1.1 Scanner Features
■Configure and manage with easeConfiguration and management of the scanner can be easily performed via the touch panel, or via
the fi Network Scanner Admin Tool (hereinafter referred to as Admin Tool) or the iScanner Cen- 1 tral Admin Console (hereinafter referred to as Central Admin Console), installed on a computer.
Computer
Computer
Central Admin Console | Admin Tool |
Central Admin | Set multiple scanners |
Server | at a time via the |
| network interface |
Set one scanner at a time via the network interface
|
|
|
| Touch Panel |
|
|
|
| Directly set one |
Scanner | Scanner | Scanner | Scanner | scanner at a time |
|
The following security functions are provided for the scanner.
zLogin authentication can restrict user access.
zScans can be converted to password protected PDF files.
zScanned data can be protected.
Since the scanner is intended to be shared by multiple users, data privacy is an important factor. The following security measures are used to protect the data against untoward access:
zEncryption
While it may be temporarily stored in the scanner before being
zScanned data deletion
After the scanned data has been
zKey regeneration
When the user data store is cleared from the scanner, the old cipher key is deleted and a
new cipher key is generated. This totally eliminates the possibility of access to any user data remaining in the freed disk space.
In addition, input of files from external media or networks is not possible. Therefore, the scanner is protected against virus infection.
| 3 | |
| ||
|
|
|