Index
Overview
Navigation and Tool Bars
Content

Overview   top
An identity is like a user account. Each identity has its own set of documents and settings. It is incomplete until a log in lock has been assigned to it.

Once this has been done, the log in lock cannot be edited anymore.

Document metadata is encrypted with the log in lock and document data is encrypted with the data lock (if specified, otherwise the log in lock is used). Therefore, documents are tied to an identity. If the identity is deleted, its documents are not accessible anymore.
Ever.


Navigation and Tool Bars   top
: you will be asked to save the changes to the identity. If you set a log in lock for the first time, you will be logged out and you will have to log back in with an access sequence. After that, all documents created so far are moved to the completed identity and, if no description has been set, the name is set as the description.


Content   top
The following settings can be edited:

Image and Name,
E-mail Address,
Phone (SMS) Number,
SDX Upload Server:
tap to pick these from your address book or enter them with the keyboard. When you pick a contact for 'Image and Name' from the address book its values will replace any previously entered information. For the other fields, only information for that field is changed.

This information is used as the sender information included in sent locks and (optionally) in sent vaults. It is used for secure data exchange so others can send information to you.

Image: if no image has been set via contacts, tap to select an image from your document list. If none are available, you can add them from various data sources.

SDX Upload Server: you can exchange data by directly uploading to and downloading from a server. Enter the server address to be used. See Secure Data Exchange (SDX): Using a Server to Exchange Data for details.

Signature: you can tap to draw the signature yourself (Scribbles), or pick an image () as a signature. The signature is used as a seal to be displayed when you digitally sign a document. It can be anything, but for tradition's sake make it resemble a signature!

Group Name: if you are setting up a group creator identity then you can edit the group name. The group name will be appended in parentheses to the description of each group member's identity. Once a group creator identity is complete, the group name cannot be changed anymore.

Log In Lock: tap to assign a log in lock. You can do this only for incomplete identities. This entry will be hidden once a completed identity has been saved. The Log in lock protects access to all your documents. It is used to log in and also to encrypt the metadata in your documents. It may also be used to encrypt the data itself.

Data Lock: tap to assign a data lock. Data locks can be changed at any time (unless the identity is a group member). They are used to encrypt the data in your documents. If no data lock is given the log in lock is used. Since that lock is opened when you log in, all documents are accessible. This may be more convenient, but it is also less secure.

Signature Lock: tap to assign a signature lock. Signature locks can be changed at any time. They are used to digitally sign e-mailed documents. If no signature lock is given, the data lock or log in lock is used.

After selecting a new lock it is a good idea to double-check its validity and your ability to open it. Tap to go through an access sequence.

Default Container: tap to choose an image container to be used instead of the supplied default container:



Container images should not have any transparency. See Data Formats: Containers for more on containers.


Previous: Practice Locks  Next: Item Sets
Copyright ©2014
bitSplit™ Enterprises.
All rights reserved.

Friday, April 11, 2014