Windows 7 ultimate encryption




















United States English. Home R2 Library Forums. Ask a question. Quick access. Search related threads. Remove From My Forums. Answered by:. Archived Forums. A TPM is a microchip designed to provide basic security-related functions, primarily involving encryption keys. The TPM is usually installed on the motherboard of a desktop or portable computer, and communicates with the rest of the system by using a hardware bus.

Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM.

This process, often called "wrapping" or "binding" a key, can help protect the key from disclosure. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. Computers that incorporate a TPM can also create a key that has not only been wrapped, but is also tied to specific hardware or software conditions. This is called "sealing" a key. When a sealed key is first created, the TPM records a snapshot of configuration values and file hashes.

A sealed key is only "unsealed" or released when those current system values match the ones in the snapshot. BitLocker uses sealed keys to detect attacks against the integrity of the Windows operating system.

With a TPM, private portions of key pairs are kept separated from the memory controlled by the operating system.

Because the TPM uses its own internal firmware and logic circuits for processing instructions, it does not rely upon the operating system and is not exposed to external software vulnerabilities.

BitLocker uses the TPM to help protect the Windows operating system and user data and helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen. BitLocker can also be used without a TPM. This flash drive must be presented plugged in to unlock the data stored on a volume. You can follow the question or vote as helpful, but you cannot reply to this thread. I have the same question Report abuse. Details required :.

Cancel Submit. Shenan Stanley. In reply to gorko's post on May 1, So do you mean that if I create another account on my computer then the person using the other account won't be able to access my files? You really should read up on Encryption instead of just asking the questions.



0コメント

  • 1000 / 1000