30.01.2015 Views

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

144<br />

<strong>Picture</strong> <strong>Perfect</strong> <strong>4.6</strong><br />

<strong>User</strong> <strong>Manual</strong><br />

Creating encryption keys<br />

To secure transmission between the host and the network micro, the data is encrypted using DES<br />

(Data Encryption Standard). This is accomplished by means of a key to create the encryption pattern<br />

for transmission.<br />

Example<br />

Triple DES encryption is used between the micro and the host.<br />

Figure 61.Keys form<br />

Fields and controls<br />

Table 62. Keys form fields<br />

Field<br />

Micro<br />

Encryption Mode<br />

Description<br />

The micro transmitting data to/from the host.<br />

This is a required field which defines the encryption mode to be used. It can be set to one of three<br />

values:<br />

None<br />

No encryption is used; the original or plain text is transmitted.<br />

Note:<br />

None is the default. To activate this feature, one of the following must be<br />

selected.<br />

DES<br />

Triple<br />

DES<br />

Both sender and receiver use a single key (Key 1) to encrypt and decrypt data.<br />

Both sender and receiver use three keys (Key 1, Key 2, and Key 3) to encrypt and decrypt<br />

data.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!