Tpm guide 1 TPM Trusted Platform Module Installation Guide CTable of contents Introduction Convention TPM - An Overview Using TPM for the ?rst time Enabling TPM Installing the In ?neon TPM Professional Package Registering Owners and Users in TPM Personal
TPM Trusted Platform Module Installation Guide CTable of contents Introduction Convention TPM - An Overview Using TPM for the ?rst time Enabling TPM Installing the In ?neon TPM Professional Package Registering Owners and Users in TPM Personal Secure Drive Advantages of Personal Secure Drive Personal Secure Drive PSD - Basic Operation Secure E-Mail Con ?guration EFS Encrypting File System Extension TOSHIBA Password Utility Migration of the TPM Environment and Disposal Migration PC Disposal Recovery for TPM Emergency Recovery Process - An Overview Resetting the User Password PSD restore Index TPM Installation Guide CCopyright This guide is copyrighted by Toshiba Corporation with all rights reserved Under the copyright laws this guide cannot be reproduced in any form without the prior written permission of Toshiba No patent liability is assumed however with respect to the use of the information contained herein ? by Toshiba Corporation All rights reserved Trademarks Microsoft and Windows are trademarks of Microsoft Corporation in the United States and or other countries All other brand and product names are trademarks or registered trademarks of their respective companies TPM Installation Guide C Introduction Your computer has an integrated Trusted Platform Module TPM To activate TPM you will need to either enable it or install the In ?neon Security Platform Tools software This installation guide describes how to install and con ?gure TPM Before using TPM please read this Installation Guide carefully Convention This guide uses the following formats to describe identify and highlight terms and operating procedures Safety Icons This guide contains safety instructions that must be observed in order to avoid potential hazards that could result in personal injuries damage to your equipment or loss of data These safety cautions have been classi ?ed according to the seriousness of the risk and the icons highlight these instructions as follows Indicates an imminently hazardous situation which if not avoided will result in death or serious injury Indicates a potentially hazardous situation which if not avoided could result in death or serious injury Indicates a potentially hazardous situation which if not avoided may result in minor or moderate injury Indicates a potentially hazardous situation which if not avoided may result in property damage Provides important information TPM Installation Guide C TPM - An Overview The built-in security controller TPM based on the Trusted Computing Group speci ?cations TPM o ?ers data protection by using secret encryption keys instead of secret encryption formulae Algorithms In encryption based solely on software there is a danger that the encryption key saved in the ?le or read into the PC ? s memory could be read and deciphered By storing the encryption key in TPM instead the data is more securely protected As TPM uses public and standardized speci ?cations a more secure PC environment can be built by utilizing the corresponding security solution For additional TCG speci ?cation information visit their website at http www trustedcomputinggroup org Encryption Certi ?cates and Passwords ? TPM o ?ers a feature to create and set multiple encryption
Documents similaires
-
20
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Attribution requise- Détails
- Publié le Nov 02, 2021
- Catégorie Creative Arts / Ar...
- Langue French
- Taille du fichier 67.9kB