Overview - Panasonic Toughbook CF-19KHRAG2M Supplementary Instructions Manual

Fingerprint reader
Hide thumbs Also See for Toughbook CF-19KHRAG2M:
Table of Contents

Advertisement

Overview

Fingerprint's Outline
The conventional security systems use ID/passwords and token devices such as IC
cards to authenticate users. Therefore the passwords and token devices are ex-
posed to the risk of being lost, stolen and hacking.
The Fingerprint authentication method uses user's fingerprints instead of passwords
for security authentication. You can use your fingerprints to start up your computer
and log on Windows.
We recommend you use the Fingerprint Reader in combination with the TPM (Trusted
Platform Module) to increase the security level of your computer.
Recommended Installation Procedure
Performed by the Computer Administrator
TPM Installation (
(If the TPM is not being used, skip this step.)
Fingerprint Utility Installation
TPM Fingerprint Utility Initialization
(If the TPM is not being used, skip this step.)
This manual describes Steps 2, 3 and the initial part of Step 4.
For further steps, refer to the UPEK Protector Suite QL Help menu. (Click [start] - [All
Programs] - [Protector Suite QL] - [Help].)
Precautions
Security Functions
Fingerprint Authentication Technology does not guarantee complete authentication and
individual identification. Please acknowledge we shall not be liable for any loss or dam-
age whatsoever resulting from the use of, or inability to use your Fingerprint device.
The Fingerprint authentication method uses multiple fingerprints, encryption keys,
credentials data and passwords. You might not be able to use your data if you
lose fingerprints, keys, credentials and passwords, so keep them in a safe place.
For further information, refer to "Backup". ( page 10)
General interaction with third-party applications: There is no guarantee
that there will not be any negative interaction with any third-party software,
and will not accept any responsibility for such an interaction.
4
Step 1
"Installation Manual of TPM")
Step 2
Step 3
Performed by each user
Step 4
User Fingerprint Enrollment
User's Data
• Windows Logon Password
• Fingerprint
• Fingerprint Backup Password
• Power-on Password

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents