HP nx6130 HP ProtectTools: Authentication technologies and suitability to task
HP nx6130 - Notebook PC Manual
View all HP nx6130 manuals
Add to My Manuals
Save this manual to your list of manuals |
HP nx6130 manual content summary:
- HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 1
: Authentication technologies and suitability to task Introduction...2 Authentication technologies in HP ProtectTools 2 Password authentication ...3 TPM embedded security chip authentication 4 Smart card authentication ...4 USB token authentication ...5 Biometric fingerprint authentication - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 2
security manager, and describing their strengths and suitability to task. Authentication technologies in HP ProtectTools HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating system environment, as well as the pre-boot environment. This breadth of - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 3
HP ProtectTools currently supports security chip embedded in a client PC or other computing device that is authentication credential, including USB flash drives, where a protected file stored keyboard monitoring viruses or other forms of commonly used network attacks. To compound the problem - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 4
Upon successful authentication, the BIOS will proceed through system startup and ultimately boot to the operating system. HP also utilizes TPM authentication to TPM during boot also unlocks Drivelock, effectively linking the hard drive to the platform. TPMs lend themselves to easy integration with - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 5
signing and data encryption. Note: In addition to PKI support, HP ProtectTools also provides the means to more securely store user and steps can be taken to prevent access to the system and the network. USB tokens provide for mobility (stronger, portable user authentication on devices). This - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 6
email signing and data encryption. Note: In addition to PKI support, HP ProtectTools also provides the means to more securely store user and should be used in combination with other technologies. 3 While network authentication for biometrics can be implemented, the flexibility would be limited - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 7
device connected to the system. These include but are not limited to: 1. SD cards 2. Diskettes 3. Hard drive 4. Registry 5. USB drive keys Once a token has been created, Credential Manager for HP ProtectTools can use it to authenticate the user. Example: A user can create a virtual token on a USB - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 8
Suitability to Task Each authentication device provides a tradeoff between ease of use, administrative complexity and level of security. The following graph visually represents where these devices fit in the administrative complexity versus level of security spectrum. More Secure Multi-Factor - HP nx6130 | HP ProtectTools: Authentication technologies and suitability to task - Page 9
express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft and Windows are U.S. registered trademarks of Microsoft
HP ProtectTools:
Authentication technologies and suitability to task
Introduction
.........................................................................................................................................
2
Authentication technologies in HP ProtectTools
........................................................................................
2
Password authentication
.......................................................................................................................
3
TPM embedded security chip authentication
............................................................................................
4
Smart card authentication
.....................................................................................................................
4
USB token authentication
......................................................................................................................
5
Biometric fingerprint authentication
........................................................................................................
6
Virtual token authentication
...................................................................................................................
7
Feature Comparison and suitability to task
..............................................................................................
7
Suitability to Task
.................................................................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
............................................................................................................................
9