TROY Group MICR_IRD 9000 1UP MICR Printing Solutions User’s Guide User Manual
Page 5
Table of Contents
MICR Solutions User’s Guide -- Document #50-70341-001 Rev. F
TOC-3
Encryption / Decryption
(MICR / IRD Secure EX Printers Only)
...................................................2-18
MICR Basic Audit ......................................................................................................................2-19
Enhanced Audit
(MICR / IRD Secure EX Printers Only)
.................................................................2-21
TROY MICR and Auxiliary Fonts ...........................................................................................2-22
Firmware Update Capability.....................................................................................................2-23
Exact Positioning Technology ...................................................................................................2-23
Auto Rotate Feature ...................................................................................................................2-24
Paper Tray Mapping ..................................................................................................................2-24
Replaceable Escape Character ..................................................................................................2-25
Language Support ......................................................................................................................2-25
Encryption Mode
(MICR / IRD Secure EX Printers Only)
...............................................................2-25
Hardware-Based Security Features
(MICR Secure Printers Only)
......................................................2-26
Printer Keylock...........................................................................................................................2-26
Paper Tray Locks .......................................................................................................................2-27
Paper Tray Security Cover
(MICR 4100 Secure and Secure EX Printers Only)
...............................2-27
Section 3 – System Planning and Implementation
Introduction .........................................................................................................................................3-1
Maintaining MICR Security...............................................................................................................3-1
How to Implement the TROY MICR Printing System....................................................................3-2
Planning Worksheet ............................................................................................................................3-5
Section 4 – Using the TROY Printer Utility
Introduction .........................................................................................................................................4-1
Menu Structure....................................................................................................................................4-2
Basic Printer Utility Operations.........................................................................................................4-3
Managing System Security .................................................................................................................4-5
Setting the Administrator Password...........................................................................................4-5