Samsung NP-P560E User Manual Vista/windows7 Ver.1.1 (English) - Page 74

Using TPM Security Device (Optional), Setup and User Registration

Page 74 highlights

Using TPM Security Device (Optional) The TPM (Trusted Platform Module) security device is a security solution that protects users' private information and data using the user authentication information saved on the TPM chip installed on the computer. To use the TPM security device, you have to first complete the setup and user registration. Before You Start! For more detailed information, please refer to the online help information for the program. Setup and User Registration 1 Click Start > All Programs > Infineon Security Platform Solution > Security Platform Management > User Settings. Alternatively, double-click the icon tray of the Taskbar and click Next. in the system 2 Configure the security authentication related settings according to the instructions of the Setup Wizard. 3 If the Setup Wizard completion window appears, click Finish. 4 The User Setup Wizard screen appears where you can register a user. If the screen does not appear, click Start > All Programs > Infineon Security Platform Solution > Security Platform Management > User Settings. 5 Follow the user registration steps according to the instructions in the User Setup Wizard. 6 When the setup and the user registration are completed, you can use the security solution functions such as file and folder encryption and virtual drives. For the procedures to use the security solution functions such as file and folder encryption and virtual drives, refer to the online help of the program. If you backup the emergency recovery file to an external storage device while following the steps in the Setup Wizard, you can use the TPM security device more safely. 74

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

74
1
Click
Start > All Programs > Infineon Security
Platform Solution > Security Platform
Management > User Settings
.
Alternatively, double-click the icon
in the system
tray of the Taskbar and click
Next
.
2
Configure the security authentication related settings
according to the instructions of the
Setup Wizard
.
If you backup the emergency recovery file to an
external storage device while following the steps in the
Setup Wizard, you can use the TPM security device
more safely.
3
If the Setup Wizard completion window appears,
click
Finish
.
4
The User Setup Wizard screen appears where you
can register a user.
If the screen does not appear, click
Start > All
Programs > Infineon Security Platform Solution
> Security Platform Management > User
Settings
.
5
Follow the user registration steps according to the
instructions in the User Setup Wizard.
6
When the setup and the user registration are
completed, you can use the security solution
functions such as file and folder encryption and
virtual drives.
For the procedures to use the security solution
functions such as file and folder encryption and virtual
drives, refer to the online help of the program.
Using TPM Security Device
(Optional)
The TPM (Trusted Platform Module) security device is a security solution that protects users’ private information and
data using the user authentication information saved on the TPM chip installed on the computer.
To use the TPM security device, you have to first complete the setup and user registration.
Before You Start!
For more detailed information, please refer to the online help information for the program.
Setup and User Registration