Samsung NP-P460I User Manual Vista Ver.2.0 (English) - Page 134

TPM (Trusted Platform Module, Optional), Using the TPM Function

Page 134 highlights

TPM (Trusted Platform Module, Optional) The TPM (Trusted Platform Module) program is a security solution which manages the user authentication information that protects the information and data of users. This program protects files and folders from malicious access attempts by unauthorized users. Before You Start! The program versions described in this manual are subject to change and the screen images and terms in this manual may differ UsinfrgomtahcteualToPneMs. Function TPM Settings Using the TPM Function For the TPM settings, you have to complete the following steps sequentially. 1 Initializing the Security Platform The process for initializing the Security Platform. 2 Registering a Security Platform User The process for registering a security platform user. ► Encrypt File System (EFS) Function Using EFS, you can protect your files and folders by encrypting them. ► Personal Secure Drive (PSD) Function You can create a virtual, secure drive so as to use files and folders safely ► Initializing and Reconfiguring the TPM Chip The procedures for initializing and reconfiguring the authentication information saved on the TPM chip are described here. For more detailed procedures on using the TPM program, refer to program Help. 133

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225

133
TPM Settings
For the TPM settings, you have to complete the following
steps sequentially.
1
Initializing the Security Platform
The process for initializing the Security Platform.
2
Registering a Security Platform User
The process for registering a security platform user.
Using the TPM Function
Encrypt File System (EFS) Function
Using EFS, you can protect your files and folders by
encrypting them.
Personal Secure Drive (PSD) Function
You can create a virtual, secure drive so as to use
files and folders safely
Initializing and Reconfiguring the TPM Chip
The procedures for initializing and reconfiguring the
authentication information saved on the TPM chip
are described here.
For more detailed procedures on using the TPM
program, refer to program Help.
Using the TPM Function
TPM (Trusted Platform Module, Optional)
The TPM (Trusted Platform Module) program is a security solution which manages the user authentication
information that protects the information and data of users. This program protects files and folders from malicious
access attempts by unauthorized users.
Before You Start!
The program versions described in this manual are subject to change and the screen images and terms in this manual may differ
from actual ones.