Overview - Panasonic CF-74 Series Supplementary Instructions Manual

Fingerprint reader
Hide thumbs Also See for CF-74 Series:
Table of Contents

Advertisement

Available languages

Available languages

Overview

Fingerprint's Outline
The conventional security systems use ID/passwords and token devices such as IC
cards to authenticate users. Therefore the passwords and token devices are ex-
posed to the risk of being lost, stolen and hacking.
The Fingerprint authentication method uses user's fingerprints instead of passwords
for security authentication. You can use your fingerprints to start up your computer
and log on Windows.
We recommend you use the Fingerprint Reader in combination with the TPM (Trusted
Platform Module) to increase the security level of your computer.
Recommended Installation Procedure
E
Performed by the Computer Administrator
TPM Installation (
(If the TPM is not being used, skip this step.)
Fingerprint Utility Installation
TPM Fingerprint Utility Initialization
(If the TPM is not being used, skip this step.)
This manual describes Steps 2, 3 and the initial part of Step 4.
For further steps, refer to the UPEK Protector Suite QL Help menu. (Click [start] - [All
Programs] - [Protector Suite QL] - [Help].)
Precautions
Security Functions
Fingerprint Authentication Technology does not guarantee complete authentication and
individual identification. Please acknowledge we shall not be liable for any loss or dam-
age whatsoever resulting from the use of, or inability to use your Fingerprint device.
The Fingerprint authentication method uses multiple fingerprints, encryption keys,
credentials data and passwords. You might not be able to use your data if you
lose fingerprints, keys, credentials and passwords, so keep them in a safe place.
For further information, refer to "Backup". (
General interaction with 3rd party applications: There is no guarantee that
there will not be any negative interaction with any 3rd party software, and
will not accept any responsibility for such an interaction.
4
Step 1
"Installation Manual of TPM")
Step 2
Step 3
Performed by each user
Step 4
User Fingerprint Enrollment
User's Data
• Windows Logon Password
• Fingerprint
• Fingerprint Backup Password
• Power-on Password
page 9)

Advertisement

Table of Contents
loading

This manual is also suitable for:

Cf-51 series

Table of Contents