryption of data communication Yes Yes Yes Yes △*19 Yes Yes Yes Yes

5. Quarantine Network Support --- --- --- --- --- --- --- ---

6. Certificate verification by dual direction --- Yes*19 --- --- --- Yes Yes*19 Yes*19

7. Action against virus Yes Yes Yes Yes --- --- Yes Yes Yes Yes

8. Protection against virus from USB memory Yes Yes Yes Yes Yes --- --- Yes Yes Yes Yes Yes

9. Monitoring of the security of Linux kernel Yes Yes --- --- Yes Yes

The monitoring and analysis

function for vulnerability are

embedded to obtain

ISO15408.

Yes Yes

10. Separation from USB I/F path Yes Yes Yes Yes Yes Yes Yes

III. Security of data stored in MFP

1. Security on image processing and printing Yes Yes Yes Yes Yes Yes YesYes

(Temporary data erasing

function)

Yes Yes

2. User authentication

(1) Authentication function by external server and device Yes Yes Yes △*16 △*16 Yes --- --- Yes Yes Yes

(2) Management of upper limitation of copy/print per user Yes Yes Yes Yes Yes Yes --- Yes Yes Yes Yes

(3) Management of authentication and upper limitation by color and B/W Yes --- Yes Yes --- Yes --- Yes Yes

3. Box security Yes Yes Yes Yes --- Yes Yes --- Yes --- ---

4. Complete data deletion when discarding HDD Yes Yes --- --- Yes Yes Yes Yes

5. Protection of data in HDD by password and encryption Yes --- △*2 △*2 Yes Yes Yes --- ---

6. Access management by audit log Yes Yes Yes Yes Yes --- --- Yes Yes Yes Yes

7. Encryption of data in PDF file Yes Yes Yes --- --- Yes Yes Yes

8. Encryption of the data in e-mail --- --- --- --- --- --- --- ---

9. Digital signature on the e-mail --- --- --- --- --- --- --- ---

10. Scan to Me, Scan to Home & Scan to Authorized Folder --- --- --- --- --- --- --- ---

11. Overwrite to delete the temporary data (HDD data). Yes Yes --- --- Yes Yes Yes Yes

12. Adoption of the Encrypted modules which received authorization --- Yes --- --- --- --- Yes Yes

IV. Security of output data

1. Copy Security Function

(1) Copy Protect Function Yes Yes --- --- --- --- YesYes

(Tint block printing function is

supported.)

--- ---

(2) Copy Guard Function/Password Copy Function --- --- --- --- --- --- --- ---

V. Authentication Devices

1. Security of the data for the biometric authentication device --- ---

2. ID & Print (Secured printing by "One Touch") --- ---

VI. Extended functions in cooperation with PageACSES

1. Scan with authentication --- --- --- --- --- --- --- ---

2. Print with authentication --- --- --- --- --- --- --- ---

3. Access control per file (only Page ACSES Pro) --- --- --- --- --- --- --- ---

VII. PKI Card authentication System

1. The login that PKI Card is used --- --- --- --- --- --- --- ---

2. LDAP Search that PKI Card is used --- --- --- --- --- --- --- ---

3. SMB sender that PKI Card is used --- --- --- --- --- --- --- ---

4. E-mail sender(S/MIME)that PKI Card is used --- --- --- --- --- --- --- ---

5. PKI Card Print --- --- --- --- --- --- --- ---

6. Scan To Me/Scan To Home --- --- --- --- --- --- --- ---

VIII. Security about MFP self-protection

1. Verify Function for Firmware Yes --- --- --- --- --- ---

IX. Security about CS Remote Care

1. Security when public lines (modem, FAX) are used Yes Yes Yes Yes Yes --- --- Yes Yes Yes Yes

2. E-mail security Yes Yes Yes Yes Yes --- --- Yes Yes Yes Yes

3. Security on HTTP communication Yes Yes --- --- Yes Yes Yes Yes

4. Product authentication --- --- --- --- --- --- ---

5. Security at DCA Yes Yes Yes Yes --- --- Yes YesYes

(SNMPv3 is supported.)Yes Yes

X. Security about Remote Panel

1. Communication, Connection trigger

2. Authentication

3. Access code

4. Audit log

XI. Security about bizhub Remote Access

1. Communication, Connection trigger

2. Auto cut-off due to timeout

3. Security on administrator mode

4. Security when cut off during remote operation

5. Security when used in both user authentication and account authentication

XII. Security concerning CSRA (CS Remote Analysis)

1. Security on HTTP communication Yes

(Reference)

HDD encryption Algorithm (AES 128bits)

*2: "Encryption function of data in HDD" is not supported. Data processed by Scan to HDD is compressed by general format. Only management data is deleted when job data is output or transferred, and the data itself is not deleted.

*16: Only body authentication is supported.

*17: Can be used for only specific applications.

*19: Client certificate is supported.

*21: This function is enabled when AU201+PageScope MyPrintManager is connected.