HP ProBook 4525s HP ProtectTools User Guide - Windows XP, Windows Vista, Windo - Page 99

Trusted Contact invitation, Trusted Contact list

Page 99 highlights

shred profile A specified erasure method and list of assets. Sign and Encrypt button A software button that is displayed on the toolbar of Microsoft Office applications. Clicking the button allows you to sign, encrypt, or removing encryption in a Microsoft Office document. signature line A placeholder for the visual display of a digital signature. When a document is signed, the signer's name and verification method are displayed. The signing date and the signer's title can also be included. simple delete Deletion of the Windows reference to an asset. The asset content remains on the hard drive until obscuring data is written over it by free space bleaching. Single Sign On Feature that stores authentication information and allows you to use the Security Manager to access Internet and Windows applications that require password authentication. smart card Small piece of hardware, similar in size and shape to a credit card, which stores identifying information about the owner. Used to authenticate the owner to a computer. suggested signer A user who is designated by the owner of a Microsoft Word or Microsoft Excel document to add a signature line to the document. token See security logon method. Trusted Contact A person who has accepted a Trusted Contact invitation. Trusted Contact invitation An e-mail that is sent to a person, asking them to become a Trusted Contact. Trusted Contact list A listing of Trusted Contacts. Trusted Contact recipient A person who receives an invitation to become a Trusted Contact. trusted IM communication A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. trusted message A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. trusted sender A Trusted Contact who sends signed and/or encrypted e-mails and Microsoft Office documents. TXT Trusted Execution Technology. USB token Security device that stores identifying information about a user. Like a Java Card or biometric reader, it is used to authenticate the owner to a computer. user Anyone enrolled in Drive Encryption. Non-administrator users have limited rights in Drive Encryption. They can only enroll (with administrator approval) and log on. virtual token Security feature that works very much like a Java Card and card reader. The token is saved either on the computer hard drive or in the Windows registry. When you log on with a virtual token, you are asked for a user PIN to complete the authentication. Windows administrator A user with full rights to modify permissions and manage other users. Windows Logon Security Protects your Windows account(s) by requiring the use of specific credentials for access. Windows user account Profile for an individual authorized to log on to a network or to an individual computer. Glossary 91

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103

shred profile
A specified erasure method and list of assets.
Sign and Encrypt button
A software button that is displayed on the toolbar of Microsoft Office applications.
Clicking the button allows you to sign, encrypt, or removing encryption in a Microsoft Office document.
signature line
A placeholder for the visual display of a digital signature. When a document is signed, the signer's
name and verification method are displayed. The signing date and the signer's title can also be included.
simple delete
Deletion of the Windows reference to an asset. The asset content remains on the hard drive until
obscuring data is written over it by free space bleaching.
Single Sign On
Feature that stores authentication information and allows you to use the Security Manager to
access Internet and Windows applications that require password authentication.
smart card
Small piece of hardware, similar in size and shape to a credit card, which stores identifying
information about the owner. Used to authenticate the owner to a computer.
suggested signer
A user who is designated by the owner of a Microsoft Word or Microsoft Excel document to
add a signature line to the document.
token
See security logon method.
Trusted Contact
A person who has accepted a Trusted Contact invitation.
Trusted Contact invitation
An e-mail that is sent to a person, asking them to become a Trusted Contact.
Trusted Contact list
A listing of Trusted Contacts.
Trusted Contact recipient
A person who receives an invitation to become a Trusted Contact.
trusted IM communication
A communication session during which trusted messages are sent from a trusted
sender to a Trusted Contact.
trusted message
A communication session during which trusted messages are sent from a trusted sender to a
Trusted Contact.
trusted sender
A Trusted Contact who sends signed and/or encrypted e-mails and Microsoft Office documents.
TXT
Trusted Execution Technology.
USB token
Security device that stores identifying information about a user. Like a Java Card or biometric reader,
it is used to authenticate the owner to a computer.
user
Anyone enrolled in Drive Encryption. Non-administrator users have limited rights in Drive Encryption. They
can only enroll (with administrator approval) and log on.
virtual token
Security feature that works very much like a Java Card and card reader. The token is saved either
on the computer hard drive or in the Windows registry. When you log on with a virtual token, you are asked for a
user PIN to complete the authentication.
Windows administrator
A user with full rights to modify permissions and manage other users.
Windows Logon Security
Protects your Windows account(s) by requiring the use of specific credentials for
access.
Windows user account
Profile for an individual authorized to log on to a network or to an individual computer.
Glossary
91