When we introduced the Smart UX Center, the industry’s first Android-based user interface for printers, we brought a new printing paradigm with unparalleled usability and convenience. One way we achieved this was with the intuitive user interface design, familiar to smartphone and tablet users. Another key achievement was the unlimited possibility of expanding existing printer functions with apps and widgets.
While some are hesitant to fully utilize the Smart UX Center due to its open platform, “open” does not translate to a lack of security. The Smart UX Center operates in a framework of robust, multi-layered security features and user access control settings that protect data. Here’s a close look at how security works in the Smart UX Center.
Printer systems equipped with the Smart UX Center are composed of two platforms: the Android UI platform and the main system platform. The former runs the GUI (graphics user interface), providing users with that intuitive experience of smart “touch” operation, while the latter stores print and user data.
The two platforms communicate with each other, but the only direct access that the UI platform has to the main system platform is through the Smart UX Center’s Downloads folder. All other data stored in the main system platform is encrypted, and requires decryption every time the UI platform requests permission. The UI platform’s communication with other network devices (PCs, servers) is possible only through the secure, main system network.
User Interface Security
Security risks associated with an open platform can arise from unapproved writing of unverified data. The Smart UX Center is protected from this risk in two ways: a rigorous quality assurance process at Samsung, and user control over Smart UX Center settings.
Samsung’s Security QA Process
Official apps and widgets provided in-house or by our partners undergo a multi-step QA process before registration for quality and security verification. Only the ones that pass our software quality engineering (SQE) process are registered on our authorized Samsung Printing App Center channel. A pop-up message guaranteeing security will appear upon downloading an app.
Firmware updates are guaranteed secure as well. The only way to update the Smart UX Center’s firmware is with the official Samsung upgrade, which goes through user authentication and signature verification. This eliminates the possibility of hacking through firmware attacks.
User Control – Administrative Settings
The Smart UX Center settings can be configured to only give the administrator the authority to install or remove apps, thereby regulating installation of third party apps. To further tighten security, the administrator can choose to block USB memory access including installation via USB, or disable app installation via all routes by any user, including the administrator himself. The administrator can also limit users’ browser usage.
The Samsung Security Framework
All Samsung Printing Solutions products operate within the multi-layered Samsung Security Framework, built to protect information throughout the document life cycle, from all the way from data encryption to document management.
The Five Components of the Security Framework
- Secure User This feature includes authentication, authorization, and accounting to limit MFP access to verified users, assign varying levels of access, and keep track of MFP usage data by device, group, or individual users, respectively.
- Secure Data Data that stays in or passes through the MFP is protected with encryption and hard drive image overwrite technology.
- Secure Network Only the devices connected to the authorized network have access to the MFP with industry-standard TLS/SSL protocols, IP security, and network security protocols.
- Secure Document One of the primary features of this feature is password assignment to individual print jobs, ensuring safe and authorized delivery of printouts and faxes.
- Secure Management With the job auditing feature, the administrator can track events and actions for logged-in users including data requests, changes made to security audit functions, image overwrite results, and inquiries/changes to the security audit configuration. System backups ensure quick data recovery in case of loss.