6
Fingerprint’s Outline
The conventional security systems use ID/passwords and token devices such as
IC cards to authenticate users. Therefore the passwords and token devices are
exposed to the risk of being lost, stolen and hacking.
The Fingerprint authentication method uses user’s
fi
ngerprints instead of
passwords for security authentication. You can use your
fi
ngerprints to start up
your computer and log on Windows.
We recommend you use the Fingerprint Reader in combination with the TPM
(Trusted Platform Module) to increase the security level of your computer.
Recommended Installation Procedure
Performed by the Computer Administrator
Performed by each user
Step 1
Step 4
TPM Installation
(
Î
“Installation Manual of TPM”)
(If the TPM is not being used, skip this step.)
User Fingerprint Enrollment
User’s Data
• Windows Logon Password
• Fingerprint
• Fingerprint Backup Password
• Power-on Password
Step 2
Fingerprint Utility Installation
Step 3
TPM Fingerprint Utility Initialization
(If the TPM is not being used, skip this step.)
This manual describes Steps 2, 3 and the initial part of Step 4.
For further steps, refer to the UPEK Protector Suite QL Help menu.
(<Model with Windows XP> Click [start] - [All Programs] - [Protector Suite QL]
- [Help] /
<Model with Windows Vista> Click
(Start) - [All Programs] - [Protector Suite
QL] - [Help]).
Overview
00_FingerprintReader_UK.indd 6
00_FingerprintReader_UK.indd 6
30.01.2008 15:06:12
30.01.2008 15:06:12
Содержание Toughbook CF-18BCAGCMM
Страница 25: ...25 Specifications Array Size 248 x 4 pixels Image Size 248 x 360 pixels Image Resolution 508 DPI...
Страница 26: ...26 Memo...
Страница 27: ...27...