Table of Contents
Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A
TOC-3
Secure Seal Technology.................................................................................................................2-17
Encryption / Decryption................................................................................................................2-18
Audit Reports.................................................................................................................................2-19
TROY Security Fonts....................................................................................................................2-21
Firmware Update Capability........................................................................................................2-22
Exact Positioning Technology ......................................................................................................2-22
Auto-Rotate Feature......................................................................................................................2-23
Paper Tray Mapping .....................................................................................................................2-23
Replaceable Escape Character .....................................................................................................2-24
Language Support .........................................................................................................................2-24
Decryption Mode ...........................................................................................................................2-24
Hardware-Based Security Features ....................................................................................................2-25
Printer Keylock..............................................................................................................................2-25
Paper Tray Locks ..........................................................................................................................2-26
Paper Tray Security Cover...........................................................................................................2-26
Section 3 – System Planning and Implementation
Introduction ............................................................................................................................................3-1
Maintaining MICR Security..................................................................................................................3-1
Implementing the TROY Security Printing Solution..........................................................................3-2
Planning Worksheet ...............................................................................................................................3-4
Section 4 – Using the TROY Printer Utility
Introduction ............................................................................................................................................4-1
Menu Structure.......................................................................................................................................4-2
Basic Printer Utility Operations............................................................................................................4-3
Managing System Security ....................................................................................................................4-5
Setting the Administrator Password..............................................................................................4-5