Personalized computer mouse
Hard & software complex “Personalized computer mouse” allows to get cheap and effective computer recourses protection, access right assignment, unique user identification and authentication, private data protection and protection against unauthorized access to Your computer.
The offered personalized computer mouse works as usual mouse, but it is also user identification and authentication tool. Our hard & software complex "Personalized computer mouse" together with build-in reader provide complex personalization of computer technique
Used together with:
“Personalization” and “Steganos”.
Description
- Personalized optical mouse (hereinafter Mouse) is intended for work in operating systems Windows 2000/XP/2003/7 as standard mouse with extra access restriction function.
- Access restriction is carried out by code key and specialized software. Code BIK-BAK key and software are delivered together with Mouse.
- Software provides with setting of individual available resources list for each user.
- Device is based on the patent of Ukraine UA-85 and the patent of Russian Federation RU 20975519 C1.
General properties
- Mouse has the same general properties as usual computer mouse;
- Build-in Mouse device (reader) and code key provide fixing and recognition of no less than 16384 code combinations;
- Degree of protection against electrical shock satisfies the 3 rd class DSTU 4113.
- Mouse can be exploited under such climatic conditions:
- temperature working range is from +5°C to +55°C
- relative humidity is up to 90%
- Mouse should be stored in packing under such climatic conditions: temperature is from 0°C till +40°C and relative humidity is no more than 80%.
- Temperature transportation range is -30°C till +50°C
Connection
- If Mouse is equipped for connection to PS/2 port, it is necessary to connect it to computer only after computer has been turned off.
- If Mouse is equipped for connection to USB port, it is possible to connect it to computer not only after computer has been turned off, but also when computer works.
User Guide
- It is necessary to install the program “BIK-BAK Personalization”, which can be found on enclosed CD (without this software the Mouse performs only standard functions), in order to use access restriction function.
- Attention! The “BIK-BAK Personalization” can be installed only in Windows 2000/XP/2003/7 by computer administrator or system administrator.
- Installation of “B²K-BAK Personalization” is necessary to do according to the instruction.
- All necessary information about use of “BIK-BAK Personalization” can be found in User Guide on enclosed CD.
- If incorrect code combination is inputted twice, the program will block access to computer resources and give signals about attempt of unauthorized access.
Order by phone:
8(063) 234-68-78, 8 (044) 360-69-77