Glossary

A2DP
Advanced Audio Distribution Profile
ACL
An access control list (ACL) is a list of permissions that are associated with an object, such as a file, directory, or other network resource. It specifies which users or components have permission to perform specific operations on an object.
AES
Advanced Encryption Standard
AES-CCMP
Advanced Encryption Standard Counter Mode CBCMAC Protocol
AJAX
Asynchronous JavaScript and XML
APB
all points bulletin
API
application programming interface
APN
access point name
ASCII
American Standard Code for Information Interchange
AVRCP
Audio/Video Remote Control Profile
BCC
blind carbon copy
BlackBerry device key
The BlackBerry device key is a randomly generated key that a BlackBerry device uses to encrypt data on media cards.
BlackBerry device key store
The BlackBerry device key store stores certificates, key pairs, and PGP keys that a BlackBerry device can use to help protect messages, access web sites, and connect to an enterprise Wi-Fi network. To access the items in the key store, the user must type a key store password.
BlackBerry device memory
The BlackBerry device memory consists of the NV store, flash memory, RAM, on-board device memory, and BlackBerry device key store.
BlackBerry Domain
A BlackBerry Domain consists of the BlackBerry Configuration Database with its users and any BlackBerry Enterprise Server instances that connect to it.
BlackBerry inter-process protocol
The BlackBerry inter-process protocol is a Research In Motion proprietary protocol that generates the session key that BlackBerry Enterprise Solution components such as the BlackBerry Enterprise Server and BlackBerry Mobile Voice System can use to communicate in a highly securely manner with each other. The BlackBerry inter-process protocol generates the session key based on the communication password.
BlackBerry MDS
BlackBerry Mobile Data System
BlackBerry MVS
BlackBerry Mobile Voice System
BlackBerry transport layer encryption
BlackBerry transport layer encryption (formerly known as standard BlackBerry encryption) uses a symmetric key encryption algorithm to help protect data that is in transit between a BlackBerry device and the BlackBerry® Enterprise Server when the data is outside an organization's firewall.
BSM
browser session manager
CAST
Computer Assisted Seriation Test
CBC
cipher block chaining
CDMA
Code Division Multiple Access
CDO
Collaboration Data Object
CHAP
Challenge Handshake Authentication Protocol
CLDC
Connected Limited Device Configuration
CMIME
Compressed Multipurpose Internet Mail Extension
COM
Component Object Model
communication password
The communication password is a password that BlackBerry Enterprise Solution components use for the BlackBerry inter-process protocol. The communication password is designed to prevent a potentially malicious user from viewing the data that the components send to each other.
content protection
Content protection helps protect user data on a locked BlackBerry device by encrypting the user data using the content protection key and ECC private key.
content protection key
The content protection key encrypts user data on a BlackBerry device when the device is locked.
CRL
certificate revocation list
DES
Data Encryption Standard
device transport key
The device transport key (formerly known as the master encryption key) is unique to a BlackBerry device. The BlackBerry device and BlackBerry Enterprise Server use the device transport key to encrypt the message keys.
DHCP
Dynamic Host Configuration Protocol
DMZ
A demilitarized zone (DMZ) is a neutral subnetwork outside of an organization's firewall. It exists between the trusted LAN of the organization and the untrusted external wireless network and public Internet.
DNS
A Domain Name System (DNS) is an Internet database that translates domain names that are meaningful and recognizable by people into the numeric IP addresses that the Internet uses.
DOM
Document Object Model
DSA
Digital Signature Algorithm
DSML
Directory Service Markup Language
DSML-enabled server
A BlackBerry device uses a DSML-enabled server to search for and download certificates.
DTMF
Dual Tone Multi-Frequency
DUN
Dial-up Networking
EAP
Extensible Authentication Protocol
EAP-FAST
Extensible Authentication Protocol Flexible Authentication via Secure Tunneling
EAP-GTC
Extensible Authentication Protocol Generic Token Card
EAP-TLS
Extensible Authentication Protocol Transport Layer Security
EAP-TTLS
Extensible Authentication Protocol Tunneled Transport Layer Security
ECC
Elliptic Curve Cryptography
ECC private key
The ECC private key decrypts the data that a BlackBerry device received when the BlackBerry device was locked.
Enterprise Service Policy
The Enterprise Service Policy controls which BlackBerry devices can connect to a BlackBerry Enterprise Server.
FIPS
Federal Information Processing Standards
flash memory
The flash memory is an internal file system on a BlackBerry device that stores application data and user data.
FQDN
fully qualified domain name
GAL
Global Address List
GAN
generic access network
global PIN encryption key
The global PIN encryption key is a key that is added to all BlackBerry devices during the manufacturing process. The global PIN encryption key permits devices to encrypt, decrypt, and authenticate PIN messages that are exchanged between devices.
GPS
Global Positioning System
HFP
Hands-Free Profile
HSP
Headset Profile
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol over Secure Sockets Layer
IBM DB2 UDB
IBM DB2 Universal Database
IKE
Internet Key Exchange
IMEI
International Mobile Equipment Identity
IOT
interoperability test
IP address
An Internet Protocol (IP) address is an identification number that each computer or mobile device uses when it sends or receives information over a network, such as the Internet. This identification number identifies the specific computer or mobile device on the network.
IPPP
Internet Protocol Proxy Protocol
IPsec
Internet Protocol Security
IT administration command
An IT administration command is a command that you can send over the wireless network to protect sensitive information on a BlackBerry device or delete all BlackBerry device data.
IT policy
An IT policy consists of various IT policy rules that control the security features and behavior of BlackBerry smartphones, BlackBerry PlayBook tablets, the BlackBerry Desktop Software, and the BlackBerry Web Desktop Manager.
IT policy rule
An IT policy rule permits you to customize and control the actions that BlackBerry smartphones, BlackBerry PlayBook tablets, the BlackBerry Desktop Software, and the BlackBerry Web Desktop Manager can perform.
Java ME
Java Platform, Micro Edition
JRE
Java Runtime Environment
JVM
Java® Virtual Machine
LAN
local area network
LDAP
Lightweight Directory Access Protocol
LEAP
Lightweight Extensible Authentication Protocol
LED
light-emitting diode
LMM
The Low Memory Manager (LMM) is an application on the BlackBerry device that deletes medium-priority items, such as old email messages and out-of-date calendar entries, when the amount of available flash memory on the BlackBerry device is less than 400 KB.
LTPA
Lightweight Third-Party Authentication
MAC
message authentication code
MAP
Message Access Profile
MAPI
Messaging Application Programming Interface
MCC
mobile country code
MDS
Mobile Data System
messaging server
A messaging server sends and processes messages and provides collaboration services, such as updating and communicating calendar and address book information.
MFH
message from handheld
MIDP
Mobile Information Device Profile
MIME
Multipurpose Internet Mail Extensions
mirror database
In database mirroring, a mirror database is a standby copy of a principal database.
MMS
Multimedia Messaging Service
MNC
mobile network code
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol
MSDE
Microsoft SQL Server Desktop Engine
MTH
message to handheld
NAT
network address translation
NSPI
Name Service Provider Interface
NTLM
NT LAN Manager
NV store
The NV store is a nonvolatile store that persists in application storage on a BlackBerry device. Only the operating system of the BlackBerry device can write to it. Third-party applications cannot write to the NV store.
OBEX
Object Exchange
OCSP
Online Certificate Status Protocol
PAC
proxy auto-configuration
PAP
Push Access Protocol
PBX
Private Branch Exchange
PEAP
Protected Extensible Authentication Protocol
PFS
Perfect Forward Secrecy
PIM
personal information management
PIN
personal identification number
PKCS
Public-Key Cryptography Standards
PKI
Public Key Infrastructure
principal database
In database mirroring, a principal database is the database that starts the mirroring session.
PSK
pre-shared key
RNG
random number generator
RPC
remote procedure call
RTF
Rich Text Format
RTP
Real-time Transport Protocol
SAN
subject alternative name
SHA
Secure Hash Algorithm
SIM
Subscriber Identity Module
SIP
Session Initiation Protocol
S/MIME
Secure Multipurpose Internet Mail Extensions
SMS
Short Message Service
SMTP
SNMP
Simple Network Management Protocol
SPP
Serial Port Profile
SQL
Structured Query Language
SRP
Server Routing Protocol
SRP authentication
SRP authentication is an authentication method that the BlackBerry Enterprise Server and BlackBerry Infrastructure use to authenticate with each other.
SRP authentication key
The SRP authentication key is a 20-byte shared encryption key that the BlackBerry Enterprise Server and BlackBerry Infrastructure use to authenticate with each other during SRP authentication.
SRP ID
The SRP ID is a unique identifier for the BlackBerry Enterprise Server that the BlackBerry Enterprise Server uses to identify itself to the BlackBerry Infrastructure during SRP authentication.
SSID
service set identifier
SSL
Secure Sockets Layer
TCP
Transmission Control Protocol
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of communication protocols that is used to transmit data over networks, such as the Internet.
TKIP
Temporal Key Integrity Protocol
TLS
Transport Layer Security
Triple DES
Triple Data Encryption Standard
TUI
telephone UI
UCS
Universal Content Stream
UDP
User Datagram Protocol
UID
unique identifier
UMA
Unlicensed Mobile Access
UNC
Universal Naming Convention
USB
Universal Serial Bus
UTF
UCS Transformation Format
UTF-8
8-bit UCS/Unicode Transformation Format
VoIP
Voice over Internet Protocol
VPN
virtual private network
WAN
wide area network
WAP
Wireless Application Protocol
WEP
Wired Equivalent Privacy
witness
In database mirroring, a witness is a Microsoft SQL Server instance that permits the mirror database to know when to promote itself.
WLAN
wireless local area network
WTLS
Wireless Transport Layer Security
XML
Extensible Markup Language