9
• When pairing fails (“Pairing fail” is displayed),
successful communication between the microphone and
the receiver has not occurred within a given amount of
time. Pairing may be harder to do when another receiver
is engaged in pairing nearby.
• When it becomes hard to use the remote control, the
remote control may be improved by switching the
wireless remote control function off, then on again in the
RF REMOTE display, then re-pairing with the
microphone (change to a channel with less interference).
Using the Encrypted
Transmission Function
To prevent hacking of the signal, the microphone
scrambles the signal during transmission. To use this
function, select one of the following encrypted
transmission modes:
Secure key mode:
An encryption key that is
automatically generated by the microphone is used by both
the microphone and receiver in this one-to-one encrypted
transmission method.
Password mode:
You choose a password of up to eight
characters that can be set for multiple microphones/
transmitters and receivers. This enables encrypted
transmission within a group.
Make sure the same mode is set on the microphone/
transmitter and receiver.
Using Secure Key Mode
(SECURE KEY)
Use this mode for one-to-one encrypted transmission
between one microphone and one receiver.
An encryption key that cannot be read from the outside is
automatically generated by the microphone. This key is
transmitted to the receiver through a USB connection or
the RF REMOTE function, enabling encrypted
transmission to take place.
The encryption key used by the microphone and receiver
is newly generated for each key transmission, resulting in
highly secure communication.
The encryption key used between the microphone and the
receiver is saved when the power is turned off, so the
encrypted transmission can be resumed the next time the
power is turned on.
1
Preparing the microphone (this unit)
1
Hold down the SET button until the item to be set
flashes in ENCRYPTION indication on the
microphone.
2
Press the + or – button repeatedly to select
SECURE KEY, and then press the SET button.
2
Preparing the receiver
Select SECURE KEY on the receiver that receives the
encryption key.
For details on receiver operations, refer to the
operating instructions supplied with the receiver.
3
Exchanging the encryption key
On the receiver, select USB or REMOTE (wireless
remote) as the method for encryption key exchange.
When the RF REMOTE function is off, REMOTE
cannot be selected.
Note