Specifications
Print Controller Design Guide for Information Security:
Page 77 of 92
The NCS module communicates with the @Remote Center via the host I/F over an SSL
connection. Both the MFP/LP and @Remote center perform a bi-directional, digital
certificate-based SSL authentication process to verify that the other is a valid @Remote
communication terminal, after which the NRS module accesses the DESS module and compares
the @Remote Center ID information sent from the center with the ID information already stored in
the MFP/LP. (As the @Remote Center ID is unique, each MFP/LP is only able to connect to one
@Remote Center). If both judge that the other is the legitimate communication terminal, SSL
encrypted communication is established, whereby the MFP/LP sends the relevant information to
the @Remote Center in an encrypted state via the host I/F.
When the MFP/LP communicates with the @Remote Center as a server (e.g. taking a counter
reading)
In order to enable the MFP/LP to poll the @Remote Center, the NRS module sends the necessary
polling information to the NCS module. The NCS module then communicates with the @Remote
Center via the host I/F over an SSL connection. The authentication process is the same as
described in the paragraph above.
Requests from the @Remote Center sent as polling responses are received by the NRS module.
After this, the NRS module obtains more detailed information via the SCS and then converts it into
a special format for transmission to the @Remote Center. Finally, the data is SSL-encrypted and
then sent to the @Remote Center via the NCS module.
Data Security Considerations
• As mentioned above, communication between the MFP/LP and RC Gate is conducted on an
SSL-encrypted communication path. Since digital certificate-based authentication takes place
before any data exchange is performed, this ensures that RC Gate is the only remote device to
which the MFP/LP can be connected.
• The MFP/LP’s digital certificate for the @Remote function is embedded in the MFP/LP during the
last stage of factory assembly.
• With the use of SSL communication, symmetric key cryptography ensures that the data being
transferred cannot be leaked to third parties. Security is increased even further by the fact that the
symmetric key used is not a static key, but rather one that is generated every time a new session is
initiated.