Privaris LFLR1-01 ENTRY KEYFOB User Manual

Privaris Inc. ENTRY KEYFOB

Contents

USERS MANUAL

BPID™ LR Security Device
USER MANUAL
AND
LICENSING AGREEMENT
www.privaris.com
Privaris BPID™ LR Security Device
Congratulations on receiving your new BPID™ LR Security Device.
Record your device’s unique address here:
__ : __ __ : __ __ : __ __ : __ __ : __ __: __ __
The device address is found on the back of your device.
It is an 11 character string of letters and numbers separated by colons.
For optimal results and convenience using your device, it is
important that you read this manual. In addition to instructions for
proper device usage, information is included on the device itself - how it
works, its personal privacy features, troubleshooting guidelines, and
answers to frequently asked questions.
IMPORTANT. READ BEFORE USING
FOR SUCCESSFUL DEVICE OPERATION FOLLOW THESE
GUIDELINES:
Ensure that fingers are free of excessive dirt or grease.
Clean fingers with a tissue, or on a clean article of clothing.
You do not need to wash your hands prior to device use.
Always attempt to place your finger on the fingerprint sensor
in the same position in which you placed it during the
enrollment process - the Center Position.
Never press hard or squeeze the device. Press just enough
to make solid contact with the sensor.
Always keep your finger flat and level with the device when
placing it on the fingerprint sensor. The knuckle should
never be raised or bent.
©2006 Privaris, Inc.
1
Privaris BPID™ LR Security Device
1. WHAT IS A BPID™ SECURITY DEVICE? 3
OVERVIEW 3
DEVICE DIAGRAM 3
APPLICATIONS 4
2. USAGE INSTRUCTIONS 5
STEP 1: ACTIVATION 5
STEP 2: USING YOUR DEVICE 5
BATTERY REPLACEMENT 7
BATTERY LEVEL INDICATORS 7
CHANGING THE BATTERY 7
3. SECURITY & PERSONAL PRIVACY 8
4. HOW IT WORKS 9
ENROLLMENT 9 T
VERIFICATION 9
TRANSMISSION 9
5. GENERAL TROUBLESHOOTING 10
6. FACILITY & GATE ACCESS TROUBLESHOOTING 13
7. FREQUENTLY ASKED QUESTIONS 14
8. CUSTOMER SERVICE 16
9. WARRANTY 17
10. LICENSING AGREEMENT 18
11. PERMISSIONS 21
2
Privaris BPID™ LR Security Device
1. WHAT IS A BPID™ SECURITY DEVICE?
Overview
A BPID™ Security Device is a wireless, biometric personal identification
device that provides identity verification using fingerprint biometrics.
Because no two fingerprints are identical, biometric verification
significantly heightens security levels by ensuring that the intended and
authorized user of the device is the only person for whom the device will
function.
The BPID™ device uses fingerprints to verify its user’s identity before
granting access to a specific resource. It works in much the same way
that a remote control is used to operate a television or a garage door, but
instead requires the authorized user’s fingerprint to “unlock” and operate
the device.
Device Diagram
Figure 1: Front of Device
Figure 2: Back of Device
3
Privaris BPID™ LR Security Device
The BPID™ Security Device’s design is simple and user-friendly. The
device has four components:
Lights: A green, yellow and red light help to prompt the
user through device operation and communicate
to the user what mode the device is in.
Power Button: Turns the device on and off
Fingerprint Sensor: Scans a user’s fingerprint and either grants or
denies access to a particular resource.
Battery Compartment: Located under a sliding cover. The cover is
removed using the battery release.
Applications
The BPID™ Security Device replaces standard forms of identity
verification. Examples of possible applications include the use of a
BPID™:
In place of a proximity (prox) card for access through a doorway
or vehicle gate
In place of a key to access a home, garage or automobile
In place of a password to access a computer or network
In place of a driver’s license, passport, or corporate ID card to
verify an individual’s identity
In place of a credit card to purchase items without having to
swipe a traditional credit card or sign for the purchase.
4
Privaris BPID™ LR Security Device
2. USAGE INSTRUCTIONS
Step 1: Activation
In order to activate a BPID™ Security Device you must be enrolled in the
device. Enrollment is the device issuance process and is typically
managed by an organization’s issuing authority, such as the Information
Technology Department, Security Office, or Human Resources
Department. Enrollment initializes the device and “marries” it to its
owner. During enrollment, users are asked to place their finger on the
device several times in order for the fingerprint sensor to scan and
securely store their print’s features.
Once enrolled in a device, it is activated and ready for use.
Step 2: Using Your Device
FACILITY ACCESS (secured doorways or gated entrances):
Important: To save time, verify as you approach the door reader
rather than when you arrive. With the device’s green light lit, keep
your finger on the sensor and the device will remain active/green
until you reach the access point.
1. Open the device’s clear plastic flip-cover.
2. Click the round gray Power Button once.
-A blinking yellow light will indicate that the device is on and is
awaiting a finger.
3. With the yellow light blinking, place an enrolled finger on the
device’s fingerprint sensor to verify (in a position used during
enrollment).
-A solid yellow light will indicate that the device is scanning your
finger.
4. A solid green light indicates that your fingerprint and your identity
have been successfully verified.
5. With the green light still on, touch the tip of your device to the
device reader located at the doorway or access point.
6. Your device will wirelessly transmit your programmed credentials
to the access point.
7. Access to the facility is permitted.
5
Privaris BPID™ LR Security Device
8. Press the power button to turn off the device. If you forget, it will
power off automatically after approximately 10 seconds.
FACILTIY ACCESS: VEHICLE GATES
1. Open the device’s clear plastic flip-cover.
2. Click the round gray Power Button once.
-A blinking yellow light will indicate that the device is on and is
awaiting a finger.
3. With the yellow light blinking, place an enrolled finger on the
device’s fingerprint sensor to verify (in a position used during
enrollment).
-A solid yellow light will indicate that the device is scanning your
finger.
4. A solid green light indicates that your fingerprint and your identity
have been successfully verified.
5. Your device will wirelessly transmit your programmed credentials
through the car window to a transceiver outside of your vehicle
6. Access to the facility will be permitted.
7. Press the power button to turn off the device. If you forget, it will
power off automatically after approximately 10 seconds.
6
Privaris BPID™ LR Security Device
BATTERY REPLACEMENT
The BPID™ Security Device is powered by a CR2 lithium battery, the
same type of battery used in many cameras. A replacement battery can
be purchased at most camera stores, drug stores, or supermarkets.
Battery Level Indicators
Low Battery Indicator:
A quick flashing red light upon start-up at the same time the yellow light
comes on.
Very Low Battery Indicator:
A quick flashing red light upon start-up and then a flashing red light
periodically throughout normal device usage.
Critically Low Battery Indicator:
A quick flashing red light upon start-up and then the device turns itself off
automatically.
Changing the Battery
1. Open the battery compartment on the back of the device by inserting
the tip of a pen into the battery release (the small square at the
bottom of the battery compartment) to pop the release and then slide
the cover open (see Figure 2).
2. Remove the old battery.
3. Insert the new battery with the positive (+) end pointing toward the
top of the device and ensure that it is secured tightly in the
compartment. It should be touching the battery contacts at the top
and bottom of the compartment.
4. Replace the battery cover by aligning it with the ridges of the battery
compartment and sliding it back into position. Make sure that it is
latched securely in place. A loud click is heard when properly
closed.
Replacing the battery does not require the user to be re-enrolled.
7
Privaris BPID™ LR Security Device
3. SECURITY & PERSONAL PRIVACY
Key points related to the security of the BPID™ device and the user’s
personal privacy:
All fingerprint processing is done within the device, so fingerprints do
not have to be stored in any type of database, thereby protecting the
user’s personal privacy.
The fingerprint is used only for identity verification. Neither the
fingerprint nor its features are ever physically transmitted nor ever
leave the device. The device wirelessly transmits only the
credentials necessary for authorization and access (i.e., a facility
entrance code, a password, or personal identity credentials).
The fingerprint features stored on the device cannot be retrieved
from the device.
The device releases the programmed authorization only after the
authorized user of the device applies an enrolled finger.
The device’s fingerprint sensor recognizes and rejects a fake finger
or other attempts to fool the device. These techniques rely on the
specific chemistry of the skin, which is not present in a fake finger.
The device is a cryptographic services provider and supports two-
way encrypted communications. Data can be encrypted on the
device before it is released so that only the intended recipient can
interpret the information.
8
Privaris BPID™ LR Security Device
4. HOW IT WORKS
The BPIDTM Security Device has three functions: enrollment, verification,
and transmission.
Enrollment
Enrollment is the device activation and issuance process and generally
occurs only once. It is what assigns or “marries” the device to its user.
During enrollment, numeric representations of the unique features of a
fingerprint (i.e. the ridges, valleys and whorls) are encoded and securely
stored on the BPIDTM device. The actual fingerprint is not stored on the
device. The fingerprint features are encoded and securely stored so that
the device will function only for its authorized user. Also during
enrollment, the user’s credentials (e.g. a facility entrance code, a
password, or personal identity document) are typically encrypted and
wirelessly transferred and stored on the BPID™ device.
Verification
After the initial enrollment process, each time a finger is placed on the
BPID™ device, the device will attempt to match that print’s features to an
originally enrolled fingerprint. This is the verification, or matching,
process. A match is indicated by a green light and means that the user
has been verified as the authorized owner of the device. If a user
attempts to verify a non-enrolled finger, a match will not be found and
access to the specified resource will not be granted. Failed verification
attempts are indicated by a red light.
Transmission
Upon verification, which is the matching of a live finger to the template of
an enrolled finger, the BPID™ device wirelessly transmits the user’s
credentials that were stored during enrollment (e.g. a facility entrance
code, a password, or personal identity documents). The transmission is
verification of the user’s identity. The credentials are transferred typically
as an encrypted data stream, depending on the application. Only the
authorized user’s finger can trigger the release of their credentials, and
only the user’s credentials are transferred - the stored fingerprint is never
transferred and never released from the device.
The BPID™ Security Device can store and transmit any number of user
credentials including digital certificates. It supports both low frequency
RFID and 802.15.4 wireless communication protocols for data
transmission.
9
Privaris BPID™ LR Security Device
5. GENERAL TROUBLESHOOTING
PROBLEM
Difficulty verifying. Getting solid red light instead of a solid green light.
Try the following, in order, until capture speed increases or a green
light appears:
Make sure you are using a finger that was enrolled.
Wipe-off any excess dirt or grease from finger.
Wipe-off the sensor with a clean finger, swiping it down the
sensor twice to clean it.
Make sure your fingerprint core is directly over the very center of
the sensor in the Center Position, and not aligned with the bottom
edge of the sensor. Remember the placement reference point
given during enrollment and try to replicate it. Unless you have
very small fingers, you will likely be covering all or a portion of the
grey power button.
Lift finger and replace it during verification, trying slightly different
positions on and around the Center Position (core). Be sure to
hold in place for 2 seconds before moving to a new position to
give the device sufficient time to interpret your fingerprint.
Too little or too much pressure may be being applied. While the
sensor is scanning, increase the pressure for a few seconds, and
then decrease it to find the right amount. On a scale of 1 – 5 (5
being the highest) pressure should equal about a “2.” Less than
or greater than “2” can present recognition difficulties.
Hold the device with only one hand, or just as you did during
enrollment.
Keep finger flat and level with the sensor. The knuckle should
never be raised or bent.
If still getting a red light, turn the device off and back on, and try
verifying with a different enrolled finger.
10
Privaris BPID™ LR Security Device
PROBLEM
Device will not power on.
1. Open battery compartment by inserting tip of pen into the battery
release (see Figure 2).
2. Remove cover.
3. Remove battery.
4. Put the same battery back, making sure that it is secured tightly
and properly aligned. It should be touching the battery contacts
on the top and bottom of the compartment, and the positive (+)
end should be pointing toward the tip of the device.
5. Replace the battery cover by aligning it with the ridges of the
battery compartment and sliding it back into position. Make sure
that it is latched securely in place. A loud click is heard when
properly closed.
If the device still does not power on, replace the battery with a new
one (see below).
__________________________________________________________
PROBLEM
Quick flashing red light seen anytime during operation OR a quick
flashing red light and then device powers itself off.
A flashing red light is an indication of a low or critically low battery.
1. Replace battery. The battery is a standard CR2 lithium camera
battery. It can be easily replaced by inserting the tip of a pen
into the battery release (see Figure 2) and pressing down to
release the battery cover.
2. Remove the old battery and insert the new battery with the
positive (+) end pointing toward the top of the device and ensure
that it is secured tightly in the compartment. It should be
touching the battery contacts at the top and bottom of the
compartment.
3. Replace the battery cover by aligning it with the ridges of the
battery compartment and sliding it back into position. Make sure
that it is latched securely in place. A loud click is heard when
properly closed.
Replacing the battery does not require the user to be re-enrolled.
11
Privaris BPID™ LR Security Device
PROBLEM
The device is blinking green instead of blinking yellow..
If the device is blinking green it is enrollment mode and is ready to
for an Enrollment Admnistrator to enroll a user in the device or to
modify a configuration setting on the device. For the device to be in
enrollment mode, the power button has to be held down for
approximately three (3) seconds.
To put the device in regular use mode for doorway or gate access,
turn off the device then press the power button once. The light on
the device will blink yellow.
PROBLEM
All three lights (green, yellow and red) are blinking quickly.
Whenever all three lights on the device are blinking simultaneously,
the device has entered its Safe Mode. This typically occurs when
the power button has been held down for an excessive period of
time.
To reset the device, simply press the power button to power off the
device. Then power it back on by pressing and quickly releasing the
power button. The device should now operate normally.
PROBLEM
Device will not connect to a third party software application.
If you were enrolled in the device by an issuing authority (your
company or other) and subsequently attempt to install applications
from software vendors other than Privaris that use the BPID™
device, you may experience connectivity problems with that
application (error messages such as "unable to connect with device"
or "communication with device failed"). If this occurs your device
may have had a license key stored on it during enrollment. Please
see your issuing authority to obtain the license key and permission to
use it with the intended application.
12
Privaris BPID™ LR Security Device
6. FACILITY & GATE ACCESS TROUBLESHOOTING
PROBLEM
Seeing a green light and successfully verifying, but not being granted
access to a doorway:.
1. After a successful verification, with the green light lit, take your
device and physically touch the tip of it to the reader at the
facility access point. Try touching different points on the reader.
2. If still not working, try verifying again, but take the device to a
reader at a different facility access point and try again.
3. If the device works at another access point, then there is a
problem with the reader at the first access point. Report problem
to issuing authority.
4. If the device does not work at either access point, it is likely a
problem with your device. See the issuing authority for
troubleshooting assistance with your device.
PROBLEM
The device is blinking green instead of blinking yellow..
If the device is blinking green it is enrollment mode and is ready to
for an Enrollment Admnistrator to enroll a user in the device or to
modify a configuration setting on the device. For the device to be in
enrollment mode, the power button has to be held down for
approximately three (3) seconds.
To put the device in regular use mode for doorway or gate access,
turn off the device then press the power button once. The light on
the device will blink yellow.
13
Privaris BPID™ LR Security Device
7. FREQUENTLY ASKED QUESTIONS
How do I turn on my device?
Press and quickly release the round gray Power Button located on the
front of the device. One click will ready the device for gate or doorway
access.
How do I know when my device is ready for verification?
A blinking yellow light indicates that the device is ready to accept a finger
for verification. For facility access this occurs after you turn on your
device. For computer/network access, this occurs after the computer
has made a connection to your device.
How will I know if the device has successfully verified my
fingerprint?
A solid green light will display indicating a successful verification and you
will be simultaneously granted access to the facility .
How much pressure do I need to apply with my finger?
The sensor works best with enough pressure to make solid contact. Do
not squeeze the device, and do not simply rest your finger on the sensor.
On a scale of 1 – 5 (5 being the highest) pressure should equal about a
“2.” Less or greater than “2” can present recognition difficulties. If your
finger is on the sensor but the device is still blinking yellow, then you are
not pressing hard enough.
What if I injure my finger?
During enrollment at least two fingers will be enrolled in your device. So
if you were to injure your primary finger, you’ll have another to use as a
temporary back up.
What if my device is lost or stolen?
As soon as you discover your device is missing, contact your issuing
authority and you should be supplied with a replacement device. You
will have to be enrolled in your new device. And remember, your device
is useless in anyone’s hands but your own, so if it is lost or stolen, there
is no concern that anyone else will be granted access with your device.
What happens if I drop my device?
Your device is constructed to withstand most accidents. But like any
electronic device, significant unintentional or intentional mishandling may
render the device inoperable.
14
Privaris BPID™ LR Security Device
Is my fingerprint stored on the device?
No. Your fingerprint itself is not stored. Only numeric representations of
unique features of your fingerprint (for example, specific ridges, valleys
or whorls) are encoded and stored on the device in the form of a
template. These numeric representations are used in the matching
process that confirms you as the authorized user of the device, and
cannot be used to regenerate your actual fingerprint.
Is my fingerprint transmitted from the device?
No. When your device matches your live fingerprint to your stored
fingerprint template it wirelessly transmits a stored credential which
confirms your identity. Your fingerprint is never transmitted. Neither
your fingerprint nor its features can ever leave your device, and it is
impossible to recreate your original fingerprint from the device.
Can my fingerprint be faked and the security of my device
compromised?
The fingerprint sensor on your device uses sensing technology that
allows it to reject a fake finger or other attempts to fool the device. The
sensor actually looks beyond the surface of your finger at the inner
layers of your skin where your fingerprint features are formed. These
techniques rely on the specific chemistry of your skin, which is not
present in a fake finger.
Can my fingerprints be accessed from my device?
No. The device does not permanently store your actual fingerprint.
Numeric representations of specific unique features of your fingerprint
are encoded and stored on the device and used in the matching process
that confirms you as the authorized user of the device. These numeric
representations cannot be converted into your actual fingerprint.
Can a third party steal my credentials while they are being
wirelessly transmitted to or from my device?
Typically, all information sent to or from your device is encrypted. This
prevents a third party from intercepting the information as it is
transmitted. For some low frequency physical access applications,
encryption is not an option; however the close proximity required for
access significantly reduces the possibility of a transmission being
intercepted without notice.
15
Privaris BPID™ LR Security Device
8. CUSTOMER SERVICE
If the information contained herein has not answered your question(s)
regarding your device, or to return defective products, please contact
Privaris Customer Service at (866) 213-8252.
16
Privaris BPID™ LR Security Device
9. WARRANTY
Limited Warranty. Licensor warrants that the Software will, for a period of
one (1) year following its delivery to you, be in good working order and
will conform in all material respects to Licensor's published
specifications. Licensor does not warrant that the operation of the
Software will be uninterrupted or error-free, or that the functionality of the
Software will meet your individualized requirements. The foregoing
warranty does not cover repair for damages, malfunctions, or service
failures caused by (1) actions of any non-Licensor personnel, you’re your
failure to follow Licensor's installation, operation, or maintenance
instructions, (3) attachment to or incorporation in the Software of non-
Licensor products not supported or otherwise authorized by Licensor, or
(4) or any factor beyond Licensor's control, including fire, explosion,
lightning, pest damage, power surges or failures, strikes or labor
disputes, water, acts of God, the elements, war, terrorism, civil
disturbances, acts of civil or military authorities or the public enemy,
transportation facilities, fuel or energy shortages, or acts or omissions of
communications carriers. EXCEPT FOR THE WARRANTIES SET
FORTH IN THIS SECTION 6, THE SOFTWARE IS LICENSED "AS IS,"
AND LICENSOR DISCLAIMS ANY AND ALL OTHER WARRANTIES,
WHETHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY,
QUALITY, FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, OR
INTERFERENCE WITH YOUR ENJOYMENT OF THE SOFTWARE OR
OF NON-INFRINGEMENT. YOUR SOLE REMEDY AGAINST
LICENSOR, ITS AFFILIATES, SUBCONTRACTORS, AND
REPRESENTATIVES FOR LOSS OR DAMAGE CAUSED BY ANY
FAILURE OF THE SOFTWARE TO OPERATE IN CONFORMITY WITH
THIS WARRANTY, REGARDLESS OF THE FORM OF ACTION,
WHETHER IN CONTRACT OR TORT, INCLUDING NEGLIGENCE,
STRICT LIABILITY OR OTHERWISE, SHALL BE (1) THE REPAIR OR
REPLACEMENT OF THE SOFTWARE, PROVIDED THAT SUCH
SOFTWARE IS RETURNED IN ACCORDANCE WITH THE
CONDITIONS PROVIDED HEREIN OR (2) IF SUCH REPAIR CANNOT
BE MADE OR AN EQUIVALENT REPLACEMENT CANNOT BE
PROVIDED, THE REFUND OF AMOUNTS PREVIOUSLY PAID BY
YOU BETWEEN DISCOVERY OF THE FAILURE OF THE SOFTWARE
TO OPERATE IN CONFORMITY WITH THIS WARRANTY AND THE
RETURN OF THE SOFTWARE AS REQUIRED BY THIS AGREEMENT.
17
Privaris BPID™ LR Security Device
10. LICENSING AGREEMENT
READ THE TERMS AND CONDITIONS OF THIS LICENSE
AGREEMENT (“AGREEMENT”) CAREFULLY BEFORE OPENING
THIS PACKAGE. THE SOFTWARE APPLICATIONS AND THE
ACCOMPANYING USER DOCUMENTATION CONTAINED IN THIS
PACKAGE ARE COPYRIGHTED AND ARE LICENSED (NOT SOLD)
TO YOU IN ACCORDANCE WITH THE TERMS OF THIS
AGREEMENT. BY OPENING THIS PACKAGE, YOU MANIFEST YOUR
ASSENT TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF
YOU DO NOT ASSENT TO BE BOUND BY THE TERMS OF THIS
AGREEMENT, THEN YOU MUST PROMPTLY RETURN THIS
PACKAGE, IN UNOPENED FORM, AND YOU WILL RECEIVE A
REFUND OF YOUR MONEY.
1. Generally. This Agreement represents the entire agreement
between you, the end user (either in your individual capacity or as an
authorized agent of an otherwise legally-recognized organization), and
Privaris, Inc. (“Licensor”) relating to the software that is pre-installed on
the hardware product(s) (“Hardware”) enclosed within this package, as
well as all documentation related thereto (collectively, the “Software”).
This Agreement supersedes any prior proposal, representation, or
understanding between you and Licensor related to the Software. This is
a legally-binding agreement and governs the conditions under which you
and/or your organization may use the Software.
2. Term. This Agreement is effective on your opening of this
package and shall continue until terminated as set forth in this
Agreement. You may terminate this Agreement at any time by returning
the Hardware and all copies of the Software to Licensor. Licensor may
terminate this Agreement on the breach by you of any term of this
Agreement, including without limitation your failure to pay any applicable
fees described in this Agreement. On any such termination, you shall
return to Licensor the Hardware and all copies of the Software.
3. Grant of Licenses. Licensor grants you the personal,
nontransferable, nonsublicensable and nonexclusive right and license to
execute the Software (in its executable, object-code form only) on the
Hardware for the sole purpose of serving your personal needs or the
internal needs of your business. You shall not assign, sublicense,
transfer, pledge, lease, rent, or share your rights under this Agreement,
whether by contract, operation or law or otherwise. Any use, copying, or
18
Privaris BPID™ LR Security Device
distribution of the Software not expressly authorized by this Agreement
shall automatically terminate your right and license hereunder. This grant
shall be limited to use of the Software with the Hardware in accordance
with the terms of this Agreement.
4. Trade Secret Protection. The Software contains substantial trade
secrets of Licensor, and you shall employ reasonable security
precautions to maintain the confidentiality of such trade secrets. You
shall not "unlock," decompile, or reverse-assemble the binary or object
code portions or versions of the Software, as the terms are generally
used in the computer industry.
5. Fees. The fees for the use of the Software in accordance with
this Agreement consist of the initial license fee that is incorporated as
part of the purchase price of the Hardware purchased by you from
Licensor, its authorized resellers or its authorized licensees. The dollar
amount of such fees and the terms of payment are specified in the
product invoice separately furnished to you. You shall pay such fees to
Licensor in accordance with the terms of such product invoice.
6. Limited Warranty. Licensor warrants that the Software will, for a
period of one (1) year following its delivery to you, be in good working
order and will conform in all material respects to Licensor's published
specifications. Licensor does not warrant that the operation of the
Software will be uninterrupted or error-free, or that the functionality of the
Software will meet your individualized requirements. The foregoing
warranty does not cover repair for damages, malfunctions, or service
failures caused by (1) actions of any non-Licensor personnel, you’re your
failure to follow Licensor's installation, operation, or maintenance
instructions, (3) attachment to or incorporation in the Software of non-
Licensor products not supported or otherwise authorized by Licensor, or
(4) or any factor beyond Licensor's control, including fire, explosion,
lightning, pest damage, power surges or failures, strikes or labor
disputes, water, acts of God, the elements, war, terrorism, civil
disturbances, acts of civil or military authorities or the public enemy,
transportation facilities, fuel or energy shortages, or acts or omissions of
communications carriers. EXCEPT FOR THE WARRANTIES SET
FORTH IN THIS SECTION 6, THE SOFTWARE IS LICENSED "AS IS,"
AND LICENSOR DISCLAIMS ANY AND ALL OTHER WARRANTIES,
WHETHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY,
QUALITY, FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, OR
INTERFERENCE WITH YOUR ENJOYMENT OF THE SOFTWARE OR
OF NON-INFRINGEMENT. YOUR SOLE REMEDY AGAINST
19
Privaris BPID™ LR Security Device
LICENSOR, ITS AFFILIATES, SUBCONTRACTORS, AND
REPRESENTATIVES FOR LOSS OR DAMAGE CAUSED BY ANY
FAILURE OF THE SOFTWARE TO OPERATE IN CONFORMITY WITH
THIS WARRANTY, REGARDLESS OF THE FORM OF ACTION,
WHETHER IN CONTRACT OR TORT, INCLUDING NEGLIGENCE,
STRICT LIABILITY OR OTHERWISE, SHALL BE (1) THE REPAIR OR
REPLACEMENT OF THE SOFTWARE, PROVIDED THAT SUCH
SOFTWARE IS RETURNED IN ACCORDANCE WITH THE
CONDITIONS PROVIDED HEREIN OR (2) IF SUCH REPAIR CANNOT
BE MADE OR AN EQUIVALENT REPLACEMENT CANNOT BE
PROVIDED, THE REFUND OF AMOUNTS PREVIOUSLY PAID BY
YOU BETWEEN DISCOVERY OF THE FAILURE OF THE SOFTWARE
TO OPERATE IN CONFORMITY WITH THIS WARRANTY AND THE
RETURN OF THE SOFTWARE AS REQUIRED BY THIS AGREEMENT.
7. Limitations on Liability. IN NO EVENT SHALL LICENSOR BE
LIABLE FOR INCIDENTAL, INDIRECT, SPECIAL, OR
CONSEQUENTIAL DAMAGES, OR FOR LOST PROFITS, SAVINGS,
OR REVENUES OF ANY KIND, OR FOR LOST DATA OR DOWNTIME,
REGARDLESS OF WHETHER LICENSOR HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES. THE CUMULATIVE
LIABILITY OF LICENSOR TO YOUR ORGANIZATION FOR ALL
CLAIMS RELATING TO THE SOFTWARE OR THIS AGREEMENT,
REGARDLESS OF THE FORM OF ACTION, WHETHER IN
CONTRACT OR TORT, INCLUDING NEGLIGENCE, STRICT
LIABILITY, OR OTHERWISE, SHALL NOT EXCEED THE TOTAL
AMOUNT OF ALL FEES PAID TO LICENSOR HEREUNDER.
8. Miscellaneous. The provisions of Sections 4, 6, 7 and this
Section 8 shall continue to apply in accordance with their terms,
notwithstanding the termination of this Agreement. References to "your
organization" or "you" herein, for purposes of establishing the permitted
use of the Software, shall include the operations of any direct or indirect
parent or subsidiary company or of any direct or indirect subsidiary
company of any such parent company. This Agreement and the rights
and obligations of the parties with respect to the Software shall be
governed by Virginia law, as it applies to a contract negotiated, executed,
and performed in that state and without giving effect to principles of
conflicts of law. Any legal action or proceeding arising under this
Agreement shall only be initiated in the courts of the Commonwealth of
Virginia. Execution and delivery of this Agreement by the parties
indicates their intent to submit their disputes, their persons and their
property, generally and unconditionally, to the jurisdiction of such courts.
Venue shall be proper in any such court. If any action is brought by either
20
Privaris BPID™ LR Security Device
party to this Agreement against the other party regarding the subject
matter of this Agreement, the prevailing party shall be entitled to recover,
in addition to any other relief granted, reasonable attorney fees and
expenses of litigation.
YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT
AND UNDERSTAND THIS AGREEMENT AND THAT BY OPENING
THIS PACKAGE, YOU MANIFEST YOUR ASSENT TO BE BOUND BY
ITS TERMS AND CONDITIONS.
11. PERMISSIONS
Portions of the software on the BPID™ Security Device may be subject to the
following copyright notices:
Copyright (c) 1990 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice
and this paragraph are duplicated in all such forms and that any documentation, and other materials
related to such distribution and use acknowledge that the software was developed by the University of
California, Berkeley. The name of the University may not be used to endorse or promote products
derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED
``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
Copyright (c) 1988, 1990, 1993 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. 3. Neither the name of the
University nor the names of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1982, 1986, 1989, 1991, 1993, 1994
The Regents of the University of California. All rights reserved. (c) UNIX System Laboratories, Inc.
All or some portions of this file are derived from material licensed to the University of California by
American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced herein
with the permission of UNIX System Laboratories, Inc.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
21
Privaris BPID™ LR Security Device
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. 3. All advertising materials
mentioning features or use of this software must display the following acknowledgement: This product
includes software developed by the University of California, Berkeley and its contributors. 4. Neither the
name of the University nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The author of this software is David M. Gay.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby
granted, provided that this entire notice is included in all copies of any software which is or includes a
copy or modification of this software and in all copies of the supporting documentation for such
software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED
WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR AT&T MAKES ANY
REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF
THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
Copyright 1989, 1990 Advanced Micro Devices, Inc.
This software is the property of Advanced Micro Devices, Inc (AMD) which specifically grants the user
the right to modify, use and distribute this software provided this notice is not removed or altered. All
other rights are reserved by AMD.
AMD MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS
SOFTWARE. IN NO EVENT SHALL AMD BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH OR ARISING FROM THE FURNISHING, PERFORMANCE, OR
USE OF THIS SOFTWARE.
Copyright (C) 1993 C.W. Sandmann
(C) Copyright 1992 Eric Backus
This software may be used freely so long as this copyright notice is left intact. There is no warrantee on
this software. Copyright (C) 1993 by Sun Microsystems, Inc. All rights reserved.
Developed at SunPro, a Sun Microsystems, Inc. business. Permission to use, copy, modify, and
distribute this software is freely granted, provided that this notice is preserved.
(c) Copyright 1986 HEWLETT-PACKARD COMPANY
To anyone who acknowledges that this file is provided "AS IS" without any express or implied warranty:
permission to use, copy, modify, and distribute this file for any purpose is hereby granted without fee,
provided that the above copyright notice and this notice appears in all copies, and that the name of
Hewlett-Packard Company not be used in advertising or publicity pertaining to distribution of the
software without specific, written prior permission. Hewlett-Packard Company makes no representations
about the suitability of this software for any purpose.
22
Privaris BPID™ LR Security Device
Copyright (C) 2001 Hans-Peter Nilsson
Permission to use, copy, modify, and distribute this software is freely granted, provided that the above
copyright notice, this notice and the following disclaimer are preserved with no changes.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Copyright (c) 2001 Christopher G. Demetriou
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. 3. The name of the author may not
be used to endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Copyright 2002 SuperH, Inc. All rights reserved
This software is the property of SuperH, Inc (SuperH) which specifically grants the user the right to
modify, use and distribute this software provided this notice is not removed or altered. All other rights
are reserved by SuperH.
SUPERH MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS
SOFTWARE. IN NO EVENT SHALL SUPERH BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH OR ARISING FROM THE FURNISHING,
PERFORMANCE, OR USE OF THIS SOFTWARE.
Copyright (c) 1999 Kungliga Tekniska Hogskolan
(Royal Institute of Technology, Stockholm, Sweden).
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. 3. Neither the name of KTH nor the
names of its contributors may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL KTH OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
23
Privaris BPID™ LR Security Device
Copyright (c) 2000, 2001 Alexey Zelkin <phantom@FreeBSD.org>
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (C) 1997 by Andrey A. Chernov, Moscow, Russia.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1997-2002 FreeBSD Project.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1984,2000 S.L. Moshier
24
Privaris BPID™ LR Security Device
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby
granted, provided that this entire notice is included in all copies of any software which is or includes a
copy or modification of this software and in all copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED
WARRANTY. IN PARTICULAR, THE AUTHOR MAKES NO REPRESENTATION OR WARRANTY OF
ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR
ANY PARTICULAR PURPOSE.
Copyright (c)1999 Citrus Project, All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. 3. The name of the author may not
be used to endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the copyright notice,
this list of conditions and the following disclaimer. 2.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution. 3. All
advertising materials mentioning features or use of this software must display the following
acknowledgement: "This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used
25
Privaris BPID™ LR Security Device
are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof)
from the apps directory (application code) you must include an acknowledgement: "This product includes
software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC
YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: 1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must
reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution. 3. All advertising materials
mentioning features or use of this software must display the following acknowledgment: "This product
includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
(http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used
to endorse or promote products derived from this software without prior written permission. For written
permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not
be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the
OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1994, 1997, 2001, 2002 Red Hat Incorporated.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met: Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce
the above copyright notice, this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution. The name of Red Hat Incorporated may not be
used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL RED HAT INCORPORATED BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
Privaris BPID™ LR Security Device
Copyright (c) 2001, Dr Brian Gladman <brg@gladman.me.uk>, Worcester, UK.
All rights reserved.
TERMS
Redistribution and use in source and binary forms, with or without modification, are permitted subject to
the following conditions: 1. Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution. 3. The copyright holder's name must not be used to endorse or
promote any products derived from this software without his specific prior written permission. This
software is provided 'as is' with no express or implied warranties of correctness or fitness for purpose.
27

Navigation menu