[. . . ] Installation Guide V2. 1 TPM (Trusted Platform Module) computers. toshiba-europe. com TPM (Trusted Platform Module) Table of contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. 1 Convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. 2 TPM - An Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2 Using TPM for the first time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] In the Backup screen, specify the location for creating and saving the backup file. In the Emergency Recovery screen, select the Create a new Recovery Token and specify the location for creating and saving the Emergency Recovery Token. In the Emergency Recovery screen for Emergency Recovery Token authentication, enter the password in the Password and Confirm Password text boxes and click the Next button. It is strongly recommended that you create an emergency recovery token is created so that information in TPM and user data related to TPM is safe in the event that severe system troubles occur. Failure to follow this recommendation could possibly result in data loss. In the Password Reset screen, select the Create a new Token and specify the location for creating and saving the Password Reset Token. In the Password Reset screen for Password Reset Token authentication, enter the password in the Password and Confirm Password text boxes and click the Next button. It is strongly recommended that you create and save the Password Reset Token on a storage medium such as a floppy disk that is accessible even in the event of a computer failure. n If there are multiple computers with TPM, the token for each computer is different and should be stored separately. n The recovery token for the registered TPM owner* cannot be recreated. In order to prevent loss, multiple copies of the token should be created and stored, as recommended in the note above. *The same TPM owner name can be created by initializing TPM at the BIOS menu and registering a new owner, however, as the owner is actually different from the previously registered owner in this case, previously encrypted files cannot be decrypted. n If the token is leaked to or stolen by third parties together with the password, they would be able to access the encrypted data. Therefore, it is strongly advised that the tokens and passwords are stored carefully. It may take a few minutes before the Wizard completed successfully message is displayed. Next, click the Start Security Platform User Initialization Wizard checkbox and then click the Finish button. 8 Installation Guide TPM (Trusted Platform Module) 13. In the Basic User Key Password screen for user authentication, enter the password in the Password and Confirm Password text boxes and click the Next button. In the Basic User Password Reset screen, ensure that Enable the resetting of my Basic User Password in case of an emergency has been selected. Specify the location for creating and saving the Personal Secret file. In times of need, it would be required to reset the Basic User Password. It might take several minutes for the Security Platform Features screen to be displayed. Ensure that the desired features are selected in the Security Platform Features screen and click the Next button. [. . . ] In the Infineon Security Platform Settings Tool window, click the Migration tab. (The operation must be performed for both the source platform and the destination platform. ) Please perform the operation as per the instructions on the screen. Only the TPM data is migrated during this process, so perform the migration of the data inside the Personal Security Drive and the files encrypted with EFS using the usual file operations. n Remember, it is necessary to also install the Infineon TPM Professional Package in the destination platform. [. . . ]