HP Nw8000 HP ProtectTools: Authentication technologies and suitability to task
HP Nw8000 - Compaq Mobile Workstation Manual
UPC - 829160468389
View all HP Nw8000 manuals
Add to My Manuals
Save this manual to your list of manuals |
HP Nw8000 manual content summary:
- HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 1
and suitability to task Introduction...2 Authentication technologies in HP ProtectTools 2 Password authentication ...3 TPM embedded security chip authentication 4 Smart card authentication ...4 USB token authentication ...5 Biometric fingerprint authentication ...6 Virtual token authentication - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 2
(e.g. password) 2. Possession - What the person has (e.g. USB token, smartcard) 3. Physical characteristic - Who the person is (e.g. Biometrics) Passwords depend technologies in HP ProtectTools HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating system - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 3
HP ProtectTools currently supports the following authentication technologies: Credential Password Trusted Platform Module (TPM) Smart card USB credential, including USB flash drives, where a protected file stored on the device is required to authenticate. Password authentication Passwords are the - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 4
utilizing the TPM to generate a strong 2048 bit Drivelock password. In addition to improving security, this feature also improves overall system usability as authenticating to the TPM during boot also unlocks Drivelock, effectively linking the hard drive to the platform. TPMs lend themselves to easy - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 5
PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and card. With USB token authentication, unauthorized access can be prevented by keeping the USB token separate from the system. Unlike passwords, loss of USB tokens can - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 6
USB tokens can therefore naturally integrate with PKI deployments in a corporation and provide functionality such as email signing and data encryption. Note: In addition to PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 7
storage device connected to the system. These include but are not limited to: 1. SD cards 2. Diskettes 3. Hard drive 4. Registry 5. USB drive keys Once a token has been created, Credential Manager for HP ProtectTools can use it to authenticate the user. Example: A user can create a virtual token on - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 8
, Token and PIN) Hardware Token (Smartcard, USB) with PKI TPM Hardware Token (Smartcard USB) with Stored PIN Two factor (Biometric and Strong Password) Strong Password Biometric (Enterprise) Biometrics (Local) Weak Password Simple Administrative Complexity Complex Single-Factor Authentication - HP Nw8000 | HP ProtectTools: Authentication technologies and suitability to task - Page 9
result in user dissatisfaction. For more information www.hp.com www.hp.com/products/security © 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty
HP ProtectTools:
Authentication technologies and suitability to task
Introduction
.........................................................................................................................................
2
Authentication technologies in HP ProtectTools
........................................................................................
2
Password authentication
.......................................................................................................................
3
TPM embedded security chip authentication
............................................................................................
4
Smart card authentication
.....................................................................................................................
4
USB token authentication
......................................................................................................................
5
Biometric fingerprint authentication
........................................................................................................
6
Virtual token authentication
...................................................................................................................
7
Feature Comparison and suitability to task
..............................................................................................
7
Suitability to Task
.................................................................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
............................................................................................................................
9