With more and more Trojan horse programs and hacker intrusions, the risk of computer data leakage is getting higher and higher. In addition to facing data losses caused by Trojan horse programs or hacker attacks, laptops are easy to carry , high unit price, easy to cash out, and often the best target for thieves. Once data is leaked, the damage caused is often difficult to estimate, and there are endless examples of this.
#In fact, many computers or laptops have enhanced mechanisms to prevent data leakage, such as the TPM security chip, which is one of them.
NB has been building in built-in security chips for several years. For example, many of IBM's ThinkPad notebooks have built-in TPM chips. (Recommended learning: webfront-end video tutorial)
In the past, this kind of TPM security chip did not receive much attention; but recently, as a new round of notebook computers have been released, among them There are many newly launched commercial models claiming to have built-in TPM security chips.
TPM (Trusted Platform Module) Trusted Security Platform Module TCG (Trusted Computing Group) Information security protection technical specifications promoted by Trusted Computing Group, including Intel, IBM, HP, AMD, Sony, Information giants such as Sun Micro and Microsoft are all supporting vendors of this organization.
Currently, most notebook computers have built-in chips that support TPM specifications to build the required security mechanisms.
To put it simply, TPM can use the public key infrastructure (PKI) to generate a digital signature that cannot be copied and read to verify the identity of the data access platform and hard disk, and provide data protection for individual platforms; in addition, there are The TPM chip also has the function of storing passwords or user information, or integrating some additional security mechanisms.
For users, the most direct benefit of TPM is that it can directly encrypt files or data boxes. Once the file data has been encrypted by TPM, it basically has double protection. On the one hand, it can open the encrypted file. The file itself must have a set of passwords, and it must be paired with a TPM chip to open the file; that is to say, even if it is stolen by hackers, the data cannot be read without the TPM chip.
If you are afraid that the entire NB will be stolen, you can also set a longer password. For example, the encryption mechanism of IBM ThinkPad can set a password of up to 256 bits to prevent data leakage.
The above is the detailed content of What is computer tpm. For more information, please follow other related articles on the PHP Chinese website!