43
Fingerprint Reader
Fingerprint’s Outline
The conventional security systems use ID/passwords and token devices such as IC cards to authenticate users. Therefore
the passwords and token devices are exposed to the risk of being lost, stolen and hacking.
The Fingerprint authentication method uses user’s fingerprints instead of passwords for security authentication. You can use
your fingerprints to start up your computer and log on Windows.
To access the online manual
For further information, refer to the UPEK Protector Suite QL Help menu.
z
Click
(Start) - [All Programs] - [Protector Suite QL] - [Help].
Overview
Recommended Installation Procedure
Performed by the Computer Administrator
Performed by each user
User Fingerprint Enrollment
User’s Data
• Windows Logon Password
• Fingerprint
• Fingerprint Backup Password
• Power-on Password
Step 2
Fingerprint Utility Installation
Step 1