Xxxx

Solo disponible en BuenasTareas
  • Páginas : 20 (4954 palabras )
  • Descarga(s) : 0
  • Publicado : 5 de mayo de 2010
Leer documento completo
Vista previa del texto
TPM (Trusted Platform Module) Installation Guide V3.1
for Windows Vista

Table of contents
1 Introduction 1.1 Convention ............................................................................... 4 1.2 TPM - An Overview .................................................................. 5 2 Using TPM for the first time 2.1 Enabling TPM........................................................................... 6 2.2 Installing the Infineon TPM Professional Package ................... 7 2.3 Registering Owners and Users in TPM .................................... 8 3 Personal Secure Drive 3.1 Advantages of Personal Secure Drive .................................... 12 3.2 Personal Secure Drive (PSD) - Basic Operation .................... 12 4 Secure E-Mail 4.1 Configuration.......................................................................... 14 5 EFS (Encrypting File System) Extension 6 TOSHIBA Password Utility 7 Migration of the TPM Environment and Disposal 7.1 Migration ................................................................................. 18 7.2 PC Disposal ............................................................................ 18 8 Recovery for TPM8.1 Emergency Recovery Process - An Overview ........................ 19 8.2 Resetting the User Password ................................................. 19 8.3 PSD restore ............................................................................ 19 Index

2

TPM Installation Guide

Copyright
This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyrightlaws, this guide cannot be reproduced in any form without the prior written permission of Toshiba. No patent liability is assumed, however, with respect to the use of the information contained herein. © 2006 by Toshiba Corporation. All rights reserved.

Trademarks
Microsoft and Windows are trademarks of Microsoft Corporation in the United States and/or other countries. All other brand andproduct names are trademarks or registered trademarks of their respective companies.

TPM Installation Guide

3

1 Introduction
Your computer has an integrated Trusted Platform Module (TPM). To activate TPM, you will need to either enable it or install the Infineon Security Platform Tools software. This installation guide describes how to install and configure TPM. Before using TPM, pleaseread this Installation Guide carefully.

1. 1 Convention
This guide uses the following formats to describe, identify, and highlight terms and operating procedures.

Safety Icons
This guide contains safety instructions that must be observed in order to avoid potential hazards that could result in personal injuries, damage to your equipment, or loss of data. These safety cautions have beenclassified according to the seriousness of the risk, and the icons highlight these instructions as follows: Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, may result inminor or moderate injury. Indicates a potentially hazardous situation which, if not avoided, may result in property damage. Provides important information.

4

TPM Installation Guide

1. 2 TPM - An Overview
The built-in security controller TPM based on the Trusted Computing Group specifications. TPM offers data protection by using secret encryption keys instead of secret encryption formulae(Algorithms). In encryption based solely on software, there is a danger that the encryption key saved in the file or read into the PC’s memory could be read and deciphered. By storing the encryption key in TPM instead, the data is more securely protected. As TPM uses public and standardized specifications, a more secure PC environment can be built by utilizing the corresponding security...
tracking img