03. Using the Demo [5:29]

Description: This video explains how to use the FileMaker demo file that comes with the Biometric Fingerprint Reader plug-in.

YouTube Preview Image

Transcript:

Hi, in this video we are going to take a closer look at the Biometric FingerPrint  Reader and overview the demo that is included with the bundle.

0:13 The first step you want to do is register the plug-in; you need to register the plug-in before any of the actions or commands will be available to you. In this case, my demo is running in live mode and it assumes that the plug-in has been purchased. Step 2 is to initialize; by clicking this button it simply tells the plug-in load all included libraries and initialize itself so that it’s ready for use. This only has to be done once per FileMaker session. So once you open FileMaker and initialize, you don’t need to initialize at any point in the future unless you close FileMaker.

0:54 One of the main aspects of the Biometric FingerPrint Reader is to enroll users. A user is an individual; and when you enroll you’ll be enrolling an individual’s finger or fingers. Let’s take a look at that. I’m going to enroll user and give that user an ID of Marc. Now my ID can be either text or numbers, it’s just limited to 32 characters. You don’t need to display a dialogue like this for the user; you could actually take an ID that’s from your database already, a unique ID like a record ID. Or you could put a user name or whatever unique identifier you’d like to use; in this case I’ll use Marc. I’ll go ahead and enroll my left index finger. So I’ve now enrolled Marc into the system. Let’s go ahead and enroll another user, this time we’ll put in Marc 2. I’ll use and enroll my right index finger, but you also have the option of enrolling multiple fingers. So in that same session I’m going to enroll my right middle finger as well, and you can see that finger 3 has been added to Marc 2 and finger 2 has been added to Marc 2. You can see now I have two users in the system. By clicking this button, it simply switches the user that the demo is oriented on. So in this case; Marc and the fingers for Marc are the index 7, and you can use this key down here to show you the indexes, and then if I view Marc 2 I can see that Marc has finger 2 and 3. This is the area that we store the actual digital fingerprint and we are storing that in a container field in FileMaker.

3:00 There’s another option in the plug-in that allows you to get finger indexes. So if I click this button, we present a dialogue that shows the user and the fingers that are enrolled for that user. That’s a function that may come in handy if you want to find out how many fingers are enrolled for particular users. In most cases you would store those right in FileMaker and have them available to you that way.  There’s also an option to delete a user here. By deleting a user, you’re deleting that individual fingerprints for that individual. Here we have an option to delete all users, which will delete all users and all fingerprints for those users.

3:45 Now let’s take a look at identifying a user. If you recall, we properly enrolled my left index finger; I’ll click identify now and put my left index finger on the reader. Then you can see that the demo has identified me as Marc and unlocked the sensitive data that I might not otherwise be able to see. Now let’s use another example where I will attempt to identify a finger that is not enrolled in the system. In this case I’ll use my left ring finger and you’ll see that it says no match found; Touch fingerprint reader with any enrolled finger….so I’ll close that now, and you’ll see that indeed there is no match found and the lock icon will appear. Identify, this time I’ll put my right index finger, which if you recall was enrolled with Marc 2. Therefore I do have access to the information. So what you protect in FileMaker is entirely up to you. The pass or fail on the identification is derived through a script, so you can protect things like a record; you can protect things like items within a record; you can protect a certain area of the system completely through a script by way of using this method.  There is numerous ways you can take advantage of pass or fail in this scenario.