Brother International HL 4040CN Network Users Manual - English - Page 131
Security features, Overview, Security terms
UPC - 012502617785
View all Brother International HL 4040CN manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 131 highlights
12 Security features 12 Overview 12 In today's world there are many security threats to your network and the data that travels over it. Your Brother printer employs some of the latest network security and encryption protocols available today. These network features can be integrated into your overall network security plan to help protect your data and prevent unauthorized access to the printer. This chapter explains that various security protocols supported and how to configure them. Security terms 12 CA (Certificate Authority) A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate. CSR (Certificate Signing Request) A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSR contains information identifying the applicant, the public key generated by the applicant and the digital signature of the applicant. Certificate A Certificate is the information that binds together a public key with an identity. The certificate can be used to verify that a public key belongs to an individual. The format is defined by the x.509 standard. Digital signature A Digital signature is a value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity. Public key cryptosystem 12 A Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm. Shared key cryptosystem A Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for two different steps of the algorithm (such as encryption and decryption). 124