![Fujitsu Siemens Computers STYLISTIC ST50XX Скачать руководство пользователя страница 46](http://html1.mh-extra.com/html/fujitsu-siemens-computers/stylistic-st50xx/stylistic-st50xx_user-manual_2344790046.webp)
Security functions
38
A26391-K145-Z120-1-7619, edition 3
Password protection for the operating system
With corresponding settings in the
BIOS Setup
you can block starting of the operating system. Only
those who know the supervisor or user password can access the system.
Password protection for your hard disk
By activating the hard disk protection in the
BIOS Setup
you prevent unauthorised access to the hard
disk drive. The hard disk password is checked internally during each system start-up and ensures
that the hard disk can only be used in conjunction with the related device.
SmartCard reader
A SmartCard reader is integrated in your Tablet PC. You can use a SmartCard (optional accessory)
as a particularly secure alternative to password protection or as an addition to password protection.
Using Trusted Platform Module (optional)
A Trusted Platform Module (TPM), a special security chip, can optionally be integrated into your
device. The TPM functions like a permanently installed SmartCard. However, the TPM is not linked
to a user like a SmartCard, but instead to a hardware system. The TPM contains a unique code. As
a result, the TPM is used for the clear identification and authentication of the device.
Requirement: The supervisor password is present.
To use the TPM, you must activate the TPM in the
BIOS Setup
. The TPM is activated by selecting
the
Enabled
entry for
Security Chip
in the
Security
menu in the
Security Chip Setting
submenu.
If you have activated the TPM, the menu item
Clear Security Chip
appears. You can use this menu
item to delete the key in the TPM. However, you can then no longer access the data that you
encrypted with the key.
When the TPM is activated, together with the BIOS it checks the trustworthiness of all hardware
components.
For example, with the TPM activated together with software that has TPM capability, data can be
generated which can only be read or run on this Convertible PC. The support of security protocols,
such as SSL (Secure Socket Layer) for Internet connections, IPSec (LAN encryption), S-MIME (e-
mail encryption, WLAN encryption and others) is also possible.
On the supplied TPM software CD/DVD you will find software that, in conjunction with the TPM,
enhances the security of your system. Information on using the TPM and the related software is
provided on the TPM software CD/DVD.
i
If you use TPM and the software on the TPM software CD/DVD, we strongly recommend
that you use the emergency restoration function and create a medium (e.g. floppy disk,
network drive) for restoration in emergencies.
You can only re-access your encrypted data using the medium you created for emergency
restoration if, for example, a security key is lost due to hardware faults.
Содержание STYLISTIC ST50XX
Страница 1: ...EasyGuide STYLISTIC ST50XX English answers2...
Страница 3: ......
Страница 4: ...Distributed by Fujitsu Siemens Computers GmbH Order No A26391 K145 Z120 1 7619 Edition 3 AG 1004 10 04...
Страница 62: ......
Страница 76: ......