Sec keeper en

423 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
423
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Sec keeper en

  1. 1. USER GUIDE DEKARTSECRETS KEEPER © Dekart
  2. 2. I Secrets KeeperTable of Contents Part I License and trademarks information 1 Part II Glossary 1 Part III Introducing Secrets Keeper 2 1 Secrets Keeper purpose and features ................................................................................................................................... 2 2 Secrets Keeper products components ................................................................................................................................... 3 3 Secrets Keeper hardware and software requierments ................................................................................................................................... 3 4 Supported key storage and biometric devices ................................................................................................................................... 3 Part IV Installation of Secrets Keeper 5 1 Installing of Secrets Keeper ................................................................................................................................... 5 2 Updating of Secrets Keeper ................................................................................................................................... 12 3 Uninstalling ................................................................................................................................... 15 of Secrets Keeper Part V Using Secrets Keeper 16 1 Starting the application ................................................................................................................................... 16 2 Configuring the application ................................................................................................................................... 17 3 Maintaining the Key ................................................................................................................................... 17 Controlling the file encryption password stored on the Key .......................................................................................................................................................... 18 Changing the.......................................................................................................................................................... PIN code 20 Unblocking the Key .......................................................................................................................................................... 22 Adding a BIO .......................................................................................................................................................... ID to the KSD 23 Changing the.......................................................................................................................................................... BIO ID 25 4 Encrypting files without using the Key ................................................................................................................................... 26 5 Decrypting files without using the Key ................................................................................................................................... 27 6 Encrypting files using the Key ................................................................................................................................... 28 7 Decrypting files using the Key ................................................................................................................................... 29 8 Using DragnDrop to encrypt/decrypt files ................................................................................................................................... 30 9 Encrypting /decrypting files via the context menu ................................................................................................................................... 30 10 Creating a Self-Extracting encrypted archive ................................................................................................................................... 30 11 Using a Self-Extracting encrypted archive ................................................................................................................................... 32 12 Secrets Keeper and MS Office ................................................................................................................................... 33 13 Wiping files ................................................................................................................................... 34 14 Getting information about Secrets Keeper ................................................................................................................................... 35 15 Closing Secrets Keeper ................................................................................................................................... 36 Part VI Additional information 36 © Dekart
  3. 3. Contents II 1 Biometric authentication in Secrets Keeper ................................................................................................................................... 36 2 Registering Secrets Keeper ................................................................................................................................... 37 3 Troubleshooting ................................................................................................................................... 38 4 Specifications of common Keys (PIN, capacity) ................................................................................................................................... 40 Index 43© Dekart II
  4. 4. 1 Secrets Keeper1 License and trademarks information COPYRIGHT Copyright © Dekart SRL. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Dekart SRL, or its suppliers or affiliate companies. DISCLAMER Dekart SRL makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Dekart SRL reserved the right to revise this publication and to make changes to its content, at any time, without any obligation to notify any person or entity of such revisions or changes. Further, Dekart SRL makes no representations or warranties with respect to any Secrets Keeper software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Dekart SRL reserved the right to make changes to any and all parts of Secrets Keeper software, at any time, without any obligation to notify any person or entity of such revisions or changes. LICENSE AGREEMENT NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE SOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST, LICENSE.TXT, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE OR AS PART OF THE SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH THEREIN, DO NOT INSTALL THE SOFTWARE. DEKART SRL TRADEMARK ATTRIBUTIONS Secrets Keeper is a trademark of Dekart SRL All other registered and unregistered trademarks in this document are the sole property of their respective owners. DEKART SRL CONTACT INFORMATION E-mail: for sales details: sales@dekart.com for product support: support@dekart.com for comments and feedback: info@dekart.com WWW: www.dekart.com2 Glossary Secrets Keeper (SK) – the name of the program. Key, KSD (Key Storage Device) – a removable device on which information needed to © Dekart
  5. 5. Glossary 2 decrypt and access your encrypted data is stored. A KSD can be a smart card, a USB token, a USB flash drive, a memory card, etc.. The KSD can be secured with a PIN code, but it can work without a PIN too. PIN (Personal Identification Number) – a number which must be provided in order to access the contents of the KSD. The PIN can be 1 to 8 characters long and must be kept secret. BIO ID – a biometric ID that holds information about the unique features of your body (ex: fingerprint or iris). The size of the BIO ID is variable, in average it takes from 600 bytes (a fingerprint) to 30 Kbytes (voice recording). Biometric authentication - authentication based on the verification of specific physical characteristics of the user (ex: fingerprints, iris, voice) by means of special biometric equipment. Two-factor authentication – a process controlling the authenticity of the users identity on the basis of the following factors: "Something You Have – for example, the KSD device" and "Something You Know — for example, the user name and password, or the PIN-code". Three-factor authentication – a process controlling the authenticity of the users identity on the basis of the following three factors: "Something You Have – for example, the KSD", "Something You Know — for example, the PIN code", "Something You are – for example, your BIO ID".3 Introducing Secrets Keeper3.1 Secrets Keeper purpose and features Secrets Keeper is a software solution that protects your files from unauthorized access by applying encryption and three-factor authentication. Two of Secrets Keepers key-advantages are its ease of use and strong cryptographic mechanisms. Secrets Keeper’s security principles 1. Secrets Keeper’s security relies on the use of a PIN-protected Key, which contains your BIO-ID and the information necessary to access your files. Therefore, you do not have to memorize a complex password; while three-factor authentication minimizes the risk of unauthorized access in case the Key is lost or stolen. 2. If the PIN is entered incorrectly a certain number of times, the Key is blocked. Note: this number depends on the type of the Key, usually it is between 3 and 10 attempts (see Appendix for more info). Secrets Keeper’s essential advantages© Dekart
  6. 6. 3 Secrets Keeper 1. Ease of use – no need to memorize and enter the password each time you need to access your files. In addition, the program has a built-in wiping feature, which allows you to securely erase a file from a disk, thus making its recovery impossible. 2. Mobility – self-extracting archives can be created and easily transferred to any computer, making data exchange via email or removable drives much more secure. 3. Integration – the “Encrypt file” and “Decrypt file” buttons are automatically added to the MS Office application toolbar (in Word, Excel and PowerPoint). 4. Multiple Functionality – the Key can be used with SK, as well as with other applications, such as Dekart Logon or Dekart Private Disk Multifactor.3.2 Secrets Keeper products components The product consists of software modules and a Key which ‘opens’ the encrypted files. This guide is included too.3.3 Secrets Keeper hardware and software requierments Hardware requirements  PC with at least one available port (COM, USB, etc. ) for the Key.  If a smart card is used as a Key, a PC/SC-compliant smart card reader is required.  If three-factor authentication is used, a biometric device, such as BioLink U-Match Mouse is needed. Software requirements  Windows 95, 98, NT4.0, 2000, ME, XP.  Driver for the Key.  Driver for the biometric device.3.4 Supported key storage and biometric devices Secrets Keeper supports the following devices: Key Storage Devices: · ACOS1 card; · ActivCard ActivKey USB token series; · Aladdin eToken R2 USB token series; · Aladdin eToken PRO USB token series; · Algorithmic Research MiniKey USB token series; · Algorithmic Research PrivateCard smart card series; © Dekart
  7. 7. Introducing Secrets Keeper 4 · Datakey Model 310 smart card series; · Datakey Model 330 smart card series; · Eutron CryptoIdentity ITSEC USB token series; · Eutron CryptoIdentity 4 USB token series; · Eutron CryptoIdentity 5 USB token series; · GemPlus GPK smart card series; · GemPlus MPCOS EMV smart card series; · Giesecke & Devrient STARCOS S smart card series; · Giesecke & Devrient STARCOS SPK smart card series; · Rainbow iKey 1000 USB token series; · Rainbow iKey 2000 USB token series; · Rainbow iKey 3000 USB token series; · Schlumberger Cryptoflex smart card series; · Schlumberger Multiflex smart card series; · Schlumberger Payflex smart card series; · Siemens CardOS M 4 smart card series · ruToken USB token series; · USB flash drives, CD disks, etc.; · Any memory storage device detected as a removable disk. Smart card readers: Secrets Keeper uses virtually all PC/CS compatible smart card readers, for example: · Datakey DKR smart card reader series · GemPlus GemPC smart card reader series · OmniKey CardMan smart card reader series · Schlumberger Reflex smart card reader series · Towitoko CHIPDRIVE smart card reader series Biometric verification devices: Dekart Software uses most types of BioAPI and HA API compatible biometric verification devices, for example: · Precise Biometrics Precise 100 fingerprint and smart card reader series · SCM SCR222 fingerprint reader · BioLink U-Match MatchBook · BioLink U-Match Mouse A complete list of supported devices is available at: http://www.dekart.com/products/supported_devices/ Note 1. Before you purchase a USB token or a smart card, please make sure that it has enough memory to store the required user information. Please, take into account that a part of the KSDs memory may be allocated to other data, e.g. BIO ID. You can find the free space available on the card or token, as well as delete or backup data using Dekart Key Manager; for more details, see: http://www.dekart.com/products/card_management/key_manager/© Dekart
  8. 8. 5 Secrets Keeper Note 2. The KSDs shipped by Dekart are not PIN-protected, you will be prompted to set a PIN when you launch the application for the first time.4 Installation of Secrets Keeper  Installing;  Updating;  Uninstalling.4.1 Installing of Secrets Keeper 1. Make sure that all your applications are closed before you attempt to install Secrets Keeper. 2. If three-factor authentication will be used, the drivers of the biometric device must be installed. Note: if biometry-enabled applications were not previously used on your computer, you have to install the BioAPI Framework, available at www.bioapi.org, the Implementation section). 3. To start the installation process, launch SecKeeper.exe. 4. Read the information on the welcome screen, and then press Next. © Dekart
  9. 9. Installation of Secrets Keeper 6 5. You have to agree with the terms of the license agreement in order to continue the installation process.© Dekart
  10. 10. 7 Secrets Keeper 6. In the next step, provide information about yourself and type in the registration number of the product. © Dekart
  11. 11. Installation of Secrets Keeper 8 7. Then indicate the folder in which Secrets Keeper will be installed.© Dekart
  12. 12. 9 Secrets Keeper 8. Indicate the folder of the Start Menu in which Secrets Keeper’s shortcuts will be added. © Dekart
  13. 13. Installation of Secrets Keeper 10 9. Check the additional options as necessary (place a shortcut on the Desktop, display the ReadMe file, automatically launch the application) and press Next.© Dekart
  14. 14. 11 Secrets Keeper 10. Press Finish to finalize the installation process. © Dekart
  15. 15. Installation of Secrets Keeper 12 After that the program will copy its files to your system and complete the installation process.4.2 Updating of Secrets Keeper 1. If the installation program is launched again, it will automatically detect the currently installed version of Secrets Keeper and collect all the data necessary to perform the update.© Dekart
  16. 16. 13 Secrets Keeper 2. To continue the process press Next. This will display the license agreement which you need to accept in order to proceed. 3. When all the necessary information is collected, press Next. © Dekart
  17. 17. Installation of Secrets Keeper 14 4. Press Finish to complete the process.© Dekart
  18. 18. 15 Secrets Keeper Afterwards, the program will update the existing files, or add the new ones if necessary. Note. You need to restart your computer after updating Secrets Keeper.4.3 Uninstalling of Secrets Keeper Follow these steps if you wish to uninstall the product: 1. Go to Start Menu Programs, select the folder you chose at step 8 when installing the program (see Installing Secrets Keeper), then choose Uninstall. An alternative way is to go to Control Panel Add or Remove Programs, choose Secrets Keeper and press Uninstall). The following window will appear on the screen: © Dekart
  19. 19. Installation of Secrets Keeper 16 2. To confirm your decision, press Yes.. 3. After successful completion of the de-installation process, you will see the following message:5 Using Secrets Keeper Below is a list of Secrets Keeper’s functions:  Secrets Keeper configuration.  Key maintenance.  Encrypting / decrypting files without the Key.  Encrypting / decrypting files with the Key.  Encrypting / decrypting files from within MS Office applications.  Using DragnDrop to encrypt / decrypt files.  Encrypting / decrypting files via the context menu.  Creating a Self-Extracting encrypted archive.  Wiping files . Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask you to perform two- or three-factor authentication prior to performing any operation which requires the Key (encrypt / decrypt with the Key, change Key options, etc.)5.1 Starting the application The program can be started in one of the following ways: · Go to Start Menu Programs, select the folder you chose at step 8 when installing the program (see Installing Secrets Keeper), then run the program. · In Windows Explorer, open the folder indicated at step 7 of the installation process (see Installing Secrets Keeper), then run the program. The application’s window will appear on the screen.© Dekart
  20. 20. 17 Secrets Keeper5.2 Configuring the application We recommend you to configure the application after you start it for the first time, you can do that by pressing Options… . The following window will appear on the screen:. Below are Secrets Keeper’s options (check to enable, un-check to disable): 1. Associate the <.skf> extension with Secrets Keeper. 2. Automatically decrypt a <.skf> file when it is double-clicked then run the application associated with the decrypted file. 3. Use the Key to access encrypted files. 4. Automatically check if a newer version is available. 5. Compress the file before encrypting it. 6. Delete files after encryption. Note: We advise you to enable this option, to avoid accidental data leaks. .5.3 Maintaining the Key To use the Key when encrypting files, enable Use Key in the Options… menu. From this moment on, the program’s main window will look like this: © Dekart
  21. 21. Using Secrets Keeper 18 If you wish to change some of the Key’s parameters, connect the Key and press Key. The following options are available:  Add or change password.  Remove password.  Add or change PIN.  Unblock Key.  Add or change BIO-ID. Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask you to perform two- or three-factor authentication prior to performing any operation which requires the Key (encrypt / decrypt with the Key, change Key options, etc.)5.3.1 Controlling the file encryption password stored on the Key Enabling Use Key allows you to add, change or remove the Key’s encryption password. Changing the password. To add a password or change an existing one, press Key Password, and enter the new password in the appearing window. The password’s strength (i.e. cryptographic complexity) is automatically shown in the Password quality field. Note. The password can be 1 to 64 characters long, it may contain letters, digits, and special characters.© Dekart
  22. 22. 19 Secrets Keeper To create a cryptographically strong password, use the Create password function. In this case a random set of characters will be generated and used as a password. To store the new password on the Key, press Store password. Note that after creating a new password, you will be unable to decrypt the documents that were encrypted with the old password. The program will notify you about the consequences of changing a password and ask you to confirm your decision. © Dekart
  23. 23. Using Secrets Keeper 20 To complete the operation, press Yes. Deleting the password To delete the password from the Key, press Key Delete password. Note that after deleting the password, you will be unable to decrypt the documents that were encrypted with it. The program will notify you about the consequences of deleting a password and ask you to confirm your decision. To complete the operation, press Yes.5.3.2 Changing the PIN code To add a PIN to your Key or change an existing one, perform the following operations: 1. Start the application (follow the steps given in the Starting the application section). 2. Press Key Change PIN. The Change PIN window will appear on the screen.© Dekart
  24. 24. 21 Secrets Keeper 3. Enter your new PIN in the PIN field, and then enter it again in the Confirm field. To finish, press OK. Note. The PIN can be 1 to 8 characters long. 4. If you do not wish to use a PIN code, uncheck Enable PIN and press OK. Note: we do not advise you to leave the PIN empty, especially if you use a USB flash disk as a Key. In this case, others will be able to make copies and use the Key without your consent. © Dekart
  25. 25. Using Secrets Keeper 22 The following window appears on the screen if the operation is successfully complete.5.3.3 Unblocking the Key If the PIN was incorrectly entered more than once, the Key will be blocked. To unblock the Key, press Key Unblock Key… . The Unblocking the Key window will appear on the screen: Enter your PIN in the Enter PIN field and press OK. If the entered PIN is incorrect, the Key will be permanently blocked. (Does not apply to flash-memory based keys) The following window will appear on the screen if the operation is successful: Note. The Appendix provides a list of Keys and their maximum number of PIN-entering© Dekart
  26. 26. 23 Secrets Keeper attempts.5.3.4 Adding a BIO ID to the KSD If you wish to switch from two-factor authentication to three-factor authentication, a biometric ID has to be assigned to the Key. Note. When choosing a biometric device, consider your intrinsic physical traits (ex: certain fingerprint scanners will not work if the skin is too dry). Keep in mind that the environment has a major impact on voice-recognition; therefore the position of your computer is important. To add a BIO ID, follow these steps. 1. Press Key Change BIO ID in the program’s main menu. A list of available biometric devices will appear on the screen. 2. Check the Enable Biometric ID verification checkbox and choose the preferred device from the list. 3. If a fingerprint scanner is chosen, ex: Bio-Link U-Match, you will be asked to press your finger against the scanner several times. When the necessary information is gathered, it will be saved to the Key. © Dekart
  27. 27. Using Secrets Keeper 24 If you choose a voice recognition device, such as SAFLINK Scan-Soft Voice Verification, you will be asked to pronounce a key-phrase. As in the previous case, the BIO ID is stored on the KSD once it is collected.© Dekart
  28. 28. 25 Secrets Keeper5.3.5 Changing the BIO ID To change the biometric ID, follow these steps. 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press Key Change BIO ID. The Change Biometric ID window will appear on the screen (see. Adding a BIO ID). 3. Choose the currently active biometric device from the list. 4. As in the case of adding a BIO ID, depending on the biometric device you choose, you will be asked to perform a certain action (ex: pronounce a phrase, press your finger against the scanner, etc). When the process is done, the BIO ID is saved on the Key. Note. If you wish to disable biometric authentication, uncheck "Enable Biometric ID verification" in the Change Biometric ID window. © Dekart
  29. 29. Using Secrets Keeper 265.4 Encrypting files without using the Key If you wish to encrypt files without a Key, follow the steps below: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press File Encrypt file(s)… . 3. The Select file(s) to encrypt dialog will appear on the screen. Type the name of the file(s) you wish to encrypt in the File name field. You can also use your mouse to select a file. Selecting multiple files can be done by holding Ctrl and clicking on them 1. Enter your password in the Password field, and then confirm it by typing it again in the Confirm field. Note. The password can be 1 to 64 characters long.© Dekart
  30. 30. 27 Secrets Keeper 2. Press Open to complete the operation. Once the operation is successfully complete, the original files will be replaced with their encrypted versions, which have the <.skf> extension. Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left intact.5.5 Decrypting files without using the Key If you wish to decrypt files without a key, follow the steps below: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press File Decrypt file(s)… . The Select file(s) to decrypt dialog will appear on the screen. 3. Enter the name(s) of the file(s) you wish to decrypt in the File name field. 4. Enter the decryption password in the Password field. 5. Press Open to continue the operation. Once the operation is successfully complete, the decrypted files will appear in the same folder. © Dekart
  31. 31. Using Secrets Keeper 285.6 Encrypting files using the Key Follow these steps in order to encrypt a file: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Connect the Key to the computer. 3. If an encryption password is not yet stored on the Key, one should be added (see. Controlling the file encryption password stored on the Key). 4. Press File Encrypt file(s)… . 5. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program will ask you to go through the two- or three-factor authentication procedure. 6. The Select file(s) to encrypt dialog will appear once authentication is successfully complete. 7. Type the name of the file(s) you wish to encrypt in the File name field. Selecting multiple files can be done by holding Ctrl and clicking on them 8. Press Open to continue the operation. Once the operation is successfully complete, the original files will be replaced with their encrypted versions, which have the <.skf> extension.© Dekart
  32. 32. 29 Secrets Keeper Note. If an encryption password is not stored on the Key, the program will notify you about that and automatically switch to the Encrypting files without using the Key mode. Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left intact.5.7 Decrypting files using the Key To decrypt files using the Key, follow these steps. 1. Launch the application (according to the instructions given in the Starting the application section). 2. Connect the Key to the computer. 3. Press File Decrypt file(s)… . 4. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program will ask you to go through the two- or three-factor authentication procedure. 5. The Select file(s) to decrypt dialog will appear once authentication is successfully complete. 6. Type the name of the file(s) you wish to decrypt in the File name field. Selecting multiple files can be done by holding Ctrl and clicking on them. 7. Press Open to continue the operation. © Dekart
  33. 33. Using Secrets Keeper 30 Once the operation is successfully complete, the decrypted files will appear in the same folder. Note. If an encryption password is not stored on the Key, the program will notify you about that and automatically switch to the Decrypting files without using the Key mode.5.8 Using DragnDrop to encrypt/decrypt files You can encrypt or decrypt a file via the DragnDrop mechanism. To do that, click on an initial or encrypted file with your mouse and drag it onto Secrets Keepers window or Secrets Keepers shortcut or Secrets Keepers icon. When the file is dropped, the encryption/decryption procedure will be activated.5.9 Encrypting /decrypting files via the context menu Secrets Keeper allows you to encrypt and decrypt files via the context menu. You can do that by right-clicking any file and choosing the appropriate option from the menu. If the file is encrypted, press Decrypt (by Secrets Keeper) to decrypt it; otherwise, press Encrypt (by Secrets Keeper) to encrypt it. The encryption decryption will be done using the program’s current settings (with, or without a key).5.10 Creating a Self-Extracting encrypted archive Follow these steps if you wish to create a self-extracting encrypted archive: 1. Launch the application (according to the instructions given in the Starting the application section). 2. If you wish to use a Key to access the archive, connect it to the computer. Note that if the Key is PIN-protected, or if a BIO-ID is assigned to it, the program will also guide you through the two- or three-factor authentication process once you reach step 7. 3. Press File Create a Self-Extracting encrypted archive or the ЕХЕ button located in the program’s main window. The Create a Self-Extracting encrypted archive window will appear on the screen.© Dekart
  34. 34. 31 Secrets Keeper 4. Enter the full path and name of the self-extracting archive you plan to create in the Archive Name field. 5. Enter the full path and full name of the file(s) you wish to be included in the encrypted archive in the Added files field. Note. The file names your entered should be enclosed in double quotation marks, and they must to be separated by spaces. Example: "C:DocumentsWorktable.dat" "D:Files and Settingsstorage.inf".An alternative way to add the files is to press the Add Files button and use the visual dialog. 6. Choose the file(s), and press Open. Selecting multiple files can be done by holding Ctrl and clicking on them. The chosen files will be automatically added to the Added files field. 7. Press Create. 8. If the program is configured not to use a Key when encrypting files, you will be asked to enter the encryption password. Then press ОК. © Dekart
  35. 35. Using Secrets Keeper 32 Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before attempting to launch it; although it can be changed to any other extension during transportation (ex: when the file is sent via email)5.11 Using a Self-Extracting encrypted archive To extract files from a self-extracting encrypted archive, follow these steps: 1. Start the EXE-file previously created by Secrets Keeper. 2. If a Key was used to create the archive, connect it to the computer and go through the two- or three-factor authentication process (depending on whether the Key is PIN-protected, or if a BIO-ID is assigned to it). If a Key was not used during the encryption process, the program will ask you to enter the decryption password. 3. The Self-extracting SecKeeper archive window will appear on the screen. Press Browse to choose the directory in which the files will be extracted.© Dekart
  36. 36. 33 Secrets Keeper 4. Press Extract. Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before attempting to launch it; although it can be changed to any other extension during transportation (ex: when the file is sent via email).5.12 Secrets Keeper and MS Office Once Secrets Keeper is installed, you will see a new set of buttons in the toolbars of MS Office applications, such as Word, Excel or PowerPoint. The buttons are “Save document as encrypted”, and “Decrypt and open document”; they allow you to use Secrets Keeper directly from MS Office. When pressing one of these buttons, you will be asked to indicate the file you wish to encrypt or decrypt. © Dekart
  37. 37. Using Secrets Keeper 34 Depending on the program’s configuration (if it uses a Key to encrypt files or only a password), you will be asked to connect the Key and perform the authentication process or enter your password. Afterwards the encryption/decryption operation will be executed.5.13 Wiping files Secrets Keeper can securely erase any file, by filling its contents with random data before deleting it. To securely erase a file, follow these steps: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press File Wipe file(s)… . 3. The Select file(s) to wipe dialog will appear on the screen. Type the name of the file(s) you wish to erase in the File name field. You can also use your mouse to select a file; selecting multiple files can be done by holding Ctrl and clicking on them© Dekart
  38. 38. 35 Secrets Keeper 4. Press Open to complete the operation.5.14 Getting information about Secrets Keeper To obtain product-related information, press Help About. The About Secrets Keeper window will appear on the screen. © Dekart
  39. 39. Using Secrets Keeper 36 If the program is not registered, the window will look like the one shown in the Registering Secrets Keeper section.5.15 Closing Secrets Keeper To quit Secrets Keeper, press File Exit or close the program’s main window.6 Additional information6.1 Biometric authentication in Secrets Keeper If three-factor authentication is used (i.e. Enable Biometric ID verification in the Change Biometric ID window is checked), Secrets Keeper will ask you to enter the PIN-code and perform the biometric authentication. Depending on the biometric device you have, you will be asked to perform a certain action (ex: pronounce a phrase, press your finger against the scanner, etc). If the obtained biometric data do not match the BIO-ID stored on the Key, the program will ask you to go through the biometric authentication process again. Therefore, a person that possesses the Key is unable to use it unless their biometric features are the correct ones.© Dekart
  40. 40. 37 Secrets Keeper6.2 Registering Secrets Keeper To register the application, enter your registration information in the fields of the About Secrets Keeper window. If the trial period has expired, and the program is still not registered, the registration form will be shown when the application starts. © Dekart
  41. 41. Additional information 38 After entering the registration information, Secrets Keeper will continue to work; otherwise you will not be able to use the program anymore. If you use a trial version of the program, please, use the Dekart Buy on-line page to purchase a registration number. After your transaction is processed, you will receive an email with the registration number. If you use a licensed version of the program, you can obtain a registration number at the Software Registration (Register) page at www.dekart.com.6.3 Troubleshooting Error messages Message Possible cause Possible solution© Dekart
  42. 42. 39 Secrets Keeper ATTENTION! Bad PIN An incorrect PIN was entered. Repeat the operation, code was entered! making sure that a valid PIN is provided. Attention! By entering an invalid PIN multiple times you can block the Key! A list of Keys and their maximum number of invalid PIN entries is provided in Specifications of common Keys (PIN, capacity). Key is blocked The Key is blocked. To unblock the Key press Key Unblock Key Attention! If an invalid PIN will be provided during the unblock procedure, the Key will be permanently blocked! KSD is not blocked yet The Key is not blocked yet There is no need to unblock the Key as it is not blocked. Confirm PIN does not The entered PIN doesn’t match Repeat the operation, match the original PIN the PIN provided in the making sure that the PIN in Confirm field. the Confirm field matches the original PIN. The PIN should be at The entered PIN is less than 4 Repeat the operation by least 4 symbols long characters long. entering a longer PIN. Error while processing An error occurred while Try to perform the operation the Key. processing the Key again. If the problem An error occurred while persists, contact Dekart’s writing the password to technical support team. the Key! Error while writing data An error occurred when Make sure there is enough to the KSD (Not enough attempting to write data to the free space on the Key. One free space on the KSD) Key, most likely there is not way to do that is to use enough free space. Dekart KeyManager. © Dekart
  43. 43. Additional information 40 An error occurred while An error occurred when Try to perform the operation creating the password! creating or changing the again. If the problem An error occurred while password. persists, contact Dekart’s changing the password! technical support team. The Key does not The connected Key does not Connect a Key which contain a password contain a password. contains a password and required for the repeat the operation, or encryption process! assign a password to the The Key does not Key by pressing Key contain a password Password… . required for the decryption process! An error occurred while An error occurred while Check whether there are any reading the source file! processing a file. applications which are An error occurred while accessing the file. It is also opening the destination possible that the file is file! corrupt. You are trying to The file you attempt to decrypt Secrets Keeper can only decrypt a file that is not is not a Secrets Keeper decrypt files it has a <.skf> file! encrypted file. previously encrypted. The password you The provided password is Enter a valid password. entered is incorrect for incorrect. the given file Biometric verification The computed BIO-ID does Go through the biometric failed! not match the one stored on the authentication procedure Key. again. Note. If any other error message occurs, contact Dekart’s technical support team: http://www.dekart.com/support/howto/howto-contact-us/ .6.4 Specifications of common Keys (PIN, capacity) Number of Maximum Hardware PIN / Number of PIN incorrect PIN amount of Key name Dekart software unblock input available PIN attempts attempts memory (kB) Aladdin Dekart software 3 3 16, 32, 64 eToken PRO PIN© Dekart
  44. 44. 41 Secrets Keeper Aladdin Hardware PIN ∞ - 16, 32, 64 eToken R2 Schlumberger Dekart software 3 3 4, 8 Multiflex PIN Schlumberger Dekart software 3 3 8, 16 Cryptoflex PIN Schlumberger Dekart software 3 3 4 Payflex PIN Rainbow Hardware PIN 3 3 8, 32 iKey 1000 Rainbow Hardware PIN 10 0 8, 32 iKey 2000 Rainbow Hardware PIN 10 0 8, 32 iKey 2032 Rainbow Dekart software 3 3 32 iKey 3000 PIN Eutron Dekart software CryptoIdentity 3 3 32 PIN ITSEC Eutron Dekart software CryptoIdentity 3 3 8 PIN 4 Eutron Dekart software CryptoIdentity 3 3 32, 64 PIN 5 Datakey Model Hardware PIN 10 0 8, 32 310 Datakey Model Hardware PIN 10 0 8, 32 330 Dekart software GemPlus GPK 3 3 2, 4, 8, 16 PIN ruToken Hardware PIN 3 12 8, 16, 128 Note 1. A KSD can have a separate PIN for Dekart applications, or single a PIN for Dekart applications and the device itself. © Dekart
  45. 45. Additional information 42 Note 2. Most of the KSDs have a limited number of invalid PIN entries. If this number is reached the KSD is blocked. If a valid PIN is provided during the unblocking procedure the Key can be used again, otherwise it will be permanently blocked.© Dekart
  46. 46. 43 Secrets Keeper Dekart’s technical support 38Index Drag and Drop 30 -E--A- Encrypting filesAbout the software 35 creating a self-exctracting archive 30Authentication in the toolbars of MS Office applications 33 biometric authentication 1, 36 in the toolbars of Word, Excel, PowerPoint 33 three-factor authentication 1, 36 using DragnDrop 30 two-factor authentication 1 using the Key 28 via the context menu 30 without using the Key 26-B- Error messages 38 Exit 36BIO ID 1, 2, 36 add 23 change 25biometric 2 -G-Biometric ID 36 Glossary 1-C- -I-Changing the parameters of a Key Installation 5 add / chande / delete BIO ID 17 Installing Secrets Keeper 5 add / chande / delete password 17 add / chande PIN 17 unblock Key 17 -K-Closing 36 Key 1Configuring the application 17 Key Storage Device 1Controlling the password Key 1 add 18 KSD 1 change 18 KSD 1 delete 18-D- -L- Launch application 16Decrypting files License 1 extract files from a self-extracting archive 32 in the toolbars of MS Office applications 33 in the toolbars of Word, Excel, Powerpoint 33 -M- using a self-extracting archive 32 using DragnDrop 30 Memory 40 using the Key 29 via the context menu 30 without using the Key 27 -P-Dekart contact information 1 Password © Dekart
  47. 47. Index 44 Password cryptographically strong 18 quality 18 -W- Personal Identification Number 1, 2 Wipe files 34 PIN 1, 2 PIN code 40 change 20 unblock 22-R- Registration 37 Requirerments hardware 3 software 3-S- Secrets Keeper essential advantages 2 functions 16 security principles 2 Secrets Keepers options <.skf> file extension 17 check for updates 17 compress the file before encrypting 17 use the Key to access encrypted files 17 Securely delete files 34 Securely erase files 34 Smart card 40 Supported devices biometric devices 3 key storage devices 3-T- Token 40-U- Unblock Key 22 Uninstalling Secrets Keeper 15 Update Secrets Keeper 12© Dekart

×