It is also a headache for sensitive, private, or important documents or websites at work, highly confidential data, etc. In this era of the prevalence of intelligent hardware, the birth of the CEIN Wukong Finger Vein Recognition Mouse launched by iYi Biotechnology has solved this problem, CEIN Wukong Finger Vein Recognition Mouse is equipped with a finger vein recognition module. By gently placing your finger, you can obtain vein information and accurately authenticate your identity, so as to achieve multiple accounts. One finger binding, fast login, and no memory is required. Thanks to Lei Feng's trial website( //www.leiphone.com )Probation opportunities given.
1、 Unpacking
There is relevant packaging information and driver download on the back of the package.
Open the box, and only one corner of the mouse is exposed Fixed the mouse, so that the mouse firmly lies in the center of the sponge; certain Let you have a lot of associations, what kind of mouse this is! In addition, there is a manual and a letter to the kids
Take out the mouse and expose your whole body to your eyes. This is: CEIN Wukong Finger Vein Recognition Mouse. The scroll wheel is made of rubber without horizontal lines, with moderate damping, soft feel, and quick, powerful, crisp and natural rebound of keys.
The packaging protection is good. The sponge is used up and down, which reduces the impact on the mouse directly during transportation. In addition, if the wireless mouse can be used, it will be of a higher level.
2、 Installation and use of drive:
If the driver is not installed, it can be used as an ordinary mouse.
For finger identity authentication, the mouse needs to learn first, that is, the user's finger is put into the viewfinder for intravenous memory, so as to facilitate future reference and comparison; This technology is to identify the identity of people by using the vein vessel pattern obtained after the near-infrared ray penetrates the human finger, and to obtain the vein vessel image by using the near-infrared ray absorption of a certain wavelength by the human vein vessel, and to identify the identity of people by converting it into a characteristic code through a unique algorithm
This function is very practical for locking or hiding important files. For example, if you select "hide", you can't see the copy in the directory. When you select "lock", you can't encrypt and prevent the copy and deletion of important files.
You can add or change passwords or add mouse users at any time
3、 Environmental testing
4、 Summary and suggestions
I think the main highlight of this mouse is to lock or hide important files. This function is very practical. If you select "hide", you can't see the copy in the directory. When you select "lock", you can't encrypt and prevent the copy and deletion. In addition, it can accurately authenticate the identity, so as to realize multiple accounts. One is binding, without memory;
Suggestions:
Currently, there are not many websites supported by the websites selected for binding. On the premise of security, it is recommended to add them independently. In addition, at present, you need to enter the software portal and click to enter directly. It is recommended to authorize direct access in the browser after starting the software, which may be more convenient.
360 will remind and report viruses during installation. It is recommended to be authenticated by current general anti-virus software, so that users can rest assured.
proposal It is more convenient to use wireless.
The article on the trial of iGo is completed by netizens, which does not represent the views of this website.