Ic recorder security – Panasonic -eng User Manual
Page 15

15
IC recorder security
Security for the IC recorder unit
The following IC recorder is equipped with security functions.
- RR-US470/455/450/430
An IC recorder with security function has the following folders: “A”, “B”, “C”, “S” and “M”.
Only security folder “S” (FolderS) has the security function.
An IC recorder with a security function has the following two security functions.
A security function that uses a password for the IC recorder unit
A password can be set for the IC recorder unit.
After a password has been set, the password must be entered to play sound files in the security
folder “S” (FolderS).
For details on the IC recorder operations and the password, refer to the IC recorder operating
instructions.
If you forget the password for the IC recorder unit, the password can be deleted with Voice Editing.
A security function that uses the Voice Editing “authentication key”
Sound files in the security folder (FolderS) can be played if the “authentication key” of the computer
and that of IC recorder with security function are matching.
“Authentication Key”
An “authentication key” is required for playing sound files in the security folder (FolderS) of an IC
recorder with security function.
When an IC recorder with security function is connected to a computer for the first time, the dialog box
for entering the “authentication key” appears.
When the “authentication key” is entered, an “authentication key” file is created and information based
on the “authentication key” is written to the connected IC recorder.
Subsequently, when the IC recorder with security function to which the “authentication key” has been
written is connected to a computer that has a matching “authentication key,” sound files in the security
folder (FolderS) can be played.
If an IC recorder with security function is connected to a computer that does not have a matching
“authentication key,” sound files in the security folder (FolderS) cannot be played.
A
A
“Authentication Key” entry
“Authentication Key” file is
created
“Authentication Key”
information is written