Samsung NP-X360 User Manual Vista Ver.1.8 (English) - Page 151

TPM (Trusted Platform Module, Optional), Before Starting TPM

Page 151 highlights

TPM (Trusted Platform Module, Optional) TPM (Trusted Platform Module) is a powerful hardware-based security solution that protects important authentication information such as user passwords from malicious users. If TPM is used with the TPM program, it protects your personal information such as e-mails as well as protecting your system from unauthorized access attempts by malicious users. Before You Start! The program versions described in this manual are subject to change and the screen images and terms in this manual may differ from actual ones. Before Starting TPM You can use the following TPM functions.  File Encryption Function: Using this function, you can protect your files and folders by encrypting them. (The EFS function: Encrypt File System).  Personal Secure Drive Function: Using this function, you can create a virtual, secure drive so as to safely use important files and folders. (The PSD function: Personal Secure Drive).  Initializing and Reconfiguring the TPM Chip: Using this function, you can initialize and reconfigure the authentication information saved on the TPM chip. To use the TPM program, you have to first complete the following steps. 1 Initializing the Security Platform Configure the TPM program password, whether to use automatic backup, and the backup location. 2 Registering a Security Platform User Select the TPM user password and functions to be used and create an encrypted certificate for the TPM user. For more detailed procedures on using the TPM program, refer to program Help. 150

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

150
TPM
(Trusted Platform Module, Optional)
TPM (Trusted Platform Module) is a powerful hardware-based security solution that protects important authentication
information such as user passwords from malicious users. If TPM is used with the TPM program, it protects your
personal information such as e-mails as well as protecting your system from unauthorized access attempts by
malicious users.
Before You Start!
The program versions described in this manual are subject to change and the screen images and terms in this manual may differ
from actual ones.
Before Starting TPM
You can use the following TPM functions.
File Encryption Function
: Using this function, you can protect your files and folders by encrypting them.
(The EFS function: Encrypt File System).
Personal Secure Drive Function
: Using this function, you can create a virtual, secure drive so as to safely use
important files and folders. (The PSD function: Personal Secure Drive).
Initializing and Reconfiguring the TPM Chip
: Using this function, you can initialize and reconfigure the
authentication information saved on the TPM chip.
To use the TPM program, you have to first complete the following steps.
1
Initializing the Security Platform
Configure the TPM program password, whether to use automatic backup, and the backup location.
2
Registering a Security Platform User
Select the TPM user password and functions to be used and create an encrypted certificate for the TPM user.
For more detailed procedures on using the TPM program, refer to program Help.