Panasonic CF-19CHGACJM Reference Manual - Page 64

Overview, Fingerprint's Outline, To access the online manual

Page 64 highlights

Fingerprint Reader 64 CAUTION To protect the fingerprint sensor, be sure to close the cover when not using the fingerprint reader. We shall not be liable for any loss or damage whatsoever resulting from your Fingerprint device or neglect of Fingerprint device use, or any data loss resulting from such developments as Fingerprint authentication device malfunctioning. Overview Fingerprint's Outline The conventional security systems use ID/passwords and token devices such as IC cards to authenticate users. Therefore the passwords and token devices are exposed to the risk of being lost, stolen and hacking. The Fingerprint authentication method uses user's fingerprints instead of passwords for security authentication. You can use your fingerprints to start up your computer and log on Windows. We recommend you use the Fingerprint Reader in combination with the TPM (Trusted Platform Module) to increase the security level of your computer. Recommended Installation Procedure Performed by the Computer Administrator Step 1 TPM Installation (⇒Installation Manual of TPM) (If the TPM is not being used, skip this step.) Step 2 Fingerprint Utility Installation Performed by each user Step 4 User Fingerprint Enrollment User's Data • Windows Logon Password • Fingerprint • Fingerprint Backup Password • Power-on Security Step 3 TPM Fingerprint Utility Initialization (If the TPM is not being used, skip this step.) To access the online manual This manual describes Step 2, 3 and the initial part of Step 4. For further steps, refer to the Protector Suite Help menu. Click (Start)*1 - [All Programs] - [Protector Suite] - [Control Center] - [Help] - [Help]. *1 Windows XP: [start]

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146

64
Fingerprint Reader
CAUTION
z
To protect the fingerprint sensor, be sure to close the cover when not using the fingerprint reader.
z
We shall not be liable for any loss or damage whatsoever resulting from your Fingerprint device or neglect of Fingerprint
device use, or any data loss resulting from such developments as Fingerprint authentication device malfunctioning.
Fingerprint’s Outline
The conventional security systems use ID/passwords and token devices such as IC cards to authenticate users. Therefore
the passwords and token devices are exposed to the risk of being lost, stolen and hacking.
The Fingerprint authentication method uses user’s fingerprints instead of passwords for security authentication. You can use
your fingerprints to start up your computer and log on Windows.
We recommend you use the Fingerprint Reader in combination with the TPM (Trusted Platform Module) to increase the secu-
rity level of your computer.
±
To access the online manual
This manual describes Step 2, 3 and the initial part of Step 4.
For further steps, refer to the Protector Suite Help menu.
z
Click
(Start)
*1
- [All Programs] - [Protector Suite] - [Control Center] - [Help] - [Help].
*1
Windows XP: [start]
Overview
Recommended Installation Procedure
Performed by the Computer Administrator
Performed by each user
TPM Installation
(
Installation Manual of TPM)
(If the TPM is not being used, skip this step.)
User Fingerprint Enrollment
User’s Data
• Windows Logon Password
• Fingerprint
• Fingerprint Backup Password
• Power-on Security
Step 2
Step 4
Fingerprint Utility Installation
Step 3
Step 1
TPM Fingerprint Utility Initialization
(If the TPM is not being used, skip this step.)