CANON HDD Data Encryption Kit D1 Service Manual
CANON HDD Data Encryption Kit D1 Service Manual
HDD Data
Encryption
Kit-B2
SERVICE
MANUAL
DU7-1221-000
FEBRUARY 2007
REV. 0
COPYRIGHT 2006 CANON INC. CANON HDD Data Encryption Kit-B2 REV. 0 PRINTED IN U.S.A.
Application
This manual has been issued by Canon Inc. for qualified persons to learn technical theory, installation,
maintenance, and repair of products. This manual covers all localities where the products are sold. For this reason,
there may be information in this manual that does not apply to your locality.
Corrections
This manual may contain technical inaccuracies or typographical errors due to improvements or changes in
products. When changes occur in applicable products or in the contents of this manual, Canon will release technical
information as the need arises. In the event of major changes in the contents of this manual over a long or short
period, Canon will issue a new edition of this manual.
The following paragraph does not apply to any countries where such provisions are inconsistent with local law.
Trademarks
The product names and company names used in this manual are the registered trademarks of the individual
companies.
Copyright
This manual is copyrighted with all rights reserved. Under the copyright laws, this manual may not be copied,
reproduced or translated into another language, in whole or in part, without the written consent of Canon Inc.
Caution
Use of this manual should be strictly supervised to avoid disclosure of confidential information.
Introduction
Symbols Used
This documentation uses the following symbols to indicate special information:
Symbol Description
Indicates an item requiring disconnection of the power plug from the electric outlet.
Indicates an item intended to provide notes assisting the understanding of the topic in
question.
Memo
The descriptions in this Service Manual are subject to change without notice for product improvement or other
purposes, and major changes will be communicated in the form of Service Information bulletins.
All service persons are expected to have a good understanding of the contents of this Service Manual and all
relevant Service Information bulletins and be able to identify and isolate faults in the machine."
Contents
Contents
Chapter 1 Specifications
1.1 Specifications..................................................................................................... 1-1
1.1.1 Parts Compatibility ..................................................................................................... 1-1
1.1.2 System Installation Restrictions............................................................................... 1-2
Chapter 2 Functions
2.1 Basic Function ................................................................................................... 2-1
2.1.1 HDD Encryption.......................................................................................................... 2-1
2.1.2 Common Criteria ........................................................................................................ 2-1
Chapter 3 Installation
3.1 Points to Note About Installation .................................................................... 3-1
3.1.1 Points to Note About Installation ............................................................................. 3-1
3.2 Checking components...................................................................................... 3-3
3.2.1 Checking components............................................................................................... 3-3
3.3 Installation procedure ....................................................................................... 3-4
3.3.1 Making a Backup of the Data (reference only)...................................................... 3-4
3.3.2 Guidelines for the Installation of the Encryption Board........................................ 3-7
3.3.3 Installing the Kit (TYPE-B)........................................................................................ 3-8
3.3.4 Installing the System Software Using the SST.................................................... 3-10
3.3.5 Checking the Security Version............................................................................... 3-10
3.3.6 Checking the Security Mark ................................................................................... 3-11
3.3.7 Reporting to the System Administrator at the End of the Work........................ 3-11
Chapter 4 Maintenance
4.1 Notes when service........................................................................................... 4-1
4.1.1 Suspending the security operation.......................................................................... 4-1
4.2 Reference matter in market service ............................................................... 4-1
4.2.1 Relation with Controller Board ................................................................................. 4-1
4.2.2 User data that cannot be backed up ....................................................................... 4-2
4.3 Related Error code............................................................................................ 4-3
4.3.1 E602 Description........................................................................................................ 4-3
Chapter 1
SPECIFICATIONS
Contents
Contents
1.1 Specifications........................................................................................................ 1-1
1.1.1 Parts Compatibility ........................................................................................................1-1
1.1.2 System Installation Restrictions ....................................................................................1-2
Chapter 1
1.1 Specifications
1.1.1 Parts Compatibility
0015-3525
The encryption board has a function to identify and authenticate the machine, and it is enabled only with the iR
machine at the installation.
The encryption board retains the encryption key.
Each encryption board has its own encryption key.
Only the combination of the main controller, encryption board, and HDD at the installation enables writing/
reading data.
Encryption
T-1-1
1-1
Chapter 1
In case the encryption board is newly mounted, HDD format and System software install are necessary.
1) When you use SST
Key clear using SST > HDD format > System installation
2) When you use the USB memory that downloads System software by SST
Download System software to USB memory > Set USB memory to the host machine > Key clear using SST
> HDD format > System installation
1-2
Chapter 2
FUNCTIONS
Contents
Contents
2.1 Basic Function ...................................................................................................... 2-1
2.1.1 HDD Encryption............................................................................................................2-1
2.1.2 Common Criteria ...........................................................................................................2-1
Chapter 2
Device's HDD records temporally image data like scanned images and PDL data, etc. at any time. After the
printing operation is completed, the normal operation is that only management information is deleted, so the
image data information remains on HDD. Therefore, it is concerned that HDD is taken by the third party, the
data is analyzed by accessing directly using Disk Editor, and the original data is recovered. As the
countermeasure, information is always encrypted in the areas where the data like images and PDL data are saved
temporarily. By doing so, recovering the original image data in the HDD will be too difficult.
As for the existing iR Security Kit, the function is enabled with the registration of the license key, and only the
area users use are encrypted.
As for the HDD Encryption Kit, instead of the license option form, the encryption board encrypts all data
recorded in HDD.
Products evaluated based on ISO/IEC15408 (a.k.a. Common Criteria) and of which safety is certified by
certification body of the country are recognized as certified products in that country.
Encryption chip used for HDD data encryption kit is to be certified as a product of which safety as an IT product
is authorized internationally by CCRA (Common Criteria Recognition Arrangement)
Outline of CC Certification
Manufacturer is to apply for a product in concern to CC certified body.
The product is reviewed by the certified body.
If the product passes the review, manufacturer can obtain a certificate.
Certified product is recognized as such in countries which employ CCRA.
Reference:
Certified products can be seen in the URL below (as of 4th Aug 2006)
Inside Japan
http://www.ipa.go.jp/security/jisec/link.html
Outside Japan
http://www.commoncriteriaportal.org/public/consumer/index.php
Canon MFP Security Chip 1.00
2-1
Chapter 3
INSTALLATION
Contents
Contents
3.1 Points to Note About Installation .................................................................... 3-1
3.1.1 Points to Note About Installation ............................................................................. 3-1
3.2 Checking components...................................................................................... 3-3
3.2.1 Checking components............................................................................................... 3-3
3.3 Installation procedure ....................................................................................... 3-4
3.3.1 Making a Backup of the Data (reference only)...................................................... 3-4
3.3.2 Guidelines for the Installation of the Encryption Board........................................ 3-7
3.3.3 Installing the Kit (TYPE-B)........................................................................................ 3-8
3.3.4 Installing the System Software Using the SST.................................................... 3-10
3.3.5 Checking the Security Version............................................................................... 3-10
3.3.6 Checking the Security Mark ................................................................................... 3-11
3.3.7 Reporting to the System Administrator at the End of the Work........................ 3-11
Chapter 3
A security sticker is attached to the kit package to indicate that the package has not been opened.
Check to see that the package has not been opened in any way and the sticker is not torn.
If the package appears to have been opened or the sticker is torn, check to be sure that the user has done so
intentionally.
The following will result in the loss of user data stored on the hard disk.
-Regenerating the Data Encryption Key
Before performing work that will result in the loss of data, inform the system administrator of the inevitable
loss, asking him to make a backup of important data items.
Unless otherwise instructed, backup work must not be performed by the service person because of security
considerations.
T-3-1
3-1
Chapter 3
*1 Can only be backed up using the Remote UI or Device Information Delivery Settings mode.
*2 Depending on the MEAP application.
*3 The following data are backed up.
-User Inboxes specification settings(Register Inbox Name, Password, Time until Document Auto Erase, Print
upon storing from the printer driver)
-Image data of User Inboxes documents
-Setting information of User Inboxes documents
-Confidential Fax Inbox specification settings(Register Inbox Name, Password)
-Image data of Confidential Fax Inbox, Memory RX Inbox and Register Form for Form Composition Image
Data
- Data that the user can back up are shown in the table below.
T-3-2
3-2
Chapter 3
-If user authentication has been performed using SDL (simple device login) or SSO (single sign-on) before
installing the encryption board, it is important to select the appropriate login service after restarting the machine.
[1] [2]
3-3
Chapter 3
These data items are property of the user, and the restoration work must be performed by the system
administrator.
The method of installation is described in the User Guide. See Table T-1-2 (for data items that may be backed
up) of the Installation Procedure.
Backup using the import/ export function of Remote UI.
Note:
Exporting the transfer settings will export all contents of the address book. In other words, there is no need
for a backup unless it needs to be done individually.
1) Make the settings of the parent unit (transmission side). Register the destinations to distribute the device
information to the parent unit. Select Additional Function > System Setting > Device Information Delivery
Setting> Register Destination.
2) Register a destination by manual input or automatic search. Select the destination you want to register from
the search results in the case of automatic search, and then press OK.
3) Verify the setting status of the device information distribution end. Check the setting status of a sub unit from
the parent unit to see if distribution can be done.
3-4
Chapter 3
4) Make the settings of manual distribution. Conduct this operation after confirming that the sub unit is not used
by network or local UI.
5) Select Additional Function > System Setting > Device Information Delivery Setting > Manual Delivery.
Set ON to the settings you want to distribute among Add Function Settings Value, Dept ID, and Address
Book, and then press Next. When you select Address Book, the settings of Forwarding Setting and Favorites
Button are also distributed.
6) Select the destination and press Start manual distribution, and the device information is distributed to the
specified destination. When distribution is completed, check the distribution result.
When a system administrator ID is registered, the device cannot receive information using the device
information distribution function. When receiving the device information, delete a system administrator ID
temporarily and re-register it immediately after the information is received.
The overview of stop of MEAP applications, invalidation of the license, and procedures to download an invalid
license file is described below. For more information, see MEAP SMS Administrator Guide.
6. Stop of MEAP Applications, Invalidation, Download of an Invalid License File, Uninstallation
1) Select the URL given below and access SMS.
http:// [IP address of the device]:8000/sms/
The default password is MeapSmsLogin. If the user has changed the password, ask him/her to change the
password again after the security operation is started.
2) Select the radio button of the application you want to stop in the application list, and click Stop.
3) Click the application of which license has been installed to access the application/ license information
page.
4) Click license control, and then click invalidate. Click OK in a confirmation window for license
invalidation.
5) Click download in download/ delete of an invalid license file. Following the instructions on the window,
specify the location to save the file. Set a distinctive name to the invalid license file so that you can recognize
it is for which application. When you download the invalid license file to your PC, click Delete. Click OK in
a confirmation window for license deletion.
6) Return to the application list page, select the radio button of the application you want to uninstall, and then
click uninstall. Click OK in a confirmation window for uninstallation. If there are several applications, repeat
the procedures 1) to 6).
7) After the security operation is started, re-install the application using an application file (jar file) of each
application from SMS and the backup invalid license file (lic file).
3-5
Chapter 3
7. User Authentication Information Registered by SDL (Simple Device Login)/ SSO (Single Sign-ON)
In the case that the MEAP login application has been changed to SDL/SSO, there is a need to make a backup of
the user authentication information.
1) Access the URL given below.
http:// [IP address of the device] :8000/sdl/
http:// [IP address of the device] :8000/sso
2) Login with the user name and password registered as an administrator in SDL/SSO.
The default administrator user ID and password are as follows:
User ID: Administrator
Password: password
3) Click User Control.
4) Put a check to Select All, and then click Export.
5) Leave the file format and character code as defaults and click Start.
6) Following the instructions on the window, specify the location to save the file.
If the language setting in the common specification settings (Additional Function ) is set to ON, 'host address'
and 'path to folder' might not be displayed correctly or cannot be referred.
- Regarding the method of inputting characters, see 'Chapter 2 Major Functions and Basic Operations' in the
Users Guide.
- A host address can be up to 128 character in 1 byte or 64 characters in 2 bytes using the 'Kana-Kanji,'
'Katakana,' 'alphabetic character,' 'mark,' and 'code input' modes.
- A path to the folder can be up to 255 characters in 1 byte (127 characters in 2 bytes).
- A user name can be up to 128 character in 1 byte or 64 characters in 2 bytes using the 'Kana-Kanji,' 'Katakana,'
'alphabetic character,' 'mark,' and 'code input' modes.
- A password can be up to 14 characters using the 'alphabetic character' and 'mark (1 byte)' modes.
- The voice sound symbol and the semi-voice sound symbol entered in the 'katakana (1 byte)' mode are counted
up as one 1-byte character.
- If any of the host IP address, user name, password, or path to the folder is not correctly entered, a backup cannot
be made.
- Set the number of users accessible to the folder to '2' or higher, or 'no restriction.' If the maximum number of
users is set to [1], restoration cannot be done properly.
- If the [BOX] folder or the [BOX.temp] folder created from the past backup remains in the location specified
in [Path to Folder], the backup operation is not conducted properly. Delete these folders or change their
names in advance.
3-6
Chapter 3
- When restoration is executed, all documents and form images of image composite in the Memory RX Inbox
and Confidential Fax Inboxes are deleted.
- When restoration is executed, the following items are initialized.
- The name and password of a fax box
- The reception number of a box document
The HDD in an Host machine may be either a 2.5-inch or 3.5-inch type, each calling for a different method
of connecting signal and power cables. Details are as follows:
1. 2.5-Inch HDD Type
The 2.5-inch HDD provides a single connector for both signals and power. Connect the connector or cable
so that the signals will flow as follows: 2.5-inch HDD>encryption board>controller board.
If the space inside the Host machine does not allow direct connection to the connector on the encryption
board, a signal cable must be used.
2. 3.5-Inch HDD Type
The 3.5-inch HDD provides a signal connector and a power connector.
For signals, connect the encryption board signal cable to the HDD so that the signals will flow as follows:
3.5-inch HDD>encryption board>controller board.
Connect the signal cable to the encryption board and the controller.
For power, connect a relay connector to the connector used to supply the 3.5-inch HDD with power, making
sure that the power will flow as follows: controller board>3.5-inch HDD>encryption board.
----------
Location of the Encryption Board
If a connector for connection of a 2.5-inch HDD is found on the encryption board, connect the cable to the HDD
and secure it in place on the encryption board.
If the encryption board and the 3.5-inch HDD need to be connected by means of a cable, be sure to route it as
follows: HDD>encryption board>connector on the controller (to which the HDD is connected); then, secure the
HDD in place on the HDD support plate.
For both cases, be sure the connections are as follows: HDD>encryption board>controller board.
If the HDD of the Host machine is secured in place using mounting screws, place the encryption board so both
signal and power lines may be arranged appropriately.
3-7
Chapter 3
F-3-1
F-3-3
3-8
Chapter 3
3) Remove the 4 screws [1]. Detach the HDD [2] 5) Connect the connector of the encryption board to
from the mounting plate. that of the main controller board.
At this time, fit the hook [1] of the encryption board
[1] [2] on the mounting plate hook [2] of the main controller
board.
[2] [1]
[1]
F-3-4
[1]
F-3-7
[3]
[2]
F-3-5
F-3-8
[1]
7) Put the parts you have removed back in place.
[3]
[3]
[2]
F-3-6
3-9
Chapter 3
3-10
Chapter 3
The user may check the security mark appearing on the control panel when using the Host machine to be sure
that an appropriate level of security is being maintained. The mark appears when the machine is equipped with
an encryption board and the board is operating correctly.
If multiple encryption boards have been installed, the mark indicates that all boards are operating correctly.
The Refarence Guide provides the following in connection with the security mark:
If the HDD Data Encryption Kit is operating normaly, the security mark( )is displayed in the following
position of the screen.
Security Mark
F-3-10
When you have completed all installation work, report to the system administrator for the following:
-inform him that you have added the appropriate security functions, and have enabled them.
-make sure that he knows what to do in the event that these functions fail, i.e., make a service call.
Successful Completion of the Installation Work
Ask the system administrator to make sure that '1.00' is indicated for 'Canon MFP Security Chip' as the version
of the security chip. (Refer to the description on how to check the version, and check the device composition
displayed in the control panel.)
Maintenance of the Security Functions
Be sure that the system administrator is aware of the importance of making sure that the security functions
are maintained each time the Host machine is started by referring to the security mark discussed previously.
3-11
Chapter 4
MAINTENANCE
Contents
Contents
4.1 Notes when service........................................................................................... 4-1
4.1.1 Suspending the security operation.......................................................................... 4-1
4.2 Reference matter in market service ............................................................... 4-1
4.2.1 Relation with Controller Board ................................................................................. 4-1
4.2.2 User data that cannot be backed up ....................................................................... 4-2
4.3 Related Error code............................................................................................ 4-3
4.3.1 E602 Description........................................................................................................ 4-3
Chapter 4
When stopping the security operation, go through the followings to return to the default status at shipment.
-Dismount the encryption board
-Format the HDD and install the system
Points to note for suspending the security operation are shown below.
-Since all the data within the HDD are initialized, data back-up is required prior to the operation. Refer to the
Installation Procedure to back-up the data.
-For returning to the security operation, mount the encryption board by following the Installation Procedure.
Performance
Encryption and decryption are performed by encryption board. Main controller is not engaged in the HDD
encryption function.
Owing to the hardware configuration, the system is free of a drop in performance, common with previous iR
Security Kits.
The key used for coding and decoding can be generated in user mode screen with previous iR Security Kits.
With HDD Encryption Kits, there are keys in encryption board and HDD with mechanism to auto generate upon
installation.
There is no need to aware of the existence of the key upon implementation because the key cannot be taken out
from the iR machine.
In the case that users request regenerate of the key that is used in encryption board, execute the following service
mode.
At service mode level 2, make the following selections: COPIER>FUNCTION>CLEAR>KEY-CLR; and then
push down [OK] to clear the encryption key.
As well as the installation of encryption board, make sure to back up necessary user data before execution
because all of the HDD data will not be read once cleaning the encryption key.
Encryption Key
Generally when executing data encryption, encryption key is used as electronic information.
This electronic key is generated in encryption board, and there is no way of storing externally.
Encryption board has a mechanism to check automatically whether the combination of the encryption board and
the HDD encryption key is correct upon installation of iR system.
If the encryption key is a mismatch, iR machine fails to start up because of reading failure of the HDD data.
4-1
Chapter 4
The following table shows examples of measures for the user data that cannot be backed up, which was
explained in the points to note for the user mode setting.
It is desirable to explain the measures to a user and ask him/her to implement them.
T-4-1
4-2
Chapter 4
Reference:
There is no relationship between "key pair (used by SSL) and server certification registered in the system
management setting" and a key used for HDD encryption. Without a key pair, HDD encryption is normally
performed.
E602 is an error code used to indicate the presence of an error on the hard disc. In the case of HDD data
encryption, the encryption board is connected to IDE target. It is rather difficult to identify as an HDD error.
Detailed code is assigned as 200x.
T-4-2
E602- Mismatch of Mismatch in On start- Mismatch of the encryption board. The encryption
2001 the encryption which the up board is not recognized correctly. Although the
board encryption hardware is connected correctly, the encryption key is
board is not not saved.
recognized Try to clear the encryption key in the service mode.
correctly At the service mode level 2;
COPIER>FUNCTION>CLEAR>KEY-CLR
E602- Device error Encryption On start- Check the connection between the encryption board
2002 board failure up and HDD, and between the encryption board and the
main controller.
Try to clear the encryption key in the service mode.
At the service mode level 2;
COPIER>FUNCTION>CLEAR>KEY-CLR
By replacing the encryption board or HDD, check if
it behaves normally.
4-3