Easy to lose, illegal intrusion to make notebook computers face security challenges, in order to prevent information leakage, new notebook motherboards have built in a Trusted Platform Module TPM, it has become an indispensable security component.
TPM is the core of trusted computing Platform (TCP), it is used to generate, store, manage key and decrypt data of the Trusted Platform Module component, internal processor, nonvolatile memory and special algorithm circuit, and decryption operation in TPM component. Specifically, with the support of dedicated security software, features include:
(1) Encryption key, storage and management of BIOS power-on password, hard drive password, Windows password, administrator password, fingerprint identification information;
(2) Can file, hard disk to achieve high-speed encryption and decryption, and user rights and network accounts, such as authentication management operations;
(3) The use of special algorithms to verify the credibility of software and hardware, monitoring software and hardware changes, protection of the BIOS, operating systems and other hardware and other important devices are not illegally modified to avoid a variety of hardware and software attacks. In particular, the TPM binds the motherboard to each other, and once the TPM is enabled and forgotten, the motherboard and TPM must be replaced at the same time, and the encrypted data file or hard drive will not be saved. Currently, TMP and fingerprint recognition match the highest level of security.
Note : More wonderful tutorials Please pay attention to the triple computer tutorial section, triple Computer office group: 189034526 welcome you to join