Glossary of Terms

Glossary of Terms

As MOBI and its members create and update Standards, new terms will be added to the Glossary.

As MOBI and its members create and update Standards, new terms will be added to the Glossary.

Glossary of Terms Feedback

Please share your feedback, comments, and suggestions for the terms listed in the Glossary. Before providing feedback, please identify the term and its associated number. You can provide feedback for as many terms as you would like, but please only provide feedback for one term per form. The MOBI team will read and review all feedback and make updates accordingly.

A

A1. Access Certificate (AC) – An Access Certificate is a document providing the ability for a particular entity to access a particular endpoint in a network’s data layer.

A2. Accessor – An entity is an Accessor of a resource if it attempts to access the Uniform Resource Identifier (URI) endpoint. An Accessor may need to go through security and authentication processes in order to actually access said endpoint.

A3. Active Battery Materials – Material which reacts chemically to produce electric energy when the battery cell discharges.

A4. Additive Manufacturing – Additive Manufacturing is the process of creating an object by building it one layer at a time. It is the opposite of subtractive manufacturing, in which an object is created by cutting away at a solid block of material until the final product is complete. Additive manufacturing typically refers to 3-D printing.

A5. Advanced Shipment Notice (ASN) – An Advance Ship Notice or Advance Shipping Notice is a notification for pending deliveries. It is similar to a packing list and usually sent in an electronic format.

A6. Agent (Cloud-Agent, Software-Agent) – An Agent is a software component that is able to control an entity’s digital wallet (to an extent that is typically defined by the entity) and the communication to other agents in order to send or obtain information stored in the digital wallet. The agent software can be deployed on an edge device or server that is run by the entity itself or a service provider on behalf of that entity.

A7. Allow List – An Allow List is a list that specifies entities that are allowed to access a particular resource.

A8. Anti-Money Laundering (AML) – Anti-money laundering refers to the web of laws, regulations, and procedures aimed at uncovering efforts to disguise illicit funds as legitimate income. (Source: Investopedia, 2022)

A9. Application Programming Interface (API) – An Application Programming Interface is defined as a specification of possible interactions with a software component, allowing two applications to interact with each other. It defines the kinds of calls or requests that can be made, how to make them, the data formats that should be used, the conventions to follow, etc.

A10. Asset-Backed Security (ABS) – An Asset-Backed Security is a security whose income payments — and hence value — are derived from and collateralized (or “backed”) by a specified pool of underlying assets.

B

B1. Battery Any source of electrical energy generated by direct conversion of chemical energy and consisting of one or more non-rechargeable or rechargeable battery cells or of groups of them.

B2. Battery Birth Certificate (BBC) – A Battery Birth Certificate encapsulates essential digital battery data recorded at the inception of its service life, whether as a new unit, remanufactured entity, or repurposed resource. MOBI Battery Birth Certificate is a pivotal component in fostering traceability and interoperability across the global battery value chain.

B3. Battery Capacity – Measured in Amp-hour (Ah), battery capacity is defined as the amount of current that a battery can deliver for 1 hour before the battery voltage reaches the end-of-life point.

B4. Battery Pack Batteries or groups of cells that are connected and/or encapsulated within an outer casing so as to form a complete unit ready for use.

B5. Battery State of Charge (SOC) – Battery State of Charge is the remaining capacity/total capacity or rated capacity of a battery. As the battery ages, the remaining capacity decreases.

B6. Battery State of Health (SOH) – Battery State of Health is the ratio of total maximum capacity (in kWh) at any given time over beginning of life capacity (or rated capacity). The SOH deteriorates over long periods of usage, impacting the battery’s overall performance.

B7. Battery Management System (BMS) A Battery Management System manages a battery pack and monitors the operating state of modules and cells, calculates and reports various performance data, and balances the performance of individual cells and modules.

B8. Battery with Internal Storage – A battery with no attached external devices to store energy.

B9. Bill of Lading – The Bill of Lading is a transportation document that acts as a “contract of carriage,” containing the terms and conditions between the shipper and carrier.

B10. Bill of Material (BOM) – A Bill of Material is a list of all materials needed to manufacture an end product, along with the quantities of the materials.

B11. Binding – It is often desirable to establish an additional binding of credentials to the subject that they refer to (in general there is a distinction between the entity that has the credential in their wallet – the holder – and the entity whose attributes and permissions are described by a Verifiable Credential – the subject.) Binding methods include using secure hardware that protects a secret key where the associated public key is referenced in a verifiable credential.

B12. Block List – A list that specifies entities that are not allowed to access a particular resource.

B13. Blockchain – A blockchain is a growing list of records, called blocks, that are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a cryptographically secure tree structure such as a Merkle tree).

C

C1. C-rate – A C-rate is a measure of the rate at which a battery is discharged relative to its maximum capacity. A 1C rate means that the discharge current will discharge the entire battery in 1 hour. For a battery with a capacity of 100 Amp-hrs, this equates to a discharge current of 100 Amps. A 5C rate for this battery would be 500 Amps, and a C/2 rate would be 50 Amps.

C2. California Environmental Protection Agency (CalEPA) – The California Environmental Protection Agency consists of the California Air Resources Board (CARB), the Department of Pesticide Regulation (DPR), the Department of Resources Recycling and Recovery (CalRecycle), the Department of Toxic Substances Control (DTSC), the Office of Environmental Health Hazard Assessment (OEHHA), and the State Water Resources Control Board (SWRCB).

C3. Certificate of Conformity (CoC) – A Certificate of Conformity is a declaration of conformity of vehicles with the type approval of the European community. It ensures the free movement of vehicles within the European Union, specifically for those vehicles that are subject to homologation or registration.

C4. Circular Business Model (CBM) – A circular business model articulates the logic of how an organization creates, offers, and delivers value to its broader range of stakeholders while minimizing ecological and social costs. (Source: Sustainability Guide, 2017)

C5. Credential Holder – A Credential Holder is a device/user/application that holds a Verifiable Credential about a subject(s) and presents it to a verifier(s) in order to access goods/services.

C6. Credential Issuance – Credential Issuance describes the process by which an authority (“issuer”) creates and transfers (“issues”) a verifiable credential to a holder in bilateral communication. This requires different communication steps to include and verify associated data. Consequently, credential issuance is frequently preceded by a verifiable presentation in which the prospective holder convinces the issuer of their eligibility.

C7. Credential Issuer – A Credential Issuer is a device/user/application that asserts claims about one or more subjects by creating a Verifiable Credential and providing it to a holder of the credential.

C8. Credential Subject – A Credential Subject is the subject of a Verifiable Credential and may be a device/user/application. In many cases, the holder is the subject.

C9. Credential Verifier – A Credential Verifier is a device/user/application that receives and validates a Verifiable Credential from a holder in order to provide goods/services to the holder.

C10. Credit Rating Agencies (CRA) – A Credit Rating Agency (also called a ratings service) is a company that assigns credit ratings, which rate a debtor’s ability to repay debts by making timely principal and interest payments and determine the likelihood of default.

C11. Cryptographically Sound – A cryptographic method is cryptographically sound if the (cryptographic) statement is false and no cheating prover can convince an honest verifier that it is true (excepting some small probability)

D

D1. Data and Functional Interoperability – Data Interoperability addresses the ability of systems and services that create, exchange, and consume data to have clear, shared expectations for the contents, context, and meaning of that data.

D2. Data Bucket – A logical data abstraction for a persistent data store. Data written to a Data Bucket can be used repeatedly over time.

D3. Data Exchange – Data Exchange is the process of taking data structured under a source schema and transforming it into data structured under a target schema so that the target data is an accurate representation of the source data. Data exchange allows data to be shared between different computer programs.

D4. Data Host – A Data Host is an entity that stores data and is trusted with properly administering it, authenticating requests to access the data, and distributing the data as needed.

D5. Data Host Bootstrap Certificate – The Data Host Bootstrap Certificate is a certificate that provides a cryptographic proof that a particular entity (Data Host) is allowed to serve a particular type of data from a specific Uniform Resource Identifier (URI).

D6. Data Owner – The Data Owner is the owner of a certain piece of data, usually the same as the entity that generated said data (referred to as the Data Generator).

D7. Data SpaceA Data Space is a framework that supports data sharing within a data ecosystem. It provides a clear structure for participants to share, trade, and collaborate on data assets in a way that is compliant with relevant laws and regulations and ensures fair treatment for all involved. (Source)

D8. Data Stream – A logical data abstraction for data buffers. Acts as an ephemeral “stream” of data and persists for a set period of time in the network until it is purged in the online systems, thereafter, moved to nearline data systems, and ultimately moved to offline data systems.

D9. Dealer Management System (DMS) – A Dealer Management System is a software suite that provides the tools auto dealers need to more effectively run their businesses, typically including features for automation, data management, and more.

D10. Decentralized Data Marketplace – A decentralized data marketplace or exchange is a network run on a secure, smart contract blockchain that enables users to restore control over their data and monetize data assets without relying on a centralized platform.

D11. Decentralized Identity – A cryptographic technology that enables entities to assert ownership of their identity, where the identity remains private and not disclosed during transactions in decentralized ecosystems.

D12. Decentralized Identifier (DID) – A W3C Decentralized Identifier represents a globally unique identifier that can be resolved to a DID Document, or de-referenced on a specific distributed ledger network, much like a URL on the Internet.

D13. Decentralized Storage System (DSS) – A Decentralized Storage System is a non-static collection of data storage nodes with a global identifier where each node typically consists of a set of object revisions (“commits”) which each represent a change (creation, update, or deletion) of a single node object. Each commit is signed, immutable, and content-addressable (typically stored and referenced by its hash).

D14. Delivery Note – A Delivery Note is a document that lists out the description and quantity of the goods in a delivery. It can be signed by the recipient and returned to the seller as proof of delivery

D15. DID Document – A DID Document is a simple text document that describes how to use a given Decentralized Identifier (DID). Each DID Document may contain at least three things: proof purposes, verification methods, and service endpoints. A DID Document can specify that a particular verification method, such as a cryptographic public key or a pseudonymous biometric protocol, can be used to verify a proof that was created for the purpose of authentication. Service endpoints enable trusted interactions with the DID controller.

D16. Differential Privacy (DP) – A method for obfuscating sensitive information by adding noise with expectation value 0 to data. Differential Privacy is best suitable in scenarios where large datasets are aggregated as the expected value of the average does not change under adding noise whose distribution is centered at 0, and where mathematical guarantees for the indistinguishability of entities with respect to query results are required.

D17. Digital Twin – A Digital Twin is a digital representation of a real-world entity or system. The implementation of a digital twin is an encapsulated software object or model that mirrors a unique physical object, process, organization, person, or other abstraction.

D18. Digital Wallet – A digital wallet contains private keys that can be used to encrypt messages, prove control over a DID, permissions or property on a distributed ledger, or eligibility to use a VC. A digital wallet typically also contains VCs. If binding is relevant, a digital wallet can also contain a link secret or similar constructions that should never leave the wallet in unblinded form. Frequently, digital wallets also contain information about (private) peer-to-peer connections with and references of other entities in the digital identity ecosystem.

D19. Distributed Ledger Technology (DLT) – Distributed Ledger Technology enables consensus about the state of replicated, shared, and synchronized digital data geographically spread across multiple sites, countries, or institutions. A peer-to-peer network is required as well as consensus algorithms to ensure replication across nodes is undertaken. Blockchains are the most well-known example, though general practical byzantine fault-tolerant systems fall under this category as well.

E

E1. Economic Operator (EO) – An Economic Operator can be a person or an organization, who are authoritative to take up the duty of ensuring compliance.

E2. Electronic Control Unit (ECU) – An Electronic Control Unit is an embedded electronic device, basically a digital computer, that reads signals coming from sensors in different components of the car. The ECU also controls various important units depending on information from the sensors.

E3. Electronic Data Interchange (EDI) – Electronic Data Interchange is the computer-to-computer interchange of strictly formatted messages that represent documents other than monetary instruments. EDI implies a sequence of messages between two parties, either of whom may serve as originator or recipient.

E4. End-of-Life (EOL) – End-of-life of a product occurs when it reaches the end of its life. When a product reaches EOL, it has reached the end of its useful life and is retired. Depending on the product and it’s condition at EOL it can be recycled, repurposed or sent to disposal.

E5. Engine Serial Number (ESN) – The Engine Serial Number is a unique number that identifies (within the context of a known manufacturer) an engine block.

E6. Entity – An Entity (e.g. vehicle, corporation, individual, etc.) is a network participant that interacts with the system by reading/writing data, enforcing permissioning, or otherwise supporting the network in some way. An entity can be identified using an entity certificate anchored on a DLT.

E7. Entity Certificate (EC) – An Entity Certificate is the certificate that represents all of a particular entity’s network-level information and metadata, including but not limited to identifiers about who they are, the URIs to delegate trust to, and their public keys. An EC is always paired with a corresponding Entity Identifier (EID).

E8. Entity Identifier (EID) – An Entity Identifier is a unique string that uniquely identifies an entity within the system network.

E9. European Union (EU) – The European Union is a unique partnership between 27 European countries, known as Member States, or EU countries. Together they cover much of the European continent. The EU is home to around 447 million people, which is around 6 % of the world’s population.

E10. Electric Vehicle (EV) – An Electric Vehicle is defined as a vehicle that can be powered by an electric motor that draws electricity from a battery and is capable of being charged from an external source. An EV includes both a vehicle that can only be powered by an electric motor that draws electricity from a battery (all-electric vehicle) and a vehicle that can be powered by an electric motor that draws electricity from a battery and by an internal combustion engine (plug-in hybrid electric vehicle).

F

F1. Floor Plan Audit – The primary purpose of a Floor Plan Audit is to reconcile the inventory used as collateral for the floor plan financing to reduce the lender’s risk.

F2. Floor Plan Lending/Financing – Floorplan Financing is a revolving line of credit that allows the borrower to obtain financing for retail goods. These loans are made against a specific piece of collateral (a vehicle or other asset, for example.)

F3. Freight Forwarder – A Freight Forwarder is an organization that provides logistics services as an intermediary between the shipper and the carrier, typically on international shipments.

G

G1. Geographic Location – A physical space or location that can be represented by either a single latitude, longitude, or altitude, or a combination. Such locations can be warehouses, intersections, fixed locations on a highway, etc.

G2. Governance – A set of rules and protocols by which owners/users of a system operate and manage it.

G3. Green Bonds – A Green Bond is a type of fixed-income instrument that is specifically earmarked to raise money for climate and environmental projects. These bonds are typically asset-linked and backed by the issuing entity’s balance sheet, so they usually carry the same credit rating as their issuers’ other debt obligations.​

G4. Group Permission Change Certificate (GPC) – Group Permission Change Certificates are certificates signed by a data owner prompting a Data Host to change the permissioning information of the group.

H

H1. Hashing Hashing is the process of transforming any given key or a string of characters into another value. This is usually represented by a shorter, fixed-length value or key that represents and makes it easier to find or employ the original string. The most popular use for hashing is the implementation of hash tables. (Source: TechTarget, 2021)

H2. Homomorphic Encryption (HE) – Homomorphic Encryption allows performing computations on encrypted data (i.e., making meaningful operations without decrypting and knowledge of the decryption key). HE is either very limited in scope (either additions or multiplications, such as in the Pallier cryptosystem) or brings significant performance challenges when arbitrary operations need to be supported (“fully homomorphic encryption”).

I

I1. Identity – Identity is a combination of one or more unique identifiers having meta-data associated with them. Identity meta-data consists of certificates such as verifiable credentials (per the W3C definition) and other non-verifiable data objects associated with the unique identifier(s).

I2. Industrial Battery – Any battery designed for industrial uses and any other battery excluding portable batteries, electric vehicle batteries and automotive batteries

I3. Integrated Trust Network (ITN) – The Integrated Trust Network is a federated network of nodes providing trusted identity services (W3C Decentralized Identifiers [DIDs] Registry). The ITN is the first enterprise network to support multiple blockchains simultaneously. Its unique features ensure high resilience by not relying on a single organization or blockchain for functionality and sustainability.

I4. International Material Data System (IMDS) – The International Material Data System is the automobile industry’s material data system. Initially, it was a joint development of Audi, BMW, Daimler, DXC, Ford, Opel, Porsche, VW and Volvo. Further manufacturers have meanwhile joined the community and IMDS has become a global standard used by almost all of the global OEMs. Talks are being held with further manufacturers regarding their participation in IMDS. In IMDS, all materials used for automobile manufacturing are collected, maintained, analysed and archived. Using the IMDS, it is possible to meet the obligations placed on automobile manufacturers, and thus on their suppliers, by national and international standards, laws and regulations.

I5. International Organization for Standardization (ISO) – The International Organization for Standardization is an independent, non-governmental, international standard development organization composed of representatives from the national standards organizations of member countries.

I6. Intersection Movement Assistance (IMA) – Intersection Movement Assistance warns a driver if another vehicle is running a red light or making a sudden turn when approaching an intersection.

K

K1. Key-Value Store (KVS) – A Key-Value Store is a system that stores (key, value) pairs. The key is used to obtain access to the value in some way. Distributed KV stores are KV stores spread across multiple machines and can effectively maintain a global state table.

K2. Know Your Customer (KYC) – Know Your Customer is the process of verifying the identity, risks, and other information associated with a customer before initiating any business relationship.

L

L1. Left Turn Assistance (LTA) – Potential collisions with oncoming traffic while turning left belong to the most safety-critical situations accounting for ~25% of all intersection crossing path crashes. A Left Turn Assist was developed to reduce the number of crashes.

L2. Light Detection and Ranging A remote sensing method that uses a laser to measure distance.

L3. Light Means of Transport (LMT) – Light Means of Transport refers to wheeled vehicles that have an electric motor of less than 750 watts, on which travellers are seated when the vehicle is moving and that can be powered by the electric motor alone or by a combination of motor and human power;

L4. Lithium Ion Battery (LiB) – A Lithium-Ion Battery is a type of rechargeable battery technology that leverages the unique properties of lithium, the lightest of all metals.

L5. Loan Administration – Loan Administration refers to a lender’s processing of a loan and includes the review, underwriting, and evaluation of a loan application, as well as document processing and preparation of the loan closing.

L6. Loan Servicing – Loan Servicing is the process by which a company collects interest, principal, and escrow payments from a borrower.

L7. Location Authority – Device/user/entity/application that owns/operates the physical location/segment/service and has a way to identify the subject, detect physical presence of the subject, or confirm the service provided to the subject.

L8. Location Presence Credential – A specific type of credential that contains attributes of evidence to confirm the subject’s physical presence at a location. For example, “here are the attributes to prove that I was present at a mile marker 6.4 on IH10. on 07.01.2021 at 8:00AM CST.”

L9. Logistics Service Provider (LSP) – Logistics service providers, commonly referred to as third-party logistics (3PL) providers, are companies that specialize in the handling, storage and transportation of goods

M

M1. Master Data – Specifications and information related to products and business partners, such as supplier’s address and banking information. Master data management aims to provide data and processes for collecting, matching, persisting, and distributing such data within an organization but potentially also with business partners to ensure a single source of truth that provides consistency and control.

M2. MOBI Trusted Trip Verifiable Credential (MTTVC) – An abstract credential consisting of a subject’s information related to location and other attributes structured using W3C Verifiable Credential Data Model 1.0 standards.

M3. Mobility Infrastructure – Mobility infrastructure is a network of sociotechnical systems that enable the movement of people, things, information, and energy.

M4. Mobility Service Provider – A Mobility Service Provider delivers door-to-door transportation service needs as a single entity.

M5. Mobility Services – Transportation services from public and private transportation providers.

M6. Multi-Party Application – A service or process that requires the participation and coordination of multiple disjoint entities.

M7. Multi-Party Computation (MPC) – Multi-Party Computation allows the computation of a function with multiple inputs provided by different entities where every participant does not learn the others’ private inputs but only the final result. Often, MPC also involves methods to make sure that the participants perform their task correctly

M8. Motor Vehicle Authority (MVA) – A Motor Vehicle Authority is an administrative body responsible for overseeing and regulating aspects related to motor vehicles, including licensing, registration, safety standards, and enforcement of related laws and regulations.

N

N1. Network – A group of entities that all participate in a digital system, generally with a specific goal in mind. Ex: A group of entities that participate in a distributed ledger such as Ethereum.

N2. Node – A node is a point of intersection/connection within a network. In an environment where all devices are accessible through the network, these devices are all considered nodes. The individual definition of each node depends on the type of network it refers to.

O

O1. Open ID Connect (OIDC) – A standard for federated identity management (that is often used in enterprise single sign-on and social login) in which clients (such as a mobile application or a server) can request and receive information about valid sessions. In essence, a user proves attributes attested by a dedicated identity provider (such as the company HR or IT department, or Google/Facebook) by means of a signed JSON document that contains information about their identity.

O2. Obligor/Obligee – An obligor is a person or entity who is bound to another by contract or other legal procedure. Conversely, an obligee is a person or entity to whom another is bound by contract or other legal procedure.

O3. Onboard Diagnostics (OBD) – Onboard Diagnostics 2 implementations use a standardized digital communications port to provide real-time data in addition to a standardized series of diagnostic trouble codes (DTCs).

O4. OEM Specific Dealer – Dealerships in agreement/partnership with OEMs

O5. Oracle – A standard for federated identity management (that is often used in enterprise single sign-on and social login) in which clients (such as a mobile application or a server) can request and receive information about valid sessions. In essence, a user proves attributes attested by a dedicated identity provider (such as the company HR or IT department, or Google/Facebook) by means of a signed JSON document that contains information about their identity.

O6. Original Equipment Manufacturer (OEM) – An Original Equipment Manufacturer (OEM) is an organization that makes devices from component parts either made internally or sourced from other organizations.

P

P1. Peer-to-Peer (P2P) – A peer-to-peer service is a decentralized platform whereby two individuals interact directly with each other, without intermediation by a third party. Instead, the buyer and the seller transact directly with each other via the P2P service. The P2P platform may provide services such as search, screening, rating, payment processing, or escrow. (Source: Investopedia, 2021)

P2. Personally Identifiable Information (PII) – Personally Identifiable Information is any information: (1) that identifies or can be used to identify, contact, or locate the person to whom such information pertains, (2) from which identification or contact information of an individual can be derived, or (3) that is or might be directly or indirectly linked to a natural person [ISO/IEC 29100:-1].

P3. Physical Location – A site (an area, a structure, or group of structures) or an area within the site where something was, is, or will be located. For example, loading dock #4, berth at Terminal 1. Physical locations may be defined by an organization for its business operations and identified using Global Location Number (GLN).

P4. Proof Creation – In a Verifiable Presentation, based on a proof request, the prover searches references (VCs or addresses of DLT transactions/smart contracts) in their digital wallet that allow them to present their attributes or permissions, together with a proof of their validity. This proof might be derived from one or several VCs in the prover’s digital wallet, the correctness of which can be verified based on the issuer’s signature on it, or the address of a DLT smart contract or transaction that testifies the claim.

P5. Proof Request – In a Verifiable Presentation, the verifier typically tells the prover at the start of the interaction which information they need, and what kind of proof they expect (a positive list of issuers that the verifier trusts, restrictions regarding the timeliness of a proof of non-revocation).

P6. Proof Transmission – In a Verifiable Presentation, after creating the proof, the holder sends it as a message to the verifier. The proof might be a Zero-Knowledge Proof derived via selective disclosure from one or several VCs, or a plaintext presentation of a VC that the holder has in their wallet, or a DLT transaction or smart contract address on a distributed ledger that the verifier can read and trust.

P7. Proof Verification – In a Verifiable Presentation, the verifier checks the correctness of the proof based on the requirements that they previously stated in the proof request and the proof that the prover sends. This can involve one or multiple read operations on a DLT or another verifiable data registry.

R

R1. Rechargeable Battery A battery that is designed to be electrically recharged.

R2. Vehicle Registration Document – The Registration Certificate or vehicle registration document gives the driver official permission to drive the vehicle. The document contains information about the owner and the vehicle, such as the owner’s name, the date of its manufacture, and the engine and chassis numbers. The registration certificate must always be carried by the driver and must be available at a traffic stop. In this way, the vehicle can be identified. A registration certificate is required for all vehicles subject to registration. In some legislations, it also indicates ownership of the vehicle. If the vehicle is financed (credit/leasing), the document typically remains with the lender.

R3. Revocation – When entities use Verifiable Credentials (VCs) or entries of a Distributed Ledger to prove their claims in a Verifiable Presentation (VP), there must be a means to disable their capability to create proofs from this when the reason why the issuance had happened ceases to be legitimate.

R4. Revocation Certificate – Revocation Certificates (RC) revoke Access Certificate (AC) permissions if the AC has not expired automatically.

R5. Role – In a digital network, roles regulate the creation of and access to data contained within the network.

S

S1. Second Life of Batteries Rechargeable batteries after their state of health has reduced and reached a certain level that makes it inefficient for its first intended use, can then be used for other purposes (or second life). For example, electric vehicle (EV) batteries can be reused for home storage after it has been declared unsuitable for EV use.

S2. Second Life of Batteries – Rechargeable batteries after their state of health has reduced and reached a certain level that makes it inefficient for its first intended use, can then be used for other purposes (second life). For example, electric vehicle (EV) batteries can be reused for home storage after it has been declared unsuitable for EV use.

S3. Secure Sockets Layer – Secure Sockets Layer is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.

S4. Securitization – Securitization is the financial practice of pooling various types of contractual debt (such as residential mortgages, commercial mortgages, and auto loans), credit card debt obligations, or other non-debt assets which generate receivables, and selling their related cash flows to third party investors as securities.

S5. Self-Sovereign Digital TwinA Self-Sovereign Digital Twin™ is a secure digital counterpart of an entity such as a person, organization, or device. Acting as a “user agent,” an SSDT™ securely stores credentials and enables the controlling entity to authenticate its identity and selectively disclose necessary data for transactions. This portable and interoperable digital twin facilitates seamless and secure interactions within the decentralized Web3 ecosystem.

S6. Self Sovereign Identity (SSI) – A new cryptographic technology that enables entities to assert ownership of their identity, where the identity remains private and not disclosed during transactions in decentralized ecosystems.

S7. Service Provider – An organization that provides services.

S8. Special Purpose Vehicle (SPV) – A Special-Purpose Vehicle is a legal entity created to fulfill narrow, specific, or temporary objectives. SPVs are typically used by companies to isolate the firm from financial risk

S9. Standard Carrier Alpha Code (SCAC®) – The Standard Carrier Alpha Code is a unique two-to-four-letter code used to identify transportation companies.

S10. Start of Trip Verifiable Credential – A specific type of MTTVC that contains attributes of evidence to confirm the subject’s commencement of a trip. A message set triggered by a device/user/entity/application that begins monitoring of data which initializes the start of a trip with associated parameters being recorded in parallel to proving the existence of such a proof.

S11. State of Certified Energy (SOCE) – State of certified energy means the measured or on-board usable battery energy (UBE) performance at a specific point in its lifetime, expressed as a percentage of the certified usable battery energy.

S12. Subject – A subject may be a device/user/entity/application. In many cases, the holder of a VC is the subject.

S13. Suppliers – Suppliers are providers of goods or services.

S14. Sub-Wallet – Sub-wallet is a conceptual wallet with a specific configuration and grouping of documents in the SSDT. The Sub-Wallet is part of the Universal Wallet which is part of the Self Sovereign Digital Twin (SSDT). The Sub-Wallet inherits the capability of the SSDT and includes a specific set of verifiable credentials and data related to one specific application or use case. The SSDT can have multiple sub-wallets.

T

T1. Tier-1 Suppliers – Tier-1 suppliers are companies that provide parts and materials directly to manufacturers.

T2. Tier-N Suppliers – Tier-N suppliers are suppliers that exist beyond Tier-1 (contracted) suppliers and form the network of companies that provide the Tier-1 supplier with the goods or services they need to deliver their goods or service to the ultimate buyer.

T3. Tokenized Carbon Credits (TCC) – Tokenized Carbon Credits are digital, tradable certificates or permits that represent the right to emit a specified amount of greenhouse gas.

T4. Transmission Serial Number (TSN) – The Transmission Serial Number is a unique number that identifies (within the context of a known manufacturer), a transmission unit.

T5. Transport Layer Security – The Transport Layer Security protocol is the successor of SSL and aims primarily to provide privacy and data integrity between two or more communicating computer applications.

T6. Trip as an Activity – An act of traversing from one location to another location using any mode of transportation. For example, a trip from Chicago (location 1) to New York (location 2) using a vehicle.

T7. Trip Completion Verifiable Credential – A specific type of MTTVC that contains attributes of evidence to confirm the subject’s completion of a trip. For example, “here are the attributes to prove that I completed a trip from A to B on 07.01.2021 at 8:00AM CST.”

T8. Trust Anchor – An authoritative entity that validates and qualifies entities on the network specific to the entity’s corresponding role.

T9. Trusted Executive Environment (TEE) – TEE is hardware for which the manufacturer guarantees that code is executed correctly on it (“remote attestation”) and no information is leaked outside the hardware. A prominent example is Intel’s Software Guard Extensions (SGX) solution. By creating a private key inside the TEE and only making the corresponding public key available, information can be encrypted in a way that makes sure it can only be decrypted inside a TEE.

U

U1. Ubiety – The particular location in space and time of a person, entity, device, or thing.

U2. Uniform Resource Identifiers (URIs) – Uniform Resource Identifiers ensure that a named URI will always point to the same resource it was assigned to. Note that this is similar to the addressing system on many blockchain platforms and represents one way to implement a URI.

U3. Unique Vehicle Identifier (UVI) – A unique vehicle identifier is a unique identifier within the system described in this standard. Note that a unique vehicle identifier is not the same concept as a VID.

U4. Universally Unique Identifiers (UUIDs) – Universally Unique Identifiers are unique identifiers that are associated with pieces of digital information and can be used to address and identify them.

U5. URL – A specific type of Uniform Resource Identifier (URI) referencing web resources.

V

V1. Vehicle Birth Certificate (VBC) – A Vehicle Birth Certificate is a data structure of strings and integers that records information about a particular vehicle at its creation.

V2. Vehicle Identity (VID) – A Vehicle Identity comprises a Unique Vehicle Identifier (UVI) and its associated data.

V3. Vehicle Registration Workflow – The process of registering a vehicle through the interaction of a vehicle (and typically other stakeholders such as the vehicle dealer or owner) with an authority.

V4. Vehicle-to-Grid (V2G) – Vehicle-to-Grid refers to a type of use case that centers around the coordinated, either uni- or bi-directional energy exchange between vehicles and the grid.

V5. Verifier – Device/user/entity/application that receives a VC from a holder to verify the credentials presented by the holder in order to provide goods/services to the holder.

V6. Verifiable Credential – The W3C Verifiable Credentials Standard defines Verifiable Credentials as “a part of our daily lives; driver’s licenses are used to assert that we are capable of operating a motor vehicle, university degrees can be used to assert our level of education, and government-issued passports enable us to travel between countries. This specification provides a mechanism to express these sorts of credentials on the Web in a way that is cryptographically secure, privacy-respecting, and machine-verifiable.

V7. Verifiable Data Registry – It plays a role in mediating the creation and verification of identifiers, keys, VC schemas, revocation registries, issuer of public keys, etc. It may be a trusted database, government identity database, or distributed ledger/blockchain.

V8. Verifiable Presentation (VP) – A verifiable presentation is a tamper-evident presentation encoded in such a way that authorship of the data can be trusted after a process of cryptographic verification. Certain types of verifiable presentations might contain data that is synthesized from, but do not contain, the original verifiable credentials (for example, zero-knowledge proofs). (Source: W3C, 2022)

V9. Verifiable Presentation (VP) by Holders – A holder sends a message set to a verifier, depending on the use case, various attributes about an activity/trip occurred along with proofs of issuer and holder.

V10. Vehicle Identification Number (VIN) – A unique code, including a serial number, used by the automotive industry to identify individual motor vehicles, towed vehicles, motorcycles, scooters, and mopeds, as defined in ISO 3779 (content and structure).

W

W1. Waterfall Structure – Waterfall payment structures require that higher-tiered creditors receive interest and principal payments while lower-tiered creditors receive principal payments only after the higher-tiered creditors are paid back in full. Debtors typically structure these payments into such tranches to prioritize the highest-principal loans first because they are also likely the most expensive.

W2. Web3 — Web3, or the decentralized web, is the next generation of the internet. It promotes data spaces interoperability for security and transparency, user control, and direct transactions.

W3. World Wide Web Consortium (W3C) – The World Wide Web Consortium is the main international standards organization for the World Wide Web. Founded in 1994 and led by Tim Berners-Lee, the consortium is made up of member organizations that maintain full-time staff working together in the development of standards for the World Wide Web.

Z

Z1. Zero-Knowledge Proof (ZKP) – In cryptography, a zero-knowledge proof is a method by which one entity (the prover, assumed to be computationally powerful) can prove to another party (the verifier, assumed to be computationally restricted) that a particular statement is true without revealing any further information.