Skip to content
Last updated

Glossary

Here's a list of the most common terms and definitions used within the Token.io docs.

  • member

    This is a user represented by throughout the ecosystem by a memberId.

  • Platform

    Operated and maintained by to provide turnkey PSD2 and OBIE compliance for easy and secure TPP connectivity with banks offering payment initiation and account information services.

  • .NET SDK

    Online API docs containing the programmatic definitions of every type and method applied using the C# SDK.

  • 2FA

    Two-factor authentication (2FA) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information.

  • 404 errors

    The HTTP 404, 404 Not Found, 404, 404 Error, Page Not Found, File Not Found, or Server Not Found error message is a Hypertext Transfer Protocol standard response code when a URL specifies an indeterminate address.

  • A2A

    Account-to-Account – payments that move money directly from one account to another without the need for additional intermediaries or payment instruments, such as cards.

  • accountholder

    Refers to an individual, business, or organization that holds or has held an account with the bank.

  • accountIdentifier

    Account numbers and other strings that identify a unique bank account.

  • ACH

    Automated Clearing House – network used for electronically moving money between bank accounts across the United States.

  • ACTC

    Payment status; AcceptedTechnicalValidation – authentication and syntactical and semantical validation are successful.

  • AES

    Advanced Encryption Standard – one of the most frequently used and most secure encryption algorithms available today. It is publicly accessible, and it is the cipher which the NSA uses for securing documents with the classification "top secret".

  • AIS

    Account Information Service – supports TPP secure access to customer accounts and data, but only with the bank-verified consent of the customer.

  • AISP

    Account Information Service Provider – a TPP authorized to access consumer or business account data from the account holder's financial institutions with the account holder's explicit consent.

  • AISPs

    Account Information Service Provider. An Account Information Service provides account information services as an online service to provide consolidated information on one or more payment accounts held by a payment service user with one or more payment service provider(s).

  • ALB

    Application Load Balancer – functions at the application layer, the seventh layer of the Open Systems Interconnection (OSI) model. After the load balancer receives a request, it evaluates the listener rules in priority order to determine which rule to apply, and then selects a target from the target group for the rule action. You can configure listener rules to route requests to different target groups based on the content of the application traffic. Routing is performed independently for each target group, even when a target is registered with multiple target groups. You can configure the routing algorithm used at the target group level. The default routing algorithm is round robin; alternatively, you can specify the least outstanding requests routing algorithm.

  • ALPN

    Application-Layer Protocol Negotiation – a TLS extension that includes the protocol negotiation within the exchange of hello messages. ALPN is able to negotiate which protocol should be handled over a secure connection in a way that is more efficient and avoids additional round trips. The ever-growing in popularity HTTP/2 protocol, makes use of ALPN to further decrease website load times and encrypt connections faster.

  • Android App Links

    Android App Links are http URLs that send users to a specific in-app location or relevant webpage. App Links improve the user experience by eliminating the time users otherwise waste on navigating to specific content. Android App Links ensure the user is taken directly to a specific in-app location. In cases where the app is not installed, users can go directly to content on your website by leveraging HTTP URLs and an associated domain.

  • Android Keystore

    Stores cryptographic keys in a container to make it more difficult to extract from the device. Once keys are in the keystore, they can be used for cryptographic operations with the key material remaining non-exportable. Moreover, it offers facilities to restrict when and how keys can be used, such as requiring user authentication for key use or restricting keys to be used only in certain cryptographic modes. See Security Features section for more information.

  • API

    Application Programming Interface – a set of definitions and protocols for building and integrating application software. APIs let your product or service communicate with other products and services without having to know how they’re implemented.

  • API Key

    Unique identifier used to authenticate a TPP developer or calling program to the Open Banking API; allows you to test and validate your integration in our sandbox environment. Your API Key serves many of the same functions provided by your private key in production. CAUTION: Do not share your API Key with anyone outside your organization.

  • APNS

    Apple Push Notification Service – a platform notification service created by Apple Inc. that enables third party application developers to send notification data to applications installed on Apple devices.

  • ASC

    Action Script Communication files (also known as ASCII files) are used for posting online security notices, as well as securely transmitting messages via email and text.

  • ASPSP

    Account Servicing Payment Services Provider – any financial institution that offers a payment account with online access. This includes banks and building societies. PSD2 requires ASPSPs to provide access to trusted third parties for initiating payments and accessing account information.

  • Authentication Key

    Also called an access token, this key is a string representing your permissions to use the Token Platform. Key-based authentication uses asymmetric cryptographic algorithms, with public and private keys, to confirm your identity.

  • BACS

    Bankers Automated Clearing Services – an electronic payment made directly from one UK bank account to another, taking up to three working days to arrive. There are two main types of Bacs payment - Direct Credit, which is a bank transfer, and Direct Debit, where one party automatically takes payment from another party’s account with their authorization.

  • bank configuration

    Open Banking registration entailing bank-required certificate and key exchange with signing authority. When successful, TPP receives a client ID and client secret as an approved PISP and/or AISP with the bank.

  • Bankgiro

    Proprietary clearing system (a giro) in Sweden used for transactions such as bill payments. It is owned by Swedish banks. The clearing system is connected with the banks enabling payments to be received directly into bank accounts.

  • basetime

    Time specfiied in milliseconds since the Epoch (January 1st 1970, 00:00_00.000).

  • BBAN

    Basic Bank Account Number – represents a country-specific bank account number. The BBAN is the last part of the IBAN when used for international funds transfers. Every country has its own specific BBAN format and length. See https://www.mobilefish.com/services/bban_iban/bban_iban.php for help with BBAN conversion.

  • BCA

    Business current account

  • bearer scheme

    An authentication method using security tokens. Bearer authentication is understood to mean: "Give access to the bearer of this token."

  • bearer token

    A short, unguessable string identifying a user-session.

  • beneficiary

    This is the payee or the party in control of the "to" (receiving) account in a transaction; typically, the TPP initiating the transaction.

  • BGN

    Currency code for the official currency of Bulgaria, called the lev (plural = leva).

  • BI

    Business Intelligence – processes and methods of collecting, storing, and analysing data from business operations or activities to optimize performance.

  • BIC

    Bank Identifier Code – a unique identifier for a specific financial institution. A BIC is composed of a 4-character bank code, a 2-character country code, a 2-character location code and an optional 3-character branch code.

  • binary data compression

    Process by which the size of a binary file is reduced by re-encoding it to use fewer bits of storage.

  • BLOB

    binary large object – collection of binary data stored as a single entity. Blobs are typically images, audio or other multimedia objects, though sometimes binary executable code is stored as a blob. They can exist as persistent values inside some databases, or exist at runtime as program variables in some languages.

  • blocking call

    A blocking call results in the task being suspended [put to sleep]; the task will be woken when the request can be fulfilled. A non-blocking call results in an error code being returned.

  • Blue Cash

    An alternative to Express Elixir, the Blue Cash system does not have one dedicated account common to all participants. Instead, interbank transfers are executed on special intermediate accounts.

  • BLZ

    Bankleitzah – an 8 digit code used for money transfers with domestic banks in Germany. The code is used to identify an individual branch of a financial organization in Germany. For international monetary transfers, a SWIFT Code is used with Bankleitzahl and Account Number.BLZ consists of 8 digits. The first 4 digits identify the banking company, the latter 4 digits are assigned to a branch.

  • Browserify

    Development tool compiles node.js-style modules for use in a browser. Just like node, you write your modules in separate files, exporting external methods and properties using the module.exports and exports variables.

  • build automation

    Tools that automatically compile your software's source code into machine code using a build script.

  • bulk transfer

    One payment to a list of recipients from a single bank account. The bulk list transaction shows as a single debit on the accountholder's bank statement.

  • C#

    General-purpose, multi-paradigm programming language encompassing strong typing, lexically scoped, imperative, declarative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed around 2000 by Microsoft as part of its .NET initiative, and later approved as an international standard by Ecma (ECMA-334) and ISO (ISO/IEC 23270:2018).

  • CA

    A certificate authority (CA), also sometimes referred to as a certification authority, is a company or organization that acts to validate the identities of entities (such as websites, email addresses, companies, or individual persons) and bind them to cryptographic keys through the issuance of electronic documents known as digital certificates.

  • Cache-Control

    Cache-control is an HTTP header used to specify browser caching policies in both client requests and server responses. Policies include how a resource is cached, where it’s cached and its maximum age before expiring (i.e., time to live).

  • CAF

    Confirmation of Available Funds – A CBPII begins the Confirmation of Funds journey by registering a request to confirm funds of a PSU. The CBPII must then obtain consent from the PSU in order to authorize the request, enabling it to request the information. Once the request is authorized, the CBPII will be able to invoke Confirmation of Funds API to the confirm availability of funds in the PSU account.

  • CBPII

    Card Based Payment Instrument Issuer – a payment services provider that issues card-based payment instruments and allows its customers to pay from bank accounts.

  • CDN

    Content Delivery Network – a highly-distributed platform of servers that helps minimize delays in loading web page content by reducing the physical distance between the server and the user. ... Without a CDN, content origin servers must respond to every single end user request.

  • CHAPS

    Clearing House Automated Payments System – used by large financial institutions that need to transfer billions of dollars worth of currency each day. To assist in these transfers, CHAPS enables real-time fund transfers and can accommodate frequent large transfers with virtually no delay. The speed of CHAPS also substantially eliminates the risk that senders will cancel their transfers before they are accepted by the recipient. CHAPS is administered by the Bank of England (BoE) and is used by 30 participating financial institutions. Approximately 5,500 additional institutions also engage with the system by way of partnership agreements with the 30 primary members.

  • client

    A desktop computer, laptop, smartphone or tablet, as well as any other electronic device that sends or receives data from a server. The term implies a connection to a wired or wireless network.

  • cloud

    Functionality, data and resources running on physical and virtual servers maintained and controlled by , and accessed via an Internet connection.

  • CMA9

    As part of the Open Banking initiative, the CMA9 are the nine largest banks in the UK as determined by the Competition and Markets Authority (CMA). The CMA is an independent department of the UK government chartered to promote market competition and fairness, and reduce any harmful monopolies.

  • Connection header

    The Connection general header controls whether or not the network connection stays open after the current transaction finishes. If the value sent is keep-alive, the connection is persistent and not closed, allowing for subsequent requests to the same server to be done.

  • Consectetur

    Definition for consectetur.

  • consent

    Mechanism which confirms that a user has granted permission to share the user's data. Consent means the user (i) authorizes a third party to access their data, and (ii) authenticates that the third party is who it claims to be. By law, data sharing is confined to quantifiable information about a bank account – balance, transactions, earned interest (where applicable), and account history). No personal or bank-confidential information about the accountholder may be shared.

  • CORS

    An HTTP-header mechanism that allows a server to indicate any origins other than its own — domain, scheme, or port — from which the browser should permit the loading of resources.

  • COTS

    Commercial off-the-shelf – a product designed to be easily installed and to interoperate with existing system components.

  • creditor agent

    Financial institution servicing an account for the creditor.

  • CRN

    A company registration number (CRN) is a unique number issued by Companies House when a company is incorporated in the UK. It is usually 8 numbers, or 2 letters followed by 6 numbers.

  • CSR

    A CSR or Certificate Signing Request is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate. It is usually generated on the server where the certificate will be installed and contains information that will be included in the certificate such as the organization name, common name (domain name), locality, and country. It also contains the public key that will be included in the certificate. A private key is created at the same time to make a key pair. A CSR is generally encoded using ASN.1 according to the PKCS #10 specification. A certificate authority will use a CSR to create your SSL certificate, but it does not need your private key. You need to keep your private key secret. The certificate created with a particular CSR will only work with the private key that was generated with it. So if you lose the private key, the certificate will no longer work.

  • CSRF

    Cross-site request forgery, also known as XSRF, Sea Surf or Session Riding – is an attack vector that tricks a web browser into executing an unwanted action in an application to which a user is logged in. CSRFs are typically conducted using malicious social engineering, such as an email or link that tricks the victim into sending a forged request to a server. As the unsuspecting user is authenticated by their application at the time of the attack, it’s impossible to distinguish a legitimate request from a forged one. Token guards against this type of attack by checking each request against the session ID.

  • CSS

    CSS stands for Cascading Style Sheet; it specifies a webpage's style—page layouts, colors, and fonts are all determined with CSS.

  • curl

    Client URL – a command line tool to transfer data to or from a server, using any of the supported protocols (HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP or FILE). curl is powered by Libcurl. This tool is preferred for automation, since it is designed to work without user interaction. curl can transfer multiple files at the same time.

  • custom (payment rail)

    A customized/hybrid transfer destination type supported by the connected bank.

  • CZK

    Currency code for the Czech koruna, the official legal tender in the Czech Republic.

  • Date header

    The Date general HTTP header contains the date and time at which the message was originated.

  • dba

    DBA stands for "doing business as." Often called a trade name, fictitious name, or assumed name, a DBA allows you to conduct business under a name other than your own legal name (or registered business name).

  • DDOS

    Destributed Denial Of Service – an attacker's attempt to make it impossible for a service to be delivered. This can be achieved by thwarting access to virtually anything: servers, devices, services, networks, applications, and even specific transactions within applications. In a DoS attack, it’s one system that is sending the malicious data or requests; a DDoS attack comes from multiple systems.

  • DER

    The DER format is the binary form of the certificate. DER formatted certificates do not contain the "BEGIN CERTIFICATE/END CERTIFICATE" statements.

  • disparate systems

    Systems designed to operate as fundamentally distinct; not originally intended to exchange data or interact with each other at a native level. Such systems require appropriate APIs to bridge the communications divide.

  • DKK

    Currency code representing the official currency of Denmark, the krone (plural = kroner).

  • DN

    Distinguished Name – a string that uniquely identifies an entry in the LDAP Directory Information Tree (DIT).

  • Domestic

    Banks make domestic wire transfers (as opposed to international wire transfers) to send funds to financial institutions residing in the same country or financial zone.

  • Domestic Non Euro

    Any clearing and settlement mechanism or electronic retail payment system (ERPS) approved for domestic interbank transfer within a given EU member's borders. Depending on the country in question. such systems are built on different platforms and based on varying payment products and services to allow firms, individuals, government and other economic agents to transfer money on a daily basis without having to use cash.

  • DSL

    Domain-specific language – programming language with a higher level of abstraction optimized for a specific class of problems. A DSL uses the concepts and rules from the field or domain. DSLs are typically less complex than a general-purpose language, such as Java, C, or Ruby.

  • e-merchant

    An an online merchant selling products or services over the Internet.

  • EBA

    European Banking Authority – EU agency tasked with implementing a standard set of rules to regulate and supervise banking across all EU countries.

  • ECDSA SHA256

    Elliptic Curve Digital Signature Algorithm – DSA using elliptic curve cryptography, an approach based on the algebraic structure of elliptic curves over finite fields. ECDSA requires smaller keys to provde equivalent security. SHA256 is a novel hash function computed with 32-bit words.

  • EdDSA

    Edwards-curve Digital Signature Algorithm – a digital signature scheme using a variant of the Schnorr signature based on twisted Edwards curves. It is designed to be fast without sacrificing security.

  • eIDAS

    Electronic Identification, Authentication and Trust Services – an EU regulation on electronic identification and trust services for electronic transactions in the European Single Market. See https://ec.europa.eu/ digital-single-market/en/discover-eidas for the rules and regulations.

  • eIDAS certificate

    Under the eIDAS Regulation (EU) No 910/2014, a qualified certificate for electronic signature refers to “a certificate for electronic signatures, that is issued by a qualified trust service provider” and meets the requirements specified within the regulation.

  • Elixir

    A payments system that ensures electronic interbank settlement in Poland. Transactions directed to the system are settled within one of three Elixir sessions held each business day and closed on the same day in the National Bank of Poland's SORBNET2 system, which guarantees interbank transfer of funds.

  • ES256

    Asymmetric key cryptography algorithm combined with elliptic curve digiral signature algorithm (ECDSA) using P-256 and SHA-256.

  • ES6

    Also known as JavaScript 6.

  • ES7

    JavaScript features in ECMAScript 2016 introduced since ES6 (EMCAScript 2015).

  • ESDoc

    Documentation generator for JavaScript.

  • ESDocs

    JavaScript documentation generator

  • EUR

    Currency code representing the euro, the official currency for 19 of the 28 members of the European Union (EU).

  • VM

    Security standard for storing account information on credit cards. It’s an alternative to the magnetic stripe (mag stripe) that has traditionally been used to store information on the backs of cards in the United States. EMV stands for “Europay, Mastercard, and Visa,” the three companies who began this initiative.

  • Express Elixir

    An instant payment clearing system in Poland which allows the direct execution of the transaction from the payer's account in one bank to the payee's account in another bank. It supports transaction settlement in near real time, without any intermediary institutions.

  • failover

    High-availability system capability that automatically and seamlessly switches to a reliable alternate or backup upon failure of a primary instance to eliminate, or at least reduce, the impact on system users when a service failure occurs.

  • Faster Payments

    UK banking initiative to reduce payment times between different banks' customer accounts down to a few seconds from the three working days transfer time imposed under the BACS system.

  • FCA

    Firms and individuals must be authorized by the Financial Conduct Authority (FCA) equivalent in each country to carry out regulated financial service activities and offer credit to consumers. For the list of FCA-equivalent regulators outside of the UK, please visit https://www.fca.org.uk/firms/passporting/regulators-eu-eea

  • FCM

    Firebase Cloud Messaging – a cross-platform messaging solution that lets you reliably send messages at no cost.

  • FDP

    Future-dated Payment – an interbank transfer initiated for scheduled execution on a future date.

  • Fintechs

    Broadly, fintech describes any company using the internet, mobile devices, software technology or cloud services to perform or connect with financial services.

  • FPS

    Faster Payments Service – UK banking initiative to reduce payment times between different banks' customer accounts from the three working days that transfers take using the long-established BACS system to typically a few seconds.

  • FSA

    Financial Services Authority, also called National Competent Authority, or NCA.

  • future-dated payments

    Instructs the bank to disburse funds to the destination account on a specific date (the execution date).

  • GA-ed

    General Availability release – the most recently released version of the product that is available to the public.

  • Gateways

    Technology provider that captures and transfers payment data from the customer to the acquirer and then transfers the payment acceptance or decline back to the customer.

  • GB Domestic

    Domestic bank account identifier in the United Kingdom. Contains accountNumber and sortCode. The ISO country code is assumed to be GB.

  • GBP

    Currency code representing the British pound sterling, the official currency of the United Kingdom, the British Overseas Territories of South Georgia, the South Sandwich Islands, and British Antarctic Territory and the U.K. crown dependencies the Isle of Man and the Channel Islands.

  • GDPR

    Stands for General Data Protection Regulation, Europe's new framework for data protection laws that replaces the previous 1995 data protection directive. It is intended to harmonize privacy and data protection laws across Europe while helping EU citizens better understand how their personal information is being used, encouraging them to file a complaint if their rights were violated.

  • Gradle

    Gradle is an open-source build-automation system that builds upon the concepts of Apache Ant and Apache Maven and introduces a Groovy-based domain-specific language (DSL) instead of the XML form used by Apache Maven for declaring the project configuration. Gradle runs on the JVM and you must have a Java Development Kit (JDK) installed to use it. This is a bonus for developers familiar with the Java platform as you can use the standard Java APIs in your build logic, such as custom task types and plugins. It also makes it easy to run Gradle on different platforms. Note that Gradle isn’t limited to building just JVM projects, and it even comes packaged with support for building native projects.

  • gradle.script

    Gradle builds a script file for handling two things: projects and tasks. Every Gradle build represents one or more projects. A project represents a library JAR or a web application or it might represent a ZIP that's assembled from the JARs produced by other projects.

  • Groovy

    Apache Groovy is a powerful, optionally typed and dynamic language, with static-typing and static compilation capabilities for the Java platform aimed at improving developer productivity thanks to a concise, familiar and easy to learn syntax. It integrates smoothly with any Java program, and immediately delivers to your application powerful features, including scripting capabilities, Domain-Specific Language authoring, runtime and compile-time meta-programming and functional programming.

  • gRPC

    Open source remote procedure call (RPC) framework that can run anywhere. It enables client and server applications to communicate transparently, and makes it easier to build connected systems. gRPC uses protocol buffers, Google's mature open source mechanism for serializing structured data — think XML, but smaller, faster, and simpler.

  • guest checkout

    Allows bank customers to make payments from their bank accounts to a TPP, or grant access for their bank account(s) information to a TPP, without having to pre-register with Token to link the bank accounts.

  • HALF-EVEN

    Round-half-even algorithm, often referred to as Banker's Rounding because it is commonly used in financial calculations. Half-way values are rounded toward the nearest even number. Thus, 3.5 will round up to 4 and 4.5 will round down to 4.

  • host DNS name

    DNS stands for Domain Name System which is a hierarchical naming system created for translating host names to IP addresses. A Host Name is simply a name identifying a computer on a network or a domain on the Internet. A DNS Server is a server computer that provides DNS services.

  • ** HSM**

    Hardware Security Module – a secure physical device—typically an external device that can be plugged into a computer—that’s designed for cryptoprocessing. Cryptoprocessors such as HSMs use algorithms to encrypt data to offer an increased level of security.

  • HSVP

    A real-time gross settlement system (RTGS) for large and time-sensitive transactions, as well as multilateral netting for small value payments. HSVP is owned and operated by the Croatian central bank (Hrvatska narodna banka, or HNB).

  • ** HTTP 500**

    The 500 Internal Server Error is a very general HTTP status code that means something has gone wrong on the web site's server but the server could not be more specific on what the exact problem is.

  • HTTP 1.1

    HTTP 1.1 is the latest version of Hypertext Transfer Protocol (HTTP), the World Wide Web application protocol that runs on top of the Internet's TCP/IP suite of protocols. HTTP 1.1 provides faster delivery of Web pages than the original HTTP and reduces Web traffic.

  • HTTP 302

    An HTTP response with this status code will additionally provide a URL in the header field Location. This is an invitation to the user agent (i.e., a web browser) to make a second, otherwise identical, request to the new URL specified in the location field. The end result is a redirection to the new URL.

  • HTTP API

    A HTTP API is ANY API that makes use of HTTP as its transfer protocol.

  • HTTP/2

    Extends HTTP and centers around three qualities rarely associated with a single network protocol without necessitating additional networking technologies – simplicity, high performance and robustness. These goals are achieved by introducing capabilities that reduce latency in processing browser requests with techniques such as multiplexing, compression, request prioritization and server push.

  • HUF

    Currency code representing the national currency of Hungary, called the Forint.

  • IBAN

    International Bank Account Number – a number attached to all bank accounts in the EU countries, plus Norway, Switzerland, Liechtenstein and Hungary. The IBAN is made up of a code identifying the country to which the account belongs, the account holder's bank, and the account number itself.

  • IDE

    Integrated Development Environment – developer tools that include a text editor, a project editor, a tool bar, and an output viewer. IDEs can perform a variety of functions. Notable ones include write code, compile code, debug code, and monitor resources. Examples of IDEs include NetBeans, Eclipse, IntelliJ, and Visual Studio.

  • idempotence

    From a RESTful service standpoint, for an operation (or service call) to be idempotent, clients can make that same call repeatedly while producing the same result. In other words, making multiple identical requests has the same effect as making a single request. Note that while idempotent operations produce the same result on the server (no side effects), the response itself may not be the same (e.g. a resource's state may change between requests).

  • immutable class

    Immutable class means that once an object is created, you cannot change its content. In Java, all the wrapper classes (like Integer, Boolean, Byte, Short) and String class are immutable.

  • incrementality

    The process of avoiding work by tracking input and output tasks, and by only running the parts of the code/files that have changed.

  • indempotency

    From a RESTful service standpoint, for an operation (or service call) to be idempotent, clients can make that same call repeatedly while producing the same result. In other words, making multiple identical requests has the same effect as making a single request. Note that while idempotent operations produce the same result on the server (no side effects), the response itself may not be the same (e.g. a resource's state may change between requests).

  • infosec

    Secure procedures or measures used to protect electronic data from unauthorized access or use.

  • interoperability

    Characteristic of a product or system, whose interfaces are completely understood, to work with other products or systems, at present or in the future, in either implementation or access, without any restrictions.

  • iOS Universal Links

    Universal Links are standard web links (http://mydomain.com) that point to both a web page and a piece of content inside an app. When a Universal Link is opened, iOS checks to see if any installed app is registered for that domain. If so, the app is launched immediately without ever loading the web page.

  • IP address

    IPv4 addresses are represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1.

  • ISO 3166-1 alpha-2

    Two-letter country codes defined in ISO 3166-1, part of the ISO 3166 standard published by the International Organization for Standardization (ISO), to represent countries, dependent territories, and special areas of geographical interest.

  • ISO 639-1

    Codes for the representation of names of languages—Part 1: Alpha-2 code, is the first part of the ISO 639 series of international standards for language codes. Part 1 covers the registration of two-letter codes. There are 184 two-letter codes registered as of December 2018. The registered codes cover the world's major languages. See https://www.iso.org/iso-639-language-codes.html

  • ITEF

    Internet Engineering Task Force – Internet standards body, developing open standards through open processes. IETF is the international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. The technical work of the IETF is done in Working Groups, which are organized by topic into several Areas. Much of the work is handled via mailing lists. The IETF holds meetings three times per year.

  • JAR

    Java ARchive – package file format used to aggregate Java class files and associated metadata and resources (text, images, etc.) into one file for distribution. JAR files are archive files that include a Java-specific manifest. They are downloaed in ZIP format and have a .jar file extension when decompressed.

  • Java

    Programming language and computing platform first released by Sun Microsystems in 1995. There are lots of applications and websites that will not work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere!

  • Javadoc

    Standard Java API documentation in HTML format; parses the declarations in a source file into documentation describing classes, methods, constructors, and fields.

  • JavaScript

    Often abbreviated as JS, JavaScript is an interpreted programming language that conforms to the ECMAScript specification — high-level, often just-in-time compiled, and multi-paradigm. It has curly-bracket syntax, dynamic typing, prototype-based object-orientation, and first-class functions. Alongside HTML and CSS, JavaScript is one of the core technologies of the World Wide Web. All major web browsers have a dedicated JavaScript engine to execute it.

  • Jfrog Artifactory

    Jfrog is a oftware company that assists DevOps organizations with continuous development and continuous improvement (CD/CI). Its most well-known product is Artifactory, which is a binary repository manager similar to Sonatype Nexus. It’s commonly used in DevOps environments for CI/CD pipelines and supports a number of software package formats, including Maven, Debian, npm, Helm, Ruby, Python, and Docker, with features like high availability, replication, disaster recovery, and scalability.

  • JSON

    JavaScript Object Notation – a lightweight format for storing and transporting data, often when data is sent from a server to a web page.

  • JVM

    Java Virtual Machine – a program that executes other programs. It has two primary functions: to allow Java programs to run on any device or operating system (known as the "Write once, run anywhere" principle), and to manage and optimize program memory.

  • JWKS

    A JSON Web Key Set endpoint is a read-only endpoint that contains the public keys' information in the JWKS format. The public keys are the counterpart of private keys which is used to sign tokens. The specification is found at https://tools.ietf.org/html/rfc7517.

  • JWS

    JSON Web Signature – a signed JSON Web Token (JWT).

  • JWT

    JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.

  • key store

    A key is the parameter that determines the functional output of a cryptographic algorithm. Encryption/decryption algorithms require a key to specify the transformation of plaintext into ciphertext, and vice versa. Keys also specify transformations of digital signatures and message authentication codes. A key store protects keys held in storage.

  • KYC

    Know Your Customer or Know Your Client – guidelines in financial services that require verification of the identity, suitability, and risks involved with maintaining a business relationship.

  • L4

    Transport layer for transmission of data between points on a network.

  • L7

    Application layer nearest to the end user. The user and the application are directly interacting, communicating with both.

  • LEV

    Official currency of Bulgaria. Its currency code is BGN, and it is made up of 100 stotinki.

  • license

    Regulatory permission to conduct open banking/PSD2 business as an Account Information Service Provider (AISP), a Payment Initiation Service Provider (PISP), or both. You apply for licencing to the FCA and/or its European counterparts by enrolling in the Open Banking Directory, which includes verified details of all participants – a crucial part of the Open Banking ecosystem.

  • Maven

    Apache Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.

  • MCC

    Merchant Category Code – Every transaction processed by the card networks is assigned a merchant category code (MCC), a four-digit number that denotes the type of business providing a service or selling merchandise. MCCs are used by card issuers to categorize, track or restrict certain types of purchases. MCC can affect the interchange rate and CC processing fees, as well as how customers are rewarded for purchases they make with their credit card.

  • members

    End users (customers/payers), merchants, and third-party providers are all members of the Token network, exchanging funds and/or information via open yet highly secure transactions with TokenOS.

  • Merchant

    Merchants are retailers that want/need to support the new checkout methods, payment services, payment channels, and payment technologies offered through open banking.

  • metadata

    Data that provide information about other data or summarises basic information about data.

  • middleware

    Functioning like connective tissue between systems, applications and data, OS-agnostic middleware provides common services and capabilities like messaging, authentication, and API management.

  • MOD97 algorithm

    Used for IBAN validation, the first four characters of the IBAN number are pulled out from the beginning and are appended at the end of the string. Next, all the letters in the obtained string of characters are replaced by the ASCII value of their corresponding uppercase letter decreased by 55 (ascii value −55). The modulus of this number (x, with respect to 97) is then checked. If the modulus is 1, then it is a valid IBAN number.

  • modulus

    The modulo operation (abbreviated “mod”, or “%” in many programming languages) is the remainder when dividing. For example, “5 mod 3 = 2” which means 2 is the remainder when you divide 5 by 3.

  • MSISDN

    Mobile Station International Subscriber Directory Number – full phone number of a cellphone, including the country code and any area code or similar code issued by that country. Its maximum length is 15 digits.

  • mTLS

    Mutual Transport Layer Security – common security practice that uses client TLS certificates to provide an additional layer of protection, allowing it to cryptographically verify the client information.

  • mutual SSL

    Mutual Authentication, also commonly referred to as Two-Way Authentication or Two-Way SSL, refers to the combination of both Server and Client Authentication. The authentication is mutual, or two-way, because the server is authenticating itself to the client, and the client is authenticating itself to the server in order to establish a secure encrypted channel between them.

  • NCA

    National competent authorities are organisations that have the legally delegated or invested authority, or power to perform a designated function, normally monitoring compliance with the national statutes and regulations.

  • NextGenPSD2

    Common API standard for PSD2 developed by the Berlin Group to create uniform and interoperable communications between banks and TPPs.

  • NGP

    A JSON/REST API that follows most REST conventions. All URLs use a resource patch and an HTTP method to indicate the desired action on that resource. For example, a GET on /resource lists all resources in the current tenant. A GET on /resource/{id} gets the details of that particular object. A POST on /resource creates a new object. A POST on /resource/{id} updates the details of a specific object.

  • NLB

    Network Load Balancer – functions at the fourth layer of the Open Systems Interconnection (OSI) model. It can handle millions of requests per second. After the load balancer receives a connection request, it selects a target from the target group for the default rule. It attempts to open a TCP connection to the selected target on the port specified in the listener configuration.

  • node-forge

    A native implementation of TLS (and various other cryptographic tools) in JavaScript. The Forge software is a fully native implementation of the TLS protocol in JavaScript, a set of cryptography utilities, and a set of tools for developing Hosted Pages that utilize many network resources.

  • node.js

    Node. js is a platform built on Chrome's JavaScript runtime for easily building fast and scalable network applications. Node. js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.

  • NOK

    Currency code representing the official currency of Norway, called the krone (plural = kroner).

  • npm

    Node Package Manager – online repository for the publishing of open-source Node.js projects; a command-line utility that aids in package installation, version management, and dependency management.

  • NuGet

    For C# and .NET (including .NET Core), the Microsoft-supported mechanism for sharing code is NuGet, which defines how packages for .NET are created, hosted, and consumed, and provides the tools for each of those roles.

  • OAuth

    OAuth 2.0 is a protocol that lets a user grant a website limited access to the user's resources from another site, without having to expose the user's credentials.

  • OBIE

    Open Banking Implementation Entity – organization created by the CMA (Competition and Markets Authority) to deiver APIs, data structures and security architectures that enable developers to harness technology, making it easy and safe for account holder's to share their financial information held by the banks with third parties.

  • Objective-C

    A general-purpose, object-oriented programming language that adds Smalltalk-style messaging to the C programming language. It was the main programming language supported by Apple for macOS, iOS, and their respective application programming interfaces (APIs), Cocoa and Cocoa Touch, until the introduction of Swift in 2014.

  • OBSEAL

    eIDAS certificate registered with OBIE (Open Banking Implementation Entity) for use within the UK and its territories; equivalent to QSEAL in the EU.

  • OBWAC

    eIDAS certificate registered with OBIE (Open Banking Implementation Entity) for use within the UK and its territories; equivalent to QWAC in the EU.

  • offset

    The position in a dataset of a particular record. By specifying offset, you retrieve a subset of records starting with the offset value.

  • OKI

    Open Knowledge Initiative – organization responsible for the specification of software interfaces comprising a Service Oriented Architecture (SOA) based on high level service definitions.

  • Open Banking

    Provides third-party financial service providers open access to consumer banking, transaction, and other financial data from banks and non-bank financial institutions through the use of application programming interfaces (APIs). Open banking will allow the networking of accounts and data across institutions for use by consumers, financial institutions, and third-party service providers.

  • OTP

    One-time password – also known as one-time pin or dynamic password. OTP is valid for only one login session or transaction and is the part of SCA (two-factor authentication)—ensuring authentication via something the user has (a mobile device with SMS or an app that generates and displays the OTP), as well as something the user knows (a valid OTP).

  • PA-DSS

    Payment Application Data Security Standard – Council-managed program formerly under the supervision of the Visa Inc. program known as the Payment Application Best Practices (PABP). The goal of PA-DSS is to help software vendors and others develop secure payment applications that do not store prohibited data, such as full magnetic stripe, CVV2 or PIN data, and ensure their payment applications support compliance with the PCI DSS. Payment applications that are sold, distributed or licensed to third parties are subject to the PA-DSS requirements. In-house payment applications developed by merchants or service providers that are not sold to a third party are not subject to the PA-DSS requirements, but must still be secured in accordance with the PCI DSS.

  • paged list

    Used for managing a list of remotely paged (lazy-loaded) objects beginning at an offset (place in the list).

  • pagination

    A PagedList response returns multiple records, based on an offset and limit. The offset indicates the starting point in the list. Use ‘null’ for the first page. The limit indicates the number of records per page (< 100).

  • PAN

    Primary Account Number – refers to a 14-, 15-, 16-, or even up to 19-digit number generated as a unique identifier designated for a primary account; also called payment card number and permanent card number.

  • payment confirmation page

    A payment confirmation page is shown when either (a) Token performs the "Redeem Token" part of the flow or (b) the request is submitted "on behalf of" the TPP.

  • PCA

    Personal current account

  • PCI DSS

    Payment Card Industry Data Security Standard – a set of requirements intended to ensure that all companies that process, store, or transmit credit card information maintain a secure environment.

  • PEM

    PEM or Privacy Enhanced Mail is a Base64 encoded DER certificate.

  • PFM

    Personal Financial Management – refers to software that helps users manage their money. PFM often lets users categorize transactions and add accounts from multiple institutions into a single view.

  • PGP

    Pretty Good Privacy – cryptographic method that lets people communicate privately online. When you send a message using PGP, the message is converted into unreadable ciphertext on your device before it passes over the Internet. Only the recipient has the key to convert the text back into the readable message on their device.

  • PHP

    Recursive acronym for Hypertext Preprocessor – a widely-used open source general-purpose scripting language for web development embedded into HTML.

  • PIN

    Personal Identification Number – a security code for verifying a customer-user's identity.

  • PIS

    Payment Initiation Service – with the consent of the end-user, initiates a payment from a user-held account upon user authentication.

  • PISP

    Payment Initiation Service Provider – a TPP that initiates a payment order at the request of the payment service user with respect to a payment account held at another payment service provider.

  • PKI

    Public Key Infrastructure – set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. PKI binds public keys with the identity of an organization or individual. The binding is established through a process of registration and issuance of certificates by a certificate authority (CA).

  • PLN

    Currency code representing the official currency and legal tender of Poland. It is subdivided into 100 grosz (gr). The widely recognised English form of the currency is the Polish zloty.

  • PlusGiro

    Formerly PostGirot, PlusGiro is a Swedish money transaction system, owned by Nordea.

  • Podfile

    Specification that describes the dependencies of the targets of one or more Xcode projects. The file should simply be named Podfile . All the examples in the guides are based on CocoaPods version 1.0 and onwards.

  • pojo

    POJO stands for Plain Old Java Object. It is an ordinary Java object, not bound by any special restriction other than those forced by the Java Language Specification and not requiring any classpath. POJOs are used for increasing the readability and re-usability of a program.

  • PolishAPI

    Open Banking API standard adopted by banks in Poland to enable TPP access to payment accounts in accordance with PSD2 rules and regulations.

  • POM

    Project Object Model – fundamental unit of work in Maven. It is an XML file that contains information about the project and configuration details used by Maven to build the project. It contains default values for most projects.

  • port number

    Ports provide a multiplexing service for multiple services or multiple communication sessions at one network address. A port number is always associated with the IP address of a host and the type of transport protocol used for communication. It completes the destination or origination network address of a message. Specific port numbers are reserved to identify specific services so that an arriving packet can be easily forwarded to a running application. For this purpose, the lowest-numbered 1024 port numbers identify the historically most commonly used services and are called the well-known port numbers. Higher-numbered ports are available for general use by applications and are known as ephemeral ports.

  • Postman

    A tool for performing integration testing with your API. It allows for repeatable, reliable tests that can be automated and used in a variety of environments and includes useful tools for persisting data and simulating how a user might actually be interacting with the system.

  • Pragma header

    The Pragma HTTP/1.0 general header is an implementation-specific header that may have various effects along the request-response chain. It is used for backwards compatibility with HTTP/1.0 caches where the Cache-Control HTTP/1.1 header is not yet present.

  • proprietary code

    Software owned by the bank or vendor that developed it. There are typically restrictions in place governing its use and the underlying source code for the software is a closely guarded secret.

  • protocol buffer

    Specifies how serialized information is structured by defining message types in .proto files. Each protocol buffer message is a small logical record of information containing a series of name-value pairs. Protocol buffers have many advantages over XML for serializing structured data, including being simpler, 3 to 10 times smaller yet 20 to 100 times faster, all whilst being less ambiguous, in addition to generating data access classes that are easier to use programmatically.

  • PSD2

    Revised Payment Services Directive 2 PSD2 provides the legislative and regulatory foundation for Open Banking and other broader initiatives at a UK and European level relating to open access to payment accounts. The European Banking Authority (EBA) recently extended the deadline for PSD2 compliance until December 31, 2020.

  • PSP

    A PSP is a Payment Service Provider that provides an online service for accepting electronic payments to businesses, merchants and utility companies, amongst others. These payments can be through a number of methods e.g. credit cards, direct debits, real-time bank transfers, cash payments, wallets and prepaid cards. PSPs include banks and other payment institutions.

  • PSU

    Payment Services User – an individual person or legal business entity making use of an Open Banking service as a payee, payer or both.

  • public key

    Cryptographic key that can be obtained and used by anyone to encrypt messages intended for a particular recipient, such that the encrypted messages can be deciphered only by using a second key known only to the recipient (the private key ).

  • QSeal

    Qualified Electronic Seal Certificate – a qualified digital certificate under the trust services defined in the eIDAS Regulation. A certificate for electronic seals makes it possible for the owner of the certificate to create electronic seals on any data.

  • QSealC

    Qualified eSeal Certificate – “seals” app data, sensitive documents and other communications to ensure they are tamperproof and originate from a trustworthy source.

  • QTPSP

    Qualified Third-Party Service Provider – a TPP authorized in their home country by the financial supervisory competent authority to provide services listed in the PSD2 directive. Qualified Certificates supporting PSD2 include information about the authorization number of the TPP, its home country’s supervisory competent authority and its roles. This information is verified by a Qualified Trust Service Provider (QTSP) when the TPP requests the certificate; after which, this information is included in the certificate for the purpose of identification by others.

  • QTSP

    Qualified Trust Service Provider – trust service that creates, verifies and validates electronic signatures, seals or time stamps, electronically-registered delivery services and certificates that are related to those services. For a trust service to be considered a qualified trust service, the trust service must meet the requirements put forth in the eIDAS Regulation.

  • QWAC

    Qualified Web Authentication Certificate – certificate that validates your identity and role as a Payment Service Provider to your customers and other business, while encrypting and authenticating sensitive data.

  • realm (Internet)

    Internet domain whose fully-qualified domain names (FQDNs) typically all share a domain designation. For example, if example.com is the realm name, the addressable hosts in the realm could then have names like host1.example.com, host2.subdomain1.example.com, etc.

  • realm (Token Open Banking)

    The services, feature set, functionality and contents supported by an Open Banking services provider. A bank's realm, for instance, comprises the Open Banking services and products supported by a particular bank. The realm comprises all the services and feature content supported by as the TSP; whereas a Reseller's realm is restricted to the services and feature content administered by a particular Reseller under its reseller agreement with .

  • Regex

    API to define a pattern for searching or manipulating strings.

  • RepositoryHandler

    A RepositoryHandler manages a set of repositories, allowing repositories to be defined and queried.

  • Representable

    Interface representing the part of a Token member's account information that can be accessed based on the permissions granted in an access token.

  • Request URL

    Refers to the URL as it is given in the actual HTTP request. In normal HTTP requests, the URL scheme and host have already been handled by the time the request is sent (and the URL fragment does not exist at the HTTP protocol level at all), meaning the Request-URI is a path-absolute-URL string, possibly followed by ? and a URL-query string.

  • resellers

    PSPs/gateways that use Token as a TSP to offer open banking payments to their customers.

  • RESTful API

    REST stands for REpresentational State Transfer, an API architectural structure for distributed hypermedia systems. The key component in REST is a resource. Any information that can be named can be a resource: a document or image, a temporal service, a collection of other resources, a non-virtual object (e.g. a person), and so on. REST uses a resource identifier to identify the particular resource involved in an interaction between components. For more on the fundamentals of REST, visit restfulapi.net.

  • RFC

    Request for Comments – a formal document from the Internet Engineering Task Force ( IETF ) that is the result of committee drafting and subsequent review by interested parties.

  • RPC

    Remote Procedure Call – a protocol used by one program to request a service from a program located in another computer on a network without having to understand the network's details. A procedure call is also sometimes known as a function call or a subroutine call. RPC uses the client-server model.

  • rpcgen

    A tool that generates C code to implement an RPC protocol. The input is a language similar to C known as RPC Language (Remote Procedure Call Language).

  • RPCL

    Remote Procedure Call Language – identical to the eXternal Data Representation (XDR) language, except for its added program definition.

  • RS256

    Asymmetric algorithm using a public/private key pair. The identity provider has a private (secret) key used to generate the signature, and the consumer of the JWT gets a public key to validate the signature. Since the public key, as opposed to the private key, doesn’t need to be kept secured, most identity providers make it easily available for consumers to obtain and use (usually through a metadata URL).

  • RSA

    Public-key cryptosystem for both encryption and authentication. Under RSA, the encryption key is public and it is always different from the decryption key which is kept secret (private). Anyone can use the public key to encrypt a message, but only someone with the private key can decode the message. The RSA acronym is derived from the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly described the algorithm in 1977.

  • RTS regulations

    Regulatory Technical Standard – detailed specifications to achieve the strict security requirements for payment service providers in the EU.

  • SaaS

    Software as a Service (SaaS) – a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet. SaaS is one of three main categories of cloud computing, alongside infrastructure as a service (IaaS) and platform as a service (PaaS).

  • SCA

    Strong customer authentication (SCA) is a requirement of the EU Revised Directive on Payment Services (PSD2) on payment service providers within the European Economic Area. The requirement ensures that account access for information and electronic payments is safeguarded by multi-factor authentication.

  • SCA-RTS

    Technical standards on strong customer authentication and common and secure methods of communication made by the FCA under Regulation 106A of the Payment Services Regulations (https://www.handbook.fca.org.uk/handbook/glossary/G2621.html).

  • SCT

    SEPA Instant Credit Transfer – Electronic retail payments processed in real time, 24 hours a day, 365 days a year; funds are made available immediately for use by the recipient.

  • SDK

    Software Development Kit – the set of software tools and programs used by developers to create applications for the Token platform. Token's SDK includes libraries, documentation, code samples, processes, and guides that developers integrate into their own apps.

  • Secure Enclave

    Apple's hardware-based iOS key manager that’s isolated from the main processor to provide an extra layer of security. When you store a private key in the Secure Enclave, you never actually handle the key, making it difficult for the key to become compromised. Instead, you instruct the Secure Enclave to create the key, securely store it, and perform operations with it. You receive only the output of these operations, such as encrypted data or a cryptographic signature verification outcome.

  • SEK

    Swedish Krona, official currency of Sweden. One krona is subdivided into 100 öre.

  • SEPA

    Single Euro Payments Area – a payments system created by the European Union (EU) which harmonizes the way cashless payments transact between euro countries. European consumers, businesses, and government agents who make payments by direct debit, instant credit transfer, and through credit transfers use the SEPA architecture. The single euro payment area is approved and regulated by the European Commission. SEPA currently includes 36 members. It encompasses the 28 EU member states along with Iceland, Norway, Liechtenstein, Switzerland, Andorra, Vatican City, Monaco and San Marino. The single euro payment area remains an ongoing, collaborative process between these parties. SEPA is in the process of harmonizing rules regarding mobile and online payments.

  • SEPA Instant

    Euro credit transfers with the funds made available on the account in less than ten seconds at any time and in an area that will progressively span over 27 EU countries and an additional 17 non-EU countries, autonomous regions and territories.

  • SEPA member countries

    Consists of the 28 EU member states together with the four members of the European Free Trade Association (Iceland, Liechtenstein, Norway, and Switzerland), plus Monaco and San Marino.

  • server

    A computer that provides data to other computers. Many types of servers exist, including web servers, mail servers, and file servers. Each type runs software specific to the purpose of the server. For example, a Web server may run Apache HTTP Server or Microsoft IIS, which both provide access to websites over the Internet. A mail server may run a program like Exim or iMail, which provides SMTP services for sending and receiving email. A file server might use Samba or the operating system's built-in file sharing services to share files over a network.

  • service interface definitions

    Programmatic interface specifications describing services. These interfaces are specified by the Open Knowledge Initiative (O.K.I.) to implement a service-oriented architecture (SOA) to achieve interoperability among applications across a varied base of underlying and changing technologies.

  • SHA-256

    Hash function computed with eight 32-bit words.

  • SHA1

    Secure Hash Algorithm 1 – Hashing algorithm governing document and certificate signing. It takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as a hexadecimal number, 40 digits long.

  • signature

    A qualified electronic signature is an electronic signature that is compliant to EU Regulation No 910/2014 (eIDAS Regulation) for electronic transactions within the internal European market. It verifies the authorship of a declaration in electronic data exchange over long periods of time. Qualified electronic signatures can be considered as digital equivalent to handwritten signatures.

  • signing

    To sign a request, you first calculate a hash (digest) of the request. Then you use the hash value, some other information from the request, and your secret access key to calculate another hash known as the signature.

  • single euro payments area

    Market comprising the 28 EU member states toether with the four members of the European Free Trade Association (Iceland, Liechtenstein, Norway, and Switzerland). Monaco and San Marino are also part of SEPA.

  • SIP

    Single Immediate Payment – an interbank transfer initiated for immediate execution.

  • SMS

    Stands for Short Message Service and is the most widely used type of text messaging.

  • SO

    Standing Order – a series of recurring payments initiated for execution on scheduled dates (or variable dates, where supported) or at a defined frequency between a specified start date and end date.

  • SOA

    Service-oriented Architecture – a style of software design where services are provided to the other components by application components, through a communication protocol over a network. A SOA service is a discrete unit of functionality that can be accessed remotely and acted upon and updated independently.

  • SORBNET

    Poland's national RTGS system for high-value and urgent domestic payments. RTGS stands for real-time gross settlement, a continuous process of settling payments on an individual order basis without netting debits with credits across the books of a central bank (i.e., transaction bundling). SORBNET is owned and operated by the National Bank of Poland (NBP). It has 50 direct participants.

  • SORT code

    Number code used by British and Irish banks using six digits divided into three different pairs; for instance, 12-34-56. These codes, like many other bank codes, are used to identify the location of the bank where the account is held. The first two digits are usually bank identifiers. However, in some cases, the first code may describe the bank as well. It must be noted that the SORT code of a bank is integrated and encoded in the IBAN number of the account but not in the BIC codes of the account. A SORT code is used by banks to identify and route the money transfers to the respective bank and account. SORT codes are also called NSC or National SORT Code in Ireland and are regulated by the IPSO (Irish Payment Services Organization). A SORT Code in Ireland begins with the digit “9”.

  • special characters

    Also referred to as masked characters and HTML entities, special characters are part of an encoded character set that extends beyond the characters available on a conventional keyboard. They include Greek letters, mathematical symbols, arrows, currencies, dingbats (ornaments), and graphics, as well as checkmarks and symbols for copyright and trademarks.

  • spinal-case

    Code case that uses hyphens “-” to separate the words comprising a name. Also called Kebab case.

  • splash screen

    Customisable initial window or page of the Webapp UI containing an image, a logo, and the current version of the software.

  • SPOF

    Single point of failure – part of a system that, if it fails, will stop the entire system from working.

  • SSA

    Sofware Statement Assertion – a software statement that is signed by its issuer and represented as a JSON Web Signature (JWS). An SSA may be issued by any actor that is trusted by the authorization server.

  • SSL certificate

    SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser.

  • SSL certificates

    Small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser. SSL certificates bind together a domain name, server name or hostname, as well as an organizational identity (i.e., a company name) and location.

  • standing orders

    Instruction to the bank to pay a fixed amount at regular intervals to the destination account. The instruction is sometimes called a "banker's order."

  • STET

    Created according to the new Payment Services Directive (PSD2), this API aims to provide a secure and easy-to-use set of services to be implemented by European ASPSPs.

  • Sweeping

    The movement of a customer’s own funds between accounts owned by them.

  • SWIFT

    Society for Worldwide Interbank Financial Telecommunication – provides a secure network allowing more than 10,000 financial institutions in 212 different countries to send and receive information about financial transactions to each other. As broadly used as SWIFT is, keep in mind that it is only a messaging system; SWIFT does not hold any funds or securities, nor does it manage client accounts.

  • T&C

    Terms of service (also known as terms of use and terms and conditions, commonly abbreviated as TOS or ToS, ToU or T&C) are the legal agreements between a service provider and a person who wants to use that service. Terms of service can also be merely a disclaimer, especially regarding the use of websites.

  • TARGET2

    Owned and operated by the Eurosystem, TARGET2 is the real-time gross settlement (RTGS) system with payment transactions settled one by one on a continuous basis in central bank money with immediate finality. There is no upper or lower limit on the value of payments. TARGET2 mainly settles operations of monetary policy and money market operations.

  • TCP

    Transmission Control Protocol – standard that defines how to establish and maintain a network conversation through which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other. Together, TCP and IP are the basic rules defining the Internet. The Internet Engineering Task Force (IETF) defines TCP in the Request for Comment (RFC) standards document number 793.

  • Technical Service Provider

    Under PSD2, a Technical Service Provider renders purely technical services, usch as the processing and storing of data, services for privacy protections, and the provision of IT and communication infrastructure, without entering into the possession of funds, whilst also not qualifying as a PISP or AISP.

  • the spinal-case

    Variant of snake case which uses hyphens “-” to separate words.

  • TLD

    Top-level domain – refers to the final segment of the domain name. TLDs are generally classified into two categories: generic (.com, .org, .net., .biz) and country-specific (lower-case, alpha-2 country code).

  • TLS

    Transport Layer Security – a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers.

  • token

    For PSD2, smart tokens come in two kinds: transfer tokens and access tokens. Transfer tokens authorize payment or the transfer of assets or funds from a payer to a designated payee. They function as programmable money. Access tokens authorize user-approved access to a member's bank account information. The type and level of access granted by the bank depends on the conditions set for the access token — “who,” “what,” “how,” and "when" that data can be accessed and "by whom".

  • token-based authentication

    Mechanism through which the TPP is issued an API access token upon successful authentication, which must thereafter be used while invoking any API request.

  • token (payment rail)

    primary account number – card identifier found on payment cards, such as credit cards and debit cards, as well as stored-value cards, gift cards and other similar card, sometimes referred to as a bank card number

  • token account identifier

    One of four supported categories of accountIdentifiers defined in the API's AccountDetails object. It identifies the user member's account by accountId and memberId.

  • Token Service Provider

    Organisation responsible for the issuance and management of payment tokens.Tokenisation increases security to safeguard against potential fraud by removing confidential consumer information from payment data and replacing it with unique tokens, which are limited in how and when they can be used.

  • TokenOS

    Provides turnkey PSD2 and OBIE compliance that allows third-party providers to easily and securely develop applications that support payment initiation and account information retrieval. The core of TokenOS is the "smart token," providing authorization to access an underlying asset. Smart tokens define the conditions (rules) governing access to the asset.

  • TPP

    Third-Party Provider – an authorized online service provider introduced as part of Open Banking. TPPs exist outside of the account holder’s relationship with their bank but may be involved in transactions carried out by the user.

  • transport key

    Transport keys protect a key that is sent to another system, received from another system, or stored with data in a file. Transport keys can be either AES or DES keys.

  • TSP

    Technical Service Provider – responsible for assuring the electronic identification of signatories and services by using strong mechanisms for authentication, digital certificates and electronic signatures. eIDAS defines how TSPs perform authentication and non-repudiation services and how they are to be regulated and recognized throughout EU member states.

  • TTID

    token-trace-id – unique value stored with a TPP request upon submission to Token and thereafter used to track the request throughout its lifecycle.

  • UDP

    User Datagram Protocol – a transport layer protocol that is used to create a connection between applications running on hosts that are connected via a network.

  • UI

    User Interface – at the most basic level, this is the series of screens, pages, and visual elements—like buttons and icons—that enable a user to interact with your product or service.

  • UKOpenBanking

    Standard adopted by banks doing business in the United Kingdom designed to assist any European account providers in meeting their PSD2 and RTS requirements, as well as supporting their application for an exemption from the contingency mechanism.

  • URI

    A Uniform Resource Identifier (URI) is a string of characters that unambiguously identifies a particular resource. To guarantee uniformity, all URIs follow a predefined set of syntax rules, but also maintain extensibility through a separately defined hierarchical naming scheme (e.g. http://).

  • URL

    Uniform Resource Locator (aka web address) – specifies a location on a computer network and a mechanism for retrieving it.

  • URL decode

    URL encoding makes sure that the characters in the URL that are not allowed to be put into the URL directly can still be used. For example a space or : is not allowed, but replacing it with %20 or %3A encodes a space or : (and most browsers will display a space in the browser bar). For encoded URLs, use Java's URLDecoder (java.net.URLDecoder) unless you have a different preference.

  • user authentication

    Strong customer authentication (SCA) is a requirement of the EU Revised Directive on Payment Services (PSD2) on payment service providers within the European Economic Area. The requirement ensures that electronic payments are performed with multi-factor authentication, to increase the security of electronic payments.

  • UTC

    Coordinated Universal Time – a standard used to set all time zones around the world. For instance, Berlin is in the time zone UTC plus one hour (UTC+1:00), which means it is 1 hour later in Berlin than the reading on a UTC clock. Most EU countries are in the Central European Time zone. CET alternates between UTC+1 (standard time) and UTC+2 (when daylight saving time (DST) is observed). All countries in the CET time zone observe DST (UTC+2) from 02:00 am on the last Sunday of March until 03:00 am on the last Sunday of October.

  • UX

    User Experience – the overall experience of a person using a product such as a website or computer application, especially in terms of how easy or pleasing it is to use.

  • UX.

    User experience – refers to any interaction a user has with a product or service.

  • VAT

    Value-added tax – general, broadly based consumption tax assessed on the value added to goods and services. It applies to all goods and services bought and sold for use or consumption in the EU and the UK, as well as in more than 160 countries worldwide.

  • VAT number

    Registered tax identification number in tax systems that use Value-Added Tax (VAT). When you register for VAT in a single country, you receive a VAT number for their tax system. Your VAT number is not the same as a local tax number or tax ID. A VAT number is exclusively for the Value-Added Tax scheme.

  • VRP

    Variable Recurring Payment

  • WAF

    Web Application Firewall – helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.

  • Webpack

    Module bundler for JavaScript files that takes care of bundling alongside a separate task runner.

  • WebView

    A browser engine that you can insert like an iframe into your native app and programmatically tell it what web content to load.

  • X.509

    Standard format for public key certificates – digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations.

  • XDR

    eXternal Data Representation (XDR) – a standard for the description and encoding of data. XDR uses a language to describe data formats, but the language is used only for describing data and is not a programming language.

  • XFF header fields

    Common method for identifying the originating IP address of a client connecting to a web server through an HTTP proxy or load balancer.

  • XML

    Extensible markup language – software- and hardware-independent tool for storing and transporting data.

  • XS2A

    PSD2 contains requirements for the banks (ASPSPs) to make their customers' account information available to TPPs under certain conditions, allowing the TPPs to continue (or start) providing their PIS and AIS. These requirements are usually referred to as the Access to Accounts part (XS2A) of the PSD2.

  • Yarn

    Tool developed by Facebook to resolve some of npm’s shortcomings. Yarn isn’t technically a replacement for npm since it relies on modules from the npm registry. Think of Yarn as a new installer that still relies upon the same npm structure.

If you have any feedback about the developer documentation, please contact devdocs@token.io