Cryptographic activation definition

Cryptographic activation. (5) means any technique that specifically activates or enables cryptographic capability of an item, by means of a mechanism implemented by the manufacturer of the item, where this mechanism is uniquely bound to any of the following:
Cryptographic activation. (5) means any technique that activates or enables cryptographic capability, via a secure mechanism that is implemented by the manufacturer of the item and is uniquely bound to the item or customer for which the cryptographic capability is being activated or enabled (e.g., a serial number-based licence key or an authentication instrument such as a digitally signed certificate).
Cryptographic activation. (Category 5) means any technique that specifically activates or enables cryptographic capability of an item, by means of a mechanism implemented by the manufacturer of the item, where this mechanism is uniquely bound to either of the following: a. A single instance of the item; or b. One customer, for multiple instances of the item; Technical Notes1. “Cryptographic activation” techniques and mechanisms may be implemented as hardware, “software” or “technology”. 2. Mechanisms for “cryptographic activation” can, for example, be serial number-based licence keys or authentication instruments such as digitally signed certificates. “cryptography” (Category 5) means the discipline which embodies principles, means and methods for the transformation of data in order to hide its information content, prevent its undetected modification or prevent its unauthorised use. “Cryptography” is limited to the transformation of information using one or more ‘secret parameters’ (e.g. crypto variables) or associated key management; Note 1“Cryptography” does not include ‘fixed’ data compression or coding techniques. Note 2“Cryptography” includes decryption. Technical Notes1. ‘Secret parameter’ means a constant or key kept from the knowledge of others or shared only within a group.2. ‘Fixed’ means the coding or compression algorithm cannot accept externally supplied parameters (e.g. cryptographic or key variables) and cannot be modified by the user. “CW laser” (Category 6) means a “laser” that produces a nominally constant output energy for greater than 0.25 s; “cyber incident response” (Category 4) means the process of exchanging necessary information on a cybersecurity incident with individuals or organisations responsible for conducting or coordinating remediation toaddress the cybersecurity incident;

Examples of Cryptographic activation in a sentence

  • Cryptographic activation" techniques and mechanisms may be implemented as hardware, "software" or "technology".

Related to Cryptographic activation

  • Devices means any and all devices owned or purchased from time to time by Party A and utilized for the purposes of the provision of the Services.

  • Synchronous Optical Network (SONET means the optical interface standard that allows inter-networking of transmission products from multiple vendors. The base rate is 51.84 Mbps (“OC 1/STS 1”) and higher rates are direct multiples of the base rate, up to 13.22 Gbps.

  • Device means instruments, apparatus, and contrivances, including their components, parts, and

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Filter means material placed in the useful beam to preferentially absorb selected radiations.

  • Assistive technology service means any service that directly assists a child with a disability in the selection, acquisition, or use of an assistive technology device. The term includes:

  • Technology means any and all technical information and/or materials, including, without limitation, ideas, techniques, designs, sketches, drawings, models, inventions, know-how, processes, apparatus, methods, equipment, algorithms, software programs, data, software source documents, other works of authorship, formulae and information concerning engineering, research, experimental work, development, design details and specifications.