JCB Terminal Requirements

Size: px
Start display at page:

Download "JCB Terminal Requirements"

Transcription

1 Version 1.0 April, 2008

2 2008 JCB International Co., Ltd. All rights reserved. All rights regarding this documentation are reserved by JCB Co., Ltd. ( JCB ). This documentation contains confidential and exclusive information, patents, copyrights, trademarks, trade secrets, know-how or other intellectual property rights, or any other rights of JCB and/or JCB International Co., Ltd. ( JCBI ). You shall accept and agree to all of the terms and conditions herein before viewing, downloading or otherwise using all or any part of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form. JCBI is authorized to conduct JCB s business outside Japan, and the word of JCB in this documentation can be construed JCB and/or JCBI in each context. You are prohibited from copying for any third party, distributing, assigning, lending, displaying, publishing or disclosing or modifying (including but not limited to translating), all or any part of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form, without the prior written permission of JCB. Certain parts of this documentation are produced by referring to documentations of EMVCo, LLC ( EMVCo ). This documentation may contain any information regarding patents, copyrights, trademarks, trade secrets, know-how or other intellectual property rights, or any other rights of any third party including EMVCo. Regardless of such reference, this documentation is not the Integrated Circuit Card Specification for Payment System published by EMVCo, and JCB makes no representation, warranty or guarantee expressly nor impliedly whether all or any part of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form, does or does not violate, infringe or otherwise use the information, patents, copyrights, trademarks, trade secrets, know-how or other intellectual property rights, or any other rights of third parties including EMVCo. You shall be solely responsible for determining whether your activities require license or permission from third parties including EMVCo. JCB shall not be liable for your or any third party s infringement of any intellectual property rights or any other rights of any third parties including EMVCo. While JCB uses reasonable efforts to include accurate and up-to-date information in this documentation, JCB makes no representation, warranty or guarantee expressly nor impliedly regarding the accuracy or finality of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form and JCB shall not be liable for any product or service developed or produced in compliance with this documentation. JCB shall assume no liability for any typographical or other errors or omissions in the content of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form. This documentation may contain links to other sites. JCB is not responsible for the content or practices of such sites. To the extent permitted by applicable law, in no event JCB, its officers, employees, affiliates, agents, or contractors, shall be liable to you or any third parties for any damages direct or indirect consequential, incidental, or punitive damages arising from the use of or inability to use this documentation, including without limitation, damages for loss of profit, business interruption, loss of information, damages arising from third party s claim, even if JCB has been advised of the possibility of such damages.

3 Revision History Item number Date of revision Chapter Contents of revision

4 Contents Table of Contents 1 Introduction Objective Target Audience and Scope Structure Related Materials EMV Materials JCB Materials Definition of Terms Abbreviations Basic Requirements Terminal Types Device Requirements Processing Levels Message Requirements Data Transmitted from the Terminal to the Acquirer Data Transmitted to the Terminal from the Acquirer Application Status Application ID and Version Number Command Requirements Issuer Script Commands Functional Requirements Offline Data Authentication Cardholder Verification Terminal Risk Management Terminal Action Analysis Online Processing Completion 4-7 JCB Confidential i April 2008

5 1. Introduction 1 Introduction This chapter describes the objective, target audience, scope and structure of this document, related materials, definitions of terms and abbreviations. 1.1 Objective The purpose of this document is: (1) To define the JCB proprietary requirements for developing Terminals conforming to EMV. (2) To describe the JCB proprietary requirements for Terminals that ensure proper and mutually secure operation of Terminals and IC Cards. 1.2 Target Audience and Scope The target audience of this document is JCB Licensees and parties involved in the development of Terminals. The Terminals described in this document are presumed to perform credit transactions, and must conform to all applicable EMV requirements. This document contains the minimum additional requirements to EMV for JCB in regards to new items that emerge with EMV migration of terminals. 1.3 Structure Chapter 1 Introduction This chapter describes the objective, target audience, scope and structure of this document, related materials, definitions of terms and abbreviations. Chapter 2 Basic Requirements This chapter defines hardware requirements such as Terminal types and devices, and software requirements such as processing levels and application status. It also defines requirements for authorization messages between the Terminal and the Acquirer. Chapter 3 Command Requirements This chapter defines the requirements for commands supported by the Terminals. JCB Confidential 1-1 April 2008

6 1. Introduction Chapter 4 Functional Requirements This chapter defines functional requirements for Terminals in addition to EMV. 1.4 Related Materials EMV Materials These are EMV specifications relating to this document. The term EMV refers to the following documents: (1) EMV4.1 Book1: EMV Integrated Circuit Card Specification for Payment Systems Book1 - Application Independent ICC to Terminal Interface Requirements Version 4.1 May, 2004 (2) EMV4.1 Book2: EMV Integrated Circuit Card Specification for Payment Systems Book2 - Security and Key Management Version 4.1 May, 2004 (3) EMV4.1 Book3: EMV Integrated Circuit Card Specification for Payment Systems Book3 - Application Specification Version 4.1 May, 2004 (4) EMV4.1 Book4: EMV Integrated Circuit Card Specification for Payment Systems Book4 - Cardholder, Attendant, and Acquirer Interface Requirements Version 4.1 May, 2004 (5) EMV 96 Integrated Circuit Card Specification for Payment Systems, Version May 31, 1998 (6) EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems, Version May 31, 1998 (7) EMV 96 Integrated Circuit Card Application Specification for Payment Systems, Version May 31, JCB Materials JCB materials relating to this document are as follows: (1) JCB IC Card Specification Version 2.0 (2) JCB IC Card Specification Version 1.2 JCB Confidential 1-2 April 2008

7 1. Introduction 1.5 Definition of Terms The terms and notations relating to this document are defined in the Table 1-1 Alphanumeric characters (0 to 9, A to F) enclosed in single quotation marks ( ) represent hexadecimal numbers. Table 1-1 Terms and Abbreviations A AAC An Application Cryptogram declining offline / online transactions, Application generated by the IC Card in response to a GENERATE AC command. Authentication Cryptogram AC An enciphered value generated using transaction related data such as Application TC, AAC, and ARQC. It is generated by an IC Card after receiving a Cryptogram GENERATE AC command from an IC Terminal. AID A code that specifies the application provider and the production type Application Identifier of application. AIP Data stored in an IC Card, which indicates whether the specific Application Interchange functions are supported by the IC Card. Profile Application The combination of a program and set of data that functions on an IC Card or an IC Terminal. Application Block An Issuer Script command which blocks a specific Application on an IC Card. Application PAN An account number primarily stored in an IC Card Application. When it Application Primary is padded to the right with F, the padding is ignored. Account Number Application Selection A process to select the application for an IC Transaction. ATC A counter of Transactions maintained in an IC Card. Application Transaction Counter JCB Confidential 1-3 April 2008

8 1. Introduction C Cardholder Verification CDA "Combined Dynamic Data Authentication / Application Cryptogram Generation" CID Cryptogram Information Data Completion CVM Cardholder Verification Method The function performed to ensure that the person presenting the IC Card is the person to whom the application in the card was issued. An Offline Data Authentication in which a Terminal verifies the authenticity of an IC Card by using static application data stored in the IC Card and a random number specific to each transaction. GENERATE AC command is used to obtain dynamic signature data from the card. Data stored in an IC Card which indicates the type of Application Cryptogram returned by an IC Card in response to a GENERATE AC Command. A function of an IC Card to make the final judgment of whether to approve or decline a Transaction as a result of all the preceding processes. This function completes the Transaction. A method of Cardholder Verification, such as Offline Enciphered PIN, Offline Plaintext PIN, Online Enciphered PIN, and Signature. D DDA Standard Dynamic Data Authentication G GENERATE AC command First GENERATE AC command Second GENERATE AC command Offline Data Authentication, in which a Terminal verifies the authenticity of an IC Card by using static application data stored in the IC Card and a random number specific to each Transaction. The INTERNAL AUTHENTICATE command is used to obtain dynamic signature data from the card. A command issued by an IC Terminal to an IC Card, which requests the IC Card to generate TC, ARQC, or AAC. A GENERATE AC command issued by an IC Terminal to an IC Card after TAA. A GENERATE AC command issued by an IC Terminal to an IC Card, based on the result of online Authorization. JCB Confidential 1-4 April 2008

9 1. Introduction I IC Card Integrated Circuit Card IC Card application IC Chip Integrated Circuit Chip Issuer Authentication Issuer Script O Offline Data Authentication Online Enciphered PIN Verification A card with an IC Chip embedded in it. The application that functions on an IC card. The application is issued by an application issuer. An electronic component designed to perform processing and memory functions. A function in which an IC Card verifies whether an Authorization Response is from a genuine Issuer or not. A function initiated by an Issuer through Online Processing for updating contents stored in Applications, and for blocking or unblocking Applications. A function in which the authenticity of an IC Card is verified offline to protect against counterfeit fraud. One of the CVMs, in which the PIN entered by a Cardholder onto the PIN Pad is enciphered and then sent to an Issuer for verification. P PIN Personal Identification Number A numeric code that is used for Cardholder Verification. R RID Registered application provider Identifier A code that specifies the application provider. S SDA Static Data Authentication A type of Offline Data Authentication, in which an IC Terminal verifies the authenticity of an IC Card by using static application data stored in the IC Card. A cryptographic value stored in an IC Card. JCB Confidential 1-5 April 2008

10 1. Introduction T TAA Terminal Action Analysis TAC Terminal Action Code TC Transaction Certificate Terminal Terminal Floor Limit Terminal Risk Management TVR Terminal Verification Results A function of an IC Terminal to determine whether to approve the Transaction, decline the Transaction, or issue an Online Authorization request, based on the verification results in the Terminal. Parameters set in an IC Terminal, used for judgment in TAA. An Application Cryptogram generated in response to a GENERATE AC Command by an IC Card as a result of offline or online approved Transactions. The device used to perform a financial transaction with an IC Card. One of the parameters set in an IC Terminal to indicate the maximum sum that can be processed offline in a single Transaction. A series of checks performed by a Terminal for the purpose of risk management, including Terminal Floor Limit Checking, Random Transaction Selection, Terminal Velocity Checking, and Exception File Checking. Data which records the result of Offline Data Authentication, Processing Restrictions, Cardholder Verification, and Terminal Risk Management performed by a Terminal. JCB Confidential 1-6 April 2008

11 1. Introduction 1.6 Abbreviations AAC AC AID AIP ARC ARQC ATC CDA CID CVM DDA DDOL IC ICC PAN PIN PIX POS RFU RID SDA TAC TC TVR Application Authentication Cryptogram Application Cryptogram Application Identifier Application Interchange Profile Authorization Response Code Authorization Request Cryptogram Application Transaction Counter Combined Dynamic Data Authentication / Application Cryptogram Generation Cryptogram Information Data Cardholder Verification Method Standard Dynamic Data Authentication Dynamic Data Authentication Data Object List Integrated Circuit Integrated Circuit Card Primary Account Number Personal Identification Number Proprietary application Identifier extension Point-of-Service Reserved for Future Use Registered Application Provider Identifier Static Data Authentication Terminal Action Code Transaction Certificate Terminal Verification Results JCB Confidential 1-7 April 2008

12 2. Basic Requirements 2 Basic Requirements This chapter defines hardware requirements such as Terminal types and devices, and software requirements such as processing levels and application status. Authorization message requirements between the Terminal and the Acquirer are defined as well. 2.1 Terminal Types Terminal types are defined in Table 2-1. Table 2-1 Terminal Types Supported by JCB No Terminal Type Definition 1 Attended online-only Terminal Online-only Terminals operated by an attendant at merchants. EMV-compliant. 2 Attended offline Terminal with online capability Offline Terminals with online capability operated by an attendant at merchants. EMV-compliant. 3 Attended offline-only Terminal Offline-only Terminals operated by an attendant at merchants. EMV-compliant. 4 Unattended online-only Terminal Online-only Terminals not operated by an attendant, controlled by merchants. EMV-compliant. 5 Unattended offline Terminal with online capability Offline Terminals with online capability not operated by an attendant, controlled by merchants. EMV-compliant. 6 Unattended offline-only Terminal Offline-only Terminals not operated by an attendant, controlled by merchants. EMV-compliant. 7 Online-only ATM Online-only Terminals (ATMs) with cash dispensing capability not operated by an attendant, controlled by financial institutions. EMV-compliant. 2.2 Device Requirements Additional requirements for card readers and printers are defined below. (1) IC Card readers must conform to the definitions in Part II, Section 6.6 of EMV4.1 Book4 or Part I, Section 2.5 of EMV 96 Terminal Specification. These are the additional requirements for card readers including magnetic stripe readers. (a) If the Terminal successfully performs a transaction using the IC chip, it sets the POS Entry Mode to 05. JCB Confidential 2-1 April 2008

13 2. Basic Requirements (b) If the Terminal initiates an IC transaction but cannot retrieve IC Card information (except for the situation described in the item (c)), the Terminal may initiate a magnetic stripe transaction and shall set the POS Entry Mode to the value indicating that fallback was performed. (c) If the Terminal detects that the IC Card or the IC Card application is blocked during Application Selection, the Terminal shall not initiate a credit transaction using either the blocked IC Chip or IC Card application. Furthermore, using magnetic stripe to process the credit transaction in this case is also not allowed. (d) If no AID matched during Application Selection, the Terminal displays an error message and suggests the operator or cardholder perform a magnetic stripe transaction. However, contact JCB if the local market or region has special requirements. (2) JCB recommends that the printer prints the following additional information on the receipt: (a) AID or other code that identifies the application. (b) A code that indicates whether it is an IC transaction or magnetic stripe transaction. 2.3 Processing Levels Extensive investment is needed to support EMV-compliant transactions, including issuing IC Cards, upgrading Terminals, changing authorization message content, and additional processing functions at the Issuer and Acquirer. To enable a smooth migration to the IC Card credit system by partners, JCB provides two transaction processing levels. Table 2-2 Processing Levels Processing Level Processing Level 2 Processing Level 3 Description EMV-compliant transaction processing is performed between the IC Card and the Terminal, but the IC data is truncated at the Terminal or Acquirer host and an authorization message excluding IC data is sent to the Issuer. EMV-compliant transaction processing is performed between the IC Card and the Terminal, and an authorization message containing IC data is sent to the Issuer. JCB Confidential 2-2 April 2008

14 2. Basic Requirements The Acquirer sets the TAC values defined in Section 4.4 depending on the Processing Level. 2.4 Message Requirements Data Transmitted from the Terminal to the Acquirer Table 2-3 shows the minimum required data in the authorization request message transmitted from the Terminal to the Acquirer for level 3 online transactions. Other data may be required by JCB as the need arises. Online authorization requests must conform to Part IV Section of EMV4.1 Book4 or Part III, Section of EMV 96 Terminal Specification. Table 2-3 Data in Messages transmitted from the Terminal to the Acquirer No. Tag Data name Format Length (Byte) 1 9F26 AC b 8 2 9F27 CID b 1 3 9F10 Issuer Application Data b var F37 Unpredictable Number b 4 5 9F36 ATC b TVR b 5 7 9A Transaction Date n C Transaction Type n F02 Amount, Authorized (Numeric) n F2A Transaction Currency Code n AIP b F1A Terminal Country Code n F03 Amount, Other (Numeric) n A Application PAN cn var. 19 var F34 Application PAN Sequence Number n F39 POS Entry Mode n2 1 NOTE: Item 15 is not required if it is not in the IC Card. JCB Confidential 2-3 April 2008

15 2. Basic Requirements Data Transmitted from the Acquirer to the Terminal Table 2-4 shows the minimum required data in the authorization response message from the Acquirer to the Terminal for level 3 online transactions. Other data may be required by JCB as the need arises. Online authorization responses must conform to Part IV, Section of EMV4.1 Book4 or Part III, Section of EMV 96 Terminal Specification. Table 2-4 Data in Messages Transmitted from the Acquirer to the Terminal No. Tag Data name Format Length (Byte) 1 91 Issuer Authentication Data b Issuer Script Template 1 b var Issuer Script Template 2 b var. NOTE: Item 1 is not required if issuer authentication is not performed. NOTE: Items 2 and 3 are not required if Issuer Script commands are not sent by the Issuer. 2.5 Application Status An IC Card application may be blocked, a status in which no transaction can be performed. If the IC Card application status was normal when initiating the transaction, the Terminal should complete the current transaction even if it detects that the application has been blocked by Issuer Script Command during processing. The Terminal shall not start a transaction using the application which is already blocked. 2.6 Application ID and Version Number The Application ID (AID) for A Terminals conforming to this document is The version number for Terminals conforming to this document and EMV4.1 is 2.0 and Application Version Number value is The version number for Terminals conforming to this document and EMV 96 is 1.2 and Application Version Number value is JCB Confidential 2-4 April 2008

16 3. Command Requirements 3 Command Requirements This chapter defines the requirements for commands supported by the Terminals. 3.1 Issuer Script Commands Contact JCB if the Terminal supports the APPLICATION UNBLOCK command and the PIN CHANGE/UNBLOCK command as a special device designated by the Issuer. The processing of Issuer Script commands must conform to Part II, Chapter 6 of EMV4.1 Book3, or Part II, Chapter 2 of EMV 96 Card Specification. JCB Confidential 3-1 April 2008

17 4. Functional Requirements 4 Functional Requirements This chapter defines functional requirements for Terminals in addition to EMV. JCB approval must be obtained for functions other than those required by EMV or defined in this chapter. 4.1 Offline Data Authentication Terminal requirements for supporting offline data authentication are listed in Table 4-1. CDA is applicable only for Terminals with version number 2.0. Offline Data Authentication functions are defined in Part II, Chapters 5 and 6 of EMV4.1 Book2, Part III, Section 10.3 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book4, or Part IV, Chapters 1 and 2 of EMV 96 Card Specification, Part I, Section of EMV 96 Terminal Specification and Section 7.3 of EMV 96 Application Specification. Table 4-1 Offline Data Authentication Requirements No. Terminal Type Support SDA DDA CDA 1 Attended online-only Terminal Optional 1 Optional 2 Optional 2 Attended offline Terminal with online capability Mandatory Optional 2 Optional 3 Attended offline-only Terminal Mandatory Optional 2 Optional 4 Unattended online-only Terminal Optional 1 Optional 2 Optional 5 Unattended offline Terminal with online capability Mandatory Optional 2 Optional 6 Unattended offline-only Terminal Mandatory Optional 2 Optional 7 Online-only ATM Optional 1 Optional 2 Optional 1 2 Mandatory if the Terminal supports DDA Mandatory if the Terminal supports CDA NOTE: Of the supporting conditions in Table 4-1, since items listed as Optional may be required under certain conditions, JCB must be consulted regarding the necessity of their implementation. NOTE: If DDOL cannot be retrieved from the IC Card, the Terminal uses a Default DDOL containing only Unpredictable Number (tag 9F37 ). 4.2 Cardholder Verification Support of online enciphered PIN is mandatory for online-only ATM Terminals. In addition, consult JCB in regard to any other Terminals (including ATMs), as CVM support may be required under certain conditions, such as the market, the region, or JCB Confidential 4-1 April 2008

18 4. Functional Requirements the functions supported by the Terminal. The Acquirer may add other methods not defined in EMV such as biometrics authentication, but must consult JCB in this case. Cardholder Verification Methods are defined in Part II, Chapter 7 of EMV4.1 Book2, Part III, Section 10.5 of EMV4.1 Book3, and Part II, Section of EMV4.1 Book4, or Part IV, Chapter 4 of EMV 96 Card Specification, Part I, Section of EMV 96 Terminal Specification, and Section 7.5 of EMV 96 Application Specification. 4.3 Terminal Risk Management The Terminal Floor Limit must be zero (0) for online-only Terminals. Consult the Acquirer for the value of the following data used for Random Transaction Selection: - Maximum Target Percentage to be Used For Biased Random Selection - Target Percentage to be Used for Random Selection - Threshold Value for Biased Random Selection Terminal Risk Management functions must conform to Part III, Section 10.6 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book4, or Part I, Section of EMV 96 Terminal Specification and Section 7.6 of EMV 96 Application Specification. JCB Confidential 4-2 April 2008

19 4. Functional Requirements 4.4 Terminal Action Analysis Table 4-2 and Table 4-3 show mandatory values for TAC-Denial, TAC-Online and TAC-Default for processing levels 2 and 3. However, the Acquirer must consult JCB as different values may be required due to conditions such as the market, the region or the functions supported by the Terminal. Terminal Action Analysis must conform to Part III, Section 10.7 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book3, or Part I Section of EMV 96 Terminal Specification and Section 7.7 of EMV 96 Application Specification. Table 4-2 TAC Values for Processing Level 2 Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Offline data authentication was not performed Offline static data authentication failed ICC data missing Card appears on terminal exception file Offline dynamic data authentication failed Combined DDA/AC Generation failed RFU RFU ICC and terminal have different application versions Expired application Application not yet effective Requested service not allowed for card product New card RFU RFU RFU Cardholder verification was not successful Unrecognized CVM PIN Try Limit exceeded PIN entry required and PIN pad not present or not working PIN entry required, PIN pad present, but PIN was not entered Online PIN entered RFU RFU JCB Confidential 4-3 April 2008

20 4. Functional Requirements Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Transaction exceeds floor limit 0 1 1/0 2 7 Lower consecutive offline limit exceeded Upper consecutive offline limit exceeded Transaction selected randomly for online 5 4 processing Merchant forced transaction online RFU RFU RFU Default TDOL used Issuer authentication was unsuccessful Script processing failed before final GENERATE AC Script processing failed after final GENERATE AC RFU RFU RFU RFU Only for the version number 2.0 (for the version number 1.2, it is RFU.) The value shall be determined by the Acquirer. JCB Confidential 4-4 April 2008

21 4. Functional Requirements Table 4-3 TAC Values for Processing Level 3 Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Offline data authentication was not performed Offline static data authentication failed ICC data missing Card appears on terminal exception file Offline dynamic data authentication failed Combined DDA/AC Generation failed RFU RFU ICC and terminal have different application versions Expired application Application not yet effective Requested service not allowed for card product New card RFU RFU RFU Cardholder verification was not successful Unrecognized CVM PIN Try Limit exceeded PIN entry required and PIN pad not present or not working PIN entry required, PIN pad present, but PIN was not entered Online PIN entered RFU RFU Transaction exceeds floor limit 0 1 1/0 2 7 Lower consecutive offline limit exceeded Upper consecutive offline limit exceeded Transaction selected randomly for online processing Merchant forced transaction online RFU RFU RFU JCB Confidential 4-5 April 2008

22 4. Functional Requirements Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Default TDOL used Issuer authentication was unsuccessful Script processing failed before final GENERATE AC Script processing failed after final GENERATE AC RFU RFU RFU RFU Only for the version number 2.0 (for the version number 1.2, it is RFU.) The value shall be determined by the Acquirer. JCB Confidential 4-6 April 2008

23 4. Functional Requirements 4.5 Online Processing Table 4-4 shows the ARC indicating response from the Issuer. Table 4-4 ARC showing response from Issuer Meaning (response from Issuer) Code AC Approval 00, 10, 11 TC Referral 01, 02 AAC (TC) Decline Other than above AAC If the Issuer responds with a referral as a result of Online Authorization, the Terminal performs a referral. If not possible, the Terminal issues a second GENERATE AC command requesting an AAC (recommended) or TC. The attendant follows the instructions on the Terminal display to refer to the Issuer. If the transaction is approved, the attendant processes the transaction. However, the manner of processing is outside the scope of this document. Online Authorization and Issuer Authentication must conform to Part III, Section 10.9 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book4, or Part I, Section of EMV 96 Terminal Specification and Section 7.9 of EMV 96 Application Specification Completion JCB recommends that the Terminal should support Advice creation. At the end of processing, including Issuer Script processing, the Terminal must display a message indicating whether the transaction has been approved or declined. Completion must conform to Part III, Section of EMV4.1 Book3, or Section 7.11 of EMV 96 Application Specification. JCB Confidential 4-7 April 2008

24 , Ver. 1.0 Date of issuance: April, 2008 Issuer: JCB Co., Ltd. JCB International Co., Ltd. Copyright 2008 JCB Co., Ltd. Unauthorized reproduction is prohibited.

MasterCard PayPass. M/Chip, Acquirer Implementation Requirements. v.1-a4 6/06

MasterCard PayPass. M/Chip, Acquirer Implementation Requirements. v.1-a4 6/06 MasterCard PayPass M/Chip, Acquirer Implementation Requirements v.1-a4 6/06 TABLE OF CONTENTS 1 USING THESE REQUIREMENTS...4 1.1 Purpose...4 1.2 Scope...4 1.3 Audience...5 1.4 Overview...5 1.5 Language

More information

EMVCo Letter of Approval - Contact Terminal Level 2

EMVCo Letter of Approval - Contact Terminal Level 2 May 18, 2015 Richard Pohl Triton Systems of Delaware, LLC 21405 B Street Long Beach MS 39560 USA Re: EMV Application Kernel: Approval Number(s): EMVCo Letter of Approval - Contact Terminal Level 2 Triton

More information

EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems

EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems Version 3.0 June 30, 1996 1996 Europay International S.A., MasterCard International Incorporated, and Visa International Service

More information

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved. A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role

More information

EMVCo Letter of Approval - Contact Terminal Level 2

EMVCo Letter of Approval - Contact Terminal Level 2 February 14, 2014 Marat Serpokrylov Closed joint stock company - CENTER OF FINANCIAL TECHNOLOGIES 35, Koltsovo Koltsovo, vosibirsk Region 630559 Russia Re: EMV Application Kernel: Approval Number(s): EMVCo

More information

M/Chip Functional Architecture for Debit and Credit

M/Chip Functional Architecture for Debit and Credit M/Chip Functional Architecture for Debit and Credit Christian Delporte, Vice President, Chip Centre of Excellence, New Products Engineering Suggested routing: Authorization, Chargeback, Chip Technology,

More information

PayPass M/Chip Requirements. 10 April 2014

PayPass M/Chip Requirements. 10 April 2014 PayPass M/Chip Requirements 10 April 2014 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional information online.

More information

EMVCo Letter of Approval - Terminal Level 2

EMVCo Letter of Approval - Terminal Level 2 April 06, 2011 Lorraine LEPINE France Telecom Direction Publiphonie (FT/OPF/MHGP/DMP/PUB) Orange Village, 1 avenue Nelson Mandela 94745 ARCUEIL France Re: EMV Application Kernel: Approval Number(s): EMVCo

More information

implementing American Express EMV acceptance on a Terminal

implementing American Express EMV acceptance on a Terminal implementing American Express EMV acceptance on a Terminal EMV tools A MERICAN E XPRESS I ntegrated Circuit Card P ayment S pecification The policies, procedures, and rules in this manual are subject to

More information

Re: EMVCo Letter of Approval - Contact Terminal Level 2

Re: EMVCo Letter of Approval - Contact Terminal Level 2 April 07, 2014 Michael Li Wizarpos International Co., Ltd. Suite B904, Hi-Tech King World, 666 East Beijing Road Shanghai 200001 People's Republic of China Re: EMVCo Letter of Approval - Contact Terminal

More information

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111 Fundamentals of EMV Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111 EMV Fundamentals Transaction Processing Comparison Magnetic Stripe vs. EMV Transaction Security

More information

PayPass - M/Chip Requirements. 5 December 2011

PayPass - M/Chip Requirements. 5 December 2011 PayPass - M/Chip Requirements 5 December 2011 Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International Incorporated, one or more

More information

Requirements for an EMVCo Common Contactless Application (CCA)

Requirements for an EMVCo Common Contactless Application (CCA) Requirements for an EMVCo 20.01.2009 CIR Technical Working Group Table of Contents 1 Introduction...1 2 Common Contactless Application Business Requirements...2 3 Card Requirements...3 4 Terminal Requirements...4

More information

Extending EMV payment smart cards with biometric on-card verification

Extending EMV payment smart cards with biometric on-card verification Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,

More information

Acquirer Device Validation Toolkit (ADVT)

Acquirer Device Validation Toolkit (ADVT) Acquirer Device Validation Toolkit (ADVT) Frequently Asked Questions (FAQs) Version: 2.0 January 2007 This document provides users of Visa s Acquirer Device Validation Toolkit (ADVT) with answers to some

More information

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken

More information

EMV: A to Z (Terms and Definitions)

EMV: A to Z (Terms and Definitions) EMV: A to Z (Terms and Definitions) First Data participates in many industry forums, including the EMV Migration Forum (EMF). The EMF is a cross-industry body focused on supporting an alignment of the

More information

EMV : Frequently Asked Questions for Merchants

EMV : Frequently Asked Questions for Merchants EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited

More information

EMV Frequently Asked Questions for Merchants May, 2014

EMV Frequently Asked Questions for Merchants May, 2014 EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,

More information

A Guide to EMV Version 1.0 May 2011

A Guide to EMV Version 1.0 May 2011 Table of Contents TABLE OF CONTENTS... 2 LIST OF FIGURES... 4 1 INTRODUCTION... 5 1.1 Purpose... 5 1.2 References... 5 2 BACKGROUND... 6 2.1 What is EMV... 6 2.2 Why EMV... 7 3 THE HISTORY OF EMV... 8

More information

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken

More information

How To Protect A Smart Card From Being Hacked

How To Protect A Smart Card From Being Hacked Chip Terms Explained A Guide to Smart Card Terminology Contents 1 AAC Application Authentication Cryptogram AID Application Identifier Applet ARQC Authorization Request Cryptogram ARPC Authorization Response

More information

U.S. EMV Debit Implementation Guidelines for POS Acquirers

U.S. EMV Debit Implementation Guidelines for POS Acquirers U.S. EMV Debit Implementation Version 1.0 August 15, 2014 About Debit Network Alliance Debit Network Alliance LLC (DNA) is a Delaware limited liability company owned by ten U.S. Debit Networks, and open

More information

Visa Recommended Practices for EMV Chip Implementation in the U.S.

Visa Recommended Practices for EMV Chip Implementation in the U.S. CHIP ADVISORY #20, UPDATED JULY 11, 2012 Visa Recommended Practices for EMV Chip Implementation in the U.S. Summary As issuers, acquirers, merchants, processors and vendors plan and begin programs to adopt

More information

The Canadian Migration to EMV. Prepared By:

The Canadian Migration to EMV. Prepared By: The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced

More information

Using EMV Cards to Protect E-commerce Transactions

Using EMV Cards to Protect E-commerce Transactions Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,

More information

CONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia)

CONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia) CONTACTLESS PAYMENTS Joeri de Ruiter University of Birmingham (some slides borrowed from Tom Chothia) Overview EMV Protocol Attacks EMV-Contactless Protocols Attacks Demo Stopping relay attacks What is

More information

EMV (Chip-and-PIN) Protocol

EMV (Chip-and-PIN) Protocol EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian

More information

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Frequently Asked Questions What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Issuers across the United States are beginning to embark in the planning and execution phase

More information

EMV: Integrated Circuit Card Specifications for Payment Systems

EMV: Integrated Circuit Card Specifications for Payment Systems : Integrated Circuit Card Specifications for Payment Systems Jan Krhovják Faculty of Informatics, Masaryk University Jan Krhovják (FI MU) EMV (Europay, MasterCard, Visa) 20. 3. 2006 1 / 13 Outline EMV

More information

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD Ramesh Javvaji 1, Roopa Goje 2, Praveen Pappula 3 Assistant professor, Computer Science & Engineering, SR Engineering College, Warangal,

More information

Master Thesis Towards an Improved EMV Credit Card Certification

Master Thesis Towards an Improved EMV Credit Card Certification Master Thesis Towards an Improved EMV Credit Card Certification Version of June 26, 2007 Etienne Gerts Master Thesis Towards an Improved EMV Credit Card Certification THESIS submitted in partial fulfillment

More information

Mitigating Fraud Risk Through Card Data Verification

Mitigating Fraud Risk Through Card Data Verification Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,

More information

EPC020-08 12.12.2013 SEPA CARDS STANDARDISATION (SCS) "VOLUME" BOOK 2

EPC020-08 12.12.2013 SEPA CARDS STANDARDISATION (SCS) VOLUME BOOK 2 EPC020-08 12.12.2013 (Vol Ref. 7.2.1.00) SEPA CARDS STANDARDISATION (SCS) "VOLUE" BOOK 2 FUNCTIONAL REQUIREENTS PART OF THE APPROVED VERSION OF SCS VOLUE V7.0 Payments and Withdrawals with Cards in SEPA

More information

EMV (Chip and PIN) Project. EMV card

EMV (Chip and PIN) Project. EMV card EMV (Chip and PIN) Project Student: Khuong An Nguyen Supervisor: Professor Chris Mitchell Year: 2009-2010 Full Unit Project EMV card 1 Contents Figures... 6 Tables... 7 1. Introduction... 8 1.1 Electronic

More information

Web Site Development Agreement

Web Site Development Agreement Web Site Development Agreement 1. Parties; Effective Date. This Web Site Development Agreement ( Agreement ) is between Plug-N-Run, its affiliates, (including but not limited to USA Financial, USA Financial

More information

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com EMV FAQs Contact us at: CS@VancoPayments.com Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed

More information

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Serving millions of people worldwide with electronic payment convenience. Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Copyright 2011 Euronet Worldwide, Inc. All

More information

Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure?

Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure? Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure? A Smart Card Alliance Payments Council White Paper Publication Date: September 2012 Publication Number:

More information

Chip and PIN Programme. Guideline G18. Configuring Integrated Systems

Chip and PIN Programme. Guideline G18. Configuring Integrated Systems Chip and PIN Programme Guideline G18 Configuring Integrated Systems The information contained within this document has been prepared by the Chip and PIN PMO, for use by participants in the Programme only.

More information

MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0

MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 MasterCard Contactless Reader v3.0 INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 Introduction to MasterCard Contactless Reader v3.0 Contents 1. Introduction...2 2. Background...3 2.1 Reader Applications...3

More information

Smart Cards for Payment Systems

Smart Cards for Payment Systems White Paper Smart Cards for Payment Systems An Introductory Paper describing how Thales e-security can help banks migrate to Smart Card Technology Background In this paper: Background 1 The Solution 2

More information

What Merchants Need to Know About EMV

What Merchants Need to Know About EMV Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the

More information

Security Rules and Procedures Merchant Edition. 5 February 2015

Security Rules and Procedures Merchant Edition. 5 February 2015 Security Rules and Procedures Merchant Edition 5 February 2015 Notices Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International

More information

2015-11-02. Electronic Payments Part 1

2015-11-02. Electronic Payments Part 1 Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced

More information

Your Reference Guide to EMV Integration: Understanding the Liability Shift

Your Reference Guide to EMV Integration: Understanding the Liability Shift Your Reference Guide to EMV Integration: Understanding the Liability Shift UNDERSTANDING EMV EMVCo was formed in February 1999 by Europay, MasterCard and Visa to establish and maintain global interoperability

More information

Rethinking Schools Limited Institutional Site License

Rethinking Schools Limited Institutional Site License Rethinking Schools Limited Institutional Site License This License Agreement ( License ) is entered into the day of [20 ] ( Effective Date ) between Rethinking Schools Limited, a Wisconsin Corporation,

More information

Formal analysis of EMV

Formal analysis of EMV Formal analysis of EMV Erik Poll Joeri de Ruiter Digital Security group, Radboud University Nijmegen Overview The EMV standard Known issues with EMV Formalisation of the EMV standard in F# Formal analysis

More information

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 The EMV Readiness Collis America Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 1 Collis Solutions & Markets Finance Consultancy Card Payments SEPA Financial Risk Mgmt Test Tools

More information

CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS RULE E1

CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS RULE E1 CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS RULE E1 EXCHANGE OF SHARED ELECTRONIC POINT-OF-SERVICE PAYMENT ITEMS FOR THE PURPOSE OF CLEARING AND SETTLEMENT 2015 CANADIAN PAYMENTS

More information

Mobile and Contactless Payment Security

Mobile and Contactless Payment Security Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.

More information

EMV Chip Card Payment Standard: Perspective

EMV Chip Card Payment Standard: Perspective Ellen Walsh Technology Overview 11 June 2002 EMV Chip Card Payment Standard: Perspective Summary EMV is an interoperability and compatibility standard for chip cards that allows cards to operate from any

More information

Payments Transformation - EMV comes to the US

Payments Transformation - EMV comes to the US Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent

More information

First Data s Program on EMV

First Data s Program on EMV First Data s Program on EMV Independent Software Vendors November 2014 Copyright 2013 First Data Corporation 1 Agenda EMV Overview & Background Processing Certification EMV Complementary Products Rapid

More information

Mobile MasterCard PayPass UI Application Requirements. February 2013 - Version 1.4

Mobile MasterCard PayPass UI Application Requirements. February 2013 - Version 1.4 Mobile MasterCard PayPass UI Application Requirements February 2013 - Version 1.4 Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International

More information

Preparing for EMV chip card acceptance

Preparing for EMV chip card acceptance Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June

More information

FAX-TO-EMAIL END-USER LICENSE AGREEMENT

FAX-TO-EMAIL END-USER LICENSE AGREEMENT FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company

More information

American Express Contactless Payments

American Express Contactless Payments PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless

More information

Beyond Cards and Terminals: Considerations for Testing Host-to-Host EMV Processing

Beyond Cards and Terminals: Considerations for Testing Host-to-Host EMV Processing Beyond Cards and Terminals: Considerations for Testing Host-to-Host EMV Processing Most EMV TM 1 testing focuses on cards and terminals. Card and terminal functionality is critical, but verifying your

More information

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document: Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by

More information

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1

More information

TRIAL AGREEMENT FOR QUALIANCE

TRIAL AGREEMENT FOR QUALIANCE TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014

E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014 E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y February 2014 A G E N D A EMV Overview EMV Industry Announcements EMV Transaction Differences, What to Expect Solution

More information

UPCOMING SCHEME CHANGES

UPCOMING SCHEME CHANGES UPCOMING SCHEME CHANGES MERCHANTS/PARTNERS/ISO COPY Payvision Ref: Payvision-Upcoming Scheme Changes (v1.0)-march 2016 1 Rights of use: COMPLYING WITH ALL APPLICABLE COPYRIGHT LAWS IS THE RESPONSABILITY

More information

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names

More information

American Express Data Security Operating Policy United States

American Express Data Security Operating Policy United States American Express Data Security Operating Policy United States As a leader in consumer protection, American Express has a long-standing commitment to protect Cardmember Information, ensuring that it is

More information

DIcentral CORPORATION Online Subscriber Service Agreement

DIcentral CORPORATION Online Subscriber Service Agreement DIcentral CORPORATION Online Subscriber Service Agreement DIcentral Corporation ( DIcentral ) is engaged in the business of developing business-tobusiness ecommerce software and provides electronic data

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS These Terms and Conditions are applicable to the use of this website (the Website ), regardless of how You accessed it. You or any derivation thereof, as used herein refers to a user

More information

Verified by Visa Terms of Service Credit Card Accounts

Verified by Visa Terms of Service Credit Card Accounts Verified by Visa Terms of Service Credit Card Accounts Welcome and thank you for choosing to use the Verified by Visa authentication service ("Verified by Visa"). Please read this Terms of Service Agreement

More information

Formal Analysis of the EMV Protocol Suite

Formal Analysis of the EMV Protocol Suite Formal Analysis of the EMV Protocol Suite Joeri de Ruiter and Erik Poll Digital Security Group Institute for Computing and Information Science (ICIS) Radboud University Nijmegen Abstract. This paper presents

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,

More information

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the

More information

RockWare Click-Wrap Software License Agreement ( License )

RockWare Click-Wrap Software License Agreement ( License ) RockWare, Inc. ( RockWare ) 2221 East Street, Suite 101 Golden CO 80401 USA RockWare Click-Wrap Software License Agreement ( License ) IMPORTANT - READ ALL OF THE TERMS AND CONDITIONS IN THIS LICENSE CAREFULLY

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

Formal models of bank cards for free

Formal models of bank cards for free Formal models of bank cards for free Fides Aarts, Joeri de Ruiter and Erik Poll Digital Security, Radboud University Nijmegen Introduction Active learning on bank cards Learn state machines of implementations

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Maintenance Manual Version 1.02

Maintenance Manual Version 1.02 Maintenance Manual Version 1.02 ict2xx, ipp3xx, iwl2xx and ismp terminals Contents Introduction... 4 Terminal overview... 5 Terminals... 6 Troubleshooting... 7 Troubleshooting ECR... 7 Troubleshooting

More information

What is EMV? What is different?

What is EMV? What is different? U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures

Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Welcome to Online Banking with Security First. This Online Banking Agreement and Disclosure (Agreement) discusses

More information

TERMS OF USE. Last Updated: October 8, 2015

TERMS OF USE. Last Updated: October 8, 2015 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org TERMS OF USE Last Updated: October 8, 2015 This Terms of Use Agreement (this "Agreement") is

More information

FAQ EMV. EMV Overview

FAQ EMV. EMV Overview FAQ EMV EMV Overview What are the benefits of EMV cards? A: Several factors are driving the U.S. card market to migrate to chip-based cards using the EMV specifications. EMV offers advantages for consumers,

More information

BlackBerry Business Cloud Services. Version: 6.1.7. Release Notes

BlackBerry Business Cloud Services. Version: 6.1.7. Release Notes BlackBerry Business Cloud Services Version: 6.1.7 Release Notes Published: 2015-04-02 SWD-20150402141754388 Contents 1 Related resources...4 2 What's new in BlackBerry Business Cloud Services 6.1.7...

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

EMV Integrated Circuit Card Specifications for Payment Systems

EMV Integrated Circuit Card Specifications for Payment Systems EMV Integrated Circuit Card Specifications for Payment Systems Book 3 Version 4.2 June 2008 EMV Integrated Circuit Card Specifications for Payment Systems Book 3 Version 4.2 June 2008 1994-2008 EMVCo,

More information

Automatic Recurring Payment Application

Automatic Recurring Payment Application Automatic Recurring Payment Application Schedule your payment to be automatically charged to your credit card. Just complete and sign this form to get started! Here s How Recurring Payments Work: You authorize

More information

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015 Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015 Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment

More information

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 The guide describes how you can make sure your business does not store sensitive cardholder data Contents 1 Contents

More information

Payments and Withdrawals with Cards in SEPA Applicable Standards and Certification Process

Payments and Withdrawals with Cards in SEPA Applicable Standards and Certification Process Doc: EPC020-08 14 December 2011 (Version 6.0) SEPA CARDS STANDARDISATION (SCS) VOLUME BOOK OF REQUIREMENTS Payments and Withdrawals with Cards in SEPA Applicable Standards and Certification Process Abstract

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

Appendix. 1. Scope of application of the user evaluation license agreement

Appendix. 1. Scope of application of the user evaluation license agreement Appendix 1. Scope of application of the user evaluation license agreement 1.1 This user evaluation license agreement (the "Agreement") is a legal agreement between the licensee (the "Licensee") and the

More information

ENROLLMENT AGREEMENT FOR QUALIANCE

ENROLLMENT AGREEMENT FOR QUALIANCE ENROLLMENT AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS ENROLLMENT AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR SUBSCRIPTION ORDER THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE

More information

BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.

BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2. BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2 Release Notes Published: 2010-06-04 SWD-1155103-0604111944-001 Contents

More information

Provider secure web portal & Member Care Information portal Registration Form

Provider secure web portal & Member Care Information portal Registration Form Provider secure web portal & Member Care Information portal Registration Form Thank you for your interest in registering for the Aetna Better Health Provider Secure Web Portal and the Aetna Better Health

More information

ADP Ambassador /Referral Rewards Program. Terms and Conditions of Use

ADP Ambassador /Referral Rewards Program. Terms and Conditions of Use ADP Ambassador /Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") are an agreement between ADP, LLC ("ADP"), on behalf of its Major Accounts Services Division ("MAS"),

More information

Security Rules and Procedures Merchant Edition

Security Rules and Procedures Merchant Edition Security Rules and Procedures Merchant Edition 31 March 2016 SPME Contents Contents Chapter 1: Customer Obligations... 7 1.1 Compliance with the Standards...8 1.2 Conflict with Law...8 1.3 The Security

More information

END USER LICENSE AGREEMENT

END USER LICENSE AGREEMENT END USER LICENSE AGREEMENT 1. SCOPE OF THIS AGREEMENT. This END USER LICENSE AGREEMENT ("EULA") is a legal agreement between you (either an individual or a single entity) and TradeStation ("TS") governing

More information

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE

More information