HP Compaq dc7900 Small Form Factor PC User Manual
Page 106

Trusted Contact list. A listing of Trusted Contacts.
Trusted Contact recipient. A person who receives an invitation to become a Trusted Contact.
Trusted Contact. A person who has accepted a Trusted Contact invitation.
trusted IM communication. A communication session during which trusted messages are sent from a trusted
sender to a Trusted Contact.
trusted message. A communication session during which trusted messages are sent from a trusted sender to
a Trusted Contact.
Trusted Platform Module (TPM) embedded security chip. The generic term for the HP ProtectTools
Embedded Security Chip. A TPM authenticates a computer, rather than a user, by storing information specific to
the host system, such as encryption keys, digital certificates, and passwords. A TPM minimizes the risk that
information on the computer will be compromised by physical theft or an attack by an external hacker.
trusted sender. A Trusted Contact who sends signed and/or encrypted e-mails and Microsoft Office documents.
TXT. Trusted Execution Technology. Hardware and firmware that provides security against attacks on a
computer's software and data.
USB token. Security device that stores identifying information about a user. Like a Java Card or biometric reader,
it is used to authenticate the owner to a computer.
user. Anyone enrolled in Drive Encryption. Non-administrator users have limited rights in Drive Encryption. They
can only enroll (with administrator approval) and log in.
virtual token. Security feature that works very much like a Java Card and card reader. The token is saved either
on the computer hard drive or in the Windows registry. When you log on with a virtual token, you are asked for a
user PIN to complete the authentication.
Windows administrator. A user with full rights to modify permissions and manage other users.
Windows user account. Profile for an individual authorized to log on to a network or to an individual computer.
96
Glossary
ENWW