TROY Group MICR_IRD 4300 Security Printing Solutions User’s Guide User Manual
Page 5
Table of Contents
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. D
TOC-3
Encryption / Decryption.............................................................................................................2-17
Audit Reports..............................................................................................................................2-18
TROY Security Fonts.................................................................................................................2-20
Firmware Update Capability.....................................................................................................2-21
Exact Positioning Technology ...................................................................................................2-21
Auto-Rotate Feature...................................................................................................................2-22
Paper Tray Mapping ..................................................................................................................2-22
Replaceable Escape Character ..................................................................................................2-23
Language Support ......................................................................................................................2-23
Decryption Mode ........................................................................................................................2-23
Hardware-Based Security Features .................................................................................................2-24
Printer Keylock...........................................................................................................................2-24
Paper Tray Locks .......................................................................................................................2-25
Paper Tray Security Cover........................................................................................................2-25
Section 3 – System Planning and Implementation
Introduction .........................................................................................................................................3-1
Maintaining MICR Security...............................................................................................................3-1
Implementing the TROY Security Printing Solution.......................................................................3-2
Planning Worksheet ............................................................................................................................3-4
Section 4 – Using the TROY Printer Utility
Introduction .........................................................................................................................................4-1
Menu Structure....................................................................................................................................4-2
Basic Printer Utility Operations.........................................................................................................4-3
Managing System Security .................................................................................................................4-5
Setting the Administrator Password...........................................................................................4-5
Assigning User Names and Passwords .......................................................................................4-7