background image

页面 56

IMATION PERSONAL – IRONKEY 提供技术支持 – 用户指南

注意:

当文件安全加密时,文件名称并未加密。要隐藏文件名称,创建备份文件之前压缩

您想要备份的文件。

注意:

请勿添加,更改,或删除备份文件,或者稍后您可能会阻碍恢复文件。

由备份文件将文件恢复至设备

1.  在 Imation 控制面板的应用程序列表中,单击“安全备份”按钮即可打开程序(仅限于 

Windows 系统)。

• 

将会出现安全备份窗口,显示安全文件驱动。

2.  选择“由我的计算机恢复”标签。

3 . 

选择之前备份数据时您已选定的目标文件夹。

• 

确保选择只含有备份文件的文件夹,不含其它文件或文件夹。

4.  选择要恢复至哪一个文件/文件夹并单击“立即恢复”。已恢复文件将会覆盖安全文件驱

动上有相同名称的现有文件。

注意:

如果数据由不同的 Imation 设备备份而来,您必须使用该设备的设备密码,以便将

文件恢复至不同的设备。

在 Linux 系统上使用我的设备

您可以在 Linux 系统的多个分派系统上使用您的 Imation 设备(x86 系统只有核心 2.6+ 

版本)。

设置设备

1.  将设备插入您的计算机 USB 端口并从设备的 Linux 文件夹运行 

ironkey

 程序。

• 

设备使用虚拟 DVD 驱动进行安装。

• 

您必须前往 Linux 文件夹并运行 

ironkey

 以手动启动解锁程序。

2.  同意许可协议。

• 

按 Q(退出)即可退出,或按 Y(接受)同意条款。

3 . 

创建设备密码。

• 

您的密码须区分大小写并且至长度至少为四个字符。

4.  设备初始化。在此进程期间,将会生成 AES 加密密钥,并为安全卷创建文件系统。
5.  完成此步骤后,您的设备即可使用。

使用解锁程序

使用适用于 Linux 的解锁程序以便在 Linux 系统上访问您的文件并更改您的设备密码, 

允许您安全地在 Windows,Mac,以及 Linux 计算机之间传输文件。 
根据您的 Linux 分派,您可能需要根特权方可使用“

ironkey

”程序,该程序位于已安装的

虚拟 DVD 驱动器中的 Linux 文件夹中。如果您只有一个 Imation 设备附属于该系统,由

Summary of Contents for imation D250

Page 1: ...PAGE 1 IMATION PERSONAL POWERED BY IRONKEY USER GUIDE Imation Personal User Guide Models S250 D250 Updated October 2012...

Page 2: ...est security technologies and making them simple to use and widely available Years of research and millions of dollars of development have gone into bringing this technology to you We are very open to...

Page 3: ...ds with theVirtual Keyboard 13 Access my device if I forget my password 14 Change my password 14 Access my secure files 15 Encrypt and decrypt files 15 Create a secure backup of my files 15 Restore fi...

Page 4: ...matically 25 Edit and delete accounts and logins 25 Lock down accounts withVeriSignVIP 25 Back up and restore my Identity Manager data 25 Manage my online account settings 25 Change device nickname 26...

Page 5: ...folder and follow the onscreen instructions 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 1 USB 2 IronKey Unlocker IronKey 3 Configuraci n d...

Page 6: ...ryptochip detects physical tampering by a hacker or if 10 consecutive incorrect password attempts have been entered it initiates a permanent self destruct sequence that securely erases all onboard dat...

Page 7: ...ata Your online account includes the SecurityVault If your device is ever lost or stolen you can easily restore your online passwords from this encrypted online backup Self Learning Password Managemen...

Page 8: ...his product There is no hocus pocus or handwaving here We use established cryptographic algorithms we develop threat models and we perform security analyses internal and third party of our systems all...

Page 9: ...hardware encrypted area inside the device not in the file system being first locally encrypted with 256 bit AES using randomly generated keys encrypted with a SHA 256 hash of your device password All...

Page 10: ...rsonal devices do not require any software or drivers to be installed Advertised capacity is approximate and not all of it will be available for storage Some space is required for onboard software Rec...

Page 11: ...is case sensitive and must be at least 4 characters long 4 Click the Enable Password Reset check box if you want to be able to recover your device if you forget your password 5 Type an email address i...

Page 12: ...lock the device in Read Only Mode Entering your password correctly which is verified in hardware will mount your secure volume with all your secure applications and files Entering the wrong password 1...

Page 13: ...P To uninstall it click on the Uninstall Auto Launch Assistant button LOCK DEVICE Click the Lock button in the bottom left of the Control Panel to safely lock your device You can also use the keyboard...

Page 14: ...ging and screenlogging spyware use the Imation Virtual Keyboard It helps protect your device password by letting you click out letters and numbers The underlying techniques in theVirtual Keyboard will...

Page 15: ...utton 5 A message prompt will appear indicating that an email has been sent to you Follow the instructions in the email to set up your online account this includes creating a secret ques tion 6 Once y...

Page 16: ...an also access your files by right clicking the IronKey icon on the Windows taskbar and clicking Secure Files Encrypt and decrypt files Everything you store on your Imation Personal device is encrypte...

Page 17: ...ot add alter or delete the backed up files or you may be prevented from restoring them later RESTORE FILESTO DEVICE FROM BACKUP FILE 1 In the Applications list of the Imation Control Panel click the S...

Page 18: ...rased Use my device on Linux You can use your Imation Personal device on several distributions of Linux x86 systems only with kernel version 2 6 SETUP UPTHE DEVICE 1 Plug the device into your computer...

Page 19: ...with the password devicepassword enter ironkey password devicepassword To lock the device you must either unmount and physically remove unplug it or else run ironkey lock Simply unmounting the device...

Page 20: ...ess their Imation Personal devices All of these methods require that the system administrator take one time action to enable access after that ordinary users can lock unlock and change passwords on an...

Page 21: ...open onboard Firefox by right clicking the IronKey icon in the Windows taskbar and clicking Secure Browser OPEN A SECURE BROWSING SESSION You must have an online account to open a secure web browsing...

Page 22: ...nd click Secure Sessions Bandwidth Meter Change identities You can change your apparent online identity to create a new random circuit and change the path of your encrypted web traffic As you will be...

Page 23: ...iew on Windows computers RESTORE ONBOARD APPLICATIONS You can restore your onboard applications if they are ever erased or corrupted Windows only 1 Unlock your device and click the Settings button on...

Page 24: ...tials such as login information and one time passwords to applications and online accounts You must have an online account to use Identity Manager Typcially you create the account during device setup...

Page 25: ...online account you will be asked if you want to en able the Identity Manager option Click Yes To start Identity Manager 1 Unlock your device and click the Applications button in the menu bar of the C...

Page 26: ...can lock down some important online accounts withVeriSign sVIP service so that they can only be accessed using your device Log into eBay or PayPal and the Identity Manager will guide you through the r...

Page 27: ...l appear indicating that an email has been sent to you Follow the instructions in the email to set up your online account this includes creating a secret ques tion 7 Once you have finished and have su...

Page 28: ...an incorrect secret question attempt You can also sign up to be notified of new Imation product announcements Edit Secret Questions and Answers Click the Edit button to modify your Secret Question res...

Page 29: ...omissions contained herein nor for incidental or consequential damages resulting from the furnishing or use of this material The information provided herein is subject to change without notice The in...

Page 30: ...PERSONAL IRONKEY Imation Imation Enterprise Enterprise Imation Imation Imation Enterprise RSA SecurID Enterprise Firefox Web Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB...

Page 31: ...Y Windows Firefox IronKey Mac Auto Launch Assistant LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey Unlocker IronKey exe MAC Finder IronKey Unlocker IronKey Unlocker Ironkey 2 Imation En...

Page 32: ...Enterprise 7 Web 8 OK 9 AES 10 Imation Windows Mac Linux Unlocker Windows Mac Linux Linux 1 Unlocker Unlocker WINDOWS Ironkey Unlocker IronKey exe MAC Finder IronKey Unlocker IronKey Unlocker Ironkey...

Page 33: ...32 IMATION PERSONAL IRONKEY 10 Imation Enterprise 3 1 Unlocker 2 3 Linux ironkey readonly Unlocker Imation Unlocker 1 2 3 7 200 Imation Enterprise...

Page 34: ...33 IMATION PERSONAL IRONKEY Imation 1 Imation Unlocker CTRL ALT V 2 Randomize Windows QWERTY CTRL L...

Page 35: ...34 IMATION PERSONAL IRONKEY Imation WINDOWS Windows Explorer MAC Finder Windows Ironkey Imation Cryptochip Personal Enterprise Personal 1 Unlocker 2 3...

Page 36: ...35 IMATION PERSONAL IRONKEY 4 OK 5 6 Personal Enterprise 1 Unlocker 2 3 4 5 Imation 1 2 3 Imation Windows...

Page 37: ...36 IMATION PERSONAL IRONKEY 1 1 Imation Windows 2 3 4 5 zip 1 Imation Windows 2 3 4 Imation...

Page 38: ...USB Linux ironkey DVD Linux ironkey Unlocker 2 Q Y 3 4 4 AES 5 UNLOCKER Linux Unlocker Linux Windows Mac Linux Linux DVD Linux ironkey 1 Imation ironkey Imation ironkey Linux ironkey devicename ironk...

Page 39: ...ROMSupport DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI HCD most Intel and VIA support DeviceDrivers USB Mass S...

Page 40: ...n com 5 Linux Imation Unlocker x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imation com 91...

Page 41: ...ERSONAL IRONKEY Imation Imation Enterprise Imation Imation Imation Enterprise ID RSA SecurID Enterprise Firefox Secure Sessions Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 U...

Page 42: ...ronKey ID Secure Sessions Mac Auto Launch Assistant ID LED Windows Mac Linux Linux 1 USB Imation DVD WINDOWS IronKey Unlocker IronKey exe MAC IronKey Unlocker IronKey Unlocker IronKey 2 Imation Enterp...

Page 43: ...olume Secure Volume 10 Imation Windows Mac Linux Unlocker Windows Mac Linux Linux 1 Unlocker Unlocker WINDOWS IronKey Unlocker IronKey exe MAC IronKey Unlocker IronKey Unlocker IronKey Mac Imation Unl...

Page 44: ...43 IMATION PERSONAL IRONKEY 1 Unlocker 2 3 Linux ironkey readonly Unlocker Imation Unlocker 1 2 3 7 200 Imation Enterprise Imation 1 Imation Unlocker CTRL ALT V 2 Enter Windows QWERTY...

Page 45: ...44 IMATION PERSONAL IRONKEY CTRL L Imation WINDOWS Windows MAC Windows Ironkey Imation Cryptochip Personal...

Page 46: ...45 IMATION PERSONAL IRONKEY Enterprise Personal 1 Unlocker 2 3 4 5 6 Personal Enterprise 1 Unlocker 2 3 4 5 Imation 1 2 3...

Page 47: ...46 IMATION PERSONAL IRONKEY Secure Backup Imation Windows Secure Backup 1 Imation Secure Backup Windows Secure Backup 2 3 4 5 1 Imation Secure Backup Windows Secure Backup 2 3 4 Imation...

Page 48: ...Linux ironkey Unlocker 2 Q Y 3 4 4 AES Secure Volume 5 UNLOCKER Linux Unlocker Linux Windows Mac Linux Linux DVD Linux ironkey Imation ironkey Imation ironkey Secure Volume Linux ironkey devicename i...

Page 49: ...ort DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI HCD most Intel and VIA support DeviceDrivers USB Mass Storage...

Page 50: ...10 Linux Imation Unlocker x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imation com 910 E H...

Page 51: ...50 IMATION PERSONAL IRONKEY Imation Imation Imation Imation Imation RSA SecurID Firefox Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB 1 1 Linux...

Page 52: ...51 IMATION PERSONAL IRONKEY Windows Firefox IronKey Mac LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey 2 Imation 3 Imation Imation 4 5 6...

Page 53: ...52 IMATION PERSONAL IRONKEY 7 8 9 AES 10 Imation Windows Mac Linux Windows Mac Linux Linux 1 WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey Mac Imation 2 Imation 10 Imation 1 2 3...

Page 54: ...53 IMATION PERSONAL IRONKEY Linux ironkey readonly Imation 1 2 3 7 200 IMATION Imation 1 Imation CTRL ALT V 2 WINDOWS CTRL L...

Page 55: ...54 IMATION PERSONAL IRONKEY Imation WINDOWS Windows MAC Finder WINDOWS IRONKEY Imation 1 2 3 4 5 6...

Page 56: ...55 IMATION PERSONAL IRONKEY 1 2 3 4 5 Imation 1 2 3 Imation Windows 1 Imation Windows 2 3 4 5...

Page 57: ...6 IMATION PERSONAL IRONKEY 1 Imation Windows 2 3 4 Imation Linux Linux Imation x86 2 6 1 USB Linux ironkey DVD Linux ironkey 2 Q Y 3 4 AES 5 Linux Linux Windows Mac Linux Linux ironkey DVD Linux Imati...

Page 58: ...ernel 2 6 Kernel DeviceDrivers SCSIDeviceSupport SCSICDROMSupport DeviceDrivers Support for Host side USB DeviceDrivers USB device filesystem DeviceDrivers EHCI HCD USB 2 0 support DeviceDrivers UHCI...

Page 59: ...ttp support imation com 5 Linux Imation x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecurity http support imation com securityts imati...

Page 60: ...59 IMATION PERSONAL IRONKEY Imation Imation Imation Imation Imation RSA SecurID Firefox Windows 7 Windows Vista Windows XP SP2 Mac OS X 10 5 Linux 2 6 USB 2 0 USB 1 1 Linux...

Page 61: ...PERSONAL IRONKEY Windows Firefox IronKey Mac Auto Launch Assistant LED Windows Mac Linux Linux 1 Imation USB DVD WINDOWS IronKey IronKey exe MAC Finder IronKey IronKey IronKey 2 Imation 3 Imation Ima...

Page 62: ...TION PERSONAL IRONKEY 6 7 8 9 AES 10 Imation Windows Mac Linux Windows Mac Linux Linux 1 WINDOWS IronKey IronKey exe MAC Finder IronKey Mac IronKey IronKey Auto Launch Assistant Imation 2 Imation 10 I...

Page 63: ...62 IMATION PERSONAL IRONKEY 1 2 3 Linux ironkey readonly Imation 1 2 3 7 200 IMATION Imation 1 Imation CTRL ALT V 2 QWERTY WINDOWS...

Page 64: ...63 IMATION PERSONAL IRONKEY CTRL L Imation WINDOWS Windows Explorer MAC Finder WINDOWS IRONKEY Imation 1 2...

Page 65: ...64 IMATION PERSONAL IRONKEY 3 4 5 6 1 2 3 4 5 Imation 1 2 3 Imation Windows 1 Imation Windows 2...

Page 66: ...65 IMATION PERSONAL IRONKEY 3 4 5 1 Imation Windows 2 3 4 Imation Linux Linux Imation x86 2 6 1 USB linux ironkey DVD linux ironkey 2 Q Y 3 4 4 AES 5...

Page 67: ...lock devicename devicename ironkey readonly devicepassword ironkey password devicepassword ironkey lock Linux 1 2 6 DeviceDrivers SCSIDeviceSupport SCSICDROMSupport DeviceDrivers Support for Host side...

Page 68: ...3 USB DVD DVD Linux Imation Imation 4 Linux http support imation com 5 Imation Linux x86 ik imationmobilesecurity com forum support imation com securityfeedback imation com www imation com mobilesecur...

Page 69: ...ispositivos de Enterprise Gestor de identidades RSA SecurID solo para dispositivos de Enterprise Firefox incorporado al dispositivo Teclado virtual y Sesiones seguras El sitio web de cuentas en l nea...

Page 70: ...necte el dispositivo Imation en el puerto USB de su equipo Aparece la pantalla Configu raci n de dispositivo El software de configuraci n se ejecuta autom ticamente desde un DVD virtual Puede que esta...

Page 71: ...dispositivo entre otras 8 Una vez configurada su cuenta en l nea para el dispositivo haga clic en Aceptar en el men saje de confirmaci n para continuar con la configuraci n del dispositivo 9 El dispo...

Page 72: ...o y ejecute el Desbloqueador 2 Haga clic en la casilla Modo de solo lectura 3 Haga clic en el bot n Desbloquear Ver un mensaje en el Panel de control que indica que se encuentra en Modo de solo lectur...

Page 73: ...lic sobre otros Adem s si lo desea puede hacer clic en el bot n Randomize Aleatorizar para cambiar el orden de las teclas Esta opci n le ayudar a protegerse frente a los registradores de pulsaciones d...

Page 74: ...s lida y siempre activa Arrastre un archivo a la unidad de archivos seguros para cifrarlos autom ticamente Los archivos que se abren desde la unidad de archivos seguros se descifran autom ticamente en...

Page 75: ...Ayuda para la contrase a haga clic en el bot n Restablecer la contrase a Se le enviar un correo electr nico con instrucciones sobre c mo continuar 4 Despu s de completar las instrucciones del mensaje...

Page 76: ...frar n y se les har una copia de seguridad NOTA Aunque los archivos est n cifrados de forma segura los nombres de archivos no Para ocultar los nombres de archivos comprima los archivos a los que desea...

Page 77: ...R EL DESBLOQUEADOR Utilice el Desbloqueador para acceder a los archivos y cambiar la contrase a del dispositivo en Linux lo cual le permite transferir de forma segura archivos entre equipos con sistem...

Page 78: ...determinado que viene con una distribuci n compatible no necesita llevar a cabo ninguna otra acci n Adem s en sistemas Linux de 64 bits deben instalarse bibliotecas de 32 bits para poder ejecutar el p...

Page 79: ...ibuciones compatibles 5 En este momento el Desbloqueador Imation para Linux solo admite sistemas x86 D nde obtener ayuda PARA OBTENER M S INFORMACI N ik imationmobilesecurity com forum Foro en l nea c...

Page 80: ...ire d identit s RSA SecurID p riph riques Enterprise uniquement Firefox le Clavier virtuel et les Sessions s curis es Le site Web des comptes en ligne et les e mails par d faut sont galement en anglai...

Page 81: ...mesWindows et Mac Pour les syst mes Linux reportez vous au paragraphe Utilisation du p riph rique sous Linux 1 Branchez le p riph rique Imation sur le port USB de votre ordinateur L cran Configuratio...

Page 82: ...ous avez configur votre compte en ligne pour votre p riph rique cliquez sur OK dans le message pour configurer le p riph rique 9 Le p riph rique s initialise Ce processus g n re une cl de cryptage AES...

Page 83: ...verrouilleur 2 Cochez la case Mode Lecture seule 3 Cliquez sur le bouton D verrouiller Un message s affiche dans le panneau de commande indiquant que vous tes en lecture seule Lorsque vous d verrouil...

Page 84: ...les saisissant et d autres en cliquant dessus Vous pouvez galement cliquer sur le bouton Randomize Al atoire afin de r organiser de mani re al atoire l emplacement des touches Ce syst me permet de vo...

Page 85: ...SB ordinaire tout en b n ficiant d une s curit renforc e et continue Faites glisser un fichier vers le disque Fichiers s curis s pour le crypter automatiquement Les fichiers ouverts depuis le disque F...

Page 86: ...on Aide sur le mot de passe 3 Dans l invite cliquez sur le bouton R initialiser le mot de passe Un e mail d instructions vous est envoy 4 Apr s avoir suivi les instructions de l e mail cliquez sur le...

Page 87: ...QUE Bien que les fichiers soient crypt s les noms de fichiers ne le sont pas Pour masquer les noms de fichiers zippez les fichiers sauvegarder avant de cr er le fichier de sauvegarde REMARQUE N ajoute...

Page 88: ...t pr t tre utilis UTILISER LE D VERROUILLEUR Utilisez le D verrouilleur pour Linux afin d acc der vos fichiers et de modifier votre mot de passe de p riph rique sous Linux Vous pouvez ainsi transf rer...

Page 89: ...eDrivers Prise en charge EHCI HCD USB 2 0 DeviceDrivers Prise en charge UHCI HCD Intel et VIA pour la plupart DeviceDrivers Syst me de stockage de masse USB Les noyaux inclus par d faut dans la plupar...

Page 90: ...les mots de passe sur tout p riph rique Imation branch 4 Distributions prises en charge Toutes les distributions Linux ne sont pas prises en charge Consultez le site l adresse http support imation co...

Page 91: ...der mitgelieferte Firefox Virtual Keyboard Virtuelle Tastatur und Secure Sessions Die Website f r das Online Konto und die Standard E Mail Adressen sind ebenfalls nur in Englisch verf gbar Dieser Abs...

Page 92: ...Das Ger t unter Linux verwenden 1 Stecken Sie das Imation Ger t in die USB Schnittstelle des Rechners Das Fenster Ger te Setup wird angezeigt Die Setup Software wird automatisch von einer virtuellen...

Page 93: ...das Online Konto f r das Ger t eingerichtet haben klicken Sie OK in der Eingabeaufforderung der Mitteilung um mit der Einrichtung fortzufahren 9 Das Ger t wird initialisiert W hrend dieses Prozess we...

Page 94: ...und starten Sie den Entsperrer 2 Klicken Sie das Ankreuzfeld Schreibgesch tzter Modus 3 Klicken Sie die Taste Entsperren Im Kontrollfeld wird eine Mitteilung angezeigt die darauf hinweist dass Sie sic...

Page 95: ...verwenden sodass Sie einige Zeichen eingeben und andere anklicken Sie k nnen optional auch die Taste Zuf llig festlegen dr cken um eine zuf llige Anordnung der Tasten zu schaffen Das hilft gegen Scree...

Page 96: ...eitsfunktion Das Ziehen einer Datei auf das Laufwerk Sichere Dateien verschl sselt diese automatisch Die auf dem Laufwerk Sichere Dateien ge ffneten Dateien werden beim ffnen automatisch entschl sselt...

Page 97: ...Sie im Fenster Kennwort Hilfe die Taste Kennwort Reset Es wird eine E Mail mit einer Anleitung f r das weitereVorgehen an Sie geschickt 4 Nachdem Sie diesen Anweisungen gefolgt sind klicken Sie die Ta...

Page 98: ...erden verschl sselt und das Backup erstellt HINWEIS Zwar sind die Dateien sicher verschl sselt die Dateinamen allerdings nicht Wenn Sie die Dateinamen unlesbar machen m chten erstellen Sie eine ZIP Da...

Page 99: ...schlossen ist dann ist das Ger t einsatzbereit DEN ENTSPERRERVERWENDEN Verwenden Sie den Entsperrer f r Linux um auf Ihre Dateien zuzugreifen und das Ger tepasswort unter Linux zu ndern So ist es m gl...

Page 100: ...ng Die Kernel die standardm ig in den meisten Distributionen enthalten sind verf gen ber diese Funktionen Wenn Sie also den Standardkernel verwenden der mit einer unterst tzten Distribution geliefert...

Page 101: ...erst tzt Bitte besuchen Sie http support imation com zu Informationen ber die aktuelle Liste unterst tzter Distributionen 5 Der Imation Entsperrer f r Linux unterst tzt derzeit nur x86 Systeme Wo find...

Reviews: