Welcome to our comprehensive glossary page for all things related to cyber security, biometrics, smart cards, Java card, encryption, logical access and physical access control systems. Here you will find a collection of key terms and definitions related to these subjects, which will help you better understand the world of information security and access control.
Cyber Security: Cyber security is the practice of protecting digital assets from unauthorized access, theft, and damage. This can include measures such as firewalls, intrusion detection systems, antivirus software, and other tools designed to prevent cyber attacks.
Biometrics: Biometrics is the use of unique physical characteristics, such as fingerprints, facial recognition, or iris scans, to verify a person’s identity. Biometric authentication is commonly used in access control systems and other security applications.
Smart Cards: Smart cards are credit card-sized plastic cards containing a microprocessor and memory that can be programmed with data and applications. They are commonly used for access control, electronic payments, and other secure applications.
Logical Access: Logical access control refers to the use of software-based security measures, such as, multi-factor authentication (MFA), single sign-on (SSO), passwords or biometric authentication, to restrict access to digital assets, such as files, databases, and applications.
Java Card: Java Card is a technology platform that allows for the development of secure smart card applications using the Java programming language. It is commonly used in applications such as banking, transportation, and healthcare.
Encryption: Encryption is the process of converting data into a coded form that is unreadable without the proper decryption key. This is a common technique used to protect sensitive data in transit or storage.
Physical Access Control: Physical access control refers to the use of physical barriers, such as doors, gates, and turnstiles, to restrict access to physical spaces. This can include biometric or card-based authentication systems to ensure only authorized individuals can access secure areas.
We hope this glossary provides you with a useful reference for all things related to cyber security, biometrics, smart cards, logical access, Java card, encryption, and physical access control.
- ABIS
- Access Control
- Access Control System Format
- Acquirer
- Advanced Encryption Standard
- AES
- AFIS
- AID
- ANSI-378
- ANSI 378-2004
- ANSI INCITS 378-2004
- Answer To Reset
- Anti-collision
- Anti-tearing
- APDU
- APDU buffer
- Application Identifier
- Application Protocol Data Unit
- ATR
- Automated Biometric Identification System
- Automated Fingerprint Identification System
- BAC
- BAP
- Basic Access Control
- Basic Access Protection
- Biometric Information Privacy Act
- Biometric Modality
- BIPA
- Bytecode
- Cardholder
- Cardholder
- Cardholder Verification
- Card Life Cycle
- Card Management System
- Card Operating System
- Card Owner
- Card Personalization
- Card Production Life Cycle
- CBEFF
- CCID
- CDMA
- Certificate Revocation List
- Challenge-Response
- Chip Card
- Chip Card Interface Device
- CHV
- CIP-002-3
- Class file
- CMS
- Code Division Multiple Access
- Common Biometric Exchange File Format
- Common Biometric Exchange Formats Framework
- COS
- CPLC
- CR79
- CR80
- CR100
- Credential Management System
- CRL
- Curve448
- Defense Federal Acquisition Regulation Supplement
- DESFire
- DFA
- DFARS
- Differential Fault Attacks
- Differential Power Analysis
- Digital Signature
- Digital Signature Algorithm
- DPA
- DSA
- EAC
- EBTS
- ECDAA
- ECDH
- ECDHE
- ECDSA
- Ed448
- EdDSA
- Edwards-curve Digital Signature Algorithm
- EHR
- Electronic Biometric Transmission Specifications
- Electronic Health Record
- Electronic Signature
- Electronic Signatures
- Elementary Time Unit
- Elliptic Curve Diffie-Hellman
- Elliptic Curve Diffie-Hellman Ephemeral
- Elliptic Curve Digital Signature Algorithm
- Elliptic Curve Direct Anonymous Attestation
- eSignature
- ETU
- Extended Access Control
- FAP
- Fast IDentity Online
- Fast ID Online
- Federal Identity, Credential, and Access Management
- FICAM
- FIDO
- Fingerprint Acquisition Profile
- First Responder Authentication Credential
- FRAC
- GDPR
- General Data Protection Regulation
- Globally Unique Identifier
- GUID
- Hardware Security Module
- Healthcare Information and Management Systems Society
- Health Information Technology for Economic and Clinical Health
- Health Insurance Portability and Accountability
- Health Insurance Portability and Accountability Act
- HIMSS
- HIPAA
- HITECH
- Homeland Security Presidential Directive 12
- Homeland Security Presidential Directive-12
- HSM
- HSPD-12
- Hybrid Card
- I²C
- IAM
- ICAM
- Identity and Access Management
- Identity, Credential, and Access Management
- Ingress Protection
- Ingress Protection Code
- International Protection Code
- Interpreter
- IP
- IP53
- IP54
- IP55
- IP56
- IP57
- IP58
- IP59
- IP60
- IP61
- IP62
- IP63
- IP64
- IP66
- IP67
- IP68
- Java
- Java Card
- Java Card Forum
- Java development kit
- JCF
- JDK
- Key Management
- Key Management System
- KMS
- Korean SEED
- LFDBH
- Load File Data Block Hash
- Logical Access
- MAC
- Match-in-Sensor
- Match-off-Card
- Match-On-Card
- MD5
- Message Authentication Code
- Message-Digest Algorithm
- MexE
- MFA
- MIFARE
- Minidriver
- Mobile Station Execution Environment
- MOC
- Multi-Factor Authentication
- Mutual Authentication
- NDEF
- Near-Field Communication
- Near-Field Communication tag
- .NET
- .NET Card
- NFC
- NFC Data Exchange Format
- NFC Tag
- NFIQ
- NGI
- NIST Fingerprint Image Quality
- OATH
- OBIM
- Object-oriented programming
- OCF
- Office of Biometric Identity Management
- One-Time Password
- Open Authentication
- Open Card Framework
- OpenSCDP
- Open Smart Card Development Platform
- Open Smart Card Operating System
- Open Standard for Public Transportation
- Open Supervised Device Protocol
- OSDP
- OSPT
- OTP
- PACE
- PACS
- PACS
- Password Authenticated Connection Establishment
- PC/SC
- PC/SC Lite
- Personal Computer / Smart Card
- Personal Identity Verification
- Personal Information Protection and Electronic Documents Act
- Personally Identifiable Information
- Physical Access
- Physical Access Control
- Physical Access Control System
- Physical Unclonable Function
- PII
- PIPEDA
- PIV
- PKCS#11
- PKCS#15
- PKI
- PSAM
- Public Key Infrastructure
- PUF
- Purchase Secure Access Module
- Relying Party
- Root of Trust
- RoT
- Round-Trip Engineering
- RP
- RSA
- RTE
- SAM
- SAML
- SCP
- SCP03
- SDK
- Secure Channel Protocol
- Security Assertion Markup Language
- SEED
- Self-Sovereign Identity
- SIM
- SIM Card
- Simple Power Analysis
- Single Sign-On
- Single Wire Protocol
- SKI
- Smart Card
- smartcard
- Smart Card Reader
- smartcards
- SoC
- Software Development Kit
- SPA
- SSI
- SSO
- Subscriber Identity Module
- SWP
- Symmetric-Key Infrastructure
- System on Chip
- U2F
- UID
- Unique IDentifier
- Universal 2nd Factor
- Universally Unique Identifier
- USIM
- USIM
- UUID
- Virtual Machine
- VM
- Wiegand
- X.509