1.1 Scanner Features

Configure and manage with ease

Configuration and management of the scanner can be easily performed via the touch panel, or via

the fi Network Scanner Admin Tool (hereinafter referred to as Admin Tool) or the iScanner Cen- 1 tral Admin Console (hereinafter referred to as Central Admin Console), installed on a computer.

Computer

Computer

Central Admin Console

Admin Tool

Central Admin

Set multiple scanners

Server

at a time via the

 

network interface

Set one scanner at a time via the network interface

 

 

 

 

Touch Panel

 

 

 

 

Directly set one

Scanner

Scanner

Scanner

Scanner

scanner at a time

 

Advanced security measures

The following security functions are provided for the scanner.

zLogin authentication can restrict user access.

zScans can be converted to password protected PDF files.

zScanned data can be protected.

Since the scanner is intended to be shared by multiple users, data privacy is an important factor. The following security measures are used to protect the data against untoward access:

zEncryption

While it may be temporarily stored in the scanner before being e-mailed, faxed, printed, or saved, the scanned data is always kept in an encrypted form, in order to prevent exposure of data via analysis of the disk contents.

zScanned data deletion

After the scanned data has been e-mailed, faxed, printed or saved, the temporary data is deleted. Even if an error interrupts this process, leaving some scanned data in the scanner, this will automatically be deleted at the next start up.

zKey regeneration

When the user data store is cleared from the scanner, the old cipher key is deleted and a

new cipher key is generated. This totally eliminates the possibility of access to any user data remaining in the freed disk space.

In addition, input of files from external media or networks is not possible. Therefore, the scanner is protected against virus infection.

fi-6010N Network Scanner Operator's Guide

 

3