Weitere ähnliche Inhalte
Ähnlich wie Sec keeper en
Ähnlich wie Sec keeper en (20)
Mehr von CompaniaDekartSRL
Mehr von CompaniaDekartSRL (20)
Sec keeper en
- 2. I Secrets Keeper
Table of Contents
Part I License and trademarks information 1
Part II Glossary 1
Part III Introducing Secrets Keeper 2
1 Secrets Keeper purpose and features
................................................................................................................................... 2
2 Secrets Keeper product's components
................................................................................................................................... 3
3 Secrets Keeper hardware and software requierments
................................................................................................................................... 3
4 Supported key storage and biometric devices
................................................................................................................................... 3
Part IV Installation of Secrets Keeper 5
1 Installing of Secrets Keeper
................................................................................................................................... 5
2 Updating of Secrets Keeper
................................................................................................................................... 12
3 Uninstalling ................................................................................................................................... 15
of Secrets Keeper
Part V Using Secrets Keeper 16
1 Starting the application
................................................................................................................................... 16
2 Configuring the application
................................................................................................................................... 17
3 Maintaining the Key
................................................................................................................................... 17
Controlling the file encryption password stored on the Key
..........................................................................................................................................................
18
Changing the..........................................................................................................................................................
PIN code 20
Unblocking the Key
..........................................................................................................................................................
22
Adding a BIO ..........................................................................................................................................................
ID to the KSD 23
Changing the..........................................................................................................................................................
BIO ID 25
4 Encrypting files without using the Key
................................................................................................................................... 26
5 Decrypting files without using the Key
................................................................................................................................... 27
6 Encrypting files using the Key
................................................................................................................................... 28
7 Decrypting files using the Key
................................................................................................................................... 29
8 Using Drag'n'Drop to encrypt/decrypt files
................................................................................................................................... 30
9 Encrypting /decrypting files via the context menu
................................................................................................................................... 30
10 Creating a Self-Extracting encrypted archive
................................................................................................................................... 30
11 Using a Self-Extracting encrypted archive
................................................................................................................................... 32
12 Secrets Keeper and MS Office
................................................................................................................................... 33
13 Wiping files ................................................................................................................................... 34
14 Getting information about Secrets Keeper
................................................................................................................................... 35
15 Closing Secrets Keeper
................................................................................................................................... 36
Part VI Additional information 36
© Dekart
- 3. Contents II
1 Biometric authentication in Secrets Keeper
................................................................................................................................... 36
2 Registering Secrets Keeper
................................................................................................................................... 37
3 Troubleshooting
................................................................................................................................... 38
4 Specifications of common Keys (PIN, capacity)
................................................................................................................................... 40
Index 43
© Dekart
II
- 4. 1 Secrets Keeper
1 License and trademarks information
COPYRIGHT
Copyright © Dekart SRL. All Rights Reserved. No part of this publication may be
reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any
language in any form or by any means without the written permission of Dekart SRL, or its
suppliers or affiliate companies.
DISCLAMER
Dekart SRL makes no representations or warranties with respect to the contents or use of this
manual, and specifically disclaims any express or implied warranties of merchantability or
fitness for any particular purpose. Further, Dekart SRL reserved the right to revise this
publication and to make changes to its content, at any time, without any obligation to notify
any person or entity of such revisions or changes.
Further, Dekart SRL makes no representations or warranties with respect to any Secrets
Keeper software, and specifically disclaims any express or implied warranties of
merchantability or fitness for any particular purpose. Further, Dekart SRL reserved the right to
make changes to any and all parts of Secrets Keeper software, at any time, without any
obligation to notify any person or entity of such revisions or changes.
LICENSE AGREEMENT
NOTICE TO ALL USERS: FOR THE SPECIFIC TERMS OF YOUR LICENSE TO USE THE SOFTWARE
THAT THIS DOCUMENTATION DESCRIBES, CONSULT THE README.1ST, LICENSE.TXT, OR
OTHER LICENSE DOCUMENT THAT ACCOMPANIES YOUR SOFTWARE, EITHER AS A TEXT FILE
OR AS PART OF THE SOFTWARE PACKAGING. IF YOU DO NOT AGREE TO ALL OF THE TERMS
SET FORTH THEREIN, DO NOT INSTALL THE SOFTWARE.
DEKART SRL TRADEMARK ATTRIBUTIONS
Secrets Keeper is a trademark of Dekart SRL
All other registered and unregistered trademarks in this document are the sole property of
their respective owners.
DEKART SRL CONTACT INFORMATION
E-mail:
for sales details: sales@dekart.com
for product support: support@dekart.com
for comments and feedback: info@dekart.com
WWW: www.dekart.com
2 Glossary
Secrets Keeper (SK) – the name of the program.
Key, KSD (Key Storage Device) – a removable device on which information needed to
© Dekart
- 5. Glossary 2
decrypt and access your encrypted data is stored. A KSD can be a smart card, a USB token, a
USB flash drive, a memory card, etc.. The KSD can be secured with a PIN code, but it can
work without a PIN too.
PIN (Personal Identification Number) – a number which must be provided in order to
access the contents of the KSD. The PIN can be 1 to 8 characters long and must be kept
secret.
BIO ID – a biometric ID that holds information about the unique features of your body (ex:
fingerprint or iris). The size of the BIO ID is variable, in average it takes from 600 bytes (a
fingerprint) to 30 Kbytes (voice recording).
Biometric authentication - authentication based on the verification of specific physical
characteristics of the user (ex: fingerprints, iris, voice) by means of special biometric
equipment.
Two-factor authentication – a process controlling the authenticity of the user's identity on
the basis of the following factors: "Something You Have – for example, the KSD device" and
"Something You Know — for example, the user name and password, or the PIN-code".
Three-factor authentication – a process controlling the authenticity of the user's identity on
the basis of the following three factors: "Something You Have – for example, the KSD",
"Something You Know — for example, the PIN code", "Something You are – for example,
your BIO ID".
3 Introducing Secrets Keeper
3.1 Secrets Keeper purpose and features
Secrets Keeper is a software solution that protects your files from unauthorized access by
applying encryption and three-factor authentication. Two of Secrets Keeper's key-advantages
are its ease of use and strong cryptographic mechanisms.
Secrets Keeper’s security principles
1. Secrets Keeper’s security relies on the use of a PIN-protected Key, which contains your
BIO-ID and the information necessary to access your files. Therefore, you do not have to
memorize a complex password; while three-factor authentication minimizes the risk of
unauthorized access in case the Key is lost or stolen.
2. If the PIN is entered incorrectly a certain number of times, the Key is blocked. Note: this
number depends on the type of the Key, usually it is between 3 and 10 attempts (see
Appendix for more info).
Secrets Keeper’s essential advantages
© Dekart
- 6. 3 Secrets Keeper
1. Ease of use – no need to memorize and enter the password each time you need to access
your files. In addition, the program has a built-in wiping feature, which allows you to
securely erase a file from a disk, thus making its recovery impossible.
2. Mobility – self-extracting archives can be created and easily transferred to any computer,
making data exchange via email or removable drives much more secure.
3. Integration – the “Encrypt file” and “Decrypt file” buttons are automatically added to the
MS Office application toolbar (in Word, Excel and PowerPoint).
4. Multiple Functionality – the Key can be used with SK, as well as with other applications,
such as Dekart Logon or Dekart Private Disk Multifactor.
3.2 Secrets Keeper product's components
The product consists of software modules and a Key which ‘opens’ the encrypted files. This
guide is included too.
3.3 Secrets Keeper hardware and software requierments
Hardware requirements
PC with at least one available port (COM, USB, etc. ) for the Key.
If a smart card is used as a Key, a PC/SC-compliant smart card reader is required.
If three-factor authentication is used, a biometric device, such as BioLink U-Match Mouse
is needed.
Software requirements
Windows 95, 98, NT4.0, 2000, ME, XP.
Driver for the Key.
Driver for the biometric device.
3.4 Supported key storage and biometric devices
Secrets Keeper supports the following devices:
Key Storage Devices:
· ACOS1 card;
· ActivCard ActivKey USB token series;
· Aladdin eToken R2 USB token series;
· Aladdin eToken PRO USB token series;
· Algorithmic Research MiniKey USB token series;
· Algorithmic Research PrivateCard smart card series;
© Dekart
- 7. Introducing Secrets Keeper 4
· Datakey Model 310 smart card series;
· Datakey Model 330 smart card series;
· Eutron CryptoIdentity ITSEC USB token series;
· Eutron CryptoIdentity 4 USB token series;
· Eutron CryptoIdentity 5 USB token series;
· GemPlus GPK smart card series;
· GemPlus MPCOS EMV smart card series;
· Giesecke & Devrient STARCOS S smart card series;
· Giesecke & Devrient STARCOS SPK smart card series;
· Rainbow iKey 1000 USB token series;
· Rainbow iKey 2000 USB token series;
· Rainbow iKey 3000 USB token series;
· Schlumberger Cryptoflex smart card series;
· Schlumberger Multiflex smart card series;
· Schlumberger Payflex smart card series;
· Siemens CardOS M 4 smart card series
· ruToken USB token series;
· USB flash drives, CD disks, etc.;
· Any memory storage device detected as a removable disk.
Smart card readers:
Secrets Keeper uses virtually all PC/CS compatible smart card readers, for example:
· Datakey DKR smart card reader series
· GemPlus GemPC smart card reader series
· OmniKey CardMan smart card reader series
· Schlumberger Reflex smart card reader series
· Towitoko CHIPDRIVE smart card reader series
Biometric verification devices:
Dekart Software uses most types of BioAPI and HA API compatible biometric verification
devices, for example:
· Precise Biometrics Precise 100 fingerprint and smart card reader series
· SCM SCR222 fingerprint reader
· BioLink U-Match MatchBook
· BioLink U-Match Mouse
A complete list of supported devices is available at:
http://www.dekart.com/products/supported_devices/
Note 1. Before you purchase a USB token or a smart card, please make sure that it has
enough memory to store the required user information. Please, take into account that a
part of the KSD's memory may be allocated to other data, e.g. BIO ID. You can find the
free space available on the card or token, as well as delete or backup data using Dekart Key
Manager; for more details, see:
http://www.dekart.com/products/card_management/key_manager/
© Dekart
- 8. 5 Secrets Keeper
Note 2. The KSDs shipped by Dekart are not PIN-protected, you will be prompted to set a
PIN when you launch the application for the first time.
4 Installation of Secrets Keeper
Installing;
Updating;
Uninstalling.
4.1 Installing of Secrets Keeper
1. Make sure that all your applications are closed before you attempt to install Secrets
Keeper.
2. If three-factor authentication will be used, the drivers of the biometric device must be
installed. Note: if biometry-enabled applications were not previously used on your
computer, you have to install the BioAPI Framework, available at www.bioapi.org, the
Implementation section).
3. To start the installation process, launch SecKeeper.exe.
4. Read the information on the welcome screen, and then press Next.
© Dekart
- 9. Installation of Secrets Keeper 6
5. You have to agree with the terms of the license agreement in order to continue the
installation process.
© Dekart
- 10. 7 Secrets Keeper
6. In the next step, provide information about yourself and type in the registration number of
the product.
© Dekart
- 11. Installation of Secrets Keeper 8
7. Then indicate the folder in which Secrets Keeper will be installed.
© Dekart
- 12. 9 Secrets Keeper
8. Indicate the folder of the Start Menu in which Secrets Keeper’s shortcuts will be added.
© Dekart
- 13. Installation of Secrets Keeper 10
9. Check the additional options as necessary (place a shortcut on the Desktop, display the
ReadMe file, automatically launch the application) and press Next.
© Dekart
- 14. 11 Secrets Keeper
10. Press Finish to finalize the installation process.
© Dekart
- 15. Installation of Secrets Keeper 12
After that the program will copy its files to your system and complete the installation process.
4.2 Updating of Secrets Keeper
1. If the installation program is launched again, it will automatically detect the currently
installed version of Secrets Keeper and collect all the data necessary to perform the
update.
© Dekart
- 16. 13 Secrets Keeper
2. To continue the process press Next. This will display the license agreement which you
need to accept in order to proceed.
3. When all the necessary information is collected, press Next.
© Dekart
- 18. 15 Secrets Keeper
Afterwards, the program will update the existing files, or add the new ones if necessary.
Note. You need to restart your computer after updating Secrets Keeper.
4.3 Uninstalling of Secrets Keeper
Follow these steps if you wish to uninstall the product:
1. Go to Start Menu Programs, select the folder you chose at step 8 when installing the
program (see Installing Secrets Keeper), then choose Uninstall. An alternative way is to
go to Control Panel Add or Remove Programs, choose Secrets Keeper and press
Uninstall). The following window will appear on the screen:
© Dekart
- 19. Installation of Secrets Keeper 16
2. To confirm your decision, press Yes..
3. After successful completion of the de-installation process, you will see the following
message:
5 Using Secrets Keeper
Below is a list of Secrets Keeper’s functions:
Secrets Keeper configuration.
Key maintenance.
Encrypting / decrypting files without the Key.
Encrypting / decrypting files with the Key.
Encrypting / decrypting files from within MS Office applications.
Using Drag'n'Drop to encrypt / decrypt files.
Encrypting / decrypting files via the context menu.
Creating a Self-Extracting encrypted archive.
Wiping files .
Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask
you to perform two- or three-factor authentication prior to performing any operation
which requires the Key (encrypt / decrypt with the Key, change Key options, etc.)
5.1 Starting the application
The program can be started in one of the following ways:
· Go to Start Menu Programs, select the folder you chose at step 8 when installing
the program (see Installing Secrets Keeper), then run the program.
· In Windows Explorer, open the folder indicated at step 7 of the installation process
(see Installing Secrets Keeper), then run the program.
The application’s window will appear on the screen.
© Dekart
- 20. 17 Secrets Keeper
5.2 Configuring the application
We recommend you to configure the application after you start it for the first time, you can do
that by pressing Options… . The following window will appear on the screen:.
Below are Secrets Keeper’s options (check to enable, un-check to disable):
1. Associate the <.skf> extension with Secrets Keeper.
2. Automatically decrypt a <.skf> file when it is double-clicked then run the application
associated with the decrypted file.
3. Use the Key to access encrypted files.
4. Automatically check if a newer version is available.
5. Compress the file before encrypting it.
6. Delete files after encryption. Note: We advise you to enable this option, to avoid
accidental data leaks. .
5.3 Maintaining the Key
To use the Key when encrypting files, enable Use Key in the Options… menu. From this
moment on, the program’s main window will look like this:
© Dekart
- 21. Using Secrets Keeper 18
If you wish to change some of the Key’s parameters, connect the Key and press Key.
The following options are available:
Add or change password.
Remove password.
Add or change PIN.
Unblock Key.
Add or change BIO-ID.
Note. If the Key is PIN-protected and (or) if it contains a BIO-ID, the program will ask
you to perform two- or three-factor authentication prior to performing any operation
which requires the Key (encrypt / decrypt with the Key, change Key options, etc.)
5.3.1 Controlling the file encryption password stored on the Key
Enabling Use Key allows you to add, change or remove the Key’s encryption password.
Changing the password.
To add a password or change an existing one, press Key Password, and enter the new
password in the appearing window. The password’s strength (i.e. cryptographic complexity) is
automatically shown in the Password quality field.
Note. The password can be 1 to 64 characters long, it may contain letters, digits, and
special characters.
© Dekart
- 22. 19 Secrets Keeper
To create a cryptographically strong password, use the Create password function. In this case
a random set of characters will be generated and used as a password.
To store the new password on the Key, press Store password. Note that after creating a new
password, you will be unable to decrypt the documents that were encrypted with the old
password. The program will notify you about the consequences of changing a password and
ask you to confirm your decision.
© Dekart
- 23. Using Secrets Keeper 20
To complete the operation, press Yes.
Deleting the password
To delete the password from the Key, press Key Delete password. Note that after deleting
the password, you will be unable to decrypt the documents that were encrypted with it. The
program will notify you about the consequences of deleting a password and ask you to
confirm your decision.
To complete the operation, press Yes.
5.3.2 Changing the PIN code
To add a PIN to your Key or change an existing one, perform the following operations:
1. Start the application (follow the steps given in the Starting the application section).
2. Press Key Change PIN. The Change PIN window will appear on the screen.
© Dekart
- 24. 21 Secrets Keeper
3. Enter your new PIN in the PIN field, and then enter it again in the Confirm field. To
finish, press OK.
Note. The PIN can be 1 to 8 characters long.
4. If you do not wish to use a PIN code, uncheck Enable PIN and press OK. Note: we do not
advise you to leave the PIN empty, especially if you use a USB flash disk as a Key. In
this case, others will be able to make copies and use the Key without your consent.
© Dekart
- 25. Using Secrets Keeper 22
The following window appears on the screen if the operation is successfully complete.
5.3.3 Unblocking the Key
If the PIN was incorrectly entered more than once, the Key will be blocked. To unblock the
Key, press Key Unblock Key… . The Unblocking the Key window will appear on the screen:
Enter your PIN in the Enter PIN field and press OK.
If the entered PIN is incorrect, the Key will be permanently blocked.
(Does not apply to flash-memory based keys)
The following window will appear on the screen if the operation is successful:
Note. The Appendix provides a list of Keys and their maximum number of PIN-entering
© Dekart
- 26. 23 Secrets Keeper
attempts.
5.3.4 Adding a BIO ID to the KSD
If you wish to switch from two-factor authentication to three-factor authentication, a
biometric ID has to be assigned to the Key.
Note. When choosing a biometric device, consider your intrinsic physical traits (ex: certain
fingerprint scanners will not work if the skin is too dry). Keep in mind that the
environment has a major impact on voice-recognition; therefore the position of your
computer is important.
To add a BIO ID, follow these steps.
1. Press Key Change BIO ID in the program’s main menu. A list of available biometric
devices will appear on the screen.
2. Check the Enable Biometric ID verification checkbox and choose the preferred device
from the list.
3. If a fingerprint scanner is chosen, ex: Bio-Link U-Match, you will be asked to press your
finger against the scanner several times. When the necessary information is gathered, it
will be saved to the Key.
© Dekart
- 27. Using Secrets Keeper 24
If you choose a voice recognition device, such as SAFLINK Scan-Soft Voice Verification,
you will be asked to pronounce a key-phrase. As in the previous case, the BIO ID is stored on
the KSD once it is collected.
© Dekart
- 28. 25 Secrets Keeper
5.3.5 Changing the BIO ID
To change the biometric ID, follow these steps.
1. Launch the application (according to the instructions given in the Starting the application
section).
2. Press Key Change BIO ID. The Change Biometric ID window will appear on the screen
(see. Adding a BIO ID).
3. Choose the currently active biometric device from the list.
4. As in the case of adding a BIO ID, depending on the biometric device you choose, you
will be asked to perform a certain action (ex: pronounce a phrase, press your finger against
the scanner, etc). When the process is done, the BIO ID is saved on the Key.
Note. If you wish to disable biometric authentication, uncheck "Enable Biometric ID
verification" in the Change Biometric ID window.
© Dekart
- 29. Using Secrets Keeper 26
5.4 Encrypting files without using the Key
If you wish to encrypt files without a Key, follow the steps below:
1. Launch the application (according to the instructions given in the Starting the application
section).
2. Press File Encrypt file(s)… .
3. The Select file(s) to encrypt dialog will appear on the screen. Type the name of the file(s)
you wish to encrypt in the File name field. You can also use your mouse to select a file.
Selecting multiple files can be done by holding Ctrl and clicking on them
1. Enter your password in the Password field, and then confirm it by typing it again in the
Confirm field. Note. The password can be 1 to 64 characters long.
© Dekart
- 30. 27 Secrets Keeper
2. Press Open to complete the operation.
Once the operation is successfully complete, the original files will be replaced with their
encrypted versions, which have the <.skf> extension.
Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after
encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left
intact.
5.5 Decrypting files without using the Key
If you wish to decrypt files without a key, follow the steps below:
1. Launch the application (according to the instructions given in the Starting the application
section).
2. Press File Decrypt file(s)… . The Select file(s) to decrypt dialog will appear on the
screen.
3. Enter the name(s) of the file(s) you wish to decrypt in the File name field.
4. Enter the decryption password in the Password field.
5. Press Open to continue the operation.
Once the operation is successfully complete, the decrypted files will appear in the same
folder.
© Dekart
- 31. Using Secrets Keeper 28
5.6 Encrypting files using the Key
Follow these steps in order to encrypt a file:
1. Launch the application (according to the instructions given in the Starting the application
section).
2. Connect the Key to the computer.
3. If an encryption password is not yet stored on the Key, one should be added (see.
Controlling the file encryption password stored on the Key).
4. Press File Encrypt file(s)… .
5. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program
will ask you to go through the two- or three-factor authentication procedure.
6. The Select file(s) to encrypt dialog will appear once authentication is successfully
complete.
7. Type the name of the file(s) you wish to encrypt in the File name field. Selecting multiple
files can be done by holding Ctrl and clicking on them
8. Press Open to continue the operation.
Once the operation is successfully complete, the original files will be replaced with their
encrypted versions, which have the <.skf> extension.
© Dekart
- 32. 29 Secrets Keeper
Note. If an encryption password is not stored on the Key, the program will notify you about
that and automatically switch to the Encrypting files without using the Key mode.
Note. If Wipe file(s) after encryption is enabled, the original files will be deleted after
encryption. Otherwise, if the option is disabled, the original (unencrypted) files will be left
intact.
5.7 Decrypting files using the Key
To decrypt files using the Key, follow these steps.
1. Launch the application (according to the instructions given in the Starting the application
section).
2. Connect the Key to the computer.
3. Press File Decrypt file(s)… .
4. If the Key is PIN-protected, or if it was previously assigned a biometric ID, the program
will ask you to go through the two- or three-factor authentication procedure.
5. The Select file(s) to decrypt dialog will appear once authentication is successfully
complete.
6. Type the name of the file(s) you wish to decrypt in the File name field. Selecting multiple
files can be done by holding Ctrl and clicking on them.
7. Press Open to continue the operation.
© Dekart
- 33. Using Secrets Keeper 30
Once the operation is successfully complete, the decrypted files will appear in the same
folder.
Note. If an encryption password is not stored on the Key, the program will notify you about
that and automatically switch to the Decrypting files without using the Key mode.
5.8 Using Drag'n'Drop to encrypt/decrypt files
You can encrypt or decrypt a file via the Drag'n'Drop mechanism. To do that, click on an
initial or encrypted file with your mouse and drag it onto Secrets Keeper's window or Secrets
Keeper's shortcut or Secrets Keeper's icon. When the file is dropped, the
encryption/decryption procedure will be activated.
5.9 Encrypting /decrypting files via the context menu
Secrets Keeper allows you to encrypt and decrypt files via the context menu. You can do that
by right-clicking any file and choosing the appropriate option from the menu. If the file is
encrypted, press Decrypt (by Secrets Keeper) to decrypt it; otherwise, press Encrypt (by
Secrets Keeper) to encrypt it. The encryption decryption will be done using the program’s
current settings (with, or without a key).
5.10 Creating a Self-Extracting encrypted archive
Follow these steps if you wish to create a self-extracting encrypted archive:
1. Launch the application (according to the instructions given in the Starting the application
section).
2. If you wish to use a Key to access the archive, connect it to the computer. Note that if the
Key is PIN-protected, or if a BIO-ID is assigned to it, the program will also guide you
through the two- or three-factor authentication process once you reach step 7.
3. Press File Create a Self-Extracting encrypted archive or the ЕХЕ button located in the
program’s main window. The Create a Self-Extracting encrypted archive window will
appear on the screen.
© Dekart
- 34. 31 Secrets Keeper
4. Enter the full path and name of the self-extracting archive you plan to create in the
Archive Name field.
5. Enter the full path and full name of the file(s) you wish to be included in the encrypted
archive in the Added files field. Note. The file names your entered should be enclosed in
double quotation marks, and they must to be separated by spaces. Example:
"C:DocumentsWorktable.dat" "D:Files and Settingsstorage.inf".An alternative way
to add the files is to press the Add Files button and use the visual dialog.
6. Choose the file(s), and press Open. Selecting multiple files can be done by holding Ctrl
and clicking on them. The chosen files will be automatically added to the Added files
field.
7. Press Create.
8. If the program is configured not to use a Key when encrypting files, you will be asked to
enter the encryption password. Then press ОК.
© Dekart
- 35. Using Secrets Keeper 32
Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before
attempting to launch it; although it can be changed to any other extension during
transportation (ex: when the file is sent via email)
5.11 Using a Self-Extracting encrypted archive
To extract files from a self-extracting encrypted archive, follow these steps:
1. Start the EXE-file previously created by Secrets Keeper.
2. If a Key was used to create the archive, connect it to the computer and go through the two-
or three-factor authentication process (depending on whether the Key is PIN-protected, or
if a BIO-ID is assigned to it). If a Key was not used during the encryption process, the
program will ask you to enter the decryption password.
3. The Self-extracting SecKeeper archive window will appear on the screen. Press Browse
to choose the directory in which the files will be extracted.
© Dekart
- 36. 33 Secrets Keeper
4. Press Extract.
Note: make sure that the extension of the self-extracting encrypted archive is <.exe> before
attempting to launch it; although it can be changed to any other extension during
transportation (ex: when the file is sent via email).
5.12 Secrets Keeper and MS Office
Once Secrets Keeper is installed, you will see a new set of buttons in the toolbars of MS
Office applications, such as Word, Excel or PowerPoint. The buttons are “Save document as
encrypted”, and “Decrypt and open document”; they allow you to use Secrets Keeper directly
from MS Office.
When pressing one of these buttons, you will be asked to indicate the file you wish to encrypt
or decrypt.
© Dekart
- 37. Using Secrets Keeper 34
Depending on the program’s configuration (if it uses a Key to encrypt files or only a
password), you will be asked to connect the Key and perform the authentication process or
enter your password. Afterwards the encryption/decryption operation will be executed.
5.13 Wiping files
Secrets Keeper can securely erase any file, by filling its contents with random data before
deleting it.
To securely erase a file, follow these steps:
1. Launch the application (according to the instructions given in the Starting the application
section).
2. Press File Wipe file(s)… .
3. The Select file(s) to wipe dialog will appear on the screen. Type the name of the file(s)
you wish to erase in the File name field. You can also use your mouse to select a file;
selecting multiple files can be done by holding Ctrl and clicking on them
© Dekart
- 38. 35 Secrets Keeper
4. Press Open to complete the operation.
5.14 Getting information about Secrets Keeper
To obtain product-related information, press Help About.
The About Secrets Keeper window will appear on the screen.
© Dekart
- 39. Using Secrets Keeper 36
If the program is not registered, the window will look like the one shown in the Registering
Secrets Keeper section.
5.15 Closing Secrets Keeper
To quit Secrets Keeper, press File Exit or close the program’s main window.
6 Additional information
6.1 Biometric authentication in Secrets Keeper
If three-factor authentication is used (i.e. Enable Biometric ID verification in the Change
Biometric ID window is checked), Secrets Keeper will ask you to enter the PIN-code and
perform the biometric authentication. Depending on the biometric device you have, you will
be asked to perform a certain action (ex: pronounce a phrase, press your finger against the
scanner, etc). If the obtained biometric data do not match the BIO-ID stored on the Key, the
program will ask you to go through the biometric authentication process again.
Therefore, a person that possesses the Key is unable to use it unless their biometric features
are the correct ones.
© Dekart
- 40. 37 Secrets Keeper
6.2 Registering Secrets Keeper
To register the application, enter your registration information in the fields of the About
Secrets Keeper window.
If the trial period has expired, and the program is still not registered, the registration form will
be shown when the application starts.
© Dekart
- 41. Additional information 38
After entering the registration information, Secrets Keeper will continue to work; otherwise
you will not be able to use the program anymore.
If you use a trial version of the program, please, use the Dekart Buy on-line page to purchase a
registration number. After your transaction is processed, you will receive an email with the
registration number. If you use a licensed version of the program, you can obtain a registration
number at the Software Registration (Register) page at www.dekart.com.
6.3 Troubleshooting
Error messages
Message Possible cause Possible solution
© Dekart
- 42. 39 Secrets Keeper
ATTENTION! Bad PIN An incorrect PIN was entered. Repeat the operation,
code was entered! making sure that a valid PIN
is provided.
Attention! By entering an
invalid PIN multiple times
you can block the Key!
A list of Keys and their
maximum number of
invalid PIN entries is
provided in Specifications
of common Keys (PIN,
capacity).
Key is blocked The Key is blocked. To unblock the Key press
Key Unblock Key
Attention! If an invalid
PIN will be provided
during the unblock
procedure, the Key will be
permanently blocked!
KSD is not blocked yet The Key is not blocked yet There is no need to unblock
the Key as it is not blocked.
Confirm PIN does not The entered PIN doesn’t match Repeat the operation,
match the original PIN the PIN provided in the making sure that the PIN in
Confirm field. the Confirm field matches
the original PIN.
The PIN should be at The entered PIN is less than 4 Repeat the operation by
least 4 symbols long characters long. entering a longer PIN.
Error while processing An error occurred while Try to perform the operation
the Key. processing the Key again. If the problem
An error occurred while persists, contact Dekart’s
writing the password to technical support team.
the Key!
Error while writing data An error occurred when Make sure there is enough
to the KSD (Not enough attempting to write data to the free space on the Key. One
free space on the KSD) Key, most likely there is not way to do that is to use
enough free space. Dekart KeyManager.
© Dekart
- 43. Additional information 40
An error occurred while An error occurred when Try to perform the operation
creating the password! creating or changing the again. If the problem
An error occurred while password. persists, contact Dekart’s
changing the password! technical support team.
The Key does not The connected Key does not Connect a Key which
contain a password contain a password. contains a password and
required for the repeat the operation, or
encryption process! assign a password to the
The Key does not Key by pressing Key
contain a password Password… .
required for the
decryption process!
An error occurred while An error occurred while Check whether there are any
reading the source file! processing a file. applications which are
An error occurred while accessing the file. It is also
opening the destination possible that the file is
file! corrupt.
You are trying to The file you attempt to decrypt Secrets Keeper can only
decrypt a file that is not is not a Secrets Keeper decrypt files it has
a <.skf> file! encrypted file. previously encrypted.
The password you The provided password is Enter a valid password.
entered is incorrect for incorrect.
the given file
Biometric verification The computed BIO-ID does Go through the biometric
failed! not match the one stored on the authentication procedure
Key. again.
Note. If any other error message occurs, contact Dekart’s technical support team:
http://www.dekart.com/support/howto/howto-contact-us/ .
6.4 Specifications of common Keys (PIN, capacity)
Number of Maximum
Hardware PIN / Number of PIN
incorrect PIN amount of
Key name Dekart software unblock
input available
PIN attempts
attempts memory (kB)
Aladdin Dekart software
3 3 16, 32, 64
eToken PRO PIN
© Dekart
- 44. 41 Secrets Keeper
Aladdin
Hardware PIN ∞ - 16, 32, 64
eToken R2
Schlumberger Dekart software
3 3 4, 8
Multiflex PIN
Schlumberger Dekart software
3 3 8, 16
Cryptoflex PIN
Schlumberger Dekart software
3 3 4
Payflex PIN
Rainbow
Hardware PIN 3 3 8, 32
iKey 1000
Rainbow
Hardware PIN 10 0 8, 32
iKey 2000
Rainbow
Hardware PIN 10 0 8, 32
iKey 2032
Rainbow Dekart software
3 3 32
iKey 3000 PIN
Eutron
Dekart software
CryptoIdentity 3 3 32
PIN
ITSEC
Eutron
Dekart software
CryptoIdentity 3 3 8
PIN
4
Eutron
Dekart software
CryptoIdentity 3 3 32, 64
PIN
5
Datakey Model
Hardware PIN 10 0 8, 32
310
Datakey Model
Hardware PIN 10 0 8, 32
330
Dekart software
GemPlus GPK 3 3 2, 4, 8, 16
PIN
ruToken Hardware PIN 3 12 8, 16, 128
Note 1. A KSD can have a separate PIN for Dekart applications, or single a PIN for Dekart
applications and the device itself.
© Dekart
- 45. Additional information 42
Note 2. Most of the KSDs have a limited number of invalid PIN entries. If this number is
reached the KSD is blocked. If a valid PIN is provided during the unblocking procedure the
Key can be used again, otherwise it will be permanently blocked.
© Dekart
- 46. 43 Secrets Keeper
Dekart’s technical support 38
Index Drag and Drop 30
-E-
-A- Encrypting files
About the software 35 creating a self-exctracting archive 30
Authentication in the toolbars of MS Office applications 33
biometric authentication 1, 36 in the toolbars of Word, Excel, PowerPoint 33
three-factor authentication 1, 36 using Drag'n'Drop 30
two-factor authentication 1 using the Key 28
via the context menu 30
without using the Key 26
-B- Error messages 38
Exit 36
BIO ID 1, 2, 36
add 23
change 25
biometric 2
-G-
Biometric ID 36 Glossary 1
-C- -I-
Changing the parameters of a Key Installation 5
add / chande / delete BIO ID 17 Installing Secrets Keeper 5
add / chande / delete password 17
add / chande PIN 17
unblock Key 17 -K-
Closing 36 Key 1
Configuring the application 17 Key Storage Device 1
Controlling the password Key 1
add 18 KSD 1
change 18 KSD 1
delete 18
-D- -L-
Launch application 16
Decrypting files License 1
extract files from a self-extracting archive 32
in the toolbars of MS Office applications 33
in the toolbars of Word, Excel, Powerpoint 33 -M-
using a self-extracting archive 32
using Drag'n'Drop 30 Memory 40
using the Key 29
via the context menu 30
without using the Key 27
-P-
Dekart contact information 1 Password
© Dekart
- 47. Index 44
Password
cryptographically strong 18
quality 18 -W-
Personal Identification Number 1, 2
Wipe files 34
PIN 1, 2
PIN code 40
change 20
unblock 22
-R-
Registration 37
Requirerments
hardware 3
software 3
-S-
Secrets Keeper
essential advantages 2
functions 16
security principles 2
Secrets Keeper's options
<.skf> file extension 17
check for updates 17
compress the file before encrypting 17
use the Key to access encrypted files 17
Securely delete files 34
Securely erase files 34
Smart card 40
Supported devices
biometric devices 3
key storage devices 3
-T-
Token 40
-U-
Unblock Key 22
Uninstalling Secrets Keeper 15
Update Secrets Keeper 12
© Dekart