Summary
Complexity – Intermediate
Time needed – ~20 minutes
The functionality of your Palm handheld can be extended by turning it into an authentication key on which encryption passwords and user profiles are stored. You will be able to use your Palm to protect access to your computer and use it instead of typing the passwords.
You will also enjoy the safety of having all your important documents on it – all protected by strong 256-bit AES encryption. You can easily do this by using a smart combination of Dekart and Softick software.
It will take you only a few minutes to learn how to make your Palm an all-in-one solution – a handheld, a security token and an encrypted disk. We hope this guide will help you increase the value of your Palm – by making it a secure and efficient solution for protecting your private data.
Why?
By mounting your flash memory card (or internal memory) to your desktop PC, you can store your encrypted files on it. You will be able to decrypt your files on any computer to which your Palm can be connected.
The major advantage is that your Palm is not only your Portable Digital Assistant, but also your own Portable Encrypted Storage Device or Portable Encrypted Disk.
It is also your Personal Security Key. You will be able to log on to a Windows domain or your laptop by simply connecting your Palm to the computer. Additionally, you can use it to log on to a terminal server, Citrix servers or Lotus Notes, etc.
Take a look at some sample scenarios:
My Palm is my key
My Palm is my private safe
My Palm is my everything
Why is this approach a better one?
The answers are simple:
With these facts in mind, it is clear why the common approach to the security of your data would not be appropriate for you:
- You can write it down on a piece of paper, someone can read it.
- You can make errors when typing it, so it will take you more attempts to fill it in, hence someone has more chances to see the keys you're pressing.
- Usually people use the same password for all their accounts in order to not forget it. A single flaw, and all your privacy is vanished; while storing the passwords on the PDA will save you from all the trouble.
Most of the Palm owners get so attached to their devices that eventually the PDA becomes a part of them. In this case, this is probably the most private solution from all the private solutions you could possibly ask for!
Mixing the components
One of the most important features of the applications we are about to use is their transparency. This means that you are able to combine these programs with any kind of software, without having to worry about potential compatibility issues.
The next important aspect is based on their distinctive features: unrestricted mobility, and enhanced security.
The final result is transparent mobile security.
Sample scenarios
Forget about passwords and embrace the new secure authentication method – Dekart Logon and Card Export II.
This is the most popular scenario. If you have a PDA with a flash memory card (either SD or MMC), you can store the key-file on the Palm. As a result, you will not have to enter a password when logging in; all you have to do is set the handheld in the cradle and connect it to the desktop via Softick Card Export. Dekart Logon will automatically detect it and log you in.
For a more secure authentication, you can set a PIN code, which will be used to encrypt the key-file on the handheld. In this case, nobody will be able to log in, even if the PDA was stolen, or someone duplicated the contents of the flash memory card. Read this guide to learn how to choose a strong PIN code.
To accomplish this, follow these steps:
On the PDA
On the desktop
Forget about passwords and embrace the new secure authentication method, even if you don't have external flash cards – Dekart Logon and RAM Drive + Card Export II.
If you have a PDA but no flash memory card, you can emulate one by using the free space of your Palm's internal memory. In this case, you will not need any external cards – all you need is the PDA itself.
As in the previous situation, you should encrypt the key file so that your security is not compromised even if the handheld gets stolen or lost.
To accomplish this, follow these steps:
On the PDA
On the desktop
Note: in both cases you can use any program from the Dekart Logon series , not only the version for Windows authentication. You can choose between Logon for Lotus Notes, Terminal Logon, Logon for Citrix ICA Client.
Note: you can use all these products simultaneously and use the same Palm to logon to Windows, terminal servers and Citrix servers with the same convenience and security.
Turn your Palm into an AES 256-bit encryption device – Dekart Private Disk and Card Export II.
If you have a PDA with a flash memory card (either SD or MMC), you can store your important documents on it. Forget about CD's or USB flash drives, use your Palm to the max instead.
To accomplish this, follow these steps:
On the PDA
On the desktop
The Palm as a second or third authentication factor – Dekart Private Disk Multifactor and Card Export II.
If you are a power-user who seeks maximum security, you can use the PDA as a second or third authentication factor when decrypting your files; i.e. it is used as a key, along with biometric authentication and a usual password.
To accomplish this, follow these steps:
On the PDA
On the desktop
You can use the programs described above together. In other words, the PDA can be a security key and an encrypted disk at the same time. None of the applications will conflict with each other.
The ingredients
Depending on what you intend to do; you will have to install the required applications. Consult these manuals to find out how to install each application:
More detailed descriptions of these applications can be found here.
Q&A
Card export related
The list can be found in the Card Export installation manual.
You should use the "disconnect removable device" feature by clicking the icon in the system tray. Afterwards, press 'disconnect' on your Palm.
In Windows XP you can remove it right away, because this OS is optimizes the external devices for 'quick removal'. If this setting is changed, or you have a different OS, we suggest you use 'safe hardware removal'.
Card Export will only allow you to mount the card to the desktop if you use the cradle.
Use the supplied driver, it is located in Card Export's distributive.
Contact support@softick.com.
Dekart products related
We have a rather extensive list of tutorials on our site, check these pages:
General questions
As we stated earlier, you can apply virtually any software that involves encryption, authentication, external memory cards, or Palm handhelds. For a start, you should take a look at these: Card Export II, RAM Drive, Blue Files, Private Disk , Private Disk Multifactor , Dekart Logon , Secrets Keeper. But we encourage you to experiment with other applications, and contact us if you found something new, so that we
Contact us if you did not receive the registration key after your purchase
How to help us help you
Learn how to protect your data and use our software
USB flash disks, smart cards, tokens, biometric devices
Will your hardware device work with Dekart software?
User guides for Dekart products
Thank you for contacting us.
We will get back to you as soon as possible
Oops, there was an error sending your message.
Please try again later