HP ProBook 6360b HP ProtectTools Getting Started - Windows 7 and Windows Vista - Page 119

Trusted Platform Module TPM embedded security chip, Trusted Contact list

Page 119 highlights

suggested signer A user who is designated by the owner of a Microsoft Word or Microsoft Excel document to add a signature line to the document. token See security logon method. Trusted Contact A person who has accepted a Trusted Contact invitation. Trusted Contact invitation An e-mail that is sent to a person, asking them to become a Trusted Contact. Trusted Contact list A listing of Trusted Contacts. Trusted Contact recipient A person who receives an invitation to become a Trusted Contact. trusted message A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. Trusted Platform Module (TPM) embedded security chip The generic term for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. A TPM minimizes the risk that information on the computer will be compromised by physical theft or an attack by an external hacker. trusted sender A Trusted Contact who sends signed and/or encrypted e-mails and Microsoft Office documents. TXT Trusted Execution Technology. USB token A security device that stores identifying information about a user. Like a smart card or biometric reader, it is used to authenticate the owner to a computer. user Anyone enrolled in Drive Encryption. Non-administrator users have limited rights in Drive Encryption. They can only enroll (with administrator approval) and log on. virtual token A security feature that works very much like a smart card and card reader. The token is saved either on the computer hard drive or in the Windows registry. When you log on with a virtual token, you are asked for a user PIN to complete the authentication. Windows administrator A user with full rights to modify permissions and manage other users. Windows Logon Security Protects your Windows account(s) by requiring the use of specific credentials for access. Windows user account The profile for an individual authorized to log on to a network or to an individual computer. Glossary 111

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124

suggested signer
A user who is designated by the owner of a Microsoft Word or Microsoft Excel document to add a signature line
to the document.
token
See
security logon method
.
Trusted Contact
A person who has accepted a Trusted Contact invitation.
Trusted Contact invitation
An e-mail that is sent to a person, asking them to become a Trusted Contact.
Trusted Contact list
A listing of Trusted Contacts.
Trusted Contact recipient
A person who receives an invitation to become a Trusted Contact.
trusted message
A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact.
Trusted Platform Module (TPM) embedded security chip
The generic term for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather
than a user, by storing information specific to the host system, such as encryption keys, digital certificates, and
passwords. A TPM minimizes the risk that information on the computer will be compromised by physical theft or
an attack by an external hacker.
trusted sender
A Trusted Contact who sends signed and/or encrypted e-mails and Microsoft Office documents.
TXT
Trusted Execution Technology.
USB token
A security device that stores identifying information about a user. Like a smart card or biometric reader, it is
used to authenticate the owner to a computer.
user
Anyone enrolled in Drive Encryption. Non-administrator users have limited rights in Drive Encryption. They can
only enroll (with administrator approval) and log on.
virtual token
A security feature that works very much like a smart card and card reader. The token is saved either on the
computer hard drive or in the Windows registry. When you log on with a virtual token, you are asked for a user
PIN to complete the authentication.
Windows administrator
A user with full rights to modify permissions and manage other users.
Windows Logon Security
Protects your Windows account(s) by requiring the use of specific credentials for access.
Windows user account
The profile for an individual authorized to log on to a network or to an individual computer.
Glossary
111