Glossary
1
An 11-character BIC (optional element attached to 8-character BIC) that comprises the following components: party prefix, country code, party suffix, and branch identifier.
3
3SKey (SWIFT Secure Signature Key) provides a mechanism to enable corporates to sign financial messages and files that they send to their banks, using a USB token. 3SKey can be used on the SWIFT network, but also on proprietary networks, or the Internet. More information - Documentation
8
A BIC that comprises the following components: party prefix, country code, and party suffix. See also business party identifier.
a
Abort can refer to a delivery abort, a file transfer abort, or a session abort.
A system message that alerts the sender of an acknowledged, live input message that the system has aborted the delivery of the message. An error code indicates the reason for the delivery abort.
Data values, other than private and public keys, that SWIFT requires to initiate the certification process and to operate the cryptographic modules. Activation data must be protected. Examples of activation data include PINs, passwords, and activation secrets.
The date on which a SWIFT service update becomes operational. SWIFT usually introduces updates to its services through an activity called provisioning. Typically, SWIFT does not perform provisioning in real time. This is because of the required validation and verification, and because one update may require synchronised changes on different systems. As a result, SWIFT often schedules updates in advance of performing them.
A pair of passwords that either the user's certificate administrator or the SWIFTNet Registration Authority issues to a subscriber when the subscriber has successfully registered for a service. The subscriber uses these secrets only once during the certification process, after which the secrets become invalid.
Addressing is a function that links the identity (the name) of an entity (for example, an institution, an individual, or an application) that sends or receives SWIFTNet messages, with a means of routing the message (that is, an address). SWIFT uses addressing to route messages within the networking system, and to ensure that messages reach the right recipient.
The Distinguished Name of the requestor or the responder of an InterAct or FileAct message. The distinguished name that is at the top of a SWIFT user's addressing tree contains the BIC of that user.
An institution for which the security officer of another institution (called the administering institution) handle online security matters.
An institution that handles the online, security-related matters of its own institution, and at least one other institution (called the administered institution).
A
The term that is often used in communication protocols to acknowledge that one party has correctly received the information sent by another party. Issuance of an ACK does not indicate that the issuer accepts the business content of the information that it has acknowledged. ACK stands for acknowledgement.
The SWIFT brand name for the range of connectivity products that customers use to connect to SWIFT services.
SWIFT's prime messaging interface. Alliance Access is designed to connect business applications to SWIFT messaging services. Alliance Access is a multi-platform interface that enables customers to connect single or multiple destinations to SWIFT with maximum automation of system management tasks.
An optional tool which enables communication between the user s back-office systems and SWIFT. The tool supports communication in different message formats and can contact other systems for data validation and enrichment.
An Alliance Kit that SWIFT has designed for customers that opt for a private infrastructure and require automation and high levels of integration with their back-office applications. More information - Documentation
A BIC Directory Download for Alliance users. The file can only be used to upload BIC data into the customer's correspondent information file. Documentation
The network connectivity product designed for customers that receive or send less than 1,000 messages per day. With Alliance Connect Bronze, customers connect in a secure and cost- effective way to SWIFTNet through the Internet. More information - Documentation
The network connectivity product for high-volume users that require the highest resilience and service levels. By using the managed access solutions of SWIFT Network Partners for both Leased Line connections, SWIFT is able to offer a highly resilient configuration with guaranteed bandwidths and service levels. More information - Documentation
The network connectivity product designed for customers that receive or send between 1,000 and 40,000 messages per day. The managed access solutions of SWIFT Network Partners provide guaranteed bandwidths and a high service level. The internet channel provides a cost-effective back-up connection. More information - Documentation
b
B
BIC stands for business identifier code. BIC is an international standard for identification of institutions within the financial services industry.
BICs are used in automated processing. They unambiguously identify a financial institution or a non-financial institution. The ISO 9362 standard specifies the elements and the structure of a BIC. A BIC consists of either eight or eleven contiguous characters. These characters comprise either the first three, or all four, of the following components: party prefix, country code, party suffix, and branch identifier. The International Organization for Standardization has designated SWIFT as the BIC registration authority.
BIC1
See non-connected BIC.
BIC8
See 8-character BIC.
BIC11
See 11-character BIC.
c
C
D
d
E
e
F
f
G
g
H
h
I
i
K
k
l
L
LAU security is mandated between the caller application at the back office side and the gpi connector. The LAU key is associated to the back-office application per service (and version) through the configuration of the API proxy. Based on this configuration, when an HTTP request is received from the back-office, the API Proxy will analyse the request to match the backoffice application from which the request comes from.
The LAU key associated with that back-office application will then be used to verify the signature of the request. The signature must cover the JSON request or response payloads, the API specific part of the URI and the http headers. The algorithm to compute LAU signature must use “HmacSHA256” and “UTF-8” encoding.
m
M
N
n
o
O
P
p
q
R
r
S
PKI) A pervasive security infrastructure based on public-key cryptography, which provides digital signatures and supporting certification services. SWIFTNet Public Key Infrastructure comprises the SWIFTNet Certification Authority, the SWIFTNet Registration Authority, and the SWIFTNet Directory. These authorities provide the customer with online certificate management capabilities.
s
T
t
The part of a FIN message (block 4) that contains the substance of the message. The text format and structure varies according to the message type. |