HP (Hewlett-Packard) 413742-001 Personal Computer User Manual


 
Technical Reference Guide www.hp.com 3
HP ProtectTools Troubleshooting Guide
EFS Encryption File System A transparent file encryption service provided by Microsoft for
Windows 2000 or later
LPC Low Pin Count Defines an interface used by the HP ProtectTools Embedded
Security device to connect with the platform chipset. The bus
consists of 4 bits of Address/Data pins, along with a 33Mhz
clock and several control/status pins.
MSCAPI: Microsoft Cryptographic
API, or CryptoAPI
An API from Microsoft that provides an interface to the
Windows operating system for cryptographic applications
PKCS Public Key Cryptographic
Standards
Standards generated that govern definition and use of Public
Key/Private Key means of encryption and decryption.
PKI Public Key Infrastructure A general term defining the implementation of security systems
that use Public Key/Private Key encryption and decryption
PSD Personal Secure Drive A feature that is provided by HP ProtectTools Embedded
Security. This application creates a virtual drive on the user's
machine that automatically encrypts files/folders that are moved
into the virtual drive.
S/MIME Secure Multipurpose
Internet Mail Extensions
A specification for secure electronic messaging using PKCS.
S/MIME offers authentication via digital signatures and privacy
via encryption
TCG Trusted Computing Group Industry association set up to promote the concept of a “Trusted
PC.” TCG supersedes TCPA
TCPA Trusted Computing Platform
Alliance
Trusted computing alliance; now superseded by TCG
TPM Trusted Platform Module TPM hardware and software enhances the security of EFS and
the Personal Secure Drive by protecting the keys used by EFS
and the Personal Secure Drive.
In systems without the TPM, the keys used for EFS and the PSD
are normally stored on the hard drive. This makes the keys
potentially vulnerable. In systems with the TPM card, the TPM's
private Storage Root Keys, which never leave the TPM chip, are
used to “wrap” or protect the keys used by EFS and by the PSD.
Breaking into the TPM to extract the private keys is much more
difficult than hacking onto the system's hard drive to obtain the
keys.
The TPM also enhances the security of secure e-mail via
S/MIME in Microsoft Outlook and Outlook Express. The TPM
functions as a Cryptographic Service Provider (CSP). Keys and
certificates are generated and/or supported by the TPM
hardware, providing significantly greater security than
software-only implementations.
Acronym Term Detail