113
Customizing Your VAIO Computer
Using Trusted Platform Module (TPM)
The embedded Trusted Platform Module (TPM) provides your computer with basic security functions. In combination with the
TPM, you can encrypt and decrypt your data to strengthen computer security against inappropriate access.
TPMs are defined by Trusted Computing Group (TCG) and also called security chips.
Precautions on Using the TPM
❑
Although your computer is provided with the latest TPM security functions, these functions do not assure complete
protection of your data and hardware. Sony Corporation assumes no liabilities for any problems and damages arising out
of your use of the functions.
❑
After you have installed the Infineon TPM Professional Package, you need to set a few TPM passwords on your computer.
Without these passwords, you will not be able to restore any TPM-protected data. Make sure to write down the passwords
and keep them safe and private from other people.
❑
Make sure to make backup copies of the latest emergency recovery archive file and the latest emergency recovery token
file and keep them safe and private from other people before sending your computer for repair. The data stored in the
TPM that are embedded on the motherboard may be lost or corrupted during the course of repair.
❑
During the course of repair, the TPM may be replaced even if there are no problems with the modules. In such a case,
use the backup copies of the emergency recovery archive file and the emergency recovery token file to restore the TPM
configuration.
❑
Make sure to make a backup copy of the data stored on the hard disk before sending your computer for repair. The hard
disk may be initialized and returned after the repair work and, in such a case, you will not be able to restore the data on
the hard disk using the backup copies of the emergency recovery archive file and the emergency recovery token file.
❑
The maintenance and management of TPM-protected data must be carried out at your own risk. Sony Corporation
assumes no liabilities for any defects arising out of your data maintenance and management.