HP Dc5700 HP ProtectTools Security Manager Guide - Page 43

Glossary, Application Programming Interface API

Page 43 highlights

Glossary Advanced Encryption Standard (AES) A symmetric 128-bit block data encryption technique Application Programming Interface (API) A series of internal operating system functions that applications can use to perform various tasks Authentication Process of verifying whether a user is authorized to perform a task, for example, accessing a computer, modifying settings for a particular program, or viewing secured data. Biometric Category of authentication credentials that use a physical feature, such as a fingerprint, to identify a user. BIOS profile Group of BIOS configuration settings that can be saved and applied to other accounts. BIOS security mode Setting in Java Card Security for ProtectTools that, when enabled, requires the use of a Java Card and a valid PIN for user authentication. Certification authority Service that issues the certificates required to run a public key infrastructure. Credentials Method by which a user proves eligibility for a particular task in the authentication process. Cryptographic Service Provider (CSP) Provider or library of cryptographic algorithms that can be used in a well-defined interface to perform particular cryptographic functions. A software component that interfaces with the MSCAPI Cryptography Practice of encrypting and decrypting data so that it can be decoded only by specific individuals. Decryption Procedure used in cryptography to convert encrypted data into plain text. Digital certificate Electronic credentials that confirm the identity of an individual or a company by binding the identity of the digital certificate owner to a pair of electronic keys that are used to sign digital information. Digital signature Data sent with a file that verifies the sender of the material, and that the file has not been modified after it was signed. Domain Group of computers that are part of a network and share a common directory database. Domains are uniquely named, and each has a set of common rules and procedures. Emergency recovery archive Protected storage area that allows the re-encryption of Basic User Keys from one platform owner key to another. Encrypting File System (EFS) System that encrypts all files and subfolders within the selected folder. A transparent file encryption service provided by Microsoft for Windows 2000 or later Encryption Procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher text in order to prevent unauthorized recipients from reading that data. There are many types of data encryption, and they are the basis of network security. Common types include Data Encryption Standard and public-key encryption. ENWW Glossary 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48

Glossary
Advanced Encryption Standard (AES)
A symmetric 128-bit block data encryption technique
Application Programming Interface (API)
A series of internal operating system functions that applications can
use to perform various tasks
Authentication
Process of verifying whether a user is authorized to perform a task, for example, accessing a
computer, modifying settings for a particular program, or viewing secured data.
Biometric
Category of authentication credentials that use a physical feature, such as a fingerprint, to identify a
user.
BIOS profile
Group of BIOS configuration settings that can be saved and applied to other accounts.
BIOS security mode
Setting in Java Card Security for ProtectTools that, when enabled, requires the use of a
Java Card and a valid PIN for user authentication.
Certification authority
Service that issues the certificates required to run a public key infrastructure.
Credentials
Method by which a user proves eligibility for a particular task in the authentication process.
Cryptographic Service Provider (CSP)
Provider or library of cryptographic algorithms that can be used in a
well-defined interface to perform particular cryptographic functions. A software component that interfaces with the
MSCAPI
Cryptography
Practice of encrypting and decrypting data so that it can be decoded only by specific individuals.
Decryption
Procedure used in cryptography to convert encrypted data into plain text.
Digital certificate
Electronic credentials that confirm the identity of an individual or a company by binding the
identity of the digital certificate owner to a pair of electronic keys that are used to sign digital information.
Digital signature
Data sent with a file that verifies the sender of the material, and that the file has not been
modified after it was signed.
Domain
Group of computers that are part of a network and share a common directory database. Domains are
uniquely named, and each has a set of common rules and procedures.
Emergency recovery archive
Protected storage area that allows the re-encryption of Basic User Keys from one
platform owner key to another.
Encrypting File System (EFS)
System that encrypts all files and subfolders within the selected folder. A
transparent file encryption service provided by Microsoft for Windows 2000 or later
Encryption
Procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher
text in order to prevent unauthorized recipients from reading that data. There are many types of data encryption,
and they are the basis of network security. Common types include Data Encryption Standard and public-key
encryption.
ENWW
Glossary
37