The means by which a user proves eligibility for a particular task in the authentication process.
cryptographic service provider (CSP)
A provider or library of cryptographic algorithms that can be used in a
cryptography
The practice of encrypting and decrypting data so that it can be decoded only by specific individuals.
dashboard
A central location where you can access and manage the features and settings in Security Manager for HP ProtectTools.
decryption
A procedure used in cryptography to convert encrypted data into plain text.
device access control policy
The list of devices for which a user is allowed or denied access.
device class
All devices of a particular type, such as drives.
digital certificate
Electronic credentials that confirm the identity of an individual or a company by binding the identity of the digital certificate owner to a pair of electronic keys that are used to sign digital information.
digital signature
Data sent with a file that verifies the sender of the material, and that the file has not been modified after it was signed.
domain
A group of computers that are part of a network and share a common directory database. Domains are uniquely named, and each has a set of common rules and procedures.
Drive Encryption
Protects your data by encrypting your hard drive(s), making the information unreadable by those without proper authorization.
Drive Encryption logon screen
A logon screen that is displayed before Windows starts up. Users must enter their Windows user name and their password or smart card PIN. Under most circumstances, entering the correct information at the Drive Encryption logon screen allows access directly into Windows without having to log on again at the Windows logon screen.
DriveLock
A security feature that links the hard drive to a user and requires the user to correctly type the DriveLock password when the computer starts up.
emergency recovery archive
A protected storage area that allows the reencryption of Basic User Keys from one platform owner key to another.
encryption
A procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher text in order to prevent unauthorized recipients from reading that data. There are many types of data encryption, and they are the basis of network security. Common types include Data Encryption Standard and
108 Glossary