The G+D logo on blue background

Glossary

3G

3G, also known as UMTS, is the third generation of wireless mobile telecommunications technology. It is the upgrade for 2.5G GPRS and 2.75G EDGE networks, enabling faster data transfer.

5G

5G is the latest standard for next generation cellular connectivity after 4G, developed to greatly enhance the speed and responsiveness of wireless networks. More available bandwidth, low latency and advanced antenna technology faciliates the massive scalability of deployments.

Acceptance rate

Maximum quantity in percent of banknotes not rejected by a banknote scanning system. Crucial to the acceptance rate are the machine-readable features for determining value and authenticity of the banknotes.

Active authentication

This uses a challenge/response mechanism based in public key cryptography and any digital signatures. It provides proof that the document is not copied and refers to the correct certificate issuer.

ADC

Automatic Device Configuration Automatically triggered download and configuration of appropriate settings and data Over-the-Air to a specific handset or terminal.

ADD

Automatic Device Detection Method for automatically pairing a mobile subscription identifier (IMSI/MSISDN) with terminal identifier (IMEI). When a new pairing is detected, this may trigger an ADC See also: ADC

AirOn360®

Complete solution for over-the-air administration of SIM cards, terminals, and mobile value-added services in an M2M environment.

Animat

Animated matt effects on holograms that are aligned in such a way so as to make pumping or running effects visible.

API

API is the short name of Application Programming Interface. It's a language and message format used by an application program to communicate with the operating system such as a database management system.

Applet

Applet is formed from the words 'application' and 'snippet' and refers to: a Java program (Java applet) running in a Web browser – a computer program that is not operated as an independent application (widget).

Application

Banknote papers are enhanced by the addition of security foil elements and printed effects.

Art. 6 compartment

Special deposit terminal stacker, in which banknotes suspected of being counterfeit can be stored separately.

ATM

ATM - Automated Teller Machine, a self service terminal for the secure dispensing of cash without the assistance of bank staff.

Authentication

Authentication is the process of proving that a banknote or security document is genuine by checking the watermark or by feeling the intaglio embossing of a banknote.

Authenticity

The condition of a security element of a banknote or security document being genuine or of an ID document being unaltered.

Authenticity detection

The authenticity of banknotes can basically be established in two ways: 1. With the human senses, like sight and touch (so-called “human feature”) 2. With the aid of tools, such as: a) Sensors in BPS® systems (machine-readable feature) b) Magnifying glass, UV light, ruler c) With forensic materials, e.g. high-tech laboratory equipment (electron microscope, AAS, NMR, ESR, etc.)

Band

Paper strip that holds a banknote package together. The band can be printed with the origin and processing data so that the depositor can be traced if there are any discrepancies.

Banknote Analyzer

Tool on the BPS® machine for analyzing measured banknote properties.

Banknote bundle

Five or ten bundled banknote packages (straps)

Banknote package

100 banded banknotes (strap)

Banknote packing system

Designed for the secure and (completely) automated packing of banknotes; available as an online or offline system. Systems from G+D: NotaPack®

Banknote paper

The banknote substrate is a special paper produced on a cylinder mould paper machine and usually made of 100% cotton.

Banknote Processing System (BPS®)

G+D develops and supplies solutions for counting, checking, and sorting banknotes. Depending on the configuration, the banknotes can also be banded online and then bundled or destroyed if necessary. The G+D banknote processing systems are not only used in national and commercial banks, but just about everywhere where larger amounts of cash circulate; for example in retail trade, in shopping malls, hotels, casinos, cash-in-transit companies, and many more. The highly developed measurement technologies used to evaluate the authenticity and condition of the banknotes are constantly being adapted to the current market requirements and new security features.

Banknote substrate

Banknote substrate based on various materials such as cotton, polymer or a combination of the two (so-called hybrid substrates).

BanknoteCanceler

Punch to cancel banknotes that are no longer fit for circulation (unfit banknotes). Two variants are offered: BanknoteCanceler 40 M, with manual feeding and BanknoteCanceler 40 A, with automatic feeding.

Barcode reader

Scanner to record a barcode, for example, on the header cards

Basic Access Control

This uses challenge/response mechanisms based on triple DES recommendations. It has the advantage of preventing skimming and eavesdropping via a secure communication.

BDS®

Abbreviation for "Banknote Destruction System” and is the main term for all banknote destruction and briquetting systems from G+D. It consists mainly of the following modules: Storage and feeding system, destruction system, suction system, silo, filter, briquetting press, as well as a monitoring and control system.

Bi-metallic foil stripe

A security foil element that can be distinguished by having two different metals (e.g. aluminum and gold) placed next to one another

Biometric feature

Measurable, distinct physical characteristic or personal trait that can be used to recognise the identity or verify the claimed identity of an enrolled person.

Biometrics

Biometric is a technology who help to enhance the security. It can be use for smart cards, in company to verify entrances and exits or to protect a computer. The biometric technology will replace the use of the passwords and up the level of security by insuring the real indentity of the user. For example, the biometric technology use the fingerprint or the iris to reveal the indentity.

BioP@ss

Completed European research project to increase smart card security for future electronic ID documents valid throughout the EU.

BIP

Bearer Independent Protocol, a way of delivering Short Messages to a mobile phone over an IP network.

Bluetooth

Bluetooth is a transmission specification for digital data exchange between 2 or more devices over short-range radio wawes. This data can be documents, pictures, videos or voices.

BN

Abbreviation of “banknote”

Bootstrap

The process in which an OMA DM account is set up for the very first time or when re-installing a missing OMA DM account. The process by which an un-configured device is taken from its initial state to a configured state.

BPS®

BPS® = system for the automatic processing of banknotes and currency. Depending on the configuration, it can detect the authenticity and value of the banknote, count, sort, band, and bundle the banknotes. The main areas of implementation are national banks, commercial banks, cash centers, casinos, and many other places.

BPS® Connect

Software for networking BPS® banknote processing systems in cash centers that optimizes cash process management.

Broadband

A description of a communication channel that can support large amounts of data at relatively high speeds. Broadband networks normally combine voice, data, and multimedia.

BSD

Short for "Buyer Supplied Detector". Customer-specific sensor with standardized interface for the BPS® machine.

C-V2X

The industry standard for vehicle communication - Cellular Vehicle-to-Everything (C-V2X) technology enables communication among a vehicle and any entity that can influence or is influenced by the vehicle. Standardised by 3rd Generation Partnership Project (3GPP), this 4G and 5G-based technology is designed to connect vehicles to each other (V2V), to roadside infrastructure (V2I), to pedestrians and cyclists (V2P), and to cloud-based services.

Calypso

Calypso is an international electronic ticketing standard for microprocessor contactless smart cards, originally designed by a group of transit operators from eleven countries including Belgium, Canada, France, Germany, Italy, Latvia, México, Portugal and others.

CAMS

The Card Application Management System controls all functions in the lifecycle of a card, from production, programming, personalization, and issuing of the card through the continuous maintenance of data and applications during the service life to disabling it if it is lost or no longer valid.

CAN

Abbreviation for “Controller Area Network”: Real-time computer network for the internal control of BPS® machines. Contrary to LAN, the arbitration and collision avoidance behave in a deterministic way and do not reduce the possible data rate.

Card

Common term for devices that are based on smart card technology. SIM card has become the de facto way of referring to Smart Cards used for cellular telephony networks.

Card reader

An electrical and mechanical device of simple construction that can receive a smart card and make electric contact with them. In contrast to terminals, card readers have no display or keypad. Despite the name, card readers can usually also be used to write data onto the card.

Cash Center

(Central) processing center for large volumes of cash

Cash Cycle

Describes the various typical stages in the lifecycle of cash – from manufacture through usage and processing to destruction.

Cash Management

Management and control of cash in circulation.

Cash recycling

Recycling means that banks and cash-in-transit companies can pay out banknotes that have been checked for authenticity and sorted for fitness without any additional checks by the central bank (sometimes also referred to as "recirculation").

Cash-in machine

Cash deposit machine

CB

Cell Broadcast An alternate push bearer in SmartTrust® Wib 2.0. In order to use live CB, the SmartàLaCarte GeoCast option is needed.

CBDC

Short for Central Bank Digital Currency. A digital form of a country's fiat currency issued by the central bank. Filia® is G+D's CBDC solution

CDR

Charging Data Record, also Call Detail Record Records generated from traffic events in a telecommunications network that can form input to billing post processing.

Chip card

The chip card is a plastic card who integrates a computer chip. With this chip, the performances of the card are better than the magstipe card like a higher memory capacity and a better security of the data. Chip card is also known as smart card or memory card.

CIPURSE™

Open security standard for transport and ticketing systems.

Circulation

Description of the lifecycle of banknotes starting with their issue and ending with their destruction.

Clean Note Policy

Policy adopted by central banks to maintain the high quality of circulating banknotes, especially in terms of cleanliness.

Cleartext

Is a negative text in which the text elements become legible when looked through. The nontransparent part is normally generated by means of metallization. See also Demetallization.

Cleartext thread

Security thread in the banknote paper with negative text in which the text elements become legible in transmitted light.

Cloud

Cloud is a data center available to many users or organizations over the Internet. This computer system resources are used without direct active management by the application user.  Public Cloud infrastructure is available to many organizations whereas Private Cloud infrastructure is operated solely for a single organization.

ColourShift effect

See ColourShift.

ColourShift/ColourFix

Security element featuring an optical surface divided into two sections. The ColourShift section changes color dramatically when tilted while the ColourFix section retains its original color. At a particular angle, the ColourShift and ColourFix sections are the same color, but then change color when viewed at a different angle

ColourShift/ColourFix thread

 A security thread in the banknote paper with an optical surface featuring ColorShiftt/ColourFix effects.

Compass Cash Center Enterprise

Cash center management software that automates the procedures in the cash center.

Connected car

A connected car utilizes cellular connectivity to communicate bidirectionally over wireless networks with other systems outside the vehicle. This allows to share and digitally process information existing within the vehicle and in its environment.

Contact-based card

A card that transfers power and data between the chip on the card and the card reader via an electrical terminal consisting of six to eight gold-plated contacts.

Contactless smart card

The contacless card is a card that uses the radio frequencies to transfer data to a contacless reader. The range of transmission is short (some inchs). The advantages of this technology insure a better and a faster transaction to the reader than a contact-based card.

Control Center

Tools on the BPS® machine for remote access to configuration and data management, includes Banknote Analyzer and Live Viewer.

Cotton

Raw material used for making banknote paper. Cotton is a natural fiber that is extracted from the seed hairs of the cotton plant. The textiles industry primarily uses long cotton fibers to produce high-quality materials. The short fibers that the textiles industry disposes of are used for the production of banknote paper.

Counterfeit suspicion

If one or more features of the BPS® system cannot be measured correctly, the banknote is suspected to be counterfeit. The manual inspection operator must establish whether the note really is counterfeit or not.

CountryCode thread

Security threads that alternately depict a text element (usually the name of the country) and the country’s flag. CountryCode threads are completely embedded in the security paper, e.g. for passports.

Cryptography

The process of turning readable text into cipher text and back again.

CutLink X

Translation missing

Cylinder mould watermark

Also known as a genuine or multitone watermark. This is characterized by a high imaging accuracy and is able to represent the mapping of motifs in tone value, e.g as preferred for mapping portraits in banknote paper. See also Fourdrinier watermark

DAG II

Mobile shredder disposal unit banknote shreds

Data encryption

This uses a symmetric or asymmetric encryption method and is able to protect sensitive data.

DCK

Digital Car Key (DCK) uses wireless technologies for car access and authentication without compromising security if designed state of the art. One example for such a solution is a smartphone app leveraging NFC or Bluetooth.

Debit card

Bank card that can be used to make cashless payment or withdraw money from ATMs. Unlike credit cards, the current account of the cardholder will be charged (debited) immediately after the purchase or within a few days.

Delivery compartment, delivery stacker

A compartment on a BPS® machine into which the fully processed banknotes are deposited

Demetallization

Production process in which text or design elements are removed from a metallic layer so that they are legible in transmitted light. Used for security threads and security stripes (LEAD) in banknotes.

Denomination

Individual value in a series of banknotes. For example, the euro comes in seven denominations: 5, 10, 20, 50, 100, 200, and 500 euros

Device

Device is a generic word denoting hardware. Device can be a SIM, SD Card, Personal Digital Assistant, cell phone, smart phone, mobile terminal, mobile handset, machine-2-machine module, or USB-data module with mobile radio

Device management

The Device management is a set of technology that optimize the functionality and the security of a mobile communication. The management is supported by the Over-The-Air technology who allows to communicate with all the mobile devices such as mobile phones, smartphones, tablet computers, mobile printers, etc.

DF

Dedicated File Included in the SIM card file system. DF constitutes headers that hold hierarchical trees of elementary files on the SIM card, but do not have data of their own. This is most simply visualized as a directory in a file system

DLI®

Diagonal Laser Image. Latent image with a diagonal lens structure. A tilt, longitudinally and transversely on the card, allows 2 different items of information to appear.

DOV

Data Over Voice, data transmission technique that allows simultaneous transmission of data as sounds and speech via a telephone line, since the data sounds are outside of the speech band and are also not audible to the human ear.

DSB

Short for "Dual Supply Bander". Bander unit for BPS® machines with dual dispensing reel and graphical band printing.

DSDA

Devices, typically cars, capable of Dual-SIM Dual-Active (DSDA) make use of two independent eSIMs at the same time. They can be used in both idle and connected modes allowing calls to be in progress on both SIMs simultaneously. Typically one SIM is used for vehicle's telematic services and ecall whereas the other by the driver for his personal use, e.g. infotainment.

DSTK

Dynamic SIM Application Toolkit See also: STK

Dual-interface card

A dual-interface card is a chip card that has both a contact and a contactless interface for data transmission from and to the card. Also known as a combi card.

E-Gate

Semi-automated border control system, which significantly reduces passenger waiting times upon arrival. Supported by biometrics, this border control process is designed around electronic passports. The system verifies the authenticity of the passport using optical and electronic security features.

E-Government

Processing national administration activities and delivering services via the Internet, e-mail, and other digital communication technologies.

E-Passport

An electronic passport with a contactless chip and an antenna embedded in it.

eCall

An in-vehicle system to automatically alert the emergency services. eCall (short for emergency call), planned by the EU, is an in-vehicle system to automatically alert the emergency services and which as of March 31, 2018 must mandatorily be fitted in all new models of cars and light commercial vehicles.

Electrical conductivity

The electrical conductivity of security elements can be measured with sensors and serves as a machine-readable authentication feature.

Electronic healthcare card (eGK)

Microprocessor smart card containing a photograph and emergency data in addition to the personal details of the patient. Additional applications, such as documenting medication, are also possible.

Electronic purse

Electronic purses (or Intersector Electronic Purses/IEP) enable cashless offline payment of small amounts of money by means of smart cards and usually without the need for a PIN. They were introduced in 1995, when chips were attached to payment cards in addition to the magnetic strip. Electronic purses can be applied to all plastic cards with suitable chips.

Embedded security feature

Security elements embedded in the paper during the paper production process. These security elements are considered to be especially secure since they are completely integrated in the paper and cannot be removed or added retroactively without destroying the paper, e.g. watermarks, security threads, security fibers, etc

Embossed hologram

See Hologram embossing.

EMV®

The name of EMV® comes from the Card companies that developed it: Europay, MasterCard, Visa. EMV® is an industry standard covers the interaction at the physical, electrical, data and application levels between Chip cards and Chip card processing devices for financial transactions.

EMV® smart card

Chip-based payment card that complies with the EMV® standard.

EMV® standard

Global industry standard for chip-based credit and debit cards. The specification is issued by EMVCo, whose current members include MasterCard, Visa, American Express, Discover, China UnionPay, and JCB (Japan Credit Bureau).

Escrow

Banknotes are stored temporarily in the escrow after being fed into the payment terminal. If the depositor decides to cancel the deposit, the banknotes can then be returned.

eSE

Embedded Secure Element (eSE) is a tamper resistant smart card chip capable of running smart card applications (called applets or cardlets) with a certain level of security​.

eSIM

Embedded Subscriber Identity Module – individual subscriber or machine data and/or software profile that is downloaded over the mobile network via subscription management onto a SIM or eUICC to allow secure identification and authentication on the (mobile) network. The data which is downloaded is the result of a data generation process in the high-security area of the eSIM provider.

eSIM management

Personalization of SIM cards with all the network operator details using the over-the-air interface.

ET mark

Short for “Euro Test mark”. Voluntary certification of technical products by the German Social Accident Insurance (DGUV) body and other European test bodies under the Device and Product Safety Act (GPSG) and EU conformity directives. The GS mark based on similar criteria is not recognized in all European countries.

eUICC

Embedded Universal Integrated Circuit Card – is embedded by OEMs as a plug-in or soldered on the printed circuit board of a component or device. An eSIM can be downloaded onto an eUICC like this over the mobile network via subscription management.

Extended Access Control

Uses an additional symmetric key or asymmetric key pair to prevent unauthorized skimming and access to sensitive data and provides additional key management

FAT

Abbreviation for "Factory Acceptance Test". used by customers to check equipment at manufacturer's site before shipping.

FDP

Short for "Fast Deposit Processing". Process on the BPS® machine used to verify deposits with identification by a document with barcode

Features

Term referring to (security) characteristics.

FF

SIM form factors (FF) are the standardized sizes in which SIM cards are manufactured, specifically: 1FF, 2FF, 3FF, 4FF and MFF2. So far with each generation of the SIM, the physical size has been reduced.

FIDO

Fast Identity Online: FIDO Authentication is a set of open technical specifications that define user authentication mechanisms that reduce the reliance on passwords.

Filia®

See CBDC

Filigram®

Subtle yet effective security feature in combination with Hybrid(TM)

FIT®

FIT® (Fine Intaglio Technology) is a proven security feature for banknotes based on traditional intaglio printing.

FIT® latent

The new generation of latent images provides a genuine digital change of image, embedded in a 3D environment. Created using high-resolution laser engraving directly onto the intaglio printing original, the element is applied to the banknote as a blind embossing on a reflective, metallic substrate

Fitness detection

Checking the banknotes for soiling, graffiti, paper quality (limpness), tears/holes, dog-ears, etc. There are 3 sorting categories: ATM fit = very good quality suitable for use in bank machines 2. Fit = banknotes that are in good condition and can be returned to circulation 3. Unfit = banknotes of poor quality that are to be destroyed

Fitness for circulation

The quality of banknotes for circulation.

FLP detector

Fluorescence / Phosphorescence detector for luminescent authenticity features of banknotes.

Foil embossing

Embossing of an image in an embossing varnish applied to a foil, e.g. a hologram structure

FUSE® ID

A negative ghost image is personalized in the area of an optically variable ink and offers additional protection against photo tampering

Global System for Mobile communications (GSM)

GSM is a digital mobile telephony system that is used as based in a lot countries in the world, specially in Europe. GSM can be consider as the 2G, the ancestor of the 3G. The GSM phones consist of two physically separate units - the cell phone as the communication unit and the participant card as the memory unit.

GPRS

GPRS is the short term for General Packet Radio Service. This technology is used in the Mobile phone for the data service on the 2G and 3G.

GS mark

Short for "Geprüfte Sicherheit" (“Tested for Safety”). Voluntary certification of technical products by the German Social Accident Insurance (DGUV) body under the Device and Product Safety Act (GPSG). The EuroTest (ET) mark based on similar criteria is recognized all over Europe.

GSM

Global System for Mobile Communications, a second generation cellular telephone network. (originally Groupe Spécial Mobile)

GUILLOCHE

A guilloche is a specific pattern which consists of interlaced or superimposed lines. In contrast to half-tone printing, the guilloche is still a very effective security element against complete fakes

Handset

See: Terminal

Haptic

Haptic perception refers to actively feeling an object’s size, contours, surface texture, etc. In the case of banknotes, it is the raised intaglio embossing and print which can be felt in particular. It is therefore a strong feature for the security of a banknote. See also Tactility.

HC

Short for "Header Card".

Header Card

Separator card, slightly larger than a banknote, with an identification number (HC-Id). The header card is placed before each deposit and is used to idetnify the deposit and to separate the rejected banknotes. Licensed by "Currency Systems International".

Hologram

The term “hologram” is incorrectly used to refer to so-called surface embossing which uses light diffraction to show an image and angle-dependent colors. In addition to the visual properties of the image, the metallized aluminum structures serve as anti-copy protection features. They belong to the group of “optically variable devices” (OVDs). This hinders reproduction by means of scanners or color copiers. See also Hologram threads and Hologram stripes.

Hologram embossing

The holographic structure is embossed in a suitable layer of varnish applied previously by means of an appropriate tool.

Holographic foil = Hologram foil

Polyester foil embossed with a hologram; the foil is usually applied in stripes to the substrate surface using the so-called hot-stamping process which involves pressure and heat.

Holographic stripe = Hologram stripe

Security stripe with a holographic surface, normally available in widths of 8 to 15 mm, for application on a security substrate. Also known as the brand LEAD.

Holographic thread = Hologram thread

Security thread with a holographic surface, normally available in widths of 2.5 to 5 mm, for embedding in a security substrate. See Security thread.

Holography

Holography is a method for rendering objects in three dimensions. The image is created by means of laser beams. The result, the so-called hologram, contains all the information on the three-dimensional structure of the object, providing considerably more detail than a normal photograph. In appropriate lighting, the original object is visible and can be seen at various angles.

Hot stamp foil

Foil with thermally activated release layers and adhesives applied entirely or partially to a substrate.

Hybrid

Hybrid is an innovative combination of protective polyester foil around a cotton fibre core.

Hybrid ADDvance®

New Hybrid variant that additionally enables the integration of all security features on notes of every denomination, even the lowest.

ICAO

International Civil Aviation Organization

ICCID

Integrated Circuit Card Identity, the serial number of a SIM card.

ICMS

Short for "Integrated Cash Management System". System for recording accounting and statistics data in the Cash Center.

ID card / ID document

Highly secure means of identification, e.g. an identity card or company card.

IIoT

The Industrial Internet of Things (IIoT) refers to the extension and use of the Internet of Things (IoT) in industrial sectors and applications.

IMEI

International Mobile Equipment Identity, a unique number for identifying cellular telephones used in GSM, UMTS, LTE and 5G networks.

IMSI

International Mobile Subscriber Identity, a unique identification associated with a cellular telephone network user for GSM and UMTS standards

INFACIO®

An invisible, personalized security feature for passports, which is visible under ultraviolet light. Here, a monochrome image appears in the longer wavelength UV and a full-color image appears in the shortwave UV.

Intaglio print

Special high-security printing process, e.g. for banknotes and security printing. The result of such printing is characterized by the particular type of color embossing. Such prints are raised and can be felt (tactility). Special high-security printing process, e.g. for banknotes and security printing. The result of such printing is characterized by the particular type of color embossing. Such prints are raised and can be felt (tactility).

InVisio®

A covert feature embedded in hologram threads or hologram stripes which is visible using a special reader.

IoT

The Internet of Things (IoT) is a network of physical objects that are connected to each other. Often they contain embedded technology including sensors, software and other components to communicate, sense or interact on basis of internal states or the external environment over the Internet.

Iridescent printed effect

Iridescent color coating that renders various colors visible depending on the angle of view. The change in color is caused by the embedded pigments. Security element frequently used in banknotes which is discreet and hard to copy.

Iridescent stripe

See Iridescent printed effect.

ISO

International Standards Organization

ISS

"International Security System". The first currency processing system from G+D. Between 1980 and 2001, over 2,200 systems of ISS 300 were installed worldwide, enabling to reach absolute market dominance. Follow up system: BPS® 1000.

iUICC (integrated SIM)

The integrated Universal Integrated Circuit Card (iUICC), also known as integrated SIM or iSIM, is the next stage in SIM technology. Instead of a discrete SIM hardware module, such as a SIM card or SIM chip, the SIM Operating System (SIM OS) is running in a Tamper Resistant Element (TRE) on the IoT device’s System-on-Chip (SoC), e.g. the baseband module.

JAVA

Chip card applications are becoming more and more numerous and various. This applies to financial and payment services, telecommunication, automation, and transport systems or network applications of all types in which chip cards will be used increasingly in the future. Easy handling, user-friendliness, and universal applicability are becoming more and more important. That is why the multifunctional JAVA chip card standard was created. JAVA creates a universal software platform to “saddle up” all applications for the chip card. Advantage for the user: The user can always “load” the current application and use the new applications without having to get a new card.

Java enabled SIM card

Or: Java card. A SIM card with support for Java implemented.

JetFix®

Security paper with special features for high-quality inkjet printing, e.g. passport paper.

Laminated foil

Foil stripe applied to a banknote paper which, particularly in the case of window elements, serves to cover the window. These stripes are normally equipped with additional optically variable printed effects.

LCF

Short for "Large Continuous Feeder". Singler for BPS® machines with large feeder and continuous singling.

LDM

Abbreviation for “Large Delivery Module”. Large delivery compartment for more than 100 Banknotes.

LEAD®

LEAD® is an acronym for “Long-lasting Economical Anti-copy Device.” The security system applied to the surface of the banknote or security paper, consists of a paper primer, a hologram stripe applied to it, and an integrated overprint, typically by means of intaglio embossing.

Levels of authentication (Banknote Paper)

The authenticity of banknotes can be ascertained in various ways: Level 1: using human senses such as seeing or feeling (so-called human features). Level 2a: with the assistance of devices such as a magnifying glass, UV light, filters, etc. Level 2b: sensors in processing machines (machine-readable features) and / or forensic devices, e.g. high-tech lab equipment (such as electron microscopes).

Liquid crystal

Optically active structures, e.g. for the generation of color-shifting printed effects. See also ColourShift.

Live Viewer

Tool on the BPS® machine for viewing the progress of throughput, the rejection rate, and the unfit rate.

Long grain

The long grain orientation of the paper fibers runs along the short side of the sheet. Standard in commercial printing. See also Short grain.

LongLife™

Robust paper with a surface coating to prolong circulation

LPI®

Laser Protected Image. The combination of a secure color image by personalization of the color component and laser engraving of the grayscale in perfect register.

LTE

LTE is the short name of Long Term Evolution because LTE is considered by many as the 4G technology because it's better than the 3G. First the speed of the data transfer is increased to potential 100 Mbps, the latency is reduced and is compatible with the older technology, GSM and 3G.

M2M

M2M is an abbreviation for Machine-To-Machine. It consists of a communication between to machines wirelessly. M2M is used in a lot of sector like robotics, road trafic control, security systems, cars and more.

Machine readability

Characteristic of a banknote to be processed and authenticated automatically.

Machine-readable feature = Machine-readable authentication feature

Security features in or on banknotes or security documents that are machine readable and serve the purpose of determining authenticity.

MAGIC ID

A printed moiré pattern creates, through an overlying lens structure, elements such as letters or stars that move horizontally or vertically depending on the calculation when tilting the document.

Magnetic properties

Banknote features for automatic banknote processing using special banknote processing machines.

MAGnite®

Interactive G+D security feature. The feature is based on the interaction between special color pigments and a magnetic field, such as those found in the speakers of mobile phones.

MCD

Multitude Color Device. The combination of iriodin color and fluorescent offset printing. This security feature is used to safeguard a laser engraved photo against tampering.

MF

Master File Included in the SIM card file system. Constitutes the root file in the SIM file system.

MFD

Short for "Machine-readable Feature Detector".

MFF2

Machine Form Factor 2 (MFF2) is an ETSI standardised form factor used for eSIM or eSE. It has a size of 5x6mm and 8 contacts which are similar to the smart card contacts.

Micro optical structure

See also Moiré-Magnifyer, Microlenses.

Microprocessor card

A microprocessor card is one equipped with a microchip that contains a microcontroller with a CPU, volatile memory (RAM), and non-volatile memory (ROM, EEPROM). Microprocessor cards can also come with a numerical coprocessor (NPU), which enables them to perform public key crypto algorithms at high speed. These kinds of cards are sometimes referred to as cryptocards or cryptocontoller cards.

MIFARE®

MIFARE® is the NXP Semiconductors-owned trademark of a series of integrated circuit (IC) chips used in contactless smart cards and proximity cards.

MIS (management information system)

A management information system is used to analyze data collected and processed via a company’s communications network. When the data is analyzed, the results serve as the basis for strategic decisions made by the company.

MLI

Multiple Laser Image. Through a lens structure on a polycarbonate document, at least 2 different items of information are personalized under a tilt angle. They are visible when tilted horizontally.

MM

Mobile payment (also known as M Payment) is a payment process in which at least the payer uses mobile electronic techniques to initiate, authorize, or implement the payment, for instance by means of mobile devices such as mobile phones or tablet computers.

MNO

Mobile Network Operator (MNO), also known as a wireless service provider, wireless carrier or mobile network carrier, is a cellular communications provider with cellular network infrastructure that possesses or controls all of the elements required to sell and deliver communications or connectivity services.

Mobile station

All the equipment and software needed for communication with a cellular telephone network. This is a term used for GSM networks. See also: user equipment

Mobile wallet

The aim of a mobile wallet is to replace conventional wallets with a mobile device. A wide range of applications can be stored in the wallet: cash, cards, ID documents, driver’s licenses, coupons, access authorizations, keys, and much more.

MOTAPS

MOTAPS is MasterCards Mobile Over-the-Air Provisioning Service for NFC programs.

MSSP

Mobile Signature Service Platform, a system used by cellular telephone networks to provide mobile signature security. See also: WPKI

MultiCode™

Magnetic feature of security threads in banknotes. MultiCode™ enables various coding and thus customer-specific information.

MVNO

Mobile Virtual Network Operator (MVNO) is a cellular communications provider that does not own critical elements of network infrastructure (e.g. like BSS, OSS, Radio) over which it provides services to its customers. It uses the network capacity of one or more MNOs to obtain access to network services.

Nano-SIM

Currently the world’s smallest SIM card, measuring 12.3 x 8.8 mm and with a thickness of 0.6 to 0.7 mm. It is thus approximately 30 percent smaller than a micro SIM

NCS

Numeron™ Configuration Software – program for managing one or more Numeron™ machines. See Numeron™

Negative text

Transparent text on an opaque background which is visible when held up to the light. See also Security thread and Hologram foil."

NewP@ss

A research project to develop new generations of electronic ID documents with enhanced security and functionality.

NFC

Near Field Communication (NFC) is an international transmission standard for contactless exchange of data via radio technology for short distances of a few centimeters and a data transfer rate of up to 424 kBit/s. So far, this technique has mainly been used in solutions for micropayments – cashless small-value payments.

NotaMaster®

Modular range of sensors providing proof of totally counterfeit-proof features and detection of printing errors.

NotaPack®

G+D system for tamper-proof packaging of banknote bundles in transparent shrink-wrap.

NotaScan®

Modular range of sensors for assessing authenticity and fitness

NotaScan® Image

G+D sensor for scanning the printed image of a banknote in 4 spectral ranges to detect denomination, orientation, authenticity, soiling and defects, and for reading the serial number.

NotaScan® Ink

G+D sensor for detecting the authenticity of banknotes by measuring the advanced infrared properties of special printing inks.

NotaScan® Profile

G+D sensor for measuring the thickness of banknotes to detect multiple items, adhesive tape, tears, holes and dog-ears.

O&M

Operation and Maintenance, the running and servicing of a product.

OATH

Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the adoption of strong authentication.

OBIS

Short for “Optical Banknote Inspection System”. System for checking the quality of new banknotes as a component of the BPS® 2000 OBIS, especially for detecting printing errors.

Orientation

There are four different orientations (stacking possibilities) for a banknote: Faced (front), faced upside-down, unfaced (back), unfaced upside-down.

Orientation sorting

Sorting in all four orientations. Every banknote is stacked in a pre-determined delivery stacker according to its orientation. This results in a banknote bundle in which all banknotes are faced the same, even if mixed orientation banknotes were inserted in the singler.

Origination

The implementation of a design in a tool for the production of security elements.

OS – Operating System

The computer programme that manages all other programmes on the machine

OTA

OTA is the abbreviation for "Over-the-Air". It defines the standard transmission and reception of application-related information in wireless communication systems. OTA is generally used for the transmission of SMS messages.

OTAP

Over-the-Air Provisioning,. See: Provisioning

OTW

Over-the-Wire, term used to describe management of mobile equipment via wired connection.

OVD

Acronym for “optically variable devices,” which refers to security elements with optically variable surfaces such as holograms, iridescent printed effects, ColourShift, Moiré-magnifying features, etc.

OVI

Acronym for "optically variable ink".

OVS

Acronym for “optically variable stripe. See also OVD."

PACE

The Password Authenticated Connection Establishment is a protocol used in German ID cards to encrypt data before it is exchanged

Paper web formation process

Occurs during paper production on the cylinder mould machine when fibers are placed and arranged on the mould.

Passive authentication

The cryptographic mechanism applied to this process is the digital signature. This proof that the Logical Data Structure (LDS) and Document Certificate are authenticated and not modified but does not prevent 1:1 copying or chip exchange.

Patch, Hologram

Transfer foil embossed with a hologram; a stamp is used in conjunction with pressure and heat to emboss the image with the hologram foil.

PCVS

Short for "PC Verification Station". PC-based workstation and tool that verifies logs sent electronically from BPS® machines by checking the Message Authentication Code (MAC).

PDS

Short for "Pneumatic Delivery System". Equipment used to transport banknote bundles securely in a sealed tube system, e.g. from the BPS® machine to a BDS® plant.

PEAK®

The unusual thing about the PEAK® (Printed Embossed Anticopy Key) banknote security feature is its production process, in which the banknote paper is simply printed and embossed. Fine lines in carefully selected shades are embossed to produce a three-dimensional, optically variable image. Different information and colors are visible depending on the angle from which the banknote is viewed.

Picture card

An individually designed debit or credit card that may be obtained from your bank, e.g. with a personal photo.

PIN

Short for “Personal Identification Number” – another term for identification number or personal code. A PIN is a secret number that can be used for example to activate a mobile phone card. The phone cannot be used until activated with this code.

PIV

Cards with a Personal Identity Verification application meet the highest requirements of the US authorities in terms of checking identity.

PKI

It's the short term for Public Key Infrastructure. This system uses a pulic and a private key for encrypting and signing data. It also create a secure chain of trust generally to protect data of Internet

Planchets

Round or straight-edged planchets which are integrated in the paper across the entire surface or within defined strips. Depending on the design, planchets may have different optical properties, e.g. fluorescence, iridescence, microtext. Rarely seen in banknotes these days.

Plastic banknote

The banknote substrate is made of plastic foil (polymer) unlike traditional banknotes made of cotton. See also Polymer banknote.

PMI

Abbreviation for "Person-Machine Interface" – user terminal for data input at the Numeron™

Pole

Information that is concealed and not visible to the naked eye, which can be made visible by means of a polarization filter. Pole is a very effective security element against counterfeiting and a simple but secure element for use at a Point of Sale.

Polymer banknote

The banknote substrate is made of plastic foil (polymer), unlike traditional banknotes made of cotton. See also Plastic banknote.

POS

Abbreviation for "point of sale". Sale point/cash till; place at which banknotes change hands or electronic payment is used

Positive text

Text on a light (transparent) background

Primer

Typically a filling layer applied to the banknote surface by means of silk screen printing for smoothing the contact surface for foil application. It can contain luminescent and / or machine-readable properties.

Private networks

Private or dedicated networks, also known as private cellular networks or mobile private networks, are mostly independent of the typical, public MNO network. Companies and organizations can set up their own (private) cellular network infrastructure. In conjunction with 5G, the benefits of this technolgy use case include full control, flexibility, increased bandwidth and reduced latency, as well as improved security and reliability.

Provisioning

Process in which equipment, for instance a SIM or a terminal, is supplied with data, for example settings, applications, or software upgrades.

Provisioning protocol

Protocol used between the system and the mobile terminal to be provisioned.

QCD®

Short for "Quality Control Device".

QICC

Short for "Quality Inspection Control Center". Workstation and data storage system for controlling the BPS® 2000 OBIS.

Rainbow fluorescence

Fluorescence that glows in rainbow colors under ultraviolet light.

RAM

Remote Application Management of applications as per GlobalPlatform.

Ream

Packaged unit containing a specific number of paper sheets (e.g. 500 sheets).

Reconciliation

Manual check of banknotes rejected by the BPS® machine with recording of the value determined or identification of forgeries.

Recycling ATM

A self-service machine that accepts the banknotes deposited by a customer, scans the banknotes’ level of fitness for circulation, then sorts them and pays out the fit notes to the next customer making a withdrawal.

Registered positioning

Positioning of a security element or security print at defined XY coordinates, e.g. on the banknote surface.

Reject compartment

Separate (reject) stacker on a banknote processing machine used to hold banknotes that were either not recognized or are suspected of being counterfeit.

Reject rate

Banknotes that a Banknote Processing System does not recognize are sent to the reject compartment. The reject rate is the number of rejected banknotes in proportion to the number of banknotes fed into the machine. See acceptance rate.

Reject reel

The reject reel of the Banknote Processing System is used to store banknotes that either cannot be scanned or are suspected of being counterfeit for later manual inspection.

Remote Access

It's the ability to access a computer from outside a building to gain information or to attack it.

Retract compartment

A deposit terminal slot used to hold banknotes that the customer fails to remove (unintentionally) after canceling a transaction.

RFID – Radio Frequency Identification

A method of identification using radio frequency technology, which does not require any direct contact.

Roaming

In wireless telecommunication, a roaming is the ability to get access to the Internet when you are not at home but for the same price. It's an extension of connectivity service.

RollingStar®

Optically variable security thread with new dynamic effects The combination of a defined motion sequence plus a concise color shift when tilted is a real eye-catcher and perfect for immediate authentication

RollingStar® i+

Further development of the optically variable thread RollingStar®. The innovative multi-facet substructure with an even more sophisticated way of aligning and shaping the micromirrors allows for an attractive and realistic look of the thread. The proven combination of dynamics, colour shift and magnetic technology takes a significant leap forward with RollingStar® i+.

RollingStar® LEAD

RollingStar® LEAD is a sophisticated banknote security foil that facilitates rapid authentication with its variety of eye-catching optically variable effects.

RS

Short for "Reconciliation Station". Reconciliation station for processing rejects from the BPS® machine

RSP

Remote SIM provisioning (RSP) enables consumers to fully digitally and remotely activate the embedded SIM (eSIM) built into a cellular device such as a smartphone, smartwatch, fitness band or tablet computer.

S@T

SIM Alliance Toolkit A DSTK client

S@tlet

An applet used on S@t clients.

SAC

Supplemental Access Control is a digital security protocol that all new passport documents in Europe will be required to support in the future.

SAT

Site acceptance test, a final check of a machine being delivered that is conducted on the customer’s premises. SIM Application Toolkit See also: STK

SCWS

Smart Card Web Server Management of Smart Card based web applications.

SECCOS

Secure Chip Card Operating System is a universal platform for chip-based payment card applications.

Secure Element

Secure elements (SE) are microprocessor chips that are integrated in your mobile device and act as a vault to ensure the security of your data like your PIN code, your pictures, your SMS, etc. It's an important component for the development of new technologies such as NFC because the data are very sensible. There are 3 types of secure elements: removable microSD or SIM cards, motherboard embedded SEs (eSEs), eSIMs or integrated SIMs, and finally cloud-based SEs.

Secure Voice

It's a term for the encryption of voice communication such as radio or telephone.

Security features = Security elements

Collective term. Elements on banknotes and security documents for the purpose of determining authenticity and protecting against counterfeits.

Security fibers

Security element made of rayon, plastic, or paper embedded in the banknote paper. The fibers are either visible or invisible to the viewer. The invisible fibers are only detectable under a UV lamp. They may glow in various colors.

Security foil

Foil with various optical effects, e.g. holograms, ColourShift, demetallization and combinations of various optically variable surfaces that are applied to the substrate surface

Security level

Usage-based classification of security elements. There are usually three classifications: 1. The public – without the assistance of devices 2. Specialists with the assistance of devices and commercial banks 3. Central banks

Security papers

Papers that are secured against fraudulent copying and that are not generally available. These include, for instance, papers for passports, checks, and other documents.

Security stripes

See Hologram stripes.

Security thread

Foil stripes with built-in security elements, typically in the width of 0.8 to 5 mm, embedded into banknote and security paper. Options include fully embedded threads and windowed threads. For the embedding a cylinder mould paper machine is used. Security threads can include visual and functional surfaces, e.g. negative text by demetallization of an area, hologram, ColourShift, magnetic print, fluorescence, electrical conductivity, etc.

See-through register

Originally a pure print security element that, when held up to the light, combines elements of the front and back of a banknote into a complete image. Today the security level is increased with an additional placeholder in the form of a watermark.

Self-service machines

Self-service machine such as an automatic teller machine (ATM) in a bank used for making withdrawal and/or deposits.

Sensor

A device that can scan and/or measure the physical properties of a banknote in one or more ways

SensorBrain®

Computing system in a banknote processing system to compute sensor data

SensorFusion®

Algorithm for combined analysis of raw data from multiple sensors

SET

The secure electronic transaction standard is a payment transaction protocol for the processing of secure credit card payments on the Internet. It was defined by Visa and MasterCard. SET does not automatically require the payer to have a chip card because it enables transactions to take place completely electronically using the Internet software on a PC.

Short grain

The lengthwise orientation of the paper fibers runs along the long side of the sheet. Standard in banknote paper. See also Long grain.

Shredder

Equipment used to cut or shred banknotes into scraps of paper. BPS® machines destroy the banknotes online using a shredder blade. BDS® plants destroy the banknotes offline using a granulator. The scraps of paper must be so small that the banknotes cannot be reassembled.

Shreds

Fragments of paper resulting from the destruction of banknotes. On-line cross-cut shredders create fragments with the same size and shape, i.e. rectangular with straight edges, granulators create shreds in variable size and shape, having irregular edges.

Silk screen print

Printing process for the application of relatively thick layers of ink in roll and sheet printing. Typically used in banknote and security printing for the application of printed effects, e.g. iridescent printed effects.

SIM

SIM is the short name of Subscriber Identity Module. SIMs are small smart cards that are used in all the cellphones. A SIM contains a lot of personalized data of the subscriber like the user identity, phone number, contact, etc. A SIM is not linked to a cellphone so the consumer can easily put out the SIM of his phone and put in to an other phone and keep his data.

SIM profile

A (SIM) profile comprises the mobile network operator data related to a mobile subscription, including the operator’s credentials and optionally SIM based applications. The profile is part of the SIM and allows the cellular device to securely access a mobile network.

SIM switch

To replace an old SIM card with another SIM card (same subscriber, same subscription) in the terminal. See also: ADD

SINA

Secure Inter-Network Architecture developed by the German Federal Office for Information Security (BSI) to process information in need of high protection on non-secure networks.

Singler

Apparatus in the machine for pulling individual banknotes out of the banknote stack. In simple machines, the singler can be based on purely mechanical principles (friction singler), while sophisticated BPS® machines work with air support (suction band singler, air-supported singler).

SM-DP+

Subscription Manager - Data Preparation+ (SM-DP+) is a main element of the GSMA standardized Remote SIM Provisioning solution (SGP.21/22) which operators use to create, download, remotely manage (enable, disable, update, delete), protect the operator credentials (the Profile) and securely encrypt their operator credentials ready for over the air installation within the SIM. It consolidates the functionality of the Subscription Manager Data Preparation (SM-DP) and Secure Routing (SM-SR) into a single component which is called SM-DP+.

Sm@rtSIM® Argo in-car

A robust SIM card designed specifically for use in motor vehicles.

Sm@rtSIM® CX

G+D operating system based on Java™. Building on Sm@rtSIM®, it expands the product portfolio to include new technologies, such as NFC and LTE.

Smartcard

Another name for a microprocessor card. A card that contains a processor chip is considered “intelligent.” Simple memory cards are therefore not referred to as smart cards.

SmartTrust®

The G+D family of products for over-the-air management of mobile terminals, SIMs and mobile value added services.

SmartTrust® Portigo

This solution from G+D transforms NFC smartphones into electronic purses for contactless transactions.

SMS / SM

Short Message Service: a message service found in cellular telephone networks. SM: Short Message

SoC

System on Chip (SoC) is an embedded circuit, also called a "chip", that integrates CPUs, memory, and in some cases even wireless transceivers, or other electronic system. It is the heart of many connected devices.

Sound

The sound typical of banknotes. Experts also refer to this as crispness.

Specimen

Term meaning sample; specimen banknote = sample / banknote for promotional purposes

Spiral stacker

Spiral-shaped wheel which slows down the banknotes following scanning and processing and drops them inside the stacker. Often used as the symbol for G+D’s BPS® machines.

SS7

Signaling System Number 7 According to ITU-T Q.700 series. Protocol stacks used by telephony equipment, for example switches, and essentially PLMNs for all mobility and services.

STARCOIN

STARCOIN is the name of G+D’s electronic payment system. It consists of cards and terminals as well as the background administration and clearing systems. STARCOIN enables payments to be made with both electronic purses and electronic checks. The system can be tailored to the needs of virtually every business environment.

STARCOS®

STARCOS® is a tried and tested smart card operating system and the workhorse of chip card applications. The first version of STARCOS® was developed by G+D in 1987. Its state machine structure enables several applications to be put on a single card and maintained completely separate from each other. STARCOS® is available for numerous smart card microcontrollers and offers a complete set of commands standardized by ISO and EMV® as well as ones optimized by G+D. As confirmation of G+D's security philosophy, even the lowest version offers symmetrical triple DES cryptography, which resists every known form of attack.

STEP®

STEP® (Shimmery Twin Effect Protection) is an optically variable ink based on liquid crystal pigments. When viewed from different angles, elements printed with this ink appear to change color.

STK

SIM Toolkit or SIM Application Toolkit A set of commands and procedures for use between the SIM card and the terminal, in addition to those defined in GSM 11.11 and 3GPP TS 51.011: “Specification of the Subscriber Identity Module –Mobile Equipment (SIM – ME) interface”. See also: Wib

Subscriber

Typically a person with a cellular contract, identified by IMSI in a cellular telephone network.

Subscription management

Subscription management, also known as eSIM management, is a technology which allows to remotely manage (e.g. download, install, remove, switch) SIM profiles over the air. Using a remote SIM provisioning system and embedded SIMs in the cellular devices, this solution allows to fully digitally activate mobile devices without the need to physically handle SIM cards.

Substrate

Base material for printing security documents, e.g. cotton paper for banknotes.

Synthec®

Banknote / Security paper with synthetic fiber content for increased mechanical stability and with a LongLife™ coating for moisture and soiling resistance.

TAC

Type Allocation Code 8 first digits in an IMEI of a terminal used in a cellular telephone network identifying the terminal model and origin.

Tactility

The property of an object that can be felt. Tactile security features in banknotes are made by means of intaglio printing. See Intaglio print, Haptic.

TAN

The transaction number is a one-time password, normally consisting of six figures.

Tearing resistance

A measure of the tensile strength of substrates in mN as per ISO 1974.

Tensile strength

A measure of the tensile strength of substrates in kN/m as per ISO 1924.

Terminal

Terminal is a generic word denoting a Mobile Equipment (ME, identified by IMEI) without SIM. Device can be a Personal Digital Assistant, cell phone, smart phone, mobile terminal, mobile handset, machine-2-machine module or USB-data module with mobile radio.

Token

A token refers generally to a security token. A security token is used for the authentication to prove the electronical identity of the token's holder. This kind of technology replaces or completes the password utilization.

TonerFix™

Security paper for counterfeit-protected documents that is particularly suitable for personalization by means of laser printing.

Transfer foil

A stripe applied to a security paper whose carrier foil is removed during the application process. These stripes are normally equipped with additional optically variable effects.  

TRE

Tamper Resistant Element or Tamper Resistant Environment (TRE) is a standalone secure element or a secure enclave, consisting of hardware and low-level software providing resistance against logical and physical attacks, capable of hosting secure applications and their confidential and cryptographic data. TREs are available in removeable, embedded and more recently, integrated form factors (e.g. SIM, eSIM and integrated SIM).

Trusted Execution Environment (TEE)

A TEE allows smartphones to operate within two different "data worlds", so-called runtime environments, which run in parallel and are both operated in the main application processor: on the one hand, a normal operating system; on the other, a fully isolated security area in which the TEE processes security-critical applications.

Trusted Service Management (TSM)

For NFC services, secure elements are essential in order to guarantee the protection of security-critical applications and to achieve the same security standards as for debit and credit cards. However, it is not sufficient to integrate only one secure element in the smartphone. Using special solutions, the fragmentation of the memory is securely managed so that the areas for the service providers can be separated. In addition, secure new services, applications, and virtual cards must be provided as needed, without a third party obtaining access to PIN numbers or other sensitive information. This task is fulfilled by the Trusted Service Manager

TSM

It's the short name of Trusted Service Management. It's a intermediate institution between the Bank and the mobile device. A TSM will play an important role after the NFC release World Wilde because it improve the security of your data and insure to the bank that you are really the owner of the handset who want to do a transaction.

TWIN®

Making counterfeits easy to see through: the transparent banknote TWIN® see-through window (Transparent secure WINdow technology). TWIN®-based features are easy to recognize and yet hard to imitate.

UICC

Universal Integrated Circuit Card: a Smart card that conforms to the specifications written and maintained by the ETSI Smart Card Platform project.

UMTS

UMTS is the short name of Universal Mobile Telecommunications System. It's a 3G standard who offers the possibility to transfer data faster. The world release was in 2005.

USB

USB is the short name of Universal Serial Bus. This item is a hardware interface used to attach peripherals to a computer. In the most cases, the USB is used to transfer data from a peripheral to a computer but it can also be used to give DC current to the peripheral. For example: recharge batterie.

User Equipment

All the equipment and software needed for communication with a cellular telephone network. This is the term used in 3G networks. See also: Mobile Station

USIM

USIM is the short term for Universal Subsriber Identity Mobule. It's a SIM developed to support the UMTS using the 3G mobile network.

USSD

Unstructured Supplementary Service Data Can be used as an alternate service bearer for mobile value added services delivered by mobile network operators.

UWB

Ultra Wide Band (UWB) is a contactless communication technology e.g. used for Digital Car Key applications. UWB is a very low power technology that has the ability to penetrate walls and other physical interferences to radio signals unlike 802.11 and Bluetooth. Right now, UWB is a local area communications system with a range of approx. 30 feet, but that is expected to increase.

varifeye®

Innovative window security element in banknotes based on windows in the substrate which are sealed with a laminate foil. This window element is usually equipped with further optically variable effects such as hologram foils.

varifeye® ColourChange

Window security element based on micro-mirror technology and dynamic color and motion effects

varifeye® ColourChange Patch

Front-to-back security application with color change and 3D effects which can be customized in size, shape and location.

View, incidental light, transmitted light, UV light

It is possible to check banknote paper in three different views: incidental light (i.e. the banknote is in front of the viewer), transmitted light (i.e. the banknote is held up to the light) and UV light (i.e. viewing with a UV lamp). The security features visible change depending on the view.

Virtual Machine (VM)

A software simulation of a microprocessor, usually having its own opcodes for machine instructions as well as a simulated address space. It allows software to be generated that is independent of the features of specific hardware. For instance, the virtual address space of a VM can be many times larger than the address space provided by the hardware. In the Java environment, the closed environment of the VM is often called the sandbox.

VPLMN

Visited Public Land Mobile Network, the cellular network used when outside of the coverage area of the mobile subscriber’s home PLMN (Public Land Mobile Network).

VPN

Abbreviation for "Virtual Private Network". In the course of the Internet boom, virtual private networks found solid footing in the infrastructure of corporate networks. A (company's) internal data transmission is performed over an existing public network; the data packages are encrypted for transmission. The key pairs are only known to the sender and the recipient. The encrypted data packages are normally packed in TCP/IP packages. This procedure is called “TCP/IP tunnelling”. This also permits the transmission of NetBIOS or IPX data packages over the Internet. See also: Remote data transmission (RDT), Encryption, TCP/IP.

WAP

Wireless Application Protocol

Watermark

A watermark is made during paper production by means of various thicknesses of paper – either thicker or thinner than the surrounding material – which results in a gray-toned image being visible. For banknotes, the cylinder mould process is used to apply watermarks that appear three-dimensional.

Watermark, allover

Watermark motifs evenly allocated over the whole surface of a paper.

Watermark, cylinder mould

See also Cylinder mould watermark.

Watermark, electrotype

See Watermark, HighLight.

Watermark, fourdrinier

Also referred to as a moulette watermark, produced with fourdrinier paper machines, in which after sheet formation the nonwoven fibers are compressed or displaced into characters via a forming roll with images. In transmitted light, the result appears as a simple light/dark watermark. One typical application is for commercially available printing and writing paper. see also Cylinder mould watermark Also referred to as a moulette watermark, produced with fourdrinier paper machines, in which after sheet formation the nonwoven fibers are compressed or displaced into characters via a forming roll with images. In transmitted light, the result appears as a simple light/dark watermark. One typical application is for commercially available printing and writing paper. see also Cylinder mould watermark

Watermark, HighLight

Synonym for electrotype, e-type, watermark; generated during the sheet formation process and serves to especially highlight important information. This type of watermark is very light (because it is thin) and clear (because it is “sharply defined”). Example: indication of the value of the banknote within the watermark on euro banknotes.

WaterMask®

A laser process where the print image is applied in perfect register with a watermark.

Wib

The common term used for SmartTrust® Wib. An interpreter which provides an execution environment for wiblets and a mechanism for management of menu-based services.

Wiblet

An application executed in the SmartTrust® Wib runtime platform.

Window thread

A security thread embedded in the banknote and appearing on the paper's surface at defined points on the banknote (windows). When viewed straight on the security thread is partially visible, and appears across the entire length in transmitted light.

WML

Wireless Markup Language

WPKI

iWireless Public Key Infrastructure, a form of PKI used in cellular telephone networks. See: PKI