Profile Avatar

Loretta

About Me

There is no biography information from this user

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;Click to download

Thank you very much for using the JESIS J1 fingerprint mouse product. By installing the pointing JESIS-ID software, you can intuitively and quickly manage the fingerprint information in the Windows system, realize Windows fingerprint login, and encrypt important files and folders. Decryption, or through its management of Internet accounting, provides you with an unprecedented web page fingerprint quick login experience. This user manual will give you a complete description of the various features of the above JESIS-ID software.

?

First, how to install

Second, start using

1.Windows fingerprint login and management

2. Internet account password management

3. File, folder encryption and decryption

4. Setting and use of confidential areas

5. Private key backup and restore

1) Access Pointing Mouse:

First of all, please refer to JESIS J1 fingerprint mouse to the computer's usb able backup software, www.backupusb.com, interface.

2) Get the installation package:

Visit www.jesistech.com Click the driver download page to get the JESISIDInstaller.exe installer. If it is a compressed package, extract it and get the exe installer, as shown below.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

3) Run the installation package:

Double-click the exe installation package will enter the installation wizard interface, submitted to the next step after accepting the terms.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

* Mouse not connected. Reminder: If you do not insert the JESIS J1 Fingerprint Mouse, you will see the following prompt. You can click Ignore for the next step, or insert the JESIS J1 fingerprint mouse and click Retry. 'To continue.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

4) Registration Login:

Sign up for the Think \u0026 Lenovo account and complete the login.

5) Installation is complete:

After the installation is complete, the JESIS-ID driver will open automatically and the main operation interface will appear on the computer screen.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

You can find the quick start of the JESIS-ID on your desktop at any time.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

When the program is started, you can also find the JESIS-ID icon in the tray hidden icon in the lower right corner of Windows, and double-click to call up the main interface of the software.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

1.Windows fingerprint login and management

After installation, we need to enter and register the fingerprint in the JESIS-ID. After that, you can enable the Windows Hello fingerprint login function. Compared to the standard fingerprint management function of Windows, you can not only manage each fingerprint visually, but also enjoy the functions of fingerprint encryption of files, folders, file cabinets, and fingerprint login of Internet accounts.

1.1 Entering the First Fingerprint for Windows

1) Please click 'Fingerprint Maintenance' option on the main interface of JESIS-ID.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2) When entering the fingerprint for the first time, you need to enter the correct Windows account password and click 'Login'. After this, the fingerprint will be verified directly when you enter this.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Remarks: Microsoft requires the system password and PIN code to be set before using fingerprint in Windows. The method is as follows: Click the Windows icon in the lower left corner of the system → click on "Account" → change account settings → login options → set password / PIN code

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

3) Tap a finger on the interface where you want to register the registered fingerprint.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

4) Follow the on-screen text prompts, according to the finger of your choice, after placing 18 to 20 times on the fingerprint reader on the front of the mouse wheel, the fingerprint will be successfully entered. Each successful scan will continue to increase the recognition accuracy of your fingerprint by the mouse pointer, and will continue to optimize the identification of your fingerprint in each subsequent fingerprint recognition.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Remarks: JESIS-ID will correctly identify every fingerprint you enter. If you use the same finger for the second entry, you will see the words "Double Registration". At this time, please replace the other fingers that have not been entered yet. Continue to enter the steps.

5) After the entry is completed, the finger you just selected will be enabled on the interface and the symbol '' will appear on the finger.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

6) At the moment, you can press "Win+L" to try to lock Windows, and verify that the PIN code is locked after you log in once. You can immediately use your registered finger to prevent authentication on the fingerprint reader to use Windows Hello. The function directly logs in to the system, eliminating the step of entering complex passwords.

Note: If you log in using a Windows domain account, it may be affected by your security policy and it may block the fingerprint login function. If you encounter a sub-case please contact your network administrator to help you open it.

Tip: You can set different finger fingerprints on different Windows accounts to quickly log in to the account through the corresponding fingerprint on the lock screen.

1.2 Management fingerprint

1) Click on the entered fingerprint in the fingerprint maintenance interface to delete it individually

2) Enter the Windows Fingerprint Database by clicking on the 'Fingerprint Management' option to perform batch maintenance on all registered fingerprints.

Note: This part of the fingerprint contains all the fingerprints that you have registered on the Windows system.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2. Internet account password management

With the JESIS-ID driver software, you can remember this complex account and password by using JESIS-ID when accessing a website that requires an account password. This allows you to directly enable safer access the next time you visit the site. The fingerprint login function eliminates the need for password memory errors or troublesome input. At the same time, it will not lose its security due to lack of authentication as the original password memory function of the browser.

Before enabling this function, you need to install the "Website fingerprint verification login tool" which is officially certified by Microsoft IE or Google Chrome browser as follows:

Note: Browsers that require Google Chrome V63 or IE11 and higher (other browsers that use the Chrome Core can also install this extension, such as 360 Extreme Browser, QQ Browser, etc.).

2.1 For IE11 Browser Users

1) Enable: When the JESIS-ID is installed, when the Internet Explorer is started for the first time, the following prompt will ask whether to enable the add-on. Please select 'Enable'.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2) Check if it is enabled: Available in IE's Settings - Manage Add-ons page

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Confirm that the 'Review Web Fingerprint Verification Login Tool' add-in is 'enabled'

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2.2 For Chrome Browser Users

1 Manual installation: Because mainland regions cannot access the Chrome App Store, you need to manually install the "WebScan Fingerprint Verification Login Tool". The steps are as follows:

1) Open Chrome's extension manager page: Settings - More tools - Extensions

2) Find the 'JESIS-ID-WebAutoLogin.crx' file in the C:\\JESIS-ID_Utility directory, and drag it to the Chrome extensions management page to install it.

As shown below, please confirm adding and enabling this Chrome extension.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

And check that it's enabled

2 Automatic installation: If you have direct access to the Chrome Web Store, the 'JESIS WebAutoLogin' extension will be installed automatically when you open the Chrome browser. Please agree to the installation of this additional program.

Also, like the 'Add manually' step, confirm adding and enabling this Chrome extension.

Precautions:

If the computer itself is equipped with '360 security guards' or 'computer stewards', although the 'Website fingerprint authentication login tool' has passed the above software certification, but in the process of installing this browser login tool due to version updates, may still A false alarm box will appear. Please follow the steps below to allow the program to operate and quickly and completely install the software.

360 security guards:

When you get out of the prompt box: 1) Check "Do not remind again" 2) Drop-down option select "Allow all operations of the program"

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Computer stewards:

When you get out of the prompt box: 1) Check "Remember my choice, don't remind me later" 2) Option to select "Allow"

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2.3 Formally Use JESIS-ID for Internet Account Password Management

1) Click 'Password Management' on the main screen.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2) After verifying the fingerprint, the account management interface will appear. You can click the 'New Login Account' button in the upper right corner to start the account recollection step of the website.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

3) Please use one of the browsers to access the website you need to log in. (The specific supported websites can be found in the official website.) Here is an example of Jingdong Mall https://www.jd.com/. Go to "Login." After the interface, enter the account, password, and verification code in the login box, and click Login.

4) At the moment, the following pop-up window will appear. Please select "OK" to make JESIS-ID remember this account and password to the local PC.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Note: You can visit more sites and repeat the above process to remember more website accounts and passwords.

5) After selecting "OK", you can see in the account management interface that Jingdong Mall’s account has been successfully added to the list.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

6) You can use the right mouse button to operate on accounts that you want to 'Log in,' 'Edit,' or 'Delete.'

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

7) When you add more sites, it may happen that the list is too long and not categorized and difficult to manage. At this point, you can add a folder by clicking the "New Folder" button on the interface, for example, "Shopping", and move shopping-related websites to the folder by dragging them to the folder. Classified management of saved websites.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

8) At any time, you can double click on the account in the account password management interface, or visit the memorized website and click on the login. All the login options will be popped up to verify the fingerprint. After successfully verifying the fingerprint or the Windows login password, The website will be immediately logged in, making it easy to use.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2.4 Exported and Imported Recorded Website Secrets

The output/input function in the lower right corner of the interface allows you to back up the account secrets of websites that have been recorded before, so that you can copy them to another computer for use. Common situations such as copying the account secret at home to your company's computer can also be easily fingerprinted. Log in and use the import and import steps as follows:

Export:

1) Click the output button in the lower right corner of the account management interface

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2) Reasonably select an exported path, set the file name, and set a protection password for secondary encryption. Click 'Export' to find the exported backup document in the output path folder.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Import:

1) Click on the enter button in the lower right corner of the account management interface

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2) Select the previously exported file, enter the protection password, click 'Enter'

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

note:

After importing, you must first close the list screen, re-click "Password Management" and verify the fingerprint, the imported account password will be useful.

3. File, folder encryption and decryption

With the JESIS-ID driver software, you can encrypt and decrypt files and folders.

3.1 File Encryption and Decryption

1) Move the mouse pointer over the file you want to encrypt. Right-click the mouse and select 'JESIS-ID File Encryption' in the menu.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2) The file or folder being operated at this time will be encrypted immediately.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

3) If phosphorous you want to perform the decryption operation, double-click the encrypted file or folder. At this point, the fingerprint verification interface will pop up. You can choose to verify the fingerprint, or use the Windows login password to decrypt.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Remarks: 1) The empty document cannot be encrypted\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;2) The document is encrypted in this way, and it is restored to the unencrypted normal state after decryption.

3.2 Unencrypted area description

In order to ensure that users do not incorrectly encrypt key files on the system and cause the system to crash, we shielded and encrypted the following paths:

1) The disk drive itself;

2) Any file/folder with system properties;

3) Any file/folder located in the 'System Start Menu Path';

4) Any files/folders located in the 'System Windows Folder';

5) Any files/folders located in the 'System Program Files';

6) Any file/folder located in '%Appdata%';

4. Setting and use of confidential areas

In addition to encrypting individual files and folders, you can also set a private area at a specified location.

When the files are copied, newly created, moved, dragged into the secret zone, these files will be automatically encrypted.

You can also quickly add files for the privacy zone by dragging the file directly onto the function icon in the 'Privacy Zone' on the file management interface. In the security zone, you can open the encrypted file by double-clicking the file to verify the fingerprint or Windows password. After editing the archive, the files will be pertain automatically encrypted again.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

note:

Images, photos, music and other files may be automatically encrypted after they are turned on, which may cause reading problems. Therefore, it is not recommended to run these files directly in the confidential area.

Establish a confidential area:

1) Click the 'Privacy Zone' function on the main screen.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2) The following encryption area maintenance interface will be opened.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

3) After clicking the 'Add' button, the interface for creating a new specified directory will open.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

4) Click the folder icon key on the right side of the directory path bar to open the path specification window. Here you can specify the path to your confidential zone.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

5) Next, enter the name of the secret zone directory in the sub directory name field and click Add

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

If you set the subdirectory name to blank, the directory path location specified above will become a private area.

All files in the secure area will be automatically encrypted unless they are 0 bytes in size or are already locked.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

5. Private key backup and restore

In order to ensure that you use the file encryption and decryption functions safely and conveniently in multiple scenarios (for example, encrypting documents and replacing the mouse between two PCs or partners in the office and home), we will install the JESIS-ID on your The PC locally generates a unique private key. And this private key can be encrypted and exported to your designated device. Through this private key transmission mechanism, encrypted and synchronized backup functions between different devices and the same device are realized.

Therefore, this private key is very important. It is strongly recommended that you back up and keep this private key as a priority. In order to avoid re-generating the private key after reinstalling the Windows system, the previously encrypted file cannot be decrypted

The steps for exporting, importing, and restoring the private key are as follows:

Click the backup icon in the lower right of the interface, the following will pop up the export and import private key interface:

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

1 private key backup:

Click on 'Output Confidential Private Key' for private key backup.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

The path to be exported is properly selected, the name of the backed up file can be modified or the automatically generated name can be used directly, and a protection password can be set for the private key file for secondary encryption.

After successfully exporting, you will see the following interface,

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Can find the private key just exported in the specified directory, as shown

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

2 Private key restoration:

Click 'Import Confidential Private Key' to restore the private key.

Note: The import of the private key will overwrite the existing private key of the JESIS-ID. If you have used the existing private key to encrypt the file, be sure to back up the existing private key or decrypt all encrypted documents.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Select 'Confidential Private Key Import' and select the previously backed-up private key file in the following window, enter the originally set protection password and click 'Import' to complete the private key import operation.

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

You will see the following interface after successful import

\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Location

There is no location information for this user

87 Rue De La Boetie
Poitiers, CENTRE
France
86000

Ways To Get In Touch

There is no contact information from this user
  • Telephone 05.66.87.43.09
  • Email
  • Website http://www.backupusb.com/
  • IM

Menu

Activity Feed

My Profile