Stakeholders Driving Payment Evolution and Digital Identity

Advanced Card Technology - Glossary of Terms

S 
SAM Secure Application Module  
SAM Interface Device The part of the terminal, or pinpad, into which a SAM is inserted, including mechanical and electrical devices that may be part of it.  
SAM Initializer The entity that loads security and related operational parameters in the SAM. ISO
SAM Provider The entity that provides a SAM to a card acceptor (usually the application supplier) ISO
SSL Secure Socket Layer  
Script A command or a string of commands transmitted by the issuer to the terminal for the purposes of being sent serially to the ICC as commands. EMV
Secret Key The key used in a symmetric cryptographic algorithm, where the same key is used for encryption and decryption  
Secure Application Module (SAM) A physical module (or a logical functionality in the CAD) intended to contain algorithm(s), related keys, security procedures and information to protect an application in such a way that unauthorized access is not possible. In order to achieve this, the module must be physically and logically protected. ISO
Secure Audit Trail The historic data and information which are available for examination in order to prove the correctness and integrity with which the agreed security procedures have been followed and which allows breaches in security to be detected. ISO
Secure Electronic Transaction (SET) A MasterCard/Visa backed standard to allow safe Internet trading via encryption certification of all parties involved in a transaction.  
Secure Messaging Transfer of authenticated and/or enciphered data between two entities.  
Secure Socket Layer (SSL) A protocol designed by Netscape Communications to enable encrypted, authenticated communications across the Internet. SSL is used mostly in communications between web browsers and web servers.  
Security Features Measures taken to achieve a reasonable freedom from accidental, criminal, fraudulent, and vandalizing actions while maintaining sensitivity to unexpected attacks or system failures that cannot be distinguished from attacks.  
Self-insurance A type of group insurance where the group uses internal means and assumes the financial risks involved in providing healthcare protection. This takes the place of obtaining coverage from commercial health insurance carriers.  
Settlement Transfer of funds to complete one or more transactions.  
Settlement Conversion Rate The rate applied to convert a transaction value from the currency of denomination into the relevant settlement currency.  
Signature Dynamics A PIV technique based on measurements of pen position and pressure as a function of time during signature writing.  
Signature Panel A panel on a card on which the cardholder’s signature is displayed.  
Single-application card An operating system that supports a single application.  
SIM card An integrated circuit chip residing on a piece of plastic, which is smaller than an ISO 7816 card. SIM cards are used most frequently in cell phones.  
Skimming Electronically copying the card data from one card to another.  
Smart Card An integrated circuit card with a microprocessor, i.e. capable of calculation.  
SPOM Self-Programmable One Chip Microcomputer.  
Standard A voluntary agreement to a uniform and consistent methodology and/or specification to achieve a common action or result.  
Standardized Processes and Protocols Guidelines for common data requirements, utilization control requirements, and documentation requirements across all payers.  
Standing Order A pre authorized payment in which a customer instructs his/her bank to pay fixed sums at regular intervals or on defined dates.  
Static Authentication An off-line cryptographic process that verifies plaintext data, stored in the ICC, against cryptographic data also stored in the ICC.  
Static Random Access Memory Random access memory that does not need to be refreshed on each memory cycle.  
Storage An electronic and/or mechanical magnetic device that holds information for subsequent use or retrieval.  
Store and Forward A mode of message handling in which on-line and off-line operation are mixed. Sore and forward operation occurs when a message cannot be transmitted on-line immediately to its destination but is retained for transmission when the destination system comes on-line again.  
Store Card A financial transaction card associated with a particular retailer or group of retail stores, which can be used only for purchases from that retailer or at the stores concerned.  
Stored Value Card A card that contains a value that is decremented when used.  
Subscriber Identity A device used in the GSM application to link a phone number to a specific person instead of linking the number to a specific phone set.  
Super Smart Card A card shaped device that has an on board keypad, LCDs, and batteries, as well as one or more integrated circuit chips capable of storing and processing data.  
SWIFT Society for World Wide Interbank Financial Telecommunication. Communication mechanism owned by more than 1,000 banks around the world and used to transmit funds, transfer instructions and administrative messages.  
Swipe Reader A magnetic stripe reader in which the magnetic stripe is read by passing the card manually right through the reader past the magnetic heads.  
Switching Establishment and dis-establishment of connections in a communications network.  
Symmetric Key Cryptography Cryptographic processes in which encryption and decryption rely on the same secret key.  
Synchronous Of Data transmission, encoded with digital pulses indicating the boundaries between successive individual bits.  
Synchronous Password Generation A method of generating a unique one time password for computer users based on time or transaction synchronization between a host and a device at the point of transmission.  
Symmetric Key Cryptography Cryptographic processes in which encryption and decryption rely on the same secret key.  
System Software Programs that control the internal operation of a computer. They consist of operating system and packages to improve the efficiency and capabilities of the computer, such as communications control programs and data base management programs. Applications software runs under systems software.