Using the

Encrypted

Transmission

Function

To prevent hacking of the signal, the transmitter scrambles the signal during transmission. To use this function, select one of the following encrypted transmission modes:

Secure key mode: An encryption key that is automatically generated by the transmitter is used by both the transmitter and receiver in this one-to-one encrypted transmission method.

Password mode: You choose a password of up to eight characters that can be set for multiple transmitters and receivers. This enables encrypted transmission within a group.

Note

Make sure the same mode is set on the transmitter and receiver.

Using secure key mode

(SECURE KEY)

Use this mode for one-to-one encrypted transmission between one transmitter and one receiver.

An encryption key that cannot be read from the outside is automatically generated by the transmitter. This key is transmitted to the receiver through a USB connection or the RF REMOTE function, enabling encrypted transmission to take place.

The encryption key used by the transmitter and receiver is newly generated for each key transmission, resulting in highly secure communication.

The encryption key used between the transmitter and the receiver is saved when the power is turned off, so the encrypted transmission can be resumed the next time the power is turned on.

1 Preparing the transmitter (this unit)

1Hold down the SET button until the item to be set flashes in the ENCRYPTION indication on the transmitter.

2Press the + or – button repeatedly to select SECURE KEY, and then press the SET button.

2 Preparing the receiver

Select SECURE KEY on the receiver that receives the encryption key.

For details on receiver operations, refer to the operating instructions supplied with the receiver.

3 Exchanging the encryption key

On the receiver, select USB or REMOTE (wireless remote) as the method for encryption key exchange. When the RF REMOTE function is off, REMOTE cannot be selected.

When you select USB:

Connect the transmitter to the receiver with the supplied USB cable and USB adapter cable.

22 Using the Encrypted Transmission Function