5 Trusted Platform Module

The Trusted Platform Module (TPM) is a component on the desktop board that is specifically designed to enhance platform security above-and-beyond the capabilities of today’s software by providing a protected space for key operations and other security critical tasks. Using both hardware and software, the TPM protects encryption and signature keys at their most vulnerable stages—operations when the keys are being used unencrypted in plain-text form. The TPM is specifically designed to shield unencrypted keys and platform authentication information from software-based attacks.

System Requirements

Intel Desktop Board D865GRH

Microsoft Windows 2000 Professional (SP4) or Microsoft Windows XP Professional (SP1)

NTFS file system required

Microsoft Internet Explorer* 5.5 or later

Adobe* Acrobat* 5.0 or later (included on Intel Express Installer CD)

Warning of Potential Data Loss

CAUTION

Failure to follow the instructions below may cause you to loose data. Read and follow these instructions prior to Trusted Platform Module initialization.

System integrators, owners, and end users must take precautions to minimize the chance of data loss. Data encrypted by any program utilizing the Trusted Platform Module (TPM) may become inaccessible or unrecoverable if any of the following occur:

Lost Password: Loss of any of the passwords associated with the TPM will render encrypted data inaccessible. No password recovery is available. Read the Security Precautions for Password Procedures.

Hard Drive Failure: In the event of a hard disk (or other storage media) failure that contains encrypted data, an image of the hard disk (or other storage media) must be restored from backup before access to encrypted data may become available. The owner/user should backup the system hard disk on a regular basis. Read the Security Precautions below for Hard Drive Backup Procedures.

Platform Failure: In the event of a platform failure and/or replacement of the motherboard, recovery procedures may allow migratable keys to be recovered and may restore access to encrypted data. All non-migratable keys and their associated data will be lost. Both the Infineon* Security Platform Software and Wave Systems EMBASSY* Trusted Suite utilize migratable keys. Check any other software that accesses the TPM to determine key migratability. Read the Security Precautions for Emergency Recovery File Back Up Procedures.

85

Page 85
Image 85
Intel D865GRH manual Trusted Platform Module, System Requirements