Intel D915GEV User Manual

Page of 80
Intel Desktop Board D915GEV/D915GUX/D915GAV/D915GAG Product Guide 
68   
 
 
Requirements 
•  Emergency Recovery Archive (created with the Infineon Security Platform Initiation Wizard) 
•  Emergency Recovery Token (created with the Infineon Security Platform Initiation Wizard) 
•  Emergency Recovery Token Security Password (created with the Infineon Security Platform 
Initiation Wizard) 
•  Working original operating system (OS) installation, or a restored image of the hard drive 
•  Wave Systems Key Transfer Manager archive password 
•  TPM Ownership password 
This recovery procedure only restores the migratable keys from the previously created Recovery 
Archives. 
1.  Replace the desktop board with the same model as the failed board. 
2.  Start the original operating system or restore the original hard drive image.  
3.  Start the Infineon Security Platform Initialization Wizard and check the “I want to restore the 
existing Security Platform” box. 
4.  Follow the instructions during the Security Platform Initialization, and append the Emergency 
Recovery Archive to the existing archive.  
5.  Provide all the necessary passwords, files, and file locations as requested.  It may take up to 20 
minutes for Security Platform Initialization Wizard to restore the security platform settings. 
6.  Start User Initialization Wizard.  Select “Recover Your Basic User Key” when prompted.  
Specify the original Basic User Key password and proceed with the wizard.   
7.  When re-configuring the Personal Secure Drive, select “I want to change my Personal Secure 
Drive setting”, confirm the drive letter and name are correct, and then proceed through the rest 
of the wizard. 
8.  Restart the system when requested. 
9.  To restore access to the EMBASSY Trust Suite, right mouse click on the Key Transfer 
Manager icon located in the taskbar in the lower right corner of the screen, and select Restore 
TPM Keys.   
10.  Provide all the necessary passwords, files, and file locations as requested by the Key Transfer 
Manager.   
11.  Upon successful completion of all steps, you should be able to access previously encrypted 
files.