advertisement
Konica Minolta
Security Technical Support Paper
Report on Basic Security Guidelines and Technical Support
Ver.9.0.0
Nov, 2016
© 2016 Konica Minolta, Inc.
History
Version 1 August 2004
Version 1.1
September 2004
Version 2.0
February 2005
Version 2.1
February 2005
Version 2.2
March 2005
First version
Added supported models
Added supported models
Modified version 2.0
Modified version 2.1
Version 3.0
September 2005
Version 4.0
January 2007
Version 4.1
August 2008
Revised supported features and added supported models
Revised supported features and added supported models
Added only supported models
Version 4.2
March 2009
Version 4.3
November 2009
Added descriptions, added supported models
Added descriptions, added supported models
Version 4.4
April 27th, 2010 Added descriptions, added supported models
Version 4.5
February 16th, 2011 Added descriptions, added supported models
Version 5.5
January 16th, 2012 Added descriptions, added supported models
Version 5.6
March 15th, 2012 Added descriptions, added supported models
Version 5.6.1 April 12th, 2012 Added descriptions, added supported models
Version 5.7
September 12th, 2012 Added descriptions, added supported models
Version 6.0
November 30th, 2012 Added descriptions, added supported models
Version 7.0
February 26th, 2013 Added descriptions, added supported models
Version 7.0.1 July 30th, 2013 Added supported models
Version 7.1
October 18th, 2013 Added descriptions
Version 8.0.1 June 10th, 2014 Added descriptions, added supported models
Version 8.0.3 July 14th, 2014
Version 8.0.4 August 26th, 2014
Version 8.0.6 April 13th, 2015
Version 8.0.7 August 19th, 2015
Version 8.0.8 July 27th, 2016
Added TPM descriptions
Added supported models (C3110, C3100P, 4700P, 4000P, 3300P)
Added CSRA descriptions, added supported models (bizhub PRESS C71hc)
Added supported models (C368, C308, 367, 287, 227)
Added descriptions, security for GW integrated into MFP
Konica Minolta products have various technologies concerned with security, but they only help if customers operate the products properly in accordance with Konica Minolta's security policy. We ask for understanding in consulting the content of this paper while operating Konica Minolta products. Please see the user manual for each setting. Moreover, please note that the content of this paper does not guarantee perfect security.
Active Directory is a trademark of Microsoft Corporation.
VxWorks is a registered trademark of Wind River Systems, Inc.
Adobe Acrobat is a registered trademark of Adobe Systems Incorporated.
FeliCa is a registered trademark of Sony Corporation.
Linux is a registered trademark or trademark of Linus Torvalds in Japan and other countries.
MFP is a multi-function printer.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
1
1. Index
1: Introduction
I. Basic Security Guidelines
1. Adding the newest security technology
2. Obtaining certification from a third party institution
2: Security and technology support for equipment
I. Security for pay phone lines
1. Security for FAX lines
2. Enter the address twice
3. Chain dial
4. Address confirmation screen displayed
5. Multiple addresses prohibited
6. Version Transmission to verify destination device
II. Security for LAN connection
1. Handling network protocol
2. User authentication
3. Device management security through the network
4. Encryption of data communication
5. Quarantine network support
6. Two-way certificate verification
7. Dealing with viruses
8. Dealing with external viruses on USB memory
9. Routine monitoring of Linux kernel
10. Separating from USB I/F path
III. Security for data in main MFP unit
1. Security for image processing and output processing
2. User authentication
3. Box security and utilization
4. Complete data deletion when discarding HDD
5. Protecting HDD data by password and encryption
6. Access management with audit log
7. Encrypting PDF files
8. Encrypting E-mail data
9. Signature feature for E-mail
10. Scan to Me, Scan to Home & Scan to Authorized Folder
11. Feature for overwriting and deleting HDD data
12. Using a certified encryption module
13. Protecting data with TPM
IV. Output data security
1. Copy Protect feature
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
2
1. Index
V. Authenticator
1. Security for data involved with biometric authenticator
2. Authentication and print (one-touch security print)
VI. Feature extensions through linking with PageACSES
1. Authentication scan
2. Authentication Print
3. File security (Only PageACSES Pro)
VII. PKI card authentication system
1. Log-in using PKI card
2. LDAP search using PKI card
3. SMB transmission using PKI card
4. E-mail transmission using PKI card (S/MIME)
5. PKI card print
6. Scan to Me / Scan to Home
VIII. Security concerning MFP self-protection
1. Firmware verification feature
IX. Security for CS Remote Care
1. Security when using public line (modem, FAX)
2. E-mail security
3. HTTP communication security
4. Product authentication
5. DCA security
X. Security involving bizhub Remote Panel
1. Communication, connection trigger
2. Authentication
3. Access Code
4. Audit log
XI. Security involving bizhub Remote Access
1. Communication, connection trigger
2. Automatic disconnect from timeout
3. Security in administrator mode
4. Security following a disconnection during remote operation
5. Security when using both user authentication and department authentication
XII. Security for CSRA (CS Remote Analysis)
1. HTTP communication security
XIII. Security concerning MFP integrated SaaS GW
1. Communication between SaaS GW and the cloud
2. Communication protection and encryption
3. Preventing impersonation
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
3
Chapter 1: Introduction
© 2016 Konica Minolta, Inc.
I. Basic Security Guidelines
In our modern societies with network infrastructure in place and widespread IT, vast amounts of information are distributed. And information accumulates at the center of businesses in a variety of forms changing form while utilized as advanced information assets. An important issue for corporate activities is protecting these information assets, in other words managing risk.
This paper introduces the basic security features provided by each series of Konica Minolta.
1. Adding the newest security technology
Konica Minolta develops and provides the newest security features in order to protect customer information assets from the various threats classified in the following section.
1. Unauthorized access and information leaks via networks
2. Unauthorized use and information leaks from the direct operation of devices
3. Tampering, copying, and deleting electronic information and analog information
4. Information loss from man-made accidents and equipment failure
5. Trace feature through logs
2. Obtaining certification from a third party institution
In order to objectively demonstrate the implementation of security features, Konica Minolta acquired
ISO15408 certification in MFPs (most A4/20ppm models or above) starting in March 2004.
ISO15408 certification was acquired based on each MFP’s initial engine firmware. When MFP’s engine firmware are released, such as for a maintenance release, the continued warranty system is no longer used, but support is maintained for security features without change.
The integrated MES (RSA BSAFE Micro Edition Suite) encryption module is authenticated with acquired
FIPS140-2.
The software is thus certified as robust and safe, and sales to institutions that require FIPS140-2 authentication is allowed.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
5
Chapter 2: Security and technology support for equipment
© 2016 Konica Minolta, Inc.
I. Security for public phone lines
1. Security for fax lines
The fax line is communication that only uses fax protocol, and other communication protocols are not supported.
If invaded externally with a different protocol through a public line, or if fax data which cannot be expanded is sent, the internal software process will produce an error, and the communication will be blocked.
Public line MFP
1. Call to fax line
3. Protocol response
G3 protocol
2. G3 protocol response
4. Determine whether it is a normal command response from G3 protocol
5. G3 protocol continues to communicate Protocols other than G3 are disconnected
Figure 1-1
2. Enter the address twice
When entering the fax transmission address as a telephone number, enter the telephone number again, and verify that they match, thus avoiding a mistaken transmission due to entering the wrong telephone number.
Also, if registering a telephone number to speed-dial, enter the telephone number again, and verify that they match, thus avoiding a mistaken transmission due to entering the wrong telephone number.
3. Chain dial
When entering the address, speed-dial numbers and direct entry with the numeric keypad can be combined. By registering the area code as a speed-dial number beforehand, input mistakes can be prevented.
4. Address confirmation screen displayed
When entering a send address (speed-dial number, phone number, etc.), first, display the entered address on the operation panel to verify to avoid sending to the wrong address.
5. Multiple addresses prohibited
Configure to permit to enter only one address to avoid sending to an unintended address.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
7
I. Security for pay phone lines
6. Transmission to verify destination device
When sending a fax, verify the destination machine's telephone number through the fax protocol signal
(CSI) received from destination machine if they match or not for a more secure transmission.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
8
II. Security for LAN connection
1. Handling network protocol
Each port can be set actions as ON/OFF.
Prevent outside intrusions by switching OFF unneeded ports.
OFF
Port number: 25 SMTP
ON
Port number: 80 Web
SMTP server
Web server
MFP
Figure 2-1
With the IP address filtering feature, IP addresses can be specified to permit access and reject access, thus allowing for sorting devices on the network to which access was permitted.
OK
Eg. Filter setting
Permit Filter:
121.121.121.1〜121.121.121.255
121.121.125.1〜121.121.125.127
Reject Filter:
121.121.121.127〜121.121.121.255
121.121.125.8〜121.121.125.56
Permit
Filter
Reject
Filter
MFP
Figure 2-2
2. User authentication
It is possible to authenticate users for features that use the network by using the network authentication which uses the Active Directory service. In addition, not just functions that use the network, but even when using the MFP, if Active Directory authentication is configured in user authentication settings, authentication will be performed with Active Directory.
Usage permission is granted by combining a registered user and password.
Internal data is protected since only registered users can use the device.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
9
II. Security for LAN connection
1. User ID, Password MFP
4. If OK, usable within permitted items
2. User ID, Password
3. OK/NG
Authentication
Server
Use permission
John Doe
Function permitted
Copy: Permitted
Print : Permitted
Scan : Not Permitted
Fax : Not Permitted
Limitation
Colour : Not Permitted 000 Sheets
Mono : Permitted 500 sheets
Figure 2-3
3. Device management security through the network
(1) Security when registering whole address book
The administrator password of the device must be entered when registering whole address book from the network. It cannot be registered if the administrator password of the device is not valid.
This feature prevents having the address book registered to the MFP being tampered with all at once.
1. Transmit Admin password
2. After Admin password is verified, the result is sent
4. Address book sent
3. Request to send address book
5. Edit address book
6. Save edited address book
•
PageScope Data Administrator or PageScope Address Book
Utility
•
PageScope Web Connection
PC
One-Touch address
Group
Program
MFP
Figure 2-4
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
10
II. Security for LAN connection
(2) bizhub OpenAPI bizhub OpenAPI allows for using SSL encryption protocol to acquire and configure device information over the network. And, communication can be made more secure by setting a password unique to bizhub
OpenAPI.
The device is secured by using bizhub OpenAPI for the settings of user authentication information through the PageScope Data Administrator,
PC
1. bizhub OpenAPI Password
3. Send command
SSL
Communication
2. After verifying the password, communication begins
4. After interpreting command, send data
Network setting
Address book
User authentication information
Count
MFP
SSL:
Secure Socket Layer
Figure 2-5
4. Encryption of data communication
SSL encryption protocol is used for data communication between the LDAP server, PageScope Data
Administrator (or Address Book Utility), PageScope Web Connection, and the MFP. The content is protected by encrypting data traded between networks. Moreover, IPsec is used, which allows encryption support not dependent on a communication protocol. Communication is encrypted in line with support for
IPv6 conversion.
5. Quarantine network support
When connecting to LAN, IEEE802.1X feature is used for authenticating network devices, and allows managing MFP connections to LAN for physical ports. Authentication is performed on the RADIUS (Remote
Access Dial in User System) server, and LAN connection control is performed with a supported switching hub. With this feature, only MFPs for which authentication was permitted are permitted to connect to a LAN environment.
Network devices
(Supplicant)
IEEE802.1X supported switching hub
(Authenticator)
Management port
Other network devices
Normal traffic
Authentication traffic
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
Non-management
Figure 2-6
RADIUS server
(Authentication server)
11
II. Security for LAN connection
6. Two-way certificate verification
Conventional MFPs inform the other communicating device with its certificates to verify the validity of
MFPs. And, by verifying the validity of the other communicating device bi-directionally, communication control is performed, preventing "impersonation" of an MFP or the other communicating device.
Certification from CA
Trust
Mr. A
Mr. A’s private key
Issue certification
Mr.A’s Infor
&Public key
Mr.A’s certificate
CA signature
Certificate authority (CA)
Trust
Device
Verify Mr. A’s certificate with
CA certificate
Mr. C’s private key
Mr. C’s public key
Mr. C
(Mr. A’s pretender)
Figure 2-7
7. Dealing with viruses
VxWorks or Linux kernel is used as the OS of the controller integrated into the MFP, depending on model.
Viruses that target VxWorks, an OS for embedded devices, are considered rare.
The server type controller of EFI fiery uses Windows OS’s, but necessary Windows security patches are provided in a timely fashion, measures are taken against Windows vulnerabilities.
8. Dealing with external viruses on USB memory
In most cases, USB memory viruses are run and cause infection by simply inserting the USB memory, and since there is no mechanism in an MFP by which a run file is booted simply by inserting a USB memory, these kinds of viruses have no effect.
There are features on an MFP for connecting to USB memory, printing image data from USB memory, and saving scanned image data and image data saved to the box to USB memory, but since these features are run by user actions, they will not run automatically.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
12
II. Security for LAN connection
9. Routine monitoring of Linux kernel
Linux kernel monitors disclosed vulnerability information and presence of security patches to verify whether a disclosed vulnerability is affecting MFP features.
10. Separating from USB I/F path
The USB I/F path and network path are separated based on system architecture. Even if an MFP is connected with USB to a PC connected to the Internet, the MFP cannot be accessed from the Internet environment through the PC.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
13
III. Security for data in main MFP unit
1. Security for image processing and output processing
Data read from the scanner is compressed after image processing, and written to the memory in the MFP
(volatile DRAM). Print data is sent to the printer after being decompressed, and printed on paper. Since data is overwritten on memory page by page, it cannot be output again.
Once output is complete or transfer is complete, job data (compressed data) is deleted from memory to prevent a third party outputting or transferring it again.
Compress scanned image (proprietary spec)
Decompressed
Deleted when job completed
MFP
Figure 3-1
Rewrite previous data
Job data stored on HDD is saved in the form of unique compressed data. Therefore, even supposing internal data can be read out, analyzing it is extremely difficult.
In addition, since all data on the HDD is saved in encrypted form, even if it happened to be taken off the
HDD, its confidentiality is preserved. (This feature is optional for some models.)
If the HDD uses a lock password, even if data happened to be taken off the HDD, its confidentiality would be preserved.
If the secure print feature was used, once the print job is saved temporarily on the MFP's memory, print will start after the password is entered on the operation panel. This feature prevents others from taking away the printed paper.
PC
Secure Print Print
Job Queue
MFP
Figure 3-2
Input password from operation panel
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
14
III. Security for data in main MFP unit
2. User authentication
MFP supports authentication that uses the authentication feature, or external servers such as Active
Directory, or the PageScope Authentication Manager. Aside from password authentication, authentication is possible through a contactless IC card or biometrics, using the PageScope Authentication Manager.
It is possible to restrict the use of MFP copy, print, scan, and fax functions, and the color function, by restricting usage permission of the MFP combined with user authentication. Moreover, depending on the permissions level, registered addresses can also be restricted such as accessible fax and E-mail.
1. It can perform authentication using an external server, but even if an external server cannot be provided on the network, the user authentication feature is available since there is an authentication feature within the device.
2. It can restrict the usage by setting an upper limit for output sheets data by user or department.
3. Can also set different output permissions and upper limit for color and monochrome.
3. Box security and utilization
In order to securely protect box data, user authentication and access to the box are password protected.
Scan
Scanned data
Retrieve data
Box
User authentication
Input password
Fax
Fax data
MFP
Figure 3-3
4. Complete data deletion when discarding HDD
The internal data of the hard disk can be deleted by overwriting with random numbers through the settings.
This will prevent confidential information from leaking after the main MFP unit has been discarded.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
15
III. Security for data in main MFP unit
5. Protecting HDD data by password and encryption
The hard disk can be locked with a password. Even if the hard disk is removed from the main MFP unit, and attached to a PC, the internal data cannot be viewed if the password doesn't match.
Furthermore, data can be encrypted on the hard disk with AES. Even if data on the hard disk is read out, it cannot be decrypted without the encryption key.
6. Access management with audit log
The history of actions is saved as an audit log.
It can trace unauthorized access.
Operation/event log
User authentication
Division authentication
Admin authentication
BOX registration
/edit/delete
Network setting
Secure doc access
Audit log
Audit log output example
Date-Time
2016/10/19-10:23:30
2016/10/19-10:23:53
2016/10/19-10:27:20
2016/10/19-10:30:01
2016/10/19-10:33:59
2016/10/19-10:40:03
Action
User authen.
User authen.
Edit passwd
Register BOX
Admin authen.
Delete BOX
Operation ID suzuki suzuki suzuki suzuki
Admin
Admin
Object ID
ー
ー
ー
BOX
BOX
BOX
OK
OK
OK
Result
NG
OK
OK
MFP
Figure 3-4
7. Encrypting PDF files
When saving data scanned with the MFP in a PDF format file, it can be encrypted with a common key. When opening an encrypted PDF file with Adobe Acrobat, the common key must be entered.
Scan to Box
Encrypted PDF
Encrypted with public key
Figure 3-5
MFP
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
16
III. Security for data in main MFP unit
8. Encrypting E-mail data
When the sender transmits an E-mail with the MFP, he can use the receiver's certificate (public key: can register to address book) to encrypt the E-mail, and then the receiver can use their own private key to decrypt the E-mail on their PC. This allows for secure sending and receiving, without the content of E-mail being intercepted by others. Certificate registered to the LDAP server is used to obtain the public key from the network.
Sender
KMBT
Confidential
Encryption
Encrypted e-mail
Receiver
Transmit
Encrypted e-mail
Decryption
KMBT
Confidential
Receiver
=
certificate
Public key Receiver private key
Figure 3-6
9. Signature feature for E-mail
The sender can add a signature to an e-mail with the MFP private key, and the receiver verifies the signature with the MFP certificate. This allows the receiver to verify that there was no tampering.
Sender
KMBT
Confidential
Signature
Signature e-mail
Receiver
Transmit
Signature e-mail
Check
Signature
KMBT
Confidential
Sender private key
Sender
=
certificate
Public key
Figure 3-7
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
17
III. Security for data in main MFP unit
10. Scan to Me, Scan to Home & Scan to Authorized Folder
The scan data can be sent easily to oneself.
When configuring user authentication, the "Me" button will be displayed in the registered address column, and the "Home" button by enabling the feature in administrator settings.
If "Me" was selected for the address, it is sent to the e-mail address of the authenticated user, and if
"Home" was selected, it is sent to the PC folder registered in advance, allowing for sending files simply and reliably with one touch.
SMB authentication can be restricted to SMB addresses other than one's own by not registering anything in the [user ID] and [password] columns of the SMB address, if a logged in user selects their own SMB address from the address book and sends,since the user authenticated user name and password are used without change,
Moreover, by restricting and prohibiting the register scope and direct input of addresses through administrator settings, it can be regulated such that send destinations can only be sent to addresses managed by the administrator.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
18
III. Security for data in main MFP unit
11. Feature for overwriting and deleting HDD data
Through settings of the HDD overwrite deletion feature, data saved temporarily to the hard disk can be deleted by overwriting when the image data is no longer in use, such as at the end of a print or scan job, or when box-saved documents are deleted.
Reduces the risk of no longer needed image data on the hard disk being reused
12. Using a certified encryption module
MFP has a built-in encryption module such as OpenSSL/MES (RSA BSAFE Micro Edition Suite), successfully implementing an encryption and authentication feature. The main features that use the MES encryption module with FIPS140-2 certification are listed below.
(1) Encryption communication when sending scan data
During SSL communication such as Scan to WebDAV, TWAIN, etc. During S/MIME transmission for Scan to E-Mail.
(2) During SSL transmission for PSWC
(3) PDF encryption file generation feature
13. Protecting data with TPM
1. Purpose
When information such as passwords leaks to a malicious user through physical analysis in the MFP or eavesdropping on network packets, there is a risk of the MFP being accessed without authorization, and important internal data leaking.
Data encrypted using the root key always requires a TPM chip to decrypt since the key (root key) generated in TPM cannot be removed to outside the TPM. Information such as passwords can be prevented from leaking by using TPM.
[Protected data]
1. Certificates registered by the administrator
2. The administrator password or password set by the administrator
3. The password set when the MFP provides services as a server
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
19
III. Security for data in main MFP unit
2. TPM protection mechanism
Usually, information such as passwords on the MFP is protected using an AES key (256bit) or RSA key
(2048bit) to prevent leaks. If TPM data protection is enabled, the RSA key is encrypted using a TPM root key as in the below figure.
AES Key (256bit)
RSA Key
(2048bit)
(Public Key)
Encryption
TPM
TPM internal
Generate root key
(Can not be extracted)
RSA key to be encrypted/ decrypted
By root key
Protected by TPM
RSA key
(Private key)
Protected by RSA key which protected by
TPM key
AES Key
AES Key
Decryption
Data to be protected
Encryption Decryption
Figure 3-9
Since the root key cannot be copied from the TPM, a TPM chip is needed to decrypt the RSA key. If the RSA key cannot be decrypted, the AES key also cannot be decrypted, so that protected data such as passwords cannot be decrypted.
Therefore, by using TPM, even if a malicious user tries to analyze or eavesdrop on password information, the encrypted data cannot be decrypted without the TPM chip, thus preventing password information from leaking.
3. TPM key backup
By setting aside a backup of the RSA key in advance on the USB memory in case of a TPM chip failure, encrypted data can be saved.
(For security reasons, store the RSA key securely by encrypting it. )
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
20
IV. Output data security
1. Copy Protect feature
1. Copy protection print feature
A pattern can be embedded to the copy or print document (original copy), and highlighting patterns such as "Copy" on the copied documents, it can be clearly differentiated between original and copies.
In addition, the serial number or output time of the MFP used for output can be set as the pattern. By combining the copied documents with serial number and output time with the above audit log, it is possible to identify users who made unauthorized copies.
Copy
Paper original printed with Copy Protect Copied document with message
Figure 4-1
2. Copy guard feature / Password copy feature
Even if one tries to twice copy a manuscript outputted with a special security pattern added during copying or printing, the copy guard feature will produce a message stating that copying is prohibited, and it will not be copied. Moreover, if and only if a password set in advance using the password copy function was entered, the second copy with a security pattern will be permitted.
Copy Guard
When Copy Protect message detected
Prohibit copy
Password copy
When Copy Protect message detected
Original
Copy
Print with
Copy Protect pattern
Releasable protection by inputting password
PC
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
Figure 4-2
21
V. Authenticator
1. Security for data involved with biometric authenticator
Since the data for the biometric authenticator and AU-101/102 is managed under exceptionally tight security, illegal use is not possible.
Using finger veins for biometric data
Forging vein is exceptionally difficult since they are inside the body and cannot be inadvertently read like a finger print.
Data processing techniques used in this system
This system complies with security guidelines based on the "U.S. Government Biometric Verification Mode
Protection Profile for Medium Robustness Environments (BVMPP-MR) Version 1.0”. Various important security and privacy specifications are supported with this system.
Replicating biometric data
Random number data calculated based on read data (from registration) is registered on the HDD.
Replicating the original vein data from the data on the HDD is logically impossible.
Data structure on the HDD
The data structure on the HDD is not disclosed. Therefore, forging and impersonation are not possible.
Delete data on the authenticator
Data on the device is encrypted when it is stored temporarily to RAM, and deleted after being transferred to the MFP. Forging veins is exceptionally difficult because are they are inside the body and cannot be inadvertently read like a finger print. でOK
Vein
Vein extraction
Image
(Registration)
Users infor
DB
Feature data
Camera
Output Control of
Near-Infrared Rays
Normalization pattern matching
Check
Authentication completed
Figure 5-1
「U.S. Government Biometric Verification Mode Protection Profile for Medium Robustness Environments
(BVMPP-MR) Version 1.0:
See http://www.commoncriteriaportal.org/public/files/ppfiles/PP_VID10140-PP.pdf
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
22
V. Authenticator
2. Authentication and print (one-touch security print)
By linking with the user authentication feature, simple and strictly confidential print work is successfully implemented. Printed work is no longer taken away or peeked at by others. Moreover, by using the biometric authenticator or card authenticator, performing authentication is simple.
1. Produce print directions.
Print data is sent to the MFP together with authentication data saved to the drive.
Document is printed.
2. Authentication is performed by simply holding a finger or IC card up to the device for several seconds, and the document is printed.
Figure 5-2
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
23
VI. Feature extensions through linking with PageACSES
By linking PageACSES to the main MFP unit, the security features can be expanded, and operability improved.
<Overview>
Authentication by file (only the PageACSES Pro version)
Set the view, revise, and print permissions can be set for individual file for individual users. Through this authentication feature and encryption of image files, important documents scanned with the main MFP unit avoid being leaked out and unauthorized tampering.
User authentication using IC card
Using the contactless IC card (FeliCa) for user authentication, users can log in to the MFP without entering a password.
1. Authentication scan
Scan data can be prevented for being directly sent out. Data sent to the client PC while encrypted by IC card information is retrieved using the IC card. At the same time, it is possible to take logs of actions history concerning copies, prints, and scans.
Scan data
Log
Network encryption
Hold up the card to scan
1. Prevents unauthorized scans by members without scan permission
2. Inhibits unauthorized member scans by audit logs
3. Prevents information leaks from network eavesdropping
4. Prevents unauthorized obtainment of scan data
Hold up the card to download
Figure 6-1
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
24
VI. Feature extensions through linking with PageACSES
2. Authentication Print
Print data is encrypted when printing, and print jobs sent by a user can be retrieved his own print job using the IC card.
Log information
Log
Print data
For printing
1. Prevents unauthorized printing by members without print permission
2. Prevents unauthorized member printing by audit logs
3. Prevents information leaks from network eavesdropping
4. Prevents outputted results from being taken away
Figure 6-2
3. File security
(Only PageACSES Pro)
Usage permission is granted for PDF files using PageACSES Pro. The files are secure even if leaked out since they are encrypted.
Electronic file security using PageACSES Pro
Public data
View, print, and file manipulation permissions are granted for each file.
PageACSES Pro
Customer information Tokyo
Customer information Osaka.pdf
Customer information Nagoya.pdf
Customer information Hiroshima.pdf
Records are taken on what was done to which file at what time
Since the IC card is used without fail to print, it is certain that only that person will have access to it
IC card
Mr./Ms. A: View only internal external
IC card
Mr./Ms. B: Can view, print and save
IC card
Mr./Ms. C: Can view, print and save
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
Forget in train
Write to CD and take out
Figure 6-3
If removed from the internal network, the document is encrypted, and cannot be read.
25
VII. PKI card authentication system
<Overview>
The PKI card has encryption/decryption and electronic signature features. By linking this card with MFP features, it is possible to build an MFP usage environment with a high security level.
1. Log-in using PKI card
Insert the PKI card into the card reader and enter the PIN to perform authentication to Active Directory. At that time, the digital certificate sent from the Active Directory to the MFP can be verified with the MFP.
2. Authentication
1. Insert card
MFP
4. OK or fail
5. Verify server certificate
Active Directory
3. Verify PKI card certificate
OCSP server
In the Defense Department and US federal government, expiration of digital certificates is verified on an OCSP server.
Figure 7-1
2. LDAP search using PKI card
Use the Kerberos authentication ticket acquired from Active Directory authentication to log into the LDAP server when performing an address search on an LDAP server. Since it can be accessed with a single authentication, a very easy-to-use single sign-on environment can be built.
2. Perform Active Directory authentication
1. Insert card 3. Get Kerberos authentication ticket
MFP Active Directory
4. Use Kerberos authentication ticket to log in
LDAP server
Figure 7-2
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
26
VII. PKI card authentication system
3. SMB transmission using PKI card
Use the Kerberos authentication ticket acquired from the Active Directory authentication to log into the computer of the address when sending scanned data via SMB. Since it can be accessed with a single authentication, a very easy-to-use single sign-on environment can be built. Moreover, by using the authentication ticket, since it allows for the password to not be circulated on the network, SMB transmission can be performed securely.
2. Perform Active Directory authentication
1. Insert card
MFP
3. Get Kerberos authentication ticket
Active Directory
4. Use Kerberos authentication ticket to log in
Client PC
Figure 7-3
4. E-mail transmission using PKI card (S/MIME)
Using a PKI card when sending E-mail, it is possible to implement a digital signature. By implementing a digital signature, the sender of an E-mail can be certified.
Moreover, if the address certificate is registered, it can be combined with E-mail encryption and sent. By sending the E-mail encrypted, one can prevent information leaking to a third party on the transmission path.
Eavesdropping, tampering, impersonation
Encryption and digital signature
Figure 7-4
5. PKI card print
Encrypt print data from printer driver with a PKI card, and send to MFP. Print data is stored in the PKI encryption box of the MFP, and by the same user performing PKI card authentication with MFP, it can be decrypted and printed.
Since print data can only be printed if authentication by a PKI card on the MFP succeeds, the confidentiality of data is preserved.
2. Perform Active Directory authentication
3. Print
MFP
Active Directory
1. Encrypt print data from printer driver with a PKI card, and send to MFP
Figure 7-5
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
Client PC
27
VII. PKI card authentication system
6.Scan to Me / Scan to Home
This feature allows for sending scanned data to one's own E-mail address and computer. Since one's own
E-mail address and the path of the home folder are obtained during Active Directory authentication, it can be easily sent.
Scan to Me
2. Perform Active Directory authentication
3. Obtain one's own E-mail address
1. Insert card
MFP
Active Directory
4. Send E-mail to one's own E-mail address.
The PKI card can be used to encrypt and add a digital signature.
Figure 7-6
Client PC
Scan to Home
1. Insert card
MFP
2. Perform Active Directory authentication
3. Obtain path of one's own home folder
Active Directory
4. Log in to one's own computer (using Kerberos ticket), and save scan data to home folder
Figure 7-7
Client PC
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
28
VIII. Security concerning MFP self-protection
1. Firmware verification feature
When rewriting the main MFP unit's firmware, a hash value check is run to check if the firmware data was tampered with. If the hash values don't match, an alert is issued, and the firmware is not rewritten.
In addition, if enhanced security mode is used, hash value checks are performed when the main power source is turned ON. If the hash values don't match, an alert is issued, and starting the main MFP unit is prohibited.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
29
IX. Security for CS Remote Care
1. Security when using public line (modem, fax)
The remote diagnosis system using a public line allows communicating between the MFP and CS Remote
Care (henceforth, CSRC) host to send main unit data and change main unit settings.
To communicate with the remote diagnosis system, an ID registered in advance on both the CSRC host and the device is to be used, and perform connection communication. The registered details of the CSRC host and the transmission content of the device are to be verified to if they match with this communication. And once communication terminates normally, it will from then on be possible to perform remote diagnosis communication. Remote diagnosis communication is performed after verifying the ID of each communication. If the IDs do not match at the time of communication, the communication will not be performed.
In addition, data collected by CSRC is service information such as count values, and no content is included related to fax addresses or personal information.
Device Public line CSRC host
1. Registration communication
CALL
4. After verifying ID, communication starts
5. Status notification
Center ID
Device ID
2. After verifying ID, registration is completed
3. Data request
6. After verifying ID, communication starts
Center ID
Device ID
Figure 9-1
2. E-mail security
Encrypt transmission data
Use the encryption key (common key) on the MFP and CSRC host to encrypt data.
* The encryption can be configured at the MFP and center.
With the common key encryption method, the same key is used for encryption and decryption at the main unit and center.
This allows for secure sending and receiving, without the content of E-mail being intercepted by others.
Verify ID
Information (Center ID and serial number) is included in sent and received E-mails that allows sender and recipient to be verified. This information is used to verify if the sender and recipient are correct.
In addition, an E-mail ID is assigned to E-mails sent from the center.
The E-mail ID of the responder E-mail is used for the response E-mail from the MFP.
ID will be verified with E-mail ID the center sent.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
30
IX. Security for CS Remote Care
Removing unauthorized E-mails
The sent or received E-mail is considered unauthorized data and removed in process of verifying the above
ID if the information (Center ID and serial number) for verifying the sender and recipient and the E-mail ID do not match.
3. HTTP communication security
Encrypt transmission data
The same as E-mail mentioned above, data is encrypted by using the encryption key (common key) on the
MFP and CSRC host.
•
The encryption can be configured at the main unit and CSRC host.
With the common key encryption method, the same key is used for encryption and decryption for the device and CSRC host.
In addition, SSL can be configured with HTTP communication. (HTTPS)
Using SSL, encryption is performed with the communication data of "Device <--> WebDAV server" and
"WebDAV server <--> CSRC host".
The many secure features of the HTTP protocol can be applied
HTTP protocol is not environment dependent, allowing for many secure features such as authentication,
Proxy, and SSL to be used.
SSL combines security technologies such as public key encryption, private key encryption, digital certificates, and hash functions to prevent eavesdropping on and tampering with data, as well as impersonation.
By using these secure features even at the center, security measures can be implemented that match with the client environment.
WebDAV server
HTTP
+
SSL
HTTP
+
SSL
Firewall Firewall
CSRC host Device
Figure 9-2
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
31
IX. Security for CS Remote Care
4. Product authentication
End to End data safeguarding
HTTP communication allows for reading from and writing to WebDAV servers on the Internet.
Therefore, some vulnerabilities exist on the security front such as information leaks.
In order to make the security aspect more robust, the validity is guaranteed in communication for Device
<-> WebDAV server and WebDAV server <-> CSRC host by performing client authentication of SSL in the product authentication.
Product authentication involves the license management server first issuing a unique license code to the user.
By registering the issued code to the certificate issuing server, the client certificate and server certificate can be issued to the certificate issuing server.
The client certificate used on the MFP and at the center, and the server certificate which sent to the user email address are used to configured on WebDAV to increase data safeguards on communication for
Device <-> WebDAV server and WebDAV server <-> CSRC host.
Client features
- Root certificate
Client features
- Root certificate
Certificate
CA server
Certificate
CSRC host Device
Certificate
SSL 2way Auth SSL 2way Auth
WebDAV server
Client features
- Root certificate
Figure 9-3
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
32
IX. Security for CS Remote Care
5. DCA security
SNMPv3 communication between DCA and devices
The DCA (Device Collection Agent) supports SNMPv1 and SNMPv3 communication as method of communicating with devices.
Since with SNMPv1, unencrypted data circulates on network paths, an environment in which packets may be captures from the outside is at risk of having communication data eavesdropped on.
In addition, if the "community name", the only authentication in SNMPv1 communication, is leaked at the same time, it will be possible to access all data stored on the MIB of devices managed under the leaked
"community name".
The "user name" corresponding to the community name in SNMPv1 communication and mechanisms for authentication are added to increase the robustness against access to devices in SNMPv3 communication. In addition, all data circulating on communication paths is encrypted, and as long as the same encryption methods and encryption key are not known, it is difficult to eavesdrop on data.
Communication between DCA and CSRC host
Communication between DCA and the CSRC host uses SSL on the HTTP protocol, and is encrypted.
Moreover, a unique ID is allocated to DCA, and for each communication data is transferred after this ID is verified.
If this ID does not match during communication, data transfers will not be performed.
CSRC host
HTTP + SSL
SNMPv3 communication
DCA
(Device Collection Agent)
Figure 9-4
Device
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
33
X. Security involving bizhub Remote Panel
1. Communication, connection trigger
The bizhub Remote Panel does not allow HTTP communication without encryption. Encryption with SSL is performed without fail for the communication, and HTTPS used.
Moreover, it is not possible to connect to a device from the bizhub Remote Panel Server side. Since connections can only be made from the device side, customer security is ensured.
2. Authentication
More secure communications are performed when a certificate issued by a CA (certificate authority) is assigned to the device and bizhub Remote Panel Server to perform communication.
3. Access Code
bizhub Remote Panel Server allows for multiple devices and multiple users (clients) to connect and use it at the same time. The user selects the device they would like to connect to from a list of multiple devices, and enters a 4 digit Access Code to connect. The Access Code notifies the client (serviceman, operator) permitted by the customer of the 4 digit Access Code displayed on the panel of the device in advance.
4. Audit log
The log records when the device and bizhub Remote Panel Server are connecting, and when the client
(user) begins and finishes remotely operating the device. By tracking the log, the administrator can monitor the access of bizhub Remote Panel users.
bizhub Remote Panel Server
Call centre Client
HTTPS HTTPS
Firewall Firewall
Client
(Web browser)
Operator
Device
Customer
Client
(Web browser)
Serviceman
Figure 10-1
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
34
XI. Security involving bizhub Remote Access
<Overview>
By installing bizhub Remote Access to a smartphone or tablet device from GooglePlay or the AppStore, the main unit panel screen of the multifunction printer connected through the network can be remotely displayed on the screen of the smartphone or tablet device. By touch operating the main unit panel screen displayed on the terminal, the multifunction printer can be remotely operated.
1. Communication, connection trigger
The MFP rejects remote connection from bizhub Remote Access as long as the bizhub Remote Access function is not enabled. It thus prevents unpermitted MFPs from being remotely operated.
bizhub Remote Access
Feature enabled
Available to connect
Not available to connect
Available to connect bizhub Remote Access
Feature disabled bizhub Remote Access
Feature enabled
Terminal (connection screen)
Figure 11-1
2. Automatic disconnect from timeout
If left standing by for a long time during a remote connection with bizhub Remote Access, the MFP will automatically disconnect from bizhub Remote Access, safeguarding users separated from the terminal during remote operation.
3. Security in administrator mode
The MFP offers safeguards in administrator mode by rejecting remote connection from bizhub Remote
Access.
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
35
Ⅺ
. Security involving bizhub Remote Access
4. Security following a disconnection during remote operation
If bizhub Remote Access is disconnected during remote operation, by resetting the screen, the MFP ensures security even when viewing a password protected box or entering a password.
<Connected> <disconnected>
MFP (during remote operation) MFP (reset)
Terminal (During remote operation on box screen)
Figure 11-2
Terminal (connection screen)
5. Security when using both user authentication and department authentication
When bizhub Remote Access is trying to connect to an MFP while authenticating a user or authenticating a department, the MFP will reject connections from bizhub Remote Access.
Moreover, if bizhub Remote Access is disconnected from the MFP during authentication, the MFP automatically logs out.
These features provide safeguards for authenticated users and authenticated departments.
Available to connect
Not available to connect
Terminal (Connection screen)
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
Figure 11-3
MFP (log out)
MFP (logging in)
36
XII. Security for CSRA (CS Remote Analysis)
<Overview>
CSRA regularly collects sensor data of the copying machine. The system analyzes the collected data to analyze and predicts bugs and predicts part life. When maintenance is performed, bug cause analysis and countermeasures can be prepared before the visit, allowing for smooth maintenance work.
In addition, data collected by CSRA is machine control information such as sensor data values, and no content is included related to personal information.
Setup by a serviceman is needed to turn ON CSRA features.
1. HTTP communication security
CSRC communication must be established in advance in order to perform communication with CSRA. The
CSRC connection verifies whether the connected devices are correct.
One-way communication
Only one-way communication in which data is sent regularly to the specified server from the main MFP unit is supported. No feature is provided for accepting communication requests from external servers.
Encrypt transmission data
SSL can be configured with HTTP communication. (HTTPS)
Using SSL, encryption is performed with the communication data of "Device <-> WebDAV server" and
"WebDAV server <-> CSRC host".
The many secure features of the HTTP protocol can be applied
HTTP protocol is not environment dependent, allowing for many secure features such as authentication,
Proxy, and SSL to be used.
SSL combines security technologies such as public key encryption, private key encryption, digital certificates, and hash functions to prevent eavesdropping on and tampering with data, as well as impersonation.
By using these secure features even at the center, security measures can be implemented that match with the client environment.
WebDAV server
HTTP
+
SSL
HTTP
+
SSL
Firewall Firewall
CSRC host Device
Figure 12-1
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
37
XIII. Security concerning MFP integrated SaaS GW
<Overview>
MFP integrated SaaS GW is formed from integrating the Gateway function that links the Konica Minolta cloud and office devices, and is implemented in connection with HTTPS and XMPP communication features.
MFP integrated SaaS GW provides the following functions.
•
Provides services in the cloud and two-way real-time communication
•
Manages the local devices which can be specified from services in the cloud
In order to turn ON MFP integrated SaaS GW functions, a serviceman or administrator needs to configure it.
Cloud service
SaaS Application
1. Connection request to device
4. Transmit Message
SNMP
3. Establish
HTTP Tunneling
User network environment
1. Send message to device
MFP embedded
SaaS GW
Firewall
KM Core MFP
Figure 13-1
1. Communication between SaaS GW and the cloud
Connection information of the cloud service is registered in advance to the MFP.
Moreover, corresponding information is saved and managed on the cloud side as well.
By verifying the other device two-way, and specifying the recipient in this way, the risk of false connections from impersonation or tampering on the communication path is eliminated.
Register connection information in MFP
•
1. Obtain verification key
Tenant ID
from cloud.
•
Verification Key
1. Save connection information like verification key by operation panel, PSWC or USB import in MFP.
Cloud service
MFP embedded
SaaS GW
Firewall
•
Tenant ID
•
Verification Key
•
Cloud URL
MFP
Figure 13-2
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
38
XIII. Security concerning MFP integrated SaaS GW
2. Communication protection and encryption
The communication between the SaaS GW and the cloud service is HTTTPS, and data for authentication is encrypted using a RSA private key.
3. Preventing impersonation
When registering SaaS GW to the cloud, notify the cloud of the Tenant ID and verification key from the SaaS
GW, and after crosschecking the data on the cloud side, send the GW ID and private key to the SaaS GW.
The corresponding list of the GW ID and private key is managed on the cloud side.
Then, SaaS GW uses the private key at the start of communication with the cloud to send the encrypted data for authentication and GW ID, and the cloud determines whether the recipient is authorized by decrypting it with the private key corresponding to the GW ID.
1. Register SaaS GW to cloud
•
Tenant ID
•
Verification key
•
GW ID
•
Private key
3. Notify GW ID and private key generated in cloud to MFP embedded
SaaS GW
Cloud service
MFP embedded
SaaS GW
2. Generate GW ID and private key based on notified information
1. Notify Tenant ID and verification key to cloud
Firewall
4. Save GW ID and private key in MFP
•
•
•
•
Tenant ID
Verification key
GW ID
Private key
MFP
Figure 13-3
2. At the start of communication to cloud
Cloud service
•
GW ID
•
Private key
4. Notify verification result
3. Decrypt verification data an verify sender’s
SaaS GW is registered
2. Notify GW ID and verification data to cloud
Firewall
1. Generate authentication data
MFP embedded
SaaS GW with private key
•
GW ID
•
Private key
MFP
Figure 13-4
Security White Paper
Copyright © 2004 Konica Minolta, Inc. All Rights Reserved.
39
Konica Minolta Security Technical Support Paper Version 9.0.0 Attachment Sheet
Function List for each mode
<Color MFP>
CF2002/3102
I. Security for pay phone lines
1. Security for FAX lines
2. Enter the address twice
3. Chain dial
4. Address confirmation screen displaye
5. Multiple addresses prohibited
6. Version Transmission to verify destination device
II. Security for LAN connection
1. Handling network protoco
2. User authentication
3. Device management security through the networ
(1) Security when registering whole address boo
(2) bizhub OpenAP
4. Encryption of data communication
5. Quarantine network suppor
6. Two-way certificate verification
7. Dealing with viruses
8. Dealing with external viruses on USB memory
9. Routine monitoring of Linux kerne
10. Separating from USB I/F path
III. Security for data in main MFP uni
1. Security for image processing and output processin
2. User authentication
(1) Authentication function by external server and devic
(2) Management of upper limitation of copy/print per use
(3) Management of authentication and upper limitation by color and B/W
3. Box security and utilization
4. Complete data deletion when discarding HD
5. Protecting HDD data by password and encryptio
6. Access management with audit lo
7. Encrypting PDF files
8. Encrypting E-mail data
9. Signature feature for E-mai
10. Scan to Me, Scan to Home & Scan to Authorized Folde
11. Feature for overwriting and deleting HDD dat
12. Using a certified encryption module
13. Protecting data with TPM
*1
Yes
Yes
Yes
Yes
Yes*2
Yes
IV. Output data security
1. Copy Protect feature
(1) Copy protection print feature
(2) Copy guard feature / Password copy featur
V. Authenticator
1. Security for data involved with biometric authenticato
2. Authentication and print (one-touch security print
VI. Feature extensions through linking with PageACSES
1. Authentication scan
2. Authentication Print
3. File security (Only PageACSES Pro)
C350
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes*2
Yes
Yes
Yes
Yes
Yes
Yes*4
C450
Yes
-
Yes
Yes
Yes
Yes
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
Yes*3,4
Yes
Yes
Yes*4
C450P
-
-
-
-
-
-
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
-
Yes
Yes*3,4
Yes
Yes
Yes*4
C351
Yes
-
Yes
Yes
Yes
Yes
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
Yes*3,4
Yes
Yes
Yes*4
C250/252/352 C250P/252P/352P
Yes
-
Yes
Yes
Yes
Yes
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
Yes*3,4
Yes
Yes
Yes
Yes*4
-
-
-
-
-
-
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
-
Yes
Yes*3,4
Yes
Yes
-
Yes*4
C300
Yes
-
Yes
Yes
Yes
Yes
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
Yes*3,4
Yes
Yes
Yes
Yes*4
VII. PKI card authentication system
1. Log-in using PKI card
2. LDAP search using PKI card
3. SMB transmission using PKI card
4. E-mail transmission using PKI card (S/MIME
5. PKI card print
6. Scan to Me / Scan to Home
VIII. Security concerning MFP self-protection
1. Firmware verification feature
IX. Security for CS Remote Care
1. Security when using public line (modem, FAX
2. E-mail security
3. HTTP communication security
4. Product authentication
5. DCA security
X. Security involving bizhub Remote Pane
1. Communication, connection trigger
2. Authentication
3. Access Code
4. Audit log
XI. Security involving bizhub Remote Access
1. Communication, connection trigge
2. Automatic disconnect from timeou
3. Security in administrator mode
4. Security following a disconnection during remote operatio
5. Security when using both user authentication and department authenticatio
Yes
Yes*13
Yes
Yes*13
Yes
Yes*13
Yes
Yes*13
Yes
Yes*13
Yes
Yes*13
XII. Security for CSRA (CS Remote Analysis)
1. HTTP communication security
XIII. Security concerning MFP integrated SaaS GW
1. Communication between SaaS GW and the clou
2. Communication protection and encryptio
3. Preventing impersonation
(Reference)
HDD encryption Algorithm (AES 128bits Yes Yes Yes Yes Yes Yes
*1: Some ports cannot be closed
*2: "Encryption function of data in HDD" is not supported. Data processed by Scan to HDD is compressed by general format. Only management data is deleted when job data is output or transferred, and the data itself is not d
*3: Only when equipped with Security K
*4: Because it depends on version, please use the latest on
*5-1: Because it depends on version, please use the latest on
*5-2: Because it depends on version, please use the latest on
*6: It is necessary to switch in the user settings. Because it depends on version, please use the latest o
*7: Ipsec, Ipv6 not supported
*8: HDD not supported
*9: Possible through Account Track function
*10: C652/552:Because it depends on version, please use the latest on
*11: It is necessary to apply a special firmware of PKI-enable
*12: Property for protection in HDD(Image Data and Authentication Data is encrypted. C35 depends on version, please use the latest o
*13: SNMPv3:Because it depends on version, please use the latest one
*14: Three program destinations can be registered from PageScope Web Connection (administrative privilege). The function to import/export destinations is unsuppo
*15: Only Compulsory Memory Receive Box is possible. Entry of administrator password is required for operati
*16: Transmitting and receiving e-mails is unsupported
*17: Because it depends on version, please use the latest on
*18: Only authentication by IC card + password.External server authentication is available when using intermediate server ,(PageScope AuthenticationMana
*19: Only when equipped with HDD
*20: Supports the function of some
*21:Because it depends on version, please use the latest on
C3850/C3350
**1 :Because it depends on version, please use the latest on
**2 :Because it depends on version, please use the latest on
8050/C500
-
-
-
-
-
Yes
Yes
Yes
Yes
Yes
C550/451/650
Yes
Yes
Yes
Yes
Yes
Yes
C353/253/203
Yes
Yes
Yes
Yes
Yes
Yes
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes
Yes
Yes
Yes
Yes
Yes
Yes*5-1
Yes*5-2
Yes
Yes
Yes
Yes
Yes
Yes
Yes*5-1
Yes*5-2
Yes
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes
Yes
Yes
Yes
C200 C652/552/452
Yes
Yes
Yes
Yes
Yes
Yes
Yes*6 Yes
Yes*6 Yes
C360/280/220 C652DS/552DS
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
-
Yes
Yes*7
Yes
Yes*8
Yes*9
Yes*9
-
-
-
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*12
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
C35
Yes
Yes
Yes
Yes
Yes
Yes
Yes
-
Yes
Yes
Yes
Yes
Yes*10
Yes
Yes
Yes
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
C754/654
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
C554/454
Yes
Yes
Yes
Yes
Yes
Yes
C364/284/224
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
*14
Yes
Yes
Yes
Yes
Yes
Yes*3
C353CS
Yes
Yes*15
Yes
Yes*3
*16
*16
C554e/454e/364e
/284e/224e
Yes
Yes
Yes
Yes
Yes
Yes
C754e/654e
Yes
Yes
Yes
Yes
Yes
Yes
C3850/C3350
Yes
Yes
Yes
Yes
Yes*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*17
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*21
Yes
Yes
Yes
Yes
Yes
Yes
Yes*12
Yes
Yes
Yes
Yes
Yes*2
Yes*2
Yes*2
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
C3110
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*19
Yes
Yes
Yes*19
Yes*19
Yes*19
Yes
Yes
Yes
Yes
Yes*18*19
Yes*19
Yes*19
Yes
Yes*12
Yes
Yes
C3100P
Yes
N/A
Partially*20
Yes*19
Yes*19
Yes*19
Yes
Yes
Yes
Yes*18*19
Yes*19
Yes*19
Yes
Yes*12
Yes
Yes
C368/C308/C25
8
Yes
Yes
Yes
Yes
Yes
Yes
C287/C227
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
C3851/C3351/
C3851FS
Yes
Yes
Yes
Yes
Yes
Yes
C658/C558/C45
8
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes Yes*19 Yes*19
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*21
Yes*21
Yes*21
Yes*21
Yes*21
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*21
Yes*21
Yes*21
Yes*21
Yes*21
Yes*1
Yes*1
Yes*1
Yes*1
Yes*1
Yes*1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes(AES256) Yes(AES256) Yes(AES256) Yes(AES256) Yes(AES256)
○(
AES256)
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
○(
AES256)
○(
AES256)
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
○(
AES256)
Konica Minolta Security Technical Support Paper Version 9.0.0 Attachment Sheet
Function List for each mode
<B/W MFP>
I. Security for pay phone lines
1. Security for FAX lines
2. Enter the address twice
3. Chain dial
4. Address confirmation screen displayed
5. Multiple addresses prohibited
6. Version Transmission to verify destination device
II. Security for LAN connection
1. Handling network protoco
2. User authentication
3. Device management security through the network
(1) Security when registering whole address book
(2) bizhub OpenAP
4. Encryption of data communication
5. Quarantine network support
6. Two-way certificate verification
7. Dealing with viruses
8. Dealing with external viruses on USB memory
9. Routine monitoring of Linux kerne
10. Separating from USB I/F path
III. Security for data in main MFP uni
1. Security for image processing and output processing
2. User authentication
(1) Authentication function by external server and devic
(2) Management of upper limitation of copy/print per use
(3) Management of authentication and upper limitation by color and B/W
3. Box security and utilization
4. Complete data deletion when discarding HDD
5. Protecting HDD data by password and encryption
6. Access management with audit log
7. Encrypting PDF files
8. Encrypting E-mail data
9. Signature feature for E-mail
10. Scan to Me, Scan to Home & Scan to Authorized Folder
11. Feature for overwriting and deleting HDD data
12. Using a certified encryption module
13. Protecting data with TPM
IV. Output data security
1. Copy Protect feature
(1) Copy protection print feature
(2) Copy guard feature / Password copy feature
V. Authenticator
1. Security for data involved with biometric authenticato
2. Authentication and print (one-touch security print
VI. Feature extensions through linking with PageACSES
1. Authentication scan
2. Authentication Print
3. File security (Only PageACSES Pro)
VII. PKI card authentication system
1. Log-in using PKI card
2. LDAP search using PKI card
3. SMB transmission using PKI card
4. E-mail transmission using PKI card (S/MIME
5. PKI card print
6. Scan to Me / Scan to Home
VIII. Security concerning MFP self-protection
1. Firmware verification feature
IX. Security for CS Remote Care
1. Security when using public line (modem, FAX)
2. E-mail security
3. HTTP communication security
4. Product authentication
5. DCA security
X. Security involving bizhub Remote Pane
1. Communication, connection trigger
2. Authentication
3. Access Code
4. Audit log
XI. Security involving bizhub Remote Access
1. Communication, connection trigger
2. Automatic disconnect from timeout
3. Security in administrator mode
4. Security following a disconnection during remote operation
5. Security when using both user authentication and department authenticatio
Di2510/3010/3510 7222/7228/7235
Yes
Yes
Yes
Yes
Yes
Yes
Yes*2
Yes
Yes
Yes
Yes
Yes
-
-
Yes
-
-
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
7322
Yes
-
-
Yes
-
-
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
7145, Di451
Yes
-
-
Yes
-
-
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*4
Yes
Yes
7255
-
-
Yes
Yes
Yes
Yes
Yes
Yes
Yes
7272
-
-
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
160/161/1611/162
/180/210/163/181
/211/220
200/250/350/362
/282/222
Yes
- -
-
-
-
-
Yes
Yes*7
Yes
Yes
Yes
Yes
Yes
Yes*7
Yes*8
Yes*9
*1
Yes
Yes
*5
Yes*10
Yes
Yes
Yes
Yes
Yes
Yes*3
Yes*6
Yes
Yes
Yes*18
360/420/500
XII. Security for CSRA (CS Remote Analysis)
1. HTTP communication security
XIII. Security concerning MFP integrated SaaS GW
1. Communication between SaaS GW and the cloud
2. Communication protection and encryption
3. Preventing impersonation
(Reference)
HDD encryption Algorithm (AES 128bits)
Yes
*1: Some ports cannot be closed.
*2: "Encryption function of data in HDD" is not supported. Data processed by Scan to HDD is compressed by general format. Only management data is deleted when job data is output or transferred, and the data itself is not delete
*3: "Limitation per user "is not supported
*4: Di451 does not support.
*5: SSL supported.
*6: Because it depends on version, please use the latest one
*7: Possible for multiple destinations
*8: Because it depends on version, please use the latest one
*9: Because it depends on version, please use the latest one
*10: Ipsec, Ip v6 not supported.
*11: HDD data is encrypted only when Security Kit option is equipped
*12: Because it depends on version, please use the latest one
*13: Because it depends on version, please use the latest one
*14: Because it depends on version, please use the latest one
*15: Resources in HDD for protecting (Encrypt image data and authentication data)
*16: Only body authentication is supported
*17: Can be used for only specific applications
*18: Only bizhub 362/282/232 supports SNMPv3 communication
*19: Client certificate is supported
*20: Security is supported as Windows OS.
*21:Because it depends on version, please use the latest one
*22:Because it depends on version, please use the latest one
Reference 4020 / 3320
**1: Some ports cannot be closed without function reduction.
**3 Device supports upgrade of device certificate to CA signed version
**4 Custom Linux OS, with extensive protections
**5 DRAM page data is overwritten (Wiping is selectable), Automatic wiping of held jobs on hard drive, Encrypted hard drive is selectable, secure print requiring user password for release is selectab
**6 DRAM page data is overwritten, No HDD supported
**7 No network authentication, local authentication via PIN only
**8 usage restrictions selectable, limits managed via installed applicatio
**9 limited functional restrictions
**11 AES 256 encryption unique to the individual device. No password option
**12 function to be implemented via installed application
**13 No functions available, but Scan function is provided. Scan to PC uses scan profile, Scan to FTP destintations may require userID and password as specified when define
**14 Modules are FIPS capable. But not certified
**20 SNMPv1/2 and SNMPv3 support is selectable
**21 Uses VNC for communication.with selectable password option
Reference 3300P / 4000P / 4700P
***1: Some ports cannot be closed without function reduction.
***2 Settings management via device web page may utilize HTTPS/SSL
***3 Device supports upgrade of device certificate to CA signed version
***4 Custom Linux OS, with extensive protections
***6 DRAM page data is overwritten, No HDD supported
***7 No network authentication, local authentication via PIN only
***8 Access restrictions not logged to individua
***9 limited functional restrictions
***10 PIN access restrictions only from panel.
***11 AES 256 encryption unique to the individual device. No password option
***12 CA signed certificates for the device and all servers can be specified
***13 SNMPv1/2 and SNMPv3 support is selectable
***14 Uses VNC for communication.with selectable password option
***15 selectable
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
501/421/361
Yes
Yes
Yes
Yes
Yes
Yes
Yes*11
Yes
Yes
Yes Yes Yes
Yes
Yes
Yes
Yes
Yes
Yes*11
Yes
Yes Yes
Yes
Yes
Yes Yes Yes
Yes*12
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
4750/4050
****1 :Because it depends on version, please use the latest one
****2 :Because it depends on version, please use the latest one
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
600/750
Yes
Yes*7
Yes
Yes
Yes
Yes
Yes*11
Yes
Yes
Yes
Yes
Yes*11
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes(*11)
Yes
Yes
Yes
751/601
Yes
Yes
Yes
Yes
Yes
Yes
Yes*11
Yes
Yes
Yes
Yes
Yes*11
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
423/363/283/223 652/602/552/502
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*15
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
42/36
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
754/654
Yes
Yes
Yes
Yes
Yes
Yes
554e/454e/364e
/284e/224e
Yes
Yes
Yes
Yes
Yes
Yes
4750/4050
Yes
Yes
Yes
Yes
Yes****1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*21
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*12
Yes
Yes
Yes
Yes
Yes****2
Yes****2
Yes****2
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
754e/654e
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*22
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes
Yes
Yes
Yes
Yes
4020
Yes
Yes
Yes
Yes**1
Yes
Yes
Yes
Yes
Yes**3
Yes**4
Yes
Yes
Yes
Yes**5
Yes
Yes**8
Yes**8
―
Yes
Yes**11
Yes
Yes
Yes
Yes**12
**13
Yes
**14
3320
Yes
Yes
Yes
Yes**1
Yes
Yes
Yes**3
Yes**4
Yes
Yes
Yes
Yes**6
Partially **7
Yes**9
―
―
―
―
Yes
Yes
**13
―
―
―
―
―
―
―
―
3300P
―
―
―
―
―
―
Yes**1
Yes
―
× ***2
Yes ***15
Yes ***15
Yes **3
Yes **4
Yes
Yes
Yes
Yes**6
4700P/4000P 367/287/227
―
―
―
―
―
―
Yes
Yes
Yes
Yes
Yes
Yes
958/808/758
558/458/368/30
8
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes**1
Yes
―
× ***2
Yes ***15
Yes ***15
Yes **3
Yes **4
Yes
Yes
Yes
Yes**6
Partially **7
× **10
―
―
Yes **8
―
―
―
―
―
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*22
Yes*22
Yes*22
Yes*22
Yes*22
Yes****1
Yes****1
Yes****1
Yes****1
Yes****1
Yes****1
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes*22
Yes*22
Yes*22
Yes*22
Yes*22
Yes
―
―
―
―
Yes**20
**21
Yes
Yes
―
―
―
―
Yes**20
**21
Yes Yes
―
―
Yes ***15
―
―
Yes ***15
Yes **12 Yes **12
Yes ***13,***15 Yes ***13,***15
No ***14 No ***14
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes Yes(AES256) Yes(AES256) Yes(AES256)
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes(AES256) ○( AES256) ○( AES256)
Konica Minolta Security Technical Support Paper Version 9.0.0 Attachment Shee
Function List for each model
<Color/Monochrome production print machine>
PRO C6500 PRO 1050 PRO 920 PRO1200 C7000/C8000+IC-601 C7000/C8000+Fiery C7000/C8000+Creo
I. Security for pay phone lines
1. Security for FAX lines
2. Enter the address twice
3. Chain dial
4. Address confirmation screen displayed
5. Multiple addresses prohibited
6. Version Transmission to verify destination device
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
II. Security for LAN connection
1. Handling network protocol
Yes Yes Yes Yes △ *19
C7000/C8000
---
---
---
---
---
---
1250/1052/951
---
---
---
---
---
---
1250/1052/951
C1070/C1060/C1100/C1085
+IC-602
---
---
---
---
---
---
2. User authentication Yes Yes △ *16 △ *16 Yes ---
Yes
---
Yes
Yes
3. Device management security through the network
(1) Security when registering whole address book
(2) bizhub OpenAPI
4. Encryption of data communication
5. Quarantine network support
6. Two-way certificate verification
7. Dealing with viruses
8. Dealing with external viruses on USB memory
Yes
Yes
Yes
Yes
Yes
Yes
Yes
---
△ *17
Yes
---
---
Yes
Yes
---
△ *17
Yes
---
Yes*19
Yes
Yes
---
---
Yes
---
---
---
---
---
---
△
*19
---
---
---
---
---
---
Yes
---
---
Yes
Yes
---
△ *17
Yes
---
Yes
Yes
Yes
9. Routine monitoring of Linux kernel Yes
Yes
Yes
Yes
----Yes Yes
Yes
10. Separating from USB I/F path
III. Security for data in main MFP unit
1. Security for image processing and output processing
2. User authentication
(1) Authentication function by external server and device
(2) Management of upper limitation of copy/print per user
(3) Management of authentication and upper limitation by color and B/W
3. Box security and utilization
4. Complete data deletion when discarding HDD
5. Protecting HDD data by password and encryption
6. Access management with audit log
7. Encrypting PDF files
8. Encrypting E-mail data
9. Signature feature for E-mail
10. Scan to Me, Scan to Home & Scan to Authorized Folder
11. Feature for overwriting and deleting HDD data
12. Using a certified encryption module
IV. Output data security
1. Copy Protect feature
(1) Copy protection print feature
Yes
Yes
Yes
Yes
Yes
Yes
(2) Copy guard feature / Password copy feature
V. Authenticator
1. Security for data involved with biometric authenticator
2. Authentication and print (one-touch security print)
VI. Feature extensions through linking with PageACSES
1. Authentication scan
2. Authentication Print
3. File security (Only PageACSES Pro)
VII. PKI card authentication system
1. Log-in using PKI card
2. LDAP search using PKI card
3. SMB transmission using PKI card
4. E-mail transmission using PKI card (S/MIME)
5. PKI card print
6. Scan to Me / Scan to Home
VIII. Security concerning MFP self-protection
1. Firmware verification feature
IX. Security for CS Remote Care
1. Security when using public line (modem, FAX) Yes
2. E-mail security Yes
3. HTTP communication security
4. Product authentication
5. DCA security Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
△ *16
Yes
---
Yes
Yes
Yes
Yes
Yes
---
---
---
Yes
---
Yes
---
---
---
---
---
---
---
---
---
---
Yes
Yes
Yes
Yes
Yes
△ *16
Yes
Yes
---
Yes
---
Yes
Yes
---
---
---
Yes
Yes
---
---
---
---
---
---
---
---
---
---
---
Yes
Yes
Yes
Yes
---
Yes
Yes
Yes
Yes
Yes
Yes
---
△ *2
---
Yes
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
Yes
---
---
---
Yes
---
△ *2
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
---
Yes
---
Yes
Yes
---
Yes
Yes
Yes
---
---
---
---
Yes
---
---
---
---
---
---
---
---
---
---
---
---
---
Yes
Yes
Yes
---
Yes
Yes
Yes
---
---
---
Yes
---
Yes
Yes
---
Yes
Yes
Yes
Yes
Yes
---
---
---
---
---
---
---
---
---
---
---
Yes
Yes
Yes
---
Yes
X. Security involving bizhub Remote Panel
1. Communication, connection trigger
2. Authentication
3. Access Code
4. Audit log
XI. Security involving bizhub Remote Access
1. Communication, connection trigger
2. Automatic disconnect from timeout
3. Security in administrator mode
4. Security following a disconnection during remote operation
5. Security when using both user authentication and department authentication
XII. Security for CSRA (CS Remote Analysis)
1. HTTP communication security
(Reference)
HDD encryption Algorithm (AES 128bits)
*2: "Encryption function of data in HDD" is not supported. Data processed by Scan to HDD is compressed by general format. Only management data is deleted when job data is output or transferred, and the data itself is not deleted
*16: Only body authentication is supported.
*17: Can be used for only specific applications.
*19: Client certificate is supported.
*21: This function is enabled when AU201+PageScope MyPrintManager is connected
△ *17
Yes
The monitoring and analysis function for vulnerability are embedded to obtain
ISO15408.
Yes
(Temporary data erasing function)
Yes
Yes
(Tint block printing function is supported.)
Yes
(SNMPv3 is supported.)
Yes
Yes
<Degsa1st>
Main body authentication + external authentication
<Chagall 1st/Degas2nd>
Main body authentication + external authentication
+ intermediate authentication
---
△ *17
Yes
---
Yes*19
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
---
Yes
---
Yes
Yes
---
---
---
Yes
Yes
---
---
---
---
---
---
---
---
---
---
---
---
---
---
Yes
Yes
Yes
---
Yes
Yes bizhub PRESS C71hc (*22)
+IC-602
---
---
---
---
---
---
Yes
Yes
---
△ *17
Yes
---
Yes*19
Yes
Yes
Yes
Yes
---
---
---
---
---
---
---
Yes
Yes
Yes
---
Yes
---
---
---
---
---
---
---
Yes
Yes
---
---
---
Yes
Yes
Yes
Yes
Yes
---
Yes
---
Yes bizhub PRO
1100
---
---
---
---
---
---
Yes
Yes
Yes
---
---
---
---
---
---
---
Yes
Yes
Yes
---
Yes
---
---
---
---
---
---
---
Yes
Yes
---
---
---
Yes
Yes
Yes
Yes
Yes
---
Yes
Yes
Yes
---
△ *17
Yes
---
Yes*19
Yes
Yes
Yes
Yes
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project