# SMOA Terminology Glossary **Version:** 1.0 **Last Updated:** 2024 **Status:** Active --- ## Purpose This glossary defines standard terms, acronyms, and abbreviations used throughout SMOA documentation to ensure consistent terminology. --- ## Application Terms ### SMOA **Secure Mobile Operations Application** - The Android-based application for secure mobile operations on foldable devices. ### Module A self-contained functional component of SMOA. Modules are organized into: - **Core Modules:** Foundational modules (auth, security, common, etc.) - **Feature Modules:** Functional modules (credentials, orders, evidence, etc.) --- ## Authentication and Security Terms ### MFA **Multi-Factor Authentication** - Authentication requiring multiple factors (knowledge, possession, inherence). ### RBAC **Role-Based Access Control** - Access control method based on user roles. ### PIN **Personal Identification Number** - Numeric access code for authentication. ### Biometric Biological characteristics used for authentication (fingerprint, facial recognition). ### Hardware-Backed Cryptographic operations performed in secure hardware (Trusted Execution Environment). ### TEE **Trusted Execution Environment** - Secure area of processor for secure operations. --- ## Compliance and Standards Terms ### eIDAS **Electronic Identification, Authentication and Trust Services** - EU regulation for electronic identification and trust services. ### QES **Qualified Electronic Signature** - Electronic signature with qualified certificate per eIDAS. ### QTSP **Qualified Trust Service Provider** - Trust service provider qualified under eIDAS. ### AS4 **Applicability Statement 4** - OASIS standard for secure web service messaging. ### PDF417 Two-dimensional barcode format (ISO/IEC 15438). ### AAMVA **American Association of Motor Vehicle Administrators** - Organization setting driver license standards. ### ICAO **International Civil Aviation Organization** - UN agency setting travel document standards. ### MIL-STD **Military Standard** - U.S. Department of Defense standards. ### ISO **International Organization for Standardization** - International standards organization. ### NIST **National Institute of Standards and Technology** - U.S. standards organization. ### CJIS **Criminal Justice Information Services** - FBI division managing criminal justice information. ### NCIC **National Crime Information Center** - FBI database for criminal justice information. ### III **Interstate Identification Index** - FBI database for criminal history information. ### ATF **Bureau of Alcohol, Tobacco, Firearms and Explosives** - U.S. federal law enforcement agency. ### ORI **Originating Agency Identifier** - Unique identifier for law enforcement agencies. ### UCN **Unique Control Number** - Unique identifier for NCIC transactions. --- ## Technical Terms ### API **Application Programming Interface** - Interface for software components to communicate. ### REST **Representational State Transfer** - Architectural style for web services. ### SOAP **Simple Object Access Protocol** - Protocol for exchanging structured information. ### XML **eXtensible Markup Language** - Markup language for encoding documents. ### JSON **JavaScript Object Notation** - Data interchange format. ### PDF **Portable Document Format** - Document format. ### CSV **Comma-Separated Values** - Data format. ### TLS **Transport Layer Security** - Cryptographic protocol for secure communication. ### VPN **Virtual Private Network** - Secure network connection. ### MDM **Mobile Device Management** - Management of mobile devices. ### UEM **Unified Endpoint Management** - Management of all endpoints. --- ## Data and Database Terms ### At Rest Data stored on disk or storage media. ### In Transit Data being transmitted over a network. ### Encryption Process of encoding data to prevent unauthorized access. ### Decryption Process of decoding encrypted data. ### Key Management Process of managing cryptographic keys. ### Certificate Digital certificate for authentication and encryption. ### OCSP **Online Certificate Status Protocol** - Protocol for checking certificate revocation. ### CRL **Certificate Revocation List** - List of revoked certificates. --- ## Operational Terms ### Online Connected to network with full functionality. ### Offline Disconnected from network with limited functionality. ### Degraded Partially connected with reduced functionality. ### Fold State Physical state of foldable device (folded/unfolded). ### Session User's active interaction period with application. ### Lockout Temporary or permanent access restriction. --- ## Module-Specific Terms ### Credential Digital representation of identity or authorization document. ### Order Digital authorization or directive (search warrant, arrest warrant, etc.). ### Evidence Physical or digital evidence in legal or investigative context. ### Chain of Custody Documented history of evidence handling. ### Report Formatted output document (PDF, XML, JSON, CSV). --- ## Status Indicators ### ✅ Complete Fully implemented and functional. ### ⚠️ Partial Partially implemented with gaps. ### ❌ Non-Compliant / Not Started Not implemented or major gaps. ### 🔄 In Progress Currently being implemented. ### N/A Not applicable. --- ## Priority Levels ### P1 **Priority 1** - Critical, blocking operational use. ### P2 **Priority 2** - High priority, enhances operational capability. ### P3 **Priority 3** - Medium priority, future enhancement. --- ## Document Status ### Draft Initial version, not yet reviewed. ### In Review Under review by subject matter experts. ### Approved Reviewed and approved for publication. ### Published Available to target audience. ### Archived Retired or superseded version. --- ## Additions and Updates This glossary should be updated as new terms are introduced. When adding terms: 1. Add term in alphabetical order 2. Provide full form for acronyms 3. Provide clear definition 4. Include context if helpful 5. Update version number and date --- **Document Owner:** Documentation Lead **Last Updated:** 2024 **Next Review:** Quarterly