HP dc73 Protect Tools User Guide - Page 74

Glossary, Digital certificate

Page 74 highlights

Glossary Authentication Process of verifying whether a user is authorized to perform a task, for example, accessing a computer, modifying settings for a particular program, or viewing secured data. Biometric Category of authentication credentials that use a physical feature, such as a fingerprint, to identify a user. BIOS profile Group of BIOS configuration settings that can be saved and applied to other accounts. BIOS security mode Setting in Java Card Security that, when enabled, requires the use of a Java Card and a valid PIN for user authentication. Certification authority Service that issues the certificates required to run a public key infrastructure. Credentials Method by which a user proves eligibility for a particular task in the authentication process. Cryptographic service provider (CSP) Provider or library of cryptographic algorithms that can be used in a well-defined interface to perform particular cryptographic functions. Cryptography Practice of encrypting and decrypting data so that it can be decoded only by specific individuals. Decryption Procedure used in cryptography to convert encrypted data into plain text. Digital certificate Electronic credentials that confirm the identity of an individual or a company by binding the identity of the digital certificate owner to a pair of electronic keys that are used to sign digital information. Digital signature Data sent with a file that verifies the sender of the material, and that the file has not been modified after it was signed. Domain Group of computers that are part of a network and share a common directory database. Domains are uniquely named, and each has a set of common rules and procedures. DriveLock Security feature that links the hard drive to a user and requires the user to correctly type the DriveLock password when the computer starts up. Emergency recovery archive Protected storage area that allows the reencryption of basic user keys from one platform owner key to another. Encryption Procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher text in order to prevent unauthorized recipients from reading that data. There are many types of data encryption, and they are the basis of network security. Common types include Data Encryption Standard and public-key encryption. Encryption File System (EFS) System that encrypts all files and subfolders within the selected folder. FAT partition File Allocation Table, a method of indexing storage media. Identity In the HP ProtectTools Credential Manager, a group of credentials and settings that is handled like an account or profile for a particular user. Java Card Small piece of hardware, similar in size and shape to a credit card, which stores identifying information about the owner. Used to authenticate the owner to a computer. 68 Glossary ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79

Glossary
Authentication
Process of verifying whether a user is authorized to perform a task, for example, accessing a
computer, modifying settings for a particular program, or viewing secured data.
Biometric
Category of authentication credentials that use a physical feature, such as a fingerprint, to identify a
user.
BIOS profile
Group of BIOS configuration settings that can be saved and applied to other accounts.
BIOS security mode
Setting in Java Card Security that, when enabled, requires the use of a Java Card and a
valid PIN for user authentication.
Certification authority
Service that issues the certificates required to run a public key infrastructure.
Credentials
Method by which a user proves eligibility for a particular task in the authentication process.
Cryptographic service provider (CSP)
Provider or library of cryptographic algorithms that can be used in a
well-defined interface to perform particular cryptographic functions.
Cryptography
Practice of encrypting and decrypting data so that it can be decoded only by specific individuals.
Decryption
Procedure used in cryptography to convert encrypted data into plain text.
Digital certificate
Electronic credentials that confirm the identity of an individual or a company by binding the
identity of the digital certificate owner to a pair of electronic keys that are used to sign digital information.
Digital signature
Data sent with a file that verifies the sender of the material, and that the file has not been
modified after it was signed.
Domain
Group of computers that are part of a network and share a common directory database. Domains are
uniquely named, and each has a set of common rules and procedures.
DriveLock
Security feature that links the hard drive to a user and requires the user to correctly type the DriveLock
password when the computer starts up.
Emergency recovery archive
Protected storage area that allows the reencryption of basic user keys from one
platform owner key to another.
Encryption
Procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher
text in order to prevent unauthorized recipients from reading that data. There are many types of data encryption,
and they are the basis of network security. Common types include Data Encryption Standard and public-key
encryption.
Encryption File System (EFS)
System that encrypts all files and subfolders within the selected folder.
FAT partition
File Allocation Table, a method of indexing storage media.
Identity
In the HP ProtectTools Credential Manager, a group of credentials and settings that is handled like an
account or profile for a particular user.
Java Card
Small piece of hardware, similar in size and shape to a credit card, which stores identifying information
about the owner. Used to authenticate the owner to a computer.
68
Glossary
ENWW