Kyocera FS-6525MFP Fax System (U) Operation Guide Rev-4.2012.3 - Page 124

Encryption, Registering an Encryption Key

Page 124 highlights

Using Convenient Fax Functions > Encryption Encryption This method allows you to communicate with originals encrypted by the sending system. Therefore, even when a third party tries to view the originals in the middle of communication by some means, the third party is prevented from knowing the actual contents of the originals. The originals received are reverted to the originals as they were before transmission (decrypted) by the receiving system, and printed. This is an extremely effective communication method for sending confidential documents that are not to be opened by a third party. IMPORTANT In order to use encryption communication, the fax of the other party needs to be an our-brand system with the same type of encryption functions. In encryption communication, in order to encrypt and decrypt originals, the sending and receiving systems must use the same 16-digit encryption key. When the encryption key differs between the sending system and the receiving system, the encryption cannot be conducted. Therefore, the sending system and the receiving system need to have the same encryption key and 2-digit key No. registered in advance. Sending system Receiving system Encrypt Decrypt Scan originals Encryption Output originals Description of settings at sending and receiving systems Settings Sending system Receiving system Encryption Key No. (A) 2 digits (B) 2 digits Encryption Key (C) 16 digits (C) 16 digits Key No. of Address Book (or when the number (A) 2 digits ― is directly dialed) Receiving system encryption box number* (D) 4 digits ― Encryption Box No.* ― (D) 4 digits Key No. in reception setting ― (B) 2 digits Reference page 6-36 6-36 6-39 6-39 ― 6-42 * When the machine receives originals, the Encryption Box is not used. NOTE Set the same characters for the numbers indicated by the same letter in parentheses. For example, the same characters should be used as the encryption key (C) in both the sending and receiving systems. Registering an Encryption Key An encryption key is required when registering the Address Book used for encryption communication (the other party is directly entered using the numeric keys) in the sending system and when setting encryption in the receiving system. 6-36

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

6-36
Using Convenient Fax Functions > Encryption
Encryption
This method allows you to communicate with originals encrypted by the sending system. Therefore, even when a third
party tries to view the originals in the middle of communication by some means, the third party is prevented from
knowing the actual contents of the originals. The originals received are reverted to the originals as they were before
transmission (decrypted) by the receiving system, and printed. This is an extremely effective communication method for
sending confidential documents that are not to be opened by a third party.
In encryption communication, in order to encrypt and decrypt originals, the sending and
receiving systems must use the same 16-digit encryption key. When the encryption key differs
between the sending system and the receiving system, the encryption cannot be conducted.
Therefore, the sending system and the receiving system need to have the same encryption
key and 2-digit key No. registered in advance.
Description of settings at sending and receiving systems
Registering an Encryption Key
An encryption key is required when registering the Address Book used for encryption
communication (the other party is directly entered using the numeric keys) in the
sending system and when setting encryption in the receiving system.
IMPORTANT
In order to use encryption communication, the fax of the other party needs to be an
our-brand system with the same type of encryption functions.
Settings
Sending
system
Receiving
system
Reference
page
Encryption Key No.
(A) 2 digits
(B) 2 digits
6-36
Encryption Key
(C) 16 digits
(C) 16 digits
6-36
Key No. of Address Book (or when the number
is directly dialed)
(A) 2 digits
6-39
Receiving system encryption box number
*
*
When the machine receives originals, the Encryption Box is not used.
(D) 4 digits
6-39
Encryption Box No.*
(D) 4 digits
Key No. in reception setting
(B) 2 digits
6-42
NOTE
Set the same characters for the numbers indicated by the same letter in parentheses. For
example, the same characters should be used as the encryption key (C) in both the sending
and receiving systems.
Output originals
Decrypt
Receiving system
Encryption
Encrypt
Sending system
Scan originals