IPTV Industry Dictionary is a free tool to get technical definitions and lookup industry terms from more than 11,000 terms, acronyms, and definitions. |
Dictionaries: |
Telecom | CATV | eMarketing | Optical | IPTV | VOIP | Conatct Us |
|
DRM Secure Socket Layer - SSLA secure socket layer (SSL) is a security protocol that is used to protect/encrypt information that is sent between end user (client) and a server so that eavesdroppers (such as sniffers on a router) cannot understand (cannot decode) the data. SSL version 2 provides security by allowing applications to encrypt data that goes from a client, such as a Web browser, to a matching server (encrypting your data means converting it to a secret code). SSL version 3 allows the server to authenticate (validate the authenticity) the client. SSL uses a public asymmetric encryption process that uses a key pair. One key is private and one key is public. The owner of the key pair only uses the private key and the public key can be shared with others. The SSL process uses certificates from trusted third parties (certificate authorities) that validate the authenticity of messages and users. Because the asymmetric encryption process used by the SSL system is relatively complex and time consuming to process, the SSL system may change its encryption process to use symmetric encryption after the initial asymmetric public key secure link has been setup. Figure 1.19 shows how secure socket layer can be used to protect the transfer of digital information between the user (client) and the provider (server) of the information. This diagram shows that SSL operation uses asymmetric public key encryption to allow the sharing of public keys and that a certificate authority is used as a trusted third party to provide public keys that are accessible and verifiable. In this example, the CA has provides a key pair (public and private key) to a vendor. The server (vendor) provides their public key in their certificate, which allows the user to decode encrypted messages that are provided by the vendor. The vendor certificate is signed by the CA, which can be verified by the user. This example shows that after SSL public key encryption link is established, the SSL system can exchange keys that can be used for a less complex symmetrical encryption process.
Types of Intellectual Property Rights Diagram
Digital Rights Management - DRM Books
Add this IPTV Dictionary tool to your web siteIn order to add this IPTV Dictionary tool to your web site and give your visitors the way to lookup industry terms from more than 19,000 terms, acronyms, and definitions, just copy the HTML code below and put it into your web page where you want to provide access to your dictionary. |
Other
Dictionaries:
Wireless Dictionary
|
Optical Dictionary
|
Billing Dictionary
|
Telecom Dictionary
|
CATV Dictionary |
Related Websites: Althos - Althos Books - Telecom Books - Telecom Dictionary |
Copyright © 2009 All rights reserved |
Disclaimer: IPTV Dictionary Tool is the trademarks of Althos. Althos is not affiliated with any other website and provides the information in this dictionary from content created by our expert writers. Althos provides our services on "as is" and "as available" basis and we do not provide any guarantees regarding this service's accuracy and/or availability. |