background image

Glossary

 

This

 

glossary

 

includes

 

some

 

terms

 

and

 

definitions

 

from

 

the

 

IBM

 

Dictionary

 

of

 

Computing

,

 

New

 

York:

 

McGraw

 

Hill,

 

1994.

 

This

 

glossary

 

also

 

includes

 

some

 

terms

 

and

 

definitions

 

from:

 

v

   

The

 

American

 

National

 

Standard

 

Dictionary

 

for

 

Information

 

Systems

,

 

ANSI

 

X3.172-1990,

 

copyright

 

1990

 

by

 

the

 

American

 

National

 

Standards

 

Institute

 

(ANSI).

 

Copies

 

may

 

be

 

purchased

 

from

 

the

 

American

 

National

 

Standards

 

Institute,

 

11

 

West

 

42

 

Street,

 

New

 

York,

 

New

 

York

 

10036.

 

Definitions

 

are

 

identified

 

by

 

the

 

symbol

 

(A)

 

following

 

the

 

definition.

 

v

   

The

 

Information

 

Technology

 

Vocabulary

,

 

developed

 

by

 

Subcommittee

 

1,

 

Joint

 

Technical

 

Committee

 

1,

 

of

 

the

 

International

 

Organization

 

for

 

Standardization

 

and

 

the

 

International

 

Electrotechnical

 

Commission

 

(ISO/IEC

 

JTC1/SC1).

 

Definitions

 

of

 

published

 

parts

 

of

 

this

 

vocabulary

 

are

 

identified

 

by

 

the

 

symbol

 

(I)

 

following

 

the

 

definition;

 

definitions

 

taken

 

from

 

draft

 

international

 

standards,

 

committee

 

drafts,

 

and

 

working

 

papers

 

being

 

developed

 

by

 

ISO/IEC

 

JTC1/SC1

 

are

 

identified

 

by

 

the

 

symbol

 

(T)

 

after

 

the

 

definition,

 

indicating

 

that

 

final

 

agreement

 

has

 

not

 

yet

 

been

 

reached

 

among

 

the

 

participating

 

National

 

Bodies

 

of

 

SC1.

A

 

American

 

National

 

Standard

 

Code

 

for

 

Information

 

Interchange

 

(ASCII).

  

The

 

standard

 

code,

 

using

 

a

 

coded

 

character

 

set

 

consisting

 

of

 

7-bit

 

characters

 

(8

 

bits

 

including

 

parity

 

check),

 

that

 

is

 

used

 

for

 

information

 

interchange

 

among

 

data

 

processing

 

systems,

 

data

 

communication

 

systems,

 

and

 

associated

 

equipment.

 

The

 

ASCII

 

set

 

consists

 

of

 

control

 

characters

 

and

 

graphic

 

characters.

 

(A)

 

American

 

National

 

Standards

 

Institute

 

(ANSI).

  

An

 

organization

 

consisting

 

of

 

producers,

 

consumers,

 

and

 

general

 

interest

 

groups

 

that

 

establishes

 

the

 

procedures

 

by

 

which

 

accredited

 

organizations

 

create

 

and

 

maintain

 

voluntary

 

industry

 

standards

 

in

 

the

 

United

 

States.

 

(A)

 

B

 

bus.

  

In

 

a

 

processor,

 

a

 

physical

 

facility

 

along

 

which

 

data

 

is

 

transferred.

 

C

 

card.

  

An

 

electronic

 

circuit

 

board

 

that

 

is

 

plugged

 

into

 

a

 

slot

 

in

 

a

 

system

 

unit.

 

A

 

plug-in

 

circuit

 

assembly.

 

coprocessor.

  

A

 

supplementary

 

processor

 

that

 

performs

 

operations

 

in

 

conjunction

 

with

 

another

 

processor.

 

A

 

microprocessor

 

on

 

an

 

expansion

 

card

 

that

 

extends

 

the

 

address

 

range

 

of

 

the

 

processor

 

in

 

the

 

host

 

system

 

or

 

adds

 

specialized

 

instructions

 

to

 

handle

 

a

 

particular

 

category

 

of

 

operations;

 

for

 

example,

 

an

 

I/O

 

coprocessor,

 

math

 

coprocessor,

 

or

 

networking

 

coprocessor.

 

cryptography.

  

The

 

transformation

 

of

 

data

 

to

 

conceal

 

its

 

meaning.

 

In

 

computer

 

security,

 

the

 

principles,

 

means

 

and

 

methods

 

used

 

to

 

so

 

transform

 

data.

 

D

 

Data

 

Encryption

 

Standard

 

(DES).

  

In

 

computer

 

security,

 

the

 

National

 

Institute

 

of

 

Standards

 

and

 

Technology

 

(NIST)

 

Data

 

Encryption

 

Standard,

 

adopted

 

by

 

the

 

U.S.

 

government

 

as

 

Federal

 

Information

 

Processing

 

Standard

 

(FIPS)

 

Publication

 

46,

 

which

 

allows

 

only

 

hardware

 

implementations

 

of

 

the

 

data-encryption

 

algorithm.

 

driver.

  

A

 

program

 

that

 

contains

 

the

 

code

 

needed

 

to

 

attach

 

and

 

use

 

a

 

device.

 

E

 

electrostatic

 

discharge

 

(ESD).

  

An

 

undesirable

 

discharge

 

of

 

static

 

electricity

 

that

 

can

 

damage

 

equipment

 

and

 

degrade

 

electrical

 

circuitry.

 

erasable

 

programmable

 

read-only

 

memory

 

(EPROM).

  

A

 

PROM

 

that

 

can

 

be

 

erased

 

by

 

a

 

special

 

process

 

and

 

then

 

reused.

 

(T)

 

expansion

 

card.

  

A

 

circuit

 

board

 

that

 

a

 

user

 

can

 

install

 

in

 

an

 

expansion

 

slot

 

to

 

add

 

memory

 

or

 

special

 

features

 

to

 

a

 

computer.

 

Synonym

 

for

 

card

.

 

expansion

 

slot.

  

One

 

of

 

several

 

receptacles

 

in

 

a

 

personal

 

computer

 

or

 

RS/6000

®

 

machine

 

into

 

which

 

a

 

user

 

can

 

install

 

an

 

expansion

 

card.

 

F

 

feature.

  

Part

 

of

 

an

 

IBM

 

product

 

able

 

to

 

be

 

ordered

 

separately.

 

Federal

 

Communications

 

Commission

 

(FCC).

  

A

 

board

 

of

 

commissioners,

 

appointed

 

by

 

the

 

President

 

under

 

the

 

Communications

 

Act

 

of

 

1934,

 

having

 

the

 

power

 

to

 

regulate

 

all

 

interstate

 

and

 

foreign

 

communications

 

in

 

the

 

United

 

States

 

that

 

are

 

transmitted

 

by

 

wire

 

or

 

radio.

 

 

  

15

Содержание 4764

Страница 1: ...4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 2: ...ocards Readers comments can be communicated to IBM by using the support link on the product Web site at http www ibm com security cryptocards or by sending a letter to IBM Corporation Department VM9A...

Страница 3: ...siderations for handling and storage 1 Temperature 1 Batteries 1 Requirements and specifications 2 Hardware requirement 2 Software requirement 2 Power requirement 2 Environmental specifications 2 Phys...

Страница 4: ...iv 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 5: ...s 1 Jumpers on the PCI X cryptographic coprocessor front side 4 2 Jumpers on the PCI X cryptographic coprocessor back side 5 3 J10 connector and battery locations on the PCI X cryptographic coprocesso...

Страница 6: ...vi 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 7: ...Tables 1 Operating storage and shipping specifications 2 2 Jumpers on the PCI X cryptographic coprocessor 5 vii...

Страница 8: ...viii 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 9: ...tlet Ensure outlet supplies proper voltage and phase rotation according to the system rating plate v Connect any equipment that will be attached to this product to properly wired outlets v When possib...

Страница 10: ...n you call C002 World trade safety information Several countries require the safety information contained in product publications to be presented in their national languages If this requirement applie...

Страница 11: ...eb de IBM http www ibm com ibm environment products index shtml Notice This mark applies only to countries within the European Union EU and Norway Appliances are labeled in accordance with European Di...

Страница 12: ...y packs from IBM Equipment For information on proper disposal of these batteries contact IBM at 1 800 426 4333 Please have the IBM part number listed on the battery available prior to your call In Tai...

Страница 13: ...mers for the return recycling and treatment of batteries and accumulators Customer participation is important to minimize any potential effects of batteries and accumulators on the environment and hum...

Страница 14: ...xiv 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 15: ...cedure to physically install the PCI X cryptographic coprocessor v Chapter 3 Replacing IBM PCI X cryptographic coprocessor batteries describes the way to replace the batteries on the PCI X cryptograph...

Страница 16: ...xvi 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 17: ...8 6849 v Statement of Limited Warranty GC28 6850 v License Agreement for Machine Code GC28 6851 If any item is missing or damaged contact your local IBM representative or your IBM Business Partner Spe...

Страница 18: ...atest software features available visit the product Web site at http www ibm com security cryptocards Power requirement The power requirement for the IBM 4764 001 PCI X Cryptographic Coprocessor is v...

Страница 19: ...disconnect signal cables v Never turn on any equipment when there is evidence of fire water or structural damage v Disconnect the attached power cords telecommunications systems networks and modems b...

Страница 20: ...here for at least two seconds v Handle the card by its edges only Do not touch exposed circuitry and components 7 Remove the PCI X cryptographic coprocessor from its static protective bag 8 Verify tha...

Страница 21: ...ns are connected 9 Insert the coprocessor into the slot be sure the card is fully seated 10 If you removed a cover from the expansion slots replace it 11 Replace the host computer s cover 12 Reconnect...

Страница 22: ...6 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 23: ...IBM 4764 PCI X Cryptographic Coprocessor Feature 1008 provides the battery tray needed to provide backup power while you replace the batteries To order the kit contact your local IBM representative or...

Страница 24: ...all cables from devices To Connect a Turn everything OFF unless instructed otherwise b Attach all cables to devices c Attach signal cables to connectors d Attach power cords to outlet e Turn device ON...

Страница 25: ...ides power to the PCI X cryptographic coprocessor while you perform this step 11 Remove the battery holder from the J10 connector 12 Reapply the spare battery attention labels onto the holders on the...

Страница 26: ...10 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 27: ...country where such provisions are inconsistent with local law INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATIONS AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESS OR IMPLIED INCLU...

Страница 28: ...cations However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be dete...

Страница 29: ...crites dans la norme sur le mat riel brouiller Appareils num riques NMB 003 dict e par industrie Canada Japanese Voluntary Control Council for Interference VCCI statement This equipment is in the 2nd...

Страница 30: ...14 4764 PCI X Cryptographic Coprocessor Installation Manual...

Страница 31: ...n the United States A B bus In a processor a physical facility along which data is transferred C card An electronic circuit board that is plugged into a slot in a system unit A plug in circuit assembl...

Страница 32: ...ological and economic activity J jumper A wire that joins two unconnected circuits K key In computer security a sequence of symbols used with an algorithm to encipher or decipher data P power on self...

Страница 33: ...onmental specifications 2 power requirement 2 P package contents 1 PCI X cryptographic coprocessor caution notices 3 7 device key certified 1 dimensions 2 environmental specification 2 handling consid...

Страница 34: ...ors coprocessor 1 tamper resistant module 1 temperature coprocessor See also operating environment temperature coprocessor continued shipping 1 storage 1 18 4764 PCI X Cryptographic Coprocessor Instal...

Отзывы: