6.1 KiB
SMOA Terminology Glossary
Version: 1.0
Last Updated: 2024
Status: Active
Purpose
This glossary defines standard terms, acronyms, and abbreviations used throughout SMOA documentation to ensure consistent terminology.
Application Terms
SMOA
Secure Mobile Operations Application - The Android-based application for secure mobile operations on foldable devices.
Module
A self-contained functional component of SMOA. Modules are organized into:
- Core Modules: Foundational modules (auth, security, common, etc.)
- Feature Modules: Functional modules (credentials, orders, evidence, etc.)
Authentication and Security Terms
MFA
Multi-Factor Authentication - Authentication requiring multiple factors (knowledge, possession, inherence).
RBAC
Role-Based Access Control - Access control method based on user roles.
PIN
Personal Identification Number - Numeric access code for authentication.
Biometric
Biological characteristics used for authentication (fingerprint, facial recognition).
Hardware-Backed
Cryptographic operations performed in secure hardware (Trusted Execution Environment).
TEE
Trusted Execution Environment - Secure area of processor for secure operations.
Compliance and Standards Terms
eIDAS
Electronic Identification, Authentication and Trust Services - EU regulation for electronic identification and trust services.
QES
Qualified Electronic Signature - Electronic signature with qualified certificate per eIDAS.
QTSP
Qualified Trust Service Provider - Trust service provider qualified under eIDAS.
AS4
Applicability Statement 4 - OASIS standard for secure web service messaging.
PDF417
Two-dimensional barcode format (ISO/IEC 15438).
AAMVA
American Association of Motor Vehicle Administrators - Organization setting driver license standards.
ICAO
International Civil Aviation Organization - UN agency setting travel document standards.
MIL-STD
Military Standard - U.S. Department of Defense standards.
ISO
International Organization for Standardization - International standards organization.
NIST
National Institute of Standards and Technology - U.S. standards organization.
CJIS
Criminal Justice Information Services - FBI division managing criminal justice information.
NCIC
National Crime Information Center - FBI database for criminal justice information.
III
Interstate Identification Index - FBI database for criminal history information.
ATF
Bureau of Alcohol, Tobacco, Firearms and Explosives - U.S. federal law enforcement agency.
ORI
Originating Agency Identifier - Unique identifier for law enforcement agencies.
UCN
Unique Control Number - Unique identifier for NCIC transactions.
Technical Terms
API
Application Programming Interface - Interface for software components to communicate.
REST
Representational State Transfer - Architectural style for web services.
SOAP
Simple Object Access Protocol - Protocol for exchanging structured information.
XML
eXtensible Markup Language - Markup language for encoding documents.
JSON
JavaScript Object Notation - Data interchange format.
Portable Document Format - Document format.
CSV
Comma-Separated Values - Data format.
TLS
Transport Layer Security - Cryptographic protocol for secure communication.
VPN
Virtual Private Network - Secure network connection.
MDM
Mobile Device Management - Management of mobile devices.
UEM
Unified Endpoint Management - Management of all endpoints.
Data and Database Terms
At Rest
Data stored on disk or storage media.
In Transit
Data being transmitted over a network.
Encryption
Process of encoding data to prevent unauthorized access.
Decryption
Process of decoding encrypted data.
Key Management
Process of managing cryptographic keys.
Certificate
Digital certificate for authentication and encryption.
OCSP
Online Certificate Status Protocol - Protocol for checking certificate revocation.
CRL
Certificate Revocation List - List of revoked certificates.
Operational Terms
Online
Connected to network with full functionality.
Offline
Disconnected from network with limited functionality.
Degraded
Partially connected with reduced functionality.
Fold State
Physical state of foldable device (folded/unfolded).
Session
User's active interaction period with application.
Lockout
Temporary or permanent access restriction.
Module-Specific Terms
Credential
Digital representation of identity or authorization document.
Order
Digital authorization or directive (search warrant, arrest warrant, etc.).
Evidence
Physical or digital evidence in legal or investigative context.
Chain of Custody
Documented history of evidence handling.
Report
Formatted output document (PDF, XML, JSON, CSV).
Status Indicators
✅ Complete
Fully implemented and functional.
⚠️ Partial
Partially implemented with gaps.
❌ Non-Compliant / Not Started
Not implemented or major gaps.
🔄 In Progress
Currently being implemented.
N/A
Not applicable.
Priority Levels
P1
Priority 1 - Critical, blocking operational use.
P2
Priority 2 - High priority, enhances operational capability.
P3
Priority 3 - Medium priority, future enhancement.
Document Status
Draft
Initial version, not yet reviewed.
In Review
Under review by subject matter experts.
Approved
Reviewed and approved for publication.
Published
Available to target audience.
Archived
Retired or superseded version.
Additions and Updates
This glossary should be updated as new terms are introduced. When adding terms:
- Add term in alphabetical order
- Provide full form for acronyms
- Provide clear definition
- Include context if helpful
- Update version number and date
Document Owner: Documentation Lead
Last Updated: 2024
Next Review: Quarterly