Compaq 8000 HP ProtectTools Guide - Page 73
Trusted Platform Module TPM embedded security chip., Public Key Infrastructure PKI
UPC - 884420665106
View all Compaq 8000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 73 highlights
Public Key Infrastructure (PKI) Standard that defines the interfaces for creating, using, and administering certificates and cryptographic keys. reboot. Process of restarting the computer. reveal. A task that allows the user to decrypt one or more chat history sessions, displaying the Contact Screen Name(s) in plain text and making the session available for viewing. revocation password. A password that is created when a user requests a digital certificate. The password is required when the user wants to revoke his or her digital certificate. This ensures that only the user may revoke the certificate. seal for trusted contacts. A task that adds a digital signature, encrypts the e-mail, and sends it after you authenticate using your chosen security logon method. security logon method. The method used to log in to the computer. Send Security button. A software button that is displayed on the toolbar of Microsoft Outlook e-mail messages. Clicking the button allows you to sign and/or encrypt a Microsoft Outlook e-mail message. shred cycle. The number of times the shred algorithm is executed on each asset. The higher the number of shred cycles you select, the more secure the computer is. shred profile. A specified erasure method and list of assets. shred. The execution of an algorithm that obscures the data contained in an asset. Sign and Encrypt button. A software button that is displayed on the toolbar of Microsoft Office applications. Clicking the button allows you to sign, encrypt, or removing encryption in a Microsoft Office document. signature line. A placeholder for the visual display of a digital signature. When a document is signed, the signer's name and verification method are displayed. The signing date and the signer's title can also be included. simple delete. Deletion of the Windows reference to an asset. The asset content remains on the hard drive until obscuring data is written over it by free space bleaching. smart card. Small piece of hardware, similar in size and shape to a credit card, which stores identifying information about the owner. Used to authenticate the owner to a computer. suggested signer. A user who is designated by the owner of a Microsoft Word or Microsoft Excel document to add a signature line to the document. Trusted Contact invitation. An e-mail that is sent to a person, asking them to become a Trusted Contact. Trusted Contact list. A listing of Trusted Contacts. Trusted Contact recipient. A person who receives an invitation to become a Trusted Contact. Trusted Contact. A person who has accepted a Trusted Contact invitation. trusted IM communication. A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. trusted message. A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. Trusted Platform Module (TPM) embedded security chip. The generic term for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. A TPM minimizes the risk that information on the computer will be compromised by physical theft or an attack by an external hacker. ENWW Glossary 65