Asus PU401LA User's Manual for English Edition - Page 76

Trusted Platform Module (TPM)*, TPM Applications - bios

Page 76 highlights

Trusted Platform Module (TPM)* The TPM, or Trusted Platform Module, is a security hardware device on the system board that will hold computer-generated keys for encryption. It is a hardware-based solution that can help avoid attacks by hackers looking to capture passwords and encryption keys for sensitive data. The security features provided by the TPM are internally supported by the following cryptographic capabilities of each TPM: • hashing • random number generation • asymmetric key generation • asymmetric encryption/decryption Each individual TPM on each individual computer system has a unique signature initialized during the silicon manufacturing process that further enhances its trust or security effectiveness. Each individual TPM must have an Owner before it is useful as a security device. TPM Applications TPM is useful for any customer that is interested in providing an addition layer of security to the computer system. The TPM, when bundled with an optional security software package, can provide overall system security, file protection capabilities and protect against email/privacy concerns. TPM helps provide security that can be stronger than that contained in the system BIOS, operating system, or any non-TPM application. NOTE: The TPM is disabled byb default. Use BIOS to enable this feature. * on selected models only 76 Notebook PC E-Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132

µ´
Notebook PC E-Manual
Trusted Platform Module (TPM)*
The TPM, or Trusted Platform Module, is a security hardware device on the
system board that will hold computer-generated keys for encryption. It is a
hardware-based solution that can help avoid attacks by hackers looking to
capture passwords and encryption keys for sensitive data.
The security features provided by the TPM are internally supported by
the following cryptographic capabilities of each TPM:
hashing
random number generation
asymmetric key generation
asymmetric encryption/decryption
Each individual TPM on each individual computer system has a unique
signature initialized during the silicon manufacturing process that
further enhances its trust or security effectiveness. Each individual TPM
must have an Owner before it is useful as a security device.
TPM Applications
TPM is useful for any customer that is interested in providing an addition
layer of security to the computer system. The TPM, when bundled with
an optional security software package, can provide overall system
security, file protection capabilities and protect against email/privacy
concerns.
TPM helps provide security that can be stronger than that contained in
the system BIOS, operating system, or any non-TPM application.
NOTE:
The TPM is disabled byb default. Use BIOS to enable this feature.
* on selected models only