Intelligent security - [CEIN Wukong finger vein recognition mouse]
Intelligent security - [CEIN Wukong finger vein recognition mouse]
2016-08-31 01:17

It is also a headache for sensitive, private, or important documents or websites at work, highly confidential data, etc. In this era of the prevalence of intelligent hardware, the birth of the CEIN Wukong Finger Vein Recognition Mouse launched by iYi Biotechnology has solved this problem, CEIN Wukong Finger Vein Recognition Mouse is equipped with a finger vein recognition module. By gently placing your finger, you can obtain vein information and accurately authenticate your identity, so as to achieve multiple accounts. One finger binding, fast login, and no memory is required. Thanks to Lei Feng's trial website( //www.leiphone.com )Probation opportunities given.



1、 Unpacking

  • The packing box is exquisite. The box is pure black, with the eye-catching logo of CEIN in the middle. It is mysterious because of the purple color.

     

  • There is relevant packaging information and driver download on the back of the package.


  • Open the box, and only one corner of the mouse is exposed Fixed the mouse, so that the mouse firmly lies in the center of the sponge; certain Let you have a lot of associations, what kind of mouse this is! In addition, there is a manual and a letter to the kids

     


  • The exquisite thank-you letter is sincere and warm.


  • Open Shanghai Cotton, and a complete mouse appears in front of you. The first print is strange. I want to know what these LEDs are used for and what the glass window is for?

  • Take out the mouse and expose your whole body to your eyes. This is: CEIN Wukong Finger Vein Recognition Mouse. The scroll wheel is made of rubber without horizontal lines, with moderate damping, soft feel, and quick, powerful, crisp and natural rebound of keys.

  • Product parameters and function description:


The packaging protection is good. The sponge is used up and down, which reduces the impact on the mouse directly during transportation. In addition, if the wireless mouse can be used, it will be of a higher level.

2、 Installation and use of drive:

     

If the driver is not installed, it can be used as an ordinary mouse.


  • Open the browser and click "Download mouse software"

  • 360 will remind you and report the virus during installation. Click "Allow all operations of the program". It is recommended to be authenticated by the current general anti-virus software, so that users can rest assured!

  • Registration required for first use


  • For finger identity authentication, the mouse needs to learn first, that is, the user's finger is put into the viewfinder for intravenous memory, so as to facilitate future reference and comparison; This technology is to identify the identity of people by using the vein vessel pattern obtained after the near-infrared ray penetrates the human finger, and to obtain the vein vessel image by using the near-infrared ray absorption of a certain wavelength by the human vein vessel, and to identify the identity of people by converting it into a characteristic code through a unique algorithm


  • Select the binding website for direct access in the future. Currently, there are few websites supported. It is recommended to add them on your own under the premise of security

  • This function is very practical for locking or hiding important files. For example, if you select "hide", you can't see the copy in the directory. When you select "lock", you can't encrypt and prevent the copy and deletion of important files.


  • After the screen is locked, the corresponding finger vein learned before scanning can be opened. Of course, pressing F1 can also be opened by entering a password.

You can add or change passwords or add mouse users at any time


3、 Environmental testing


4、 Summary and suggestions

I think the main highlight of this mouse is to lock or hide important files. This function is very practical. If you select "hide", you can't see the copy in the directory. When you select "lock", you can't encrypt and prevent the copy and deletion. In addition, it can accurately authenticate the identity, so as to realize multiple accounts. One is binding, without memory;

Suggestions:

  •   Currently, there are not many websites supported by the websites selected for binding. On the premise of security, it is recommended to add them independently. In addition, at present, you need to enter the software portal and click to enter directly. It is recommended to authorize direct access in the browser after starting the software, which may be more convenient.

  • 360 will remind and report viruses during installation. It is recommended to be authenticated by current general anti-virus software, so that users can rest assured.

  • proposal It is more convenient to use wireless.

Share:
The article on the trial of iGo is completed by netizens, which does not represent the views of this website.
ordinary
He likes to play with some smart hardware. He is a smart hardware expert. Today's headline: smart hardware sharing hall
Share Weibo Share WeChat
 Aigoji WeChat

Aigoji WeChat

 WeChat

WeChat

Recommended products

Sorry, the product you are looking for is not available in the product library

on trial