eIDAS, IAM, KYC, … In the first part of the post Glossary of Digitization in companies, from ‘A’ to ‘Z’, we learned the meaning of these concepts, then we present the second part of this mini dictionary to know the meaning of some of the concepts that the digitization of business brings with it:
Mobility as a strategic axis within the SMAC business model: Social, Mobile, Analytics and Cloud. “Mobile” combines all areas around portable information and communication technology. The components include both mobile communications and mobile devices, such as laptops, smartphones that can access network applications (applications) and communication services over wireless networks (WLAN, GSM, GPRS, UMTS, LTE, etc.). There are also the expanded possibilities of local location (location-based services) and the enrichment of perception with information from the Internet (augmented reality).
Non-repudiation refers to the ability of a system to prove that a specific user and only that specific user sent a message and that it hasn’t been modified. On the internet, a digital signature is used not only to ensure that a message or document has been electronically signed by the person, but also, since a digital signature can only be created by one person, to ensure that a person cannot later deny that they furnished the signature.
We understand it as the remote identification process that allows users to register as new clients d, ensuring that they access all the services and products contracted in a simple and fast way, integrating themselves into the company’s client base. The Customer Onboarding process is the principle of the direct and consensual relationship with a client, being the crucial moment in which it will be decided whether the potential client becomes a client of our company or abandons in their attempt to be one.
It is a combination of hardware, software, and security policies and procedures that allow the safe execution of cryptographic operations, such as encryption, digital signature, and non-repudiation of electronic transactions. PKI is used to refer to both the certification authority and the rest of the components, as well as to indicate, in a broader and sometimes confusing way, the use of public key algorithms in electronic communications. This last meaning is incorrect, as specific PKI methods are not required to use public key algorithms.
Qualified Digital Certificate:
Qualified Digital Certificates are the most reliable guarantee to authenticate an identity. When a qualified digital certificate provided by a validated Certificate Authority (CA) is issued, it is assigned a public key infrastructure (PKI), binding its own certificate.
It is understood as the specialty in the management of regulatory processes within the financial sector through technology. Acting as an enabler, a nexus, in which the use of digital innovation facilitates compliance with existing or future regulatory requirements. It has a clear purpose, to address the dizzying pace of FinTech growth in the market. RegTech’s main functions include monitoring, reporting and regulatory compliance.
Digital signatures are based on digital certificates, issued by certificate authorities (CAs). Certificates are used to bind digital identities to a user-generated key pair, and contain data such as their name, the date the certificate expires, a copy of the public key, and information about the CA that issued the certificate. The corresponding CA verifies the identity of each user; once it has been carried out, said user can issue a digital certificate and sign the document they want. In turn, digital certificates are based on asymmetric cryptography, and as we have commented in the previous point, they have a public and a private key.
The telematic notifications with the administration, are those made by electronic means and that put an end to a procedure that must also be electronic, either because the interested party is obliged to do so, or because this has been expressly stated by an interested party who is not obliged by Law or Regulation to communicate with the Administration by electronic means. The digital notifications with the administration have undoubtedly laid the foundations for teleworking both by companies and by public officials themselves, digitizing relationships.
UX / UI:
UX (User Experience) refers to the way in which users interact with a product or service. That is, how and for what a user uses an object or interacts with a website or app. Instead UI (User Interface) focuses on the visual part. That is, if UX makes sure that a product is useful for users, UI makes it attractive and visual.
A videoconference is a communication that is established through a telecommunications network and that involves the transmission of sound and images. But beyond detailing the definition, it should be noted that currently video identification in videoconference is already considered as a fully legal means to digitally obtain qualified electronic certificates. In short, obtaining these digital certificates allows people to avoid unnecessary travel to protect the health of all, while we have a means with legal value, which allows us to carry out the necessary procedures.
It refers to the study of the operational aspects of a work activity: how tasks are structured, how they are carried out, what is their correlative order, how are they synchronized, how the information that supports the tasks flows and how compliance is monitored of the tasks. The workflows facilitate the automation of the sequences of actions, activities or tasks used to execute the process, including monitoring the status of each of its stages and providing the necessary tools to manage it.
Anything as a Service (XaaS). Everything as a service. Fully linked to Cloud Computing, it integrates totally or partially models such as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). A flexible consumption formula that makes all kinds of services available to anyone. Many companies use the XaaS model to undertake their digital transformation.
So far the largest unit of data a computer can hold. Byte is a group of eight (8) bits that represent a character in memory. One kilobyte contains 1,024 bytes. One megabyte contains 1,048,576 bytes. A Yottabyte contains 1,208,925,819,614,629,174,706,176. Yottabyte is abbreviated as YB and Yotta comes from the Greek word “Iota”, the ninth word of its alphabet.
The zero moment of truth refers to the moment in which the user investigates, searches, compares and is informed online to make a certain purchase decision. This critical moment is the beginning of the entire Customer Journey.
If you are interested in knowing more about innovative digital solutions, we encourage you to contact us. We will be delighted to help you.