answersLogoWhite

0

The Trusted Platform Module (TPM) chip designed by the TCG (Trusted Computing Group), it stores passwords, encryption keys and digital certificates.

Pros:

-Provides added security in case your laptop got lost or stolen, the above average joe won't be able to get into it.

- Data stored on your hard-drive can be encrypted, again the above average joe won't be able to access the content of drive of your stolen laptop.

-With SSO(Single Sign-On) you don't have to remember a ton of complicated passwords anymore, let your fingerprint be your identity.

Cons:

-with DRM (Digital Rights Mgmt) being worked on by the same group, it's a matter of time that they merge the two; which means that sofware and hardware vendors will have the possibility to constantly have be looking over your shoulder.

- It all comes that to a trust issue. Are we going to trust these companies to protect us just because they are nice guys or are they doing it to increase their bottom line.

You decide, meanwhile TPM is being installed on most laptop shipped since 2006. I must add the feature needs to be turn on by the user(owner).

it's going mobile as well.

User Avatar

Wiki User

18y ago

What else can I help you with?

Related Questions

What hardware component is needed to set up Bit Locker Encryption so that you can authenticate the computer?

TPM (Trusted Platform Module) chip. The TPM chip holds the BitLocker encryption key (also called the startup key).


What is the chip called that is on the motherboard of most notebook computers?

TPM


Which chip on the motherboard does Windows Bitlocker Encryption use to secure the hard drive?

Trusted Platform Module Chip or TPM.


What is the purpose of the tpm chip ona amotherboard?

The Trusted Platform Module (TPM) chip on a motherboard serves as a hardware-based security feature that stores cryptographic keys, passwords, and digital certificates securely. Its primary purpose is to enhance system security by providing hardware-level protection against unauthorized access and tampering. TPM can facilitate secure boot processes, disk encryption, and validation of software integrity, thereby ensuring a trusted computing environment. It plays a crucial role in helping protect sensitive data and enabling secure transactions.


What must your motherboard have to use BitLocker Encryption in Windows 7 which will ensure that your hard drive cannot be used in another computer?

There is a wonderful device known as a TPM chip. Also, good luck on the A+ cert program that you are undoubtedly using.


Security chip mad function error?

The security chip mad function error is found in Laptop computers. This error message appears when the TPM chip fails and needs to be repaired.


When was the Trusted Platform Module chip introduced?

The Trusted Platform Module (TPM) chip was introduced in 2003 by the Trusted Computing Group (TCG). It was designed to provide hardware-based security functions, including secure generation and storage of cryptographic keys, to enhance the security of computing devices. The TPM standard has evolved over the years, with TPM 2.0 being released in 2014, offering improved features and capabilities.


Which chip on the motherboard does window bit-locker encryption use to secure the hard drive?

It uses the trusted platform module (TPM).


Which chip on the motherboard does Wndows Bitlocker Encryption use to secure the hard drive?

The TPM chip is used to hold the encryption key for Windows Vista BitLocker Encryption. You can lock down a workstation using Windows. Press the


What does tpm mean in computers?

A trusted platform module (TPM) is a chip that handles FDE (full-disk encryption) and other encryption-based security on a computer. It is primarily used in operating systems such as Windows 7 and 8 with the advent of BitLocker, which if enabled will disallow you from using the hard disk in another computer.


What is the full form of TPM?

The full form of TPM is " TOTAL PRODUCTIVE MAINTENANCE


What is the purpose of TPM Muckraker?

TPM Muckraker is a blog that focuses on investigative reporting and analysis of political news, particularly in relation to government corruption, political scandals, and abuse of power. It aims to hold public officials accountable and provide in-depth coverage of important political developments.

Trending Questions
To prepare to enter the networking field a student should master a number of general networking technologies? What formula would you use to subtract the number in cell C3 from that in B5? What is the format that can change to create contrast and emphasis on a PowerPoint slide? You can hear videocall but caller can not hear you? What provides a file system interface that allows clients to create and modify files? You're giving your presentation and you need to click to a slide that's a few slides back How do you get there? Where would i find general-purpose processor? What are the two kinds of dos commands? Why computer is dummy device? Is it possible to get your computer to automatically turn on Windows XP Pro? Which format must a document be saved in to share it between two different word processor? Why is it important to use cell addresses in a formula instead of just using the numbers typed into the cell with Excel? How do you use the help file to aid efficiently operation of the drawing system? How can you remove ipod touch scratches from its screen without altering it? What do you need to do to erase websites from your computer? What is a torch made of? When an error occurs in a formula in a cell Excel displays the button next to the cell and identifies the cell with the error by placing a green triangle in the upper left of the cell? Discuss the importance of policy-based management under domain network management? Compare and contrast out-sourcing system development as opposed to carrying out system development in-house? Which of the following buttons do you click to pre-configure the fields in an executable transaction screen?