Wireless MAXg USB Adapter: User Guide
TTLS
Tunneled Transport Layer Security
These settings
define the protocol and the credentials used to
authenticate a user. In TTLS, the client uses EAP-TLS to
validate the server and create a TLS-encrypted channel
between the client and server. The client can use
another authentication protocol (typically password-
based protocols, such as MD5 Challenge) over this
encrypted channel to enable server validation. The
challenge and response packets are sent over a
nonexposed TLS encrypted channel.
TPM
Trusted Platform Module
A security hardware device
on the system board that holds computer-generated
keys for encryption. It is a hardware based solution that
can help avoid attacks by hackers looking to capture
passwords and encryption keys to sensitive data.
The security features provided by the TPM are internally
supported by the following cryptographic capabilities of
each TPM: hashing, random number generation,
asymmetric key generation, and asymmetric encryption/
decryption. Each individual TPM on each individual
computer system has a unique signature initialized
during the silicon manufacturing process that further
enhances its trust/security effectiveness. Each
individual TPM must have an owner before it is useful as
a security device.
U
UAPSD
Unscheduled Automatic Power Save Delivery
An
networks.
W
file:///G|/CSO/T-Writer%20Repository/Networking/5425...g%20Refresh%20USB/User%20Guide/English/glossary.html (14 of 16)6/26/2007 9:29:38 AM