JCB Terminal Requirements
|
|
- Ophelia Patrick
- 8 years ago
- Views:
Transcription
1 Version 1.0 April, 2008
2 2008 JCB International Co., Ltd. All rights reserved. All rights regarding this documentation are reserved by JCB Co., Ltd. ( JCB ). This documentation contains confidential and exclusive information, patents, copyrights, trademarks, trade secrets, know-how or other intellectual property rights, or any other rights of JCB and/or JCB International Co., Ltd. ( JCBI ). You shall accept and agree to all of the terms and conditions herein before viewing, downloading or otherwise using all or any part of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form. JCBI is authorized to conduct JCB s business outside Japan, and the word of JCB in this documentation can be construed JCB and/or JCBI in each context. You are prohibited from copying for any third party, distributing, assigning, lending, displaying, publishing or disclosing or modifying (including but not limited to translating), all or any part of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form, without the prior written permission of JCB. Certain parts of this documentation are produced by referring to documentations of EMVCo, LLC ( EMVCo ). This documentation may contain any information regarding patents, copyrights, trademarks, trade secrets, know-how or other intellectual property rights, or any other rights of any third party including EMVCo. Regardless of such reference, this documentation is not the Integrated Circuit Card Specification for Payment System published by EMVCo, and JCB makes no representation, warranty or guarantee expressly nor impliedly whether all or any part of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form, does or does not violate, infringe or otherwise use the information, patents, copyrights, trademarks, trade secrets, know-how or other intellectual property rights, or any other rights of third parties including EMVCo. You shall be solely responsible for determining whether your activities require license or permission from third parties including EMVCo. JCB shall not be liable for your or any third party s infringement of any intellectual property rights or any other rights of any third parties including EMVCo. While JCB uses reasonable efforts to include accurate and up-to-date information in this documentation, JCB makes no representation, warranty or guarantee expressly nor impliedly regarding the accuracy or finality of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form and JCB shall not be liable for any product or service developed or produced in compliance with this documentation. JCB shall assume no liability for any typographical or other errors or omissions in the content of this documentation (written, graphics or otherwise) appearing whether in whole or in part, regardless of form. This documentation may contain links to other sites. JCB is not responsible for the content or practices of such sites. To the extent permitted by applicable law, in no event JCB, its officers, employees, affiliates, agents, or contractors, shall be liable to you or any third parties for any damages direct or indirect consequential, incidental, or punitive damages arising from the use of or inability to use this documentation, including without limitation, damages for loss of profit, business interruption, loss of information, damages arising from third party s claim, even if JCB has been advised of the possibility of such damages.
3 Revision History Item number Date of revision Chapter Contents of revision
4 Contents Table of Contents 1 Introduction Objective Target Audience and Scope Structure Related Materials EMV Materials JCB Materials Definition of Terms Abbreviations Basic Requirements Terminal Types Device Requirements Processing Levels Message Requirements Data Transmitted from the Terminal to the Acquirer Data Transmitted to the Terminal from the Acquirer Application Status Application ID and Version Number Command Requirements Issuer Script Commands Functional Requirements Offline Data Authentication Cardholder Verification Terminal Risk Management Terminal Action Analysis Online Processing Completion 4-7 JCB Confidential i April 2008
5 1. Introduction 1 Introduction This chapter describes the objective, target audience, scope and structure of this document, related materials, definitions of terms and abbreviations. 1.1 Objective The purpose of this document is: (1) To define the JCB proprietary requirements for developing Terminals conforming to EMV. (2) To describe the JCB proprietary requirements for Terminals that ensure proper and mutually secure operation of Terminals and IC Cards. 1.2 Target Audience and Scope The target audience of this document is JCB Licensees and parties involved in the development of Terminals. The Terminals described in this document are presumed to perform credit transactions, and must conform to all applicable EMV requirements. This document contains the minimum additional requirements to EMV for JCB in regards to new items that emerge with EMV migration of terminals. 1.3 Structure Chapter 1 Introduction This chapter describes the objective, target audience, scope and structure of this document, related materials, definitions of terms and abbreviations. Chapter 2 Basic Requirements This chapter defines hardware requirements such as Terminal types and devices, and software requirements such as processing levels and application status. It also defines requirements for authorization messages between the Terminal and the Acquirer. Chapter 3 Command Requirements This chapter defines the requirements for commands supported by the Terminals. JCB Confidential 1-1 April 2008
6 1. Introduction Chapter 4 Functional Requirements This chapter defines functional requirements for Terminals in addition to EMV. 1.4 Related Materials EMV Materials These are EMV specifications relating to this document. The term EMV refers to the following documents: (1) EMV4.1 Book1: EMV Integrated Circuit Card Specification for Payment Systems Book1 - Application Independent ICC to Terminal Interface Requirements Version 4.1 May, 2004 (2) EMV4.1 Book2: EMV Integrated Circuit Card Specification for Payment Systems Book2 - Security and Key Management Version 4.1 May, 2004 (3) EMV4.1 Book3: EMV Integrated Circuit Card Specification for Payment Systems Book3 - Application Specification Version 4.1 May, 2004 (4) EMV4.1 Book4: EMV Integrated Circuit Card Specification for Payment Systems Book4 - Cardholder, Attendant, and Acquirer Interface Requirements Version 4.1 May, 2004 (5) EMV 96 Integrated Circuit Card Specification for Payment Systems, Version May 31, 1998 (6) EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems, Version May 31, 1998 (7) EMV 96 Integrated Circuit Card Application Specification for Payment Systems, Version May 31, JCB Materials JCB materials relating to this document are as follows: (1) JCB IC Card Specification Version 2.0 (2) JCB IC Card Specification Version 1.2 JCB Confidential 1-2 April 2008
7 1. Introduction 1.5 Definition of Terms The terms and notations relating to this document are defined in the Table 1-1 Alphanumeric characters (0 to 9, A to F) enclosed in single quotation marks ( ) represent hexadecimal numbers. Table 1-1 Terms and Abbreviations A AAC An Application Cryptogram declining offline / online transactions, Application generated by the IC Card in response to a GENERATE AC command. Authentication Cryptogram AC An enciphered value generated using transaction related data such as Application TC, AAC, and ARQC. It is generated by an IC Card after receiving a Cryptogram GENERATE AC command from an IC Terminal. AID A code that specifies the application provider and the production type Application Identifier of application. AIP Data stored in an IC Card, which indicates whether the specific Application Interchange functions are supported by the IC Card. Profile Application The combination of a program and set of data that functions on an IC Card or an IC Terminal. Application Block An Issuer Script command which blocks a specific Application on an IC Card. Application PAN An account number primarily stored in an IC Card Application. When it Application Primary is padded to the right with F, the padding is ignored. Account Number Application Selection A process to select the application for an IC Transaction. ATC A counter of Transactions maintained in an IC Card. Application Transaction Counter JCB Confidential 1-3 April 2008
8 1. Introduction C Cardholder Verification CDA "Combined Dynamic Data Authentication / Application Cryptogram Generation" CID Cryptogram Information Data Completion CVM Cardholder Verification Method The function performed to ensure that the person presenting the IC Card is the person to whom the application in the card was issued. An Offline Data Authentication in which a Terminal verifies the authenticity of an IC Card by using static application data stored in the IC Card and a random number specific to each transaction. GENERATE AC command is used to obtain dynamic signature data from the card. Data stored in an IC Card which indicates the type of Application Cryptogram returned by an IC Card in response to a GENERATE AC Command. A function of an IC Card to make the final judgment of whether to approve or decline a Transaction as a result of all the preceding processes. This function completes the Transaction. A method of Cardholder Verification, such as Offline Enciphered PIN, Offline Plaintext PIN, Online Enciphered PIN, and Signature. D DDA Standard Dynamic Data Authentication G GENERATE AC command First GENERATE AC command Second GENERATE AC command Offline Data Authentication, in which a Terminal verifies the authenticity of an IC Card by using static application data stored in the IC Card and a random number specific to each Transaction. The INTERNAL AUTHENTICATE command is used to obtain dynamic signature data from the card. A command issued by an IC Terminal to an IC Card, which requests the IC Card to generate TC, ARQC, or AAC. A GENERATE AC command issued by an IC Terminal to an IC Card after TAA. A GENERATE AC command issued by an IC Terminal to an IC Card, based on the result of online Authorization. JCB Confidential 1-4 April 2008
9 1. Introduction I IC Card Integrated Circuit Card IC Card application IC Chip Integrated Circuit Chip Issuer Authentication Issuer Script O Offline Data Authentication Online Enciphered PIN Verification A card with an IC Chip embedded in it. The application that functions on an IC card. The application is issued by an application issuer. An electronic component designed to perform processing and memory functions. A function in which an IC Card verifies whether an Authorization Response is from a genuine Issuer or not. A function initiated by an Issuer through Online Processing for updating contents stored in Applications, and for blocking or unblocking Applications. A function in which the authenticity of an IC Card is verified offline to protect against counterfeit fraud. One of the CVMs, in which the PIN entered by a Cardholder onto the PIN Pad is enciphered and then sent to an Issuer for verification. P PIN Personal Identification Number A numeric code that is used for Cardholder Verification. R RID Registered application provider Identifier A code that specifies the application provider. S SDA Static Data Authentication A type of Offline Data Authentication, in which an IC Terminal verifies the authenticity of an IC Card by using static application data stored in the IC Card. A cryptographic value stored in an IC Card. JCB Confidential 1-5 April 2008
10 1. Introduction T TAA Terminal Action Analysis TAC Terminal Action Code TC Transaction Certificate Terminal Terminal Floor Limit Terminal Risk Management TVR Terminal Verification Results A function of an IC Terminal to determine whether to approve the Transaction, decline the Transaction, or issue an Online Authorization request, based on the verification results in the Terminal. Parameters set in an IC Terminal, used for judgment in TAA. An Application Cryptogram generated in response to a GENERATE AC Command by an IC Card as a result of offline or online approved Transactions. The device used to perform a financial transaction with an IC Card. One of the parameters set in an IC Terminal to indicate the maximum sum that can be processed offline in a single Transaction. A series of checks performed by a Terminal for the purpose of risk management, including Terminal Floor Limit Checking, Random Transaction Selection, Terminal Velocity Checking, and Exception File Checking. Data which records the result of Offline Data Authentication, Processing Restrictions, Cardholder Verification, and Terminal Risk Management performed by a Terminal. JCB Confidential 1-6 April 2008
11 1. Introduction 1.6 Abbreviations AAC AC AID AIP ARC ARQC ATC CDA CID CVM DDA DDOL IC ICC PAN PIN PIX POS RFU RID SDA TAC TC TVR Application Authentication Cryptogram Application Cryptogram Application Identifier Application Interchange Profile Authorization Response Code Authorization Request Cryptogram Application Transaction Counter Combined Dynamic Data Authentication / Application Cryptogram Generation Cryptogram Information Data Cardholder Verification Method Standard Dynamic Data Authentication Dynamic Data Authentication Data Object List Integrated Circuit Integrated Circuit Card Primary Account Number Personal Identification Number Proprietary application Identifier extension Point-of-Service Reserved for Future Use Registered Application Provider Identifier Static Data Authentication Terminal Action Code Transaction Certificate Terminal Verification Results JCB Confidential 1-7 April 2008
12 2. Basic Requirements 2 Basic Requirements This chapter defines hardware requirements such as Terminal types and devices, and software requirements such as processing levels and application status. Authorization message requirements between the Terminal and the Acquirer are defined as well. 2.1 Terminal Types Terminal types are defined in Table 2-1. Table 2-1 Terminal Types Supported by JCB No Terminal Type Definition 1 Attended online-only Terminal Online-only Terminals operated by an attendant at merchants. EMV-compliant. 2 Attended offline Terminal with online capability Offline Terminals with online capability operated by an attendant at merchants. EMV-compliant. 3 Attended offline-only Terminal Offline-only Terminals operated by an attendant at merchants. EMV-compliant. 4 Unattended online-only Terminal Online-only Terminals not operated by an attendant, controlled by merchants. EMV-compliant. 5 Unattended offline Terminal with online capability Offline Terminals with online capability not operated by an attendant, controlled by merchants. EMV-compliant. 6 Unattended offline-only Terminal Offline-only Terminals not operated by an attendant, controlled by merchants. EMV-compliant. 7 Online-only ATM Online-only Terminals (ATMs) with cash dispensing capability not operated by an attendant, controlled by financial institutions. EMV-compliant. 2.2 Device Requirements Additional requirements for card readers and printers are defined below. (1) IC Card readers must conform to the definitions in Part II, Section 6.6 of EMV4.1 Book4 or Part I, Section 2.5 of EMV 96 Terminal Specification. These are the additional requirements for card readers including magnetic stripe readers. (a) If the Terminal successfully performs a transaction using the IC chip, it sets the POS Entry Mode to 05. JCB Confidential 2-1 April 2008
13 2. Basic Requirements (b) If the Terminal initiates an IC transaction but cannot retrieve IC Card information (except for the situation described in the item (c)), the Terminal may initiate a magnetic stripe transaction and shall set the POS Entry Mode to the value indicating that fallback was performed. (c) If the Terminal detects that the IC Card or the IC Card application is blocked during Application Selection, the Terminal shall not initiate a credit transaction using either the blocked IC Chip or IC Card application. Furthermore, using magnetic stripe to process the credit transaction in this case is also not allowed. (d) If no AID matched during Application Selection, the Terminal displays an error message and suggests the operator or cardholder perform a magnetic stripe transaction. However, contact JCB if the local market or region has special requirements. (2) JCB recommends that the printer prints the following additional information on the receipt: (a) AID or other code that identifies the application. (b) A code that indicates whether it is an IC transaction or magnetic stripe transaction. 2.3 Processing Levels Extensive investment is needed to support EMV-compliant transactions, including issuing IC Cards, upgrading Terminals, changing authorization message content, and additional processing functions at the Issuer and Acquirer. To enable a smooth migration to the IC Card credit system by partners, JCB provides two transaction processing levels. Table 2-2 Processing Levels Processing Level Processing Level 2 Processing Level 3 Description EMV-compliant transaction processing is performed between the IC Card and the Terminal, but the IC data is truncated at the Terminal or Acquirer host and an authorization message excluding IC data is sent to the Issuer. EMV-compliant transaction processing is performed between the IC Card and the Terminal, and an authorization message containing IC data is sent to the Issuer. JCB Confidential 2-2 April 2008
14 2. Basic Requirements The Acquirer sets the TAC values defined in Section 4.4 depending on the Processing Level. 2.4 Message Requirements Data Transmitted from the Terminal to the Acquirer Table 2-3 shows the minimum required data in the authorization request message transmitted from the Terminal to the Acquirer for level 3 online transactions. Other data may be required by JCB as the need arises. Online authorization requests must conform to Part IV Section of EMV4.1 Book4 or Part III, Section of EMV 96 Terminal Specification. Table 2-3 Data in Messages transmitted from the Terminal to the Acquirer No. Tag Data name Format Length (Byte) 1 9F26 AC b 8 2 9F27 CID b 1 3 9F10 Issuer Application Data b var F37 Unpredictable Number b 4 5 9F36 ATC b TVR b 5 7 9A Transaction Date n C Transaction Type n F02 Amount, Authorized (Numeric) n F2A Transaction Currency Code n AIP b F1A Terminal Country Code n F03 Amount, Other (Numeric) n A Application PAN cn var. 19 var F34 Application PAN Sequence Number n F39 POS Entry Mode n2 1 NOTE: Item 15 is not required if it is not in the IC Card. JCB Confidential 2-3 April 2008
15 2. Basic Requirements Data Transmitted from the Acquirer to the Terminal Table 2-4 shows the minimum required data in the authorization response message from the Acquirer to the Terminal for level 3 online transactions. Other data may be required by JCB as the need arises. Online authorization responses must conform to Part IV, Section of EMV4.1 Book4 or Part III, Section of EMV 96 Terminal Specification. Table 2-4 Data in Messages Transmitted from the Acquirer to the Terminal No. Tag Data name Format Length (Byte) 1 91 Issuer Authentication Data b Issuer Script Template 1 b var Issuer Script Template 2 b var. NOTE: Item 1 is not required if issuer authentication is not performed. NOTE: Items 2 and 3 are not required if Issuer Script commands are not sent by the Issuer. 2.5 Application Status An IC Card application may be blocked, a status in which no transaction can be performed. If the IC Card application status was normal when initiating the transaction, the Terminal should complete the current transaction even if it detects that the application has been blocked by Issuer Script Command during processing. The Terminal shall not start a transaction using the application which is already blocked. 2.6 Application ID and Version Number The Application ID (AID) for A Terminals conforming to this document is The version number for Terminals conforming to this document and EMV4.1 is 2.0 and Application Version Number value is The version number for Terminals conforming to this document and EMV 96 is 1.2 and Application Version Number value is JCB Confidential 2-4 April 2008
16 3. Command Requirements 3 Command Requirements This chapter defines the requirements for commands supported by the Terminals. 3.1 Issuer Script Commands Contact JCB if the Terminal supports the APPLICATION UNBLOCK command and the PIN CHANGE/UNBLOCK command as a special device designated by the Issuer. The processing of Issuer Script commands must conform to Part II, Chapter 6 of EMV4.1 Book3, or Part II, Chapter 2 of EMV 96 Card Specification. JCB Confidential 3-1 April 2008
17 4. Functional Requirements 4 Functional Requirements This chapter defines functional requirements for Terminals in addition to EMV. JCB approval must be obtained for functions other than those required by EMV or defined in this chapter. 4.1 Offline Data Authentication Terminal requirements for supporting offline data authentication are listed in Table 4-1. CDA is applicable only for Terminals with version number 2.0. Offline Data Authentication functions are defined in Part II, Chapters 5 and 6 of EMV4.1 Book2, Part III, Section 10.3 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book4, or Part IV, Chapters 1 and 2 of EMV 96 Card Specification, Part I, Section of EMV 96 Terminal Specification and Section 7.3 of EMV 96 Application Specification. Table 4-1 Offline Data Authentication Requirements No. Terminal Type Support SDA DDA CDA 1 Attended online-only Terminal Optional 1 Optional 2 Optional 2 Attended offline Terminal with online capability Mandatory Optional 2 Optional 3 Attended offline-only Terminal Mandatory Optional 2 Optional 4 Unattended online-only Terminal Optional 1 Optional 2 Optional 5 Unattended offline Terminal with online capability Mandatory Optional 2 Optional 6 Unattended offline-only Terminal Mandatory Optional 2 Optional 7 Online-only ATM Optional 1 Optional 2 Optional 1 2 Mandatory if the Terminal supports DDA Mandatory if the Terminal supports CDA NOTE: Of the supporting conditions in Table 4-1, since items listed as Optional may be required under certain conditions, JCB must be consulted regarding the necessity of their implementation. NOTE: If DDOL cannot be retrieved from the IC Card, the Terminal uses a Default DDOL containing only Unpredictable Number (tag 9F37 ). 4.2 Cardholder Verification Support of online enciphered PIN is mandatory for online-only ATM Terminals. In addition, consult JCB in regard to any other Terminals (including ATMs), as CVM support may be required under certain conditions, such as the market, the region, or JCB Confidential 4-1 April 2008
18 4. Functional Requirements the functions supported by the Terminal. The Acquirer may add other methods not defined in EMV such as biometrics authentication, but must consult JCB in this case. Cardholder Verification Methods are defined in Part II, Chapter 7 of EMV4.1 Book2, Part III, Section 10.5 of EMV4.1 Book3, and Part II, Section of EMV4.1 Book4, or Part IV, Chapter 4 of EMV 96 Card Specification, Part I, Section of EMV 96 Terminal Specification, and Section 7.5 of EMV 96 Application Specification. 4.3 Terminal Risk Management The Terminal Floor Limit must be zero (0) for online-only Terminals. Consult the Acquirer for the value of the following data used for Random Transaction Selection: - Maximum Target Percentage to be Used For Biased Random Selection - Target Percentage to be Used for Random Selection - Threshold Value for Biased Random Selection Terminal Risk Management functions must conform to Part III, Section 10.6 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book4, or Part I, Section of EMV 96 Terminal Specification and Section 7.6 of EMV 96 Application Specification. JCB Confidential 4-2 April 2008
19 4. Functional Requirements 4.4 Terminal Action Analysis Table 4-2 and Table 4-3 show mandatory values for TAC-Denial, TAC-Online and TAC-Default for processing levels 2 and 3. However, the Acquirer must consult JCB as different values may be required due to conditions such as the market, the region or the functions supported by the Terminal. Terminal Action Analysis must conform to Part III, Section 10.7 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book3, or Part I Section of EMV 96 Terminal Specification and Section 7.7 of EMV 96 Application Specification. Table 4-2 TAC Values for Processing Level 2 Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Offline data authentication was not performed Offline static data authentication failed ICC data missing Card appears on terminal exception file Offline dynamic data authentication failed Combined DDA/AC Generation failed RFU RFU ICC and terminal have different application versions Expired application Application not yet effective Requested service not allowed for card product New card RFU RFU RFU Cardholder verification was not successful Unrecognized CVM PIN Try Limit exceeded PIN entry required and PIN pad not present or not working PIN entry required, PIN pad present, but PIN was not entered Online PIN entered RFU RFU JCB Confidential 4-3 April 2008
20 4. Functional Requirements Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Transaction exceeds floor limit 0 1 1/0 2 7 Lower consecutive offline limit exceeded Upper consecutive offline limit exceeded Transaction selected randomly for online 5 4 processing Merchant forced transaction online RFU RFU RFU Default TDOL used Issuer authentication was unsuccessful Script processing failed before final GENERATE AC Script processing failed after final GENERATE AC RFU RFU RFU RFU Only for the version number 2.0 (for the version number 1.2, it is RFU.) The value shall be determined by the Acquirer. JCB Confidential 4-4 April 2008
21 4. Functional Requirements Table 4-3 TAC Values for Processing Level 3 Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Offline data authentication was not performed Offline static data authentication failed ICC data missing Card appears on terminal exception file Offline dynamic data authentication failed Combined DDA/AC Generation failed RFU RFU ICC and terminal have different application versions Expired application Application not yet effective Requested service not allowed for card product New card RFU RFU RFU Cardholder verification was not successful Unrecognized CVM PIN Try Limit exceeded PIN entry required and PIN pad not present or not working PIN entry required, PIN pad present, but PIN was not entered Online PIN entered RFU RFU Transaction exceeds floor limit 0 1 1/0 2 7 Lower consecutive offline limit exceeded Upper consecutive offline limit exceeded Transaction selected randomly for online processing Merchant forced transaction online RFU RFU RFU JCB Confidential 4-5 April 2008
22 4. Functional Requirements Byte Bit Meaning TAC- TAC- TAC- Denial Online Default 8 Default TDOL used Issuer authentication was unsuccessful Script processing failed before final GENERATE AC Script processing failed after final GENERATE AC RFU RFU RFU RFU Only for the version number 2.0 (for the version number 1.2, it is RFU.) The value shall be determined by the Acquirer. JCB Confidential 4-6 April 2008
23 4. Functional Requirements 4.5 Online Processing Table 4-4 shows the ARC indicating response from the Issuer. Table 4-4 ARC showing response from Issuer Meaning (response from Issuer) Code AC Approval 00, 10, 11 TC Referral 01, 02 AAC (TC) Decline Other than above AAC If the Issuer responds with a referral as a result of Online Authorization, the Terminal performs a referral. If not possible, the Terminal issues a second GENERATE AC command requesting an AAC (recommended) or TC. The attendant follows the instructions on the Terminal display to refer to the Issuer. If the transaction is approved, the attendant processes the transaction. However, the manner of processing is outside the scope of this document. Online Authorization and Issuer Authentication must conform to Part III, Section 10.9 of EMV4.1 Book3 and Part II, Section of EMV4.1 Book4, or Part I, Section of EMV 96 Terminal Specification and Section 7.9 of EMV 96 Application Specification Completion JCB recommends that the Terminal should support Advice creation. At the end of processing, including Issuer Script processing, the Terminal must display a message indicating whether the transaction has been approved or declined. Completion must conform to Part III, Section of EMV4.1 Book3, or Section 7.11 of EMV 96 Application Specification. JCB Confidential 4-7 April 2008
24 , Ver. 1.0 Date of issuance: April, 2008 Issuer: JCB Co., Ltd. JCB International Co., Ltd. Copyright 2008 JCB Co., Ltd. Unauthorized reproduction is prohibited.
MasterCard PayPass. M/Chip, Acquirer Implementation Requirements. v.1-a4 6/06
MasterCard PayPass M/Chip, Acquirer Implementation Requirements v.1-a4 6/06 TABLE OF CONTENTS 1 USING THESE REQUIREMENTS...4 1.1 Purpose...4 1.2 Scope...4 1.3 Audience...5 1.4 Overview...5 1.5 Language
More informationEMVCo Letter of Approval - Contact Terminal Level 2
May 18, 2015 Richard Pohl Triton Systems of Delaware, LLC 21405 B Street Long Beach MS 39560 USA Re: EMV Application Kernel: Approval Number(s): EMVCo Letter of Approval - Contact Terminal Level 2 Triton
More informationEMV 96 Integrated Circuit Card Terminal Specification for Payment Systems
EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems Version 3.0 June 30, 1996 1996 Europay International S.A., MasterCard International Incorporated, and Visa International Service
More informationA Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
More informationEMVCo Letter of Approval - Contact Terminal Level 2
February 14, 2014 Marat Serpokrylov Closed joint stock company - CENTER OF FINANCIAL TECHNOLOGIES 35, Koltsovo Koltsovo, vosibirsk Region 630559 Russia Re: EMV Application Kernel: Approval Number(s): EMVCo
More informationM/Chip Functional Architecture for Debit and Credit
M/Chip Functional Architecture for Debit and Credit Christian Delporte, Vice President, Chip Centre of Excellence, New Products Engineering Suggested routing: Authorization, Chargeback, Chip Technology,
More informationPayPass M/Chip Requirements. 10 April 2014
PayPass M/Chip Requirements 10 April 2014 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional information online.
More informationEMVCo Letter of Approval - Terminal Level 2
April 06, 2011 Lorraine LEPINE France Telecom Direction Publiphonie (FT/OPF/MHGP/DMP/PUB) Orange Village, 1 avenue Nelson Mandela 94745 ARCUEIL France Re: EMV Application Kernel: Approval Number(s): EMVCo
More informationimplementing American Express EMV acceptance on a Terminal
implementing American Express EMV acceptance on a Terminal EMV tools A MERICAN E XPRESS I ntegrated Circuit Card P ayment S pecification The policies, procedures, and rules in this manual are subject to
More informationRe: EMVCo Letter of Approval - Contact Terminal Level 2
April 07, 2014 Michael Li Wizarpos International Co., Ltd. Suite B904, Hi-Tech King World, 666 East Beijing Road Shanghai 200001 People's Republic of China Re: EMVCo Letter of Approval - Contact Terminal
More informationFundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111
Fundamentals of EMV Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111 EMV Fundamentals Transaction Processing Comparison Magnetic Stripe vs. EMV Transaction Security
More informationPayPass - M/Chip Requirements. 5 December 2011
PayPass - M/Chip Requirements 5 December 2011 Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International Incorporated, one or more
More informationRequirements for an EMVCo Common Contactless Application (CCA)
Requirements for an EMVCo 20.01.2009 CIR Technical Working Group Table of Contents 1 Introduction...1 2 Common Contactless Application Business Requirements...2 3 Card Requirements...3 4 Terminal Requirements...4
More informationExtending EMV payment smart cards with biometric on-card verification
Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,
More informationAcquirer Device Validation Toolkit (ADVT)
Acquirer Device Validation Toolkit (ADVT) Frequently Asked Questions (FAQs) Version: 2.0 January 2007 This document provides users of Visa s Acquirer Device Validation Toolkit (ADVT) with answers to some
More informationChip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world
Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken
More informationEMV: A to Z (Terms and Definitions)
EMV: A to Z (Terms and Definitions) First Data participates in many industry forums, including the EMV Migration Forum (EMF). The EMF is a cross-industry body focused on supporting an alignment of the
More informationEMV : Frequently Asked Questions for Merchants
EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited
More informationEMV Frequently Asked Questions for Merchants May, 2014
EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,
More informationA Guide to EMV Version 1.0 May 2011
Table of Contents TABLE OF CONTENTS... 2 LIST OF FIGURES... 4 1 INTRODUCTION... 5 1.1 Purpose... 5 1.2 References... 5 2 BACKGROUND... 6 2.1 What is EMV... 6 2.2 Why EMV... 7 3 THE HISTORY OF EMV... 8
More informationChip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world
Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken
More informationHow To Protect A Smart Card From Being Hacked
Chip Terms Explained A Guide to Smart Card Terminology Contents 1 AAC Application Authentication Cryptogram AID Application Identifier Applet ARQC Authorization Request Cryptogram ARPC Authorization Response
More informationU.S. EMV Debit Implementation Guidelines for POS Acquirers
U.S. EMV Debit Implementation Version 1.0 August 15, 2014 About Debit Network Alliance Debit Network Alliance LLC (DNA) is a Delaware limited liability company owned by ten U.S. Debit Networks, and open
More informationVisa Recommended Practices for EMV Chip Implementation in the U.S.
CHIP ADVISORY #20, UPDATED JULY 11, 2012 Visa Recommended Practices for EMV Chip Implementation in the U.S. Summary As issuers, acquirers, merchants, processors and vendors plan and begin programs to adopt
More informationThe Canadian Migration to EMV. Prepared By:
The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced
More informationUsing EMV Cards to Protect E-commerce Transactions
Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,
More informationCONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia)
CONTACTLESS PAYMENTS Joeri de Ruiter University of Birmingham (some slides borrowed from Tom Chothia) Overview EMV Protocol Attacks EMV-Contactless Protocols Attacks Demo Stopping relay attacks What is
More informationEMV (Chip-and-PIN) Protocol
EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian
More informationWhat Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization
Frequently Asked Questions What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Issuers across the United States are beginning to embark in the planning and execution phase
More informationEMV: Integrated Circuit Card Specifications for Payment Systems
: Integrated Circuit Card Specifications for Payment Systems Jan Krhovják Faculty of Informatics, Masaryk University Jan Krhovják (FI MU) EMV (Europay, MasterCard, Visa) 20. 3. 2006 1 / 13 Outline EMV
More informationSMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD
SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD Ramesh Javvaji 1, Roopa Goje 2, Praveen Pappula 3 Assistant professor, Computer Science & Engineering, SR Engineering College, Warangal,
More informationMaster Thesis Towards an Improved EMV Credit Card Certification
Master Thesis Towards an Improved EMV Credit Card Certification Version of June 26, 2007 Etienne Gerts Master Thesis Towards an Improved EMV Credit Card Certification THESIS submitted in partial fulfillment
More informationMitigating Fraud Risk Through Card Data Verification
Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,
More informationEPC020-08 12.12.2013 SEPA CARDS STANDARDISATION (SCS) "VOLUME" BOOK 2
EPC020-08 12.12.2013 (Vol Ref. 7.2.1.00) SEPA CARDS STANDARDISATION (SCS) "VOLUE" BOOK 2 FUNCTIONAL REQUIREENTS PART OF THE APPROVED VERSION OF SCS VOLUE V7.0 Payments and Withdrawals with Cards in SEPA
More informationEMV (Chip and PIN) Project. EMV card
EMV (Chip and PIN) Project Student: Khuong An Nguyen Supervisor: Professor Chris Mitchell Year: 2009-2010 Full Unit Project EMV card 1 Contents Figures... 6 Tables... 7 1. Introduction... 8 1.1 Electronic
More informationWeb Site Development Agreement
Web Site Development Agreement 1. Parties; Effective Date. This Web Site Development Agreement ( Agreement ) is between Plug-N-Run, its affiliates, (including but not limited to USA Financial, USA Financial
More informationEMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com
EMV FAQs Contact us at: CS@VancoPayments.com Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed
More informationEuronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud
Serving millions of people worldwide with electronic payment convenience. Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Copyright 2011 Euronet Worldwide, Inc. All
More informationCard Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure?
Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure? A Smart Card Alliance Payments Council White Paper Publication Date: September 2012 Publication Number:
More informationChip and PIN Programme. Guideline G18. Configuring Integrated Systems
Chip and PIN Programme Guideline G18 Configuring Integrated Systems The information contained within this document has been prepared by the Chip and PIN PMO, for use by participants in the Programme only.
More informationMasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0
MasterCard Contactless Reader v3.0 INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 Introduction to MasterCard Contactless Reader v3.0 Contents 1. Introduction...2 2. Background...3 2.1 Reader Applications...3
More informationSmart Cards for Payment Systems
White Paper Smart Cards for Payment Systems An Introductory Paper describing how Thales e-security can help banks migrate to Smart Card Technology Background In this paper: Background 1 The Solution 2
More informationWhat Merchants Need to Know About EMV
Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the
More informationSecurity Rules and Procedures Merchant Edition. 5 February 2015
Security Rules and Procedures Merchant Edition 5 February 2015 Notices Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International
More information2015-11-02. Electronic Payments Part 1
Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced
More informationYour Reference Guide to EMV Integration: Understanding the Liability Shift
Your Reference Guide to EMV Integration: Understanding the Liability Shift UNDERSTANDING EMV EMVCo was formed in February 1999 by Europay, MasterCard and Visa to establish and maintain global interoperability
More informationRethinking Schools Limited Institutional Site License
Rethinking Schools Limited Institutional Site License This License Agreement ( License ) is entered into the day of [20 ] ( Effective Date ) between Rethinking Schools Limited, a Wisconsin Corporation,
More informationFormal analysis of EMV
Formal analysis of EMV Erik Poll Joeri de Ruiter Digital Security group, Radboud University Nijmegen Overview The EMV standard Known issues with EMV Formalisation of the EMV standard in F# Formal analysis
More informationThe EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411
The EMV Readiness Collis America Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 1 Collis Solutions & Markets Finance Consultancy Card Payments SEPA Financial Risk Mgmt Test Tools
More informationCANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS RULE E1
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS RULE E1 EXCHANGE OF SHARED ELECTRONIC POINT-OF-SERVICE PAYMENT ITEMS FOR THE PURPOSE OF CLEARING AND SETTLEMENT 2015 CANADIAN PAYMENTS
More informationMobile and Contactless Payment Security
Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.
More informationEMV Chip Card Payment Standard: Perspective
Ellen Walsh Technology Overview 11 June 2002 EMV Chip Card Payment Standard: Perspective Summary EMV is an interoperability and compatibility standard for chip cards that allows cards to operate from any
More informationPayments Transformation - EMV comes to the US
Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent
More informationFirst Data s Program on EMV
First Data s Program on EMV Independent Software Vendors November 2014 Copyright 2013 First Data Corporation 1 Agenda EMV Overview & Background Processing Certification EMV Complementary Products Rapid
More informationMobile MasterCard PayPass UI Application Requirements. February 2013 - Version 1.4
Mobile MasterCard PayPass UI Application Requirements February 2013 - Version 1.4 Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International
More informationPreparing for EMV chip card acceptance
Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June
More informationFAX-TO-EMAIL END-USER LICENSE AGREEMENT
FAX-TO-EMAIL END-USER LICENSE AGREEMENT This Agreement, which governs the terms and conditions of your use of the Fax-to-Email Services, is between you ("you" or "End-User") and ( we, us, our or Company
More informationAmerican Express Contactless Payments
PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless
More informationBeyond Cards and Terminals: Considerations for Testing Host-to-Host EMV Processing
Beyond Cards and Terminals: Considerations for Testing Host-to-Host EMV Processing Most EMV TM 1 testing focuses on cards and terminals. Card and terminal functionality is critical, but verifying your
More informationCanadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:
Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by
More informationPayment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1
Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1
More informationTRIAL AGREEMENT FOR QUALIANCE
TRIAL AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS TRIAL AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR TRIAL REGISTRATION REQUEST THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE
More informationPCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
More informationE M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014
E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y February 2014 A G E N D A EMV Overview EMV Industry Announcements EMV Transaction Differences, What to Expect Solution
More informationUPCOMING SCHEME CHANGES
UPCOMING SCHEME CHANGES MERCHANTS/PARTNERS/ISO COPY Payvision Ref: Payvision-Upcoming Scheme Changes (v1.0)-march 2016 1 Rights of use: COMPLYING WITH ALL APPLICABLE COPYRIGHT LAWS IS THE RESPONSABILITY
More informationHeartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development
A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names
More informationAmerican Express Data Security Operating Policy United States
American Express Data Security Operating Policy United States As a leader in consumer protection, American Express has a long-standing commitment to protect Cardmember Information, ensuring that it is
More informationDIcentral CORPORATION Online Subscriber Service Agreement
DIcentral CORPORATION Online Subscriber Service Agreement DIcentral Corporation ( DIcentral ) is engaged in the business of developing business-tobusiness ecommerce software and provides electronic data
More informationCITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
More informationTERMS AND CONDITIONS
TERMS AND CONDITIONS These Terms and Conditions are applicable to the use of this website (the Website ), regardless of how You accessed it. You or any derivation thereof, as used herein refers to a user
More informationVerified by Visa Terms of Service Credit Card Accounts
Verified by Visa Terms of Service Credit Card Accounts Welcome and thank you for choosing to use the Verified by Visa authentication service ("Verified by Visa"). Please read this Terms of Service Agreement
More informationFormal Analysis of the EMV Protocol Suite
Formal Analysis of the EMV Protocol Suite Joeri de Ruiter and Erik Poll Digital Security Group Institute for Computing and Information Science (ICIS) Radboud University Nijmegen Abstract. This paper presents
More informationWebsite Hosting Agreement
Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,
More informationTHOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE
THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the
More informationRockWare Click-Wrap Software License Agreement ( License )
RockWare, Inc. ( RockWare ) 2221 East Street, Suite 101 Golden CO 80401 USA RockWare Click-Wrap Software License Agreement ( License ) IMPORTANT - READ ALL OF THE TERMS AND CONDITIONS IN THIS LICENSE CAREFULLY
More informationEMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
More informationFormal models of bank cards for free
Formal models of bank cards for free Fides Aarts, Joeri de Ruiter and Erik Poll Digital Security, Radboud University Nijmegen Introduction Active learning on bank cards Learn state machines of implementations
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationMaintenance Manual Version 1.02
Maintenance Manual Version 1.02 ict2xx, ipp3xx, iwl2xx and ismp terminals Contents Introduction... 4 Terminal overview... 5 Terminals... 6 Troubleshooting... 7 Troubleshooting ECR... 7 Troubleshooting
More informationWhat is EMV? What is different?
U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,
More informationEMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems
October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks
More informationSecurity First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures
Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Welcome to Online Banking with Security First. This Online Banking Agreement and Disclosure (Agreement) discusses
More informationTERMS OF USE. Last Updated: October 8, 2015
1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org TERMS OF USE Last Updated: October 8, 2015 This Terms of Use Agreement (this "Agreement") is
More informationFAQ EMV. EMV Overview
FAQ EMV EMV Overview What are the benefits of EMV cards? A: Several factors are driving the U.S. card market to migrate to chip-based cards using the EMV specifications. EMV offers advantages for consumers,
More informationBlackBerry Business Cloud Services. Version: 6.1.7. Release Notes
BlackBerry Business Cloud Services Version: 6.1.7 Release Notes Published: 2015-04-02 SWD-20150402141754388 Contents 1 Related resources...4 2 What's new in BlackBerry Business Cloud Services 6.1.7...
More informationTHE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
More informationEMV Integrated Circuit Card Specifications for Payment Systems
EMV Integrated Circuit Card Specifications for Payment Systems Book 3 Version 4.2 June 2008 EMV Integrated Circuit Card Specifications for Payment Systems Book 3 Version 4.2 June 2008 1994-2008 EMVCo,
More informationAutomatic Recurring Payment Application
Automatic Recurring Payment Application Schedule your payment to be automatically charged to your credit card. Just complete and sign this form to get started! Here s How Recurring Payments Work: You authorize
More informationSecuring Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015
Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015 Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment
More informationSteps for staying PCI DSS compliant Visa Account Information Security Guide October 2009
Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 The guide describes how you can make sure your business does not store sensitive cardholder data Contents 1 Contents
More informationPayments and Withdrawals with Cards in SEPA Applicable Standards and Certification Process
Doc: EPC020-08 14 December 2011 (Version 6.0) SEPA CARDS STANDARDISATION (SCS) VOLUME BOOK OF REQUIREMENTS Payments and Withdrawals with Cards in SEPA Applicable Standards and Certification Process Abstract
More informationEMV's Role in reducing Payment Risks: a Multi-Layered Approach
EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP
More informationAppendix. 1. Scope of application of the user evaluation license agreement
Appendix 1. Scope of application of the user evaluation license agreement 1.1 This user evaluation license agreement (the "Agreement") is a legal agreement between the licensee (the "Licensee") and the
More informationENROLLMENT AGREEMENT FOR QUALIANCE
ENROLLMENT AGREEMENT FOR QUALIANCE PLEASE READ THE TERMS OF THIS ENROLLMENT AGREEMENT (THIS AGREEMENT ) CAREFULLY BEFORE SUBMITTING YOUR SUBSCRIPTION ORDER THIS AGREEMENT GOVERNS ACCESS TO AND USE BY THE
More informationBlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.
BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2 Release Notes Published: 2010-06-04 SWD-1155103-0604111944-001 Contents
More informationProvider secure web portal & Member Care Information portal Registration Form
Provider secure web portal & Member Care Information portal Registration Form Thank you for your interest in registering for the Aetna Better Health Provider Secure Web Portal and the Aetna Better Health
More informationADP Ambassador /Referral Rewards Program. Terms and Conditions of Use
ADP Ambassador /Referral Rewards Program Terms and Conditions of Use These Terms and Conditions ("Terms") are an agreement between ADP, LLC ("ADP"), on behalf of its Major Accounts Services Division ("MAS"),
More informationSecurity Rules and Procedures Merchant Edition
Security Rules and Procedures Merchant Edition 31 March 2016 SPME Contents Contents Chapter 1: Customer Obligations... 7 1.1 Compliance with the Standards...8 1.2 Conflict with Law...8 1.3 The Security
More informationEND USER LICENSE AGREEMENT
END USER LICENSE AGREEMENT 1. SCOPE OF THIS AGREEMENT. This END USER LICENSE AGREEMENT ("EULA") is a legal agreement between you (either an individual or a single entity) and TradeStation ("TS") governing
More informationPLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.
Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE
More information