Image forming device encrypting import instruction information stored in storage medium

ABSTRACT

In an image forming device, an image forming engine is configured to form an image. The memory stores configuration information and confidential information. The controller is configured to operate based on the configuration information. In a case where a storage medium is connected to the input output interface, and the storage medium stores import configuration information and import instruction information, the controller imports the import configuration information as the configuration information to the memory by using the import instruction information, encrypts the import instruction information by using the confidential information, and stores the encrypted import instruction information in the storage medium. After the import configuration information is imported, the controller operates according to the import configuration information.

CROSS REFERENCE TO RELATED APPLICATION

This application claims priority from Japanese Patent Application No.2020-006656 filed Jan. 20, 2020. The entire content of the priorityapplication is incorporated herein by reference.

TECHNICAL FIELD

The present disclosure relates to a technique to set configurationinformation on an image forming device (information processing device).

BACKGROUND

An information processing device (image-forming device) known in the artimports device configuration information stored in a USB memory oranother storage medium as its own device configuration information. Whenimporting configuration information from the USB memory, theimage-forming device performs login authentication based on a passwordincluded in an instruction information file. If login authentication issuccessful, the image-forming device imports the configurationinformation based on write instructions included in the instructioninformation file.

SUMMARY

However, the conventional image-forming device described above does notencrypt the instruction information file after importing its deviceconfiguration information. Consequently, information in the instructioninformation file may not be sufficiently protected.

In view of the foregoing, it is an object of the present disclosure toprovide a technique that can enhance protection of import instructioninformation.

In order to attain the above and other objects, the disclosure providesan image forming device. The image forming device includes an imageforming engine, a memory, an input output interface, and a controller.The image forming engine is configured to form an image. The memorystores configuration information and confidential information. Thecontroller is configured to operate based on the configurationinformation. The controller is configured to perform: in a case where astorage medium is connected to the input output interface, and thestorage medium stores import configuration information and importinstruction information: importing the import configuration informationas the configuration information to the memory by using the importinstruction information; encrypting the import instruction informationby using the confidential information; and storing the encrypted importinstruction information in the storage medium. After the importconfiguration information is imported, the controller operates accordingto the import configuration information.

According to another aspect, the disclosure provides a method forcontrolling an image forming device. The image forming device includes:an image forming engine configured to form an image on a sheet; a memorystoring configuration information and confidential information; and aninput output interface. The image forming device operates according tothe configuration information. The method includes: in a case where astorage medium is connected to the input output interface, and thestorage medium stores import configuration information and importinstruction information: importing the import configuration informationas the configuration information to the memory by using the importinstruction information; encrypting the import instruction informationby using the confidential information; and storing the encrypted importinstruction information in the storage medium. After the importconfiguration information is imported, the image forming device operatesaccording to the import configuration information.

According to still another aspect, the disclosure provides an imageforming device. The image forming device an image forming engine, amemory, an input output interface, and a controller. The image formingengine is configured to form an image on a sheet. The memory storesconfiguration information and device information which is individual forthe image forming device. The controller is configured to operate basedon the configuration information. The controller is configured toperform: in a case where a storage medium is connected to the inputoutput interface, and the storage medium stores import configurationinformation and import instruction information: importing the importconfiguration information as the configuration information to the memoryby using the import instruction information; encrypting the importinstruction information by using the device information; and storing theencrypted import instruction information in the storage medium. Afterthe import configuration information is imported, the controlleroperated according to the import configuration information.

BRIEF DESCRIPTION OF THE DRAWINGS

The particular features and advantages of the disclosure as well asother objects will become apparent from the following description takenin connection with the accompanying drawings, in which:

FIG. 1 is a front view of a multifunction peripheral according to anembodiment;

FIG. 2 is a cross sectional side view of the multifunction peripheralshown in FIG. 1;

FIG. 3 is a block diagram illustrating control configuration of themultifunction peripheral shown in FIG. 1;

FIG. 4 is an explanatory diagram illustrating an overview of operationsto import configuration information from a USB memory;

FIG. 5 is an explanatory diagram illustrating an example of theconfiguration information stored in the USB memory;

FIG. 6 is a flowchart illustrating a first half of an importing processexecuted by the multifunction peripheral;

FIG. 7 is a flowchart illustrating a second half of the importingprocess executed by the multifunction peripheral;

FIG. 8 is a flowchart illustrating a configuration information writingprocess executed in the importing process;

FIG. 9 is an explanatory diagram illustrating an operation guidancescreen displayed on a panel;

FIG. 10(a) is an explanatory diagram illustrating import instructioninformation; and

FIG. 10(b) is an explanatory diagram illustrating a list.

DETAILED DESCRIPTION

An embodiment of an information processing device is described whilereferring to accompanied drawings.

First, a general hardware configuration of a multifunction peripheral100 will be described with reference to FIGS. 1 and 2. The multifunctionperipheral 100 is an example of the information processing device of thepresent disclosure according to the embodiment. Hereinafter,multifunction peripheral will be abbreviated as “MFP.” Directionsreferred to in the following description will conform to the directionsindicated by arrows in FIGS. 1 and 2.

The MFP 100 has a main casing 160 and, within the main casing 160, ascanning unit 170 and an image-forming unit 190.

The scanning unit 170 includes an original platen 171 for supporting anoriginal document to be scanned, and an image sensor 173 that readsimages of originals placed on the original platen 171. The MFP 100 alsoincludes an automatic document feeder 140 for conveying an original. Theimage sensor 173 reads an image of the original conveyed by theautomatic document feeder 140 while the image sensor 173 is stationary.

The image-forming unit 190 is disposed beneath the scanning unit 170 andhas a paper cassette 191, a process unit 192, an exposure device 193, athermal fixing device 194, a power supply device 195, a drive mechanism196, a discharge opening 197, and a sheet retrieval opening 198. Using alaser beam outputted from the exposure device 193, the image-formingunit 190 prints images on paper conveyed from the paper cassette 191based on inputted image data. The image-forming unit 190 performsprinting according to control by a control unit primarily configured ofa central processing unit (CPU) 101 of the MFP 100 described later (seeFIG. 3).

The paper cassette 191 accommodates sheets of a recording medium, suchas papers, in a stacked state. The paper cassette 191 is detachablymountable in the main casing 160.

The process unit 192 is detachably mounted in a prescribed positionabove the exposure device 193. The process unit 192 has a photosensitivedrum 192A and, while not shown in the drawings, a charger that applies auniform charge to the outer circumferential surface of thephotosensitive drum 192A, a developing roller that supplies toner to anelectrostatic latent image formed on the surface of the photosensitivedrum 192A, a supply roller that supplies toner to the developing roller,a thickness-regulating blade that regulates the thickness of the tonerlayer on the developing roller, a toner- accommodating section thataccommodates toner to be supplied by the supply roller, and a transferroller that transfers toner from the outer circumferential surface ofthe photosensitive drum 192A onto a sheet of paper.

The photosensitive drum 192A is rotatably supported inside the processunit 192. The photosensitive drum 192A is configured of an electricallyconductive drum body having a cylindrical shape. The photosensitive drum192A also has an electrostatically chargeable photosensitive layerformed on the outer circumferential surface of the drum body. The laserbeam emitted from the exposure device 193 forms an electrostatic latentimage on the photosensitive layer of the photosensitive drum 192Acorresponding to an image to be printed.

The exposure device 193 is disposed in the lower section of the maincasing 160. The exposure device 193 has a laser light-emitting unit, apolygon mirror, lenses, and reflecting mirrors. Laser light is emittedfrom the laser light-emitting unit based on an image to be formed onpaper. The emitted laser light passes through or is reflected by thepolygon minor, lenses, and reflecting mirrors to be irradiated onto thesurface of the photosensitive drum 192A constituting the process unit192. An electrostatic latent image corresponding to the image to beprinted is formed on the surface of the photosensitive drum 192A by thislaser light.

The thermal fixing device 194 is disposed between the process unit 192and the discharge opening 197. The thermal fixing device 194 has aheating roller, and a pressure roller. Toner transferred onto the paperby the process unit 192 is heated and melted by the heating roller andpressure roller provided in the thermal fixing device 194, therebythermally fixing the toner image to the paper.

The power supply device 195 is disposed in the main casing 160 to theleft of the process unit 192 and the like. The power supply device 195functions to supply power to components in the image-forming unit 190for performing image formation. The drive mechanism 196 is disposed inthe main casing 160 to the right of the process unit 192 and the like.The drive mechanism 196 transfers a drive force to the photosensitivedrum 192A and the like for forming images with the image-forming unit190.

The discharge opening 197 and the sheet retrieval opening 198 are formedin the front surface side of the main casing 160 above the papercassette 191, which is detachably mountable in the main casing 160. Thedischarge opening 197 is formed in a position corresponding to thethermal fixing device 194. After images are formed on a sheet by theimage-forming unit 190, the sheet is discharged through the dischargeopening 197. The sheet retrieval opening 198 is an area in which sheetsdischarged through the discharge opening 197 are stacked.

Next, the control configuration of the MFP 100 will be described withreference to FIG. 3.

The MFP 100 is provided with a CPU 101, a read-only memory (ROM) 102, arandom-access memory (RAM) 103, a nonvolatile memory (NVM) 104, a printengine 111, a read engine 112, and various interfaces. The interfacesinclude an engine interface 110, a Universal Serial Bus (USB) interface107, and a network interface 108. The print engine 111 and read engine112 are connected to the engine interface 110.

The CPU 101 controls overall operations of the MFP 100. The CPU 101controls the print engine 111 and the read engine 112 via the engineinterface 110 according to configuration information.

The ROM 102 is a memory that stores a control program executed by theCPU 101. The CPU 101 reads the control program from the ROM 102 toexecute various processes. The control program includes a program toexecute an importing process described later with reference to FIGS. 6through 8.

The RAM 103 is a memory that temporarily stores image data and the like.The RAM 103 is used either as a storage area for temporarily storingdata, signals, and the like used when the CPU 101 executes the controlprogram; or a work area for processing data.

The NVM 104 is nonvolatile memory for storing configuration informationand the like.

The MFP 100 is also provided with a panel 105, and keys 106.

The panel 105 is a touchscreen in the embodiment. Various screens aredisplayed on the panel 105 according to the state of the MFP 100. Theoperator can perform input operations through the panel 105 by operatinginput buttons displayed in the screens.

The keys 106 are hard keys, i.e., keys configured in hardware. In theembodiment, the keys 106 include a Stop key 106 a. In addition to itsnormal function for stopping operations of the MFP 100, the Stop key 106a may be given another function, as will be described later withreference to FIG. 4.

The USB interface 107 is an Input/Output interface for connecting to anexternal USB device. In the embodiment, a USB memory 200 is connected tothe USB interface 107 as a storage medium. USB memory is sometimesreferred to as USB flash memory or a USB flash drive.

The network interface 108 functions to connect the MFP 100 to acommunication network. The communication network may be a wired orwireless local area network (LAN). The network interface 108 may be oneof a LAN interface or wireless LAN (WLAN) interface, or both.

The print engine 111 is a device used to print images on sheets and hasan electrophotographic, inkjet, or thermal type printing device. In theembodiment, the print engine 111 corresponds to the image-forming unit190 described above and, hence, has an electrophotographic printingdevice.

The read engine 112 is a device used to read images from originals andpossesses reading devices, such as charge-coupled devices (CCDs) or acontact image sensor (CIS). In the embodiment, the read engine 112corresponds to the scanning unit 170 described above.

The engine interface 110 is the interface that controls the print engine111 and the read engine 112. The engine interface 110 is provided withthe power supply device 195 that supplies power for performing imageformation, and the like.

The MFP 100 is further provided with an image-processing circuit 120.

The image-processing circuit 120 executes a rasterization process onimage data for a print job, and outputs the rasterized data to the printengine 111. The image-processing circuit 120 also converts image dataread from an original by the read engine 112 to digital data. Thedigital data converted from the image data may then be transmittedexternally via the network interface 108 or supplied to the print engine111 to be outputted onto a sheet.

The CPU 101, the ROM 102, the RAM 103, the NVM 104, the panel 105, thekeys 106, the USB interface 107, the network interface 108, the engineinterface 110, and the image-processing circuit 120 are interconnectedvia a bus 130.

Next, an overview of a process to import configuration informationstored in the USB memory 200 into the MFP 100 will be described withreference to FIGS. 4 and 5. FIG. 5 shows an example of plaintext importconfiguration information 220. The plaintext import configurationinformation 220 includes at least one of setting values to be importedto the MFP 100. That is, the plaintext import configuration information220 includes at least one of the installation site of the MFP 100, thecontact address for the user of the MFP 100, the Internet Protocol (IP)address of the MFP 100, the IP address of the server or other externaldevice to which the MFP 100 is connected, scan settings, and copysettings.

As shown in FIG. 4, a device password and a universal password that isuniversal for devices are stored in the NVM 104 of the MFP 100, forexample. The term “device” in the embodiment signifies an MFP, such asthe MFP 100. The device password is used for login authentication when auser or a device logs in to the MFP 100. When the devices are in theirinitial states, the device password is unique for each device. Thus, theinitial value of a device password is the password that was set for thedevice in its initial state. Therefore, the device password for the MFP100, at least at its initial value, differs from the initial value ofthe device password for other MFPs. However, the user can modify thedevice password. For example, the use may set the same device passwordfor a plurality of MFPs 100 that the user owns. The NVM 104 furtherstores the manufacturing number of the MFP 100.

The universal password, on the other hand, is used for encryptingplaintext import instruction information 210 described later. The samepassword is stored as the universal password in the NVM of each of aplurality of devices that meet prescribed criteria. These prescribedcriteria may include at least one of criteria that a subject device hasthe same (or specific) specifications, criteria that the subject devicecan import the same (or specific) plaintext import configurationinformation 220, criteria that the subject device has the same (orspecific) firmware, and criteria that the subject device is produced bythe same (or specific) manufacturer, for example. The universal passwordis confidential information that the user cannot view. The universalpassword is also not included in the plaintext import configurationinformation 220 and cannot be modified in the importing process, but theuniversal password can be modified when updating firmware for the MFP100.

In the example of FIG. 4, the USB memory 200 stores a Backup.bin file,which includes encrypted import configuration information 225; and anImport.txt file, which includes nonencrypted, i.e., plaintext, importinstruction information 210.

The Backup.bin file is a binary file created by encrypting a Backup.json file using a data password. Here, the Backup.json file includes theplaintext import configuration information 220 (see FIG. 5). TheBackup.json file is a file in the JavaScript (registered trademark)Object Notation (JSON) format. Here, the Backup.bin file may begenerated by compressing the Backup.j son file according to the ZIPcompression format and encrypting the resulting data according to theAdvanced Encryption Standard (AES) scheme using the data password.Another compression method, such as the LZH compression format, may beemployed in place of ZIP. Further, other encryption schemes, such as theData Encryption Standard (DES), may be used in place of AES.Alternatively, the Backup.bin file may be generated using only anencryption process while omitting the compression process.

The Import.txt file is a file in the text format. In the example of FIG.4, the Import.txt file includes “nimda” as the device password forauthentication, and “abcdefg” as the data password. The user can editthe Import.txt file. For example, the user can change the devicepassword so as to correspond to a target device for authentication. Theuser may generate a new Import.txt file and replace the old Import.txtfile with the new Import.txt file in the USB memory 200. The Import.txtfile may not include the device password.

The Stop key 106 a is a special key. When the operator inserts the USBmemory 200 into the USB interface 107 while pressing the Stop key 106 a,the MFP 100 executes operations in an import mode to importconfiguration information from the USB memory 200 into the NVM 104. The“operations in the import mode” in FIG. 4 specifically denote operationsto generate plaintext import configuration information 220 by decryptingthe encrypted import configuration information 225 stored in the USBmemory 200 and to import the plaintext import configuration information220 into the NVM 104. The “operations in the import mode” in FIG. 4 maydenote operations to import the plaintext import configurationinformation 220 stored in the USB memory 200 into the NVM 104. On theother hand, if the user inserts the USB memory 200 into the USBinterface 107 without pressing the Stop key 106 a, the MFP 100 executesnormal operations in a USB memory mode, such as operations for printingprint data stored in the USB memory 200 or operations for storingscanned data in the USB memory 200.

When importing configuration information into the NVM 104, the CPU 101determines whether the MFP 100 satisfies a condition for skippingauthentication. In a case where the MFP 100 determines that thecondition is met, the CPU 101 skips the authentication process forauthenticating the device password included in the Import.txt file witha device password in the NVM 104 and permits configuration informationto be imported into the NVM 104. However, in a case where the MFP 100does not satisfy the condition for skipping authentication, the CPU 101does not skip the authentication process and only allows configurationinformation to be imported into the NVM 104 if authentication issuccessful. Here, the “condition for skipping authentication” is thatthe MFP 100 is in its initial state, as will be described later withreference to FIG. 6. The authentication process is skipped in a casewhere the MFP 100 has satisfied this condition for skippingauthentication in this way in order to simplify importing operationswhen configuration information is to be imported into a plurality ofMFPs from the same USB memory 200. That is, in a conceivable case wherethe authentication process must always be performed to execute importingoperations using different authentication information for each MFP, theuser would have to expend much time and effort on authenticationprocesses, despite performing operations to import the sameconfiguration information into a plurality of MFPs. Accordingly,efficient importing operations cannot be performed. Note that in theembodiment, the “authentication information” is the device passwordstored in the NVM of each MFP, for example.

Once the importing of configuration information into the NVM 104 iscomplete, the CPU 101 encrypts the plaintext import instructioninformation 210 using the universal password to generate encryptedimport instruction information 215. The CPU 101 further deletes theplaintext import instruction information 210 to replace the plaintextimport instruction information 210 with the encrypted import instructioninformation 215. At an initial state, the plaintext import instructioninformation 210 is stored in the USB memory 200 as the Import.txt file.Next, in a case where the first importing operation is executed whileusing the USB memory 200 in the initial state, the plaintext importinstruction information 210 is replaced with the encrypted importinstruction information 215. Thus, in the second and subsequentimporting operations, the encrypted import instruction information 215is stored in the USB memory 200 as an Import.bin file. Here, theplaintext import instruction information 210 is encrypted in this way toenhance security of the import instruction information. Further, sincethe password used for encryption is a common password among like devicesand a decryption process need not be performed using a differentpassword for each device, there is very little increase in the time andeffort required for the decryption process. Note that the encryptionmethod used for encrypting the plaintext import instruction information210 may be the same as or different from the encryption method used whenencrypting the plaintext import configuration information 220.

FIG. 4 illustrates an example of the first importing operation. Aftercompleting this operation, the USB memory 200 stores the encryptedimport configuration information 225 and the encrypted importinstruction information 215. Hence, in a case where this same USB memory200 is subsequently used to import configuration information into adifferent MFP meeting the same criteria as the MFP 100 (i.e., in secondand subsequent importing operations), the CPU 101 first decrypts theencrypted import instruction information 215 using the universalpassword to generate the plaintext import instruction information 210.The remaining steps of the process are identical to the processdescribed above. When the USB memory 200 already stores the encryptedimport instruction information 215, the CPU 101 may not perform aprocess to encrypt (S48 described later) and replace the plaintextimport instruction information 210 (S50 described later). The importinstruction information 210 and 215 is for instructing the importingprocess, especially a configuration information writing process (S46)described later, to use information therein such as the device passwordand the data password.

As described above, the JSON format is used as the data format for theplaintext import configuration information 220. However, the data inFIG. 5 has been written in a different format from the JSON format forconvenience. Naturally, the data format in which configurationinformation is stored is not limited to JSON but may be another formatsuch as the comma-separated values (CSV) format.

The plaintext import configuration information 220 in the example ofFIG. 5 includes the installation site “Team1” for the MFP 100, thecontact e-mail address “team1@mail.co.jp” for the user of the MFP 100,the IP address “123.456.123.456” of the MFP 100, the IP address“123.123.123.456” of the mail server, scan settings, and copy settings.The plaintext import configuration information 220 also includes thedevice password “AAABBB” to be set to the MFP 100.

Scan settings are settings for processes involving the read engine 112.The scan settings in FIG. 5 include the display name “ScanToMike,” thetransmission destination information “123.123.123.123,” the scanningresolution “300 dpi,” the duplex scan setting “ON,” and the colorsetting “ON.”

The display name is information for displaying a configuration name onthe panel 105 of the MFP 100.

The transmission destination information is an address to which imagedata for a scanned image is transmitted through a communication networkby using the network interface 108. The transmission destinationinformation is not limited to an IP address, used in the example of FIG.5, but may be a URL or an e-mail address.

The duplex scan setting is an option for scanning images from bothsurfaces of an original. A duplex scan setting of “ON” indicates thatthe option is enabled, while a setting of “OFF” indicates that theoption is disabled and signifies a setting for scanning an image fromonly one surface of the original.

The color setting is an option for reading color images from theoriginal. A color setting of “ON” indicates that the option is enabled,while a setting of “OFF” indicates that the option is disabled andsignifies a setting to read images from the original in monochrome.

The CPU 101 displays “ScanToMike” on the panel 105 as the configurationname based on the display name setting “ScanToMike.” Here, theabove-described configuration information shown in FIG. 5 thatcorresponds to the display name “ScanToMike” indicates configurationinformation for settings that the user can select from among a pluralityof settings displayed on the panel 105. However, the present inventionis not limited to this configuration, and the configuration informationmay specify settings that are fixed for the MFP. “Fixed” denotes thatthe user is restricted or prohibited from selecting other settings.

The CPU 101 transmits image data for an image read by the read engine112 to the IP address 123.123.123.123 based on the scan transmissiondestination information “123.123.123.123.” The CPU 101 controls the readengine 112 to read an image at a resolution of 300 dpi based on thescanning resolution “300 dpi.” The CPU 101 controls the read engine 112to read images from both surfaces of the original based on the duplexscan setting “ON.” The CPU 101 controls the read engine 112 to readcolor images from both surfaces of the original based on the colorsetting “ON.”

Copy settings are settings for processes involving the read engine 112and print engine 111. In the example of FIG. 5, the copy settingsinclude the display name “Copy1,” the scanning resolution “200 dpi,” theduplex scan setting “ON,” the color setting “ON,” and the duplex printsetting “ON.”

The color setting indicates an option for forming color images onsheets. A setting of “ON” indicates that the option is enabled, while asetting of “OFF” indicates that the option is disabled and signifies asetting for forming monochromatic images on sheets.

The duplex print setting is an option for forming images on bothsurfaces of a sheet. A setting of “ON” indicates that the option isenabled, while a setting of “OFF” indicates that the option is disabledand signifies a setting for forming images on only one surface of thesheet.

The CPU 101 controls the print engine 111 to form color images on sheetsbased on the copy setting “Color: On.” The CPU 101 controls the printengine 111 to form images on both surfaces of sheets based on the copysetting “Duplex print: On.”

Next, the importing process executed by the MFP 100, and specificallythe CPU 101, will be described with reference to FIGS. 6 through 10(b).Steps in the flowcharts of FIGS. 6 through 8 describing the importingprocess are indicated using the notation “S” followed by a step number.At the beginning of the importing process, an initial state flag is setto “0”.

In S10 of FIG. 6, the CPU 101 determines whether the USB memory 200 wasinserted into the USB interface 107. While the CPU 101 determines thatthe USB memory 200 has not been inserted into the USB interface 107(S10: NO), the CPU 101 waits until the USB memory 200 has been inserted.When the CPU 101 determines that the USB memory 200 has been insertedinto the USB interface 107 (S10: YES), in S12 the CPU 101 determineswhether the Stop key 106 a is being pressed.

In a case where the CPU 101 determines that the Stop key 106 a is notbeing pressed (S12: NO), the CPU 101 ends the importing process sinceoperations in the import mode will not be executed on the MFP 100.However, in a case where the CPU 101 determines that the Stop key 106 ais being pressed (S12: YES), the CPU 101 advances to S14. From S14 theCPU 101 executes operations in the import mode.

Thus, in S10 and S12 the CPU 101 determines whether the operator waspressing the Stop key 106 a while inserting the USB memory 200 into theUSB interface 107.

In S14 the CPU 101 determines whether the device password is its initialvalue. As described above, the operator can modify the device password.Therefore, in some cases the device password may not be the initialvalue. Note that password has been abbreviated as “PW” in FIGS. 6through 8.

In a case where the CPU 101 determines in S14 that the device passwordis the initial value (S14: YES), in S16 the CPU 101 further determineswhether the device (i.e., the MFP 100 in this case) is in its initialstate. More specifically, the CPU 101 determines that the MFP 100 is inits initial state based on the following conditions: A) a value thatincreases while using the MFP 100 is less than or equal to a prescribedvalue; B) the process unit 192 described above is not mounted in the MFP100; C) there is no history indicating that the MFP 100 is connected toa network via the network interface 108 described above; and D) a screenthat is displayed only once when the MFP 100 is first used after beingshipped from the factory has not been displayed.

For the condition A), the “value that increases while using the MFP 100”may be the number of pages printed by the print engine 111 or the numberof sheets of originals scanned by the read engine 112, for example. Thecondition A) may be a condition that all of a plurality of values areless than or equal to corresponding prescribed value. Here, each of theplurality of values increases while using the MFP 100.

For the condition D), the “screen that is displayed only once” may be anoperation guidance screen 105 a shown in FIG. 9, for example. If thepower to the MFP 100 is turned on the first time after the MFP 100 hasbeen shipped from the factory, the operation guidance screen 105 a isdisplayed once during the process for displaying a home screen on thepanel 105. The operation guidance screen 105 a is not displayedthereafter. When the operation guidance screen 105 a is displayed on thepanel 105, the CPU 101 sets an operation guidance screen display flag to“1”, for example. Hence, by checking the value of the operation guidancescreen display flag, the CPU 101 can determine whether the operationguidance screen 105 a has been displayed.

Here, the CPU 101 may determine whether the MFP 100 is in its initialstate using only selected one of the conditions A)-D) described above.That is, the CPU 101 may determine that the MFP 100 is in its initialstate in a case where selected one of the conditions A)-D) is satisfied.Or, the CPU 101 may determine whether the MFP 100 is in its initialstate by taking the logical AND operation of a plurality of selectedconditions from among the conditions A)-D). That is, the CPU 101 maydetermine that the MFP 100 is in its initial state in a case where allof the selected plurality of selected conditions are satisfied.Alternatively, the process of S16 described above may be omitted, andthe CPU 101 may determine whether the MFP 100 is in its initial statebased solely on whether the condition in S14 is satisfied, i.e., whetherthe device password is set to its initial value. That is, the CPU 101may determine that the MFP 100 is in its initial state in a case wherethe condition in S14 is satisfied.

If the CPU 101 determines in S16 that the device is in its initial state(S16: YES), in S18 the CPU 101 sets an initial state flag to “1”, in S20sets the universal password as an encryption key, and subsequentlyadvances to S24. The initial state flag is a flag set to “1” when theCPU 101 determines that authentication using the device password can beskipped.

On the other hand, in a case where the CPU 101 determines in S14 thatthe device password is not set to its initial value (S14: NO) ordetermines in S16 that the device is not in its initial state (S16: NO),in S22 the CPU 101 sets the device password as the encryption key, andsubsequently advances to S24.

Thus, in S14 and S16 the CPU 101 determines whether the MFP 100satisfies the condition for skipping authentication described above(hereinafter, referred to as “authentication skipping condition”). Inthe embodiment, the authentication skipping condition requires that thedevice password be set to its initial value and that the MFP 100 is inits initial state. While the CPU 101 in the embodiment determinesseparately whether the device password is set to its initial value andwhether the MFP 100 is in its initial state, a condition to determinewhether the MFP 100 is in its initial state may include a condition thatthe device password be set to its initial value. Or, the authenticationskipping condition may only include the condition that the devicepassword be set to its initial value. In this case, the CPU 101determines that the MFP 100 satisfies the authentication skippingcondition when the device password satisfies the condition of being setto its initial value.

In S24 the CPU 101 determines whether an Import.txt file as theplaintext import instruction information 210 is stored in the USB memory200. If the CPU 101 determines that an Import.txt file is stored in theUSB memory 200 (S24: YES), in S26 the CPU 101 acquires the data passwordand the device password from the Import.txt file, and subsequentlyadvances to S40 in FIG. 7. In the example of FIG. 4, the Import.txt fileincludes a data password and a device password. A device password maynot be included in the Import.txt file. This is because in some casesthe user generates data (the Import.txt not having the device passwordfor example) stored in the USB memory 200 assuming that theauthentication skipping condition will be met or that the user willinput the device password by using the panel 105. Therefore, thequalification “when present” is added in parentheses for S26 in FIG. 6.

On the other hand, if the CPU 101 determines in S24 that an Import.txtfile is not stored in the USB memory 200 (S24: NO), in S28 the CPU 101determines whether an Import.bin file as the encrypted importinstruction information 215 is stored in the USB memory 200. In a casewhere the CPU 101 determines that an Import.bin file is stored in theUSB memory 200 (S28: YES), in S30 the CPU 101 decrypts the Import.binfile using the encryption key set in S20 or S22.

In S32 the CPU 101 determines whether decryption was successful (OK). Ina case where the CPU 101 determines that encryption was successful,i.e., where the Import.txt file was properly generated based on theImport.bin file (S32: YES), the CPU 101 advances to S26 described above.

However, in a case where the CPU 101 determines in S28 that anImport.bin file is not stored in the USB memory 200 (S28: NO) or in acase where the CPU 101 determines in S32 that encryption failed (S32:NO), the CPU 101 ends the importing process. As described above, whenneither the Import.txt file nor the Import.bin file is stored in the USBmemory 200, the importing process ends without importing the importconfiguration information (S46 described above). In other words, whenthe Import.txt file is present in the USB memory 200, or when theImport.bin file is obtained by decrypting the Import.txt file, importingthe import configuration information (S46) is executed. That is,presence of the Import.txt file in the USB memory 200 or acquisition ofthe Import.txt file from the USB memory 200 indicates instructing(permitting or allowing) to import the import configuration information.

In S40 of FIG. 7, the CPU 101 determines whether the initial state flagis set to “1”. In a case where the CPU 101 determines that the initialstate flag is not set to “1”, i.e., that the initial state flag is “0”(S40: NO), in S42 the CPU 101 executes authentication to login to theMFP 100 using the acquired device password. Here, the CPU 101 uses thedevice password acquired in S26 described above or prompts the user toinput a device password and acquires and uses the device passwordinputted by the user in response. In the authentication, the CPU 101compares with the device password stored in the NVM 104 with the devicepassword that is acquired in S26 or is inputted by the user. Theauthentication is successful when the device information stored in theNVM 104 matches the device password that is acquired in S26 or isinputted by the user.

In S44 the CPU 101 determines whether authentication was successful(OK). In a case where the CPU 101 determines that authentication wassuccessful, i.e., where the user is logged in to the MFP 100 (S44: YES),the CPU 101 advances to S46. However, in a case where the CPU 101determines that authentication was unsuccessful (S44: NO), the CPU 101ends the importing process.

Further, in a case where the CPU 101 determined in S40 described abovethat the initial state flag is set to “1” (S40: YES), the CPU 101 skipsS42 and S44 and advances to S46. In this way, the CPU 101 skipsauthentication with the device password in a case where the initialstate flag is “1”.

In S46 the CPU 101 executes a configuration information writing process.FIG. 8 illustrates steps in this configuration information writingprocess.

In S60 of FIG. 8, the CPU 101 first determines whether a Backup.bin fileas the encrypted import configuration information 225 is stored in theUSB memory 200. In a case where the CPU 101 determines that a Backup.binfile is stored in the USB memory 200 (S60: YES), in S62 the CPU 101decrypts the Backup.bin file using the data password acquired in S26,and subsequently advances to S64. Since the data password is included ineither the Import.txt file or the Import.bin file, the CPU 101 canacquire the data password to decrypt the Backup.bin file.

However, in a case where the CPU 101 determines in S60 that a Backup.binfile is not stored in the USB memory 200 (S60: NO), the CPU 101 skipsS62 and advances to S64.

In S64 the CPU 101 writes the configuration information included in theBackup.json file as the plaintext import configuration information 220to a prescribed area in the NVM 104. By writing the configurationinformation 220, the device password included in the Backup.json file iswritten to the prescribed area in the NVM 104 so as to update the devicepassword. This process enhances security on the MFP 100 since theinitial value of the device password stored in the NVM 104 isoverwritten by the device password included in the plaintext importconfiguration information 220. The device password included in theBackup.json file may not be written to the prescribed area in the NVM10. That is, the device password of the MFP 100 may not be updated.

Note that in a case where configuration information is imported from theUSB memory 200, the embodiment assumes that at least one of theBackup.bin file and Backup.json file is stored in the USB memory 200. Inaddition to this assumption, the embodiment may further assume that atleast one of the Import.txt file and Import.bin file always is stored inthe USB memory 200. That is, the embodiment may assume that theImport.txt file is always stored in the USB memory 200, or assume thatthe Import.bin file is always stored in the USB memory 200. The USBmemory 200 may not necessarily store one of the Backup.bin file andBackup.json file in such cases. That is, neither of the files may bestored in the USB memory 200. In a case where the CPU 101 detects thatneither the Backup.bin file nor Backup.json file is stored in the USBmemory 200, the CPU 101 does not execute the importing process.

In S66 the CPU 101 acquires from the Import.txt file a list mapping IPaddresses to pieces of device-specific information for individualdevices.

FIG. 10(a) shows an example of an Import.txt file as the plaintextimport instruction information 210. In addition to the device password(DEVICEPASSWORD=nimda) and the data password (DATAPASSWORD=abcdefg)described above, the Import.txt file also includes IP address settingsin the form of a list mapping IP addresses to pieces of individualdevice-specific information (REPLACED=. . . ). In this list,“192.168.1.0”, “192.168.1.1”, and “192.168.1.2” are IP addresses, and“X12345J5N790125”, “X12345J5N790143”, and “X12345J5N790188” followingthe “%S%” are manufacturing numbers (or serial numbers) serving asexamples of pieces of device-specific information unique to individualdevices. The “%S%” is an identifier indicating that the following valueis a manufacturing number (a serial number). Hence, the Import.txt filestores IP address values in association with manufacturing number(serial numbers). Note that the pieces of device-specific informationneed not be manufacturing numbers (serial numbers) but may be otherinformation that can identify individual devices, such as Media AccessControl (MAC) addresses. The NVM 104 may further store a MAC address ofthe network interface 108. The IP addresses are pieces of identificationinformation for identifying the MFPs including the MFP 100 on thenetwork. Such pieces of identification information may also be nodenames or the like in place of the EP addresses.

In S68 the CPU 101 determines whether there is a piece ofdevice-specific information matching that of the MFP 100 itself in theacquired list. That is, the CPU 101 determines in S68 whether the listincludes a manufacturing number (a serial number) matching themanufacturing number (serial number) of the MFP 100 stored in the NVM104. In a case where the CPU 101 determines that the list includes thematching piece of device-specific information, and specifically amatching manufacturing number (serial number) (S68: YES), in S70 the CPU101 writes the IP address in the list associated with the matchingmanufacturing number (serial number) to a prescribed area of the NVM104, and subsequently ends the configuration information writing processso as to update the IP address of the MFP 100. A different IP addressmust be written (imported) to each MFP. Therefore, the process ofS66-S70 described above must be performed to import a different valuefor each MFP. On the other hand, different values cannot be imported ina conceivable case that simply importing the configuration informationstored in the USB memory 200 for each MFP.

Since the configuration information 220 shown in FIG. 5 includes an IPaddress, the same IP address would be imported into a plurality of MFPsif values for all items (or parameters) in the plaintext importconfiguration information 220 were imported. However, although the IPaddress included in the configuration information 220 is importedinitially in the process of S64 described above, the process in S66-S70overwrites this IP address with a different IP address for differentMFPs, thereby avoiding the possibility of importing the same IP addressinto a plurality of MFPs.

Note that after completing the process of S70, the CPU 101 may modifythe stored state of the IP address in the list of the Import.txt storedin the USB memory 200. For example, the CPU 101 may delete thejust-imported IP address in S90 from the Import.txt file or may add aspecial mark to the IP address imported in S90 in the list of theImport.txt so that the IP address used (imported or written) in S90 canbe identified in the list. This process enables used IP addresses (i.e.,written IP addresses) to be identified in order to prevent an IP addressfrom being applied redundantly to multiple MFPs.

However, in a case where the CPU 101 determines in S68 that there is nomatching manufacturing number (serial number) in the list (S68: NO), theCPU 101 skips S70 and ends the configuration information writingprocess.

The configuration information writing process of FIG. 8 assumes that alist correlating IP addresses with pieces of device-specific informationfor individual devices is included in either the Import.txt file or theImport.bin file. However, the correspondence list may be included in aseparate file, such as an Iplist.txt file in the text format and thisseparate file (the Iplist.txt) may be stored in the USB memory 200together with the Import.txt file or the Import.bin file. The separatefile (the Iplist.txt) includes a correspondence list 230 shown in FIG.10(b). The correspondence list 230 includes node names (“alpha”, “beta”,and “gamma”) in addition to IP addresses. The IP address may be updatedby referring to the separate file (the Iplist.txt) in S70. By using thecorrespondence list 230, the CPU 101 may write the node namecorresponding to the MFP 100 to a prescribed area in the NVM 104, inaddition to writing the IP address in S70.

Returning to FIG. 7, in S48 the CPU 101 encrypts the Import.txt file asthe plaintext import instruction information 210 using the encryptionkey set in S20 or S22 described above to generate the Import.bin file asthe encrypted import instruction information 215 and stores theImport.bin file in the USB memory 200. Note even when the devicepassword is updated in S64, in S48 the Import.txt file is encrypted byusing the device password at the time of S22, that is, before updatingthe device password. It is assumed that the user may set the same devicepassword for the plurality of MFPs 100 and wish to execute the importingprocess for the plurality of MFPs 100 by using the single USB memory200. In such cases, when the importing process is executed in one of theMFPs 100, in S48 the Import.txt file is encrypted by using the samedevice password set by the user. Subsequently, when the importingprocess is executed in another MFP 100, in S30 another MFP 100 candecrypt the Import.bin file by using the same device password.Accordingly, the importing process can be executed by the single USBmemory 200.

In S50 the CPU 101 deletes the Import.txt file from the USB memory 200.In other words, the CPU 101 replaces the plaintext import instructioninformation 210 with the encrypted import instruction information 215.In S52 the CPU 101 resets the initial state flag to “0” and ends theimporting process.

As described above, the MFP 100 according to the embodiment is providedwith: the NVM 104 that stores the device password of the MFP 100 and theconfiguration information including operating settings for the MFP 100;the CPU 101 that performs operations based on the configurationinformation; and the USB interface 107.

When the USB memory 200 that stores the import configuration informationand import instruction information for instructing the importation ofimport configuration information is connected to the USB interface 107,the CPU 101 imports the import configuration information into the NVM104, encrypts the import instruction information based on using theencryption key set in S20 or S22 (the universal password or the devicepassword), and stores the encrypted import instruction information inthe USB memory 200.

Since the MFP 100 of the embodiment encrypts the import instructioninformation based on the encryption key set in S20 or S22 (the universalpassword or the device password) and stores the encrypted information inthe USB memory 200, the embodiment can enhance protection of the importinstruction information.

The MFP 100 in the embodiment is an example of the “informationprocessing device.” The NVM 104 is an example of the “storage.” The CPU101 is an example of the “controller.” The USB interface 107 is anexample of the “Input/Output interface.” The USB memory 200 is anexample of the “storage medium.” The universal password is an example ofthe “confidential information.”

The import configuration information is encrypted, and the importinstruction information includes decryption information for decryptingthe encrypted configuration information. Because the importconfiguration information is encrypted in this way, protection of theimport configuration information can be enhanced.

The data password is an example of the “decryption information.”

The universal password is information used commonly for a plurality ofMFPs that satisfy prescribed criteria.

With the universal password, the encrypted import instructioninformation can be decrypted on other MFPs that satisfy the prescribedcriteria.

The prescribed criteria require that the MFP has at least one of thesame specifications and the same firmware.

The device password is stored in the NVM 104 of the MFP 100. The CPU 101encrypts the import instruction information based on the universalpassword and stores the encrypted information in the USB memory 200 in acase where the device password has not been changed from its initialvalue. On the other hand, the CPU 101 encrypts the import instructioninformation based on the device password and stores the encrypted importinstruction information in the USB memory 200 in a case where the devicepassword has been changed from its initial value.

Accordingly, the import instruction information can only be encryptedwith the universal password in a case where the MFP 100 is in itsinitial state.

When the USB memory 200 storing the encrypted import instructioninformation is connected to the USB interface 107, the MFP 100 decryptsthe import instruction information. Here, the MFP 100 decrypts theimport instruction information based on the universal password in a casewhere the device password has not been changed from its initial valueand decrypts the import instruction information based on the devicepassword in a case where the device password has been changed from itsinitial value.

Thus, when settings are imported from the USB memory 200 the second andsubsequent times, the encrypted import instruction information isdecrypted and imported, thereby further enhancing protection of theimport instruction information.

While the disclosure has been described in detail with reference to thespecific embodiment thereof, it would be apparent to those skilled inthe art that various changes and modifications may be made thereinwithout departing from the scope of the invention.

(1) In the embodiment, the MFP 100 is described as an example of theinformation processing device. However, the information processingdevice may be a single printer, a single scanner, or a copy machine.

(2) In the embodiment, the MFP 100 does not have a facsimile function.However, the MFP 100 may have the facsimile function.

(3) In the embodiment, the CPU 101 is used as an example of acontroller. However, instead of the CPU 101, a dedicated circuit may beused as an example of the controller, such as an ASIC (ApplicationSpecific Integrated Circuit) or FPGA (Field Programmable Gate Array).

(4) In the embodiment described above, the USB interface 107 is used asan example of the Input/Output interface. The Input/Output interfacereads information from a connected storage medium and writes informationto the connected storage medium. The storage medium is a portablestorage medium from which the MFP 100 can read the information via theInput/Output interface and to which the MFP 100 can write informationvia the Input/Output interface. In addition to the USB memory 200, amemory card or the like may be used as the storage medium. In additionto the USB interface 107, a memory card reader/writer, or a wirelessinterface such as the Near-Field Communication (NFC) interface or theBluetooth (registered trademark) interface may be used as theInput/Output interface. Secure Digital Input/Output (SDIO) may also beemployed as the Input/Output interface.

(5) In the embodiment described above, the plaintext importconfiguration information 220 is imported into the MFP 100 when the USBmemory 200 is connected to the MFP 100 while the operator is pressingthe Stop key 106 a. However, the operated key is not limited to the Stopkey 106 a but may be one or a plurality of special keys, or special keysor icons displayed on the panel 105, or their combination.

(6) In the embodiment described above, the encrypted importconfiguration information 225 (Backup.bin file) is stored in the USBmemory 200 and is decrypted using the data password in order to importthe plaintext import configuration information 220 (Backup.json file)into the MFP 100. However, the plaintext import configurationinformation 220 may be stored in the USB memory 200 and importeddirectly in the importing process.

(7) In the embodiment described above, the device password is stored inthe NVM 104, but the device password may be stored in the ROM 102.

What is claimed is:
 1. An image forming device comprising: an imageforming engine configured to form an image; a memory storingconfiguration information and confidential information; an input outputinterface; and a controller configured to operate based on theconfiguration information, the controller configured to perform: in acase where a storage medium is connected to the input output interface,and the storage medium stores import configuration information andimport instruction information: importing the import configurationinformation as the configuration information to the memory by using theimport instruction information; encrypting the import instructioninformation by using the confidential information; and storing theencrypted import instruction information in the storage medium, whereinafter the import configuration information is imported, the controlleroperates according to the import configuration information.
 2. The imageforming device according to claim 1, wherein the import configurationinformation includes settings information for forming the image usingthe image forming engine, wherein after the import configurationinformation is imported, the controller controls the image formingengine according to the operation settings information in the importconfiguration information.
 3. The image forming device according toclaim 2, wherein the controller is configured to further perform: in acase where the storage medium is connected to the input outputinterface, and the storage medium stores import configurationinformation and the encrypted import instruction information: decryptingthe encrypted import instruction information by using the confidentialinformation to obtain decrypted import instruction information; andimporting the import configuration information to the memory by usingthe decrypted import instruction information.
 4. The image formingdevice according to claim 3, wherein the controller is configured tofurther perform: in a case where the storage medium is connected to theinput output interface, the storage medium stores import configurationinformation and the encrypted import instruction information used forinstructing to import the import configuration information, and theimport configuration information is encrypted: decrypting the encryptedimport instruction information to obtain decrypted import instructioninformation by using the confidential information, the importinstruction information including decryption information used fordecrypting the import configuration information encrypted; decryptingthe import configuration information by using the decryption informationincluded in the decrypted import instruction information; and importingthe import configuration information decrypted to the memory.
 5. Theimage forming device according to claim 1, wherein the importconfiguration information is encrypted in the storage medium, whereinthe import instruction information includes decryption information usedfor decrypting the import configuration information encrypted.
 6. Theimage forming device according to claim 1, wherein the confidentialinformation is information universally stored in a plurality of imageforming devices satisfying prescribed criteria.
 7. The image formingdevice according to claim 6, wherein the prescribed criteria include atleast one of criteria that the image forming device can import specificconfiguration information and criteria that the image forming device hasa specific firmware.
 8. The image forming device according to claim 7,wherein the memory further stores a device password for authenticatinglogin to the image forming device, the device password being changeablefrom an initial value, wherein in a case where the device password ismaintained to the initial value, the controller encrypts the importinstruction information by using the confidential information, and thecontroller stores the encrypted import instruction information in thestorage medium, wherein in a case where the device password is changedfrom the initial value, the controller encrypts the import instructioninformation by using the device password and the controller stores theencrypted import instruction information in the storage medium.
 9. Theimage forming device according to claim 8, wherein in a case where thestorage medium is connected to the input output interface, the storagemedium stores the import configuration information and the encryptedimport instruction information, and the device password is maintained tothe initial value, the controller is configured to further perform:decrypting the encrypted import information by using the confidentialinformation; and importing the import configuration information to thememory by using the decrypted import instruction information, wherein ina case where the storage medium is connected to the input outputinterface, the storage medium stores the import configurationinformation and the encrypted import instruction information, and thedevice password is changed from the initial value, the controller isconfigured to further perform: decrypting the encrypted importinstruction information by using the device password; and importing theimport configuration information to the memory by using the decryptedimport instruction information.
 10. A method for controlling an imageforming device, the image forming device including: an image formingengine configured to form an image on a sheet; a memory storingconfiguration information and confidential information; and an inputoutput interface, the image forming device operating according to theconfiguration information, the method comprising: in a case where astorage medium is connected to the input output interface, and thestorage medium stores import configuration information and importinstruction information: importing the import configuration informationas the configuration information to the memory by using the importinstruction information; encrypting the import instruction informationby using the confidential information; and storing the encrypted importinstruction information in the storage medium, wherein after the importconfiguration information is imported, the image forming device operatesaccording to the import configuration information.
 11. An image formingdevice comprising: an image forming engine configured to form an imageon a sheet; a memory storing configuration information and deviceinformation which is individual for the image forming device; an inputoutput interface; and a controller configured to operate based on theconfiguration information, the controller configured to perform: in acase where a storage medium is connected to the input output interface,and the storage medium stores import configuration information andimport instruction information: importing the import configurationinformation as the configuration information to the memory by using theimport instruction information; encrypting the import instructioninformation by using the device information; and storing the encryptedimport instruction information in the storage medium, wherein after theimport configuration information is imported, the controller operatedaccording to the import configuration information.
 12. The image formingdevice according to claim 11, wherein the device information is a devicepassword for authenticating login to the image forming device.
 13. Theimage forming device according to claim 12, wherein the memory furtherstores confidential information, wherein the device password ischangeable from an initial value, wherein in a case where the devicepassword is maintained to the initial value, the controller encrypts theimport instruction information by using the confidential information andstores the encrypted import instruction information in the storagemedium, wherein in a case where the device password is changed from theinitial value, the controller encrypts the import instructioninformation by using the device password and stores the encrypted importinstruction information in the storage medium.
 14. The image formingdevice according to claim 11, wherein the import configurationinformation includes settings information for forming the image usingthe image forming engine, wherein after the import configurationinformation is imported, the controller controls the image formingengine according to settings information in the import configurationinformation.
 15. The image forming device according to claim 14, whereinthe controller is configured to further perform: in a case where thestorage medium is connected to the input output interface, the storagemedium stores import configuration information and the encrypted importinstruction information used for instructing to import the importconfiguration information: decrypting the encrypted import instructioninformation by using the device information to obtain decrypted importinstruction information; and importing the import configurationinformation to the memory by using the decrypted import instructioninformation.
 16. The image forming device according to claim 11, whereinthe import configuration information is encrypted in the storage medium,wherein the import instruction information includes decryptioninformation used for decrypting the import configuration informationencrypted.
 17. The image forming device according to claim 11, whereinthe memory further stores confidential information, the confidentialinformation being information universally stored in a plurality of imageforming devices satisfying prescribed criteria.
 18. The image formingdevice according to claim 17, wherein the prescribed criteria include atleast one of criteria that the image forming device can import specificconfiguration information and criteria that the image forming device hasa specific firmware.
 19. The image forming device according to claim 17,wherein the device information is a device password for authenticatinglogin to the image forming device, the device password being changeablefrom an initial value, wherein in a case where the storage medium isconnected to the input output interface, the storage medium stores theimport configuration information and the encrypted import instructioninformation, and the device password is maintained to the initial value,the controller is configured to further perform: decrypting theencrypted import information by using the confidential information; andimporting the import configuration information as the configurationinformation to the memory by using the decrypted import instructioninformation, wherein in a case where the storage medium is connected tothe input output interface, the storage medium stores the importconfiguration information and the encrypted import instructioninformation, and the device password is changed from the initial value,the controller is configured to further perform: decrypting theencrypted import instruction information by using the device password;and importing the import configuration information as the configurationinformation to the memory by using the decrypted import instructioninformation.