Abbreviation
Meaning
APIApplication Programing Interface
SDKSoftware Development Kit
DCDigital Credential
BLEBluetooth Low Energy
ISOInternational Organization for Standardization
OIDCOpenID Connect
PKIPublic Key Infrastructure
SSLSecure Sockets Layer, a cryptographic protocol used for network traffic
PIIPersonal Identifiable information
PINPersonal Identification Number
RESTRepresentation State Transfer, an architectural style for developing web services.
QR CodeQuick Response Code
APNSApple Push Notification Service
CIBAClient Initiated Back-End Authentication
DMVDepartment of Motor Vehicles; also, Division of Motor Vehicles
DRSDisaster Recovery System (or Site)
FCMFirebase Cloud Messaging
MTLSMethod for mutual authentication. MTLS ensures that the parties at each end of a network connection are who they claim to be by verifying that they both have the correct private key. The information within their respective TLS certificates provides additional verification.
GAFAMGoogle, Apple, Facebook, Amazon & Microsoft
GDPRGeneral Data Protection Regulation
GUIDsGlobal Unique Identifiers
HSMHardware Security Module
ID&VIdentity Document & Verification
ICAMIdentity, Credentialing and Access Management
ICAOInternational Civil Aviation Organization. A UN specialized agency that works with the member states and industry groups to set standards, recommended practices, and policies in support of a safe, efficient, secure, economically sustainable, and environmentally responsible civil aviation sector.
IdMIDEMIA Identity Management
idpIdentity Provider
IDVIdentity Document & Verification
JABJoint Authorization Board
NFCNear-Field Communication. A set of communication protocols between two electronic smartphones over a distance of 4 cm or less
OCSPCertificate Status Protocol Checks
OWASPOpen Web Application Security Project, a nonprofit foundation that works to improve the software security.
SSNSocial Security Number
PADPresentation of Attack Detection
PAMPrivileged Access Management
TEETrusted Execution Environment
UMAUser Managed Access
PaaSPlatform-as-a-Service
SCIMSystem for Cross-domain Identity Management, an open standard for automating the exchanged of end-user identify information between identify domains.
SaltsRandom data that is used as an additional input to be hashing to increase data security.
LoTLevel of Trust

General Terms and Definition 

Terms
Definition
Issuing AuthorityThe company or agency issuing the digital version of the credential to the end-user to be stored as a Mobile ID
Relying PartyThis is the party that requests attributes from credential holder
EnrollmentCollection of all steps user has to perform through mobile device to have a document registered on this device.
DisenrollmentDisenrollment is when an end-user unenrolls themselves from the Mobile ID App
eDocumentElectronic document
KeyStoreA repository of security certificates -- either authorization certificates or public key certificates -- plus corresponding private keys
Encryption KeyIn cryptography, a random string of bits generated specifically to scramble and unscramble data
WhitelabelA product feature that enables a technology partner to rebrand the product with its own logo, colors, fonts, and other branding elements.
Sor/ SORSystem of Record, an authoritative data store containing the most current driver's license information, including signatures and photos of the driver's license holders
Mobile ID Backend ServiceConnects with core ID services to verify identities during enrollment, manage the lifecycle of the Mobile ID's, performs digital signatures to sign the digital identities attributes and integrate with Relying parties using OIDC standard.
Provisioninginitial loading of Mobile ID information into an Mobile ID app
WalletA Wallet is a centrally stored credential container - identified by a unique identifier. It contains an index to the credentials and their metadata. Wallet may be accessed from multiple devices, and it may index credentials from different issuers. A Wallet belongs to a single physical person. The Wallet does not maintain a master identity to which credential attributes contribute.
Digital CredentialA credential is a set of identifiers or attributes from an issuer stored on a given device (as opposed to centrally stored). The credential is bound to the device at issuance time by embedding key material unique to the device. The credential content integrity can be verified cryptographically by its issuer digital signature.
Credential HolderAn end-user (individual, company, or guardian of an object) who owns the digital credentials held in the smartphone. The Credential Holder receives requests for verification of their Mobile ID digital credential periodically from others via the Mobile ID Verify App.
Mobile ID CredentialThis is the cryptographically signed and verified attribute package sent back to the end-user's smartphone.
Multi-tenet cloudA cloud computing architecture that allows customers to share computing resources in a public or private cloud. Each tenant's data is isolated and not visible to other tenets.
HashA mathematically generated value from a string of text. Hashes are used to enable security during the process of message transmission.
TwilioA cloud-based service that enables powerful communication between mobile smartphones, applications, services, and systems throughout the business in order to bridge the gap between conventional communication.
IDEMIA SoR AdapterIDEMIA's interoperability solution that connects to an issuing Authority SoR to deliver and manage Mobile ID Solutions.