Abstract:
An image forming apparatus includes a communication interface unit which communicates with an external apparatus, a controller which, if a job performance command is received from the external apparatus when an operation mode of the image forming apparatus is a power saving mode, performs authentication of the external apparatus while maintaining the power saving mode, and a function unit which converts an operation mode of the image forming apparatus according to the authentication result and performs a function corresponding to the job performance command.
Abstract:
An image forming apparatus includes a memory, an interface to receive image data to perform an image forming job, and a controller to, when the image data is input in a power save mode of the image forming apparatus, send the image data to an external image forming apparatus, and when the image forming apparatus switches to a normal mode, control the image forming apparatus to perform an image forming job using the image data sent to the external image forming apparatus.
Abstract:
A system on chip is provided. The system on chip includes: a first memory in which a plurality of encryption keys are stored, a second memory, a third memory in which an encryption key setting value is stored, and a CPU which decrypts encrypted data which is stored in an external non-volatile memory using an encryption key corresponding to the encryption key setting value from among the plurality of encryption keys, stores the decrypted data in the second memory, and performs boot using data stored in the second memory. Accordingly, security of boot can be improved.
Abstract:
A system on chip is provided. The system on chip includes a first memory to store a plurality of encryption keys, a second memory, a third memory to store an encryption key setting value, and a CPU to decrypt encrypted data which is stored in an external non-volatile memory using an encryption key corresponding to the encryption key setting value from among the plurality of encryption keys, to store the decrypted data in the second memory, and to perform a boot using data stored in the second memory. Accordingly, security of a boot operation can be improved.