User Role; Physical Security; Operational Environment - Lexmark 10G0149 - PrintCryption Card Encryption Module Manual

Fips 140-2 non-proprietary security policy
Hide thumbs Also See for 10G0149 - PrintCryption Card Encryption Module:
Table of Contents

Advertisement

Service
Description
menu (HTTP) which
has an LPC log page

User Role

Users utilize the cryptographic functionalities of the PrintCryption, and they
communicate with the module via network port only.
Service descriptions and inputs/outputs are listed in the following table:
Service
Description
Public Key
Users request for
request
printers public key.
The module generates
a key pair if needed
Secure
AES encrypted
Printing
printing program;
Decrypts and prints
the print job data
using the supplied
AES Session key

Physical Security

In FIPS terminology, the firmware module is defined as a multi-chip standalone
cryptographic module. The module runs on Lexmark printers listed in Module
Specification section. The printers are made of all production-grade components
and are enclosed in a strong plastic and steel case, which surrounds all of the
module's internal components, including all hardware and firmware.
The cryptographic module conforms to the EMI/EMC requirements specified by
47 Code of Federal Regulations, Part 15, Subpart B, Unintentional Radiators,
Digital Devices, Class A (i.e., for business use).

Operational Environment

The operational environment is non-modifiable and thus not applicable for this
firmware module. The PrintCryption module runs on the Lexmark Linux v2.6 OS,
and configured for single-user mode by default. The operating system is used as
an embedded OS within the Lexmark printers, and there is no direct access to the
OS provided.
© Copyright 2009 Lexmark International Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Input
Table 4 – Crypto Officer Services, Descriptions, CSPs
Input
Public Key
Request (PKR)
at network port
9150.
Encrypted
print job at
TCP/IP port
9152.
Table 5 – User Services, Descriptions, Inputs and Outputs
Page 10 of 20
Output
CSP
Output
CSP
X.509
RSA public key
certificate
RNG seed
Status output
AES session key
RSA private key
Type of Access
to CSP
Type of Access
to CSP
Read/Write
Read
Read/Write
Read

Advertisement

Table of Contents
loading

This manual is also suitable for:

Printcryption

Table of Contents