Canon iRC2570, iR5570, iR5870C, iRC3170, iRC3100 ir security kit-a2 Service Manual

...
Service Manual
Canon BW iR Security Kit-A2
Feb 10 2005
Application
This manual has been issued by Canon Inc. for qualified persons to learn technical theory, installation, maintenance, and
repair of products. This manual covers all localities where the products are sold. For this reason, there may be
information in this manual that does not apply to your locality.
This manual may contain technical inaccuracies or typographical errors due to improvements or changes in products.
When changes occur in applicable products or in the contents of this manual, Canon will release technical information
as the need arises. In the event of major changes in the contents of this manual over a long or short period, Canon will
issue a new edition of this manual.
The following paragraph does not apply to any countries where such provisions are inconsistent with local law.
Trademarks
The product names and company names used in this manual are the registered trademarks of the individual companies.
Copyright
This manual is copyrighted with all rights reserved. Under the copyright laws, this manual may not be copied,
reproduced or translated into another language, in whole or in part, without the written consent of Canon Inc.
COPYRIGHT © 2001 CANON INC.
Printed in Japan
Caution
Use of this manual should be strictly supervised to avoid disclosure of confidential information.
Symbols Used
This documentation uses the following symbols to indicate special information:
Symbol Description
Indicates an item of a non-specific nature, possibly classified as Note, Caution, or Warning.
Indicates an item requiring care to avoid electric shocks.
Indicates an item requiring care to avoid combustion (fire).
Indicates an item prohibiting disassembly to avoid electric shocks or problems.
Introduction
Memo
REF.
Indicates an item requiring disconnection of the power plug from the electric outlet.
Indicates an item intended to provide notes assisting the understanding of the topic in question.
Indicates an item of reference assisting the understanding of the topic in question.
Provides a description of a service mode.
Provides a description of the nature of an error indication.
Introduction
The following rules apply throughout this Service Manual:
1. Each chapter contains sections explaining the purpose of specific functions and the relationship between electrical
and mechanical systems with reference to the timing of operation.
 In the diagrams, represents the path of mechanical drive; where a signal name accompanies the symbol ,
the arrow indicates the direction of the electric signal.
 The expression "turn on the power" means flipping on the power switch, closing the front door, and closing the
delivery unit door, which results in supplying the machine with power.
2. In the digital circuits, '1'is used to indicate that the voltage level of a given signal is "High", while '0' is used to
indicate "Low".(The voltage value, however, differs from circuit to circuit.) In addition, the asterisk (*) as in
"DRMD*" indicates that the DRMD signal goes on when '0'.
In practically all cases, the internal mechanisms of a microprocessor cannot be checked in the field. Therefore, the
operations of the microprocessors used in the machines are not discussed: they are explained in terms of from
sensors to the input of the DC controller PCB and from the output of the DC controller PCB to the loads.
The descriptions in this Service Manual are subject to change without notice for product improvement or other
purposes, and major changes will be communicated in the form of Service Information bulletins.
All service persons are expected to have a good understanding of the contents of this Service Manual and all relevant
Service Information bulletins and be able to identify and isolate faults in the machine."

Contents

Contents
Chapter 1 Specifications
1.1 Product composition.......................................................................................................................................... 1- 1
1.1.1Product Components ................................................................................................................................... 1- 1
1.2 Specifications .................................................................................................................................................... 1- 3
1.2.1Overview ..................................................................................................................................................... 1- 3
Chapter 2 Functions
2.1 New Function .................................................................................................................................................... 2- 1
2.1.1Security Function ........................................................................................................................................ 2- 1
2.1.2HDD Encryption.......................................................................................................................................... 2- 1
2.1.3Full Initialization of the HDD ..................................................................................................................... 2- 1
2.1.4Enabling/Disabling Display of Job Log ...................................................................................................... 2- 2
Chapter 3 Installation
3.1 Points to Note About Installation ...................................................................................................................... 3- 1
3.1.1Points to Note at Time of Installation ......................................................................................................... 3- 1
3.2 Checking components ....................................................................................................................................... 3- 4
3.2.1Checking Items in the Package ................................................................................................................... 3- 4
3.3 Installation procedure ........................................................................................................................................ 3- 5
3.3.1Backing Up Data (reference only)............................................................................................................... 3- 5
3.3.2Obtaining and Registering the license key .................................................................................................. 3- 8
3.3.3Setting the Service mode........................................................................................................................... 3- 10
Chapter 4 Maintenance
4.1 Related Service Mode ....................................................................................................................................... 4- 1
4.1.1Invalidating the License for Transfer to a Different Device (Category 2).................................................. 4- 1

Chapter 1 Specifications

Contents
Contents
1.1 Product composition........................................................................................................................................... 1-1
1.1.1 Product Components ................................................................................................................................... 1-1
1.2 Specifications ..................................................................................................................................................... 1-3
1.2.1 Overview ..................................................................................................................................................... 1-3

1.1 Product composition

Chapter 1

1.1.1 Product Components

This kit consists of:
[1] License Access Number Certificate Sheet 1pc.
[2] Reference Guide        1pc.
[3] Caution sheet for Users 1pc.
[4] License Registration Booklet 1pc.
Memo:
Using this kit, you can get a license key from the License Management System (LMS) and register it in an iR/
imageRUNNER to activate the specific feature included in the System Software.
Note:What's LMS?
A license server system to activate software options of iRs/imageRUNNERs, provided by Canon Inc. Collectively
manages options in the form of licenses and protects copy rights of optional products. The options are activated with
license keys being different from conventional activation measures that use dongles and PCs. Whereas the details
of its management differ among countries and regions, it is designed assuming the users access it and activate
licenses by themselves respectively. Per optional product, the license access number certificate sheet is supplied.
Per license access number, a user can get a license key and activate the feature on an iR/imageRUNNER. To get a
license key, a user accesses the Web server of the LMS.
0008-5633
URL for LMS:
http://www.canon.com/lms/ir/
When a user enters the license access number and the serial number for an iR/imageRUNNER in the LMS, 24-digit
figure of a license key is generated. The license key includes the information of serial number for the iR/
imageRUNNER so that the key cannot be used for iRs/imageRUNNERs. Once the option is activated, the option
information is saved as the backup in the iR/imageRUNNER. Parts replacement will not deactivate the feature.
The staff in each regional headquarters can access the administrator's pages of the LMS. They can view the license
number issued for each iR/imageRUNNER and can reissue the license. The procedures are the same as the license
management system for MEAP except for the point the license key is used instead of the license file.
Transfer of a License
An optional function that has been enabled by the LMS may be used on a different device by transferring its license,
as when the original iR device needs to be replaced, say at the end of its lease arrangement. Specifically, individual
licenses registered for optional functions must first be invalidated in user mode before transfer may take place. Doing
1-1
Chapter 1
so will invalidate the optional functions on the source iR device and, at the same time, proof of invalidation will be
generated within the device in the form of an invalidation license key. The user may then communicate the indicated
invalidation license key, the serial number of the original iR device, and the serial number of the new iR device to
the Sales Company, which in turn may issue a new license key for the new iR device. The user now may register the
new license key to the new iR device in user mode, thereby enabling the optional function on the new iR device. For
details of transferring a license in service mode, see the descriptions of service mode that come later.
Notes:
Security kit requires that a license key is obtained/registered, and optional PCI bus extension kit, security
extension board (USB) and 256MB extension RAM are installed. If these options are not installed, "There are not
enough required features for install." is displayed at the license registration, and this function cannot be enabled.
1-2

1.2 Specifications

Chapter 1

1.2.1 Overview

This kit is an option to add the security function which is enabled by the license.
Characteristics:
- Since the security extension board and increasing memory are required, this kit is installed by the service man.
- HDD data can be protected, and Job Log can be not displayed.
- Encryption processing is conducted by the encryption accelerator, so there is not much influence on the machine
performance.
- The security is secured since there is no method to take the key for encryption to the outside of HDD.
- When the data needs to be deleted at the damage on the device, the user can regenerate the encryption key, so
that the data can be deleted easily.
For details of installation procedures, please refer to Installation procedure.
Protection of HDD data
Device's HDD records temporally image data like scanned images and PDL data, etc. at any time. Also, the image
data is always saved in the user box, FAX box, etc. If the user information like the image data is stolen by extracting
HDD, the original data can be recovered easily by directly accessing and analyzing with Disk Editor, etc. For the
security, HDD encryption and full initialization of the HDD are used.
HDD encryption
Regarding the HDD dealing with images and PDL data, the information is written by encrypting, and it is read by
decoding. Therefore, information within the HDD is always encrypted. Even when the HDD is stolen, recovering
the data is too hard. For details, refer to New Functions in the later chapter.
Full initialization of the HDD
When the data which is recorded temporality (e.g. images and PDL data) is not necessary, 0 data or random data
is overwritten in the areas where the data exists. By doing so, recovering the original data is too hard. For details,
refer to New Functions in the later chapter.
Enabling/Disabling Display of Job Log
By not displaying Job Log to the third party, contents of the PDL printing and contents of transmission/reception
using Send function can be prevented from leaking. By setting Service mode, User mode of whether to display Job
Log is displayed. For details, refer to New Functions in the later chapter.
0008-5635
1-3
Loading...
+ 35 hidden pages