SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Downloaden Sie, um offline zu lesen
USER GUIDE

   DEKART
SECRETS KEEPER




     © Dekart
I       Secrets Keeper



Table of Contents

  Part I License and trademarks information                                                                                                                                            1

 Part II Glossary                                                                                                                                                                      1

 Part III Introducing Secrets Keeper                                                                                                                                                   2
       1 Secrets Keeper purpose and features
                     ................................................................................................................................... 2
       2 Secrets Keeper product's components
                     ................................................................................................................................... 3
       3 Secrets Keeper hardware and software requierments
                     ................................................................................................................................... 3
       4 Supported key storage and biometric devices
                     ................................................................................................................................... 3

 Part IV Installation of Secrets Keeper                                                                                                                                                5
       1 Installing of Secrets Keeper
                        ................................................................................................................................... 5
       2 Updating of Secrets Keeper
                     ................................................................................................................................... 12
       3 Uninstalling ................................................................................................................................... 15
                      of Secrets Keeper

 Part V Using Secrets Keeper                                                                                                                                                        16
       1 Starting the application
                      ................................................................................................................................... 16
       2 Configuring the application
                     ................................................................................................................................... 17
       3 Maintaining the Key
                     ................................................................................................................................... 17
                   Controlling the file encryption password stored on the Key
                                 ..........................................................................................................................................................
                                                                                                                                                                                         18
                   Changing the..........................................................................................................................................................
                                  PIN code                                                                                                                                               20
                   Unblocking the Key
                                 ..........................................................................................................................................................
                                                                                                                                                                                         22
                   Adding a BIO ..........................................................................................................................................................
                                  ID to the KSD                                                                                                                                          23
                   Changing the..........................................................................................................................................................
                                  BIO ID                                                                                                                                                 25
       4 Encrypting files without using the Key
                      ................................................................................................................................... 26
       5 Decrypting files without using the Key
                      ................................................................................................................................... 27
       6 Encrypting files using the Key
                      ................................................................................................................................... 28
       7 Decrypting files using the Key
                      ................................................................................................................................... 29
       8 Using Drag'n'Drop to encrypt/decrypt files
                     ................................................................................................................................... 30
       9 Encrypting /decrypting files via the context menu
                     ................................................................................................................................... 30
      10 Creating a Self-Extracting encrypted archive
                     ................................................................................................................................... 30
      11 Using a Self-Extracting encrypted archive
                      ................................................................................................................................... 32
      12 Secrets Keeper and MS Office
                    ................................................................................................................................... 33
      13 Wiping files ................................................................................................................................... 34
      14 Getting information about Secrets Keeper
                      ................................................................................................................................... 35
      15 Closing Secrets Keeper
                    ................................................................................................................................... 36

 Part VI Additional information                                                                                                                                                     36
                                                                                                                                                                              © Dekart
Contents                 II


           1 Biometric authentication in Secrets Keeper
                         ................................................................................................................................... 36
           2 Registering Secrets Keeper
                         ................................................................................................................................... 37
           3 Troubleshooting
                        ................................................................................................................................... 38
           4 Specifications of common Keys (PIN, capacity)
                          ................................................................................................................................... 40

              Index                                                                                                                                         43




© Dekart



                                                                                                                                                                   II
1      Secrets Keeper



1       License and trademarks information
        COPYRIGHT
        Copyright © Dekart SRL. All Rights Reserved. No part of this publication may be
        reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any
        language in any form or by any means without the written permission of Dekart SRL, or its
        suppliers or affiliate companies.

        DISCLAMER
        Dekart SRL makes no representations or warranties with respect to the contents or use of this
        manual, and specifically disclaims any express or implied warranties of merchantability or
        fitness for any particular purpose. Further, Dekart SRL reserved the right to revise this
        publication and to make changes to its content, at any time, without any obligation to notify
        any person or entity of such revisions or changes.

        Further, Dekart SRL makes no representations or warranties with respect to any Secrets
        Keeper software, and specifically disclaims any express or implied warranties of
        merchantability or fitness for any particular purpose. Further, Dekart SRL reserved the right to
        make changes to any and all parts of Secrets Keeper software, at any time, without any
        obligation to notify any person or entity of such revisions or changes.

        LICENSE AGREEMENT
        NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE SOFTWARE
        THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST, LICENSE.TXT, OR
        OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE
        OR AS PART OF THE SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO ALL OF THE TERMS
        SET FORTH THEREIN, DO NOT INSTALL THE SOFTWARE.

        DEKART SRL TRADEMARK ATTRIBUTIONS
        Secrets Keeper is a trademark of Dekart SRL
        All other registered and unregistered trademarks in this document are the sole property of
        their respective owners.

        DEKART SRL CONTACT INFORMATION

        E-mail:
             for sales details:         sales@dekart.com
             for product support:       support@dekart.com
             for comments and feedback: info@dekart.com
        WWW:                            www.dekart.com



2       Glossary
        Secrets Keeper (SK) – the name of the program.

        Key, KSD (Key Storage Device) – a removable device on which information needed to

                                                                                                 © Dekart
Glossary      2



           decrypt and access your encrypted data is stored. A KSD can be a smart card, a USB token, a
           USB flash drive, a memory card, etc.. The KSD can be secured with a PIN code, but it can
           work without a PIN too.

           PIN (Personal Identification Number) – a number which must be provided in order to
           access the contents of the KSD. The PIN can be 1 to 8 characters long and must be kept
           secret.

           BIO ID – a biometric ID that holds information about the unique features of your body (ex:
           fingerprint or iris). The size of the BIO ID is variable, in average it takes from 600 bytes (a
           fingerprint) to 30 Kbytes (voice recording).

           Biometric authentication - authentication based on the verification of specific physical
           characteristics of the user (ex: fingerprints, iris, voice) by means of special biometric
           equipment.

           Two-factor authentication – a process controlling the authenticity of the user's identity on
           the basis of the following factors: "Something You Have – for example, the KSD device" and
           "Something You Know — for example, the user name and password, or the PIN-code".

           Three-factor authentication – a process controlling the authenticity of the user's identity on
           the basis of the following three factors: "Something You Have – for example, the KSD",
           "Something You Know — for example, the PIN code", "Something You are – for example,
           your BIO ID".



3          Introducing Secrets Keeper
3.1        Secrets Keeper purpose and features
           Secrets Keeper is a software solution that protects your files from unauthorized access by
           applying encryption and three-factor authentication. Two of Secrets Keeper's key-advantages
           are its ease of use and strong cryptographic mechanisms.

           Secrets Keeper’s security principles
           1. Secrets Keeper’s security relies on the use of a PIN-protected Key, which contains your
              BIO-ID and the information necessary to access your files. Therefore, you do not have to
              memorize a complex password; while three-factor authentication minimizes the risk of
              unauthorized access in case the Key is lost or stolen.
           2. If the PIN is entered incorrectly a certain number of times, the Key is blocked. Note: this
              number depends on the type of the Key, usually it is between 3 and 10 attempts (see
              Appendix for more info).

           Secrets Keeper’s essential advantages


© Dekart
3     Secrets Keeper



          1. Ease of use – no need to memorize and enter the password each time you need to access
             your files. In addition, the program has a built-in wiping feature, which allows you to
             securely erase a file from a disk, thus making its recovery impossible.
          2. Mobility – self-extracting archives can be created and easily transferred to any computer,
             making data exchange via email or removable drives much more secure.
          3. Integration – the “Encrypt file” and “Decrypt file” buttons are automatically added to the
             MS Office application toolbar (in Word, Excel and PowerPoint).
          4. Multiple Functionality – the Key can be used with SK, as well as with other applications,
             such as Dekart Logon or Dekart Private Disk Multifactor.



3.2       Secrets Keeper product's components
          The product consists of software modules and a Key which ‘opens’ the encrypted files. This
          guide is included too.



3.3       Secrets Keeper hardware and software requierments
          Hardware requirements
           PC with at least one available port (COM, USB, etc. ) for the Key.
           If a smart card is used as a Key, a PC/SC-compliant smart card reader is required.
           If three-factor authentication is used, a biometric device, such as BioLink U-Match Mouse
             is needed.

          Software requirements
           Windows 95, 98, NT4.0, 2000, ME, XP.
           Driver for the Key.
           Driver for the biometric device.



3.4       Supported key storage and biometric devices
          Secrets Keeper supports the following devices:

          Key Storage Devices:
          · ACOS1 card;
          · ActivCard ActivKey USB token series;
          · Aladdin eToken R2 USB token series;
          · Aladdin eToken PRO USB token series;
          · Algorithmic Research MiniKey USB token series;
          · Algorithmic Research PrivateCard smart card series;

                                                                                                 © Dekart
Introducing Secrets Keeper      4



           ·   Datakey Model 310 smart card series;
           ·   Datakey Model 330 smart card series;
           ·   Eutron CryptoIdentity ITSEC USB token series;
           ·   Eutron CryptoIdentity 4 USB token series;
           ·   Eutron CryptoIdentity 5 USB token series;
           ·   GemPlus GPK smart card series;
           ·   GemPlus MPCOS EMV smart card series;
           ·   Giesecke & Devrient STARCOS S smart card series;
           ·   Giesecke & Devrient STARCOS SPK smart card series;
           ·   Rainbow iKey 1000 USB token series;
           ·   Rainbow iKey 2000 USB token series;
           ·   Rainbow iKey 3000 USB token series;
           ·   Schlumberger Cryptoflex smart card series;
           ·   Schlumberger Multiflex smart card series;
           ·   Schlumberger Payflex smart card series;
           ·   Siemens CardOS M 4 smart card series
           ·   ruToken USB token series;
           ·   USB flash drives, CD disks, etc.;
           ·   Any memory storage device detected as a removable disk.

           Smart card readers:
           Secrets Keeper uses virtually all PC/CS compatible smart card readers, for example:
           · Datakey DKR smart card reader series
           · GemPlus GemPC smart card reader series
           · OmniKey CardMan smart card reader series
           · Schlumberger Reflex smart card reader series
           · Towitoko CHIPDRIVE smart card reader series

           Biometric verification devices:
           Dekart Software uses most types of BioAPI and HA API compatible biometric verification
           devices, for example:
           · Precise Biometrics Precise 100 fingerprint and smart card reader series
           · SCM SCR222 fingerprint reader
           · BioLink U-Match MatchBook
           · BioLink U-Match Mouse

           A       complete     list    of      supported        devices       is     available        at:
           http://www.dekart.com/products/supported_devices/

           Note 1. Before you purchase a USB token or a smart card, please make sure that it has
           enough memory to store the required user information. Please, take into account that a
           part of the KSD's memory may be allocated to other data, e.g. BIO ID. You can find the
           free space available on the card or token, as well as delete or backup data using Dekart Key
           Manager;                  for                more                  details,              see:
           http://www.dekart.com/products/card_management/key_manager/



© Dekart
5     Secrets Keeper



          Note 2. The KSDs shipped by Dekart are not PIN-protected, you will be prompted to set a
          PIN when you launch the application for the first time.



4         Installation of Secrets Keeper
           Installing;
           Updating;
           Uninstalling.

4.1       Installing of Secrets Keeper
          1. Make sure that all your applications are closed before you attempt to install Secrets
             Keeper.
          2. If three-factor authentication will be used, the drivers of the biometric device must be
             installed. Note: if biometry-enabled applications were not previously used on your
             computer, you have to install the BioAPI Framework, available at www.bioapi.org, the
             Implementation section).
          3. To start the installation process, launch SecKeeper.exe.
          4. Read the information on the welcome screen, and then press Next.




                                                                                               © Dekart
Installation of Secrets Keeper   6




           5. You have to agree with the terms of the license agreement in order to continue the
              installation process.




© Dekart
7     Secrets Keeper




    6. In the next step, provide information about yourself and type in the registration number of
       the product.




                                                                                           © Dekart
Installation of Secrets Keeper   8




           7. Then indicate the folder in which Secrets Keeper will be installed.




© Dekart
9     Secrets Keeper




    8. Indicate the folder of the Start Menu in which Secrets Keeper’s shortcuts will be added.




                                                                                          © Dekart
Installation of Secrets Keeper   10




           9. Check the additional options as necessary (place a shortcut on the Desktop, display the
              ReadMe file, automatically launch the application) and press Next.




© Dekart
11     Secrets Keeper




     10. Press Finish to finalize the installation process.




                                                              © Dekart
Installation of Secrets Keeper     12




           After that the program will copy its files to your system and complete the installation process.



4.2        Updating of Secrets Keeper
           1. If the installation program is launched again, it will automatically detect the currently
              installed version of Secrets Keeper and collect all the data necessary to perform the
              update.




© Dekart
13     Secrets Keeper




     2. To continue the process press Next. This will display the license agreement which you
        need to accept in order to proceed.
     3. When all the necessary information is collected, press Next.




                                                                                       © Dekart
Installation of Secrets Keeper   14




           4. Press Finish to complete the process.




© Dekart
15      Secrets Keeper




       Afterwards, the program will update the existing files, or add the new ones if necessary.

       Note. You need to restart your computer after updating Secrets Keeper.



4.3    Uninstalling of Secrets Keeper
       Follow these steps if you wish to uninstall the product:
       1. Go to Start Menu  Programs, select the folder you chose at step 8 when installing the
           program (see Installing Secrets Keeper), then choose Uninstall. An alternative way is to
           go to Control Panel  Add or Remove Programs, choose Secrets Keeper and press
           Uninstall). The following window will appear on the screen:




                                                                                                   © Dekart
Installation of Secrets Keeper   16




           2. To confirm your decision, press Yes..
           3. After successful completion of the de-installation process, you will see the following
              message:




5          Using Secrets Keeper
           Below is a list of Secrets Keeper’s functions:
            Secrets Keeper configuration.
            Key maintenance.
            Encrypting / decrypting files without the Key.
            Encrypting / decrypting files with the Key.
            Encrypting / decrypting files from within MS Office applications.
            Using Drag'n'Drop to encrypt / decrypt files.
            Encrypting / decrypting files via the context menu.
            Creating a Self-Extracting encrypted archive.
            Wiping files .

           Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask
           you to perform two- or three-factor authentication prior to performing any operation
           which requires the Key (encrypt / decrypt with the Key, change Key options, etc.)


5.1        Starting the application
           The program can be started in one of the following ways:
              · Go to Start Menu  Programs, select the folder you chose at step 8 when installing
                  the program (see Installing Secrets Keeper), then run the program.
              · In Windows Explorer, open the folder indicated at step 7 of the installation process
                  (see Installing Secrets Keeper), then run the program.
           The application’s window will appear on the screen.



© Dekart
17      Secrets Keeper




5.2    Configuring the application
       We recommend you to configure the application after you start it for the first time, you can do
       that by pressing Options… . The following window will appear on the screen:.




       Below are Secrets Keeper’s options (check to enable, un-check to disable):
       1. Associate the <.skf> extension with Secrets Keeper.
       2. Automatically decrypt a <.skf> file when it is double-clicked then run the application
          associated with the decrypted file.
       3. Use the Key to access encrypted files.
       4. Automatically check if a newer version is available.
       5. Compress the file before encrypting it.
       6. Delete files after encryption. Note: We advise you to enable this option, to avoid
          accidental data leaks. .



5.3    Maintaining the Key
       To use the Key when encrypting files, enable Use Key in the Options… menu. From this
       moment on, the program’s main window will look like this:



                                                                                               © Dekart
Using Secrets Keeper     18




           If you wish to change some of the Key’s parameters, connect the Key and press Key.




           The following options are available:
            Add or change password.
            Remove password.
            Add or change PIN.
            Unblock Key.
            Add or change BIO-ID.

           Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask
           you to perform two- or three-factor authentication prior to performing any operation
           which requires the Key (encrypt / decrypt with the Key, change Key options, etc.)



5.3.1      Controlling the file encryption password stored on the Key
           Enabling Use Key allows you to add, change or remove the Key’s encryption password.

           Changing the password.
           To add a password or change an existing one, press Key  Password, and enter the new
           password in the appearing window. The password’s strength (i.e. cryptographic complexity) is
           automatically shown in the Password quality field.
           Note. The password can be 1 to 64 characters long, it may contain letters, digits, and
           special characters.




© Dekart
19     Secrets Keeper




     To create a cryptographically strong password, use the Create password function. In this case
     a random set of characters will be generated and used as a password.




     To store the new password on the Key, press Store password. Note that after creating a new
     password, you will be unable to decrypt the documents that were encrypted with the old
     password. The program will notify you about the consequences of changing a password and
     ask you to confirm your decision.




                                                                                            © Dekart
Using Secrets Keeper        20




           To complete the operation, press Yes.

           Deleting the password
           To delete the password from the Key, press Key  Delete password. Note that after deleting
           the password, you will be unable to decrypt the documents that were encrypted with it. The
           program will notify you about the consequences of deleting a password and ask you to
           confirm your decision.




           To complete the operation, press Yes.



5.3.2      Changing the PIN code
           To add a PIN to your Key or change an existing one, perform the following operations:
           1. Start the application (follow the steps given in the Starting the application section).
           2. Press Key  Change PIN. The Change PIN window will appear on the screen.




© Dekart
21     Secrets Keeper




     3. Enter your new PIN in the PIN field, and then enter it again in the Confirm field. To
        finish, press OK.

     Note. The PIN can be 1 to 8 characters long.

     4. If you do not wish to use a PIN code, uncheck Enable PIN and press OK. Note: we do not
        advise you to leave the PIN empty, especially if you use a USB flash disk as a Key. In
        this case, others will be able to make copies and use the Key without your consent.




                                                                                        © Dekart
Using Secrets Keeper      22



           The following window appears on the screen if the operation is successfully complete.




5.3.3      Unblocking the Key
           If the PIN was incorrectly entered more than once, the Key will be blocked. To unblock the
           Key, press Key  Unblock Key… . The Unblocking the Key window will appear on the screen:




           Enter your PIN in the Enter PIN field and press OK.


                     If the entered PIN is incorrect, the Key will be permanently blocked.
                                   (Does not apply to flash-memory based keys)


           The following window will appear on the screen if the operation is successful:




           Note. The Appendix provides a list of Keys and their maximum number of PIN-entering

© Dekart
23     Secrets Keeper



        attempts.



5.3.4   Adding a BIO ID to the KSD
        If you wish to switch from two-factor authentication to three-factor authentication, a
        biometric ID has to be assigned to the Key.
        Note. When choosing a biometric device, consider your intrinsic physical traits (ex: certain
        fingerprint scanners will not work if the skin is too dry). Keep in mind that the
        environment has a major impact on voice-recognition; therefore the position of your
        computer is important.
        To add a BIO ID, follow these steps.
        1. Press Key  Change BIO ID in the program’s main menu. A list of available biometric
            devices will appear on the screen.




        2. Check the Enable Biometric ID verification checkbox and choose the preferred device
           from the list.
        3. If a fingerprint scanner is chosen, ex: Bio-Link U-Match, you will be asked to press your
           finger against the scanner several times. When the necessary information is gathered, it
           will be saved to the Key.




                                                                                              © Dekart
Using Secrets Keeper     24




           If you choose a voice recognition device, such as SAFLINK Scan-Soft Voice Verification,
           you will be asked to pronounce a key-phrase. As in the previous case, the BIO ID is stored on
           the KSD once it is collected.




© Dekart
25      Secrets Keeper




5.3.5   Changing the BIO ID
        To change the biometric ID, follow these steps.
        1. Launch the application (according to the instructions given in the Starting the application
           section).
        2. Press Key  Change BIO ID. The Change Biometric ID window will appear on the screen
           (see. Adding a BIO ID).
        3. Choose the currently active biometric device from the list.
        4. As in the case of adding a BIO ID, depending on the biometric device you choose, you
           will be asked to perform a certain action (ex: pronounce a phrase, press your finger against
           the scanner, etc). When the process is done, the BIO ID is saved on the Key.

        Note. If you wish to disable biometric authentication, uncheck "Enable Biometric ID
        verification" in the Change Biometric ID window.




                                                                                                © Dekart
Using Secrets Keeper      26



5.4        Encrypting files without using the Key
           If you wish to encrypt files without a Key, follow the steps below:
           1. Launch the application (according to the instructions given in the Starting the application
               section).
           2. Press File  Encrypt file(s)… .




           3. The Select file(s) to encrypt dialog will appear on the screen. Type the name of the file(s)
              you wish to encrypt in the File name field. You can also use your mouse to select a file.
              Selecting multiple files can be done by holding Ctrl and clicking on them




           1. Enter your password in the Password field, and then confirm it by typing it again in the
              Confirm field. Note. The password can be 1 to 64 characters long.


© Dekart
27      Secrets Keeper



       2. Press Open to complete the operation.
       Once the operation is successfully complete, the original files will be replaced with their
       encrypted versions, which have the <.skf> extension.

       Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after
       encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left
       intact.



5.5    Decrypting files without using the Key
       If you wish to decrypt files without a key, follow the steps below:
       1. Launch the application (according to the instructions given in the Starting the application
           section).
       2. Press File  Decrypt file(s)… . The Select file(s) to decrypt dialog will appear on the
           screen.




       3. Enter the name(s) of the file(s) you wish to decrypt in the File name field.
       4. Enter the decryption password in the Password field.
       5. Press Open to continue the operation.
       Once the operation is successfully complete, the decrypted files will appear in the same
       folder.


                                                                                               © Dekart
Using Secrets Keeper      28




5.6        Encrypting files using the Key
           Follow these steps in order to encrypt a file:
           1. Launch the application (according to the instructions given in the Starting the application
               section).
           2. Connect the Key to the computer.
           3. If an encryption password is not yet stored on the Key, one should be added (see.
               Controlling the file encryption password stored on the Key).
           4. Press File  Encrypt file(s)… .
           5. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program
               will ask you to go through the two- or three-factor authentication procedure.
           6. The Select file(s) to encrypt dialog will appear once authentication is successfully
               complete.




           7. Type the name of the file(s) you wish to encrypt in the File name field. Selecting multiple
              files can be done by holding Ctrl and clicking on them
           8. Press Open to continue the operation.
           Once the operation is successfully complete, the original files will be replaced with their
           encrypted versions, which have the <.skf> extension.



© Dekart
29      Secrets Keeper



       Note. If an encryption password is not stored on the Key, the program will notify you about
       that and automatically switch to the Encrypting files without using the Key mode.

       Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after
       encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left
       intact.



5.7    Decrypting files using the Key
       To decrypt files using the Key, follow these steps.
       1. Launch the application (according to the instructions given in the Starting the application
          section).
       2. Connect the Key to the computer.
       3. Press File  Decrypt file(s)… .
       4. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program
          will ask you to go through the two- or three-factor authentication procedure.
       5. The Select file(s) to decrypt dialog will appear once authentication is successfully
          complete.




       6. Type the name of the file(s) you wish to decrypt in the File name field. Selecting multiple
          files can be done by holding Ctrl and clicking on them.
       7. Press Open to continue the operation.

                                                                                               © Dekart
Using Secrets Keeper      30



           Once the operation is successfully complete, the decrypted files will appear in the same
           folder.

           Note. If an encryption password is not stored on the Key, the program will notify you about
           that and automatically switch to the Decrypting files without using the Key mode.



5.8        Using Drag'n'Drop to encrypt/decrypt files
           You can encrypt or decrypt a file via the Drag'n'Drop mechanism. To do that, click on an
           initial or encrypted file with your mouse and drag it onto Secrets Keeper's window or Secrets
           Keeper's shortcut or Secrets Keeper's icon. When the file is dropped, the
           encryption/decryption procedure will be activated.

5.9        Encrypting /decrypting files via the context menu
           Secrets Keeper allows you to encrypt and decrypt files via the context menu. You can do that
           by right-clicking any file and choosing the appropriate option from the menu. If the file is
           encrypted, press Decrypt (by Secrets Keeper) to decrypt it; otherwise, press Encrypt (by
           Secrets Keeper) to encrypt it. The encryption  decryption will be done using the program’s
           current settings (with, or without a key).



5.10       Creating a Self-Extracting encrypted archive
           Follow these steps if you wish to create a self-extracting encrypted archive:
           1. Launch the application (according to the instructions given in the Starting the application
               section).
           2. If you wish to use a Key to access the archive, connect it to the computer. Note that if the
               Key is PIN-protected, or if a BIO-ID is assigned to it, the program will also guide you
               through the two- or three-factor authentication process once you reach step 7.
           3. Press File  Create a Self-Extracting encrypted archive or the ЕХЕ button located in the
               program’s main window. The Create a Self-Extracting encrypted archive window will
               appear on the screen.




© Dekart
31     Secrets Keeper




     4. Enter the full path and name of the self-extracting archive you plan to create in the
        Archive Name field.
     5. Enter the full path and full name of the file(s) you wish to be included in the encrypted
        archive in the Added files field. Note. The file names your entered should be enclosed in
        double quotation marks, and they must to be separated by spaces. Example:
        "C:DocumentsWorktable.dat" "D:Files and Settingsstorage.inf".An alternative way
        to add the files is to press the Add Files button and use the visual dialog.




     6. Choose the file(s), and press Open. Selecting multiple files can be done by holding Ctrl
        and clicking on them. The chosen files will be automatically added to the Added files
        field.
     7. Press Create.
     8. If the program is configured not to use a Key when encrypting files, you will be asked to
        enter the encryption password. Then press ОК.




                                                                                           © Dekart
Using Secrets Keeper      32




           Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before
           attempting to launch it; although it can be changed to any other extension during
           transportation (ex: when the file is sent via email)



5.11       Using a Self-Extracting encrypted archive
           To extract files from a self-extracting encrypted archive, follow these steps:
           1. Start the EXE-file previously created by Secrets Keeper.
           2. If a Key was used to create the archive, connect it to the computer and go through the two-
              or three-factor authentication process (depending on whether the Key is PIN-protected, or
              if a BIO-ID is assigned to it). If a Key was not used during the encryption process, the
              program will ask you to enter the decryption password.
           3. The Self-extracting SecKeeper archive window will appear on the screen. Press Browse
               to choose the directory in which the files will be extracted.




© Dekart
33     Secrets Keeper



       4. Press Extract.

       Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before
       attempting to launch it; although it can be changed to any other extension during
       transportation (ex: when the file is sent via email).



5.12   Secrets Keeper and MS Office
       Once Secrets Keeper is installed, you will see a new set of buttons in the toolbars of MS
       Office applications, such as Word, Excel or PowerPoint. The buttons are “Save document as
       encrypted”, and “Decrypt and open document”; they allow you to use Secrets Keeper directly
       from MS Office.




       When pressing one of these buttons, you will be asked to indicate the file you wish to encrypt
       or decrypt.




                                                                                              © Dekart
Using Secrets Keeper      34




           Depending on the program’s configuration (if it uses a Key to encrypt files or only a
           password), you will be asked to connect the Key and perform the authentication process or
           enter your password. Afterwards the encryption/decryption operation will be executed.




5.13       Wiping files
           Secrets Keeper can securely erase any file, by filling its contents with random data before
           deleting it.
           To securely erase a file, follow these steps:
           1. Launch the application (according to the instructions given in the Starting the application
               section).
           2. Press File  Wipe file(s)… .
           3. The Select file(s) to wipe dialog will appear on the screen. Type the name of the file(s)
               you wish to erase in the File name field. You can also use your mouse to select a file;
               selecting multiple files can be done by holding Ctrl and clicking on them




© Dekart
35     Secrets Keeper




       4. Press Open to complete the operation.




5.14   Getting information about Secrets Keeper
       To obtain product-related information, press Help  About.




       The About Secrets Keeper window will appear on the screen.




                                                                    © Dekart
Using Secrets Keeper      36




           If the program is not registered, the window will look like the one shown in the Registering
           Secrets Keeper section.



5.15       Closing Secrets Keeper
           To quit Secrets Keeper, press File  Exit or close the program’s main window.

6          Additional information
6.1        Biometric authentication in Secrets Keeper
           If three-factor authentication is used (i.e. Enable Biometric ID verification in the Change
           Biometric ID window is checked), Secrets Keeper will ask you to enter the PIN-code and
           perform the biometric authentication. Depending on the biometric device you have, you will
           be asked to perform a certain action (ex: pronounce a phrase, press your finger against the
           scanner, etc). If the obtained biometric data do not match the BIO-ID stored on the Key, the
           program will ask you to go through the biometric authentication process again.
           Therefore, a person that possesses the Key is unable to use it unless their biometric features
           are the correct ones.



© Dekart
37      Secrets Keeper



6.2    Registering Secrets Keeper
       To register the application, enter your registration information in the fields of the About
       Secrets Keeper window.




       If the trial period has expired, and the program is still not registered, the registration form will
       be shown when the application starts.




                                                                                                    © Dekart
Additional information     38




           After entering the registration information, Secrets Keeper will continue to work; otherwise
           you will not be able to use the program anymore.

           If you use a trial version of the program, please, use the Dekart Buy on-line page to purchase a
           registration number. After your transaction is processed, you will receive an email with the
           registration number. If you use a licensed version of the program, you can obtain a registration
           number at the Software Registration (Register) page at www.dekart.com.



6.3        Troubleshooting
           Error messages

                   Message                    Possible cause                 Possible solution




© Dekart
39     Secrets Keeper



     ATTENTION! Bad PIN An incorrect PIN was entered.         Repeat     the    operation,
     code was entered!                                        making sure that a valid PIN
                                                              is provided.
                                                              Attention! By entering an
                                                              invalid PIN multiple times
                                                              you can block the Key!
                                                              A list of Keys and their
                                                              maximum        number      of
                                                              invalid PIN entries is
                                                              provided in Specifications
                                                              of common Keys (PIN,
                                                              capacity).
     Key is blocked           The Key is blocked.             To unblock the Key press
                                                              Key  Unblock Key
                                                              Attention! If an invalid
                                                              PIN will be provided
                                                              during     the    unblock
                                                              procedure, the Key will be
                                                              permanently blocked!
     KSD is not blocked yet   The Key is not blocked yet      There is no need to unblock
                                                              the Key as it is not blocked.
     Confirm PIN does not The entered PIN doesn’t match Repeat      the   operation,
     match the original PIN the PIN provided in the making sure that the PIN in
                            Confirm field.              the Confirm field matches
                                                        the original PIN.
     The PIN should be at The entered PIN is less than 4 Repeat the operation by
     least 4 symbols long characters long.               entering a longer PIN.
     Error while processing An error occurred          while Try to perform the operation
     the Key.                processing the Key              again. If the problem
     An error occurred while                                 persists, contact Dekart’s
     writing the password to                                 technical support team.
     the Key!
     Error while writing data An error occurred when          Make sure there is enough
     to the KSD (Not enough attempting to write data to the   free space on the Key. One
     free space on the KSD) Key, most likely there is not     way to do that is to use
                              enough free space.              Dekart KeyManager.




                                                                                          © Dekart
Additional information        40



           An error occurred while An error occurred when         Try to perform the operation
           creating the password! creating or changing the        again. If the problem
           An error occurred while password.                      persists, contact Dekart’s
           changing the password!                                 technical support team.

           The Key does not The connected Key does not Connect a Key which
           contain a password contain a password.      contains a password and
           required     for    the                     repeat the operation, or
           encryption process!                         assign a password to the
           The Key does not                            Key by pressing Key 
           contain a password                          Password… .
           required     for    the
           decryption process!
           An error occurred while An error occurred       while Check whether there are any
           reading the source file! processing a file.           applications    which      are
           An error occurred while                               accessing the file. It is also
           opening the destination                               possible that the file is
           file!                                                 corrupt.

           You are trying to The file you attempt to decrypt Secrets Keeper can only
           decrypt a file that is not is not a Secrets Keeper decrypt    files   it has
           a <.skf> file!             encrypted file.         previously encrypted.
           The     password    you The provided     password   is Enter a valid password.
           entered is incorrect for incorrect.
           the given file
           Biometric    verification The computed BIO-ID does Go through the biometric
           failed!                   not match the one stored on the authentication procedure
                                     Key.                            again.

           Note. If any other error message occurs, contact Dekart’s technical support team:
           http://www.dekart.com/support/howto/howto-contact-us/ .



6.4        Specifications of common Keys (PIN, capacity)
                                              Number of                          Maximum
                            Hardware PIN /                Number of PIN
                                            incorrect PIN                        amount of
             Key name       Dekart software                 unblock
                                                input                             available
                                 PIN                        attempts
                                               attempts                         memory (kB)
           Aladdin          Dekart software
                                                    3               3             16, 32, 64
           eToken PRO            PIN

© Dekart
41     Secrets Keeper



     Aladdin
                        Hardware PIN          ∞                 -           16, 32, 64
     eToken R2
     Schlumberger       Dekart software
                                               3               3               4, 8
     Multiflex               PIN
     Schlumberger       Dekart software
                                               3               3               8, 16
     Cryptoflex              PIN
     Schlumberger       Dekart software
                                               3               3                 4
     Payflex                 PIN
     Rainbow
                        Hardware PIN           3               3               8, 32
     iKey 1000
     Rainbow
                        Hardware PIN          10               0               8, 32
     iKey 2000
     Rainbow
                        Hardware PIN          10               0               8, 32
     iKey 2032
     Rainbow            Dekart software
                                               3               3                32
     iKey 3000               PIN
     Eutron
                        Dekart software
     CryptoIdentity                            3               3                32
                             PIN
     ITSEC
     Eutron
                        Dekart software
     CryptoIdentity                            3               3                 8
                             PIN
     4
     Eutron
                        Dekart software
     CryptoIdentity                            3               3              32, 64
                             PIN
     5
     Datakey Model
                        Hardware PIN          10               0               8, 32
     310
     Datakey Model
                        Hardware PIN          10               0               8, 32
     330
                        Dekart software
     GemPlus GPK                               3               3            2, 4, 8, 16
                             PIN
     ruToken            Hardware PIN           3               12           8, 16, 128

     Note 1. A KSD can have a separate PIN for Dekart applications, or single a PIN for Dekart
     applications and the device itself.


                                                                                          © Dekart
Additional information   42



           Note 2. Most of the KSDs have a limited number of invalid PIN entries. If this number is
           reached the KSD is blocked. If a valid PIN is provided during the unblocking procedure the
           Key can be used again, otherwise it will be permanently blocked.




© Dekart
43      Secrets Keeper


                                                     Dekart’s technical support   38

Index                                                Drag and Drop 30


                                                     -E-
-A-                                                  Encrypting files
About the software 35                                    creating a self-exctracting archive 30
Authentication                                           in the toolbars of MS Office applications 33
   biometric authentication 1, 36                        in the toolbars of Word, Excel, PowerPoint 33
   three-factor authentication 1, 36                     using Drag'n'Drop 30
   two-factor authentication 1                           using the Key 28
                                                         via the context menu 30
                                                         without using the Key 26
-B-                                                  Error messages 38
                                                     Exit 36
BIO ID 1, 2, 36
   add 23
   change 25
biometric 2
                                                     -G-
Biometric ID 36                                      Glossary   1


-C-                                                  -I-
Changing the parameters of a Key                     Installation 5
   add / chande / delete BIO ID 17                   Installing Secrets Keeper    5
   add / chande / delete password 17
   add / chande PIN 17
   unblock Key 17                                    -K-
Closing 36                                           Key 1
Configuring the application 17                       Key Storage Device    1
Controlling the password                                Key 1
   add 18                                               KSD 1
   change 18                                         KSD 1
   delete 18


-D-                                                  -L-
                                                     Launch application   16
Decrypting files                                     License 1
   extract files from a self-extracting archive 32
   in the toolbars of MS Office applications 33
   in the toolbars of Word, Excel, Powerpoint 33     -M-
   using a self-extracting archive 32
   using Drag'n'Drop 30                              Memory     40
   using the Key 29
   via the context menu 30
   without using the Key 27
                                                     -P-
Dekart contact information 1                         Password

                                                                                                  © Dekart
Index   44


 Password
    cryptographically strong 18
    quality 18                                 -W-
 Personal Identification Number 1, 2
                                               Wipe files   34
 PIN 1, 2
 PIN code 40
    change 20
    unblock 22


-R-
 Registration 37
 Requirerments
    hardware 3
    software 3


-S-
 Secrets Keeper
    essential advantages 2
    functions 16
    security principles 2
 Secrets Keeper's options
    <.skf> file extension 17
    check for updates 17
    compress the file before encrypting 17
    use the Key to access encrypted files 17
 Securely delete files 34
 Securely erase files 34
 Smart card 40
 Supported devices
    biometric devices 3
    key storage devices 3


-T-
 Token     40


-U-
 Unblock Key 22
 Uninstalling Secrets Keeper 15
 Update Secrets Keeper 12




© Dekart
Sec keeper en

Weitere ähnliche Inhalte

Was ist angesagt?

Plesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXPlesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXwebhostingguy
 
Palo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guidePalo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guideSornchai Saen
 
Datavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard driveDatavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard driveAV ProfShop
 
DTE_Q12008_Supp_v2
DTE_Q12008_Supp_v2DTE_Q12008_Supp_v2
DTE_Q12008_Supp_v2finance41
 
Omniture suite 14_user_manual
Omniture suite 14_user_manualOmniture suite 14_user_manual
Omniture suite 14_user_manualMariana Grigorian
 
Outlook 2007 Tips and Tricks
Outlook 2007 Tips and TricksOutlook 2007 Tips and Tricks
Outlook 2007 Tips and Tricksoutlookbill
 
GMAC Mortgage Underwriting Guidelines 9-11-2006
GMAC Mortgage Underwriting Guidelines 9-11-2006GMAC Mortgage Underwriting Guidelines 9-11-2006
GMAC Mortgage Underwriting Guidelines 9-11-2006Bitsytask
 
Descriptors AC-3_dvb-si_specification
Descriptors AC-3_dvb-si_specificationDescriptors AC-3_dvb-si_specification
Descriptors AC-3_dvb-si_specificationArun Jaglan
 
Final Design Document 1
Final Design Document 1Final Design Document 1
Final Design Document 1jmo46
 
Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Banking at Ho Chi Minh city
 
Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Banking at Ho Chi Minh city
 
Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Banking at Ho Chi Minh city
 
Java how to_program__7th_edition
Java how to_program__7th_editionJava how to_program__7th_edition
Java how to_program__7th_editionABDUmomo
 

Was ist angesagt? (19)

Plesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXPlesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIX
 
Palo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guidePalo alto-3.1 administrators-guide
Palo alto-3.1 administrators-guide
 
Datavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard driveDatavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard drive
 
DTE_Q12008_Supp_v2
DTE_Q12008_Supp_v2DTE_Q12008_Supp_v2
DTE_Q12008_Supp_v2
 
Mirsal 2 manual BOE
Mirsal 2 manual BOEMirsal 2 manual BOE
Mirsal 2 manual BOE
 
Omniture suite 14_user_manual
Omniture suite 14_user_manualOmniture suite 14_user_manual
Omniture suite 14_user_manual
 
Outlook 2007 Tips and Tricks
Outlook 2007 Tips and TricksOutlook 2007 Tips and Tricks
Outlook 2007 Tips and Tricks
 
GMAC Mortgage Underwriting Guidelines 9-11-2006
GMAC Mortgage Underwriting Guidelines 9-11-2006GMAC Mortgage Underwriting Guidelines 9-11-2006
GMAC Mortgage Underwriting Guidelines 9-11-2006
 
Test
TestTest
Test
 
Descriptors AC-3_dvb-si_specification
Descriptors AC-3_dvb-si_specificationDescriptors AC-3_dvb-si_specification
Descriptors AC-3_dvb-si_specification
 
Final Design Document 1
Final Design Document 1Final Design Document 1
Final Design Document 1
 
C01631241
C01631241C01631241
C01631241
 
A practical guide to tivoli sa nergy sg246146
A practical guide to tivoli sa nergy sg246146A practical guide to tivoli sa nergy sg246146
A practical guide to tivoli sa nergy sg246146
 
Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100Implementing tivoli data warehouse v 1.2 sg247100
Implementing tivoli data warehouse v 1.2 sg247100
 
UsersGuide
UsersGuideUsersGuide
UsersGuide
 
Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116Tivoli data warehouse 1.2 and business objects redp9116
Tivoli data warehouse 1.2 and business objects redp9116
 
Asterisk admin-guide-1.8
Asterisk admin-guide-1.8Asterisk admin-guide-1.8
Asterisk admin-guide-1.8
 
Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888
 
Java how to_program__7th_edition
Java how to_program__7th_editionJava how to_program__7th_edition
Java how to_program__7th_edition
 

Andere mochten auch

Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...Stefano Fantin
 
Ryan_Holt_MS_Thesis_Project
Ryan_Holt_MS_Thesis_ProjectRyan_Holt_MS_Thesis_Project
Ryan_Holt_MS_Thesis_ProjectRyan Holt
 
Encryption watermarking and steganography in application to biometrics electr...
Encryption watermarking and steganography in application to biometrics electr...Encryption watermarking and steganography in application to biometrics electr...
Encryption watermarking and steganography in application to biometrics electr...Hitha Meka
 
An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based EncryptionVertoda System
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 

Andere mochten auch (7)

FYPFINAL
FYPFINALFYPFINAL
FYPFINAL
 
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
Master-Thesis-on-Encryption-within-LE-investigations-Stefano_Fantin_FINAL VER...
 
Ryan_Holt_MS_Thesis_Project
Ryan_Holt_MS_Thesis_ProjectRyan_Holt_MS_Thesis_Project
Ryan_Holt_MS_Thesis_Project
 
Encryption watermarking and steganography in application to biometrics electr...
Encryption watermarking and steganography in application to biometrics electr...Encryption watermarking and steganography in application to biometrics electr...
Encryption watermarking and steganography in application to biometrics electr...
 
An Overview of Identity Based Encryption
An Overview of Identity Based EncryptionAn Overview of Identity Based Encryption
An Overview of Identity Based Encryption
 
Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 

Ähnlich wie Sec keeper en

Linux mailserver-installation
Linux mailserver-installationLinux mailserver-installation
Linux mailserver-installationchetanvyas
 
Invest plus user manual
Invest plus user manualInvest plus user manual
Invest plus user manualInvest Plus
 
The ARJEL-compliant Trusted Solution For Online Gambling And Betting Operators
The ARJEL-compliant Trusted Solution For Online Gambling And Betting OperatorsThe ARJEL-compliant Trusted Solution For Online Gambling And Betting Operators
The ARJEL-compliant Trusted Solution For Online Gambling And Betting OperatorsMarket Engel SAS
 
Macro schedulermanual9
Macro schedulermanual9Macro schedulermanual9
Macro schedulermanual9emrra
 
Plesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXPlesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXwebhostingguy
 
Best Practices for Acquiring IT as a Service
Best Practices for Acquiring IT as a ServiceBest Practices for Acquiring IT as a Service
Best Practices for Acquiring IT as a ServiceDaniel Checchia
 
Manual de programacion PLC Crouzet Millenium
Manual de programacion PLC Crouzet MilleniumManual de programacion PLC Crouzet Millenium
Manual de programacion PLC Crouzet MilleniumJosé Luis Lozoya Delgado
 
Artromick Ac Hostguide304 for Hospital Computing Solutions
Artromick Ac Hostguide304 for Hospital Computing SolutionsArtromick Ac Hostguide304 for Hospital Computing Solutions
Artromick Ac Hostguide304 for Hospital Computing SolutionsArtromick
 
Paladin Network Administrators Guide
Paladin Network Administrators GuidePaladin Network Administrators Guide
Paladin Network Administrators Guidehanniw79
 
Detecting Malice
Detecting MaliceDetecting Malice
Detecting Malicedrkimsky
 
Back box user-guide
Back box user-guideBack box user-guide
Back box user-guidedsd124
 

Ähnlich wie Sec keeper en (20)

Sim explorer en
Sim explorer enSim explorer en
Sim explorer en
 
Sim man3 en
Sim man3 enSim man3 en
Sim man3 en
 
Dp carrier en
Dp carrier enDp carrier en
Dp carrier en
 
Lab view manual
Lab view manualLab view manual
Lab view manual
 
UsersGuide
UsersGuideUsersGuide
UsersGuide
 
Linux mailserver-installation
Linux mailserver-installationLinux mailserver-installation
Linux mailserver-installation
 
Invest plus user manual
Invest plus user manualInvest plus user manual
Invest plus user manual
 
The ARJEL-compliant Trusted Solution For Online Gambling And Betting Operators
The ARJEL-compliant Trusted Solution For Online Gambling And Betting OperatorsThe ARJEL-compliant Trusted Solution For Online Gambling And Betting Operators
The ARJEL-compliant Trusted Solution For Online Gambling And Betting Operators
 
Macro schedulermanual9
Macro schedulermanual9Macro schedulermanual9
Macro schedulermanual9
 
LSI_SAS2008_Manual_v100.pdf
LSI_SAS2008_Manual_v100.pdfLSI_SAS2008_Manual_v100.pdf
LSI_SAS2008_Manual_v100.pdf
 
Plesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIXPlesk 8.0 for Linux/UNIX
Plesk 8.0 for Linux/UNIX
 
Best Practices for Acquiring IT as a Service
Best Practices for Acquiring IT as a ServiceBest Practices for Acquiring IT as a Service
Best Practices for Acquiring IT as a Service
 
Manual de programacion PLC Crouzet Millenium
Manual de programacion PLC Crouzet MilleniumManual de programacion PLC Crouzet Millenium
Manual de programacion PLC Crouzet Millenium
 
Artromick Ac Hostguide304 for Hospital Computing Solutions
Artromick Ac Hostguide304 for Hospital Computing SolutionsArtromick Ac Hostguide304 for Hospital Computing Solutions
Artromick Ac Hostguide304 for Hospital Computing Solutions
 
6757i user guide
6757i user guide6757i user guide
6757i user guide
 
Paladin Network Administrators Guide
Paladin Network Administrators GuidePaladin Network Administrators Guide
Paladin Network Administrators Guide
 
Key manager oper_guide
Key manager oper_guideKey manager oper_guide
Key manager oper_guide
 
Detecting Malice
Detecting MaliceDetecting Malice
Detecting Malice
 
Back box user-guide
Back box user-guideBack box user-guide
Back box user-guide
 
Aja ki pro_mini_manual_v4.1
Aja ki pro_mini_manual_v4.1Aja ki pro_mini_manual_v4.1
Aja ki pro_mini_manual_v4.1
 

Mehr von CompaniaDekartSRL (20)

Keyserv
KeyservKeyserv
Keyserv
 
Keyexpo
KeyexpoKeyexpo
Keyexpo
 
Ikeygen
IkeygenIkeygen
Ikeygen
 
Ckeygen
CkeygenCkeygen
Ckeygen
 
Xcd pg
Xcd pgXcd pg
Xcd pg
 
Cdserv
CdservCdserv
Cdserv
 
Cdexpert
CdexpertCdexpert
Cdexpert
 
Keycert
KeycertKeycert
Keycert
 
Ikeyexpo
IkeyexpoIkeyexpo
Ikeyexpo
 
Ccrt pg
Ccrt pgCcrt pg
Ccrt pg
 
Cdex pg
Cdex pgCdex pg
Cdex pg
 
Suprfull
SuprfullSuprfull
Suprfull
 
Pom2010a
Pom2010aPom2010a
Pom2010a
 
Pom2009a
Pom2009aPom2009a
Pom2009a
 
Pom2005b
Pom2005bPom2005b
Pom2005b
 
Pom2002e
Pom2002ePom2002e
Pom2002e
 
Pom2001d
Pom2001dPom2001d
Pom2001d
 
Pom2001a
Pom2001aPom2001a
Pom2001a
 
Pom2001
Pom2001Pom2001
Pom2001
 
Petrova 99full
Petrova 99fullPetrova 99full
Petrova 99full
 

Sec keeper en

  • 1. USER GUIDE DEKART SECRETS KEEPER © Dekart
  • 2. I Secrets Keeper Table of Contents Part I License and trademarks information 1 Part II Glossary 1 Part III Introducing Secrets Keeper 2 1 Secrets Keeper purpose and features ................................................................................................................................... 2 2 Secrets Keeper product's components ................................................................................................................................... 3 3 Secrets Keeper hardware and software requierments ................................................................................................................................... 3 4 Supported key storage and biometric devices ................................................................................................................................... 3 Part IV Installation of Secrets Keeper 5 1 Installing of Secrets Keeper ................................................................................................................................... 5 2 Updating of Secrets Keeper ................................................................................................................................... 12 3 Uninstalling ................................................................................................................................... 15 of Secrets Keeper Part V Using Secrets Keeper 16 1 Starting the application ................................................................................................................................... 16 2 Configuring the application ................................................................................................................................... 17 3 Maintaining the Key ................................................................................................................................... 17 Controlling the file encryption password stored on the Key .......................................................................................................................................................... 18 Changing the.......................................................................................................................................................... PIN code 20 Unblocking the Key .......................................................................................................................................................... 22 Adding a BIO .......................................................................................................................................................... ID to the KSD 23 Changing the.......................................................................................................................................................... BIO ID 25 4 Encrypting files without using the Key ................................................................................................................................... 26 5 Decrypting files without using the Key ................................................................................................................................... 27 6 Encrypting files using the Key ................................................................................................................................... 28 7 Decrypting files using the Key ................................................................................................................................... 29 8 Using Drag'n'Drop to encrypt/decrypt files ................................................................................................................................... 30 9 Encrypting /decrypting files via the context menu ................................................................................................................................... 30 10 Creating a Self-Extracting encrypted archive ................................................................................................................................... 30 11 Using a Self-Extracting encrypted archive ................................................................................................................................... 32 12 Secrets Keeper and MS Office ................................................................................................................................... 33 13 Wiping files ................................................................................................................................... 34 14 Getting information about Secrets Keeper ................................................................................................................................... 35 15 Closing Secrets Keeper ................................................................................................................................... 36 Part VI Additional information 36 © Dekart
  • 3. Contents II 1 Biometric authentication in Secrets Keeper ................................................................................................................................... 36 2 Registering Secrets Keeper ................................................................................................................................... 37 3 Troubleshooting ................................................................................................................................... 38 4 Specifications of common Keys (PIN, capacity) ................................................................................................................................... 40 Index 43 © Dekart II
  • 4. 1 Secrets Keeper 1 License and trademarks information COPYRIGHT Copyright © Dekart SRL. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Dekart SRL, or its suppliers or affiliate companies. DISCLAMER Dekart SRL makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Dekart SRL reserved the right to revise this publication and to make changes to its content, at any time, without any obligation to notify any person or entity of such revisions or changes. Further, Dekart SRL makes no representations or warranties with respect to any Secrets Keeper software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Dekart SRL reserved the right to make changes to any and all parts of Secrets Keeper software, at any time, without any obligation to notify any person or entity of such revisions or changes. LICENSE AGREEMENT NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE SOFTWARE THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST, LICENSE.TXT, OR OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE OR AS PART OF THE SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH THEREIN, DO NOT INSTALL THE SOFTWARE. DEKART SRL TRADEMARK ATTRIBUTIONS Secrets Keeper is a trademark of Dekart SRL All other registered and unregistered trademarks in this document are the sole property of their respective owners. DEKART SRL CONTACT INFORMATION E-mail: for sales details: sales@dekart.com for product support: support@dekart.com for comments and feedback: info@dekart.com WWW: www.dekart.com 2 Glossary Secrets Keeper (SK) – the name of the program. Key, KSD (Key Storage Device) – a removable device on which information needed to © Dekart
  • 5. Glossary 2 decrypt and access your encrypted data is stored. A KSD can be a smart card, a USB token, a USB flash drive, a memory card, etc.. The KSD can be secured with a PIN code, but it can work without a PIN too. PIN (Personal Identification Number) – a number which must be provided in order to access the contents of the KSD. The PIN can be 1 to 8 characters long and must be kept secret. BIO ID – a biometric ID that holds information about the unique features of your body (ex: fingerprint or iris). The size of the BIO ID is variable, in average it takes from 600 bytes (a fingerprint) to 30 Kbytes (voice recording). Biometric authentication - authentication based on the verification of specific physical characteristics of the user (ex: fingerprints, iris, voice) by means of special biometric equipment. Two-factor authentication – a process controlling the authenticity of the user's identity on the basis of the following factors: "Something You Have – for example, the KSD device" and "Something You Know — for example, the user name and password, or the PIN-code". Three-factor authentication – a process controlling the authenticity of the user's identity on the basis of the following three factors: "Something You Have – for example, the KSD", "Something You Know — for example, the PIN code", "Something You are – for example, your BIO ID". 3 Introducing Secrets Keeper 3.1 Secrets Keeper purpose and features Secrets Keeper is a software solution that protects your files from unauthorized access by applying encryption and three-factor authentication. Two of Secrets Keeper's key-advantages are its ease of use and strong cryptographic mechanisms. Secrets Keeper’s security principles 1. Secrets Keeper’s security relies on the use of a PIN-protected Key, which contains your BIO-ID and the information necessary to access your files. Therefore, you do not have to memorize a complex password; while three-factor authentication minimizes the risk of unauthorized access in case the Key is lost or stolen. 2. If the PIN is entered incorrectly a certain number of times, the Key is blocked. Note: this number depends on the type of the Key, usually it is between 3 and 10 attempts (see Appendix for more info). Secrets Keeper’s essential advantages © Dekart
  • 6. 3 Secrets Keeper 1. Ease of use – no need to memorize and enter the password each time you need to access your files. In addition, the program has a built-in wiping feature, which allows you to securely erase a file from a disk, thus making its recovery impossible. 2. Mobility – self-extracting archives can be created and easily transferred to any computer, making data exchange via email or removable drives much more secure. 3. Integration – the “Encrypt file” and “Decrypt file” buttons are automatically added to the MS Office application toolbar (in Word, Excel and PowerPoint). 4. Multiple Functionality – the Key can be used with SK, as well as with other applications, such as Dekart Logon or Dekart Private Disk Multifactor. 3.2 Secrets Keeper product's components The product consists of software modules and a Key which ‘opens’ the encrypted files. This guide is included too. 3.3 Secrets Keeper hardware and software requierments Hardware requirements  PC with at least one available port (COM, USB, etc. ) for the Key.  If a smart card is used as a Key, a PC/SC-compliant smart card reader is required.  If three-factor authentication is used, a biometric device, such as BioLink U-Match Mouse is needed. Software requirements  Windows 95, 98, NT4.0, 2000, ME, XP.  Driver for the Key.  Driver for the biometric device. 3.4 Supported key storage and biometric devices Secrets Keeper supports the following devices: Key Storage Devices: · ACOS1 card; · ActivCard ActivKey USB token series; · Aladdin eToken R2 USB token series; · Aladdin eToken PRO USB token series; · Algorithmic Research MiniKey USB token series; · Algorithmic Research PrivateCard smart card series; © Dekart
  • 7. Introducing Secrets Keeper 4 · Datakey Model 310 smart card series; · Datakey Model 330 smart card series; · Eutron CryptoIdentity ITSEC USB token series; · Eutron CryptoIdentity 4 USB token series; · Eutron CryptoIdentity 5 USB token series; · GemPlus GPK smart card series; · GemPlus MPCOS EMV smart card series; · Giesecke & Devrient STARCOS S smart card series; · Giesecke & Devrient STARCOS SPK smart card series; · Rainbow iKey 1000 USB token series; · Rainbow iKey 2000 USB token series; · Rainbow iKey 3000 USB token series; · Schlumberger Cryptoflex smart card series; · Schlumberger Multiflex smart card series; · Schlumberger Payflex smart card series; · Siemens CardOS M 4 smart card series · ruToken USB token series; · USB flash drives, CD disks, etc.; · Any memory storage device detected as a removable disk. Smart card readers: Secrets Keeper uses virtually all PC/CS compatible smart card readers, for example: · Datakey DKR smart card reader series · GemPlus GemPC smart card reader series · OmniKey CardMan smart card reader series · Schlumberger Reflex smart card reader series · Towitoko CHIPDRIVE smart card reader series Biometric verification devices: Dekart Software uses most types of BioAPI and HA API compatible biometric verification devices, for example: · Precise Biometrics Precise 100 fingerprint and smart card reader series · SCM SCR222 fingerprint reader · BioLink U-Match MatchBook · BioLink U-Match Mouse A complete list of supported devices is available at: http://www.dekart.com/products/supported_devices/ Note 1. Before you purchase a USB token or a smart card, please make sure that it has enough memory to store the required user information. Please, take into account that a part of the KSD's memory may be allocated to other data, e.g. BIO ID. You can find the free space available on the card or token, as well as delete or backup data using Dekart Key Manager; for more details, see: http://www.dekart.com/products/card_management/key_manager/ © Dekart
  • 8. 5 Secrets Keeper Note 2. The KSDs shipped by Dekart are not PIN-protected, you will be prompted to set a PIN when you launch the application for the first time. 4 Installation of Secrets Keeper  Installing;  Updating;  Uninstalling. 4.1 Installing of Secrets Keeper 1. Make sure that all your applications are closed before you attempt to install Secrets Keeper. 2. If three-factor authentication will be used, the drivers of the biometric device must be installed. Note: if biometry-enabled applications were not previously used on your computer, you have to install the BioAPI Framework, available at www.bioapi.org, the Implementation section). 3. To start the installation process, launch SecKeeper.exe. 4. Read the information on the welcome screen, and then press Next. © Dekart
  • 9. Installation of Secrets Keeper 6 5. You have to agree with the terms of the license agreement in order to continue the installation process. © Dekart
  • 10. 7 Secrets Keeper 6. In the next step, provide information about yourself and type in the registration number of the product. © Dekart
  • 11. Installation of Secrets Keeper 8 7. Then indicate the folder in which Secrets Keeper will be installed. © Dekart
  • 12. 9 Secrets Keeper 8. Indicate the folder of the Start Menu in which Secrets Keeper’s shortcuts will be added. © Dekart
  • 13. Installation of Secrets Keeper 10 9. Check the additional options as necessary (place a shortcut on the Desktop, display the ReadMe file, automatically launch the application) and press Next. © Dekart
  • 14. 11 Secrets Keeper 10. Press Finish to finalize the installation process. © Dekart
  • 15. Installation of Secrets Keeper 12 After that the program will copy its files to your system and complete the installation process. 4.2 Updating of Secrets Keeper 1. If the installation program is launched again, it will automatically detect the currently installed version of Secrets Keeper and collect all the data necessary to perform the update. © Dekart
  • 16. 13 Secrets Keeper 2. To continue the process press Next. This will display the license agreement which you need to accept in order to proceed. 3. When all the necessary information is collected, press Next. © Dekart
  • 17. Installation of Secrets Keeper 14 4. Press Finish to complete the process. © Dekart
  • 18. 15 Secrets Keeper Afterwards, the program will update the existing files, or add the new ones if necessary. Note. You need to restart your computer after updating Secrets Keeper. 4.3 Uninstalling of Secrets Keeper Follow these steps if you wish to uninstall the product: 1. Go to Start Menu Programs, select the folder you chose at step 8 when installing the program (see Installing Secrets Keeper), then choose Uninstall. An alternative way is to go to Control Panel Add or Remove Programs, choose Secrets Keeper and press Uninstall). The following window will appear on the screen: © Dekart
  • 19. Installation of Secrets Keeper 16 2. To confirm your decision, press Yes.. 3. After successful completion of the de-installation process, you will see the following message: 5 Using Secrets Keeper Below is a list of Secrets Keeper’s functions:  Secrets Keeper configuration.  Key maintenance.  Encrypting / decrypting files without the Key.  Encrypting / decrypting files with the Key.  Encrypting / decrypting files from within MS Office applications.  Using Drag'n'Drop to encrypt / decrypt files.  Encrypting / decrypting files via the context menu.  Creating a Self-Extracting encrypted archive.  Wiping files . Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask you to perform two- or three-factor authentication prior to performing any operation which requires the Key (encrypt / decrypt with the Key, change Key options, etc.) 5.1 Starting the application The program can be started in one of the following ways: · Go to Start Menu Programs, select the folder you chose at step 8 when installing the program (see Installing Secrets Keeper), then run the program. · In Windows Explorer, open the folder indicated at step 7 of the installation process (see Installing Secrets Keeper), then run the program. The application’s window will appear on the screen. © Dekart
  • 20. 17 Secrets Keeper 5.2 Configuring the application We recommend you to configure the application after you start it for the first time, you can do that by pressing Options… . The following window will appear on the screen:. Below are Secrets Keeper’s options (check to enable, un-check to disable): 1. Associate the <.skf> extension with Secrets Keeper. 2. Automatically decrypt a <.skf> file when it is double-clicked then run the application associated with the decrypted file. 3. Use the Key to access encrypted files. 4. Automatically check if a newer version is available. 5. Compress the file before encrypting it. 6. Delete files after encryption. Note: We advise you to enable this option, to avoid accidental data leaks. . 5.3 Maintaining the Key To use the Key when encrypting files, enable Use Key in the Options… menu. From this moment on, the program’s main window will look like this: © Dekart
  • 21. Using Secrets Keeper 18 If you wish to change some of the Key’s parameters, connect the Key and press Key. The following options are available:  Add or change password.  Remove password.  Add or change PIN.  Unblock Key.  Add or change BIO-ID. Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask you to perform two- or three-factor authentication prior to performing any operation which requires the Key (encrypt / decrypt with the Key, change Key options, etc.) 5.3.1 Controlling the file encryption password stored on the Key Enabling Use Key allows you to add, change or remove the Key’s encryption password. Changing the password. To add a password or change an existing one, press Key Password, and enter the new password in the appearing window. The password’s strength (i.e. cryptographic complexity) is automatically shown in the Password quality field. Note. The password can be 1 to 64 characters long, it may contain letters, digits, and special characters. © Dekart
  • 22. 19 Secrets Keeper To create a cryptographically strong password, use the Create password function. In this case a random set of characters will be generated and used as a password. To store the new password on the Key, press Store password. Note that after creating a new password, you will be unable to decrypt the documents that were encrypted with the old password. The program will notify you about the consequences of changing a password and ask you to confirm your decision. © Dekart
  • 23. Using Secrets Keeper 20 To complete the operation, press Yes. Deleting the password To delete the password from the Key, press Key Delete password. Note that after deleting the password, you will be unable to decrypt the documents that were encrypted with it. The program will notify you about the consequences of deleting a password and ask you to confirm your decision. To complete the operation, press Yes. 5.3.2 Changing the PIN code To add a PIN to your Key or change an existing one, perform the following operations: 1. Start the application (follow the steps given in the Starting the application section). 2. Press Key Change PIN. The Change PIN window will appear on the screen. © Dekart
  • 24. 21 Secrets Keeper 3. Enter your new PIN in the PIN field, and then enter it again in the Confirm field. To finish, press OK. Note. The PIN can be 1 to 8 characters long. 4. If you do not wish to use a PIN code, uncheck Enable PIN and press OK. Note: we do not advise you to leave the PIN empty, especially if you use a USB flash disk as a Key. In this case, others will be able to make copies and use the Key without your consent. © Dekart
  • 25. Using Secrets Keeper 22 The following window appears on the screen if the operation is successfully complete. 5.3.3 Unblocking the Key If the PIN was incorrectly entered more than once, the Key will be blocked. To unblock the Key, press Key Unblock Key… . The Unblocking the Key window will appear on the screen: Enter your PIN in the Enter PIN field and press OK. If the entered PIN is incorrect, the Key will be permanently blocked. (Does not apply to flash-memory based keys) The following window will appear on the screen if the operation is successful: Note. The Appendix provides a list of Keys and their maximum number of PIN-entering © Dekart
  • 26. 23 Secrets Keeper attempts. 5.3.4 Adding a BIO ID to the KSD If you wish to switch from two-factor authentication to three-factor authentication, a biometric ID has to be assigned to the Key. Note. When choosing a biometric device, consider your intrinsic physical traits (ex: certain fingerprint scanners will not work if the skin is too dry). Keep in mind that the environment has a major impact on voice-recognition; therefore the position of your computer is important. To add a BIO ID, follow these steps. 1. Press Key Change BIO ID in the program’s main menu. A list of available biometric devices will appear on the screen. 2. Check the Enable Biometric ID verification checkbox and choose the preferred device from the list. 3. If a fingerprint scanner is chosen, ex: Bio-Link U-Match, you will be asked to press your finger against the scanner several times. When the necessary information is gathered, it will be saved to the Key. © Dekart
  • 27. Using Secrets Keeper 24 If you choose a voice recognition device, such as SAFLINK Scan-Soft Voice Verification, you will be asked to pronounce a key-phrase. As in the previous case, the BIO ID is stored on the KSD once it is collected. © Dekart
  • 28. 25 Secrets Keeper 5.3.5 Changing the BIO ID To change the biometric ID, follow these steps. 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press Key Change BIO ID. The Change Biometric ID window will appear on the screen (see. Adding a BIO ID). 3. Choose the currently active biometric device from the list. 4. As in the case of adding a BIO ID, depending on the biometric device you choose, you will be asked to perform a certain action (ex: pronounce a phrase, press your finger against the scanner, etc). When the process is done, the BIO ID is saved on the Key. Note. If you wish to disable biometric authentication, uncheck "Enable Biometric ID verification" in the Change Biometric ID window. © Dekart
  • 29. Using Secrets Keeper 26 5.4 Encrypting files without using the Key If you wish to encrypt files without a Key, follow the steps below: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press File Encrypt file(s)… . 3. The Select file(s) to encrypt dialog will appear on the screen. Type the name of the file(s) you wish to encrypt in the File name field. You can also use your mouse to select a file. Selecting multiple files can be done by holding Ctrl and clicking on them 1. Enter your password in the Password field, and then confirm it by typing it again in the Confirm field. Note. The password can be 1 to 64 characters long. © Dekart
  • 30. 27 Secrets Keeper 2. Press Open to complete the operation. Once the operation is successfully complete, the original files will be replaced with their encrypted versions, which have the <.skf> extension. Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left intact. 5.5 Decrypting files without using the Key If you wish to decrypt files without a key, follow the steps below: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press File Decrypt file(s)… . The Select file(s) to decrypt dialog will appear on the screen. 3. Enter the name(s) of the file(s) you wish to decrypt in the File name field. 4. Enter the decryption password in the Password field. 5. Press Open to continue the operation. Once the operation is successfully complete, the decrypted files will appear in the same folder. © Dekart
  • 31. Using Secrets Keeper 28 5.6 Encrypting files using the Key Follow these steps in order to encrypt a file: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Connect the Key to the computer. 3. If an encryption password is not yet stored on the Key, one should be added (see. Controlling the file encryption password stored on the Key). 4. Press File Encrypt file(s)… . 5. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program will ask you to go through the two- or three-factor authentication procedure. 6. The Select file(s) to encrypt dialog will appear once authentication is successfully complete. 7. Type the name of the file(s) you wish to encrypt in the File name field. Selecting multiple files can be done by holding Ctrl and clicking on them 8. Press Open to continue the operation. Once the operation is successfully complete, the original files will be replaced with their encrypted versions, which have the <.skf> extension. © Dekart
  • 32. 29 Secrets Keeper Note. If an encryption password is not stored on the Key, the program will notify you about that and automatically switch to the Encrypting files without using the Key mode. Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left intact. 5.7 Decrypting files using the Key To decrypt files using the Key, follow these steps. 1. Launch the application (according to the instructions given in the Starting the application section). 2. Connect the Key to the computer. 3. Press File Decrypt file(s)… . 4. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program will ask you to go through the two- or three-factor authentication procedure. 5. The Select file(s) to decrypt dialog will appear once authentication is successfully complete. 6. Type the name of the file(s) you wish to decrypt in the File name field. Selecting multiple files can be done by holding Ctrl and clicking on them. 7. Press Open to continue the operation. © Dekart
  • 33. Using Secrets Keeper 30 Once the operation is successfully complete, the decrypted files will appear in the same folder. Note. If an encryption password is not stored on the Key, the program will notify you about that and automatically switch to the Decrypting files without using the Key mode. 5.8 Using Drag'n'Drop to encrypt/decrypt files You can encrypt or decrypt a file via the Drag'n'Drop mechanism. To do that, click on an initial or encrypted file with your mouse and drag it onto Secrets Keeper's window or Secrets Keeper's shortcut or Secrets Keeper's icon. When the file is dropped, the encryption/decryption procedure will be activated. 5.9 Encrypting /decrypting files via the context menu Secrets Keeper allows you to encrypt and decrypt files via the context menu. You can do that by right-clicking any file and choosing the appropriate option from the menu. If the file is encrypted, press Decrypt (by Secrets Keeper) to decrypt it; otherwise, press Encrypt (by Secrets Keeper) to encrypt it. The encryption decryption will be done using the program’s current settings (with, or without a key). 5.10 Creating a Self-Extracting encrypted archive Follow these steps if you wish to create a self-extracting encrypted archive: 1. Launch the application (according to the instructions given in the Starting the application section). 2. If you wish to use a Key to access the archive, connect it to the computer. Note that if the Key is PIN-protected, or if a BIO-ID is assigned to it, the program will also guide you through the two- or three-factor authentication process once you reach step 7. 3. Press File Create a Self-Extracting encrypted archive or the ЕХЕ button located in the program’s main window. The Create a Self-Extracting encrypted archive window will appear on the screen. © Dekart
  • 34. 31 Secrets Keeper 4. Enter the full path and name of the self-extracting archive you plan to create in the Archive Name field. 5. Enter the full path and full name of the file(s) you wish to be included in the encrypted archive in the Added files field. Note. The file names your entered should be enclosed in double quotation marks, and they must to be separated by spaces. Example: "C:DocumentsWorktable.dat" "D:Files and Settingsstorage.inf".An alternative way to add the files is to press the Add Files button and use the visual dialog. 6. Choose the file(s), and press Open. Selecting multiple files can be done by holding Ctrl and clicking on them. The chosen files will be automatically added to the Added files field. 7. Press Create. 8. If the program is configured not to use a Key when encrypting files, you will be asked to enter the encryption password. Then press ОК. © Dekart
  • 35. Using Secrets Keeper 32 Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before attempting to launch it; although it can be changed to any other extension during transportation (ex: when the file is sent via email) 5.11 Using a Self-Extracting encrypted archive To extract files from a self-extracting encrypted archive, follow these steps: 1. Start the EXE-file previously created by Secrets Keeper. 2. If a Key was used to create the archive, connect it to the computer and go through the two- or three-factor authentication process (depending on whether the Key is PIN-protected, or if a BIO-ID is assigned to it). If a Key was not used during the encryption process, the program will ask you to enter the decryption password. 3. The Self-extracting SecKeeper archive window will appear on the screen. Press Browse to choose the directory in which the files will be extracted. © Dekart
  • 36. 33 Secrets Keeper 4. Press Extract. Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before attempting to launch it; although it can be changed to any other extension during transportation (ex: when the file is sent via email). 5.12 Secrets Keeper and MS Office Once Secrets Keeper is installed, you will see a new set of buttons in the toolbars of MS Office applications, such as Word, Excel or PowerPoint. The buttons are “Save document as encrypted”, and “Decrypt and open document”; they allow you to use Secrets Keeper directly from MS Office. When pressing one of these buttons, you will be asked to indicate the file you wish to encrypt or decrypt. © Dekart
  • 37. Using Secrets Keeper 34 Depending on the program’s configuration (if it uses a Key to encrypt files or only a password), you will be asked to connect the Key and perform the authentication process or enter your password. Afterwards the encryption/decryption operation will be executed. 5.13 Wiping files Secrets Keeper can securely erase any file, by filling its contents with random data before deleting it. To securely erase a file, follow these steps: 1. Launch the application (according to the instructions given in the Starting the application section). 2. Press File Wipe file(s)… . 3. The Select file(s) to wipe dialog will appear on the screen. Type the name of the file(s) you wish to erase in the File name field. You can also use your mouse to select a file; selecting multiple files can be done by holding Ctrl and clicking on them © Dekart
  • 38. 35 Secrets Keeper 4. Press Open to complete the operation. 5.14 Getting information about Secrets Keeper To obtain product-related information, press Help About. The About Secrets Keeper window will appear on the screen. © Dekart
  • 39. Using Secrets Keeper 36 If the program is not registered, the window will look like the one shown in the Registering Secrets Keeper section. 5.15 Closing Secrets Keeper To quit Secrets Keeper, press File Exit or close the program’s main window. 6 Additional information 6.1 Biometric authentication in Secrets Keeper If three-factor authentication is used (i.e. Enable Biometric ID verification in the Change Biometric ID window is checked), Secrets Keeper will ask you to enter the PIN-code and perform the biometric authentication. Depending on the biometric device you have, you will be asked to perform a certain action (ex: pronounce a phrase, press your finger against the scanner, etc). If the obtained biometric data do not match the BIO-ID stored on the Key, the program will ask you to go through the biometric authentication process again. Therefore, a person that possesses the Key is unable to use it unless their biometric features are the correct ones. © Dekart
  • 40. 37 Secrets Keeper 6.2 Registering Secrets Keeper To register the application, enter your registration information in the fields of the About Secrets Keeper window. If the trial period has expired, and the program is still not registered, the registration form will be shown when the application starts. © Dekart
  • 41. Additional information 38 After entering the registration information, Secrets Keeper will continue to work; otherwise you will not be able to use the program anymore. If you use a trial version of the program, please, use the Dekart Buy on-line page to purchase a registration number. After your transaction is processed, you will receive an email with the registration number. If you use a licensed version of the program, you can obtain a registration number at the Software Registration (Register) page at www.dekart.com. 6.3 Troubleshooting Error messages Message Possible cause Possible solution © Dekart
  • 42. 39 Secrets Keeper ATTENTION! Bad PIN An incorrect PIN was entered. Repeat the operation, code was entered! making sure that a valid PIN is provided. Attention! By entering an invalid PIN multiple times you can block the Key! A list of Keys and their maximum number of invalid PIN entries is provided in Specifications of common Keys (PIN, capacity). Key is blocked The Key is blocked. To unblock the Key press Key Unblock Key Attention! If an invalid PIN will be provided during the unblock procedure, the Key will be permanently blocked! KSD is not blocked yet The Key is not blocked yet There is no need to unblock the Key as it is not blocked. Confirm PIN does not The entered PIN doesn’t match Repeat the operation, match the original PIN the PIN provided in the making sure that the PIN in Confirm field. the Confirm field matches the original PIN. The PIN should be at The entered PIN is less than 4 Repeat the operation by least 4 symbols long characters long. entering a longer PIN. Error while processing An error occurred while Try to perform the operation the Key. processing the Key again. If the problem An error occurred while persists, contact Dekart’s writing the password to technical support team. the Key! Error while writing data An error occurred when Make sure there is enough to the KSD (Not enough attempting to write data to the free space on the Key. One free space on the KSD) Key, most likely there is not way to do that is to use enough free space. Dekart KeyManager. © Dekart
  • 43. Additional information 40 An error occurred while An error occurred when Try to perform the operation creating the password! creating or changing the again. If the problem An error occurred while password. persists, contact Dekart’s changing the password! technical support team. The Key does not The connected Key does not Connect a Key which contain a password contain a password. contains a password and required for the repeat the operation, or encryption process! assign a password to the The Key does not Key by pressing Key contain a password Password… . required for the decryption process! An error occurred while An error occurred while Check whether there are any reading the source file! processing a file. applications which are An error occurred while accessing the file. It is also opening the destination possible that the file is file! corrupt. You are trying to The file you attempt to decrypt Secrets Keeper can only decrypt a file that is not is not a Secrets Keeper decrypt files it has a <.skf> file! encrypted file. previously encrypted. The password you The provided password is Enter a valid password. entered is incorrect for incorrect. the given file Biometric verification The computed BIO-ID does Go through the biometric failed! not match the one stored on the authentication procedure Key. again. Note. If any other error message occurs, contact Dekart’s technical support team: http://www.dekart.com/support/howto/howto-contact-us/ . 6.4 Specifications of common Keys (PIN, capacity) Number of Maximum Hardware PIN / Number of PIN incorrect PIN amount of Key name Dekart software unblock input available PIN attempts attempts memory (kB) Aladdin Dekart software 3 3 16, 32, 64 eToken PRO PIN © Dekart
  • 44. 41 Secrets Keeper Aladdin Hardware PIN ∞ - 16, 32, 64 eToken R2 Schlumberger Dekart software 3 3 4, 8 Multiflex PIN Schlumberger Dekart software 3 3 8, 16 Cryptoflex PIN Schlumberger Dekart software 3 3 4 Payflex PIN Rainbow Hardware PIN 3 3 8, 32 iKey 1000 Rainbow Hardware PIN 10 0 8, 32 iKey 2000 Rainbow Hardware PIN 10 0 8, 32 iKey 2032 Rainbow Dekart software 3 3 32 iKey 3000 PIN Eutron Dekart software CryptoIdentity 3 3 32 PIN ITSEC Eutron Dekart software CryptoIdentity 3 3 8 PIN 4 Eutron Dekart software CryptoIdentity 3 3 32, 64 PIN 5 Datakey Model Hardware PIN 10 0 8, 32 310 Datakey Model Hardware PIN 10 0 8, 32 330 Dekart software GemPlus GPK 3 3 2, 4, 8, 16 PIN ruToken Hardware PIN 3 12 8, 16, 128 Note 1. A KSD can have a separate PIN for Dekart applications, or single a PIN for Dekart applications and the device itself. © Dekart
  • 45. Additional information 42 Note 2. Most of the KSDs have a limited number of invalid PIN entries. If this number is reached the KSD is blocked. If a valid PIN is provided during the unblocking procedure the Key can be used again, otherwise it will be permanently blocked. © Dekart
  • 46. 43 Secrets Keeper Dekart’s technical support 38 Index Drag and Drop 30 -E- -A- Encrypting files About the software 35 creating a self-exctracting archive 30 Authentication in the toolbars of MS Office applications 33 biometric authentication 1, 36 in the toolbars of Word, Excel, PowerPoint 33 three-factor authentication 1, 36 using Drag'n'Drop 30 two-factor authentication 1 using the Key 28 via the context menu 30 without using the Key 26 -B- Error messages 38 Exit 36 BIO ID 1, 2, 36 add 23 change 25 biometric 2 -G- Biometric ID 36 Glossary 1 -C- -I- Changing the parameters of a Key Installation 5 add / chande / delete BIO ID 17 Installing Secrets Keeper 5 add / chande / delete password 17 add / chande PIN 17 unblock Key 17 -K- Closing 36 Key 1 Configuring the application 17 Key Storage Device 1 Controlling the password Key 1 add 18 KSD 1 change 18 KSD 1 delete 18 -D- -L- Launch application 16 Decrypting files License 1 extract files from a self-extracting archive 32 in the toolbars of MS Office applications 33 in the toolbars of Word, Excel, Powerpoint 33 -M- using a self-extracting archive 32 using Drag'n'Drop 30 Memory 40 using the Key 29 via the context menu 30 without using the Key 27 -P- Dekart contact information 1 Password © Dekart
  • 47. Index 44 Password cryptographically strong 18 quality 18 -W- Personal Identification Number 1, 2 Wipe files 34 PIN 1, 2 PIN code 40 change 20 unblock 22 -R- Registration 37 Requirerments hardware 3 software 3 -S- Secrets Keeper essential advantages 2 functions 16 security principles 2 Secrets Keeper's options <.skf> file extension 17 check for updates 17 compress the file before encrypting 17 use the Key to access encrypted files 17 Securely delete files 34 Securely erase files 34 Smart card 40 Supported devices biometric devices 3 key storage devices 3 -T- Token 40 -U- Unblock Key 22 Uninstalling Secrets Keeper 15 Update Secrets Keeper 12 © Dekart