TROY Group MICR_IRD 3015 Security Printing Solutions User’s Guide User Manual
Page 5
Table of Contents
Security Printing Solutions User’s Guide -- 50-
70540-001 Rev. A
TOC-3
Encryption / Decryption................................................................................................................2-17
Audit Reports.................................................................................................................................2-18
TROY Security Fonts....................................................................................................................2-20
Firmware Update Capability........................................................................................................2-21
Exact Positioning Technology ......................................................................................................2-21
Auto-Rotate Feature......................................................................................................................2-22
Paper Tray Mapping .....................................................................................................................2-22
Replaceable Escape Character .....................................................................................................2-23
Language Support .........................................................................................................................2-23
Decryption Mode ...........................................................................................................................2-23
Hardware-Based Security Features ....................................................................................................2-24
Printer Keylock..............................................................................................................................2-24
Paper Tray Locks ..........................................................................................................................2-25
Paper Tray Security Cover...........................................................................................................2-25
Section 3 – System Planning and Implementation
Introduction ............................................................................................................................................3-1
Maintaining MICR Security..................................................................................................................3-1
Implementing the TROY Security Printing Solution..........................................................................3-2
Planning Worksheet ...............................................................................................................................3-4
Section 4 – Using the TROY Printer Utility
Introduction ............................................................................................................................................4-1
Menu Structure.......................................................................................................................................4-2
Basic Printer Utility Operations............................................................................................................4-3
Managing System Security ....................................................................................................................4-5
Setting the Administrator Password..............................................................................................4-5