Acer TravelMate 6460 TravelMate 6410 - 6460 User's Guide EN - Page 65

Acer Trusted Platform Module (TPM), User roles

Page 65 highlights

53 English Acer Trusted Platform Module (TPM) With the development of TCG (Trusted Computing Group, http:// www.trustedcomputinggroup.org/) the Acer Trusted Platform Module offers the cryptographic implementations of RSA and hash algorithms (SHA-1 and MD-5) for highest possible performance, as well as a true random number generator (TRNG). The Acer Security Platform Solution Software is a comprehensive set of tools that takes advantage of the Trusted Platform Module embedded in your system. This solution provides services to easily create digital certificates using the Trusted Platform Module and to manage these certificates. You can use the certificates to: • Send and receive secure e-mail from e-mail clients like Microsoft Outlook Express, Microsoft Outlook or Netscape Messenger • Set up browser (e.g. Netscape Navigator or Internet Explorer) and web server (e.g. Microsoft Internet Information Server) for Client Authentication • Sign Microsoft Word macros. • Encrypt files and folders • Secure network connections User roles Security Platform Solution involves several user roles: All Security Platform user roles are based on Windows user accounts (local or domain users). These user accounts have been authenticated by Windows logon. Each user role has an intended purpose. When the Security Platform is configured, members of different user roles are initialized. Acting a specific user role requires a specific authentication (e.g. providing a specific password). A person can act multiple user roles. The following table lists all user roles. User Roles: User Role Security Platform Owner Based on... Windows user account (local or domain), member of the Administrators group Purpose & Tasks Perform critical administrative tasks, e.g. restoration of Security Platform. Initialization Authentication Security Platform Initialization enables a Windows user to act as a Security Platform Owner. Owner Password

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123

53
English
Acer Trusted Platform Module (TPM)
With the development of TCG (Trusted Computing Group,
http://
www.trustedcomputinggroup.org/
) the Acer Trusted Platform Module offers
the cryptographic implementations of RSA and hash algorithms (SHA-1 and
MD-5) for highest possible performance, as well as a true random number
generator (TRNG).
The Acer Security Platform Solution Software is a comprehensive set of tools
that takes advantage of the Trusted Platform Module embedded in your
system. This solution provides services to easily create digital certificates using
the Trusted Platform Module and to manage these certificates.
You can use the certificates to:
Send and receive secure e-mail from e-mail clients like Microsoft Outlook
Express, Microsoft Outlook or Netscape Messenger
Set up browser (e.g. Netscape Navigator or Internet Explorer) and web
server (e.g. Microsoft Internet Information Server) for Client
Authentication
Sign Microsoft Word macros.
Encrypt files and folders
Secure network connections
User roles
Security Platform Solution involves several user roles:
All Security Platform user roles are based on Windows user accounts (local or
domain users). These user accounts have been authenticated by Windows
logon.
Each user role has an intended purpose.
When the Security Platform is configured, members of different user roles are
initialized.
Acting a specific user role requires a specific authentication (e.g. providing a
specific password).
A person can act multiple user roles.
The following table lists all user roles.
User Roles:
User Role
Based on...
Purpose &
Tasks
Initialization
Authentication
Security Platform
Owner
Windows user
account (local or
domain),
member of the
Administrators
group
Perform critical
administrative
tasks, e.g.
restoration of
Security
Platform.
Security Platform
Initialization
enables a Windows
user to act as a
Security Platform
Owner.
Owner Password