Intel D865GRH Telephone User Manual


 
85
5 Trusted Platform Module
The Trusted Platform Module (TPM) is a component on the desktop board that is specifically
designed to enhance platform security above-and-beyond the capabilities of todays software by
providing a protected space for key operations and other security critical tasks. Using both
hardware and software, the TPM protects encryption and signature keys at their most vulnerable
stagesoperations when the keys are being used unencrypted in plain-text form. The TPM is
specifically designed to shield unencrypted keys and platform authentication information from
software-based attacks.
System Requirements
Intel Desktop Board D865GRH
Microsoft Windows 2000 Professional (SP4) or Microsoft Windows XP Professional (SP1)
NTFS file system required
Microsoft Internet Explorer* 5.5 or later
Adobe* Acrobat* 5.0 or later (included on Intel Express Installer CD)
Warning of Potential Data Loss
CAUTION
Failure to follow the instructions below may cause you to loose data. Read and follow these
instructions prior to Trusted Platform Module initialization.
System integrators, owners, and end users must take precautions to minimize the chance of data
loss. Data encrypted by any program utilizing the Trusted Platform Module (TPM) may become
inaccessible or unrecoverable if any of the following occur:
Lost Password: Loss of any of the passwords associated with the TPM will render encrypted
data inaccessible. No password recovery is available. Read the Security Precautions for
Password Procedures.
Hard Drive Failure: In the event of a hard disk (or other storage media) failure that contains
encrypted data, an image of the hard disk (or other storage media) must be restored from
backup before access to encrypted data may become available. The owner/user should backup
the system hard disk on a regular basis. Read the Security Precautions below for Hard Drive
Backup Procedures.
Platform Failure: In the event of a platform failure and/or replacement of the motherboard,
recovery procedures may allow migratable keys to be recovered and may restore access to
encrypted data. All non-migratable keys and their associated data will be lost. Both the
Infineon* Security Platform Software and Wave Systems EMBASSY* Trusted Suite utilize
migratable keys. Check any other software that accesses the TPM to determine key
migratability. Read the Security Precautions for Emergency Recovery File Back Up
Procedures.