Kyocera KM-3050 Fax System (M) Operation Guide Rev-2.0 - Page 143

Encryption, IMPORTANT, Description of settings at sending and receiving systems, Settings, Sending

Page 143 highlights

Encryption FAX Operation (Advanced) This method allows you to communicate with originals encrypted by the sending system. Therefore, even when a third party tries to view the originals in the middle of communication by some means, the third party is prevented from knowing the actual contents of the originals. The originals received are reverted to the originals as they were before transmission (decrypted) by the receiving system, and printed. This is an extremely effective communication method for sending confidential documents that are not to be opened by a third party. IMPORTANT: In order to use encryption communication, the fax of the other party needs to be an our-brand system with the same type of encryption functions. In encryption communication, in order to encrypt and decrypt originals, the sending and receiving systems must use the same 16-digit encryption key. When the encryption key differs between the sending system and the receiving system, the encryption cannot be conducted. Therefore, the sending system and the receiving system need to have the same encryption key and 2-digit key No. registered in advance. Sending system Receiving system Encrypt Decrypt Scan originals Encryption Output originals Description of settings at sending and receiving systems Settings Sending system Receiving system Reference page Encryption Key No. (A) 2 digits (B) 2 digits 5-60 Encryption Key Key No. of Address Book (or when the number is directly dialed) Receiving system encryption box number † Encryption Box No. † (C) 16 digits (A) 2 digits (D) 4 digits (C) 16 digits (D) 4 digits 5-60 5-60 5-61 - Key No. in reception setting (B) 2 digits 5-63 †. When the machine receives originals, the Encryption Box is not used. OPERATION GUIDE 5-59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

FAX Operation (Advanced)
OPERATION GUIDE
5-59
Encryption
This method allows you to communicate with originals encrypted by the
sending system. Therefore, even when a third party tries to view the
originals in the middle of communication by some means, the third party is
prevented from knowing the actual contents of the originals. The originals
received are reverted to the originals as they were before transmission
(decrypted) by the receiving system, and printed. This is an extremely
effective communication method for sending confidential documents that
are not to be opened by a third party.
IMPORTANT:
In order to use encryption communication, the fax of the
other party needs to be an our-brand system with the same type of
encryption functions.
In encryption communication, in order to encrypt and decrypt originals, the
sending and receiving systems must use the same 16-digit encryption key.
When the encryption key differs between the sending system and the
receiving system, the encryption cannot be conducted. Therefore, the
sending system and the receiving system need to have the same
encryption key and 2-digit key No. registered in advance.
Description of settings at sending and receiving systems
Scan originals
Output originals
Encrypt
Decrypt
Encryption
Sending system
Receiving system
Settings
Sending
system
Receiving
system
Reference
page
Encryption Key No.
(A) 2 digits
(B) 2 digits
5-60
Encryption Key
(C) 16 digits
(C) 16 digits
5-60
Key No. of Address Book
(or when the number is
directly dialed)
(A) 2 digits
5-60
Receiving system
encryption box number
(D) 4 digits
5-61
Encryption Box No.
(D) 4 digits
-
Key No. in reception
setting
(B) 2 digits
5-63
†.
When the machine receives originals, the Encryption Box is not used.