HP Dc5700 HP ProtectTools Security Manager Guide - Page 45

e-mail via S/MIME in Microsoft Outlook and Outlook Express. The TPM functions as a Cryptographic Service

Page 45 highlights

Trusted Platform Module (TPM) embedded security chip (some models only) Integrated security chip that can protect highly sensitive user information from malicious attackers. It is the root-of-trust in a given platform. The TPM provides cryptographic algorithms and operations that meet the Trusted Computing Group (TCG) specifications. TPM hardware and software enhance the security of EFS and the Personal Secure Drive by protecting the keys used by EFS and the Personal Secure Drive. In systems without the TPM, the keys used for EFS and the PSD are normally stored on the hard drive. This makes the keys potentially vulnerable. In systems with the TPM card, the TPM's private Storage Root Keys, which never leave the TPM chip, are used to "wrap" or protect the keys used by EFS and by the PSD. Breaking into the TPM to extract the private keys is much more difficult than hacking onto the system's hard drive to obtain the keys. The TPM also enhances the security of secure e-mail via S/MIME in Microsoft Outlook and Outlook Express. The TPM functions as a Cryptographic Service Provider (CSP). Keys and certificates are generated and/or supported by the TPM hardware, providing significantly greater security than software-only implementations. USB token Security device that stores identifying information about a user. Like a Java Card or biometric reader, it is used to authenticate the owner to a computer. Virtual token Security feature that works very much like a Java Card and reader. The token is saved either on the computer hard drive or in the Windows registry. When you log on with a virtual token, you are asked for a user PIN to complete the authentication. Windows user account Profile for an individual authorized to log on to a network or to an individual computer. ENWW Glossary 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48

Trusted Platform Module (TPM) embedded security chip (some models only)
Integrated security chip that
can protect highly sensitive user information from malicious attackers. It is the root-of-trust in a given platform. The
TPM provides cryptographic algorithms and operations that meet the Trusted Computing Group (TCG)
specifications. TPM hardware and software enhance the security of EFS and the Personal Secure Drive by
protecting the keys used by EFS and the Personal Secure Drive. In systems without the TPM, the keys used for
EFS and the PSD are normally stored on the hard drive. This makes the keys potentially vulnerable. In systems
with the TPM card, the TPM's private Storage Root Keys, which never leave the TPM chip, are used to “wrap” or
protect the keys used by EFS and by the PSD. Breaking into the TPM to extract the private keys is much more
difficult than hacking onto the system's hard drive to obtain the keys. The TPM also enhances the security of secure
e-mail via S/MIME in Microsoft Outlook and Outlook Express. The TPM functions as a Cryptographic Service
Provider (CSP). Keys and certificates are generated and/or supported by the TPM hardware, providing significantly
greater security than software-only implementations.
USB token
Security device that stores identifying information about a user. Like a Java Card or biometric reader,
it is used to authenticate the owner to a computer.
Virtual token
Security feature that works very much like a Java Card and reader. The token is saved either on
the computer hard drive or in the Windows registry. When you log on with a virtual token, you are asked for a user
PIN to complete the authentication.
Windows user account
Profile for an individual authorized to log on to a network or to an individual computer.
ENWW
Glossary
39