User Guide
IronKey Personal
Secure Flash Drive
Download from Www.Somanuals.com. All Manuals Search And Download.
CONTENTS
What is it?
3
3
3
5
6
6
7
Meet the IronKey
Core Features
Device Diagrams
Technical & Security Notes
IronKey Device Security
IronKey Services Security
How Does itWork?
9
9
ProductWalkthrough
Initializing and ActivatingYour IronKey onWindows
Using the IronKey Unlocker onWindows
InitializingYour IronKey on a Mac
Using the IronKey Unlocker on a Mac
InitializingYour IronKey on Linux
Using the IronKey Unlocker on Linux
Using the IronKey Control Panel
Using the IronKeyVirtual Keyboard
Using the Onboard Firefox & Secure Sessions Service
Using the IronKey Password Manager
Using the Secure Backup Software
Importing a Digital Certificate into the IronKey
Using my.ironkey.com
9
11
12
13
13
14
16
18
19
21
23
24
26
ꢁ8
ꢁ9
UsingYour IronKey in Read-Only Mode
Product Specifications
What’s Next?
30
30
30
3ꢀ
Where can I go for more Information?
Who is the IronKeyTeam?
Contact Information
IRONKEY USER GUIDE
PAGE ꢁ
Download from Www.Somanuals.com. All Manuals Search And Download.
What is it?
Meet the IronKey
The IronKey Personal Secure Flash Drive, designed to be the world’s
most secure USB flash drive, protects your data, passwords, and Internet
privacy with some of today’s most advanced security technologies. Even
if your IronKey is lost or stolen, your data remains protected and can
even be restored to a new IronKey from an encrypted backup. While the
underlying security technologies are complex, the IronKey is simple to use
and you only need to remember a password to unlock it.
Core Features
Hardware-Encrypted Flash Drive
Your IronKey can safely store ꢀ, ꢁ, 4 or 8 gigabytes of documents, applica-
tions, files and other data. The IronKey Cryptochip inside the IronKey
protects your data to the same level as highly classified government infor-
mation, and it cannot be disabled or accidently turned off.
Self-Destruct Sequence
If the IronKey Cryptochip detects any physical tampering by a thief or a
hacker, it will self-destruct. Similarly, after ꢀ0 consecutive invalid password
attempts your IronKey will self-destruct using flash-trash technology.
Anti-Malware Autorun Protection
Your IronKey helps protect you from many of the latest malware threats
targeting USB flash drives. It will detect and prevent autorun execution of
unapproved programs, and it can be unlocked in a Read-Only Mode.
IRONKEY USER GUIDE
PAGE 3
Download from Www.Somanuals.com. All Manuals Search And Download.
Portable Cross-Platform Data Access
The IronKey Unlocker allows you to access your encrypted files onWin-
dows ꢁ000, XP, Vista, Mac OS X and numerous distributions of Linux.
Simple Device Management
Your IronKey includes the IronKey Control Panel, a central launchpad for
launching your applications, editing your preferences, and safely locking
your IronKey.
Secure Data Recovery
Securely back up the data on your IronKey using IronKey’s Secure Backup
software. It allows you to recover your data to a new IronKey in case
your IronKey is ever lost, and even synchronize data between IronKeys.
Stealth BrowsingTechnology
Surf theWeb safely and privately through almost any network, even across
unsecured wireless hotspots, with IronKey’s Secure Sessions Service. It
can be easily toggled through the onboard Mozilla Firefox web browser.
Self-Learning Password Management
Securely store and back up all your online passwords as you go with the
IronKey Password Manager. It allows you to automatically log into your
online accounts to avoid keylogging spyware and phishing attacks.
Online my.ironkey.com Account
secure website that requires two-factor authentication to access it. Here
you can recover forgotten passwords, disable device services, and more.
Online SecurityVault
If your IronKey is ever lost or stolen, you can easily restore your online
passwords from an encrypted online backup.
Waterproof &Tamper-Resistent
The IronKey was designed to survive the extremes. The
IronKey’s rugged metal casing is injected with an epoxy
compound that makes it not only tamper-resistent, but
waterproof to military specifications (MIL-STD-810F).
IRONKEY USER GUIDE
PAGE 4
Download from Www.Somanuals.com. All Manuals Search And Download.
Device Diagrams
The IronKey has been designed from the ground up with security in mind.
A combination of advanced security technologies are used to ensure
maximum protection of your data. Additionally, the IronKey has been
designed to be physically secure, to prevent hardware-level attacks and
tampering, as well as to make the device rugged and long-lasting. You can
rest assured that your data is secured when you carry an IronKey.
Rugged metal case
filled solid with epoxy
Metal Cap
Multi-color LED
Drilled hole for
keyring/lanyard
USB ꢁ.0
Connector
Area to engrave
your name/code
Stamped unique
serial number
This IronKey Cryptochip is hardened against physical attacks such as pow-
er attacks and bus sniffing. It is physically impossible to tamper with its
protected data or reset the password counter. If the Cryptochip detects
a physical attack from a hacker, it will destroy the encryption keys, making
the stored encrypted files inaccessible.
TM
The World’s Most Secure Flash Drive
FAST
SAFE
RUGGED
Transfers data up to 8 times
faster than ordinary flash drives
IronKey Cryptochip with
military-grade cryptography
Waterproof & tamper-
proof metal casing
RELIABLE
SMART
INCLUDES
Stores data up to 10 times
longer than ordinary flash drives
“Flash-Trash” technology
for complete data erasure
Up to 8 gigabytes
of secure storage
IRONKEY USER GUIDE
PAGE 5
Download from Www.Somanuals.com. All Manuals Search And Download.
Technical & Security Notes
We are endeavoring to be very open about the security architecture and
technology that we use in designing and building the IronKey devices and
online services.There is no hocus-pocus or handwaving here.We use
established cryptographic algorithms, we develop threat models, and we
perform security analyses (internal and third party) of our systems all the
way through design, development and deployment. Your IronKey is FIPS
140-2 Level 2 validated (Certificate #938).
IRONKEY DEVICE SECURITY
Data Encryption Keys
» AES keys generated by onboard Random Number Generator (FIPS 186-2)
» AES keys generated by user at initialization time and encrypted
» AES keys never leave the hardware and are not stored in NAND flash
Self-Destruct Data Protection
» Secure volume does not mount until password is verified in hardware
» Password try-counter implemented in tamper-resistent hardware
» Once password try-count is exceeded, all data is erased by hardware
Additional Security Features
» USB command channel encryption to protect device communications
» Firmware and software securely updateable over the Internet
» Updates verified by digital signatures in hardware
Physically Secure
» Solid, rugged metal case
» Encryption keys stored in the tamper-resistent IronKey Cryptochip
» All chips are protected by epoxy-based potting compound
» Exceeds military waterproof standards (MIL-STD-810F)
Device Password Protection
The device password is hashed using salted SHA-ꢁ56 before being trans-
mitted to the IronKey Secure Flash Drive over a secure and unique USB
channel. It is stored in an extremely inaccessible location in the protected
hardware.The hashed password is validated in hardware (there is no “get-
Password” function that can retrieve the hashed password), and only after
the password is validated is the AES encryption key unlocked.The pass-
word try-counter is also implemented in hardware to prevent memory
rewind attacks.Typing your password incorrectly too many times initi-
ates a patent-pending “flash-trash” self-destruct sequence, which is run in
hardware rather than using software, ensuring the ultimate protection for
your data.
IRONKEY USER GUIDE
PAGE 6
Download from Www.Somanuals.com. All Manuals Search And Download.
Password Manager Protection
The IronKey Password Manager and my.ironkey.com work together, giving
you the ability to back up your online passwords to your Online Security
Vault at my.ironkey.com. First, you must unlock your IronKey device, which
requires two-factor authentication. Your passwords are securely stored in
a hidden hardware-encrypted area inside the device (not in the file sys-
tem), being first locally encrypted with 256-bit AES, using randomly gener-
ated keys encrypted with a SHA-ꢁ56 hash of your device password. All
of this data is then doubly encrypted with ꢀꢁ8-bit AES hardware encryp-
tion.This is the strongest password protection we have ever seen in the
industry.
When you back up your passwords online, IronKey performs a complicat-
ed public key cryptography handshake with IronKey’s services using RSA
ꢁ048-bit keys. After successful authentication, your encrypted block of
password data is securely transmitted over SSL to your encrypted Online
SecurityVault within one of our highly-secure data facilities.
IRONKEY SERVICES SECURITY
Secure Facilities
IronKey hosts its online services at state-of-the-art third-party data cen-
ter facilities. Physical access to the IronKey systems requires multiple lev-
els of authentication, including but not limited to hand geometry biomet-
ric readers,“man trap” entry, government-issued photo ID verifications
and individual access credentials. Each data center facility is equipped with
numerous surveillance cameras, motion detectors, and a sophisticated
alarm system.The IronKey infrastructure resides in a secured cage.The
entire facility is monitored by dedicated on-site security personnel on a
ꢁ4xꢂ basis.
Secure Environments & Policies
Logical access to the IronKey environments is controlled by multiple lay-
ers of network technologies such as firewalls, routers, intrusion preven-
tion systems and application security appliances. For additional protection,
IronKey partitions its online services and backend applications into differ-
ent network segments with independent security rules and policies.
Secure Communications & Data at Rest
When users access IronKey web sites and services, all information is ex-
changed over an encrypted channel.This is accomplished through Secure
Socket Layer (SSL) and by utilizingVeriSign Secure Site andVeriSign Secure
Site Pro certificates.To ensure additional security for its services, IronKey
qualified for and is using ExtendedValidation SSL.The IronKey applica-
tions encrypt all sensitive data prior to transmitting it within the IronKey
network and storing in databases.
IRONKEY USER GUIDE
PAGE ꢂ
Download from Www.Somanuals.com. All Manuals Search And Download.
Secure Sessions: MakingTor Faster and More Secure
IronKey maintains a secure, privateTor network with its own, high-perfor-
mance servers (separate from the publicTor network).This improves the
overall security in at least two ways:
Since IronKey controls the “exit-node” in your encryptedTor
circuit, we can ensure that no one is injecting unwanted or
malicious content into your online communications, such as
advertisements or spyware.You are not assured this level of
security with other publicly-run exit-nodes.
IronKey can also make sure that no exit-node is redirecting
your web traffic by providing addition DNS protections.This
anti-pharming measure can also help mitigate phishing attacks
and other online threats.
IRONKEY USER GUIDE
PAGE 8
Download from Www.Somanuals.com. All Manuals Search And Download.
How does it work?
ProductWalkthrough
Your IronKey Personal Secure Flash Drive consists of the following components:
» IronKey Unlocker (Windows, Mac and Linux)
» IronKey Control Panel (Windows only)
» IronKeyVirtual Keyboard (Windows only)
» Mozilla Firefox & IronKey’s Secure Sessions Service (Windows only)
» IronKey Password Manager (Windows XP &Vista only)
» IronKey Secure Backup (Windows only)
» my.ironkey.com (Windows only)
Standard Usage Requires:
» Windows 2000 (SP4), XP (SP2), Vista, Mac OS X (10.4+) or Linux (2.6+) computer
» A USB ꢁ.0 port for high-speed data transfer
» An email address and Internet connection for the online services
INITIALIzINg & ACTIVATINgYOUR IRONKEY ONWINDOWS
When you open the package, you will find one IronKey Secure Flash Drive, one lanyard, and a
Quick Start Guide. Below is a brief description of the standard way of setting up an IronKey:
Step
Description
ꢀ Plug the IronKey into your
Windows computer’s USB port.
Your IronKey can be initialized on aWindows ꢁ000, XP
orVista computer (see Mac and Linux instructions be-
low). To use the full speed of the IronKey, plug it into a
USB ꢁ.0 port.
ꢁ The “InitializeYour IronKey”
The IronKey autoruns as a virtual CD-ROM.
screen will appear.
This screen may not appear if your computer does not
allow devices to auto-run. You can start it manually by
double-clicking on the IronKey icon in “My Computer”
and running “IronKey.exe”.
IRONKEY USER GUIDE
PAGE 9
Download from Www.Somanuals.com. All Manuals Search And Download.
3 Create
a device
password
and a
Since you can have multiple IronKeys associated with
one IronKey account, the nickname helps you distin-
guish between different IronKey devices.
nickname
for your
IronKey.
Your password is case-sensitive and must be at least 4
characters in length. The threat of brute-force pass-
word attacks is removed by the IronKey’s self-destruct
feature.
4 Back up your password to your
online IronKey account
You have the option to back up your password online
to your my.ironkey.com account. That way, if you ever
forget your password, you can safely log into https://
my.ironkey.com and recover it.
5 Agree to the License Agreements A screen with IronKey’s End-User License Agreement
will appear. This can also be found online at:
6 The IronKey will initialize.
During this process, it will generate the AES encryption
keys, create the file system for the secure volume, and
copy over secure applications and files to the secure
volume.
ꢂ Activate your my.ironkey.com
my.ironkey.com is a secure site where you can man-
age your IronKey account and devices. Accessing
my.ironkey.com requires two-factor authentication (your
IronKey and your password).
account.
8 Follow the onscreen directions to You will create a unique username and password, con-
setup your my.ironkey.com account. firm your email address for out-of-band authentication,
and answer Secret Questions for supplemental authen-
tication.
You will also select a Secret Image that you will see
whenever you log in, as well as a Secret Phrase that is
used as an anti-phishing measure when communicating
with you via email.
9 Respond to the confirmation
IronKey must verify your email address because it uses
email by entering in the activation it to help you reset your account password, unlock
code on the website.
your my.ironkey.com account, and to notify you about
account security alerts.
At this point, your IronKey is ready to protect your data, identity, and online privacy.
IRONKEY USER GUIDE
PAGE ꢀ0
Download from Www.Somanuals.com. All Manuals Search And Download.
USINgTHE IRONKEY UNLOCKER ONWINDOWS
The IronKey Unlocker allows you to securely access your files on multiple operating systems.
It prompts you for your password, securely validates it, and then mounts your secure volume
where all of your files are stored on the IronKey.
Here is how to unlock your IronKey onWindows 2000 (SP4), XP (SP2), andVista:
Step
Description
ꢀ
Plug in your IronKey and unlock When you plug your IronKey in, the “UnlockYour Iron-
it with your password.
Key” window appears (if it does not, you can go to “My
Computer” and double-click on the IronKey drive).
Entering your password correctly (which is verified in
hardware) will mount your secure volume with all your
secure applications and files.
Entering the wrong password ꢀ0 consecutive times will
permanently erase all of your data. After every three
attempts, you must unplug and reinsert the IronKey.
ꢁ
Choose which action to take
when you unlock it.
By selecting the corresponding checkboxes before
unlocking your IronKey, you can view your secure files,
launch the IronKey Control Panel, unlock the IronKey
in a Read-Only Mode where files cannot be edited,
and/or securely log into your my.ironkey.com account.
Your selection of these checkboxes will be stored as
the default for the next time you plug your device in.
IRONKEY USER GUIDE
PAGE ꢀꢀ
Download from Www.Somanuals.com. All Manuals Search And Download.
INITIALIzINgYOUR IRONKEY ON A MAC
If you prefer to use a Mac, you can choose to initialize your IronKey on a Mac OS X computer:
Step
Description
ꢀ Plug the IronKey into your
computer’s USB port.
Your IronKey will run on Mac OS X (10.4 or 10.5),
PowerPC or Intel computers. It can also be setup and
used onWindows and Linux.
To use the full speed of the IronKey, plug it into a USB
ꢁ.0 port.
ꢁ Launch the IronKey Unlocker.
The IronKey has a virtual CD-ROM.
The “InitializeYour IronKey”
screen will appear.
You must start the IronKey Unlocker manually by going
to “IronKey:Mac:IronKey Unlocker” and double-click-
ing on the IronKey icon.
3 Create your device password and Your password is case-sensitive and must be 4 or more
a nickname for your IronKey.
characters long. The threat of brute-force password
attacks is removed by IronKey’s self-destruct feature.
4 Agree to the License Agreement A screen with IronKey’s End-User License Agreement
will appear. This can also be found online at:
5 The IronKey will initialize.
During this process, it will generate the AES encryption
key, and create the file system for the secure volume.
This process may take a minute.
Your IronKey is now ready for use.
IRONKEY USER GUIDE
PAGE ꢀꢁ
Download from Www.Somanuals.com. All Manuals Search And Download.
USINgTHE IRONKEY UNLOCKER ON A MAC
The IronKey Unlocker for Mac will allow you to access your files and change your device pass-
word on a Mac. You can use the other IronKey applications and services on aWindows com-
puter.
Step
Description
ꢀ Plug in your IronKey and unlock When you plug in your IronKey, go to “IronKey:Mac:
it with your password.
IronKey Unlocker” and double-click on the IronKey
icon.
Entering your password correctly (which is verified
in hardware) will mount your secure volume with all
your secure files.
Entering the wrong password too many times will
permanently erase all of your data. After every three
attempts, you must unplug and reinsert the IronKey.
ꢁ Choose which action to take
when you unlock it.
By selecting the corresponding checkbox before un-
locking your IronKey, you can view your secure files.
3 Locking & unplugging the IronKey Clicking “Lock Drive” will exit open IronKey applica-
tions and lock the device. It is then safe to unplug it
from your computer.
INITIALIzINgYOUR IRONKEY ON LINUx
If you prefer to use a Linux computer, you can choose to initialize your IronKey on Linux:
Step
Description
ꢀ Plug it into your computer’s USB Your IronKey can be initialized on Linux 2.6+ (x86 sys-
port
tems only). It can also be setup and used onWindows
and a Mac.
To use the full speed of the IronKey, plug it into a USB
ꢁ.0 port.
ꢁ Run the ironkeyprogram from The IronKey has a virtual CD-ROM.
the IronKey’s linuxfolder
You must start the IronKey Unlocker manually by going
to linuxfolder and running ironkey
IRONKEY USER GUIDE
PAGE ꢀ3
Download from Www.Somanuals.com. All Manuals Search And Download.
3 Create a device password and a
nickname for your IronKey.
Since you can have multiple IronKeys, the nickname
helps you distinguish between different IronKey de-
vices.
Your password is case-sensitive and must be at least 4
characters long . The threat of brute-force password
attacks is removed by the IronKey’s self-destruct fea-
ture.
4 Agree to the license agreement
5 The IronKey will initialize.
IronKey’s End-User License Agreement will appear.
This can also be found online at:
During this process, it will generate the AES encryption
key, and create the file system for the secure volume.
This process may take a minute.
Your IronKey is now ready for use.
USINgTHE IRONKEY UNLOCKER ON LINUx
The IronKey Unlocker for Linux will allow you to access your files and change your device
password on Linux, allowing you to securely transfer files from and betweenWindows, Mac,
and Linux computers. You can use the other IronKey applications and services on aWindows
computer.
Depending on your Linux distribution, you may need root privileges to use the program ‘iron-
key’ found in the Linux folder of the mounted virtual CD-ROM. If you have only one IronKey
attached to the system, simply run the program from a command shell with no arguments (e.g.
ironkey). If you have multiple IronKeys, you will have to specify the device name of the one
you wish to unlock.
Note that ‘ironkey’ only unlocks the secure volume; it must then be mounted. Many modern
Linux distributions will do this automatically; if not, run the mount program from the command
line, using the device name printed by ironkey.
ironkeymay also be used to change the password or to lock the device. Use:
ironkey --changepwd [devicename]
to change the password of the IronKey named “devicename”. Similarly, use:
ironkey --lock [devicename]
to lock the IronKey named “devicename”, and:
ironkey --read-only
to unlock the IronKey in Read-Only Mode.
IRONKEY USER GUIDE
PAGE ꢀ4
Download from Www.Somanuals.com. All Manuals Search And Download.
Note that simply unmounting the device will not automatically lock the secure volume. To lock
the device you will have to either unmount and physically remove (unplug) it, or else run:
ironkey --lock
Please note the following important details for using your IronKey on Linux:
1. Kernel Version must be 2.6 or higher
If you»comDpeilveiycoeurDrowivnekrersn-e>l,SyCouSImDuestviinccleuSdeupthpeofrotllo-w><in*g>inSCit:SICDROMSupport
» DeviceDrivers-><*> Support for Host-side USB
» DeviceDrivers-><*> USB device filesystem
» DeviceDrivers-><*> EHCI HCD (USB 2.0) support
» DeviceDrivers-><*> UHCI HCD (most Intel and VIA) support
» DeviceDrivers-><*> USB Mass Storage Support
The kernels that are included by default in most major distributions already have these features,
so if you are using the default kernel that comes with a supported distribution you do not need
to take any other action.
Also, on 64-bit linux systems the 3ꢁ-bit libraries will have to be installed in order to run the
ironkey program.
2. Mounting problems
Make »surSeoymoeu dhiasvteribpuetrimonisssidoonsntoot mmoouunntt eauxttoermnaatlicSaCllSyIa&ndUrSeBqudierveictehse following command to
be run:
mount /dev/<name of the device> /media/<name of the mounted
device>
» The name of the mounted device varies depending on the distribution.The names of
the IronKey devices can be discovered by running:
ironkey --show
3. Permissions
You m»ustYhoauvempuestrmhaisvseiopnesrmtoismsioonusnttoexrtuenrneaxle/ucsubt/aflbaleshs odeffvticheesIronKey CD-ROM in order to
launch the IronKey Unlocker
» You may need root user permissions
4. Supported distributions
Not all distributions of Linux are supported. Please visit https://support.ironkey.com/linux for the
latest list of supported distributions.
5.The IronKey Unlocker for Linux only supports x86 systems at this time.
IRONKEY USER GUIDE
PAGE ꢀ5
Download from Www.Somanuals.com. All Manuals Search And Download.
USINgTHE IRONKEY CONTROL PANEL (WIndoWs onLy)
The IronKey Control Panel is a central
location for:
» Launching secure applications
» Securely logging into my.ironkey.com
» Configuring your IronKey settings
» Updating your device
» Changing your IronKey password
» Editing Password Manager data
» Safely locking your device
» Getting online help
Most of the Control Panel’s options
are located in the “Settings” menu.
Step
Description
ꢀ
Creating, editing, deleting secure When you click on “Secure Files” in the IronKey
files
Control Panel,Windows Explorer will open directly to
your secure volume.
All files on your IronKey are strongly encrypted with
military-grade AES encryption. Encrypting files is
as simple as moving them into the secure volume.
Dragging files onto your desktop will decrypt them
on-the-fly in hardware. The IronKey gives you the
convenience of working as you normally would with
a regular flash drive, while at the same time providing
strong and “always-on” security.
ꢁ
Updating device firmware/soft-
ware
The IronKey can securely update its software and
firmware through signed updates that are verified in
hardware. This allows users to keep their devices up-
to-date and protect themselves from future malware
and online threats.
To check for available updates, click the “Check for Up-
dates” button. If an update is available, you can choose
to download and install it by clicking the “Download
Update” button.
IRONKEY USER GUIDE
PAGE ꢀ6
Download from Www.Somanuals.com. All Manuals Search And Download.
3
Configuring device settings
The Settings menu allows you to configure preferences
to your liking, such as:
»
Enabling/Disabling the Password Manager
»
Enabling/Disabling the Secure Sessions
»
Configuring Password Manager options
»
Select which web browser your IronKey should use
»
Enabling an automatic check for device updates
on a weekly basis
As well as some important drive maintenance features:
»
Reformatting your secure volume
»
Restoring your IronKey applications if they are ever
erased or corrupted
4
Configure your IronKey’s
Click on Network Settings to configure how your
network and proxy settings
IronKey connects to the Internet:
»
Direct Connection: Does not use a proxy
»
Use System Settings: import the proxy settings from
Windows’ Internet Options
»
UseWPAD: Enter the URL to where yourWeb
Proxy Auto-Detect file is located
»
Manual Proxy: Enter the URL and port number for
your proxy server
If proxy authentication is required, you can enter your
username and password in the appropriate fields.
5
6
Creating a Lost & Found Message This feature allows you to create a message that will
appear on the IronKey Unlocker window. In the event
that you lose your IronKey, someone can return it to
you if you provide your contact information.
Changing your device password
You can change your device password and option-
ally back it up online to your Online SecurityVault at
my.ironkey.com.
Changing your password on a regular basis is a good
security practice. However, be especially careful to
remember your IronKey password.
IRONKEY USER GUIDE
PAGE ꢀꢂ
Download from Www.Somanuals.com. All Manuals Search And Download.
ꢂ
Adding, renaming, and removing
applications to the Applications
List
To manage the items in the Application List of the
IronKey Control Panel, simply right-click anywhere in
Application List. A menu will appear allowing you to:
ꢀ. Browse to a new application to add it to the list
ꢁ. Rename existing applications in the list
3. Delete an application from the list
4. Modify the way the list is presented
Please note that:
»
Items in the list are shortcuts to actual files. Manag-
ing the items in the list will not alter the actual file.
»
Items are automatically sorted alphabetically
»
Any file can be added to the list, including docu-
ments, images, and batch files
»
For items that are not applications,Windows will
open the item with the default program associated
with that filetype
8
Locking & unplugging the IronKey Clicking “Lock Drive” will exit open IronKey applica-
tions and lock the device. It is then safe to unplug it
from your computer.
Do not unplug your IronKey while applications are still
running. This could result in data corruption.
USINgTHE IRONKEYVIRTUAL KEYBOARD (WIndoWs onLy)
If you are using your IronKey on an unfamiliar computer and are concerned about keylogging
and screenlogging spyware, use the IronKeyVirtual Keyboard, which helps protects your pass-
words by letting you click out letters and numbers. The underlying techniques in the IronKey
Virtual Keyboard will bypass many trojans, keyloggers, and screenloggers.
The IronKeyVirtual Keyboard can be launched in a couple of ways:
»
In places where you enter a password into the IronKey (e.g. the IronKey Unlocker, changing
your device password, initializing your device), click on theVirtual Keyboard icon
»
Use the keyboard shortcut of CTRL + ALT + V
The IronKeyVirtual Keyboard can be used in a number of other applications when you need
extra security typing out information (e.g. email, documents, etc.).
IRONKEY USER GUIDE
PAGE ꢀ8
Download from Www.Somanuals.com. All Manuals Search And Download.
Step
Description
ꢀ Click the IronKeyVirtual Key-
board icon.
The IronKeyVirtual Keyboard will
appear.Alternatively, you can press
CTRL + ALT +V
ꢁ Click on the keys to type out
your password. Click on ‘Enter’
when you are finished.
Note that you can use the IronKeyVirtual Keyboard
in conjunction with the actual keyboard if you wish, so
that some characters are typed and some are clicked.
3 You can optionally click the
Notice that when you click on a key in theVirtual Key-
“Randomize” button to random- board, all of the keys will go blank. This is a protection
ize where the keys are. This helps that prevents screenloggers from capturing what you
protect against screenloggers.
clicked on.
If you do not wish to use this protection, simple dis-
able it in the options menu next to the close button.
You can also have theVirtual Keyboard automatically
launch when it encounters password fields. This too is
configured in the options menu.
USINgTHE ONBOARD FIREFOx & SECURE SESSIONS SERVICE (WIndoWs)
Since your IronKey comes with a Firefox web browser already onboard, none of your cookies,
history files, bookmarks, add-ons or online passwords are stored on the local computer. Now
you can carry your personalized web experience with you to other computers without worry.
Step
Description
ꢀ Launch the onboard Firefox web Clicking on the Mozilla Firefox icon in the Applica-
browser for portable surfing
tions list of the IronKey Control Panel will launch the
onboard Firefox. You cannot have a local version of
Firefox running at the same time; if you do, you will be
prompted to close it.
IRONKEY USER GUIDE
PAGE ꢀ9
Download from Www.Somanuals.com. All Manuals Search And Download.
ꢁ Toggle Secure Sessions for secure Clicking the IronKey button on the bottom right of
and private surfing
the onboard Firefox will silently turn IronKey’s Secure
Sessions Service on/off. This will create an encrypted
tunnel directly from your IronKey, out to a secured
IronKey web server, where it is then decrypted and
sent out to the destination site.
This security gives you anti-phishing and anti-pharm-
ing protection (for example, we do our own DNS
checking), as well as enhanced privacy protection (for
example your IP address will not be available to other
websites and ISPs). You can check this out by going to
a site such as whatismyip.com or ipchicken.com.
3 Using the Secure SessionsTools:
At any point while using Secure Sessions, you can
Network Map, Bandwidth Meter, launch additional tools form the IronKey SystemTray
and Changing Identities
Menu that show you more information regarding your
web traffic and current session.
The Network Map will show all of your available
“circuits” and where in the world your traffic will be
coming from.
The Bandwidth Meter will show you your current
bandwidth metrics.
You can easily change your apparent online “identity”,
which creates a new random circuit and changes the
path of your encrypted web traffic. As you will be
coming from a different IP address, it will likely appear
to websites that you are a different person.
IRONKEY USER GUIDE
PAGE ꢁ0
Download from Www.Somanuals.com. All Manuals Search And Download.
USINgTHE IRONKEY PASSWORD MANAgER (WIndoWs XP and VIsTa onLy)
The IronKey Password Manager connects to the onboard Firefox browser, or to Internet Ex-
plorer (versions 6 or 7) on your computer, automatically filling in your saved passwords so you
can log directly into your online
accounts. The IronKey Password
Manager can securely store your
sensitive online identity informa-
tion, including usernames, pass-
words, credit card numbers and
addresses. It can even generate
strong passwords for you, so that
you can really lock down your
online accounts. Not having to
type out your passwords provides
added protection from keyloggers
and other crimeware.
IronKey’s Password Manager also allows you to back up your encrypted Password Manger data
to your Online SecurityVault, synchronize password data between IronKeys, or, if your IronKey
is ever lost or stolen, securely restore all your passwords to a new IronKey. Only you can access
and decrypt your passwords.
The IronKey Password Manager does not store your passwords in a file on the file system of
the flash drive, so malware will not be able to simple copy off your password database.
Step
Description
ꢀ Adding Portable Bookmarks
To make a bookmark work in both the onboard
Firefox and the local PC’s Internet Explorer, simply
click the ‘AddWebsite” button on the IronKeyToolbar.
This will add it to your Portable Bookmarks list, which
you can access by clicking “Portable Bookmarks”.
ꢁ Adding online accounts
The IronKey Password Manager uses a self-learning
approach to capturing your logins to your online ac-
counts. To store a login, simply log into a site as you
normally would. The IronKey Password Manager will
prompt you to ask if you want to store this password
securely on your IronKey.
The next time you return to that website, you will be
asked if you want to log in with that username, or, if
you added it to your Portable Bookmark list when you
created the login, you can select the website from your
Portable Bookmarks in the IronKeyToolbar and the
IronKey Password Manager will automatically log you
into that website.
IRONKEY USER GUIDE
PAGE ꢁꢀ
Download from Www.Somanuals.com. All Manuals Search And Download.
3 Editing/deleting logins and Por-
table Bookmarks
You can manage your Password Manager accounts
from within the IronKey Control Panel. Each website
will have a set-able name, a URL, a username (logins
only), and a password (logins only).
Your passwords are not shown unless you click the
“Show” checkbox.
4 Backing Up and Restoring Pass-
word Manager Data
You can securely back up your encrypted Password
Manager data to your Online SecurityVault. Simply
click the corresponding buttons from within the Iron-
Key Control Panel. This procedure will back up your
Portable Bookmarks, logins, and Form Filler data.
Synchronizing IronKeys (or setting up Master-Slave
relationships) is easy since you can restore password
backups to your other IronKeys.
5 Using the Form Filler
You can have the IronKey Password Manager automati-
cally fill in your webform data, such as names, phone
numbers, addresses, credit card data and email ad-
dresses.
First, set up this information by clicking on the “Set-
tings” button in the IronKeyToolbar. Then, to fill a
webform, simply click the “Form Filler” button.
6 Generating strong and random
passwords
You can use the Password Generator (located within
the IronKey Control Panel) to create long, random
passwords. Then, you can have the IronKey Password
Manager remember then for you. Simply copy and
paste them into a webform when logging into an online
account.
ꢂ Automatically logging into online When you add a login to your Portable Bookmarks,
accounts
that login will appear not only in your Portable Book-
marks list, but also in the IronKey SystemTray Menu.
Simply right-click on the IronKey icon in the System
Tray, and then click on the Secure Login. The onboard
Firefox web browser will launch and automatically log
you into the account.
Safely logging into your online accounts has never been
easier.
IRONKEY USER GUIDE
PAGE ꢁꢁ
Download from Www.Somanuals.com. All Manuals Search And Download.
USINgTHE SECURE BACKUP SOFTWARE (WIndoWs onLy)
If your IronKey is lost or stolen, you
have peace of mind knowing that your
confidential information cannot be seen
by anyone but you. And getting your
data back is simple with IronKey’s Secure
Backup software, which securely re-
stores your data to a new IronKey.
Back up your data on a regular basis and
always before an update.
Step
Description
ꢀ Backing up your IronKey
You can create an encrypted backup of a single
file or your entire IronKey to your local comput-
er. Click on the “Secure Backup” button in the
IronKey Control Panel, select a destination folder,
and select which files to back up. It’s that simple.
ꢁ Restoring encrypted backups
If you ever lose your IronKey, you can restore
your data from an encrypted backup. Open the
Secure Backup client, select the location on your
local computer where the backup is located, and
select which files/folders to restore. If the data is
coming from a different IronKey, you will have to
supply the device password for that IronKey.
IRONKEY USER GUIDE
PAGE ꢁ3
Download from Www.Somanuals.com. All Manuals Search And Download.
IMPORTINg A DIgITAL CERTIFICATE INTOTHE IRONKEY (WIndoWs onLy)
The IronKey Cryptochip includes a limited amount of extremely secure hardware storage space,
which can be used for storing the private key associated with a digital certificate. This provides
you with additional strong authentication capabilities. For example, you could store a self-signed
certificate used for internal systems that will allow you to automatically log in when using the
IronKey’s onboard Firefox web browser.
The import process uses IronKey’s PKCS#ꢀꢀ interface and requires Mozilla Firefox. Note that
there is only space for one additional private key in the IronKey Cryptochip, though that key
will receive the security benefits of the Cryptochip’s tamperproof hardware and self-destruct
mechanisms.
Step
Description
ꢀ Open the onboard Firefox
Click on the icon in the IronKey Control Panel’s applica-
tion list on your user’s device.
ꢁ Open Firefox’s Options menu ꢀ. Click the ‘Tools’ in the menu bar
to the Encryption tab.
ꢁ. Click on ‘Options...’
3. Click the ‘Advanced’ icon
4. Click on the ‘Encryption’ tab
3 Click the ‘View Certificates’
button.
This will open the Firefox
Certificate Manager
IRONKEY USER GUIDE
PAGE ꢁ4
Download from Www.Somanuals.com. All Manuals Search And Download.
4 Note that IronKey’s certificate
is available here. Now you can
add your own.
Click the ‘Import’ button.
5 Browse to the PKCS#ꢀꢁ-for- You will be prompted for the location of the PKCS#ꢀꢁ-
mat certificate file and open it. format certificate file (file extension will be .p12 in UNIX/
Linux, .pfx inWindows).
6 A window will appear ask-
ing you to confirm where to
store the certificate.
Choose “IronKey PKCS#11”
ꢂ Enter the password that was
used to protect the certifi-
cate.
If no password was used, sim-
ply leave the text field blank.
8 Your certificate is now stored
securely in the IronKey
Cryptochip and is available
for use in the onboard Mozilla
Firefox.
IRONKEY USER GUIDE
PAGE ꢁ5
Download from Www.Somanuals.com. All Manuals Search And Download.
USINg MY.IRONKEY.COM (WIndoWs onLy)
Your IronKey supports advanced cryptographic authentication using strong PKI key pairs gener-
ated in the IronKey Cryptochip. When you log into my.ironkey.com from your device, it uses these
unique keys as your digital identity credentials.This locks down your account so that you must
have both your IronKey and your password in order to gain access. In other words, only you can
access your online IronKey account, even if someone stole your IronKey or your password.
In the event that you
ever lose your IronKey,
you can still access the
site in Safe Mode: a
restricted mode with
limited functionality.This
is useful for marking
your IronKey as lost, or
recovering a forgotten
password.
Step
Description
ꢀ Securely logging into your account
You can securely log into your my.ironkey.com by
clicking the “my.ironkey.com” button in the IronKey
Control Panel. This will initiate a complex PKI
handshake, thus logging you in with strong, multi-
factor authentication.
If you ever lose your IronKey, you can log into
ging in the account credentials you created when
you activated your account. This will allow you
to mark an IronKey as lost or recover a forgotten
device password.
ꢁ Marking IronKeys as lost
If you ever lose your IronKey, you can rest as-
sured that no one will ever get your data. As an
additional precaution, you can mark an IronKey as
lost from within my.ironkey.com, which will prevent
that device from ever accessing your account. If
you find your IronKey later, you can also mark it
as found again.
3 Recovering device passwords
People sometimes forget passwords. IronKey
gives you the option to back up your device pass-
word to your Online SecurityVault at my.ironkey.
com. That way, you can log into Safe Mode or with
another IronKey and recover the password.
IRONKEY USER GUIDE
PAGE ꢁ6
Download from Www.Somanuals.com. All Manuals Search And Download.
4 Monitoring account activities
The Account Dashboard shows you the recent
activities on your account, such as logins, failed
password attempts, and when your device pass-
word has been recovered.
5 Enabling Account Alerts for real-time
account monitoring
You can enable a number of Account Alerts for
additional insight into what activities are occur-
ring on your my.ironkey.com account. An email will
be sent to you with details on the security event,
such as the time and IP address of the event.
All emails regarding your account will have part of
your Secret Phrase in the subject line for addi-
tional anti-phishing protection.
6 Changing account credentials
You can change your password, Secret Questions,
Secret Image and Phrase, as well as your email ad-
dresses from within my.ironkey.com as often as you
wish to ensure that no one else may access your
account.
Creating a secondary email address gives you a
fail-safe in case your primary email address is no
longer available.
In the event that you ever lose your IronKey or forget your IronKey device password, you can
still access the site in Safe Mode: a restricted mode with limited functionality.This is useful for
marking your IronKey as lost, or recovering a forgotten password.
Step
Description
Here you will log into Safe Mode without your
IronKey.
ꢁ Enter your email address (or user-
name) and your online account pass-
word. Click “Submit”
Your Secret Image will be displayed so that you
know you are at the correct site.
Do not enter your device password in this screen.
If you have forgotten your online account pass-
word, click the “Reset Password” link.
3 An email will be sent to you with a
Login Code.
Copy and paste that login code into the page that
asks for it.
Depending on the configuration of your account,
you may need to answer your Secret Questions.
4 You are now logged into Safe Mode.
If you had forgotten your device password and
have backed it up to your Online SecurityVault,
you can recover it now.
IRONKEY USER GUIDE
PAGE ꢁꢂ
Download from Www.Somanuals.com. All Manuals Search And Download.
USINgYOUR IRONKEY IN READ-ONLY MODE (WIndoWs, MaC, LInUX)
You can unlock your IronKey in a read-only state such that files on your IronKey cannot be ed-
ited. An example of when this is useful is when you want to access a file on your IronKey while
using an untrusted or unknown computer. If you unlock your IronKey in Read-Only Mode, you
need not fear that malware on that machine will infect your IronKey or modify your files.
When you unlock your IronKey in Read-Only Mode, you will remain in Read-Only Mode until
you lock your IronKey.
Note that some features are not available in Read-Only Mode because they require modifying
files on your IronKey. Examples of unavailable features include the onboard Firefox, reformat-
ting, updating and restoring applications and files to your IronKey, and using the Applications List.
OnWindows and Mac OS x Computers:
Step
Description
ꢀ When unlocking your IronKey, select
the “Unlock IronKey in Read-Only
Mode” checkbox
ꢁ You will see a message in the IronKey
Control Panel that confirms you are in
Read-Only Mode.
On Linux Computers:
Step
Description
ironkey --read-only
ꢀ To unlock your IronKey in Read-Only
Mode on Linux, use:
ironkey --lock
ꢁ To return to a normal state where you
can edit files again, lock your IronKey
IRONKEY USER GUIDE
PAGE ꢁ8
Download from Www.Somanuals.com. All Manuals Search And Download.
Product Specifications
CAPACITY*
ꢀGB, ꢁGB, 4GB, 8GB
SPEED*
Up to 30 MB per second read speed
Up to ꢁ0 MB per second write speed
DIMENSIONS
ꢂ5mm X ꢀ9mm X 9mm
WEIgHT
0.8 oz
WATERPROOF
MIL-STD-8ꢀ0F
OPERATINgTEMPERATURE
-40 C, +85 C
OPERATINg SHOCK
ꢀ6G rms
ENCRYPTION
Hardware: 128-bit AES (CBC-Mode)
Hashing: ꢁ56-bit SHA
PKI: ꢁ048-bit RSA
Designed and Assembled in the U.S.A.
FIPS CERTIFICATIONS
FIPS 140-2 Level 2 (Certificate Number 938)
FIPS 186-2 (Certificate Numbers 305 and 380)
FIPS 197 (Certificate Numbers 655 and 689)
IronKey devices do not require any
software or drivers to be installed.
HARDWARE
USB ꢁ.0 High-Speed & USB ꢀ.ꢀ
OS COMPATIBILITY
Windows 2000 (SP4), XP (SP2), Vista
IronKey Unlocker for Linux (2.6+, x86)
IronKey Unlocker for Mac (10.4+, PPC and Intel)
* Speeds tested with 4GB device in a laboratory environment with Iometer software. Actual speeds may vary.
Advertised capacity is approximate and not all of it will be available for storage. Some space is required for onboard software.
IRONKEY USER GUIDE
PAGE ꢁ9
Download from Www.Somanuals.com. All Manuals Search And Download.
What’s next?
In many ways, that’s up to you. We are focused on building not only the
world’s most secure flash drive, but also enabling technologies that are
simple and enjoyable to use. Your feedback really matters to us, and we
carefully review all feature requests and customer feedback for prioritiza-
tion of our next great features and products.
Have a cool idea or suggestion? Please let us know. You can open a
thread on the IronKey Forum (forum.ironkey.com) or submit feedback to
of new functionality.
Where can I go for more info?
We are endeavoring to be very open about the security architecture and
technology that we use in designing and building the IronKey devices and
online services. A great deal of information can be found online on our
websites:
forum.ironkey.com
learn.ironkey.com
support.ironkey.com
User forum with thousands of “IronKeyologists”
General Information
Technical Information, such as whitepapers & FAQs
Customer support information
Who is the IronKeyTeam?
The IronKeyTeam consists of security, fraud, and industry experts with
many years of background at companies such asVisa, RSA Security, PayPal,
Authenex, Nokia, Cisco, Lexar, Netscape,Tumbleweed,Valicert,Apple, and
the Department of Homeland Security. IronKey CEO Dave Jevans is also
We have spent years and millions of dollars of research and development
to create the IronKey. Simple, accessible, and of great value, now you can
carry the world’s most secure flash drive to protect your digital life online
and on-the-go.
IRONKEY USER GUIDE
PAGE 30
Download from Www.Somanuals.com. All Manuals Search And Download.
Contact Information
Product Feedback
Feature Requests
IronKey Online
IronKey Support
5ꢀ50 El Camino Real, Suite C3ꢀ
Los Altos, CA 940ꢁꢁ USA
Monday - Friday, 8am - 5pm PST
Note: IronKey is not liable for technical or editorial errors and/or omissions contained herein; nor for inci-
dental or consequential damages resulting from the furnishing or use of this material.The information provided
herein is subject to change without notice.
The information contained in this document represents the current view of IronKey on the issue discussed as of the date of publication. IronKey can-
not guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. IronKey makes
no warranties, expressed or implied, in this document. IronKey and the IronKey logo are trademarks of IronKey, Inc. in the United States and other
countries. All other trademarks are the properties of their respective owners. © 2008 IronKey, Inc. All rights reserved. IK0010883
IRONKEY USER GUIDE
PAGE 3ꢀ
Download from Www.Somanuals.com. All Manuals Search And Download.
|
Ingersoll Rand Camera Accessories 636072 User Manual
Insignia Speaker System NS 3006 User Manual
iSound Headphones DGHP 4006 User Manual
JVC Car Stereo System GET0626 001B User Manual
Kalorik Iron USK DA 31691 User Manual
Kenwood Car Video System KVT 516 User Manual
Kenwood GPS Receiver DDX8046BT User Manual
Kingston Technology Switch KNS1650 R User Manual
KitchenAid Refrigerator KBLS22EVMS1 User Manual
Kompernass Electric Heater KH 1510 User Manual