beautypg.com

TROY Group MICR_IRD 4300 Security Printing Solutions User’s Guide User Manual

Page 5

background image

Table of Contents

Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. D

TOC-3

Encryption / Decryption.............................................................................................................2-17

Audit Reports..............................................................................................................................2-18

TROY Security Fonts.................................................................................................................2-20

Firmware Update Capability.....................................................................................................2-21

Exact Positioning Technology ...................................................................................................2-21

Auto-Rotate Feature...................................................................................................................2-22

Paper Tray Mapping ..................................................................................................................2-22

Replaceable Escape Character ..................................................................................................2-23

Language Support ......................................................................................................................2-23

Decryption Mode ........................................................................................................................2-23

Hardware-Based Security Features .................................................................................................2-24

Printer Keylock...........................................................................................................................2-24

Paper Tray Locks .......................................................................................................................2-25

Paper Tray Security Cover........................................................................................................2-25

Section 3 – System Planning and Implementation

Introduction .........................................................................................................................................3-1

Maintaining MICR Security...............................................................................................................3-1

Implementing the TROY Security Printing Solution.......................................................................3-2

Planning Worksheet ............................................................................................................................3-4

Section 4 – Using the TROY Printer Utility

Introduction .........................................................................................................................................4-1

Menu Structure....................................................................................................................................4-2

Basic Printer Utility Operations.........................................................................................................4-3

Managing System Security .................................................................................................................4-5

Setting the Administrator Password...........................................................................................4-5

Assigning User Names and Passwords .......................................................................................4-7