Please select from the menu above
- Access Control
The process of granting or denying specific requests to: 1) obtain and use information and related to information processing services; and 2) enter specific physical facilities (e.g., Federal buildings, military establishments, and border crossing entrances).
- Access Control Management
The processes and technologies for controlling and monitoring access privileges to resources, consistent with governing policies. Access management includes authentication, authorization, trust, and security auditing.
- Application Execution Environment
Application Execution Environment (AEE) supports data storage and processor capabilities and executes mobile phone services in a relatively secure manner. This fulfills mobile phone functionalities and provides basic phone functionalities and provides the user interface such as voice calling, packet communication, phonebook, browser, mailer, etc.
- Application Programming Interface
A source code interface that a computer system or program library provides in order to support requests for services to be made of it by other computer programs, and/or to allow data to be exchanged
The provision of assurance of the claimed entity or of data origin.
- Authentication Method
The method used for the authentication of an entity or data origin.
A security factor used in an authentication method. Typical examples are tokens, mobile codes and passcodes.
- Automatic Fare Collection Systems
A fare collection system that provides a method of processing electronic fare media through computational devices to account for a ride or access onto a public transportation system. AFC systems were intended to require little or no operator interaction.
A measurable, physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an individual. Facial images, fingerprints, and iris scan samples are all examples of biometrics.
Short-range (10-100m) wireless communication protocol
- Byte Sequence
Concatenation of hexadecimal values
- Card Emulation Mode
Card emulation mode enables NFC devices to act like smart cards, allowing users to perform transactions such as retail purchases and transit access with just a touch. This mode is capable of functioning when the device is powered-off, although it is the service provider’s decision whether to allow this. An example is where an NFC device acts as an NFC tag.
- Card Management System
A smart card/token and digital credential management solution that is used to issue, manage, personalize and support cryptographic smart cards and PKI certificates for identity-based applications throughout an organization.
- Card Reader
Any device that reads encoded information from a card, token, or other identity device and communicates to a host such as a control panel/processor or database for further action.
For NFC-A, a collision is a superposition of a ‘0’ and a ‘1’ as defined in Digital Spec. For NFC-B and NFC-F, a collision is a superposition of multiple Responses, resulting in a Transmission Error.
An instruction from one device to another device in order to move the other device through a state machine.
- Common Criteria
An internationally approved security evaluation framework that provides a clear and reliable evaluation of the security capabilities of IT products, including secure ICs, smart card operating systems, and application software.
- Connection-Oriented Transport
A data transmission service with sequenced and guaranteed delivery of service data units.
- Connectionless Transport
An unacknowledged data transmission service with minimal protocol complexity.
- Contactless Fare Media System Standard
Contactless Fare Media System (CFMS) standard is published by APTA that describes the data format on smart cards used for fare payment, as well as the messages used between an agency central computer and a regional computer for processing fare transactions.
- Contactless Symbol
A symbol that is placed on contactless cards and devices to indicate contactless support and acceptance.
- Content Provider
An entity that is the source of the content accessed via touchpoint on an NFC Smart Poster, such as a retailer that wants to sell its products illustrated on the poster, or a concert promoter that seeks to sell tickets to an event a poster advertises.
- Data Link Connection
A unique combination of source and destination service access point addresses used for numbered information transfer.
- Digital Signage
Signage that uses digital media to display the information for the user. Most commonly these are LCD/Plasma screens (such as arrivals boards at airports), and they may have either NFC tags or card emulation devices providing NFC Smart Poster functionality.
EMV® stands for Europay, MasterCard and Visa: a global standard for credit and debit payment cards based on chip card technology. EMV chip-based payment cards, also known as smart cards, contain an embedded microprocessor, a type of small computer. The microprocessor chip contains the information needed to use the card for payment, and is protected by various security features. Chip cards are a more secure alternative to traditional magnetic stripe payment cards.
- EMV Specifications
Technical specifications maintained by JCB International, MasterCard International, and Visa International to create standards and ensure global interoperability for use of chip technology in the payment industry.
EMVCo manages, maintains and enhances the EMV® Integrated Circuit Card Specifications for chip-based payment cards and acceptance devices, including point of sale (POS) terminals and ATMs. EMVCo also establishes and administers testing and approval processes to evaluate compliance with the EMV Specifications. EMVCo is currently owned by American Express, JCB, MasterCard and Visa.
- European Computer Manufacturers’ Association
European Computer Manufacturers’ Association (ECMA)
- European Telecommunications Standards Institute
The European Telecommunications Standards Institute (ETSI) produces globally-applicable standards for Information and Communications Technologies (ICT), including fixed, mobile, radio, converged, broadcast and internet technologies. ETIS is officially recognized by the European Union as a European Standards Organization. ETSI is a not-for-profit organization with more than 700 ETSI member organizations drawn from 62 countries across 5 continents world-wide.
FeliCa is a contactless technology based on ISO18092 (212k/424k NFCIP1 Passive)  as the RF and on JIS X 6319-4  as the command set. FeliCa is used in various commercial platforms, not only for cards but also for mobile, personal computers, and consumer electronics.
- Global System for Mobile Communications
Global System for Mobile communications (GSM) an open, digital cellular technology used for transmitting mobile voice and data services
GlobalPlatform (GP) is a cross industry, not-for-profit association which identifies, develops and publishes specifications which facilitate the secure and interoperable deployment and management of multiple embedded applications on secure chip technology.
- Groupe Speciale Mobile Association
The GSMA represents the interests of mobile telecommunications operators (Mobile Network Operators) worldwide. Spanning 219 countries, the GSMA unites nearly 800 of the world’s mobile operators, as well as more than 200 companies in the broader mobile ecosystem, including handset makers, software companies, equipment providers, Internet companies, and media and entertainment organizations. Mobile Network Operators own and manage the SIM Card – the UICC on which the mobile subscription is managed – which is capable of acting as a Secure Element.
- GSM Roaming
The ability for a customer to make and receive calls, send and receive data, or access other services when traveling outside the coverage area of their home network.
- International Electrotechnical Commission
International Electrotechnical Commission (IIEC) is the world’s leading organization for the preparation and publication of publication of International Standards for all electrical, electronic and related technologies
- International Organization for Standardization
The International Organization for Standardization (ISO) is a specialized international agency that establishes and publishes international technical standards.
- ISO 14443
ISO standard governing proximity smartcards.
- Link MIU
The maximum number of octets in the information field of any possible LLC protocol data unit.
- LLCP Link
The reliable communication channel between the local and the remote LLC that provides the transport for all data link connections and logical data links.
- Local LLC
The LLC component running on the local device.
- Logical Data Link
A combination of source and destinatino service access point addresses used for unnumbered information transfer.
- Maximum Information Unit
Maximum Information Unit (MIU) it the maximum length of the information field in a single LLC protocol data unit.
MIFARE™ is a trademark of NXP Semiconductors and refers to a series of chips used in contactless smart cards. MIFARE™ has been used in most of the contactless smart card fare collection projects worldwide.
- Mobile Network Operator
A network operator providing voice and/or data services to handset users. The mobile network operator (MNO) may own its own physical network, or it may use other network facilities in which case it is a MVNO (Mobile Virtual Network Operator).
- Mobile Network Provisioning
Mobile Network Provisioning
- Mobile Virtual Network Operator
Mobile Virtual Network Operator
- Mobile Wallet (mWallet, m-Wallet)
Mobile wallet refers to the functionality on a mobile device that can interact securely with digitized valuables. It includes the ability to use a mobile device to conduct commercial transactions in the physical world.A mobile wallet may reside on a mobile device or on a remote network/secure server. Alongside the ability to undertake payments, the Mobile Wallet may contain other content, such as identity, commerce and banking services, transport and other tickets, retail vouchers and loyalty programs.
- Mobile Wallet Content Provider
The mobile wallet content providers are the organizations or the brands that issue content for use in the mobile wallet. Outside Financial Services, such a provider might be known as a Service Provider. Within Financial Services, an issuing bank could be an example of a content provider.
- NDEF Application
The logical, higher-layer application on an NFC Forum Device that uses NDEF as a means to exchange information with other NFC Forum Devices or NFC Forum Tags.
- Near Field Communication
Near Field Communication (NFC) complements many popular consumer level wireless technologies, by utilizing the key elements in existing standards for contactless card technology (ISO/IEC 14443 A&B and JIS-X 6319-4). NFC can be compatible with existing contactless card infrastructure and enables a consumer to utilize one device across different systems.
- NFC Controller
The NFC Controller handles the physical transmission of data over the RF interface and antenna.
- NFC Data Exchange Format
The NFC Data Exchange Format (NDEF) specification ensures a uniform format for data exchange in any NFC application. It defines the data structures for the exchange of information.
- NFC Forum Certified Device
A device that implements at least the mandatory parts of the NFC Forum Stack and the mandatory NFC Forum Operating Modes and has received NFC Forum certification. For more information, refer to the High Level Conformance Requirement document (HLCR).
- NFC Tag
A contactless tag that can store NDEF information on it and can be accessed by an NFC device.
- NFC-enabled device
An NFC-enabled device is a device that is capable of performing near field communication.
- OBEX Protocol
The OBEX (Object Exchange) Protocol was developed by the Infrared Data Association (IrDA). It enables the exchange of data classified as objects between two entities.
- Operating Field
The radio Frequency field created by the NFC Forum Device in Poll Mode.
- Operating Field Off
A condition of the Operating Field when the field strength is below a well-defined threshold.
- Operating Field On
A condition of the Operating Field when the field strength is above a well-defined threshold for a minimum period of time.
Over-the-air (OTA) provisioning is the ability to download and manage content on a device over a cellular or wireless network. This applies to the over-the-air personalisation and life cycle management in the secure element in a mobile device. This process is commonly executed through the mediation of a Trusted Service Manager (TSM), employing cellular and wireless networks to reach the mobile device. Further information: EPC, GSMA
- Peer-to-Peer Mode
Peer-to-peer mode enables two NFC devices to communicate with each other to exchange information and share files. Users of NFC-enabled devices can quickly share contact information and other files with a touch. Two NFC-enabled devices create a connection to share information.
- Protocol Data Unit (PDU)
The sequence of contiguous octets delivered as a unit to the adjacent lower layer or received as a unit from the adjacent lower layer.
- Radio Frequency
Radio Frequency (RF) is a rate of oscillation in the range of about 3 kHz to 300 GHz, which corresponds to the frequency of radio waves, and the alternating currents which carry radio signals.
- Radio Frequency Identification
Radio Frequency Identification (RFID)
- Reader/Writer Mode
Reader/writer mode enables NFC devices to read information stored on inexpensive NFC tags embedded in smart posters and displays. NFC-enabled devices can access information from embedded tags in smart posters. An example is when an NFC device reads an NFC tag or device acting in card emulation mode.
Devices that can read from and write to NFC tags.
- Record Type Definition
An NFC Forum RTD (Record Type Definition) defines NDEF payload data formats and their associated type names.
- Remote Field
The radio Frequency field sensed by the NFC Forum Device in Listen Mode.
- Remote Field Present
A condition of the Remote Filed being stable and strong enough to put the NFC Forum Device in a state that it can operate in Passive Communication Mode.
- Remote LLC
The LLC component running on the remote device.
- Secure Access Module
Secure Access Module (SAM)
The capabilities and features provided to the adjacent upper layer.
- Service Access Point
Service Access Point (SAP) is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking.
- Service Data Unit
Service Data Unit (SSU) is the sequence of contiguous octets received as a unit from the adjacent upper layer or delivered as a unit to the adjacent upper layer.
- Service Discovery Protocol
An application protocol to discover service access point users bound at the remote LLC.
- Service Provider
A service provider is the business entity providing the service in question either to end‐user or to another business entity. In mobile financial services service provider normally refers to the company providing the technology that enables the service. Outside Financial Services the term Service Provider refers to an entity with which the end-user has a relationship, such a transport provider.
- Service User
The user of a service provided by the adjacent lower layer.
- Signature RTD
A specification defining the record that contains a digital signature related to one or more records within an NDEF message. The signature can be used to verify the integrity and authenticity of the content.
- smart poster
Objects in or on which readable NFC tags have been placed.
- Subscriber Identify Module
An application on the UICC containing a mobile subscriber’s unique identity.
- System on Chip
System on Chip
- Tag Reading Mode
These are the use cases when the principal mode of operation of the handset is to read tags.
The place on an NFC Smart Poster that an NFC device should touch, in order to obtain digital services, usually indicated by the N-Mark
- Trusted Execution Environment
Trusted Execution Environment (TEE) is an execution environment that runs alongside but isolated from an REE (run-time execution environment). A TEE has security capabilities and meets certain security-related requirements: It protects TEE assets from general software attacks, defines rigid safeguards as to data and functions that a program can access, and resists a set of defined threats. There are multiple technologies that can be used to implement a TEE, and the level of security achieved varies accordingly. Further information: Global Platform.
- Trusted Service Manager
A trusted service manager (TSM) is a role typical in a near field communication ecosystem, where hardware secure element is in use. The trusted service manager acts as a neutral broker that sets up business agreements and technical connections with mobile network operators, mobile device manufacturers or other entities controlling the secure element (SE) on mobile devices. The trusted service manager enables service providers (SPs) to distribute and manage contactless applications remotely by allowing controlled access to the secure element in NFC-enabled handsets.
Type-Length-Value (TLV) is a coding method for parameters where the Type field specifies the parameter type, the Length field specifies the length of the parameter value, and the Value field contains the actual parameter value octets.
- Universal Integrated Circuit Card
Universal Integrated Circuit Card (UICC) is the smart card used in mobile terminals in GSM and UMTS networks.
- Unmodulated Carrier
A condition of the Operating Field With no modulation present.
- User Interface
A user interface (UI) is the system by which users interact with a machine. The user interface includes hardware and software components. On a mobile device the software component of a UI is realized though a mobile application (app).
Wireless Fidelity – wireless networking technology based on IEEE 802.11 standards.
Please select from the menu above
Application Execution Environment
Advanced Encryption Standard
Application Management Software
American National Standards Institute
Application Protocol Data Unit
Application Programming Interface
Application Provider Security Domain
Amplitude Shift Keying
Controlling Authority Security Domain
Connected Device Configuration
Compatibility Definition Document
Contactless Fare Media System
Card Issuing Bank
Connected Limited Device Configuration
Carrier Sense Multiple Access
Data Encryption Standard
Denial of Service
Destination Service Access Point
Digital Signal Processor
European Article Number
Elliptic Curve Cryptography
European Computer Manufacturer Association
Enhanced Data for GSM Evolution
Europay, Mastercard and Visa
Electronic Product Code
European Telecommunications Standards Institute
Federal Information Processing Standard
General Packet Radio System
Global Positioning System
Global System for Mobile Communications
Graphical User Interface
Host Controller Interface
Host Controller Protocol
High-Level Data Link Control
Hash-based Message Authentication Code
High Speed Packet Access
Hyper Text Transport Protocol
International Civil Aviation Organization
Information and Communications Technologies
Intrusion Detection and Prevention System
International Electrotechnical Commission
Identify Friend or Foe
Infrared Data Association
Issuer Security Domain
International Organization of Standardization
International Telecommunication Union
Java™ 2 Enterprise Edition
Java™ 2 Micro Edition
Java™ 2 Standard Edition
Java Application Descriptor
Java Community Process
JavaCard Remote Method Invocation
JavaCard Virtual Machine
Japanese Industrial Standard
Java Language Specification
Java Community Process
Java Specification Requests
Java Virtual Machine
Message Authentication Code
Mobile Information Device Profile
Man in the Middle
Maximum Information Unit
Multimedia Messaging Service
Mobile Network Operator
Mobile Network Provisioning
Multi-application Operating System
Mobile Virtual Network Operator
NFC Data Exchange Format
Near Field Communication
Near Field Communication Interface and Protocol
Near Field Communication Interface and Protocol-1
Near Field Communication Interface and Protocol-2
Proximity Coupling Device
Personal Digital Assistant
Protocol Data Unit
Proximity Integrated Circuit Card
Personal Identification Number
Public Key Infrastructure
Point of Sale
Phase Shift Keying
Quality of Service
Radio Frequency Identification
Return of Investment
Reset the microprocessor
Record Type Definition
Secure Access Module
Service Access Point
SIM Application Toolkit
Smart Card Operating System
Smart Card Platform
Secure Channel Protocol
Software Development Kit
Service Discovery Protocol
Secure Exchange Protocol
Subscriber Identity Module
Secure Memory Card
Short Messaging Service
Source Service Access Point
Supplementary Security Domain
Secure Sockets Layer
Secure Trusted Environment Provisioning
Single Wire Protocol
Trusted Execution Environment
Transport Layer Security
Type Name Format
Trusted Service Manager
Trusted Third Party
Terminal Transaction Qualifiers
Universal Integrated Circuit Card
Universal Mobile Telecommunication System
Universal Product Code
Uniform Resource Identifier
Universal Subscriber Identity Module
Please select from the menu above
Application Authentication Cryptogram
Application Decisional Results
Application Elementary File
Application File Locator
Application Interchange Profile
Authorization Response Code
Authorization Response Cryptogram
Authorization Request Cryptogram
Application Transaction Counter
Automated Teller Machine
Application Usage Control
Common Core Definitions
Common Core Identifier
Combined DDA/Application Cryptogram Generation