Export (0) Print
Expand All

1.1 Glossary

The following terms are defined in [MS-GLOS]:

Dynamic Host Configuration Protocol (DHCP)
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
local area network (LAN)
network byte order
private key
public key
session key
state machine
trusted platform module (TPM)
User Datagram Protocol (UDP)

The following terms are specific to this document:

allowed list: An optional list of IPv4 and/or IPv6 subnets, in CIDR notation, from which clients are permitted to be unlocked. If the list is empty or not implemented for an IP protocol version, all addresses are considered allowed for that IP protocol version.

classless inter-domain routing (CIDR): An alternate method for allocating IP addresses and routing IP packets, known as supernetting, that organizes IP addresses into subnetworks that are independent of the address values. It enables multiple subnets to be grouped together for network routing to reduce the growth of Internet routing tables and preserve available IPv4 addresses.

client key: A cryptographic key that is generated by the client and used, either directly or indirectly, to encrypt a full volume encryption key.

full volume encryption: The process of encrypting an entire volume, similar to the way BitLocker encrypts a volume.

full volume encryption key: The symmetric key used in full volume encryption to encrypt volume data on a protected volume.

key protector: A structure containing a cryptographic key in protected form.

thumbprint: A hash value computed over a datum.

MAY, SHOULD, MUST, SHOULD NOT, MUST NOT: These terms (in all caps) are used as described in [RFC2119]. All statements of optional behavior use either MAY, SHOULD, or SHOULD NOT.

© 2015 Microsoft