B Series.book Page 114 Friday, May 19, 2006 3:00 PM

L i f e B o o k B 6 2 0 0 S e r i e s – A p p e n d i x B

Trusted Platform Module Installation

This disc contains several utilities that allow you to enhance the security of your system using the Trusted Platform Module (TPM) contained in the system. TPM is a Trusted Computer Group (TCG)-compliant embed- ded security chip that allows computers to run applica- tions more securely and to make transactions and communications more trustworthy. TPM is an impor- tant component of the Fujitsu Security Platform.

The use of this disc requires that you have a device capable of reading CDs attached to your system. If you do not have a built-in CD or DVD player, you will need to attach an external player.

The use of this disc also requires a device capable of writing to removable media (such as a floppy disk drive, CD- RW drive, or PCMCIA memory card). This drive will be used to store the Emergency Recovery Token file and -- if desired -- the Emergency Recovery Archive file. For more information on available external devices, visit our Website at: us.fujitsu.com/computers.

When installing the software, be sure to create Emergency Recovery Archive and Emergency Recovery Token files when prompted by the Security Platform Initialization Wizard. These files will be necessary in the event of hardware failure.

Failure to create these files could result in

a loss of the Security Platform owner key, which is the physical root for secrets as well as the logical root for all Security Platform user-specific keys. The Initialization Wizard provides step-by-step instructions for creating the files.

3.Open the Security menu, scroll down to Set Super- visor Password, and enter a password (if not already set).

4.While in the Security menu, scroll down to Secu- rity Chip Setting, and click on it. The Security Chip Setting submenu will appear.

5.Press the [Space Bar] to Enable the Security Chip.

6.Click [F10] to save changes and exit.

Installing the TPM Applications

1.Insert the “Trusted Platform Module Drivers and Applications CD” in the drive.

2.The setup program should start the installation automatically. If the installation does not start automatically, go to the setup.exe file on the disc and double-click on it.

3.Follow the instructions that appear on your screen to load the drivers and applications for TPM.

4.After loading the software, you will be prompted to reboot your system. Remove the CD from the drive, then reboot.

5.After rebooting, the Security Platform Installation Wizard will open and lead you through the setup and customization of the TPM applications.

Getting Help

For detailed help about installing the TPM applica- tions, go to the readme.txt file on the disc.

For in-depth help and information about the TPM applications, double-click on the Security Platform icon in the system tray, and click [Getting Started Guide].

Procedure

Be sure you have a built-in or external drive attached to your system that can read CDs. You will also need a means to write to removable media during the installa- tion.

Enabling the Security Chip in BIOS

1.Before installing the TPM software, you will need to enable the security chip in the system BIOS. To do so:

If your system is running, click Start -> Shut Down, and select Restart. Click OK.

If the system is not running, power it up.

2.When the Fujitsu logo appears, press the [F2] but- ton. The BIOS Setup Utility will appear.

114

Page 122
Image 122
Fujitsu Siemens Computers B6210 manual Trusted Platform Module Installation, Installing the TPM Applications, Getting Help

B6210 specifications

Fujitsu Siemens Computers B6210 is a remarkable mobile computing device that was geared towards business professionals who seek a balance of performance, portability, and reliability. This laptop, which emerged in the mid-2000s, is often remembered for its robust design and efficient functionality, making it an appealing option for those who needed a dependable machine for work on the go.

One of the key features of the B6210 is its compact design. Weighing in at just around 1.5 kilograms, this laptop is lightweight and easily portable, allowing users to carry it effortlessly between meetings, presentations, or any business engagements. Its sleek chassis not only enhances its aesthetic appeal but also emphasizes durability, ensuring it can withstand the rigors of daily use.

The B6210 is powered by Intel's processors of the time, which provided a solid performance for multitasking and running various applications. The device typically features the Intel Core Duo or Core 2 Duo processors, enabling users to handle demanding tasks with relative ease. Complementing the processing power is a memory capacity that can accommodate up to 4 GB of RAM, ensuring smooth performance even when running several applications simultaneously.

In terms of connectivity, the Fujitsu Siemens Computers B6210 is equipped with a variety of ports, including USB 2.0 ports, a VGA port, and a card reader, which facilitate easy connections to other devices and peripherals. Additionally, built-in Wi-Fi capabilities allow for seamless internet access, keeping professionals connected wherever they are.

The laptop boasts a 12.1-inch display, which strikes a good balance between visibility and portability. The screen supports resolutions up to 1280x800 pixels, providing crisp visuals for presentations and documents, while the anti-glare coating minimizes reflections, contributing to a comfortable viewing experience in various lighting conditions.

Security features are also a notable characteristic of the B6210. It often includes a fingerprint scanner, ensuring that sensitive data remains protected. Moreover, the laptop can come with a Trusted Platform Module (TPM) for enhanced data encryption and security.

Overall, the Fujitsu Siemens Computers B6210 embodies the essence of a reliable business laptop, providing essential features and technologies tailored for professionals. Its combination of portability, performance, and security makes it a noteworthy contender in the realm of mobile computing.