INTRODUCTION......................................................................................................................... 3
....................................................................................................................................... 3
................................................................................................................................. 3
.................................................................................................................................... 4
Crypto Officer Role .................................................................................................................. 9
User Role................................................................................................................................ 10
Access Control Policy ............................................................................................................ 12
Key Generation ...................................................................................................................... 12
Key Storage ............................................................................................................................ 12
Key Entry and Output............................................................................................................. 12
Key Zerorization..................................................................................................................... 12
................................................................................................................................ 12
OPERATION IN FIPS MODE.................................................................................................. 15
............................................................................................................................ 15
......................................................................................................................... 16
ACRONYMS ............................................................................................................................... 20
© Copyright 2009 Lexmark International Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Table of Contents
......................................................................................................... 3
............................................................................................. 4
.............................................................................................................. 4
................................................................................................................... 7
................................................................................................................... 9
.................................................................................................................. 10
.................................................................................................... 10
........................................................................................ 11
................................................................................................................... 14
............................................................................................... 14
...................................................................................................... 16
Page 2 of 20
Need help?
Do you have a question about the 10G0149 - PrintCryption Card Encryption Module and is the answer not in the manual?