Presentation Master Victorinox Secure USER’S GUIDE Version 1.0.1 Steffen Müller / Martin Kuster [Rev.08 107.10.2010 13:33] SWISS ARMY KNIVES CUTLERY TIMEPIECES TRAVEL GEAR FASHION FRAGRANCES ǀ WWW.VICTORINOX.
USER’S GUIDE USER’S GUIDE 2
USER’S GUIDE 3
USER’S GUIDE Foreword ................................................................................................. 7 Compatibility ........................................................................................... 9 Important Issues First ............................................................................ 10 Getting Started ....................................................................................... 11 Fingerprint Recognition ...............................................
USER’S GUIDE Settings 37 Synchronization Settings ........................................................................37 Security Settings.....................................................................................38 Windows Login using A Fingerprint......................................................40 Device Information ................................................................................44 Encrypted Drives ........................................................................
USER’S GUIDE 6
USER’S GUIDE FOREWORD We would like to congratulate you on the purchase of your new, high quality Victorinox pocket tool. In the development of the Presentation Master / Victorinox Secure, particular attention was paid to making its usage as simple and intuitive as possible. Through the addition of a fingerprint reader, a new standard of security has been achieved: While passwords can be guessed and shared, it is not possible to do that with fingersprints.
USER’S GUIDE All of these products are supplied with a special USB 2 extension cable. Although the biometric USB stick can be connected directly to a USB port on a notebook, we recommend always using this cable. Doing so allows the fingerprint reader to be operated while it is in a flat position on a table. Notebook ports are not intended to absorb the mechanical forces which might arise from using the fingerprint module while it is connected directly to a notebook.
USER’S GUIDE COMPATIBILITY In order to be able to use all of the features of this product, you will need a computer with the following characteristics: - Intel or AMD Processor A free USB 2 or USB 3 port Windows XP SP 3 (Service Pack 3), Windows Vista 32 / 64 Bit SP 1 or Windows 7 32 / 64 Bit MS Internet Explorer 7 or later, or Firefox (if you would like to use the Internet features) MS Outlook 2007 or later, or MS Outlook Express (if you would like to use the Outlook features) You will also need extensi
USER’S GUIDE IMPORTANT ISSUES FIRST Your new Presentation Master or Victorinox Secure product is a highly modern electronic tool, which contains precision electronics. For the trouble-free operation of these parts, it is important that you observe the following instructions: - Protect the product against moisture. Do not use any of the electronic modules in wet environments. - Never clean the electronic modules with chemical cleaning agents.
USER’S GUIDE GETTING STARTED When using the biometric fingerprint stick, always connect and disconnect it carefully from the computer. Never use force or tilt it. Always separate the stick from your Swiss Army Knife before plugging it into your computer. If you do not do so, the weight of the Swiss Army Knife could damage the stick or your computer (or rather, the port built into your computer).
USER’S GUIDE FINGERPRINT RECOGNITION The application must first be given a user password and at least two or more fingerprints. The password must be entered twice. In addition, the Windows User will be required for the Windows Look feature. Please consider that you must be able to change the Windows User and Password, if you were to change these settings for your computer.
USER’S GUIDE The password must be at least 6 characters long, with at least one number, one letter and one special character. When the password is the same in both entries, a green check mark will appear next to them. [Figure 2] Figure 2 Next, enter your current Windows User Name are well as the associated password for your Windows system. This is required for logging in with Windows using fingerprints. [Figure 3] Pay careful attention to upper and lowercase letters.
USER’S GUIDE Figure 3 Next, to register a fingerprint, select the corresponding finger on the image using the mouse.
USER’S GUIDE Figure 5 If the finger is yellow, that means that finger has been selected for recognition. Subsequently, the application will wait to scan your finger using the fingerprint scanner integrated into the USB stick. [Figure 6] Caution: Please be careful to avoid applying excessive force to the sensor when scanning your finger. A touch is sufficient. The usage of the fingerprint scanner may require some practice. Allow your finger to be scanned slowly and evenly.
USER’S GUIDE Figure 6 Repeat this procedure until the fingerprint image turns greens.
USER’S GUIDE Figure 8 You may repeat this procedure for each finger. At least two fingerprints are required. In order to recognize the second finger, select the corresponding finger on the image [Figure 8]. We recommend using the right and left index fingers, since this has proven practical depending upon whether the USB stick is on the left or right of the keyboard. We recommend that you allow at least two fingers to be recognized for each hand.
USER’S GUIDE Figure 9 Now, allow your finger to be scanned slowly and evenly. You can see the result of each scan immediately. Always repeat this procedure using the same finger until the image of the finger turns green.
USER’S GUIDE Figure 10 If needed, you may scan up to ten fingers. After all three green check marks have appeared, the OK button will appear and you can conclude the creation of your profile by clicking on this button.
USER’S GUIDE LOGIN SCREEN After you have successfully created your profile, the identification screen [Figure 11] will be displayed. Once you have logged in by means of a fingerprint or the master password, you may use your biometric USB 2 stick. Figure 11 The next screen after logging in is the initial screen. [Figure 12] It may be several seconds before the next screen appears, depending upon your configuration and the existing, encrypted drives.
USER’S GUIDE THE CAPTION AND THE NAVIGATION BAR Button The computer will be locked by clicking this button as if one had similarly used the CTRL-ALT-DEL feature. Button This button will take you directly to the Victorinox support web page. Additional guides are available for you there, as well as any potential updates. Button Opens the About dialog. The Navigation Bar: The Select Drive menu is indicated by the two graphic markers and the active drive is indicated in yellow.
USER’S GUIDE INTERNET FEATURES All of the features that affect the Internet use featured on these screens. In this context, we would like to point out that the Safe Browsing software feature made available here does NOT enable anonymous surfing on the Internet (since this has been forbidden in many countries according to new legislation), but rather permits surfing without leaving any traces behind from the viewpoint of the computer.
USER’S GUIDE Using the Synchronize button, the synchronization cycle will be started according to the settings. Figure 13 Please note that by clicking Synchronize all of the previously saved favorites may be deleted from the USB stick. (Depending on how “Delete existing Favorites from the USB Stick first” has been set).
USER’S GUIDE SAFE BROWSING If you have checked the Activate Safe Browsing checkbox [Figure 14], Internet log files will not remain on the computer. This also means, however, that cookies cannot be permanently stored on your computer. Additionally the History feature will no longer be available, meaning that history cannot be traced. If you would like to continue using these features, you also have the option of selectively deleting Internet traces from the Delete Local Internet Log Files menu item.
USER’S GUIDE OUTLOOK MENUS Under the Outlook menu, you will find two different Outlook options: Mobile Outlook Express and a second submenu for the Outlook included with the Microsoft Office package. You may use the features corresponding to your configuration as they correspond to your installation. The Outlook features enable you to synchronize important Outlook information, such as your emails, contact information, and calendars between two computers.
USER’S GUIDE BACKUP TO USB STICK In order to be able to backup data from Outlook Express, the corresponding account must be selected first. [Figure 15] You may, of course, select multiple accounts, if such exist. By clicking the Create Backup button, the backup process is started and saved to the USB stick. Figure 15 Caution: 26 Please note that your backup is only protected from access by third parties when you have created it on an encrypted drive. For more details, read the Encrypted Drives section.
USER’S GUIDE RESTORING AND MANAGING BACKUPS Of course, at some point a backup may need to be restored. To do this, select the corresponding backup and restore it by clicking the Restore button. [Figure 16] Backups that are no longer needed can be simply deleted by selecting the backup and then clicking the Delete button. Outlook Express can also be comfortably started using the Run Outlook Express button. This, of course, assumes that Outlook Express has been installed.
USER’S GUIDE MICROSOFT OUTLOOK Outlook is primarily the client for Exchange Server, however, it may also be used without Exchange Server. CREATE & SYNCHRONIZE In order to be able to backup data from Outlook, the corresponding profile to be backed up must be selected first. This can be done with the help of the Add Profiles button.
USER’S GUIDE The screen [Figure 17], which is then opened, offers a selection of profiles on the left side for synchronization. On the right side, the determination is made whether this process involves a new backup or a pre-existing, which may have been created by another computer. Figure 18 The profile is added to the list of profiles to be backed up by clicking the OK button. [Figure 18] A “Profile Pair” refers to the connection between your biometric USB stick and an Outlook profile.
USER’S GUIDE Figure 19 The direction of object synchronization is determined with the help of the Sync. Rules control. If both direction simultaneously is selected then missing objects on both sides will be exchanged.
USER’S GUIDE OVERWRITING OUTLOOK INFORMATION With the help of the Add Profiles button, existing Outlook backups can overwrite the local Outlook information on other computers. To do this, simply select the corresponding backup from the USB stick [Figure 20]. The name of the computer that created the backup is displayed in parenthesis (in this example, VM-D2-WV-32-UO).
USER’S GUIDE DELETE OUTLOOK PROFILES In order to delete a profile that is no longer needed right-click on the top-most item for that profile. Figure 21 Please note that, when you delete a profile pair, you will also delete all of the data stored on the USB stick along with it.
USER’S GUIDE SYNCHRONIZING Data synchronization enables you to backup your data on the USB stick as well as synchronize it with other computers. For this, you may use your personal My Documents working folder, as well as any other folder on the local computer or any network drive. Caution: If you synchronize data then it will be transferred with the help of your USB stick from one computer to another.
USER’S GUIDE YOUR DOCUMENTS Your own documents can be selected from the local computer as well as from the USB stick. In order to switch between the local computer and the USB stick, click on the Notebook or USB stick icons at the top. Select the desired folder using a check mark. Before you click the Synchronize button, use the arrow buttons to set whether you want to only write to the USB stick, or replace data on the computer, or want to synchronize both at the same time.
USER’S GUIDE FOLDER SYNCHRONIZATION In order to be able to synchronize additional folders or files, you can open a new screen, with which you can select the corresponding folder, under Folder Synchronization [Figure 23] by means of the Add button.
USER’S GUIDE The complete Desktop content is synchronized using the Desktop icon. To do this, you need to click the red cross next to the Desktop icon.
USER’S GUIDE SETTINGS All of the settings that affect your biometric stick have been collected in this menu. It is very important that you first create your encrypted drives from here. Data that you store on your biometric stick is only secure when you save it on an encrypted drive. Thereby, you have the option of storing two types of data on your stick: that which all users can access, and data that only you or a very limited group of people defined by you can access.
USER’S GUIDE With the help of the calendar, select the next Monday and set the start time to 12:00:00. Since the synchronization cycle should run every other day from that date, an interval of 2 days needs to be entered. Furthermore, from this screen you can set the language as well as the Windows login settings.
USER’S GUIDE Due to technical considerations, the Fingerprint Logon option is only available for computers running under Windows Vista 32 Bit or Windows 7 32 Bit. For this reason, this feature is hidden when the application is running under Windows XP or 64-bit operating systems. If you check Fingerprint Logon [Figure 25] then you can login to Windows using your fingerprint.
USER’S GUIDE WINDOWS LOGIN USING A FINGERPRINT Fingerprint logon simplifies the everyday use of Windows passwords. After Fingerprint Logon [Figure 25] has been set, you will see an additional user icon [Figure 27] once you try to switch users [Figure 26]. Figure 26 If you now select Fingerprint Login [Figure 27], a new login dialog [Figure 28] will appear.
USER’S GUIDE Figure 27 You now have the option of entering your User Name and Password, as always, or simply logging in using your fingerprint. [Figure 27] For logging in using a fingerprint, you simply swipe your pre-registered finger across the scanner (as you did when registering your fingerprint).
USER’S GUIDE Figure 28 If there is an error or the fingerprint is not recognized, the image of the fingerprint will turn red [Figure 29]. Afterwards you will be asked to scan a finger again until the system has recognized your fingerprint and logged you in.
USER’S GUIDE Figure 29 Figure 30 43
USER’S GUIDE DEVICE INFORMATION The Device Information screen displays several pieces of information, such as the serial number of the USB device and statistical information about how the storage space is being used.
USER’S GUIDE ENCRYPTED DRIVES With the Victorinox Secure product, you have a tool for creating secure, virtual drives that can only be opened using the right password or fingerprint. These drives are encrypted using AES 256 and considered very secure. The actual storage space for these virtual drives is located on your USB stick, however, is displayed by Windows like a completely normal drive. Once a drive has been started, you can use it with Windows as if you had an additional drive.
USER’S GUIDE The maximum is only limited by the space available on the USB stick. [Figure 32] Please note that all of the storage space that you allocate for this new secure drive is immediately reserved, even when the drive itself is still empty. Example: If you were to create an 8 GB drive on a USB stick that had previously indicated 10 GB free, then after the creation of the drive only 2 GB would remain available, even if the encrypted drive were still empty.
USER’S GUIDE Of course, encrypted drives can also be stored on a hard disk. To do this, set the checkbox (indicated by the red circle) and subsequently an little icon will appear after Destination Directory. By default, the file made available for the encrypted drive is stored in the Windows user directory under “\AppData\MKI\Secure Drives”. You can then determine a different location for this file using the icon. Clicking on the folder icon opens a selection dialog.
USER’S GUIDE time required depends not only on the size of the drive, but also on the computing power of your computer. After the drive has been successfully created, it will appear in the list of virtual drives under Add Encrypted Drive. [Figure 34] Figure 34 From this screen, you can now set the options for any drive which has already been created as you would like.
USER’S GUIDE STARTING A DRIVE To start a drive, you must select it from the list of drives using the mouse, enter the corresponding password in the password field, and click the Open Drive button. [Figure 35] Figure 35 After the drive has been successfully started, it should also be listed under My Computer. You can now use this drive as if it were your own hard disk. However, you should also keep in mind that you have to close the drive before removing the USB stick.
USER’S GUIDE CLOSING A DRIVE The best approach to closing an open drive would be to select the corresponding drive from the Encrypted Drives screen and then click the Close Drive button.
USER’S GUIDE DELETING A DRIVE When encrypted drives are no longer needed, you may delete them… To do this, select the corresponding drive in this list and use the Delete Drive button.
USER’S GUIDE MANAGING FINGERPRINTS Managing fingerprints is similar to the fingerprint recognition procedure (see the Chapter entitled Fingerprint Recognition). Initially, you will see the current state. From here, fingerprints can be added, deleted or modified. To select the finger that you would like to edit, it must be selected using the mouse. The selected finger is indicated in yellow, as seen already under Fingerprint Recognition.
USER’S GUIDE indicates this with either a red or green check mark. All modifications are saved by clicking OK and applied immediately. However, this button will only become active when no errors have been made. THE PASSWORD MANAGER The My Password screen [Figure 39] is divided into fields that list the passwords as well as those in which passwords can be added, modified and deleted. A filter for the selected category can be set using the Category combo-box button.
USER’S GUIDE ADDING A PASSWORD In order to be able to add a new password, first click on the Add button as indicated in [Figure 40]. Figure 40 Fill in the corresponding fields, such as Description, Name and Password. Either you have already created an appropriate category or, if not, you will now create a new category, by simply entering the name of the new category in the Category field. The Info and Internet Address fields are optional and do not need to be entered.
USER’S GUIDE Figure 41 After the new password has been successfully saved, you will see it in the list of passwords as in [Figure 42].
USER’S GUIDE CHANGING A PASSWORD If you want to modify or supplement an existing password, select it from the list of passwords. Once the password has been selected, the Delete and Edit buttons become active. By clicking the Edit button, the entries on the right side of the screen that are associated with the password will be activated. Figure 43 After you have completed your changes, store them by clicking the Accept button [Figure 44].
USER’S GUIDE Figure 44 DELETING A PASSWORD In order to delete a password from the list, select it and click the Delete button.
USER’S GUIDE THE BLUETOOTH MODULE This module is available with the Presentation Master and Presentation Master Flight products and is found on the back of the knife. It has a WIPP button with two position (Previous / Next) as well as a red power LED. CONNECTING THE BLUETOOTH MODULE Only the Presentation Master and Presentation Master Flight products have the Bluetooth feature. Bluetooth Controls: 1. Power LED 2. Next WIPP button 3.
USER’S GUIDE together with your PC. It will differ depending on the model of your computer. We recommend the usage of the Microsoft Bluetooth stack. However, the module can also work with other compatible Bluetooth stacks. You will find the User’s Guide on how this application is used in your computer’s manual. Use this application to set your computer to search for new Bluetooth devices.
USER’S GUIDE WORKING WITH THE BLUETOOTH MODULE The Bluetooth module emulates the right and left mouse buttons. With them, you can remotely trigger all of the actions that you would normally be able to achieve using these mouse buttons. In order to browse backwards and forwards in a PowerPoint presentation, simply press the up and down buttons on your Presentation Master. Activating and Deactivating the Module: Click the Up button for 3 seconds: The LED will blink once and the module will deactivate itself.
USER’S GUIDE BLUETOOTH PROBLEMS AND THEIR CAUSES Problem: The computer does not find the Bluetooth module. Solution: If Bluetooth has not already been activated on the computer, do that now.
USER’S GUIDE SUPPORT INFORMATION You will find updates, additional product information and support on the Internet at the following address: http://www.victorinox.com/support/usb You can reach us at the following address: VICTORINOX CH-6438 Ibach-Schwyz Switzerland Phone: +41 41 81 81 211 Fax: +41 41 81 81 511 http://www.victorinox.com In the USA: Victorinox Swiss Army, Inc. 7 Victoria Drive P.O. Box 1212 Monroe, CT 06468 Customer Information 1-800-442-2706 http://www.swissarmy.
USER’S GUIDE NOTES AND LEGAL ISSUES Exclusion of Liability The information provided in this guide as well as the underlying software was composed with the most care possible. The software and guide were checked repeatedly to the best of our knowledge and errors in good faith. However, we cannot completely exclude deviations or error in the guide and/or software.
USER’S GUIDE Adobe and Acrobat are trademarks or registered trademarks of Adobe System, Inc. in the USA and other countries. Intel and the Intel logo are registered trademarks of the Intel Corporation in the USA and other countries. AMD and the AMD logo are registered trademarks of the AMD Corporation in the USA and other countries. Bluetooth and the Bluetooth symbol are the property of Bluetooth SIG, Inc., USA, and have been licensed to Victorinox AG.