02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix B – Glossary<br />

Contents Glossary Index Troubleshooting<br />

B<br />

ASCII<br />

Short for American Standard Code for Information Interchange; a code for<br />

information exchange between computers made by different companies; a<br />

string of 7 binary digits represents each character; used in most<br />

microcomputers.<br />

Asymmetric Key Encryption System<br />

258 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />

<br />

Also referred as the public key encryption system. It uses a pair of keys—a<br />

private key and a public key—to encrypt and decrypt data.<br />

The asymmetric algorithms are considered to be slower than the symmetric<br />

algorithms for a comparable key size. Typically, the former are used for<br />

encrypting the hash values and symmetric session keys (which are comparatively<br />

much smaller in size than bulk data).<br />

Bidirectional Code Generation<br />

The Developer generates this code (Feature/License update [.upw], or New<br />

License Addition [.nlf]) with a request code from the end user, and updates a<br />

single key in field.<br />

Block<br />

A sequence of bits of fixed length; longer sequences of bits can be broken<br />

down into blocks.<br />

Courtesy - http://www.rsasecurity.com<br />

Borland Package Library (BPL)<br />

BPL is a special dynamic-link library (DLL) that is used for building Borland<br />

applications; and contains modules to be shared across multiple projects.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!