ScanFront 300P/330
libtiff Copyright (c) 1988-1996 Sam Leffler Copyright (c) 1991-1996 Silicon Graphics, Inc. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics. THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. libjpeg Portions of this software are based in part on the work of the Independent JPEG Group.
MD5 derived from the RSA Data Security, Inc. MD5 Message- Digest Algorithm Copyright (c) 1998-2002, Paul Johnston & Contributors All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. Windows CE 6.0 Depending upon which components you are running, your product may contain the following third party technologies: Portions of this software are based on NCSA Mosaic. NCSA Mosaic was developed by the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign.Distributed under a licensing agreement with Spyglass, Inc. Contains security software licensed from RSA Data Security, Inc. Portions of IPSec and related services jointly developed by Microsoft Corporation and Cisco Systems, Inc. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Hg LAMP(S) INSIDE THIS PRODUCT CONTAIN MERCURY AND MUST BE RECYCLED OR DISPOSED OF ACCORDING TO LOCAL, STATE OR FEDERAL LAWS. Opera or Opera Software are registered trademarks of Opera Software ASA in Norway or other countries. OPERA SOFTWARE ASA'S AND THIRD PARTY SUPPLIER'S COPYRIGHT NOTICE AND ACKNOWLEDGEMENTS
I. Opera Software ASAs browser/browser engine Opera Browser from Opera Software ASA. Copyright 1995-2008 Opera Software ASA. All rights reserved. This software is being provided on an «as is» basis. Opera and its suppliers disclaim all warranties regarding the software, either express or implied, statutory or otherwise, including without limitation warranties of functionality, fitness for a particular purpose or non-infringement. II. The required acknowledgements for third party components included in the OperaRBrowser engine are as follows: 1. David Gay's binary/decimal conversion code (dtoa and strtod) "The author of this software is David M. Gay. Copyright (c) 1991, 2000, 2001 by Lucent Technologies. Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software. THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY.IN PARTICULAR, NEITHER THE AUTHOR NOR LUCENT MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. 2. OpenSSL 0.9.8e (formerly SSLeay) The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact opensslcore@openssl.org. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). Original SSLeay License Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines [SIC] from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] Copyright CANON ELECTRONICS INC. 2013 ALL RIGHTS RESERVED
i
ii
iii
iv
v
vi
vii
1. 1-2
1-3
1-4
2. * * * 1-5
- * * 1-6
3. * a b - c - d e - f - g - h i - * j - k - l - 1-7
m n - o p q - r s 1-8
4. * * 1-9
1-10
1. 2-2
2-3
2. 1. a 2. b a b 2-4
2-5
3. 1. 4. 2. 3. 2-6
- 2-7
1. 2. 3. 2-8
4. 1. - 2-9
2. 3. 5. 6. - 4. 2-10
5. 2-11
- 2-12
1. 3-2
a b c 3-3
2. - - 3-4
3. - - 3-5
- - - - - - - - - - - - - - - - - - 3-6
- - - - 3-7
4. 1. 3. 2. 3-8
3-9
- - - - - 3-10
- 3-11
3-12
1. 4-2
2. 1. 2. 3. 4. 4-3
5. 6. 7. 4-4
8. 9. 4-5
3. 1. - 2. 3. 4-6
1. - * - * * - - - - - * - * - - * - - - - 5-2
2. - - - 5-3
3. - - - 5-4
1. 3. 2. 4. 5. 5-5
1. 3. 4. 2. 5-6
- 1. 2. 5-7
4. - - - a b c a - b - c - - 5-8
5. - 5-9
6. - 1. 5-10
2. 4. 3. 5. 6. 5-11
7. - 5-12
- 5-13
a c b h d e f g a b c d e f g h - 5-14
- 5-15
a b c d e f a b c d e f 5-16
a b c d e f g a b c d e f g 5-17
- 3. 1. 4. 2. 5-18
- 7. 5. - - 6. 8. 5-19
第 5 章 ScanFront の使用方法 9. 送信開始 を押します 次ページの画像を表示します 前ページの画像を表示します 拡大表示させた表示画像を移動します 画像を反時計方向に 90 度回転します 画像を時計方向に 90 度回転します 画像を拡大します 画像を縮小します ヒント プレビュー画像を拡大表示しているときは 画像を指でドラッグし てスクロールできます アドレスの確認メッセージが表示されます 重要 読取 / 送信設定画面の 送信設定 の設定で 送信前に宛先を確 認する が オフ に設定されている場合 宛先の確認画面を表示 しないで画像を送信し 終了します 5-20
10. 11. 5-21
8. 1. 2. 5-22
5-23
5-24
1. 1. 2. 2. 3. 3. 4. - 5-25
4. 5-26
9. a e f k b i j a b c - d - e - f - g c h d g h i j k 5-27
e - - 5-28
5-29
5-30
5-31
- - 5-32
5-33
* - 5-34
- 5-35
1. - 6-2
a b c d e f a - b - c - d - e - f - 6-3
a b c a - b - c - 6-4
2. - 1. 2. 5. 3. 4. 6-5
3. h - b c d e a i f g h i a - b c d - e - f - g 6-6
- - - - - 6-7
- 6-8
6-9
- 6-10
- 6-11
- - 6-12
1. 2. 3. 4. 2. 3. 1. 6-13
4. a d e j f g h i b c a b - c - d e - f g h - i j 6-14
6-15
6-16
6-17
1. 3. 1. 2. 2. 6-18
1. 2. 3. 4. 6-19
5. a d i e f g h b c a b - c - d - e f g - h i 6-20
- 6-21
6-22
6-23
* - 6-24
6-25
1. 2. 3. 6-26
- 1. 2. 3. 4. 2. 1. 6-27
6. a a b c d e b c d e a - b - c - d - e - 6-28
6-29
- 6-30
6-31
7. a b c d e f g a b c d e f g a - b - c - d - e - f - g - 6-32
- 6-33
6-34
- 6-35
- 1. 2. 6-36
3. 6-37
8. b a a b c d d c a - b - c - d - - 6-38
1. 2. 3. 1. 2. 6-39
3. 4. 5. 6. 1. 2. - 3. 4. - 5. 6-40
6. 7. 1. 2. 6-41
1. 7-2
2. 1. 2. 3. 4. 7-3
5. 6. 7-4
3. 2. 3. 1. 7-5
4. 7-6
7-7
7-8
1. - a b c a - b - c - 8-2
2. 1. 2. 3. 4. 5. 8-3
3. a a - 8-4
- - 8-5
8-6
8-7
8-8
4. a d e j b f g h i c a b - c - d e - f g h - i j 8-9
8-10
8-11
8-12
1. 8-13
2. 1. 3. 2. 4. 8-14
1. 2. 3. 4. 8-15
5. a d i b e f g h c a b - c - d - e f g - h i 8-16
8-17
- 8-18
ON OFF ON OFF 8-19
8-20
* - 8-21
8-22
1. 2. 3. 8-23
4. 1. - 2. 3. 4. 1. 2. 8-24
1. 9-2
1. 2. 3. 9-3
4. 5. 7. 8. 6. - - 9-4
3. a b 1. 4. 2. a b 5. 9-5
6. 1. 7. 8. 2. a b 9-6
3. a b 6. 4. 7. 5. 8. 9-7
2. - - 1. - 9-8
2. 1. 3. 4. 2. 9-9
3. 4. 9-10
1. -- - - - 10-2
- - - - - - - 10-3
- - - - 10-4
2. --- - - - - - - 10-5
10-6
10-7
3. -- -- 10-8
-- - 10-9
4. 1. 2. 10-10
3. a e 4. 10-11
5. 1. 3. 2. 4. 10-12
5. 10-13
1. 11-2
- 11-3
11-4
2. - 11-5
11-6
11-7
3. 11-8
11-9
11-10
PUB. CE-IJ-0924-01 CANON ELECTRONICS INC. 2013