53
Acer Trusted Platform Module (TPM)
With the development of TCG (Trusted Computing Group, http:// www.trustedcomputinggroup.org/) the Acer Trusted Platform Module offers the cryptographic implementations of RSA and hash algorithms
The Acer Security Platform Solution Software is a comprehensive set of tools that takes advantage of the Trusted Platform Module embedded in your system. This solution provides services to easily create digital certificates using the Trusted Platform Module and to manage these certificates.
You can use the certificates to:
•Send and receive secure
•Set up browser (e.g. Netscape Navigator or Internet Explorer) and web server (e.g. Microsoft Internet Information Server) for Client Authentication
•Sign Microsoft Word macros.
•Encrypt files and folders
•Secure network connections
User roles
Security Platform Solution involves several user roles:
All Security Platform user roles are based on Windows user accounts (local or domain users). These user accounts have been authenticated by Windows logon.
Each user role has an intended purpose.
When the Security Platform is configured, members of different user roles are initialized.
Acting a specific user role requires a specific authentication (e.g. providing a specific password).
A person can act multiple user roles. The following table lists all user roles.
User Roles:
User Role | Based on... | Purpose & | Initialization | Authentication | |
Tasks | |||||
|
|
|
| ||
|
|
|
|
| |
Security Platform | Windows user | Perform critical | Security Platform | Owner Password | |
Owner | account (local or | administrative | Initialization |
| |
| domain), | tasks, e.g. | enables a Windows |
| |
| member of the | restoration of | user to act as a |
| |
| Administrators | Security | Security Platform |
| |
| group | Platform. | Owner. |
| |
|
|
|
|
|