![Rocstor COMMANDER 3F series User Manual Download Page 10](http://html1.mh-extra.com/html/rocstor/commander-3f-series/commander-3f-series_user-manual_1476328010.webp)
ROCSTOR
|
COMMANDER 3F user manual
Page | 10
MUST BE READ FIRST
Commander 3F9 uses the most advanced encryption chip. It encrypts and decrypts all the data that is
being read and written simultaneously in real-time. It uses a digital key token to authenticate and
authorize to access data in the device.
This device contains three (3) digital key tokens that bear the mini USB form factor; the three (3) digital
keys provided with each device are unique and have the same key codes.
Each Commander works
only
with the similar digital key tokens that it has been formatted with.
You must keep at least one of the digital key tokens in a safe place.
If you lose all of your digital key tokens, you lose your data.
Rocstor does not keep a note of any key codes nor will be able to copy any digital Keys.
o
In the future, you may order your device with as many keys with similar key codes as you prefer
(extra digital keys bear additional costs). Rocstor is not able to reproduce or copy digital keys
once it leaves the factory.
Any set of digital keys can be formatted with as many Commander Products as you prefer. That
means if you have two (2) or more (or even twenty [20]) Commander Devices you can format all of
them with
one
set of digital keys. Digital key(s) with the same key code in this scenario are one set of
keys that would authenticate all of the Commander devices.
The key token works with the hard drive. If at any time if your device ports becomes defective but
your hard drive is in working condition (not damaged), the hard drive can be instead into another
similar enclosure and it will operate with your digital key that it had been formatted with originally.
If you lose one or even two digital keys, you may conduct the following tasks:
Purchase another set of digital keys from Rocstor.
You may purchase as many digital key tokens with the same key codes as you prefer
(recommendation: not to exceed 11 pieces of digital keys with the same key codes).
Once you have the new set of digital key tokens in your possession, you may proceed with the
following tasks:
o
Using one of the original keys (may be the last key in your possession) that authenticates your
drive, back up your data into another external hard drive or into a specific file made in your
computer hard drive designated for these data transfer.