Asus U80V User Manual - Page 53

Trusted Platform Module (TPM) (on selected models), Enabling TPM Security, Clearing TPM Secured Data - bios update

Page 53 highlights

4 Using the Notebook PC Trusted Platform Module (TPM) (on selected models) The TPM, or Trusted Platform Module, is a security hardware device on the system board that will hold computer-generated keys for encryption. It is a hardware-based solution that an help avoid attacks by hackers looking to capture passwords and encryption keys to sensitive data. The TPM provides the ability to the PC or notebook to run applications more secure and to make transactions and communication more trustworthy. The security features provided by the TPM are internally supported by the following cryptographic capabilities of each TPM: hashing, random number generation, asymmetric key generation, and asymmetric encryption/decryption. Each individual TPM on each individual computer system has a unique signature initialized during the silicon manufacturing process that further enhances its trust/security effectiveness. Each individual TPM must have an Owner before it is useful as a security device. TPM Applications TPM is useful for any customer that is interested in providing an addition layer of security to the computer system. The TPM, when bundled with an optional security software package, can provide overall system security, file protection capabilities and protect against email/privacy concerns. TPM helps provide security that can be stronger than that contained in the system BIOS, operating system, or any non-TPM application. The TPM is disabled by default. Use BIOS setup to enable it. Enabling TPM Security Enter BIOS Setup (press [F2] on system startup). Set TPM Security to [Yes] in BIOS setup Security > Trusted Computing. IMPORTANT! Use your TPM application's "Backup" or "Migration" function to backup your TPM security data. BIOS SETUP UTILITY Security Trusted Computing TPM Security [No] TPM firmware update function [DiOspatlieodn]s No Yes Clearing TPM Secured Data When Supervisor Password is installed, Clearing the TPM will appear. Use this item to clear all data secured by TPM. (You have to restart the Notebook PC after setting the password to see the security clear option.) IMPORTANT! You should routinely backup your TPM secured data. BIOS SETUP UTILITY Security Trusted Computing TPM Security [Yes] TPM device Clearing the TPM Current TPM device Status Current TPM Owner Status [Don't change] [Press Enter] [Enabled] [Unowned] 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

³±
Trusted Platform Module (TPM) (on selected models)
The TPM, or Trusted Platform Module, is a security hardware device on the system board that will hold
computer-generated keys for encryption. It is a hardware-based solution that an help avoid attacks by hackers
looking to capture passwords and encryption keys to sensitive data. The TPM provides the ability to the PC or
notebook to run applications more secure and to make transactions and communication more trustworthy.
The security features provided by the TPM are internally supported by the following cryptographic capa
-
bilities of each TPM: hashing, random number generation, asymmetric key generation, and asymmetric
encryption/decryption. Each individual TPM on each individual computer system has a unique signature
initialized during the silicon manufacturing process that further enhances its trust/security effectiveness.
Each individual TPM must have an Owner before it is useful as a security device.
TPM Applications
TPM is useful for any customer that is interested in providing an addition layer of security to the com
-
puter system. The TPM, when bundled with an optional security software package, can provide overall
system security, file protection capabilities and protect against email/privacy concerns. TPM helps
provide security that can be stronger than that contained in the system BIOS, operating system, or any
non-TPM application.
IMPORTANT! Use your TPM
application’s “Backup” or
“Migration” function to backup your
TPM security data.
The TPM is disabled by default. Use BIOS setup to enable it.
Enabling TPM Security
Enter
BIOS Setup
(press [F2] on system startup).
Set
TPM Security
to
[Yes]
in BIOS setup
Security
>
Trusted Computing
.
Clearing TPM Secured Data
When
Supervisor Password
is installed,
Clearing the TPM
will appear. Use this item
to clear all data secured by TPM. (You have
to restart the Notebook PC after setting the
password to see the security clear option.)
IMPORTANT! You should routinely
backup your TPM secured data.
BIOS SETUP UTILITY
Security
Trusted Computing
TPM Security
[No]
TPM firmware update function
Options
No
Yes
BIOS SETUP UTILITY
Security
Trusted Computing
TPM Security
[Yes]
TPM device
[Don’t change]
Clearing the TPM
[Press Enter]
Current TPM device Status
[Enabled]
Current TPM Owner Status
[Unowned]
Using the Notebook PC
²