Kyocera KM-1820 Fax System (K) Operation Guide - Page 130

Encrypted Communication, Decryption

Page 130 highlights

Advanced Functions Encrypted Communication This function encrypts documents before transmission, protecting document contents from viewing by unauthorized third parties, even if transmission is intercepted. After reception, documents are decrypted by the recipient and printed. This is a very effective way to fax documents for which confidentiality is essential. NOTE: Encrypted communications require the other fax machine to have compatible encryption functions. Successful encryption and decryption requires that the sender and recipient use the same 16-character encryption key. If the encryption keys of the parties do not match, encrypted communication is not possible. The sender and recipient must determine encryption conditions beforehand and register the encryption key under a two-digit encryption key ID. Scanning Sender Encryption Recipient Decryption Printing Encrypted Communication Sender and Recipient Settings Setting Sender Recipient Reference Page Encryption key ID (A) 2-digit (B) 2-digit page 5-39 ID ID Encryption key (C) 16digit key (C) 16digit key page 5-39 Encryption key ID assigned to a one-touch dial key or the Address Book (A) 2-digit key page 3-25 Encryption key ID in the encrypted reception setting (B) 2-digit page 5-41 key Use matching numbers for the settings above indicated by the same letters in parenthesis. For example, the same number must be used by the sender and recipient for the encryption key. Encryption Keys and Encryption Key IDs 5-38 OPERATION GUIDE

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

Advanced Functions
5-38
OPERATION GUIDE
Encrypted Communication
This function encrypts documents before transmission, protecting
document contents from viewing by unauthorized third parties, even if
transmission is intercepted. After reception, documents are decrypted by
the recipient and printed. This is a very effective way to fax documents for
which confidentiality is essential.
NOTE:
Encrypted communications require the other fax machine to have
compatible encryption functions.
Successful encryption and decryption requires that the sender and
recipient use the same 16-character encryption key. If the encryption keys
of the parties do not match, encrypted communication is not possible. The
sender and recipient must determine encryption conditions beforehand
and register the encryption key under a two-digit encryption key ID.
Sender and Recipient Settings
Use matching numbers for the settings above indicated by the same letters
in parenthesis. For example, the same number must be used by the sender
and recipient for the encryption key.
Encryption Keys and Encryption Key IDs
Setting
Sender
Recipient
Reference
Page
Encryption key ID
(A) 2-digit
ID
(B) 2-digit
ID
page 5-39
Encryption key
(C) 16-
digit key
(C) 16-
digit key
page 5-39
Encryption key ID assigned
to a one-touch dial key or the
Address Book
(A) 2-digit
key
page 3-25
Encryption key ID in the
encrypted reception setting
(B) 2-digit
key
page 5-41
Scanning
Sender
Recipient
Printing
Decryption
Encryption
Encrypted
Communication