Abstract:
In an example, a non-transitory computer readable storage medium may include instructions that when executed cause a computing device to generate a virtual device representation of an image forming apparatus on a cloud. Further, instructions cause the computing device to update the virtual device representation on the cloud with a configuration state of the image forming apparatus. Furthermore, instructions cause the computing device to analyze the updated virtual device representation to determine whether the image forming apparatus is compliant with a stored policy. Further, instructions cause the computing device to initiate, via the virtual device representation, a remediation action to bring the image forming apparatus to compliance based on the determination.
Abstract:
Examples disclosed herein relate to receiving a request to perform an operation on a document, determining whether the document complies with a plurality of operation policies, and in response to determining that the document complies with the plurality of operation policies, providing a notification that the operation is ready to be performed and digitally signing the document.
Abstract:
Examples disclosed herein relate to receiving a request to perform an operation on a document, determining whether the document complies with a plurality of operation policies, and in response to determining that the document complies with the plurality of operation policies, providing a notification that the operation is ready to be performed and digitally signing the document.
Abstract:
In an example, a method of encryption is described to include generation of a content encryption key and a key encryption key. In that example, the content encryption key is wrapped based on a key wrap operation using the key encryption key and the wrapped content encryption key is encrypted using a policy encryption key. Further in that example, the policy encryption key is encrypted using a public key corresponding to a print apparatus. In an example, a method of decryption is described. The example method of decryption performs recovery of a policy object using a private key corresponding to a print apparatus. In that example, the policy object includes a wrapped key that is unwrapped using a key encryption key to recover a content encryption key usable to decrypt an encrypted electronic document.
Abstract:
Examples disclosed herein relate to wireless communication of a user identifier and encrypted time-sensitive data. Examples further include wireless communication of an authentication token including a user identifier and encrypted time-sensitive data. Examples further include interaction with a remote authentication service. Examples further include utilization of near field communication (NFC).
Abstract:
In an example, a non-transitory computer readable storage medium may include instructions that when executed cause a computing device to generate a virtual device representation of an image forming apparatus on a cloud. Further, instructions cause the computing device to update the virtual device representation on the cloud with a configuration state of the image forming apparatus. Furthermore, instructions cause the computing device to analyze the updated virtual device representation to determine whether the image forming apparatus is compliant with a stored policy. Further, instructions cause the computing device to initiate, via the virtual device representation, a remediation action to bring the image forming apparatus to compliance based on the determination.
Abstract:
In an example, a method of encryption is described to include generation of a content encryption key and a key encryption key. In that example, the content encryption key is wrapped based on a key wrap operation using the key encryption key and the wrapped content encryption key is encrypted using a policy encryption key. Further in that example, the policy encryption key is encrypted using a public key corresponding to a print apparatus. In an example, a method of decryption is described. The example method of decryption performs recovery of a policy object using a private key corresponding to a print apparatus. In that example, the policy object includes a wrapped key that is unwrapped using a key encryption key to recover a content encryption key usable to decrypt an encrypted electronic document.
Abstract:
Secure code image delivery may include encrypting, using an invariant content encryption key, an invariant portion of a code image for a set of electronic devices to generate an encrypted invariant potion of the code image. A first variant of a variant portion of the code image may be encrypted using a first variant content encryption key to generate a first encrypted variant portion. A second variant of a variant portion of the code image may be encrypted using a second variant content encryption key to generate a second encrypted variant portion. A code image bundle may be generated including the encrypted invariant portion, the first encrypted variant portion, and the second encrypted variant portion.
Abstract:
Examples associated with printer encryption are described. One example printer includes a data store to store a one-time pad. An encryption module may encrypt a message using the one-time pad. The encryption module also transmits the encrypted message to a trusted device that stores a copy of the one-time pad. A decryption module uses the one-time pad to decrypt a received message form the trusted device. The decryption module also controls the printer to perform an action based on the received message. A refresh module replaces the one-time pad during a service event.
Abstract:
A method for an application management service is provided. In the method, a request for a list of available applications is received and a list of available applications is generated based on a whitelist. The list of available applications is transmitted and a selection of an available application is received. A package file corresponding to the selected application is generated and the package file and an installation file corresponding to the selected application are transmitted.