Specifications
Print Controller Design Guide for Information Security:
Page 73 of 92
Sending Stored Image Data to the PC
• When the MFP receives a request from the Web browser to send stored image data to the PC,
WebDocBox instructs the GWWS to send the requested data. GWWS loads the requested data
from HDD memory via the MCS and then sends it to the PC via the NCS. Since Copier and Printer
documents are saved to the HDD in Ricoh-original file format, it is necessary to use the File Format
Converter to convert the data to JPEG or TIFF format.
Printing Out Stored Image Data
• When the MFP receives a request from the Web browser to print out stored image data,
WebDocBox instructs the ECS to print out the requested data. The ECS, in tandem with the IMH,
loads the requested data from HDD memory and sends it to the printing engine for printing out.
Sending Stored Image Data
• When the MFP receives a request from the Web browser to email, forward or FAX image data
stored in the MFP HDD, WebDocBox instructs either the DCS or FCS to carry out the operation.
The DCS or FCS, in tandem with the IMH, loads the requested data from HDD memory and
transmits it via the NCS or FCU.
Data Security Considerations
• As a security feature common to all Web applications, it is possible to perform access control by
allowing connection only with users who provide a specific IP address when the session is initiated.
Users who do not provide an authorized IP address are not even able to view Document Server
data. In addition, it is possible to prevent the viewing and altering of data through the use of
encrypted communication (HTTPS over SSL).
• With the use of User Authentication, it is possible to limit the conditions under which remote
operations can be performed on Document Server files. Only users who have been pre-approved
for access and clear the authentication process are allowed to perform the remote operations.
Additionally, it is possible to place limits on the specific operations that each registered user is
capable of performing. Users are unable to perform operations that have been prohibited, even if
they clear the authentication process. This prevents any potential leakage or alteration of image
data.