Asus Eee Slate B121 User Manual - Page 27

Trusted Platform Module (TPM)(on selected models), TPM Applications - bios

Page 27 highlights

Trusted Platform Module (TPM) (on selected models) The TPM, or Trusted Platform Module, is a security hardware device on the system board that will hold computer-generated keys for encryption. It is a hardware-based solution that an help avoid attacks by hackers looking to capture passwords and encryption keys to sensitive data. The TPM provides the ability to Eee Slate to run applications more secure and to make transactions and communication more trustworthy. The security features provided by the TPM are internally supported by the following cryptographic capabilities of each TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. Each individual TPM on each individual computer system has a unique signature initialized during the silicon manufacturing process that further enhances its trust/security effectiveness. Each individual TPM must have an Owner before it is useful as a security device. TPM Applications TPM is useful for any customer that is interested in providing an addition layer of security to the computer system. The TPM, when bundled with an optional security software package, can provide overall system security, file protection capabilities and protect against email/privacy concerns. TPM helps provide security that can be stronger than that contained in the system BIOS, operating system, or any non-TPM application. ASUS Eee Slate 3-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50

ASUS Eee Slate
3-7
Trusted Platform Module (TPM)
(on selected models)
The TPM, or Trusted Platform Module, is a security hardware device on the
system board that will hold computer-generated keys for encryption. It is
a hardware-based solution that an help avoid attacks by hackers looking
to capture passwords and encryption keys to sensitive data. The TPM
provides the ability to Eee Slate to run applications more secure and to make
transactions and communication more trustworthy.
The security features provided by the TPM are internally supported by
the following cryptographic capabilities of each TPM: hashing, random
number generation, asymmetric key generation, and asymmetric
encryption/decryption. Each individual TPM on each individual computer
system has a unique signature initialized during the silicon manufacturing
process that further enhances its trust/security effectiveness. Each
individual TPM must have an Owner before it is useful as a security device.
TPM Applications
TPM is useful for any customer that is interested in providing an addition
layer of security to the computer system. The TPM, when bundled with an
optional security software package, can provide overall system security,
file protection capabilities and protect against email/privacy concerns.
TPM helps provide security that can be stronger than that contained in the
system BIOS, operating system, or any non-TPM application.