| Asymmetric Encryption | Also known as public-key cryptography. A public key is used to encrypt data while a pivate key is used to decrypt data. |
| Entitlement | An entitlement is a right to use, access, or consume a resource. |
| Keypairs | Keypairs are a part of asymmetric cryptography. They consist of a public and private key which are different, but mathematically related. |
| License | The entitlements, validity date range, and metadata used to determine how a resource can be used. This is typically a JWT file. |
| License Key | The authorization key used to verify the authenticity of the license. This key verifies the signature of the license. This is typically an encrypted public key. |
| Owner Key | This authentication key uniquely verifies the license holder's ownership of the license key. This is typically private key. |