Asus B53S User's Manual for English Edition - Page 84

Trusted Platform Module (TPM)(on selected models), TPM Applications - bios password

Page 84 highlights

Trusted Platform Module (TPM) (on selected models) The TPM, or Trusted Platform Module, is a security hardware device on the system board that will hold computer-generated keys for encryption. It is a hardware-based solution that an help avoid attacks by hackers looking to capture passwords and encryption keys to sensitive data.The TPM provides the ability to the PC or notebook to run applications more secure and to make transactions and communication more trustworthy. The security features provided by the TPM are internally supported by the following cryptographic capabilities of each TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. Each individual TPM on each individual computer system has a unique signature initialized during the silicon manufacturing process that further enhances its trust/ security effectiveness. Each individual TPM must have an Owner before it is useful as a security device. TPM Applications TPM is useful for any customer that is interested in providing an addition layer of security to the computer system. The TPM, when bundled with an optional security software package, can provide overall system security, file protection capabilities and protect against email/privacy concerns. TPM helps provide security that can be stronger than that contained in the system BIOS, operating system, or any non-TPM application. The TPM is disabled by default. Use BIOS setup to enable it. 84 Notebook PC User Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126

84
Notebook PC User Manual
Trusted Platform Module (TPM)
(on selected models)
The TPM, or Trusted Platform Module, is a security hardware device
on the system board that will hold computer-generated keys for
encryption. It is a hardware-based solution that an help avoid attacks
by hackers looking to capture passwords and encryption keys to
sensitive data. The TPM provides the ability to the PC or notebook to run
applications more secure and to make transactions and communication
more trustworthy.
The security features provided by the TPM are internally supported
by the following cryptographic capabilities of each TPM: hashing,
random number generation, asymmetric key generation, and
asymmetric encryption/decryption. Each individual TPM on each
individual computer system has a unique signature initialized during
the silicon manufacturing process that further enhances its trust/
security effectiveness. Each individual TPM must have an Owner
before it is useful as a security device.
TPM Applications
TPM is useful for any customer that is interested in providing an
addition layer of security to the computer system. The TPM, when
bundled with an optional security software package, can provide
overall system security, file protection capabilities and protect
against email/privacy concerns. TPM helps provide security that
can be stronger than that contained in the system BIOS, operating
system, or any non-TPM application.
The TPM is disabled by default. Use BIOS setup to enable it.