Cryptographic Modules definition

Cryptographic Modules means hardware and software for encryption and decryption of radio signals and related application-spec ific integrated circuits and field- programmable gate arrays for the Military Airborne Radios Business.

Examples of Cryptographic Modules in a sentence

  • The data shall be encrypted in accordance with FIPS 140-2 Security Requirements for Cryptographic Modules and shall not be stored on systems that are shared with other commercial or Government entities.

  • Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules specifies requirements for cryptographic modules to be deployed in a Sensitive but Unclassified environment.

  • Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.

  • FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules) details the U.S. Government requirements for cryptographic modules.

  • Examples of such requirements are The Office of Management and Budget (OMB) Circular A-130, The Federal Information Security Management Act (FISMA), NIST FIPS PUB 140-2 Security Requirements for Cryptographic Modules, the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP), and the National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI-1000.

  • Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.

  • Data encryption shall use cryptographic technology that has been tested and approved against exacting standards, such as FIPS 140-2 Security Requirements for Cryptographic Modules.

  • Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules, specifies the security requirements that are to be satisfied by the cryptographic module utilized within a security system protecting sensitive information within computer and telecommunications systems (including voice systems).

  • Federal Information Processing Standards Publication 140-­‐2 — Security Requirements for Cryptographic Modules specifies requirements for cryptographic modules to be deployed in a Sensitive but Unclassified environment.

  • Federal Information Processing Standards Publication 140‐2 — Security Requirements for Cryptographic Modules specifies requirements for cryptographic modules to be deployed in a Sensitive but Unclassified environment.

Related to Cryptographic Modules

  • Modules means the Base Modules and Extended Modules.

  • Images means all types of visual content, including without limitation still photography, motion film or video and may include audio elements, whether generated optically, electronically, digitally or by any other means, and shall include all metadata, keywords, descriptions and captions associated therewith. Any reference to Images includes the whole or the part.

  • Devices means (whether physical or virtual) a server, system, workstation, computer, mobile device, or end point upon which or through which the Services are used and/or on which the Software is installed.

  • Electronic device technology means a technology involving

  • Computer software means computer programs, source code, source code listings, object code listings, design details, algorithms, processes, flow charts, formulae, and related material that would enable the software to be reproduced, recreated, or recompiled. Computer software does not include computer databases or computer software documentation.

  • Firmware means software sold or licensed only in conjunction with machines, designed for execution only on a machine with which it is provided, designed only for machines other than a dedicated computer, and embedded into or installed on the machine by the machine’s manufacturer or seller.

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Interfaces means, collectively, the CAD Interface and the Channel Access Interface.

  • Computer software documentation means owner's manuals, user's manuals, installation instructions, operating instructions, and other similar items, regardless of storage medium, that explain the capabilities of the computer software or provide instructions for using the software.

  • Software means any computer software programs, including all source code, object code, and documentation related thereto and all software modules, tools and databases.

  • APIs means SAP application programming interface and accompanying or related Documentation, source code, tools, executable applications, libraries, subroutines, widgets and other materials made available by SAP or through SAP tools or SAP Software Development Kit (and all derivative works or modifications thereof) to Provider that allow Provider to integrate the Provider Service with the Cloud Service, including any access code, authentication keys or similar mechanisms to enable access of the APIs.

  • Technology means algorithms, APIs, diagrams, formulae, inventions (whether or not patentable), invention disclosures, programmer’s notes, improvements, modifications, know-how, logos, marks (including brand names, product names, logos, and slogans), methods, network configurations and architectures, processes, confidential information, proprietary information, protocols, schematics, specifications, product designs, roadmaps, marketing strategies, Software (in any form, including Source Code and executable or object code), subroutines, techniques, user interfaces, domain name registrations, URLs, web sites, social media accounts, systems, tools, databases, data collections, concepts, data, coding, images, designs, documentation, books (including lab books), records, works of authorship (including written, audio and visual materials) and all other forms of technology.

  • Kit means a set of components that are packaged together and intended to be used to perform a specific in vitro diagnostic examination, or a part thereof;

  • Catalog means the available list of tangible personal property or services, in the most current listing, regardless of date, during the life of the contract, that takes the form of a catalog, price list, schedule, shelf price or other form that:

  • Digital Cross Connect System or "DCS" is a function which provides automated Cross Connection of Digital Signal Level 0 (DS0) or higher transmission bit rate digital channels within physical interface facilities. Types of DCS include but are not limited to DCS 1/0s, DCS 3/1s, and DCS 3/3s, where the nomenclature 1/0 denotes interfaces typically at the DS1 rate or greater with Cross Connection typically at the DS0 rate. This same nomenclature, at the appropriate rate substitution, extends to the other types of DCS specifically cited as 3/1 and 3/3. Types of DCS that cross connect Synchronous Transport Signal level 1 (STS-1 s) or other Synchronous Optical Network (SONET) signals (e.g., STS-3) are also DCS, although not denoted by this same type of nomenclature. DCS may provide the functionality of more than one of the aforementioned DCS types (e.g., DCS 3/3/1 which combines functionality of DCS 3/3 and DCS 3/1). For such DCS, the requirements will be, at least, the aggregation of requirements on the "component" DCS. In locations where automated Cross Connection capability does not exist, DCS will be defined as the combination of the functionality provided by a Digital Signal Cross Connect (DSX) or Light Guide Cross Connect (LGX) patch panels and D4 channel banks or other DS0 and above multiplexing equipment used to provide the function of a manual Cross Connection. Interconnection is between a DSX or LGX to a Switch, another Cross Connection, or other service platform device.

  • Computer database means a collection of recorded data in a form capable of being processed by a computer. The term does not include computer software.

  • Web spray adhesive means any aerosol adhesive that is not a mist spray or special purpose spray adhesive.

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • System Software means Software that provides the operating and management instructions for the underlying hardware and other components, and is identified as such in Appendix 4 of the Contract Agreement and such other Software as the parties may agree in writing to be Systems Software. Such System Software includes, but is not restricted to, micro-code embedded in hardware (i.e., “firmware”), operating systems, communications, system and network management, and utility software.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 Security Rule at 45 CFR § 164.304, encrypt means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key. - Release: Shall have the same meaning as Disclose - LEA: As used in this DPA and all Exhibits, the term LEA shall mean the educational agency, as defined in Education Law Section 2-d, that has executed the DPA; if the LEA is a board of cooperative educational services, then the term LEA shall also include Participating School Districts for purposes of the following provisions of the DPA: Article I, Section 2; Article II, Sections 1 and 3; and Sections 1, 2, and 3 of Article III.

  • Computer System means (1) computers with related peripheral components, including storage components, (2) systems and applications software, (3) terminal devices, (4) related communications networks or customer communication systems, and (5) related electronic funds transfer systems; by which data or monies are electronically collected, transmitted, processed, stored or retrieved.

  • Filter means material placed in the useful beam to preferentially absorb selected radiations.

  • Tyler Software means our proprietary software, including any integrations, custom modifications, and/or other related interfaces identified in the Investment Summary and licensed by us to you through this Agreement. • “we”, “us”, “our” and similar terms mean Xxxxx. • “you” and similar terms mean Client.

  • Computer Systems means all computer hardware, peripheral equipment, software and firmware, technology infrastructure and other computer systems and services that are used by the Company to receive, store, process or transmit data.

  • Programming means the process of organisation, decision-making and allocation of financial resources in several stages, with the involvement of partners in accordance with Article 5, intended to implement, on a multi-annual basis, joint action by the Union and the Member States to achieve the objectives of the Union strategy for smart, sustainable and inclusive growth;

  • Device means instruments, apparatus, and contrivances, including their components, parts, and