• Security Identifier (SID) is a unique, immutable identifier of a user account, user group, or other security principal in the Windows NT family of operating...
    20 KB (1,475 words) - 06:47, 24 March 2025
  • Thumbnail for Identifier
    identification (the process of identifying), or an identifier (that is, an instance of identification). An identifier may be a word, number, letter, symbol...
    13 KB (1,218 words) - 09:15, 22 March 2025
  • Financial Instrument Global Identifier (FIGI) (formerly Bloomberg Global Identifier (BBGID)) is an open standard, unique identifier of financial instruments...
    17 KB (1,754 words) - 21:26, 18 April 2025
  • A National Securities Identifying Number, or NSIN, is a generic nine-digit alphanumeric code which identifies a fungible security. The NSIN is issued by...
    2 KB (201 words) - 18:45, 14 February 2025
  • operating systems identify a user by a value called a user identifier, often abbreviated to user ID or UID. The UID, along with the group identifier (GID) and...
    11 KB (1,477 words) - 12:42, 16 May 2025
  • Universally Unique Identifier (UUID) is a 128-bit label used to uniquely identify objects in computer systems. The term Globally Unique Identifier (GUID) is also...
    38 KB (4,582 words) - 17:57, 1 May 2025
  • relative identifier (RID) is a variable length number that is assigned to objects at creation and becomes part of the object's Security Identifier (SID)...
    955 bytes (106 words) - 01:29, 22 May 2020
  • global securities identifier. Trading, clearing and settlement systems in many countries adopted ISINs as a secondary measure of identifying securities. Some...
    13 KB (1,764 words) - 00:03, 30 March 2025
  • In computing, object identifiers or OIDs are an identifier mechanism standardized by the International Telecommunication Union (ITU) and ISO/IEC for naming...
    6 KB (687 words) - 01:51, 19 April 2025
  • The Market Identifier Code (MIC) (ISO 10383) is a unique identification code used to identify securities trading exchanges, regulated and non-regulated...
    4 KB (422 words) - 14:15, 10 July 2024
  • Thumbnail for Decentralized identifier
    A decentralized identifier (DID) is a type of globally unique identifier that enables an entity to be identified in a manner that is verifiable, persistent...
    8 KB (713 words) - 06:04, 9 May 2025
  • identifiers are fungible, which means that a unique CUSIP identifier for each individual security stays the same, regardless of the exchange where the shares...
    14 KB (1,651 words) - 13:49, 7 May 2025
  • Thumbnail for Digital object identifier
    A digital object identifier (DOI) is a persistent identifier or handle used to uniquely identify various objects, standardized by the International Organization...
    36 KB (4,134 words) - 08:25, 14 May 2025
  • the network. A principal typically has an associated identifier (such as a security identifier) that allows it to be referenced for identification or...
    2 KB (177 words) - 10:17, 25 December 2024
  • thread identifiers are all multiples of 4, but it is not part of the specification. User identifier (UID) Group identifier (GID) Thread identifier (TID)...
    7 KB (756 words) - 02:24, 29 April 2025
  • Thumbnail for Computer security
    security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security....
    220 KB (22,338 words) - 18:54, 19 May 2025
  • Central Index Key (category Security identifier types)
    ISO 6166 (International Securities Identification Number - ISIN) Legal Entity Identifier Ticker symbol Unique Entity Identifier "Understand and utilize...
    2 KB (133 words) - 19:35, 7 February 2025
  • whether it is a direct identifier that is uniquely associated with a person or a quasi-identifier that is not unique. A quasi-identifier cannot pin down an...
    3 KB (231 words) - 23:07, 11 March 2025
  • Thumbnail for Ticker symbol
    Ticker symbol (category Security identifier types)
    trade in this case, and another identifier, typically the three- or four-letter exchange code (such as the Market Identifier Code), will have to be specified...
    22 KB (2,203 words) - 14:11, 14 May 2025
  • Sicovam code (category Security identifier types)
    The Sicovam code or simply "Sicovam" was a security identifier system used to identify French securities listed on French stock exchanges. Sicovam stands...
    1 KB (142 words) - 19:28, 14 February 2025
  • Option symbol (category Security identifier types)
    The OCC option symbol can be mapped to other identifiers, such as a Financial Instrument Global Identifier (FIGI). Mini-options contracts trade under a...
    5 KB (612 words) - 23:08, 15 April 2025
  • Thumbnail for Social Security number
    of using the Social Security number as an identifier is the fact that the Social Security card contains no biometric identifiers of any sort, making it...
    38 KB (4,140 words) - 23:27, 16 April 2025
  • Valoren number (category Security identifier types)
    Liechtenstein the VALOR number is the main identifier in the Swiss Value Chain and is used as the main identifier by financial institutions throughout the...
    3 KB (298 words) - 08:33, 23 December 2024
  • Session fixation (category Web security exploits)
    http://unsafe.example.com/ accepts any session identifier, accepts session identifiers from query strings and has no security validation. http://unsafe.example.com/...
    18 KB (2,566 words) - 07:45, 1 February 2025
  • The Legal Entity Identifier (LEI) is a unique global identifier for legal entities participating in financial transactions. Also known as an LEI code or...
    11 KB (964 words) - 13:44, 9 October 2024
  • Protocol Artifact Resolution Protocol Name Identifier Management Protocol Single Logout Protocol Name Identifier Mapping Protocol Most of these protocols...
    25 KB (3,230 words) - 18:06, 19 April 2025
  • to run in the context of the SYSTEM account. Sysprep changes the security identifier (SID) to avoid duplication but does not update scheduled tasks to...
    21 KB (2,270 words) - 03:28, 6 March 2024
  • Thumbnail for Login
    In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system or...
    7 KB (801 words) - 01:59, 24 April 2025
  • EUICC (redirect from EUICC identifier)
    define EID as "eUICC Identifier". Some developers / implementers have referred to this using the descriptive term "eSIM identifier", which summarizes the...
    5 KB (440 words) - 14:06, 2 August 2024
  • RADIUS (section Security)
    code, the identifier, the length, the authenticator and the attributes. Assigned RADIUS Codes (decimal) include the following: The Identifier field aids...
    33 KB (2,792 words) - 14:22, 16 September 2024