33
Fingerprint Reader

Fingerprint’s Outline

The conventional security systems use ID/passwords and token devices such as IC cards to authenticate users. Therefore
the passwords and token devices are exposed to the risk of being lost, stolen and hack ing.
The Fingerprint authentication method uses user’s fingerprints instead of passwords for security authentication. You can use
your fingerprints to start up your computer and log on Windows.
We recommend you use the Fingerprint Reader in combination with the TPM (Trusted Platform Module) to increase the sec u-
rity level of your computer.

To access the online manual

This manual describes Step 2, 3 and the initial part of Step 4.
For further information, refer to the UPEK Protector Suite QL Help menu.
z Click [start] - [All Programs] - [Protector Suite QL] - [Help].
Overview

Recommended Installation Procedure

Performed by the Computer Administrator
Step 1
Performed by each user
Step 4
User Fingerprint Enrollment
User’s Data
• Windows Logon Password
• Fingerprint
• Fingerprint Backup Password
• Power-on Password
TPM Installation ( Installation Manual of TPM)
(If the TPM is not being used, skip this step.)
Step 2
Fingerprint Utility Installation
Step 3
TPM Fingerprint Utility Initialization
(If the TPM is not being used, skip this step.)