Compaq nc6220 HP ProtectTools: Authentication technologies and suitability to
Compaq nc6220 - Notebook PC Manual
View all Compaq nc6220 manuals
Add to My Manuals
Save this manual to your list of manuals |
Compaq nc6220 manual content summary:
- Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 1
: Authentication technologies and suitability to task Introduction...2 Authentication technologies in HP ProtectTools 2 Password authentication ...3 TPM embedded security chip authentication 4 Smart card authentication ...4 USB token authentication ...5 Biometric fingerprint authentication - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 2
should have. An unauthorized person who gains access to another person's password can also gain access to that person's secure information. However, if Authentication technologies in HP ProtectTools HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating system - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 3
Manager for HP ProtectTools currently supports the following authentication technologies: Credential Password Trusted Platform passwords can be compromised via contact with keyboard monitoring viruses or other forms of commonly used network attacks. To compound the problem, a compromised password - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 4
utilizing the TPM to generate a strong 2048 bit Drivelock password. In addition to improving security, this feature also improves overall system usability as authenticating to the TPM during boot also unlocks Drivelock, effectively linking the hard drive to the platform. TPMs lend themselves to easy - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 5
PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and therefore USB token and know the secret PIN unique to that USB token. USB tokens plug into any open USB port and provide an authentication token identical to the one - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 6
functionality such as email signing and data encryption. Note: In addition to PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and therefore does not require additional PKI infrastructure elements. Pros Utilizes two personal - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 7
ProtectTools Security on HP Client PC's with each of the authentication technologies discussed. Functionality Password TPM Requires multiple traits for No No authentication4 Pre-boot Authentication on HP Yes Yes clients 5 Drivelock protection on HP Yes Yes clients 6 Windows Logon via - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 8
) Hardware Token (Smartcard, USB) with PKI TPM Hardware Token (Smartcard USB) with Stored PIN Two factor (Biometric and Strong Password) Strong Password Biometric (Enterprise) Biometrics (Local) Weak Password Simple Administrative Complexity Complex Single-Factor Authentication Less Secure 8 - Compaq nc6220 | HP ProtectTools: Authentication technologies and suitability to - Page 9
result in user dissatisfaction. For more information www.hp.com www.hp.com/products/security © 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty
HP ProtectTools:
Authentication technologies and suitability to task
Introduction
.........................................................................................................................................
2
Authentication technologies in HP ProtectTools
........................................................................................
2
Password authentication
.......................................................................................................................
3
TPM embedded security chip authentication
............................................................................................
4
Smart card authentication
.....................................................................................................................
4
USB token authentication
......................................................................................................................
5
Biometric fingerprint authentication
........................................................................................................
6
Virtual token authentication
...................................................................................................................
7
Feature Comparison and suitability to task
..............................................................................................
7
Suitability to Task
.................................................................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
............................................................................................................................
9