I have set up BitLocker on several HP computers. I use the BIOS setup to enable the TPM, make it visible to the OS, and take ownership by setting a TPM password. This process requires entering the BIOS twice. Then BitLocker can be started and managed from within Windows and it isn't necessary to reenter the BIO during a reboot.
I have a Lenovo T61 and the BIOS access to the TPM may or may not be the same. In particular, the Lenovo Client Security Solution 8.3 Deployment Guide, describes using the Client Security Solution 8.3 software to take TPM ownership. I have attached the guide to this post. I don't see that the guide describes using the BIOS to take TPM ownership, but I suspect that it is a standard BIOS feature for boards with TPMs.
The deployment guide does state that with a new OS you must enter the BIOS after a cold boot to "clear the security chip". Apparently the command to clear the TPM will not appear following a warm reboot. Probably "clearing" the TPM means setting a new ownership password, but it might mean to disable and re-enable the TPM, or some other process.
FWIW, in an HP BIOS, a hard drive ATA security password can be set only from a cold boot, as well. Otherwise the hard drive doesn't appear in the list for "Drive Lock."
I hope this helps.
Thanks for the heads up on the Deployment Guide. I'll review it. I have tried to clear the security chip in the BIOS (incidently it will not even appear on the menu if it's from a warm boot) before, but it failed to achieve. I'm thinking of slapping in the old SSD/OS and then trying to clear the security chip. The thought here is that perhaps buried on the old SSD is a machine file needed to 'unseal' the TPM. See http://technet.microsoft.com/en-us/library/cc749022(WS.10).aspx My hope by posting here is that perhaps someone might be able to confirm or negate my logic.Before anything though I'll read the depolyment guide, thanks so much.