Herunterladen Inhalt Inhalt Diese Seite drucken

Overview; Security Functions - Panasonic CF-51 Ergänzende Anweisung

Fingerabdruck-beglaubigungssystem
Inhaltsverzeichnis

Werbung

Verfügbare Sprachen

Verfügbare Sprachen

Overview

Fingerprint's Outline
The conventional security systems use ID/passwords and token devices such as IC
cards to authenticate users. Therefore the passwords and token devices are ex-
posed to the risk of being lost, stolen and hacking.
The Fingerprint authentication method uses user's fingerprints instead of passwords
for security authentication. You can use your fingerprints to start up your computer
and log on Windows.
We recommend you use the Fingerprint Reader in combination with the TPM (Trusted
Platform Module) to increase the security level of your computer.
Recommended Installation Procedure
E
Performed by the Computer Administrator
TPM Installation (
(If the TPM is not being used, skip this step.)
Fingerprint Utility Installation
TPM Fingerprint Utility Initialization
(If the TPM is not being used, skip this step.)
This manual describes Steps 2, 3 and the initial part of Step 4.
For further steps, refer to the UPEK Protector Suite QL Help menu. (Click [start] - [All
Programs] - [Protector Suite QL] - [Help].)
Precautions

Security Functions

Fingerprint Authentication Technology does not guarantee complete authentication and
individual identification. Please acknowledge we shall not be liable for any loss or dam-
age whatsoever resulting from the use of, or inability to use your Fingerprint device.
The Fingerprint authentication method uses multiple fingerprints, encryption keys,
credentials data and passwords. You might not be able to use your data if you
lose fingerprints, keys, credentials and passwords, so keep them in a safe place.
For further information, refer to "Backup". (
General interaction with 3rd party applications: There is no guarantee that
there will not be any negative interaction with any 3rd party software, and
will not accept any responsibility for such an interaction.
4
Step 1
"Installation Manual of TPM")
Step 2
Step 3
Performed by each user
Step 4
User Fingerprint Enrollment
User's Data
• Windows Logon Password
• Fingerprint
• Fingerprint Backup Password
• Power-on Password
page 9)

Quicklinks ausblenden:

Werbung

Inhaltsverzeichnis
loading

Diese Anleitung auch für:

Cf-74

Inhaltsverzeichnis