Справочник Пользователя для ASUS led notebook - intel core i5 e7602

Скачать
Страница из 98
54
Notebook PC User Manual
Trusted Platform Module (TPM) 
(on selected models)
The TPM, or Trusted Platform Module, is a security hardware device 
on the system board that will hold computer-generated keys for 
encryption. It is a hardware-based solution that an help avoid attacks 
by hackers looking to capture passwords and encryption keys to 
sensitive data. The TPM provides the ability to the PC or notebook to run 
applications more secure and to make transactions and communication 
more trustworthy.
The security features provided by the TPM are internally supported 
by the following cryptographic capabilities of each TPM: hashing, 
random number generation, asymmetric key generation, and 
asymmetric encryption/decryption. Each individual TPM on each 
individual computer system has a unique signature initialized during 
the silicon manufacturing process that further enhances its trust/
security effectiveness. Each individual TPM must have an Owner 
before it is useful as a security device. 
TPM Applications 
TPM is useful for any customer that is interested in providing an 
addition layer of security to the computer system. The TPM, when 
bundled with an optional security software package, can provide 
overall system security, file protection capabilities and protect 
against email/privacy concerns. TPM helps provide security that 
can be stronger than that contained in the system BIOS, operating 
system, or any non-TPM application. 
The TPM is disabled by default. Use BIOS setup to enable it.