Foxconn D42S English Manual - Page 28
tography, cryptographic algorithms and protocols.
View all Foxconn D42S manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 28 highlights
3 ule offers facilities for secure generation of cryptographic keys. The TPM Work Group is chartered to create the Trusted Platform Module (TPM) specification. The definition of the TPM architecture comes from the TC and the TPM Work Group defines the implementation of that architecture. Work group members should have a working knowledge of security in relation to the design and usage of cryptographic modules. Members should also have a working knowledge of cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols. This item is used to enable/disable the function of TCG/TPM support. 21
21
3
ule offers facilities for secure generation of cryptographic keys.
The TPM �ork Group is chartered to create the Trusted Platform Module (TPM) specifica
-
tion. The definition of the TPM architecture comes from the TC and the TPM �ork Group
defines the implementation of that architecture. �ork group members should have a working
knowledge of security in relation to the design and usage of cryptographic modules. Members
should also have a working knowledge of cryptographic techniques including public-key cryp-
tography, cryptographic algorithms and protocols.
This item is used to enable/disable the function of TCG/TPM support.