User's Guide FCC Information This equipment has been tested and found to comply with limits for a class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment can generates, uses, and radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio Communications.
Introduction to Ramses II Ramsen II is an innovative PC security product developed by Immanuel Electronics Co., Ltd. for providing security and a means of authentication to its users. Ramses II fingerprint identification capability will enable you to implement a convenient and solid security system. Your fingerprint is the most convenient and safest key. You no longer have to worry about losing your password. Also, no more worries about others knowing your password.
Applications - Personal authentication and identification for electronic financial transactions, e-mails and electronic document exchanges - Personal system security for protecting system data - System access restriction and data protection - Security and authentication measures for Internet and e-commerce applications System Requirements - OS: Microsoft Windows 98, Microsoft Windows 98SE, Microsoft Windows ME - CPU: Pentium 133MHz or greater - HDD: Free disk space of 20MB or more - Memory: 32
Chapter 1. Program Installation.......................................................................5 Chapter 2. Uninstall Program ........................................................................ 17 Chapter 3. Introduction to Features .............................................................. 22 1. Ramses II Center......................................................................................... 22 (1) How to Run Ramses II Center ........................................................
Chapter 1. Program Installation Insert Ramses II CD in your CD-ROM drive and run setup.exe to install Ramses II Select Start > Run from the taskbar. Input the file path in the Open text box or click Browse… and specify the path.
From the Browse window, select "setup.exe" and click Open. The file path will be indicated in the Run window. Click OK. The initial screen for program installation will be displayed. Click Next.
When the Software License Agreement window is displayed, read the agreement carefully. If you agree with the terms, select Agree and click Next.
Input your name, company and the serial number. Click Next. ※ Your serial number is indicated in the Software User Certificate provided by Immanuel Electronics Co., Ltd. Files will be copied to your system for installation.
A message will be displayed indicating that all necessary files are copied to your system. Click Next.
Input the Administrator ID and Password. Confirm your password in the Confirm Password window. Verify whether the information you provided is correct. If so, click Next. A message box will be displayed confirming the Administrator ID you provided. If the ID you provided is correct, click Yes.
Click Create Disk… . Without inserting a floppy disk into drive A: and click No.
Acknowledging that you do not wish to create an Emergency Rescue Disk, the Next button will be activated, click Next.
Click Create Disk… . Insert a blank floppy disk into drive A: and click Yes.
Ramses II will create an Emergency Rescue Disk in drive A: Input an ID and password for the Emergency Rescue Disk.
After the Emergency Rescue Disk has been created, click Next.
A message will be displayed indicating that Ramses II has been installed on your system. Click Finish to complete the installation procedure. Ramses II will reboot your system. Ramses II is now successfully installed on your system.
Chapter 2. Uninstall Program Only users with administrator authorities can remove Ramses II from the system. Administrator authorities can be granted when a new user is registered from the Ramses II Center. From the taskbar, select Start > Settings > Control Panel.
From the Control Panel window, double-click Add/Remove Programs.
Select the Install/Uninstall tab, choose Ramses II Standard Edition, and click Add/Remove… .
Select Remove and click Next. Provide the administrator's fingerprint or password and click OK.
A message box will be displayed asking you whether you wish to remove the program. Click OK. After Ramses II is successfully removed, click Finish to reboot your system.
Chapter 3. Introduction to Features 1. Ramses II Center Ramses II Center is responsible for Ramses II ver3.0's key features including user dministration(registration/modification/deletion), authorities, system configuration and log maintenance. ⓐ User/Group Administration - An administrator can grant authorities to each computer user. - A user can be registered/modified/deleted, and the corresponding user information can be stored from the Ramses II Center.
- You can reset your system configuration to the point when the Emergency Rescue Disk was created. - You can create an Emergency Rescue Disk for errors that occurred during a Ramses II operation. (1) How to Run Ramses II Center ① Method 1: Running from the Tray Icon Right-click the Ramses Tray Applet icon on the Tray Bar. Select Run Ramses II Center. ② Method 2: Start > Settings > Control Panel > Run Ramses II Center Select Start > Settings > Control Panel.
From the taskbar, select Start > Settings > Control Panel. From the Control Panel window, double-click the Rmses II Center icon.
Provide a registered user's fingerprint or password. Those not registered in the Users and Group cannot use the Ramses II Center.
The figure above displays the Ramses II Center running.
(2) User and Group Management - An administrator can add/delete users and modify user information. - Standard users can only modify their own information. ① Add a user Select the Users and Group tab and click Add.
Registering new user ID and password Provide the user information and click Next. (Password must consist of four or more characters) Group Authorities - Administrators: Has every access right to the computer and can manage every user. - Power Users: Has similar rights as an administrator but a few functions such as user registration, Ramses II removal and system configuration.
Select the user's access level and click Next. How to register a fingerprint A user must register one or more fingerprints. (Up to three fingerprints can be registered) - Select a finger that you wish to register the print of. - A message will be displayed indicating that the information is being registered. - Place the selected finger on the fingerprint sensor. - A message will be displayed asking you to remove your finger and place it back on the sensor.
This is the final step of the user registration procedure. The registered user information will be displayed for verification. Finish If the displayed information is correct, click Finish.
② Delete a user - Only an administrator can delete a user. - A deleted user cannot be recovered. Select the user you wish to delete and click Delete.
A message box will be displayed asking you to confirm whether you wish to delete the selected user. Click Yes. Provide an administrator fingerprint/password to delete the user for good.
In the example above, the user ‘tom’has been deleted. ③ Properties - You can change the user name, password and fingerprint(s). You can also modify the group the user belongs to as well as the identification type. - You can change these settings from ‘Properties.’ - An administrator can change the group a user belongs to.
In this example, the administrator selects the user ‘ran’and clicks Properties.
This is the Properties dialog box for ‘ran’. a.
Click Change… to modify the password. b. Changing groups Only an administrator can change a user’s group.
You can change the group the selected user belongs to.
c. Change the Authentication Method Authentication with fingerprint only Authentication with password only Authentication with fingerprint AND password Authentication with fingerprint OR password d. Change the Security Level - There are five security levels. - Increasing the security level decreases the chance of unregistered fingerprints being incorrectly authenticated. (You should increase the security level if your fingerprint is vivid and has a high rate of successful authentication.
e. Register a fingerprint - Click the finger you wish to register the print of and register your fingerprint. - Up to three fingerprints can be registered per user. - Please refer to the ’Add a user’ section for a detailed description of the fingerprint registration procedure. Before registering your fingerprint, click the finger you wish to register the print of.
The figure above indicates that a fingerprint has been registered. f. Delete a fingerprint - A user must have at least one fingerprint registered. (i.e. The last fingerprint cannot be deleted) - Click Properties/Fingerprint Registration and select the finger of the print that you wish to delete.
The figure above displays a finger selected for fingerprint deletion. Click Delete button.
The figure above displays the window after a fingerprint has been deleted. g. Reregister a fingerprint - Select Properties/Reregister Fingerprint and click the finger you wish to register the print of.
The figure above displays a finger selected for reregistering a fingerprint. Click Reregister button.
The figure above displays the window after reregistering a fingerprint.
④ Export - You can backup users managed by the Ramses II Center as a file. - The file will be saved with the extension *.mbk. - The saved file will be encrypted to protect the user information.
Export selected users as a file (.mbk). In the example above, the file is saved as ran.mbk.
⑤ Import - Users backed up from the Ramses II Center can be added to Users and Group. - Import the *.mbk file.
Import the user from the file. (ran.mbk in this example) The figure above displays the user ‘ran’added to the list from the backup file.
* If the user already exists in the list 51
Import the user from the file. (ran.mbk in this example) Since the user already exists in the list, click Yes to overwrite the existing data.
⑥ Setting Group/User Authorities - Default settings - Only an administrator can set group/user authorities Group Authority Standard User X Administrator Super User O O O O O O O O O O O O O O O O O O O O O O X X X X X X X X X X X X X X Select Logon Method My SecureDocs Management Register User Delete User View or Modify User Information View or Modify One’s Own Information Import/Export User View/Print/Import Log File Set Security Level Install/Remove Boot Protection Set Boot Control Key Set
The figure above displays the window for setting user/group authorities. You can select or deselect authorities from the Group Properties list.
(3) System Configuration With the exception of Logon, only an administrator can change system configuration settings. - Logon: You can change the logon window display according to the logon method. - Identification Type: The standard user authentication method can be configured from the group settings. - Boot Control: F5/F8 keys can be disabled to prevent files from being modified after safe mode booting, etc. Select the System tab from the Ramses II Center.
The user name is not displayed during the logon procedure.
The user name is displayed during the logon procedure.
User names are displayed in a combo box during the logon procedure.
Select the Identification Type. Select this option to prevent file access after booting the system in the safe or DOS mode.
If you wish to use the Boot Protector, check the option, insert the Emergency Rescue Disk in drive A: and then click OK.
Input the Emergency Rescue Disk password and click Install. A message will be displayed indicating the Boot Protector is successfully installed. Click OK.
(4) Log Management - You can view the log files generated by date. - You can view the log file content according to each category. (logon, user, encryption, system) - You can check and print the log file for each date. The figure above displays the Log Management screen. You can view categorical logs by selecting from the combo box.
(5) Emergency Rescue Disk - You can use ‘sysback.exe’ to restore the system configuration to the point when the Emergency Rescue Disk was created. Select the Emergency Rescue Disk tab and click Create Disk… .
Insert a blank floppy disk in drive A: and click OK.
Input an ID and password for the Emergency Rescue Disk. (You can provide a random ID and password at your discretion) A message will be displayed indicating that the emergency rescue disk is successfully created. Click OK.
How to recover the system configuration and after modification The figure above displays the system configuration right before the Emergency Rescue Disk is created.
Create the Emergency Rescue Disk and modify the system configuration.
In order to recover the system configuration to the point when the Emergency Rescue Disk was created, insert the Emergency Rescue Disk in drive A: and run 'sysback.exe'. The System Recovery Wizard window will be displayed. Click Recover.
Insert the Emergency Rescue Disk into drive A:. Input the Emergency Rescue Disk's user ID and password.
The figure above displays the recovered system configuration.
2. My SecureDocs Description - Just as My Documents is used for managing your documents, My SecureDocs manages encrypted files and documents. - There is a folder for each user, and folders encrypted by other users are not seen. - Each file or folder is displayed with an overlay icon. (A small icon attached to the main icon of the file or folder.) Functions - My SecureDocs provides a toolbar and a context (pop-up) menu to decrypt a file or folder.
(1) How to run My SecureDocs Select My SecureDocs from the desktop. The figure above displays the My SecureDocs window.
(2) Viewing icons in My SecureDocs Right-click My SecureDocs and select View. (3) Arranging icons in My SecureDocs Right-click your mouse from My SecureDocs and select Arrange Icons.
Select New > Folder Type in the new folder's name.
(6) Folder/File Encryption If you move a regular folder/file to My SecureDocs using Drag & Drop, Cut/Paste buttons on the toolbar, or short-cut keys (^X/^V), the folder/file is automatically encrypted. Folders created in My SecureDocs are also encrypted.
The figures above display an example of moving a file (MS3.0_SN.txt) in My Documents to My SecureDocs using Drag & Drop.
The above figures display the MS3.0_SN.txt file moved to My SecureDocs and encrypted after authentication.
Right-click a file in My Documents and select Encrypt To… from the context menu. The Identification window will be displayed prompting you to provide a fingerprint/password.
After authentication, select My SecureDocs from the Browse for Folder dialog box and click OK. The file will be added to My SecureDocs.
- Since folders and files in My SecureDocs are encrypted, they must be decrypted before you copy them to other folders. - If you move a folder/file out of My SecureDocs to a regular folder using Drag & Drop, Cut/Paste buttons on the toolbar, or short-cut keys (^C/^V), the folder/file is automatically decrypted.
Select an image folder and choose Decrypt To from the pop-up menu or click the Decrypt button from the toolbar. Complete the Identification procedure. Specify the new location for the file/folder to move to after decryption.
② Decrypting/Moving a file from My SecureDocs to a regular folder The figures above display a file being moved from My SecureDocs to My Documents using Drag & Drop.
The figure above displays a decrypted file.
3. Screen Saver Under the Windows environment, when a user leaves his/her computer for a certain period of time, the screen saver is activated to protect the monitor. However, during the user's absence, an unauthorized person may stroke any key to turn off the screen saver and have access to important files and/or documents. In order to prevent this, the system can be configured to request the user for fingerprint/password authentication before turning off the screen saver.
If the user is absent from his/her computer for a specified amount of time, the screen saver will be activated. Stroking any key while the screen saver is activated will display the fingerprint authentication window. If the fingerprint provided is identical to that of the user, the screen saver will be turned off and the user will be able to return to the work screen.
Chapter 4. Q&A Q A I am currently using Ramses II ver2.0. How can I upgrade to ver3.0? Ramses II ver3.0 features a new file encryption format to provide enhanced security measures. Therefore, you must completely remove Ramses II ver2.0 before installing version 3.0. Please note Ramses II ver3.0 cannot decrypt files that have been encrypted with Ramses II ver2.0. You must decrypt all files before removing Ramses II ver2.0 from your system. ※ Ramses I ver1.
Q A Q A When I try to change the system configuration to set the Authentication Method to Fingerprint, a message is displayed indicating that 'There is a user without a fingerprint registered. Cannot change Authentication Method.' The message implies that the user who installed the program (the initial administrator) did not register a fingerprint.
Software License Certificate Product Name: Ramses II® ver3.0 Standard Edition Serial Number: The user license is granted regarding this software product, including the program, documentation and recording medium, to the user or group entitled to the serial number above. This software product is protected under Korean and international copyright laws, including the Computer Program Protection Law. Any aspect of usage of this software product must comply with the Software License Agreement.
Ramses II ver3.0 Software License Agreement This agreement is a legal usage license agreement between Immanuel Electronics co., ltd. and the user, and not an agreement of transaction. By unpacking the CD-ROM package, you agree to be bound by the terms of this agreement. If you do not agree with the terms of the agreement, please return the product promptly. If you return the product, you will receive a refund. 1. Usage License Immanuel Electronics co., ltd.
6. Limitation of Warranty Immanuel Electronics co., ltd., guarantees that the CD-ROM and all components are free of physical damage for the 90 days after purchase. If you find any manufacture defect within the warranty period, we will replace the product. You must be able to prove that the product has been purchased within 90 days to receive a replacement, but we will not replace a product damaged due to your mishandling or negligence. Immanuel Electronics co., ltd.