Fujitsu ST5111 User Guide - Page 25

Security Functions Of Application Buttons, Setting Up The Security Panel, Passwords

Page 25 highlights

Osian_UG.book Page 13 Monday, October 9, 2006 1:24 PM Getting Started SECURITY FUNCTIONS OF APPLICATION BUTTONS Five buttons are used when implementing security functions. Four of the buttons are used to enter the password, and the fifth is used as an Enter button. Instructions for using the security feature follow the table. Button Icons Security Icons Security Purpose Ctl-Alt-Del Button EMail Button Security Enter Button 1 Security Button 1 2 Orientation Button Security Button 2 Escape Button 3 Security Button 3 Enter Button 4 Security Button 4 Table 1-5. Security Functions of Application Buttons SETTING UP THE SECURITY PANEL When you receive your Tablet PC, the security panel application is pre-installed without any passwords. The following sections provide detailed information on your security panel, how to set, change or remove passwords. Numbered Buttons Use these buttons to enter your password.(Figure 1-5) Enter Button After entering the button strokes, push this button to enter the password into the Tablet PC. (Figure 1-5) The following are examples of valid button strokes: ■ Pushing [4] by itself ■ Pushing [2] and [3] at the same time ■ Pushing [1], [2], and [4] at the same time ■ Pushing [1], [2], [3], and [4] at the same time The following are valid passwords. The numbers within braces ({ }) are button strokes using more than one button. ■ {[2]+[3]}, [1], [Enter] ■ [4], [enter] ■ {[1]+[3]}, {[2]+[3]+[4]}, [1], [4], [2], [Enter] PASSWORDS The user and supervisor password may be set on this Tablet PC. A supervisor password is typically the same for all Tablet PC's and notebooks in a work group, office, or company to allow for system management. Individual computers in a group environment should not use a common password. A password consists of one to five button strokes plus the enter button. A valid stroke consists of pushing one or up to four buttons simultaneously. Setting Passwords When shipped from the factory, no passwords are set. You have a choice of having no password or setting a supervisor and user password. You must set the supervisor password before the user password. ■ The purpose of supervisor password is to be able to bypass the user password in case the user password is forgotten. The supervisor password alone will not lock the system. ■ You must set the supervisor and user passwords for the security panel to work. 13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96

13
Getting Started
SECURITY FUNCTIONS OF APPLICATION BUTTONS
Five buttons are used when implementing security functions. Four of the buttons are used to enter the password, and
the fifth is used as an Enter button. Instructions for using the security feature follow the table.
Table 1-5. Security Functions of Application Buttons
SETTING UP THE SECURITY PANEL
When you receive your Tablet PC, the security panel
application is pre-installed without any passwords. The
following sections provide detailed information on your
security panel, how to set, change or remove passwords.
Numbered Buttons
Use these buttons to enter your password.
(Figure 1-5)
Enter Button
After entering the button strokes, push this button to
enter the password into the Tablet PC.
(Figure 1-5)
PASSWORDS
The user and supervisor password may be set on this
Tablet PC. A supervisor password is typically the same for
all Tablet PC’s and notebooks in a work group, office, or
company to allow for system management. Individual
computers in a group environment should not use a
common password. A password consists of one to five
button strokes plus the enter button. A valid stroke
consists of pushing one or up to four buttons simulta-
neously.
The following are examples of valid button strokes:
Pushing [4] by itself
Pushing [2] and [3] at the same time
Pushing [1], [2], and [4] at the same time
Pushing [1], [2], [3], and [4] at the same time
The following are valid passwords. The numbers within
braces ({
}) are button strokes using more than one
button.
{[2]+[3]}, [1], [Enter]
[4], [enter]
{[1]+[3]}, {[2]+[3]+[4]}, [1], [4], [2], [Enter]
Setting Passwords
When shipped from the factory, no passwords are set.
You have a choice of having no password or setting a
supervisor and user password. You must set the super-
visor password before the user password.
Button Icons
Security Icons
Security Purpose
Ctl-Alt-Del Button
Security Enter Button
EMail Button
1
Security Button 1
Orientation Button
2
Security Button 2
Escape Button
3
Security Button 3
Enter Button
4
Security Button 4
The purpose of supervisor password is to
be able to bypass the user password in
case the user password is forgotten. The
supervisor password alone will not lock
the system.
You must set the supervisor
and
user
passwords for the security panel to work.
Osian_UG.book
Page 13
Monday, October 9, 2006
1:24 PM