45
Using the Notebook PC 4
Click New Connection from
Bluetooth Settings.
Follow the wizard to add Bluetooth devices. After complete, you should see your
device in the window.
Trusted Platform Module (TPM)
The TPM, or Trusted Platform Module, is a security hardware device on the system board that will hold
computer-generated keys for encryption. It is a hardware-based solution that an help avoid attacks by
hackers looking to capture passwords and encryption keys to sensitive data. The TPM provides the
ability to the PC or notebook to run applications more secure and to make transactions and communica-
tion more trustworthy.
The secrity features provided by the TPM are internally supported by the following cryptographic
capabilities of each TPM: hashing, random number generation, asymmetric key generation, and asym-
metric encryption/decryption. Each individual TPM on each individual computer system has a unique
signature initialized during the silicon manufacturing process that further enhances its trust/security
effectiveness. Each individual TPM must have an Owner before it is useful as a security device.
TPM Applications
TPM is useful for any customer that is interested in providing an addition layer of security to the
computer system. The TPM, when bundled with an optional security software package, can provide
overall system security, file protection capabilities and protect against email /privacy concerns. TPM
helps provide security that can be stronger than that contained in the system BIOS, operating system, or
any non-TPM application.
Note: The TPM is disabled by default. Use BIOS setup to enable it.
Important: Use your TPM application’s “Restore” or “Migration” function to backup
your TPM security data.
T
P
M
Comments to this Manuals