Authentication in Windows/Mac with BlueTooth device

The Rohos Logon Key enables to use wireless devices equipped with Bluetooth for computer security (login, authentication, lock/unlock). Your mobile phone or pocket PC, Palm, Nokia plays the role of your access key from your PC or Mac:

  • Automatic Windows/Mac logon when a user approaches the computer (with the mobile phone).
  • Computer will be protected with a password, but you don’t have to enter it manually.

Rohos Logon Key is a genuine authentication solution with complete password replacement, and not just a primitive PC locker like many other programs where you have to enter a password manually anyway for logon.

A version for Mac OS X is available also.

How it works:

  • A Computer or Notebook should have a Bluetooth adapter.
  • The Rohos Logon saves your phone ID in a wireless way (Bluetooth Mac address).
  • When the phone is near your computer,  access to it is open: automatic logon or it gets unlocked.
  • Also, if you step away from the computer, it will automatically be locked within 5-10 seconds.

* You shouldn’t install additional programs onto your mobile phone or Pocket PC.

How to set up mobile or Pocket PC login:

First step:

  • First, you should install the Rohos Logon Key (Windows) or Rohos Logon Key for Mac.
  • In the main window screen open dialog box “Options” (or ‘Preferences’ for Mac).
  • In this dialog box for the type of device used as a USB key choose Bluetooth Phone/Pocket PC.

Rohos preferences in Mac OS X:

Second step (Windows):

  • In the main Rohos window click “Set up USB flash drive”. In the dialog box should appear the name of the Bluetooth device, that was detected within the radius of coverage. (For the device to be detected by other devices you should turn on mobile or Pocket PC Bluetooth feature).
    • Please wait up to 30 sec till Rohos Logon detects your mobile device
    • Rohos Logon may show dialog box with multiple Bluetooth devices list, please select yours device and click OK.
  • In the dialog box enter your Windows login password (if you do not use any password, create one) and click ‘Create USB Key’.
  • Now you can restart computer

Second step for Mac:

  • Click “Choose your USB Key device” button, wait till your Bluetooth device appears in the list and click OK.
  • Enter your Mac OS X password

Restart or log off Windows/Mac, please wait 5-10 seconds. Rohos Logon Key will detect mobile phone within the radius of coverage and will automatically log on.

Bluetooth Logon Security:

This software solution is safe from the point of view of computer security:

  1. Rohos Logon Key doesn’t save any passwords either on a phone or on Pocket PC.
  2. Your logon password is saved on the local computer in encrypted form.
  3. The program saves your mobile phone unique identity (Mac address), that is  impossible to falsify.
  4. If you left your phone at home you might use the usual password or emergency logon (that’s offered by Rohos Logon).

Bluetooth operating radius

Bluetooth operating radius may be up to 150 meters. Thus, auto-lock may work not as fast as a user would like it to.

How fast does it lock and unlock Windows

Rohos Logon may detect when the Bluetooth device is within visibility range very quickly, so Windows unlock by Bluetooth may take up to 9 seconds.

Vice versa ‘Bluetooth device is away’ detection works slowly. It can take up to 40 seconds to lock your Windows when the phone is out of the range. It is due to prevent false Desktop locks by the program, because sometimes Bluetooth hardware looses connection for seconds. And Rohos Logon always waits for an extra time to ensure the mobile is away.

How to set a longer time-out to lock the computer when Bluetooth device is away

If you don’t want Rohos Logon to lock you desktop each time you step away from your PC just for a moment you can set up a bigger timeout.

Open regedit.exe go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Rohos
and change USB_Key_remove_behaviour to “60” .

60 means that when Bluetooth device is away after 60 seconds Rohos Logon will lock the desktop (minimum value is 35 seconds).

Known issues

  • Bluetooth adapter is installed, but the programs doesn’t detect your phone please, make sure Bluetooth adapter is compatible with Windows and there is Bluetooth blue icon near system clock. Please note: while in all the Rohos dialog boxes is used the term ‘USB flash drive’, it is presupposed to be your Mobile Telephone Bluetooth. This appears to be so because initially the Rohos Logon Software supported only USB flash drives as a USB Key for PC access. The range of the software compatible devices is wider now.
  • Rohos Logon does not lock the desktop when I turn-OFF Bluetooth on my phone or step far away for a long time. – Make sure you set a removal behavior in Rohos Options (Lock the desktop upon USB Key removal).
    – Make sure you previously log in or unlock your desktop by using Rohos Logon + Bluetooth mobile. Each time you unlock Windows by a password stops Rohos Logon  tracking the mobile radio.
    – Make sure your set up your mobile phone exactly but not anyone else in the range of visibility. On the Setup USB Key Dialog box you can see your phone name. If it is not your phone name click “choose”and select your phone.
  • Rohos Logon Key logs into Windows automatically even if my phone away.
    – Open the program and click ‘Setup USB Key’ dialog box. If the program anyway detects your mobile (that is away or OFF at the moment) it means there is another technical issue, please contact us.
  • I use iPhone 3G, iPhone 3GS or iPhone 4 but the desktop is locked immediately after login
    – Please note iPhone iOS automatically disables Bluetooth radio if there is no program that use it.
  • I use wireless keyboard and mouse, and can not log in with Bluetooth and my phone.
    – Sometimes two Bluetooth adapters can not work along. So, either keyboard and mouse, or other BT adapter will not work. Select another type of USB key.

System Requirements:
Hardware:

  • Any Laptop with Bluetooth hardware or desktop PC + Bluetooth dongle. (Read notes about Toshiba notebooks)
  • Any Mobile device with Bluetooth feature, such as mobile phone or PDA.

Operating Systems:

Bluetooth Driver:

  • Microsoft Bluetooth stack drivers – works perfectly.
  • WidComm Bluetooth stack- works perfectly.
  • BlueSoleil Bluetooth stack drivers – works not so well. Depends on the version.
  • Toshiba Bluetooth stack – Used on almost all Toshiba notebooks. It’s almost impossible to use it for logon due to API design. Please search for a solution to reinstall WidComm Bluetooth stack over.

Compatibility status:

Rohos Logon Key for Windows was tested on Laptop models: Acer Aspire, Lenovo, Samsung. And the Mac version was tested on Apple PowerBook G4, MacBook and MacBook Pro models.

How to secure your Computer by using eToken

Computer and Data Security with eToken

Windows authentication and encrypted disk access by using eToken.

Briefly: The popular eToken now can be used in the programs Rohos Logon Key and Rohos Disk as an integrated Key for login into Windows and for data security.

Security advantages with USB flash drive eToken:

  • Full support for Windows Vista.
  • Login onto remote desktop Windows Terminal Services.
  • Usual password login can be disabled.
  • Setting PIN code (1111) by default, the program will remember it and will no longer ask for it.
  • Possibility of managing USB token remotely.
  • Rohos Logon Key works in any Windows logon configuration (including Windows XP welcome screen, Windows Vista, Novell Client Login, Active Directory)

Windows logon with eToken

The Rohos Logon Key sets reliable 2-factor authentication – when it’s possible to access Windows only if you have USB token or know a password (PIN code).
All that the user should do is to insert eToken into the USB port and enter PIN code.

Rohos Logon Key is the only program that full-featuredly works with Windows Vista, and supports remote desktop authentication by using eToken.

Advantages of using eToken in Rohos Logon:


Full support of Windows 7 including: remote desktop access, automatic password change by Admin’s objective, work in Windows Active Directory (Windows AD), UAC support – access to administrator’s password with eToken in authorization privileges dialog box. To learn more: Rohos Credential Provider.

  • Emergency login – helps to log in Windows if eToken is broken or lost
  • Protects computer even in Safe Mode
  • Possibility to use several eTokens to log in to one computer, and vice versa one eToken for several computers
  • Rohos Logon Key takes 4kb on eToken and is compliant with other programs that use eTokens

Using eToken and Rohos Logon Key in network

Rohos Logon Key supports work in Windows Active Directory.  Rohos management tools enables to easily set up the program and eToken on multiple workstations remotely.

Rohos management tools contains two utilities:

  • USB key management Utility – is used for setting up any token for authentication on workstations in network (create/delete profiles on eToken, create backup copy, PIN code, setting-up eToken for remote desktop).
  • Rohos Remote Admin Utility – enables to change Rohos Logon Key settings on remote computer connected to Active Directory. Enables to change the following settings: logon is allowed only by using eToken, action after eToken’s removal, eToken blocking for certain users and others.
  • MSI installation package

Setting-up eToken in Rohos Logon Key:

  • First you have to install Rohos Logon Key
  • In the main window open “Options”

  • In this dialog box the type of device used as a key for login choose eToken (this option may be installed by default in MSI package features)
  • In this dialog box can be installed different options for USB Key. Details are in “Help”.

You should set up eToken for system login in the dialog box “Set up USB token”

Rohos Disk – data security with USB key eToken:

USB token eToken can also be used as an access Key to the encrypted disk in program Rohos Disk.

Rohos Disk program is a convenient solution for data security:

  • Encrypted disk works autonomously: logging in the system with USB key eToken the disk becomes user-availablе
  • When USB Key is removed the disk is invisible
  • Integrated shredder-file helps to move files and folders to Rohos Disk and erase the originals
  • At the end of work session documents’ shortcuts on the desktop are automatically hidden on Rohos Disk
  • Disk’s icon is available in MS Office and other applications for fast logon
  • Rohos Disk has portable partition that can be installed on USB flash drive for portable work with encrypted disk right from the USB flash

Setting e-Token:

Specifications:

In order to run Rohos Logon properly the requirements are the following:

  • Any Windows
  • 2Mb free space on disk
  • Admin’s privileges to install the program
  • Installed drivers of eToken (with PKCS11 module rtpkcs11.dll )

Rohos Logon Key also supports:

  • Windows XP/Vista x64 version

Requirements for eToken:

  • 2kb free space

Rohos Logon Key supports any PKCS11 compatible token:

  • Aladdin eToken PRO/R2
  • Aktiv ruToken
  • uaToken
  • iKey 1000/2000
  • Crypto Identity
  • ePass

Access your computer by biometric USB flash drive

Biometric authentication in Windows

Briefly: It is possible to use biometric USB flash drives with Rohos Logon Key. Therefore, access to Windows is available after the secured partition of the USB flash drive is made visible by a recognized fingerprint.

In this article we will consider biometric USB flash drive Transcend JetFlash 220 Fingerprint work with Rohos Logon Key program.

How it works:

  1. Rohos Logon Key starts up biometric authorization module from USB flash drive even before logging in Windows (in welcome screen).
  2. User touches biometric sensor immediately enabling USB flash drive secured partition
  3. Rohos Logon Key waits till the access to the secured partition is open. Then it reads the name and password of the user (is encrypted) to login the system.
  4. Then Rohos Logon Key automatically logs into Windows.

Information: Usual biometric flash drive space is divided into two main parts: open and secure. If Open Partition is on, then it’s impossible to view Secure Partition and vice versa. That’s why Rohos Logon Key should be set up for Secure Partition for the desired result, i.e. access to which could be obtained due to personal fingerprints.

How to set up Rohos Logon Key for Biometric USB flash drive:

  • First, install Rohos Logon Key
  • In the main window screen open dialog box “Options” (here are a key main setting)

In this dialog box for the type of device used as a login key choose USB flash drive.

Then click the link “Choose start-up program”, to choose a program to start biometric authorization from USB flash drive. Then choose program from USB flash drive

How to know what program to choose?

On removable disk or CD-ROM of this flash drive there is a file with extension autorun.inf. If to open it there will be showed what program to start. In our case it’s PdtStart.exe.

  • Now Rohos Logon Key will be set up for secured flash drive partition

Setting-up USB flash drive for system login:

  • Note: before setting-up USB flash drive, the Secure Partition should be open for Rohos to save logon profile in this partition.
  • In the main window screen click “Setup USB flash drive”. In this dialog box enter your Windows logon password (if you do not use password, create one)

  • Has been found USB key F:/ – indicates on what disk the program is set up.
  • Press OK , now you biometric USB flash drive will be your system logon key.
  • If to restart the computer you will see that the system shows biometric authorization screen, on which is requested user fingerprint for login with USB flash drive (as an alternative to fingerprint may be a password that was entered while setting up the USB key).

During the tests with Rohos Logon Key program biometric flash drive Transcend JetFlash 220 Fingerprint has showed quite good results, and takes 4 points out of 5 available.

Knowledge base

Get how-to articles, tips, and more in the following area:

New! How to set up two YubiKey For Windows and Mac
The YubiKey authentication device now can be used in Rohos Logon Key as an access Key for login into Windows and macOS.

New! Windows logon with YubiKey
The popular YubiKey authentication device now can be used in Rohos Logon Key as an access Key for login into Windows.

New! Authentication in Windows with Bluetooth device
The Rohos Logon Key enables to use wireless devices equipped with Bluetooth for computer security. Your mobile phone or pocket PC, Palm, Nokia plays the role of your wireless key from your computer.

New! How to secure your Computer by using eToken
The popular eToken now can be used in the programs Rohos Logon Key and Rohos Disk as an integrated Key for login into Windows and for data security.

New! Access your computer by biometric USB flash drive
It is possible to use biometric USB flash drives with Rohos Logon Key. Therefore, access to Windows is available after the secured partition of the USB flash drive is made visible by a recognized fingerprint.

Windows XP Hibernate advantages.
Many desktop and laptop users do not use hibernation in spite of all the advantages: quick Windows startup, possibility to continue recent work without opening needed programs, plus password protection after resume. Use of hibernate feature can increase your work convenience, especially if you have to keep open many windows and programs…

How to optimize Rohos using registry tweaks?
How to hide Rohos icon near the clock or Disable Rohos notifications? Here’s Registry Guide for Rohos that provides a range of registry tweaks, tricks & hacks for optimizing, enhancing and securing Rohos.

How to change text on the Rohos welcome screen?
Personalizing login screen with custom messages is fun! Here are some registry tweaks to enhance your welcome screen appearance for pleasant start-up.


Tips & tricks
How to create a Shortcut to Lock Your Computer
You can create a shortcut to lock your computer with a click. This will help you if you use Windows 2000.

How to change the default action with removable media on the Windows XP\2000?
Whenever you plug in a USB flash drive Windows XP prompts the user to indicate what to do with the media? When using Rohos Logon Key for login into Windows by USB flash drive, “removable drive autoplay” behavior may be also unusable. Here’s how to configure Windows XP not to autoplay anything on the removable drive.


Security related topics

Remote Desktop login via USB key. Use Terminal Services RDP protocolNew! How to log in into Remote Desktop securely by using hardware USB token (USB flash drive). Rohos Logon Key works with Remote Desktop connection program and allows logging in into your Remote Desktop by using hardware USB token. (two-factor authentication solution)…

New! How to use Rohos Logon Key in a network environment
The program has a special ‘server’ edition setup that includes USB Key administration tools that allows to manage multiple USB stick.

New! Access your Windows Vista computer by using USB flash drive.

How two-factor authentication works in Rohos Logon Key.
Learn more on how Rohos Logon Key protects your personal information and data with a Two-Factor Authentication technology using USB flash drives.

The basics of computer protection.
If you are the only holder of a computer or owner of a shared family PC – you might still want to set up your computer with user accounts, privileges and other security rules and software. It prevents unauthorized access to the system, makes it more stable and let you enjoy sharing the home PC.

How to choose a convenient and strong password?
It is not true when they say that security improves as password complexity increases. In reality, complex passwords that comply with “security-enhancing” principles lead to one outcome: Users write down their passwords. …
Learn to use our tips to make your password hard to guess and easy to remember.

How to prevent a forgotten password?

7 ways to use Rohos Desktop Security combine
Learn to keep your computer and personal data more secure with Rohos Desktop Security combine.

How to configure USB flash drive for Windows Logon.
If you don’t want to remember and type in your Windows password every time, you can easily set up your USB flash drive as an access key to your PC.


Technology related topics New!

Tesline-Service GINA. Advanced Authentication module for Windows 2000/XP/2003.
GINA is a replaceable DLL component for Windows NT/2000/XP that implements the authentication policy of the interactive logon model. The following topics cover conceptual information about GINA DLL module developed by Tesline-Service S.R.L., USB flash drive identification mechanism, PIN code entry and Windows Logon related issues.

How to increase password security with two-factor authentication.
It is not true when they say that security improves as password complexity increases. In reality, users simply write down difficult passwords, leaving the system vulnerable. Security is better increased when you use two-factor authentication solutions. Here’s how to configure two-factor authentication for Windows and how it affects your Windows security.

New! Inside the Rohos virtual encrypted disk.
Rohos software creates a virtual encrypted disk within a file and mounts it as a real disk drive. Encryption is automatic, real-time (on-the-fly) and transparent. Here you’ll find out how it works.

! This page is under construction that’s why some links lead to the old Rohos site

Rohos Logon Key

Video guides on using Rohos access control, encryption software and USB key usage

Press releases

Tesline-Service Announces Rohos Disk Encryption v.1.7

cd4Chisinau, Moldova, December 25, 2009 Tesline-Service SRL, Moldova software company specializing in PC security solutions today announced that it released Rohos Disk Encryption 1.7., with long time anticipated portable data encryption solution for Windows that gives possibility to work with encrypted data in full on any computer without Admin rights.

Rohos Disk Encryption creates hidden and protected virtual partitions on computer or USB flash drive and uses NIST compliant AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly.
Robust and best portable partition encryption software has several key benefits over its competitors:

On-the-fly encryption on PCs without administrative rights
Connect/disconnect virtual drive by plugging in/off USB key
Virtual keyboard – protects your encrypted disk password from a keylogger
The solution provides unsurpassed data security and protection, enabling to exceed our customers information privacy expectations with a solution that is both cost effective and easily managed, – said Alexander Silonosov, General Manager, Tesline-Service. Portable platforms and removable media remain at the heart of today’s security concerns. We are able to offer our customers the best possible solution to keep their data safe. Rohos Developers have managed to bring portable data encryption security to an exceptional performing level by implementing new technology – File Virtualization.

On the fly encryption without administrative rights

Rohos Disk Encryption allows opening files from Rohos Disk Browser in associated application without first decrypting them into temporary folder. Rohos Disk virtualizes file presence for the application, thus it works with encrypted file by using on-the-fly encryption principle:

Double click any file to open it immediately in associated application and work with it in a regular way.
Open big files (for instance watch an encrypted AVI file, listen to music).
There is no un-encrypted data traces left behind on a Guest PC or unsecured part of USB flash drive.
For more information, please visit: http://www.rohos.com/2009/10/on-the-fly-encryption-without-admin-rights/#more-2056

About Rohos Disk Encryption

The program creates hidden and protected partitions on the computer or USB flash drive. Those who have megabytes of sensitive files and seriously concerned with data security, can not imagine their computer or USB drive without the hidden partition that is created using this wonderful tool. Protects sensitive data stored on desktops, laptops and removable media, such as USB thumb drives and CD/DVDs. Rohos Disk Encryption also supports and manages hardware-encrypted disk drives. For more information, please visit: http://www.rohos.com/products/rohos-disk-encryption/

The Personal Version costs 35$, and PRO version 49$. It’s 30 day trial version.
Download: http://www.rohos.com/desktop-security/rohos.exe
System requirements: Windows XP / 2000 / 2003 / Vista/ Seven

Announce Release of Rohos Face Logon

rohos-face-logon-box-2000-2120x152Chisinau, Moldova, March 11, 2009 Tesline-Service SRL, Chisinau, Moldova today announced the release of its new biometric Windows PC authentication solution, Rohos Face Logon.

Rohos Face Logon is a powerful yet simple solution that uses biometric facial recognition to automatically authenticate a user. This partly eliminates the necessity for login passwords, makes the computer significantly more secure and easier to use, and strengthens access control and identity management policies.

Rohos Face Logon identifies and authenticates users in less time than it takes to enter a password, – said Alexander Silonosov, General Manager, Tesline-Service. This is a new solution for secure and simplified computer access that goes well beyond initial login. In future we plan on implementing Rohos Face Logon self-training so it could easily recognize user without continuous face patterns registration.

User simply approaches the computer equipped with a standard web camera, and Rohos Face Logon biometrically authenticates him/her and logs him/her on, – said Vladislav Ivanovici, CEO. Passwords are difficult to enforce and ineffective in practice. Tokens can be shared or lost. While a person’s face is unique and always with them, it is ultimately the ideal password and the best way of ensuring who is accessing the computer.

About Rohos Face Logon

Ideal for both home and office PCs, Rohos Face Logon is designed to add authentication convenience and additional security level to the standard Windows logon procedure. It allows to access Windows computer in an easy, fast and secure way by using any Windows compatible camera. The login of the user is performed automatically once the face has been recognized by the program. The identification of a user by providing biometric verification in an automatic continuous process, based on neural network technology. Rohos Face Logon is currently available only in English, with versions in French, German, Spanish and Japanese becoming available soon.

Rohos Face Logon costs $45 USD. It’s 15 day trial version.
Download: http://www.rohos.com/rohos_face_logon.exe
System requirements: Windows XP / Vista

About Tesline-Service

Tesline-Service S.R.L. (former Teslain ltd.) was founded in 2000 to meet a growing need for IT services in Eastern Europe. In 2003 we started developing a family of Rohos products – Computer Data Security and Access Control software. Our motto is IT security with the Key in hand! For more information visit http://www.rohos.com

All product and company names herein may be trademarks of their respective owners.

Tesline-Service Announces Rohos Logon Key v.1.4 for Mac OS XRohos Logon for Mac OS X

rohos-logon-box-2000-120x152Chisinau, Moldova, November 04, 2008 Tesline-Service SRL, is a small software company specializing in PC security solutions today announced that it’s Rohos Logon Key Mac OS X version – authentication solution for Mac OS X Tiger and Mac OS X Leopard now supports YubiKey.

The solution provides a hardware-based authentication, thus:

  • Access your Mac with YubiKey
  • The Mac is protected but you don’t need to enter your password manually each time you unlock your Mac;
  • Automatically lock your Mac screen when YubiKey is unplugged;
  • Unlocking your Mac with YubiKey is fully automatic and fast!

Tesline-Service continuing its tradition of providing with the best solution to protect Mac is pleased to offer Rohos Logon Key v.1.4 with YubiKey support. Using it as a security token for Mac Rohos Logon Key has enhanced security to suit the needs of its customers – said Alexander Silonosov, General Manager, Tesline-Service. Rohos Logon Key provides end users with an easy-to-use solution that combines true mobility with the most robust security.

It works seamlessly with any hardware and operating system combination supporting USB keyboards such as Windows, Mac OS, Linux and others. – says Stina Ehrensvard, Yubico CEO & Founder. The Key generates and sends unique time-variant authentication codes by emulating keystrokes through the standard keyboard interface. The computer to which the Key is attached receives this authentication code character by character just as if it were being typed in from the keyboard yet it’s all performed automatically.

About Rohos Logon Key

The program enables users to access Mac in an easy, fast and secure way using USB key. Our software is designed to be both powerful and easy to use. Using USB flash drive/token as a regular key to your Mac requires a special design for software functions. Your Mac information is well protected with Rohos Access Control software, but it is much easier to work with it. For more information, please visit: https://www.rohos.com/1/products/rohos-logon-key-for-mac/

The Mac Version costs $29 USD. It’s a 15 day trial version.
Download: http://www.rohos.com/rohos_logon.zip
System requirements: Mac OS X 10.4 or later

About Yubico

We are a growing team of experienced entrepreneurs, Internet security experts and business developers, based in Stockholm and Sunnyvale, California. Founded in 2007 as a spin-off from Swedish RFID-innovator Cypak. The YubiKey – an innovative authentication token providing strong security to unmatched simplicity and low cost. For more information, please visit http://www.yubico.com/home/index/

All product and company names herein may be trademarks of their respective owners.

Tesline-Service Announces Rohos Logon Key 2.5. for Windows Vista

rohosvistacredentialChisinau, March 26, 2008 Tesline-Service SRL, is a small software company specializing in PC security solutions today announced that it released Rohos Logon Key 2.5., two-factor authentication solution, whichWorks with Windows Vista.

The solution provides ease-of use for interoperability, remote access and it has several key benefits:
· Fully supports Windows Vista
· Supports corporate USB tokens such as Aladdin eToken
· Server Version with USB key Remote Setup

Our customers come to us for Rohos Logon Key 2.5. that offers high-security solution strong authentication, security management, and even physical access control, and is compatible with the new Windows Vista operating system , – said Alexander Silonosov, General Manager, Tesline-Service. By working with Microsoft, we feel confident that Rohos Logon Key 2.5. will provide users of Windows Vista with quality and reliability.

Microsoft is pleased that Tesline-Service has earned the Works with Windows Vista software logo for their Rohos Logon Key 2.5. application,†said Dave Wascha, director of Windows Client Partner Marketing Group at Microsoft Corp. By certifying their applications, Tesline-Service is letting their customers know that their product has met standards of operating system compatibility, and will deliver an improved experience on a PC running Windows Vista.

About Rohos Logon Key

The program enables users to access Windows computer in an easy, fast and secure way using USB key. Our software is designed to be both powerful and easy to use. Using USB flash drive as a regular key to your computerrequires a special design for software functions. Rohos Logon Key is made up in such a way that you can easily use your mobile device for security purposes without changing your computer habits. Your computer informationis well protected with Rohos Data Security software, but it is much easier to work with it. It full-featuredly supports eTokens, BlueTooth devices and Biometric USB flash drives as well. For more information, please visit: http://www.rohos.com/news/

The Personal Version costs 25$, and Business version 39$. It’s 15 day trial version.
Download: http://www.rohos.com/welcome-screen/rohos_welcome.exe
System requirements: Windows XP / 2000 / 2003 / Vista

About Tesline-Service

Tesline-Service S.R.L. (former Teslain ltd.) was founded in 2000 to meet a growing need for IT services in Eastern Europe. In 2003 we started developing a family of Rohos products – Computer Data Security and Access Control software. Our motto is IT security with the Key in hand! For more information, please visit http://www.rohos.com

All product and company names herein may be trademarks of their respective owners.

Press contact:

(+37322) 74-02-42
soft2@rohos.com
http://www.rohos.com

Privacy policy

Effective Date: May

SafeJKA, SRL (“Rohos”) has published this privacy policy to inform you about how your personal or personally identifiable information are collected and used by the rohos  websites and rohos software (hereinafter “Software”).   SafeJKA reserves the right to modify or terminate this Privacy Policy at any time and within its sole and absolute discretion.

What information does Rohos collect?

When you order our products, or contact our support chat/email we collects the following personal or personally identifiable information from you:

  • First name and surname;
  • Email address;
  • Company name;
  • Language;
  • IP address;
  • Your country obtained from the IP address using Geolocation database;
  • Website pages accessed;
  • Browser version;
  • Use of the Website.

How does Rohos use and share this information?

Rohos does not sell or share your personal or personally identifiable information to third parties.

Rohos uses your personal or personally identifiable information to provide you with service and support, to determine whether you are eligible for support, to resend you license keys, to optimize the Website and its content to your preferences;

During purchase process, some information collected by our registration provider ShareIt, FastSpring.com or PayPal. ShareIt \ DigitalRiver, is a Germany based e-commerce company, known for their long-term reputation, for professionalism and security. They have their own ShareIt Privacy & Security statement. No personal information will ever be shared with another company. Rohos have access to this infirmation, but does not copy it to other media. During support chat some of the information stored in ZenDesk or Gmail systems.

We do not even know users’ credit card information  this data is only available to the secure service of ShareIt, FastSpring or PayPal and they deal with it safely.

What information does Software collect?

Software optionally (default is ON) creates troubsleshooting log files on the computer where it is installed. The data contains the following personal or personally identifiable information from you your computers and attached hardware:

  • Computer name , its LAN IP address and other minor characteristics;
  • System account name, Active Directory group membership;
  • Active Directory domain name;
  • Hardware model, vendor name, serial number and its characteristics;
  • Other parameters and characteristics of operating system;

How does Sofware use and share this information?

Software optiomally collect this information for troubleshooting purposes on local computer; The software does not send or share this information to any third parties. However you may share this information with SafeJKA for technical support and bug fixing and Rohos remove and delete this information from support system within one month after last communication message in the support chat.

How stop Rohos and Software to collect and use of my personal or personally identifiable information?

You may stop Software to collect and use of your personal or personally identifiable information by disabling Troubleshooting option in Software settings. Or you may inform Rohos to remove and delete all information and data received from you during support chat.

Sincerely,
SafeJKA team.

Press resources

We would like to welcome writers, editors, and other members of the press to our Press Resources page. Please feel free to contact us if you have any questions.

About us

We are small independent software vendor located in Moldova republic. In a brief: we produce good data security software and share our source code. We work with Windows, MAC OS X and mobile computers and use open standards.

Company and product images:

Feel free to use the following high resolution images in publications.

Company’s logo (jpg)

Rohos Logon Key Logo (jpg)

Rohos Logon Key Mac (jpg)

Rohos Logon Key Box (jpg)

Rohos Face Logon Box (jpg)

Rohos Disk Encryption Box (jpg)

Rohos Mini Drive (jpg)

Product boxes were created by TrueboxShot – a wonderful box imaging program.

Download Rohos brochures:
Rohos Logon Key.pdf

Rohos Logon for Active Directory.pdf

Rohos freeware

We provide a set of free applications to feel the convenience from using of Rohos software:

Los Productos Rohos han sido estudiados y montados en la portada de las más populares revistas europeas y americanas de TI:

Rohos Logon Key v.2.4 featured in July, 2007 issue of PC INFO (Germany) & on CD

Rohos Logon Key v.2.4 reviewed in Web User magazine (UK), 2007

Rohos Logon Key v. 2.5 reviewed in SC Magazine February, 2009

Rohos Logon for Mac v.1.4
featured in June, 2009 issue of Mac FORMAT (UK)& on CD

PC Magazine Greece, May, 2009
Rohos Logon Key Personal v.2.4 was featured in the covermount DVD

The Official Magazine
Windows XP, April, 2009

Rohos Logon Key has been chosen for its Essential Security Pack

CHIP (Germany), March, 2009

Rohos Logon Key has been chosen among one of the tools to Protect your PC in 10 minutes

PC WELT, January, 2009
The editors of PC Welt magazine have chosen Rohos Logon Key for Security tools-DVD for Windows

Rohos Logon Key for Mac reviewed in Corzo avanzato per Mac en iPhone (Italy, 2010) & featured on CD

Rohos Disk Encryption 1.7 featured in May, 2010

issue of Twoj Niezbednik (Poland) and on its DVD

Rohos Logon Key 2.7
reviewed in June, 2010 issue of PC World (Spain)
and Awarded 5 stars

Rohos Face Logon 2.7 featured in June 2010 issue of Ekspert (Poland) and on its DVD

Special offers

If you want to make surprises to your audience and visitors – we can generate a special package for your media with a 90-day trial time or even with a 50% discount coupon code. It’s easy. Let us know.

Press Releases

Latest Press Releases:

  • August 04, 2010Tesline-Service today announced that now its two-factor authentication solution Rohos Logon Key v.2.8 supports MiFare S50/S70 smart cards to provide the most secure physical and network access to Windows systems.
  • December 25, 2009 Tesline-Service SRL, Moldova software company specializing in PC security solutions today announced that it released Rohos Disk Encryption 1.7., with long time anticipated portable data encryption solution for Windows that gives possibility to work with encrypted data in full on any computer without Admin rights.
  • May 05, 2009 Tesline-Service SRL today announced that its Rohos Logon Key authentication solution for Mac OS X Tiger and Mac OS X Leopard now supports two-factor authentication with any USB flash drive and PIN code.
  • November 04, 2008Tesline-Service SRL today announced that it’s Rohos Logon Key Mac OS X version – authentication solution for Mac OS X Tiger and Mac OS X Leopard now supports YubiKey.
  • July 11, 2008Tesline-Service SRL today announced that it’s Rohos Logon Key – authentication solution supports Mac OS X Tiger and Mac OS X Leopard.
  • March 26, 2008 Tesline-Service SRL today announced that it released Rohos Logon Key 2.5., two-factor authentication solution, which “Works with Windows Vista.

Partners

Partners and resellers are an important component of the SafeJKA business model. SafeJKA partners work with us to deliver top-quality products and services to help our customers, anticipate customers needs, create opportunities and avoid potential problems. Partnering with innovative providers in their respective industries and areas of expertise allows us to offer outstanding value and a broader range of solutions. Our partners are leaders in their fields.

About us

Partner Program. We offer Rohos Logon SDK for software and hardware vendors, premium affiliates and reseller programs.

Hardware Partners

 

uaToken

 

http://www.uatoken.kiev.ua
Kyiv, Lepse blvd., 8, Ukraine
E-Mail:guardant@p5com.com
phone:+38 (044) 492-79-54, 459-16-35

http://www.futako.net
http://www.javacardsdk.com
Address: 8F-9 NO42 SUNG JIANG ROAD 10455
Taipei,Taiwan
TEL: 886-2 2567-4958

 

http://yubico.com/
440 N. Wolfe Rd, Sunnyvale, CA 94085, USA
US Office
Tel: +1-408-774-4064

 
 
 
 
 
 

Resellers

Share it

http://www.shareit.com
c/o Digital River Inc.
9625 West 76th Street, Suite 150
Eden Prairie, MN 55344, USA
Phone: +1 952 646-5747 (for calls from outside the U.S.)
or +1 800 903-4152 (for calls within the U.S.)

Magnetic Laboratories

http://www.mag-labo.jp

Japan

Futako Software Engerineering CO.,LTD

http://www.futako.net
Address: 3F-5 NO42 SUNG JIANG ROAD 10455
Taipei, Taiwan

SiliconAction, Brazil

http://www.siliconaction.com.br/
Av.Carlos Gomes, 403 cj.303 – Porto Alegre – RS – Brasil – CEP 90480-003
info@siliconaction.com.br
Fone: (51) 3328.5642

FastSpring USA

Bright Market, LLC dba FastSpring. 801 Garden St., Santa Barbara, CA 93101. USA
https://fastspring.com/purchasing-through-fastspring

MADA Marx Datentechnik GmbH, Germany

Hinterhofen 4
78052 Villingen — Schwenningen
Tel: +49 (0) 7721 / 8848 — 0
Fax: +49 (0) 7721 / 8848 — 20
mail: info@mada.de

LinkSoft

Linksoft Inc. Taiwan.
https://www.linksoft.com.tw/product/rohos_logon_key

Our philisophy

The motto of our company is “IT security with a Key in hand!”

We do this by means of:

  • Second authentication factor variety: USB Keys, Tags, Cards and Devices.
  • Key multi-functionality
  • Simple & user-friendly design
  • Personal contact

USB Key hardware variety

Rohos products work with all popular USB tokens and authentication devices including:

  • Corporate level USB tokens like Aladdin eToken, SafeNet iKey, Crypto Identity, ePass, ruToken, and others PKCS11 enabled
  • USB flash drives, uncluding Finger-print & Biometric devices, U3 smart drives
  • Wireless mobile devices such as BlueTooth Phone/PocketPC
  • YubiKey and Swekey – OTP tokens
  • Touchatag RFID

We are always looking & discovering new USB devices that can be used for authentication process.

USB Key multifunctionality

Security:
In addition to built-in security features of a particular USB device Rohos adds its own security features that make your USB Key a really secure device for authentication.

Universal Logon:
Rohos Logon program supports all Windows authentication models: Windows GINA, Windows welcome screen and Windows Vista credential provider.
This makes Rohos Logon Key available for various environments (Windows Domain / Active Directory / Personal workstations).

Simple & user-friendly design

Our software is designed to be both powerful and easy to use. Using USB flash drives as a regular key to your computer requires a special design for software functions. Rohos Logon Key is made up in such a way that you can easily use your mobile device for security purposes without changing your computer habits.

Computer Data Security is better increased by designing for how people actually behave. Your computer information is well protected with Rohos Data Security software, but it is much easier to work with it. It is possible due to:

  • One-step disk creation
  • Single Sign-On option
  • Seamless integration into Windows Applications and MS Office
  • Disk-On notifications

Personal contact

We value everyone who contacts us. If you’ve got a problem, we want to know about it. We will do our best to provide you with the solution that’s best for you:

  • On the blog
  • On the forum

Once you become our customer, you can get free technical support, as well as free updates of the Rohos software. This does not mean that non-customers are left aside.

Thank you for interest itowards our company.

Regards,
The Rohos team

Partner Program

To achieve mutually-beneficial relationships between SafeJKA and partners we have developed several programs –

  • Hardware Vendor Partner Program
  • Reseller Program
  • Customized Versions
  • Virtual Encrypted Drive SDK
  • Windows 2-factor Authentication SDK

that motivate to drive more sales and increase revenue and profit for both SafeJKA and you. For software and hardware vendors we offer to enhance their existing products with the best authentication and encryption solutions.

Hardware Vendor Partner Program

Designed for companies who embed SafeJKA technology with their own applications and security devices. We provide customized versions to meet specific requirements.
Our Windows-Logon technology gives vendors an additional opportunities and key business advantage against their competitors:

  • Windows Seven and Mac OS X support
  • USB Key copy protection
  • Works with all major Windows authentication services: from standalone XP/Vista home computer up to AD/Novell joined workstation
  • USB Key password protection

If you are looking for a specific feature within our software, then please contact us (using the form on the Support page) and we will be happy to provide you with any additional information we have about that functionality.

Reseller Program

By default we offer 20% discount for Resellers and free NFR licenses.

To get started as Reseller:

Please contact us directly if you need test licenses.

Get Started as Affiliate:

We offer you popular data security software, and we’ve started a program where other web sites can make money by advertising selling our security software.

  • Register as Affiliate
  • Publish our product info on your web page.
  • Create special affiliate links
  • To get more information about ShareIt Affiliate Network read this.
  • Our Publisher ID: 200086566.

Our general terms and fees:

  • 20% discount by default
  • Minor updates are free

Our e-commerce platform is provided b Digital River (ShareIt)

Customized Versions

We can offer a customized versions of our two-factor authentication and data security solutions. Thus Tesline-Service develops special features according to Customer order. There already are created versions and quiet an experience in this field.

SDK

Our technology is installed on a million of computers and flash drives around the world. We offer a multi level Virtual Disk Encryption SDK and 2-factor authentication SDK, C++ open source, with C++ sample code and included tech support.