Foxconn D42S English Manual - Page 28

tography, cryptographic algorithms and protocols.

Page 28 highlights

3 ule offers facilities for secure generation of cryptographic keys. The TPM Work Group is chartered to create the Trusted Platform Module (TPM) specification. The definition of the TPM architecture comes from the TC and the TPM Work Group defines the implementation of that architecture. Work group members should have a working knowledge of security in relation to the design and usage of cryptographic modules. Members should also have a working knowledge of cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols. This item is used to enable/disable the function of TCG/TPM support. 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

21
3
ule offers facilities for secure generation of cryptographic keys.
The TPM �ork Group is chartered to create the Trusted Platform Module (TPM) specifica
-
tion. The definition of the TPM architecture comes from the TC and the TPM �ork Group
defines the implementation of that architecture. �ork group members should have a working
knowledge of security in relation to the design and usage of cryptographic modules. Members
should also have a working knowledge of cryptographic techniques including public-key cryp-
tography, cryptographic algorithms and protocols.
This item is used to enable/disable the function of TCG/TPM support.