HP Dc5700 HP ProtectTools Security Manager Guide - Page 43
Glossary, Application Programming Interface API
UPC - 882780819535
View all HP Dc5700 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 43 highlights
Glossary Advanced Encryption Standard (AES) A symmetric 128-bit block data encryption technique Application Programming Interface (API) A series of internal operating system functions that applications can use to perform various tasks Authentication Process of verifying whether a user is authorized to perform a task, for example, accessing a computer, modifying settings for a particular program, or viewing secured data. Biometric Category of authentication credentials that use a physical feature, such as a fingerprint, to identify a user. BIOS profile Group of BIOS configuration settings that can be saved and applied to other accounts. BIOS security mode Setting in Java Card Security for ProtectTools that, when enabled, requires the use of a Java Card and a valid PIN for user authentication. Certification authority Service that issues the certificates required to run a public key infrastructure. Credentials Method by which a user proves eligibility for a particular task in the authentication process. Cryptographic Service Provider (CSP) Provider or library of cryptographic algorithms that can be used in a well-defined interface to perform particular cryptographic functions. A software component that interfaces with the MSCAPI Cryptography Practice of encrypting and decrypting data so that it can be decoded only by specific individuals. Decryption Procedure used in cryptography to convert encrypted data into plain text. Digital certificate Electronic credentials that confirm the identity of an individual or a company by binding the identity of the digital certificate owner to a pair of electronic keys that are used to sign digital information. Digital signature Data sent with a file that verifies the sender of the material, and that the file has not been modified after it was signed. Domain Group of computers that are part of a network and share a common directory database. Domains are uniquely named, and each has a set of common rules and procedures. Emergency recovery archive Protected storage area that allows the re-encryption of Basic User Keys from one platform owner key to another. Encrypting File System (EFS) System that encrypts all files and subfolders within the selected folder. A transparent file encryption service provided by Microsoft for Windows 2000 or later Encryption Procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher text in order to prevent unauthorized recipients from reading that data. There are many types of data encryption, and they are the basis of network security. Common types include Data Encryption Standard and public-key encryption. ENWW Glossary 37