User’s Manual
4-5
Operating Basics
Using The TOSHIBA Face Recognition
TOSHIBA Face Recognition uses a face verification library to verify the
face data of users when they log in to Windows. The user can thus avoid
having to enter a password or the like, which makes the login process
easier. This software is preinstalled with some models.
Note on Use
■
TOSHIBA Face Recognition does not guarantee the correct
identification of a user. Changes to the likeness of a registrant, such as
hair style changes, wearing a cap, or wearing glasses may effect the
recognition rates when such changes occur after the registrant had
registered.
■
TOSHIBA Face Recognition may incorrectly recognize faces that are
similar to a registrant.
■
For high security purposes, TOSHIBA Face Recognition is not a
suitable substitute for Windows passwords. When security is a high
priority, use your established Windows passwords to log in.
■
Bright background light and/or shadows may prevent a registrant from
being recognized correctly. In that case, log in using your Windows
password. If recognition of a registrant fails repeatedly, refer to your
computer documentation to learn ways to improve recognition
performance.
■
TOSHIBA Face Recognition records face data in a log when face
recognition fails. When transferring ownership or disposing of your
computer, please uninstall the application or delete all the logs created
by the application. For details on how to do this, see help file.
■
TOSHIBA Face Recognition can be used only in Windows Vista and
Windows 7.
Disclaimer
TOSHIBA does not guarantee that the face recognition utility technology
will be completely secure or error-free. TOSHIBA does not guarantee that
the face recognition utility will accurately screen out unauthorized users at
all times. TOSHIBA is not liable for any failure or damage that might arise
out of the use of the face recognition software or utility.
TOSHIBA, ITS AFFILIATES AND SUPPLIERS SHALL HAVE NO
RESPONSIBILITY FOR DAMAGE TO OR LOSS OF ANY BUSINESS,
PROFITS, PROGRAMS, DATA, NETWORK SYSTEMS OR REMOVABLE
STORAGE MEDIA ARISING OUT OF OR RESULTING FROM THE USE
OF THE PRODUCT, EVEN IF ADVISED OF THE POSSIBILITY
THEREOF.