HP ProBook 4540s HP ProtectTools Getting Started - Page 131

Trusted Platform Module TPM embedded security chip, Trusted Contact invitation

Page 131 highlights

Trusted Contact invitation An email that is sent to a person, asking them to become a Trusted Contact. Trusted Contact recipient A person who receives an invitation to become a Trusted Contact. Trusted Contacts list A listing of Trusted Contacts. trusted message A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. Trusted Platform Module (TPM) embedded security chip The generic term for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. A TPM minimizes the risk that information on the computer will be compromised by physical theft or an attack by an external hacker. trusted sender A Trusted Contact who sends signed and/or encrypted emails and Microsoft Office documents. TXT Trusted Execution Technology. user Anyone enrolled in Drive Encryption. Non-administrator users have limited rights in Drive Encryption. They can only enroll (with administrator approval) and log on. Windows administrator A user with full rights to modify permissions and manage other users. Windows Logon Security Protects your Windows account(s) by requiring the use of specific credentials for access. Windows user account The profile for an individual authorized to log on to a network or to an individual computer. Glossary 121

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

Trusted Contact invitation
An email that is sent to a person, asking them to become a Trusted Contact.
Trusted Contact recipient
A person who receives an invitation to become a Trusted Contact.
Trusted Contacts list
A listing of Trusted Contacts.
trusted message
A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact.
Trusted Platform Module (TPM) embedded security chip
The generic term for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather
than a user, by storing information specific to the host system, such as encryption keys, digital certificates, and
passwords. A TPM minimizes the risk that information on the computer will be compromised by physical theft or
an attack by an external hacker.
trusted sender
A Trusted Contact who sends signed and/or encrypted emails and Microsoft Office documents.
TXT
Trusted Execution Technology.
user
Anyone enrolled in Drive Encryption. Non-administrator users have limited rights in Drive Encryption. They can
only enroll (with administrator approval) and log on.
Windows administrator
A user with full rights to modify permissions and manage other users.
Windows Logon Security
Protects your Windows account(s) by requiring the use of specific credentials for access.
Windows user account
The profile for an individual authorized to log on to a network or to an individual computer.
Glossary
121