HP Tc4200 HP ProtectTools: Authentication technologies and suitability to task
HP Tc4200 - Compaq Tablet PC Manual
View all HP Tc4200 manuals
Add to My Manuals
Save this manual to your list of manuals |
HP Tc4200 manual content summary:
- HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 1
: Authentication technologies and suitability to task Introduction...2 Authentication technologies in HP ProtectTools 2 Password authentication ...3 TPM embedded security chip authentication 4 Smart card authentication ...4 USB token authentication ...5 Biometric fingerprint authentication - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 2
should have. An unauthorized person who gains access to another person's password can also gain access to that person's secure information. However, if Authentication technologies in HP ProtectTools HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating system - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 3
in a client PC or other computing device that is able to protect credentials and cryptographic functions. A type of token that, passwords can be compromised via contact with keyboard monitoring viruses or other forms of commonly used network attacks. To compound the problem, a compromised password - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 4
utilizing the TPM to generate a strong 2048 bit Drivelock password. In addition to improving security, this feature also improves overall system usability as authenticating to the TPM during boot also unlocks Drivelock, effectively linking the hard drive to the platform. TPMs lend themselves to easy - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 5
and steps can be taken to prevent access to the system and the network. Smart cards provide for mobility (stronger, portable user authentication on devices). to PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and therefore - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 6
to PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and therefore does should be used in combination with other technologies. 3 While network authentication for biometrics can be implemented, the flexibility would be limited - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 7
ProtectTools Security on HP Client PC's with each of the authentication technologies discussed. Functionality Password TPM Requires multiple traits for No No authentication4 Pre-boot Authentication on HP Yes Yes clients 5 Drivelock protection on HP Yes Yes clients 6 Windows Logon via - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 8
) Hardware Token (Smartcard, USB) with PKI TPM Hardware Token (Smartcard USB) with Stored PIN Two factor (Biometric and Strong Password) Strong Password Biometric (Enterprise) Biometrics (Local) Weak Password Simple Administrative Complexity Complex Single-Factor Authentication Less Secure 8 - HP Tc4200 | HP ProtectTools: Authentication technologies and suitability to task - Page 9
express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft and Windows are U.S. registered trademarks of Microsoft
HP ProtectTools:
Authentication technologies and suitability to task
Introduction
.........................................................................................................................................
2
Authentication technologies in HP ProtectTools
........................................................................................
2
Password authentication
.......................................................................................................................
3
TPM embedded security chip authentication
............................................................................................
4
Smart card authentication
.....................................................................................................................
4
USB token authentication
......................................................................................................................
5
Biometric fingerprint authentication
........................................................................................................
6
Virtual token authentication
...................................................................................................................
7
Feature Comparison and suitability to task
..............................................................................................
7
Suitability to Task
.................................................................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
............................................................................................................................
9