Konica-minolta 7145 User Manual Page 8

  • Download
  • Add to my manuals
  • Print
  • Page
    / 40
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 7
- 2 -
Enhanced Security Mode
Description of Enhanced Security mode
The following items will have enhanced security.
Protect and delete used data in memory and on the HDD
There are two kinds of image data that will be saved in memory and on the HDD: LZ
compressed data and uncompressed data (TIFF and PDF formats). Memory and HDD
areas containing data is freed up when data is deleted. However in normal mode data is
not completely deleted so it could be read through illicit means. In the Enhanced
Security mode, data will be completely cleared before freeing up image areas.
For uncompressed data, the image area will be freed up after it is completely cleared in
memory and on the HDD where the data was saved (0 FILL).
For LZ compressed data, the area will be freed after part of the data is destroyed or
overwritten a specific number of time from the beginning of the data area to make the
data unable to be decompressed.
Enhanced password
The password is made up of 8 alphanumerical characters (case sensitive). A password
made up of one repeated character will not be accepted.
Access to the User Box with user ID and password
Set up a system that requires users to input an enhanced password as described above,
to save data and print data saved in the User Box with a password stored in the
Document Folder. A User ID can also be set up using four to eight numerical numbers
for the User Box, so security can be further improved.
If an enhanced password is set up as above, security will be improved when saving
scanned data in the User Box. No one other than the Key Operator can delete the User
Box in which scanned data is saved, and changing the User Box's attributes requires
authentication with the enhanced password. In addition, authentication will be required
to use scanned data saved in the box.
External access prohibited
No access is allowed over telephone lines other than fax and KRDS.
Create, save and analyze an audit log
A history of security function operations will be created and saved. Date and time,
information identifying the person who made the operation, details of the operation, and
results of the operation will be saved, enabling analysis of unauthorized access. This log
cannot be deleted except by reformatting the HDD.
Key Operator authentication
A service representative will set up an authentication data for a Key Operator.
The Key Operator must input the Key Operator password to gain authorized access.
Only one authentication string can be registered per machine.
Page view 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 39 40

Comments to this Manuals

No comments