Info Input Solution FAQs

Below are the frequently asked questions for the Info Input Solution.
Select another product by typing the name in the field below.

Log4j Vulnerability

  • Issue
    • On December 10th, 2021, a global and widespread critical vulnerability was discovered in Apache Log4j, an open-source Java package used to enable logging in many popular applications. This vulnerability can be exploited to allow remote code execution on servers. It affects several applications, including Info Input Solution.

  • Mitigation
    • The following cumulative patch releases are available that address the original reported vulnerability (CVE-2021-44228) as well as the most recent vulnerability (CVE-2021-45105). These releases contain a new version of the log4j library, version 2.17.0, that provides full remediation of the reported vulnerabilities. Please follow the Patch Deployment Instructions in the Release Notes for the version of Info Input Solution (i.e., 5.2, 6.0, or 6.1) that you have installed on your server. These instructions describe not only how to upgrade your installation to the patch release, but also how to remove the older vulnerable libraries from your server.

  • Patch Releases

Service and Support

  • Are the images encrypted in any way?
    • At the lowest level, the image data is not encrypted. The scanning system relies on the security layers of the network.
  • What additional security features are in place?
    • Another security feature of the S2000 Series Scanners is the encryption of the data encoded in the barcode of the EasySetup sheets. We have taken steps to ensure that the setup data that is encoded in this barcode cannot be extracted

      The s2000w Scanners include a “Single User Mode” that will allow only one host PC to access a scanner over a network connection. If the scanner is set up for Single User Mode, the first PC to connect with the S2000w scanner over a network becomes the single “network owner” of the scanner. From that point on, network ownership of the scanner cannot be cleared or charged without resetting the scanner to factory defaults which requires physical access to the scanner.

  • What is the data encryption used to exchange commands, image header data, and images when scanning?
    • When communicating with the scanner using TWAIN/ISIS/WIA drivers, the S2000w Scanners do not apply additional encryption beyond that which is provided by the host PC. The Alaris network scanners support several wireless standard encryption protocols (WEP/WPA/WPA2 personal) and two enterprise level protocols (MSCHAPv2/EAP-TLS) that require certificates.

      When communicating with the scanner using the RESTful API (web) interface, scans are encrypted via wired and wireless protocol during transport using SSL encryption via the HTTPS protocol.

  • What is the data encryption used to exchange commands, image header and images when scanning? (wired and wireless)
    • When communicating with the scanner via the traditional TWAIN/ISIS/WIA drivers the S2000w Series scanners do not apply addition encryption beyond that which is provided by the host PC that is being used. The Alaris network scanners support several wireless standard encryption protocols (WEP/WPA/WPA2 personal) as well as two enterprise level protocols (MSCHAPv2/EAP-TLS) that require certificates.

      When communicating with the scanner via the RESTful API interface, scans are additionally encrypted via wired and wireless protocol during transport using SSL encryption via the HTTPS protocol.

  • How do I obtain support?
    • For Information on how to contact Kodak Alaris Support, please click here.

  • How do I order Professional Services?
    • For Information on how to contact Kodak Alaris Support, please click here.

  • How do I purchase service?
    • To view Kodak Alaris' service offerings, click here.
      To purchase a service offering, please visit the How to Buy page or contact Kodak Alaris Sales for more Information.

  • What is included with my support agreement?
    • For information on what KODAK Info Input Software Assurance includes, please click here.

  • What Professional Services are available?
    • Please contact Kodak Alaris to learn more about professional services.

Installing

Using

  • How do I purchase the software?
    • To purchase a service offering, please check the How to Buy page or contact Kodak Alaris Sales for more Information.

  • What features are included in the software?
    • With KODAK Info Input Solution you can:

      • Easily embed Info Input within existing business applications to complete transactions faster.
      • Support distributed and centralized scanning directly from your browser.
      • Capture documents with your smartphone or tablet, then upload information to the Info Input application server through a secure connection.