Users Guide
1 a[Kº[
bvºEP⌠ñAΩOΣñ@ΩCbowN¬
i@AJαO@ΩBεΩsτΩuΩASαΩ
iAOu²nCΩ[KKOMΣñhDuπCDell Encryption Key
Manager]q{b}lA Encryption Key ManagerF[K@C
LTO 4 LTO 5 a≈]bgJ⌠≤ LTO 4 LTO 5 ΩdX[KΩC
os\αxsΩsWFcTwIAú]b°AW⌡μ[K
aBBz¿Ay¿αCA]únΣIM]OC
a≈[KMΦTDn¿G
[Ka≈
LTO 4 M LTO 5 a≈úzL{íw[HC
\ 2-2 ynwΘDzAHoa≈ΩTC
[K≈z
[K]Abs≥UhWh≈Co≈úB@BεΘA
HwF[Ka≈@⌠úPCí{íα≈⌡μ≈zC∩≤
So{ín{íE[K⌠A Dell Encryption Key Man-
ager ⌡μn≈z@C 1-2 yz[Kzío@
C
[Kh
oOΩ@[KΦkCΣñ]A[KWhH≈∩≈
εCp≤]wHb]woWhAH@⌠úPC\ 1-2
yz[KzAHoΩTC
≤
Encryption Key Manager O Java ⌠@íAQ Java Security ≤⌡μª
[K\αC]p Java Security ≤ΩTA\÷XC Encryp-
tion Key Manager TεμDn≤Co≤pUG
Java w≈xsw
≈xswwq Java Cryptography Extension (JCE) @íAO Java Secu-
rity ≤@AJava Security ≤SO Java
Runtime ⌠@íC≈
xsws±M≈]M≈ⁿA Encryption Key
Manager ⌡μ[K@CΣ Java ≈xsw\h¼AúúP@
ΦHXzDCoΦQΩTA\ 2-3 y≈x
swqzC
Od≈xswΩÑπ½nAúe°CϕLks≈xswAz]
LkN[KaKCJ\¬UCDDAHAiO@≈xswΩ
ΦkC
tm tmi²zq Encryption Key Manager μHXnCσ≤
1-1










