Users Guide

1 a[Kº[
bvºEPñAΩOΣñ@ΩCbowN¬
i@AJαO@ΩBεΩsτΩuΩASαΩ
iAOu²nCΩ[KKOñhDuπCDell Encryption Key
Manager]q{b}lA Encryption Key ManagerF[K@C
LTO 4 LTO 5 a]bgJ LTO 4 LTO 5 ΩdX[KΩC
os\αxsΩsWFcTwIAú]AWμ[K
aBBz¿Ay¿αCAnΣIM]OC
a[KMΦTDn¿G
[Ka
LTO 4 M LTO 5 aúzL{íw[HC
\ 2-2 ynwΘDzAHoaΩTC
[Kz
[K]AbsUhWhCoúB@BεΘA
HwF[Ka@úPCí{íα≈⌡μzC
So{ín{íE[KA Dell Encryption Key Man-
ager μn≈z@C 1-2 yz[Kzío@
C
[Kh
oOΩ@[KΦkCΣñ]A[KWhH
εCp≤]wHb]woWhAH@úPC\ 1-2
yz[KzAHoΩTC
Encryption Key Manager O Java @íAQ Java Security μª
[K\αC]p Java Security ΩTA\÷XC Encryp-
tion Key Manager TεμDnCopUG
Java wxsw
xswwq Java Cryptography Extension (JCE) @íAO Java Secu-
rity @AJava Security SO Java
Runtime @íC
xsws±M]MA Encryption Key
Manager μ[K@CΣ Java xsw\h¼AúúP@
ΦHXzDCoΦQΩTA\ 2-3 yx
swqzC
OdxswΩÑπ½nAúe°CϕLksxswAz]
LkN[KaKCJ\¬UCDDAHAiO@xswΩ
ΦkC
tm tmi²zq Encryption Key Manager μHXnCσ
1-1