Asus TPM Specifications Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 10
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
4 Trusted Platform Module Quick Reference
Trusted Platform Module (TPM)
The Trusted Platform Module is a component on the desktop board that is
specifically designed to enhance platform security above-and-beyond the
capabilities of today’s software by providing a protected space for key
operations and other security critical tasks. Using both hardware and software,
the TPM protects encryption and signature keys at their most vulnerable
stages—operations when the keys are being used unencrypted in plain-text
form.
The TPM is specifically designed to shield unencrypted keys and platform
authentication information from software-based attacks.
System Requirements
Boxed Intel
®
Desktop Board D915GMH with Gigabit Ethernet solution
Microsoft Windows* 2000 Professional (SP4) or Microsoft Windows XP
Professional (SP1)
NTFS file system required
Microsoft Internet Explorer* 5.5 or later
Adobe* Acrobat* 5.0 or later (included on Intel
®
Express Installer CD)
Security Precautions
Security, like any other aspect of computer maintenance requires planning.
What is unique about security has to do with understanding who "friends" and
adversaries are. The TPM provides mechanisms to enable the owner/user to
protect their information from adversaries. To provide this protection the TPM
effectively puts "locks" around the data. Just like physical locks, if keys or
combinations are lost, the assets (i.e., data) may be inaccessible not only to
adversaries, but also to asset owner/user.
The TPM provides two classes of keys: migratable and non-migratable.
Migratable keys are designed to protect data that can be used (i.e., unencrypted)
on more than one platform. This has the advantage of allowing the key data to
be replicated (backed-up and restored) to another platform. This may be
because of user convenience (someone uses more than one platform, or the data
needs to be available to more than one person operating on different platforms).
This type of key also has the advantage in that it can be backed-up and restored
from a defective platform onto a new platform. However, migratable keys may
not be the appropriate level of protection (e.g., the user wants the data restricted
to a single platform) needed for the application. This requires a non-migratable
key. Non-migratable keys carry with them a usage deficit in that while the key
may be backed-up and restored (i.e., protected from hard disk failure) they are
not protected against system or TPM failure. The very nature of a non-
Page view 3
1 2 3 4 5 6 7 8 9 10

Comments to this Manuals

Jasonnoifs 23 Mar 2024 | 10:05:06

маг альмарель оккультист отзывы И тогда Ихтияр просыпался в ярости. Несомненно, это были видения, посланные свыше. Несомненно, его миссия – служить Всевышнему, за которого он по ошибке принимал хитрого Султана Мрака. Ихтияр тут же бросал своё войско в глухие леса, искать бегущего монаха… Но каждый раз тому удавалось ускользнуть. Каждый раз тот оказывался на шаг впереди. — Ты убила Нонну, — непреклонно отвечает Марфа. — Она предлагала мирное решение, она предлагала вариант без жертв. Ты сама о