BIK-BAK Reader
Cheap and reliable key readers can be made for all main computer ports. Using our drivers, utilities and software for work with reader, it is possible to get complex personalization of technical systems, including computer and telecommunication technique.
BIK-BAK reader has a lot of modification and you can choose the most comfortable modification.
Used together with:
“Personalization” and “Steganos”.
Description
- BIK-BAK Reader is used for unique user identification and authentication and computer technique personalization.
- Offered personalization system provides access restriction to the confidential files.
- Access restriction is carried out by code key and specialized software. BIK-BAK key and software are delivered together with BIK-BAK reader.
- Individual setup of list of program, which need to be authorized, is possible for each user.
- Device is based on the patent of Ukraine UA-85 and the patent of Russian Federation RU 20975519 C1.
General properties
- BIK-BAK reader and code key provide fixing and recognition of no less than 16384 code combinations.
- Degree of protection against electrical shock satisfies the 3 rd class DSTU 4113.
- BIK-BAK reader can be exploited under such climatic conditions:
- temperature working range is from +5°C till +55°C
- relative humidity is up to 90%
- BIK-BAK reader should be stored in packing under such climatic conditions: temperature is from 0°C till +40°C.
Connection
- BIK-BAK Reader connect to the computer via USB-port, for which necessary drivers are installed. It is possible to connect when computer works.
User Guide
- It is necessary to install the program “BIK-BAK Personalization”, which can be found on enclosed CD, in order to use access restriction function.
- Attention! The “BIK-BAK Personalization” can be installed only in Windows 2000/XP/2003/7 by computer administrator or system administrator.
- Installation of “BIK-BAK Personalization” is necessary to do according to the instruction.
- All necessary information about use of “BIK-BAK Personalization” can be found in User Guide on enclosed CD.
- If incorrect code combination is inputted twice, the program will block access to computer resources and give signals about attempt of unauthorized access.