Smart Card Application Standard Draft
|
|
|
- Blaze Bond
- 9 years ago
- Views:
Transcription
1 Smart Card Application Standard Draft
2 Contents 1 SCOPE DEFINITIONS / DOCUMENT CONVENTIONS KEY DATA ELEMENTS AND CONCEPTS STATIC CARD INFORMATION Card ID (CdID) Application Version CHALLENGE/RESPONSE VERIFICATION Challenge Response Verification CARD READING PROCESS APDU/RPDU SPECIFICATIONS ERROR HANDLING SELECT EVAPP COMMAND/RESPONSE APDU RPDU STATIC READ APPLICATION COMMAND/RESPONSE APDU RPDU SECURITY OPERATION COMMAND/RESPONSE APDU RPDU VERIFICATION REQUEST... 17
3 Scope This document standardizes a contactless smartcard EV application (EVAPP) to ensure that an EV charging card can be read and verified. The document introduces key concepts and then specifies the actual messages between the smart card and the CS. Definitions / Document Conventions Term Charge Spot (CS) Card Charge Spot Operator (CS Operator) Card Issuer Verification EVAPP APDU RPDU Definition A power outlet to which a vehicle connects and which includes an ISO/IEC type A and B contactless smartcard card reader and a communication network connecting to the card issuer. An ISO/IEC type A or B contactless smartcard. The organization operating the CS. A CS would normally connect to a control center operated by the CS operator and only through it to the card issuer systems. The organization that issued the card to the customer and can verify its authenticity. This organization would normally have some contact in place with both the customer and the CS operator to facilitate the use of electricity by the customer at the CS. The process of ensuring that a card is genuine and information was not retransmitted. The card application standardized in this document. This application would be issued a unique card application ID according to ISO/IEC APDU stands for Application Protocol Data Unit. A communication unit between a smartcard reader and a smartcard. The structure of an APDU is defined by the ISO/IEC 7816 standards. Short for response APDU.
4 Key Data Elements and Concepts Static card information The following information should be available on the card, transmitted to the CS and forwarded to the acquirer during a card read. Card ID (CdID) The card ID is send by the card both in clear text and signed as part of the cryptogram for verification purposes. The card ID is used by the CS or CS operator to route the verification request to the card acquirer. Content Field Country Operator Card Number Length/Range 2 characters ,999,999 Description Country code Numerical code of the card issuer Management Display Format According to ISO Allocated by national standardization bodies. Serial number assigned to the card Assigned and manage by a card issuer. Field Country Separator Operator Separator Serial Number Format/Value String. Decimal Number Example Transport Format IL Decimal Number Field Padding Country Operator Serial Number Format Example ASCII 00 00IL character ASCII string Decimal number left padded with zero to fill 3 characters ASCII string Decimal number left padded with zero to fill 9 characters ASCII string 2
5 Application Version CdVer and CdEnc are 4 bytes unsigned integers written to the card at issuing or pre-personalization and should not be writable from the outside afterwards. CdVer and CdEnc are sent by the card with each use and relayed to the card acquirer. Their use is determined by the card issued and acquirer and is opaque to CS and CS operator. These fields enable flexibility in issuing cards which enable updates while keeping compatibility with older cards. Two use cases already identified are: o Changing a master key: a different CdVer value could be used to indicated a different master key in case of a compromise or key distribution. o Changing encryption algorithms: if the card is capable of more advanced algorithms, or if a flaw is found in the response generation function, CdEnc can indicate a different encryption suite. Challenge/Response Verification Card verification is performed between the CS, card and the card issuer using a challenge/response mechanism and the following flow. Note that the actual implementation of the response generation is internal to the card and issuer system and not part of this standard.
6 Challenge The following fields should be sent by the CS to the card as a challenge: TransTime Unsigned Integer 8 bytes Current time in Unix time format 3. RdRand Unsigned Integer 4 bytes A random number CsIDHash Unsigned Integer 4 bytes See section 0 for more information 3 For details on Unix time refer to
7 CSID. Response The following fields should be sent by the card to the CS as a response: Cryptogram Unsigned Integer 24 bytes The card response to the challenge. CdCount Unsigned Integer 2 bytes The card may keep a 16 bit internal card register that is incremented each time the card provided a challenge response to a reader. The counter enables a verification server to ensure that a response is not recorded and retransmitted intentionally. Note that while the card has this feature the verification server does not have to use and can rely on the alternate time based method Verification As noted the details of the verification process are internal to the card issuer implementation. However, the system allows for the following mechanisms to ensure that information cannot be copied of replayed: The card ID may be signed by the card. The transaction time may be signed by the card. CdCount may be implemented and signed by the card to ensure it is an ever increasing number. The device ID of the charge spot is signed by the card. The issuer may alternate means of validating the ID, such as ensuring the charge requests for a device are received only from the partner to which this device belongs.
8 Card Reading Process The card read phase will have the following phases: Phase Request Response Description 1 ISO/IEC Polling 2 ISO/IEC Anti-Collision 3 ISO/IEC Activation According to the ISO/IEC principles. 4 Select EVAPP by AID 5 Read Static Record EVAPP FCI See 0 Card Static information See 0 6 Perform Security Operation Cryptogram See 0 7 ISO/IEC Teardown Close the connection as defined by ISO
9 APDU/RPDU specifications Error Handling Any other coding of the any of the APDU below will be answered by the card using an ISO/IEC SW1SW2 that define a relevant error code. A multi-application reader might send to the card other commands during the application selection phase not listed below, the card will response to any other commands not listed below using an ISO/IEC SW1SW2 error code. Select EVAPP Command/Response APDU The Select Application command is detailed in the standard ISO/IEC The coding of the select EVAPP APDU will be according to the following: Issue: Length Issue: APDU Field Issue: Value Issue: 1 Issue: CLA Issue: 0x00 Issue: 1 Issue: INS Issue: 0xA4 Issue: 1 Issue: P1 Issue: 0x04 Issue: 1 Issue: P2 Issue: 0x00 Issue: 1 Issue: Lc Issue: 0x07 Issue: 7 Issue: Data Issue: EVAPP Issue: 1 Issue: Le Issue: 0x00 Packet Example: A XX XX 0008 XX XX XX XX XX 00 RPDU The above Select application APDU will be responded by the card with the following RPDU:
10 Issue: Length Issue: Template Issue: Tag Issue: 2 Issue: 0x6F Issue: Issue: 8 Issue: Issue: 0x84 Issue: 3 Issue: Issue: 0xA5 Issue: 8 Issue: Issue: Issue: 8 Issue: Issue: Packet Example: F 1B XX XX XX 0008 XX XX XX XX A5 10 DF XX XX XX XX DF XX XX XX XX Static Read Application Command/Response APDU The Read Redcord command is detailed in the standard ISO/IEC The coding of the APDU of read record command in the EVAPP will be according to the following: Issue: Length Issue: APDU Field Issue: Value Issue: 1 Issue: CLA Issue: 0x00 Issue: 1 Issue: INS Issue: 0xB2 Issue: 1 Issue: P1 Issue: 0x01 Issue: 1 Issue: P2 Issue: 0x0C
11 Issue: 1 Issue: Lc Issue: 0x00 Packet Example: B2 01 0C RPDU The above Select application APDU will be responded by the card with the following RPDU: Issue: Length Issue: Template Issue: Tag Issue: 2 Issue: 0x70 Issue: Issue: 13 Issue: Issue: 0xDF 0x81 0x12 Packet Example: DF XX 0008 XX XX XX XX XX XX XX XX 0010 XX Security Operation Command/Response APDU The Perform Security Operation command is detailed in the standards ISO/IEC and ISO/IEC The APDU of the perform security operation in the EVAPP APDU will be according to the following: Issue: Length Issue: APDU Field Issue: Template/Tag Issue: 1 Issue: CLA Issue: Issue: 1 Issue: INS Issue: Issue: 1 Issue: P1 Issue:
12 Issue: 1 Issue: P2 Issue: Issue: 1 Issue: Lc Issue: Issue: 7 Issue: Data Issue: 0xF0 Issue: Issue: Issue: 0xDF 0x81 0x13 Issue: Issue: Issue: 0xDF 0x81 0x14 Issue: Issue: Issue: 0xDF 0x81 0x15 Issue: 1 Issue: Le Issue: Packet Example: A E F0 1C 0008 DF XX XX XX XX 0010 XX XX XX XX DF YY YY YY YY DF TT TT TT TT 00 RPDU The above security operation APDU will be responded by the card with the following RPDU: Issue: Length Issue: Template Issue: Tag Issue: 2 Issue: 0x77 Issue: Issue: 6 Issue: Issue: 0xDF 0x81 0x17 Issue: 28 Issue: Issue: 0xDF 0x81 0x16 Packet Example: DF XX 0008 XX DF YY YY YY
13 0010 YY YY YY YY YY YY YY YY 0018 YY YY YY YY YY YY YY YY 0020 YY YY YY YY YY
14 Verification Request Based on information the charge spot gathers during card read, it creates a verification block. The verification block is the data unit sent across the network from the charge spot to the card issuer and used to verify the authenticity of the card. The structure of the verification block is: Field Format Length Description CdVer Unsigned integer 4 bytes Application version used by the card as sent by the card. CdEnc Unsigned integer 4 bytes Encryption algorithm used by the card as sent by the card. CdID Fixed length string 16 bytes The Card ID in transport format (see 0). CdCryptogram Unsigned Integer 24 bytes The response provided by the card for the challenge as sent by the card. CdCount Unsigned Integer 2 bytes The card use counter as received in the response. TransTime Unsigned Integer 8 bytes Challenge time in Unix time 4 format RdRand Unsigned Integer 4 bytes Challenge random number CsID Null terminated string 64 bytes The charging device ID from which the CDevHash was derived. 4 For details on Unix time refer to
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems Version 2.0.1 Author: Achim Pietig 2009 April 22 Author: Achim Pietig Lippstädter Weg 14 32756 Detmold Germany Email:
MUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards
MUSCLE Cryptographic Card Edge Definition for Java 1 Enabled Smartcards David Corcoran Tommaso Cucinotta This document is provided on an as-is basis. Neither the authors nor the MUSCLE project are responsible
Exercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: [email protected] Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
ACR122 NFC Contactless Smart Card Reader
Datenblatt / Specifications ACR122 NFC Contactless Smart Card Reader Table of Contents 1. Introduction... 3 1.1. USB Interface... 3 2. Implementation... 4 2.1. Smart Card Reader Interface Overview... 5
MDG. MULTOS Developer's Guide. MAO-DOC-TEC-005 v1.40. 2015 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited.
MDG MULTOS Developer's Guide MAO-DOC-TEC-005 v1.40 2015 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited. MULTOS Developer s Guide Copyright Copyright 1999 2015 MAOSCO Limited. This document
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015
Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular
Application Programming Interface
Application Programming Interface Advanced Card Systems Ltd. Website: www.acs.com.hk Email: [email protected] CONTENTS Introduction 4 Features 4 USB interface 4 Contact and Contactless interface handling
Measurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
Reverse engineering smart cards
Reverse engineering smart cards Christian M. Amsüss [email protected] http://christian.amsuess.com/ 2010-05-06 Overview objective understand smart card communication based on sniffable
AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
EMV (Chip-and-PIN) Protocol
EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian
Getting to know your card: Reverse-Engineering the Smart-Card Application Protocol Data Unit for PKCS#11 Functions
: Reverse-Engineering the Smart-Card Application Protocol Data Unit for PKCS#11 Functions 1, Fiona McNeill 2, Alan Bundy 1, Graham Steel 3 Riccardo Focardi 4, Claudio Bozzato 4 1 University of Edinburgh
SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.
SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing
Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015
Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015 Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment
EMV (Chip and PIN) Project. EMV card
EMV (Chip and PIN) Project Student: Khuong An Nguyen Supervisor: Professor Chris Mitchell Year: 2009-2010 Full Unit Project EMV card 1 Contents Figures... 6 Tables... 7 1. Introduction... 8 1.1 Electronic
USB Card Reader Configuration Utility. User Manual. Draft!
USB Card Reader Configuration Utility User Manual Draft! SB Research 2009 The Configuration Utility for USB card reader family: Concept: To allow for field programming of the USB card readers a configuration
[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension
[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Interoperability Specification for ICCs and Personal Computer Systems
Interoperability Specification for ICCs and Personal Computer Systems Part 10 IFDs with Secure PIN Entry Capabilities Supplement - IFDs with Feature Capabilities Gemalto HID Global Identive Oracle America
Biometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
The Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
ACR122U USB NFC Reader
ACR122U USB NFC Reader Application Programming Interface V2.02 Subject to change without prior notice Table of Contents 1.0. Introduction... 4 1.1. Features... 4 1.2. USB Interface... 5 2.0. Implementation...
Nemo 96HD/HD+ MODBUS
18/12/12 Pagina 1 di 28 MULTIFUNCTION FIRMWARE 2.30 Nemo 96HD/HD+ MODBUS COMMUNICATION PROTOCOL CONTENTS 1.0 ABSTRACT 2.0 DATA MESSAGE DESCRIPTION 2.1 Parameters description 2.2 Data format 2.3 Description
AN11004. MIFARE DESFire as Type 4 Tag. Rev. 2.4 22 May 2013 130224. Application note COMPANY PUBLIC. Document information.
Document information Info Content Keywords NFC Forum, NFC Forum data mapping, NFC Forum Type 4 Tag Operation version 2.0, Type 4 Tag version 2.0, MIFARE DESFire EV1, NDEF Tag Application Abstract The NFC
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This
HOST Embedded System. SLAVE EasyMDB interface. Reference Manual EasyMDB RS232-TTL. 1 Introduction
Reference Manual EasyMDB RS232-TTL 1 Introduction This document explains how to use the interface EasyMDB RS232-TTL and describe the connections and the necessary commands for communicating with Cash System
CHAPTER 5 SMART CARD TECHNOLOGY
56 CHAPTER 5 SMART CARD TECHNOLOGY 5.1 INTRODUCTION Today's society is often illustrated as an information society. Technological developments, particularly in the areas of computers and telecommunications
Technical Support Bulletin Nr.18 Modbus Tips
Technical Support Bulletin Nr.18 Modbus Tips Contents! Definitions! Implemented commands! Examples of commands or frames! Calculating the logical area! Reading a signed variable! Example of commands supported
Specifications for the Smart-Card Operating System for Transport Applications (SCOSTA)
Specifications for the Smart-Card Operating System for Transport Applications (SCOSTA) Addendum to Version 1.2b dated March 15, 2002 Dated: January 23, 2003 National Informatics Centre Ministry of Communication
The SmartLogic Tool: Analysing and Testing Smart Card Protocols
The SmartLogic Tool: Analysing and Testing Smart Card Protocols Gerhard de Koning Gans, Joeri de Ruiter Digital Security, Radboud University Nijmegen The SmartLogic Tool A tool to analyse, emulate and
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
NFC Tag Type 5 Specification
Document Type: Software Technical Specification Reference: STS_NFC_0707-001 Version 1.8 (14516) Release Date: Nov. 18, 2011 File Name: STS_NFC_0707-001 NFC Tag Type 5 Specification.pdf Security Level:
Government Smart Card Interoperability Specification
Interagency Report 6887-2003 Edition Government Smart Card Interoperability Specification Version 2.1 Teresa Schwarzhoff Jim Dray John Wack Eric Dalci Alan Goldfine Michaela Iorga July 16, 2003 NIST Interagency
Java Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems. Version 3.0.1 Author: Achim Pietig
Functional pecification of the on IO mart Card Operating ystems Author: Achim Pietig June 30 Author: Achim Pietig Lippstädter Weg 14 32756 Detmold Germany Email: [email protected] This document and translations
GlobalPlatform. Card Specification. Version 2.2
GlobalPlatform Card Specification Version 2.2 March 2006 Recipients of this document are invited to submit, with their comments, notification of any relevant patent rights or other intellectual property
Open Mobile API Test Specification for Transport API
Open Mobile Test Specification for Transport V1 Copyright 2014 SIMalliance ltd. The information contained in this document may be used, disclosed and reproduced without the prior written authorization
RFID MODULE Mifare Reader / Writer SL030 User Manual Version 2.6 Nov 2012 StrongLink
RFID MODULE Mifare Reader / Writer User Manual Version 2.6 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. DEVICE OPERATION... 5 3-1. Clock and Data Transitions:... 5 3-2.
Mifare DESFire Specification
Mifare DESFire Specification Version 1.0 29 th September 2009 Revision History Version Date Author Description of Changes 1.0 29/09/09 O McLaughlin Ratified by LASSeO 0.2 28/07/09 O McLaughlin Minor changes
Smart Card. Smart Card applications
Smart Card Chip Plastic card A very secure way of storing a small amount of sensitive data 1 Smart Card applications Retail Sale of goods using Electronic Purses, Credit / Debit Vending machines Loyalty
Extending EMV payment smart cards with biometric on-card verification
Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,
Smart Card Based User Authentication
Smart Card Based User Authentication A thesis submitted in partial fulfilment of the requirements for the degree of Master of Science By BRANDON JAMES B.S., Wright State University, June 2010 2012 Wright
Sample EHG CL and EHG SL10 16-bit Modbus RTU Packet
Sent to EHG - Read (16-bit) Process Value Controller 00000011 0x03 3 Function Code - Read Holding Registers 00000000 0x00 0 Read starting at register High byte (Process Value Controller is contained in
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Volume Serial Numbers and Format Date/Time Verification
Volume Serial Numbers and Format Date/Time Verification Written by Craig Wilson, MSc MBCS CITP Digital Detective Group October 2003 (updated June 2005) Table of Contents Table of Contents... 2 Introduction...
EUROPEAN CARD FOR e-services
Ce document est la propriété des sociétés membres de la section carte à puce du GIXEL qui acceptent son libre usage mais se dégagent de toute responsabilité quant à son EUROPEAN CARD FOR e-services AND
The English translation Of MBA Standard 0301
MBA 文 書 0603 号 MBA Document 0603 The English translation Of MBA Standard 0301 MISAUTH Protocol Specification The authoritive specification is Japansese one, MBA Standard 0203 (June 2004). The Protocol
JCB Terminal Requirements
Version 1.0 April, 2008 2008 JCB International Co., Ltd. All rights reserved. All rights regarding this documentation are reserved by JCB Co., Ltd. ( JCB ). This documentation contains confidential and
Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Version 2.3
Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Version 2.3 Approved by: Government Smart Card Interagency Advisory Board Prepared by: Physical Access Interagency
Tamper protection with Bankgirot HMAC Technical Specification
Mars 2014 Tamper protection with Bankgirot HMAC Technical Specification Bankgirocentralen BGC AB 2013. All rights reserved. www.bankgirot.se Innehåll 1 General...3 2 Tamper protection with HMAC-SHA256-128...3
Acquirer Device Validation Toolkit (ADVT)
Acquirer Device Validation Toolkit (ADVT) Frequently Asked Questions (FAQs) Version: 2.0 January 2007 This document provides users of Visa s Acquirer Device Validation Toolkit (ADVT) with answers to some
Secure Automatic Ticketing System
Secure Automatic Ticketing System MARIUS POPA, CRISTIAN TOMA Department of Computer Science in Economics Academy of Economic Studies Bucharest Romana Square, No. 6, Bucharest ROMANIA [email protected]
MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b CONTENTS
MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b CONTENTS 1 Introduction... 2 1.1 Scope of this document... 2 2 Abbreviations... 2 3 Context... 3 4 General description... 3 4.1 Protocol description... 3
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
An NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Dresden, 22/11/2013 Felipe de Sousa Silva Outline NFC Overview NFC Public Ticket System. Intention of the Inverse Reader Mode The Inverse
Mobile and Contactless Payment Security
Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.
Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification
Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
Toshiba Serial Driver Help. 2012 Kepware Technologies
2012 Kepware Technologies 2 Table of Contents Table of Contents 2 3 Overview 3 Device Setup 4 Modem Setup 4 Cable Diagram - EX100/200 PLCs 4 Cable Diagram - T1 PLCs 5 Cable Diagram - T2/T3 PLCs 5 Cable
Signalling Control System Serial Train Information Interface
Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for
Smart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
Binary Representation
Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must tbe able to handle more than just values for real world problems
Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
arxiv:1209.0875v2 [cs.cr] 25 Mar 2013 Technical Report Applying recent secure element relay attack scenarios to the real world: Abstract Michael Roland NFC Research Lab Hagenberg University of Applied
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
Moven Studio realtime. streaming
Moven Studio realtime network streaming UDP protocol specification Document MV0305P Revision B, 19 December 2007 Xsens Technologies B.V. phone +31 88 XSENS 00 Pantheon 6a +31 88 97367 00 P.O. Box 559 fax
Services and Data Definitions
Version: 2.0 29 th September 2009 Bracknell Forest Borough Council Revision History Version Date Author Description of Changes 2.0 290909 O McLaughlin Ratified by LASSeO 1.3 130709 O McLaughlin Addition
jcardsim Java Card is simple!
JavaOne Moscow, 2013 jcardsim Java Card is simple! Mikhail Dudarev, CTO of jcardsim.org Brief history of Java Card Basics standards How is that works? Developer Tools Writing our first real life Java Card
EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems
EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems Version 3.0 June 30, 1996 1996 Europay International S.A., MasterCard International Incorporated, and Visa International Service
New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany
New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
AN 073120. mifare Ultralight Features and Hints. Document information. Multiple ticketing, secured data storage, implementation hints
AN 073120 Rev. 2.0 18 December 2006 Application note Document information Info Keywords Abstract Content Multiple ticketing, secured data storage, implementation hints This document presents features and
MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3 CONTENTS
MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3 CONTENTS 1 Introduction... 2 1.1 Scope of this document... 2 2 Abbreviations... 2 3 Context... 3 4 General description... 3 4.1 Protocol description...
Modbus and ION Technology
70072-0104-14 TECHNICAL 06/2009 Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. PowerLogic ION meters are compatible
Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD
Design Examples and Case Studies of Program Modeling and Programming with RTOS-2: Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD 1 1. Smart Card System Requirements 2 Purpose Enabling authentication
AN2598 Application note
AN2598 Application note Smartcard interface with the STM32F101xx and STM32F103xx Introduction This document describes a firmware and hardware Smartcard interface solution based on the STM32F10xxx USART
3GPP TS 31.103 V5.13.1 (2007-06)
TS 31.103 V5.13.1 (2007-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the IP Multimedia Services Identity
Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Version 2.2
Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems Version 2.2 Approved by: Government Smart Card Interagency Advisory Board Prepared by: Physical Access Interagency
Detailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
OCRA Validation Server Profile
OCRA Validation Server Profile Version 1.0 Feb. 22, 2013 Page 1 of 18 1 Overview This document defines the technical requirements for compliance with an OCRA Validation Server profile for OATH Certification.
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
SSH Secure Shell. What is SSH?
Security, like correctness, is not an add-on feature. -- Andrew S. Tanenbaum SSH Secure Shell - - Binary Packet Protocol - key exchange - server authentication - - SSH Connection Protocol What is SSH?
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
APPLICATION PROGRAMMING INTERFACE
APPLICATION PROGRAMMING INTERFACE Advanced Card Systems Ltd. Website: www.acs.com.hk Email: [email protected] Table of Contents 1.0. Introduction... 4 2.0.... 5 2.1. Overview... 5 2.2. Communication Speed...
EMVCo Letter of Approval - Contact Terminal Level 2
February 14, 2014 Marat Serpokrylov Closed joint stock company - CENTER OF FINANCIAL TECHNOLOGIES 35, Koltsovo Koltsovo, vosibirsk Region 630559 Russia Re: EMV Application Kernel: Approval Number(s): EMVCo
RFID MODULE Mifare Reader / Writer SL025B User Manual Version 1.4 Nov 2012 StrongLink
RFID MODULE Mifare Reader / Writer User Manual Version 1.4 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. COMMUNICATION
CTNET Field Protocol Specification November 19, 1997 DRAFT
CTNET Field Protocol Specification November 19, 1997 DRAFT Introduction Version 1.0 of CTNET will support the AB3418 protocol for communication to field controllers. AB3418 is a point-topoint protocol
MF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy
Rev. 5.2 15 January 2007 Product data sheet 001052 PUBLIC 1. General description NXP has developed the Mifare to be used in contactess smart cards according to ISO/IEC 14443A. The communication layer (
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
ACCESS 9340 and 9360 Meter Ethernet Communications Card 9340-60-ETHER
User s Guide PMCM-ETHCC-0208 2/2008 ACCESS 9340 and 9360 Meter Ethernet Communications Card 9340-60-ETHER TABLE OF CONTENTS INTRODUCTION... 2 Supported Ethernet Protocols... 2 Hardware... 2 Meter Firmware...
1 DNS Packet Structure
Fundamentals of Computer Networking Project 1 Primer: DNS Overview CS4700/CS5700 Fall 2009 17 September 2009 The DNS protocol is well-documented online, however, we describe the salient pieces here for
