User Manual
Table Of Contents
- Table of contents
- About this manual
- Introducing the Drystar 5500
- Basic operation (operator mode)
- Advanced operation (Key-operator mode)
- Overview of Key-operator functions
- Stopping the printing process
- Viewing printer information
- Changing the configuration settings
- Printing images
- Saving the configuration settings
- Restoring the configuration settings
- Performing the calibration procedures
- Installation
- Quality control for general radiography applications (DT 2 B & DT 2 C)
- Quality control for mammography application (DT 2 Mammo) (optional)
- Controlling the Drystar 5500 via a remote PC (with browser)
- System description
- Preventive maintenance and replacements
- Troubleshooting
- Equipment information sheet
- Drystar media density response data
- Quality Control Charts
- Remarks for HF-emission and immunity
- Remarks for HF-emission and immunity
- This device is intended for operation in the electromagnetic environment given below. The user of the device should ensure that it is used in such an environment.
- This device is intended for operation in the electromagnetic environment given below. The user of the device should ensure that it is used in such an environment.
- This device is intended for operation in the electromagnetic environment given below. The user of the device should ensure that it is used in such an environment.
- This device is intended for operation in an electromagnetic environment in which the radiated high frequency disturbance variabl...
- Remarks for HF-emission and immunity
- Index
23
2900H EN 20071108 Introducing the Drystar 5500
DRYSTAR 5500/5503 REFERENCE MANUAL
Node authentication, certificates and Certification Authority
Each device - connected to a network - will receive a unique identifier: the
X.509 certificate, a digital passport. Any device on the network is only
allowed to communicate with another node of which it is holding the
certificate in a ‘communication allowed’ table.
A Certification Authority (CA) is responsible for creating a certificate. The CA
can be the hospital, Agfa or a third party.
This CA distributes the certificate to the hospital security responsible or
service technician, who for his part:
• Imports the device certificate, created by the CA.
• Imports the certificates of all peer devices with which communication is
authorized, i.e. creates the list of ‘communication allowed’ device
certificates.