UBKEY MirrorKem User manual

Type
User manual
MirrorKem
Program user manual
Notice
Thank you for your purchasing our product.
Ubkey Innovation Inc. is providing MirrorKem
installation program in a bundle CD,
but steadily updating the program for new
technology development and customer's
convenience improvement. Up-to-date
program is always uploaded in our
Homepage (www.ubkey.com) so that
the customers can download and
use such up-to-date program.
Ubkey Innovation Inc. will keep on doing
research and development in return
for your constant support.
Thank you.
UBKEY Innovation Inc.
1. Program installation - - - - - - - - - - - 6
2. Program removal - - - - - - - - - - - - 8
3. User manual - - - - - - - - - - - - - - 10
4. Note during iris photographing - - - - - - 20
5. Directions for the use of product - - - - - 22
Index
Components
1. Box
2. Micro USB cable
3. Iris recognition camera (MirrorKem)
4. User manual
5. Program CD
Program installation
1. Execute `MirrorKem_Setup.exe` enough to fit OS.
2. Click `Next`.
3. Click `Install`.
Up-to-date MirrorKem software download is available in UBKEY homepage.
In case of program update, please install it after completely deleting the pro-
gram and re-starting.
6
4. Installation proceeds.
7
5. Select `Reboot now` and click `Finish`, then the computer will re-start.
Program removal
If you delete the program, all the registered iris and Web ID/Password data
will be deleted. All the hidden files will be seen in the original position in the
form of the encrypted files. The encrypted files can be unlocked by iris au-
thentication of the user who encrypted. (You can unlock the encrypted files
irrespective of PC log-in).
1. In the program and function of the control panel, select `MirrorKem` and then click
removal/change.
2. Execute the iris authentication. - In case the camera is detached, enter the
password.
8
3. When you click `Remove` , delete will proceed.
4. Re-start the computer.
9
User manual
Mirrorkem can be controlled by the tray icon at the bottom
screen. When clicking the right mouse button, the menu
box will appear at the right side.
It will allow computer security log-in, iris management,
screen saver management, the password management,
security file management, and brightness control
management.
2. Use of icon
When clicking the mouse right button on the tray icon, the window as
shown in <Figure 1> will be opened.
When selecting the `Camera Brightness`, the window as shown in <Figure 2>
will be opened. Then you can find out the image brightness in `ⓐ`.
The product is set in the basic brightness mode as shown in <Figure 3>. But
error may occur in use if the image is darker or brighter than the basic brightness.
Brightness can be adjusted between 1st level ~ 10th level. Its initial setting value
is 7. It becomes darker as it moves closer to 10.
Adjust the `Brightness` value to the same level of basic brightness.
When you press `Apply`, the camera attribute value will be stored and then the
window will be closed.
`Cannot find a device` message will appear when the camera is not connected.
In this case, connect the camera with USB port and then execute again.
We recommend you to check the brightness and use it before registering the iris.
If the image gets darker or brighter in use, please use it after re-setting.
3. Brightness control
1. When the program is successfully installed, `UBKey Innovation` icon will be
created the bottom right at the time of Window re-booting. As to the program
execution method, place the mouse cursor on the icon and click right side button
to proceed iris registration.
10
X
O
<Figure 1>
<Figure 2> <Figure 3>
Bad Image
Good Image
Right-clicking on the tray icon will bring up the window as shown in <Figure 1>.
Selection of `Iris Registration` will bring up the window as shown in <Figure 2>.
When you enter ID to be used in `ⓐ`, the camera image will be displayed in `ⓑ`.
When you click `Register`, the iris photographing will start.
At the distance about 30cm away from camera, make eye contact with the camera mirror
with it wide open and step forward to the camera slowly until it clicks.
When the iris is photographed, the window as shown in <Figure 3> will appear.
Clicking on `Yes` will bring up the completion of iris registration, and then the window as shown in
<Figure 4> will be opened to click `OK`.
⑦ After the registration is completed, right-click on it, then complete iris authentication by clicking
PC Security Login.
When you register the iris, use the iris that is in complete focus and with a clear image.
-You can register/use up to 5 irises.
In case `Do not have your information` message appears, it means the computer is not
logged in by the iris authentication. After registering the iris, log in with the registered iris
again without fail.
4. Iris registration
11
X
O
<Figure 1> <Figure 2>
<Figure 4>
<Figure 3>
Bad ImageGood Image
It is the function of deleting the iris information not in use or needless.
Right-clicking on the tray icon will bring up the window as shown in <Figure 1>.
Please recognize the registered iris in <Figure 2>.
Click `Delete` after selecting the subject ID to be deleted in <Figure 3>.
When iris information is deleted, all the relevant information will be deleted
together.(Hidden file will be restored in the original position as the encrypted file)
5. User management
Double-clicking on the tray icon will bring up the execution of the screen saver.
Right-clicking on the tray icon will bring up the window as shown in <Figure 1>.
Selection of `Run ScreenSaver` will bring up the window as shown in <Figure 2>
and the operation of screen saver.
When you move the mouse to unlock the screen saver, the iris authentication
process as shown in <Figure 3> will be executed and it will be unlocked upon
completion of the user authentication.
When the camera is not connected, the authentication will proceed using the
password.
In this case, the initial password value is "0000". For the password
change, see [No.7 (Password Change)]. (When it is authenticated by password,
you can only use the screen saver function)
When you remove the camera from the computer during the camera opera-
tion, it is designed to stop authentication process. In this case, connect the
camera again and then start iris authentication.
6. Screen saver
<Figure 1>
<Figure 3>
<Figure 2>
<Figure 1> <Figure 2> <Figure 3>
12
What is user authentication? - It means PC log-in is authenticated by the iris.
Right-clicking on the tray icon will bring up the window as shown in <Figure 1>.
Selection of `ScreenSaver Management` will bring up the window as shown in <Figure 2>.
Recognize the registered iris in <Figure 2>. Then, the window as shown in <Figure 3> will
be opened after the iris recognition.
Click the Search button `` in <Figure 3> and then select JPEG file to be used for the
screen saver.
When you select `Manual` , it will operate only when the user selects `Run ScreenSaver`
in <Figure 1> window. When you select `Automatic` , the screen saver will be executed
automatically in the event there is no input signal for 10 minutes. Clicking `OK` will bring
up the completion of screen setting.
When you click `OK` , the screen setting will be completed.
7. Screen saver screen setting
<Figure 1>
<Figure 3>
<Figure 2>
13
It is the process necessary for coping with the case of logging in by the password entry
other than the iris authentication.
Right-clicking the tray icon will bring up the window as shown in <Figure 1>.
Selection of `Password management` will bring up the window as shown in <Figure 2>.
After registering the iris, enter the password to be changed in <Figure 3> and then
click `Change` .
Clicking `Yes` in <Figure 4> window and `OK` in <Figure 5> window will bring up the
password to be changed.
8. Password Change
Password basic value is the figure `0000` , which can be set up to 4~20 digits. For the
safe use, we recommend you to use it with special characters included.
In case of PC log-in with the password / After log-in, you can use only the screen
saver function of MirrorKem program.
It is the function of memorizing the web site ID/Password.
Right-clicking on the tray icon will bring up the window as shown in <Figure 1>.
Selection of `Check Web ID/Password` will bring up the window as shown in <Figure 2>.
After the iris recognition is completed, the window as shown in <Figure 3> will appear.
9. Check Web ID / Password
<Figure 1>
<Figure 3>
<Figure 2>
<Figure 4>
<Figure 5>
<Figure 1>
<Figure 2> <Figure 3>
14
Selection of `Add Site` in <Figure 1> screen will bring up the entry window as
shown in <Figure 2>.
Enter URL of the site to be used for `` .
`` Site Title' is the name seen on the list. Enter the name that can be identified
by the user.
Enter ID and password of the applicable site in `` and `` .
When you click `OK` , the site registration will be completed.
9.1. Check Web ID/Password site registration
<Figure 2>
<Figure 1>
Delete the site not in use or changed in its information.
When you click `` in <Figure 1> screen, the list window as shown in <Figure 2>
will appear.
After selecting the list, delete it by clicking `Delete` .
9.2. Check Web ID/Password site delete
Correction of the registered site is impossible.
After deleting it, change through 8.1 process to use.
<Figure 2><Figure 1>
15
Check Web ID/Password home will show the joined ID and Password of the registered site.
Clicking `` in <Figure 1> screen will bring up the list window as shown in <Figure 2>.
Clicking `Check` after selecting the list will bring up the window as shown in <Figure 3>
showing the joined ID and Password.
9.3. Use of Check Web ID/Password home
<Figure 2><Figure 1>
<Figure 3>
16
Encryption of the files/folders in need of security will not allow the other person to
find out.
When you click `Lock UBKey Security` in <Figure 1> appearing after right-clicking
on the file/folder to be encrypted will bring up <Figure 2> iris authentication
screen.
When you succeed in the iris authentication, the progress ratio as shown in
<Figure 3> will be displayed, and then the work-finished original file/folder will
be deleted. Then, as shown in <Figure 4>, `file or folder name.the user ID.ubkey`
file will be created.
10. File/folder encryption
Notice
File/folder encryption can be used by the user who finished Window log-in
using the iris. (Not allowed to use when the password is logged in)
In case of multiple users registration environment, the encryption proceeds
only when the person who executes iris log-in corresponds with the iris to be
encrypted.
The user’s left and right eyes in use with both eyes registered are recognized
as each different user.
Folder encryption function must be used only when all the file size is less than
4GB.
<Figure 1>
<Figure 3>
<Figure 2>
<Figure 4>
17
[1] Method 1
As shown in <Figure 4>, when the extension double-clicks the subject file/folder
to be unlocked out of `*.ubkey` files/folders, <Figure 2> iris authentication screen
will appear.
When iris is successfully authenticated, the progress as shown in <Figure 3> will
be displayed, and then it will be restored as `file/folder` at the position where it
was in the file/folder upon completion of the work. Its encrypted file/folder is not
deleted but becomes overwrite when the encryption is proceeded again. If you
do not need this work, please use it after unlocking/deleting the encrypted files/folder.
[2] Method 2
As shown in <Figure 4>, when the Extension selects the subject file/folder to be
unlocked out of `*.ubkey` files/folders and then clicks `Unlock UBKey Security`
in the <Figure 1> appearing by right click, <Figure 2> Iris authentication screen
will appear.
When iris is successfully authenticated, the progress as shown in <Figure 3> will
be displayed, and then it will be restored as `file/folder ` at the position where it
was in the file/folder upon completion of the work. Its encrypted file/folder is
not deleted but becomes overwrite when the encryption is proceeded again. If
you do not need this work, please use it after unlocking the encrypted files
folder and deleting `*.ubkey` file/folder.
10.1. Encrypted file/folder unlock
Notice
In case of folder encryption removal, the password can be recovered in the
computer where the program is installed.
(Usable in the password log-in state and even with the other person logged in)
<Figure 1>
<Figure 3>
<Figure 2>
<Figure 4>
18
Notice
Security file can be used by the user who completes Window login with the iris.
(Not allowed to use in the event of password log-in)
In case of multiple users registration environment, only the list of the users who
completed Window login using the iris can be seen.
The user’s left and right eyes in use with both eyes registered are recognized as
each different user.
Notice
When you use the security file, we recommend you to use is after backing up in the
other media to cope with the situation of the iris authentication being impossible.
For the user not familiar with the using method, we recommend to use after backing
up in the other media until the user becomes familiar with enough.
If you don’t want login through the iris authentication, you can log in using the
password after releasing the connection of camera from the computer and
starting or re-starting the computer. In the event of password log-in, you will
be limited in the use of function.
11. Window log-in using the password
19
In the event of re-installing the program, you need to register the iris again.
20
190~210 mm(7.4~8.2 inches)
Note during iris photographing
When eyebrow or eyelid covers the pupil, iris photograph is not taken.
1. With the eye 5~10Cm away from the focal length (20cm), have the eye locate in the
middle of mirror.
2. With the eye wide open in a steady condition, step forward to the camera slowly.
3. Approach until the `Ppirik` signal sound goes on and the camera clicks.
4. Photographing is completed.
1. Iris photographing by UBKEY Iris Camera
When registering the iris, take photographs over several times. It is recommended
to select/register the photo of the eye widest open and of the clear iris.
Iris pattern obviously differs from individual to individual. Select/register the clear
and better iris after checking the next iris image.
By various people, the pattern not seen clearly like the bad example image exists.
Take photographs two or three times, and then select the better image.
2. Iris registration image quality
21
Good image
The situation of good image being captured
If the camera is used in both bright and dark areas, it is recommended to register
the iris enough to fit each situation.
Bad image
The situation of bad image being captured
(When the user is swung during photographing, approaching the camera in fast
motion, or descending the eyelid)
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23

UBKEY MirrorKem User manual

Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI