Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Hardware security module

Index Hardware security module

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. [1]

45 relations: Application programming interface, ASC X9, ATM Controller, Bus analyzer, Card security code, Certificate authority, Common Criteria, Computer, Cryptocurrency wallet, Digital signature, Disk encryption, Domain Name System Security Extensions, Electronic funds transfer, Elliptic-curve cryptography, EMV, Federal Information Processing Standards, FIPS 140, Gemalto, HP Atalla, HTTPS, ICANN, International Organization for Standardization, Key management, Magnetic tape data storage, National Institute of Standards and Technology, OpenDNSSEC, Payment Card Industry Security Standards Council, Payment terminal, PKCS 11, Public key infrastructure, Public-key cryptography, RSA (cryptosystem), Secret sharing, Secure cryptoprocessor, Security token, Server (computing), Smart card, SSL acceleration, Strong authentication, Symmetric-key algorithm, Thales Group, Transparent Data Encryption, Transport Layer Security, Verisign, Zone file.

Application programming interface

In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building software.

New!!: Hardware security module and Application programming interface · See more »

ASC X9

The Accredited Standards Committee X9 (ASC X9, Inc.) is an ANSI (American National Standards Institute) accredited standards developing organization, responsible for developing voluntary open consensus standards for the financial services industry in the U.S. ASC X9 is the USA Technical Advisory Group (TAG) to the International Technical Committee on Financial Services ISO/TC 68 under the International Organization for Standardization (ISO), of Geneva, Switzerland, and submits X9 American National Standards to the international committee to be considered for adoption as international standards or ISO standards.

New!!: Hardware security module and ASC X9 · See more »

ATM Controller

An ATM controller (ATMC) is a system used in financial institutions to route financial transactions between ATMs, core banking systems and other banks.

New!!: Hardware security module and ATM Controller · See more »

Bus analyzer

A bus analyzer is a type of a protocol analysis tool, used for capturing and analyzing communication data across a specific interface bus, usually embedded in a hardware system.

New!!: Hardware security module and Bus analyzer · See more »

Card security code

A card security code (CSC; also called card verification data, card verification number, card verification value, card verification value code, card verification code, verification code, or signature panel code) is a security feature for "card not present" payment card transactions instituted to reduce the incidence of credit card fraud.

New!!: Hardware security module and Card security code · See more »

Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.

New!!: Hardware security module and Certificate authority · See more »

Common Criteria

The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification.

New!!: Hardware security module and Common Criteria · See more »

Computer

A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Hardware security module and Computer · See more »

Cryptocurrency wallet

A cryptocurrency wallet stores the public and private keys which can be used to receive or spend the cryptocurrency.

New!!: Hardware security module and Cryptocurrency wallet · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Hardware security module and Digital signature · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

New!!: Hardware security module and Disk encryption · See more »

Domain Name System Security Extensions

The Domain Name System Security Extensions (DNSSEC) is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks.

New!!: Hardware security module and Domain Name System Security Extensions · See more »

Electronic funds transfer

Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

New!!: Hardware security module and Electronic funds transfer · See more »

Elliptic-curve cryptography

Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.

New!!: Hardware security module and Elliptic-curve cryptography · See more »

EMV

EMV is a payment method based upon a technical standard for smart payment cards and for payment terminals and automated teller machines that can accept them.

New!!: Hardware security module and EMV · See more »

Federal Information Processing Standards

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

New!!: Hardware security module and Federal Information Processing Standards · See more »

FIPS 140

The 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules.

New!!: Hardware security module and FIPS 140 · See more »

Gemalto

Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services.

New!!: Hardware security module and Gemalto · See more »

HP Atalla

Micro Focus Atalla is a security vendor, with experience in data security and cryptography.

New!!: Hardware security module and HP Atalla · See more »

HTTPS

HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet.

New!!: Hardware security module and HTTPS · See more »

ICANN

The Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numericalspaces of the Internet, ensuring the network's stable and secure operation.

New!!: Hardware security module and ICANN · See more »

International Organization for Standardization

The International Organization for Standardization (ISO) is an international standard-setting body composed of representatives from various national standards organizations.

New!!: Hardware security module and International Organization for Standardization · See more »

Key management

Key management refers to management of cryptographic keys in a cryptosystem.

New!!: Hardware security module and Key management · See more »

Magnetic tape data storage

Magnetic tape data storage is a system for storing digital information on magnetic tape using digital recording.

New!!: Hardware security module and Magnetic tape data storage · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Hardware security module and National Institute of Standards and Technology · See more »

OpenDNSSEC

OpenDNSSEC is a computer program that manages the security of domain names on the Internet.

New!!: Hardware security module and OpenDNSSEC · See more »

Payment Card Industry Security Standards Council

The Payment Card Industry Security Standards Council was originally formed by American Express, Discover Financial Services, JCB International, MasterCard and Visa Inc. on 7 September 2006, with the goal of managing the ongoing evolution of the Payment Card Industry Data Security Standard.

New!!: Hardware security module and Payment Card Industry Security Standards Council · See more »

Payment terminal

A payment terminal, also known as a point of sale terminal, credit card terminal, EFTPOS terminal (or a PDQ terminal which stands for "Process Data Quickly"), is a device which interfaces with payment cards to make electronic funds transfers.

New!!: Hardware security module and Payment terminal · See more »

PKCS 11

In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate cryptographic tokens.

New!!: Hardware security module and PKCS 11 · See more »

Public key infrastructure

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

New!!: Hardware security module and Public key infrastructure · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Hardware security module and Public-key cryptography · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Hardware security module and RSA (cryptosystem) · See more »

Secret sharing

Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret.

New!!: Hardware security module and Secret sharing · See more »

Secure cryptoprocessor

A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

New!!: Hardware security module and Secure cryptoprocessor · See more »

Security token

Security tokens are physical devices used to gain access to an electronically restricted resource.

New!!: Hardware security module and Security token · See more »

Server (computing)

In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".

New!!: Hardware security module and Server (computing) · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Hardware security module and Smart card · See more »

SSL acceleration

SSL acceleration (TLS acceleration) is a method of offloading processor-intensive public-key encryption for Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) to a hardware accelerator.

New!!: Hardware security module and SSL acceleration · See more »

Strong authentication

Strong authentication is a notion with several unofficial definitions.

New!!: Hardware security module and Strong authentication · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Hardware security module and Symmetric-key algorithm · See more »

Thales Group

Thales Group is a French multinational company that designs and builds electrical systems and provides services for the aerospace, defence, transportation and security markets.

New!!: Hardware security module and Thales Group · See more »

Transparent Data Encryption

Transparent Data Encryption (often abbreviated to TDE) is a technology employed by Microsoft, IBM and Oracle to encrypt database files.

New!!: Hardware security module and Transparent Data Encryption · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Hardware security module and Transport Layer Security · See more »

Verisign

Verisign, Inc. is an American company based in Reston, Virginia, United States that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the,, and generic top-level domains and the and country-code top-level domains, and the back-end systems for the,, and top-level domains.

New!!: Hardware security module and Verisign · See more »

Zone file

A Domain Name System (DNS) zone file is a text file that describes a DNS zone.

New!!: Hardware security module and Zone file · See more »

Redirects here:

Hardware Security Module, Hardware secure module, Hardware security modules, Host Security Module, Host security module.

References

[1] https://en.wikipedia.org/wiki/Hardware_security_module

OutgoingIncoming
Hey! We are on Facebook now! »