Kyocera KM-2540 Fax System (P) Operation Guide Rev-1 - Page 177

Communicating with Encrypted Documents (Encrypted Communication), Registering New Encryption Keys

Page 177 highlights

Communicating with Encrypted Documents (Encrypted Communication) Encrypted Communication involves the encryption of documents prior to their transmission. In this way, third parties are prevented from seeing the actual documents even if they should be able to access the transmission itself. Those documents are then decrypted and printed out in their original form only after receipt by the receiving party, making this function extremely beneficial for sending strictly confidential information. IMPORTANT To accomplish Encrypted Communication, the other party's fax machine must be one of our models that has the same Encrypted Communication capabilities as your fax machine. To successfully accomplish encryption, and then the corresponding decryption, both the transmitting and receiving parties must use the same 16-character Encryption Key. If the Encryption Keys used by both parties do not match EXACTLY, Encrypted Communication will not be possible. Therefore, it is necessary for both parties to determine, in advance, the Encryption Key that will be used and register it under a 2-digit Encryption Key Number. . Settings Key Number Encryption Key Key Number Registered Under the Corresponding One-Touch Key Receiving Fax's Encryption Box Encryption Box Number Encryption Box Key Number Settings in the transmitting and receiving faxes Transmitting fax (A) 2 digits (C) 16 characters (A) 2 digits (D) 4 digits Receiving fax (B) 2 digits (C) 16 characters (D) 4 digits (B) 2 digits Reference page 6-35 6-35 2-16 2-16 6-38 6-38 Note Be sure that those settings above which are indicated with the same letter in parenthesis are registered with the EXACT same numbers or characters, as appropriate. Registering New Encryption Keys The Encryption Key to be used must be selected by the transmitting party during the registration of the corresponding one-touch key which is to be designated for Encrypted Transmission, and by the receiving party during registration of the corresponding Encryption Box. Various Settings and Registration 6-35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Various Settings and Registration
6-35
Communicating with Encrypted Documents
(Encrypted Communication)
Encrypted Communication involves the encryption of documents prior to
their transmission. In this way, third parties are prevented from seeing
the actual documents even if they should be able to access the
transmission itself.
Those documents are then decrypted and printed out in their original
form only after receipt by the receiving party, making this function
extremely beneficial for sending strictly confidential information.
.
Settings in the transmitting and receiving faxes
Registering New Encryption Keys
The Encryption Key to be used must be selected by the transmitting
party during the registration of the corresponding one-touch key which is
to be designated for Encrypted Transmission, and by the receiving party
during registration of the corresponding Encryption Box.
IMPORTANT
To accomplish Encrypted Communication, the other
party's fax machine must be one of our models that has the same
Encrypted Communication capabilities as your fax machine.
To successfully accomplish encryption, and then the corresponding
decryption, both the transmitting and receiving parties must use the
same 16-character Encryption Key.
If the Encryption Keys used by both parties do not match EXACTLY,
Encrypted Communication will not be possible. Therefore, it is
necessary for both parties to determine, in advance, the Encryption
Key that will be used and register it under a 2-digit Encryption Key
Number.
Settings
Transmitting fax
Receiving fax
Reference
page
Key Number
(A) 2 digits
(B) 2 digits
6-35
Encryption Key
(C) 16 characters
(C) 16 characters
6-35
Key Number Registered Under the
Corresponding One-Touch Key
(A) 2 digits
2-16
Receiving Fax's Encryption Box
(D) 4 digits
2-16
Encryption Box Number
(D) 4 digits
6-38
Encryption Box Key Number
(B) 2 digits
6-38
Note
Be sure that those settings above which are indicated with
the same letter in parenthesis are registered with the EXACT same
numbers or characters, as appropriate.