TSYS EMV Implementation Guide
TSYS EMV Implementation Guide
Version: 1.4
Date: 3/21/2015
CONFIDENTIAL
©2015 Total System Services, Inc. All rights reserved worldwide. Total System Services, Inc.® and TSYS are federally registered service marks of Total System Services, Inc., in the United States.
Total System Services, Inc., owns a number of service marks that are registered in the United States and in other countries. All other products and company names are trademarks or registered
trademarks of their respective companies.
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Document Information
Copyright
2014 by B2 Payment Solutions Inc. developed for Total System Services Inc. All rights reserved. All information
contained herein is confidential and propriety to B2 Payment Solutions Inc and/or Total System Services Inc. It shall
not be disclosed, duplicated or used in part or in whole, for any purpose without prior written consent from B2
Payment Solutions Inc. and Total System Services Inc. All trademarks, service marks and trade names referenced
in this material are the property of their respective owner.
®
Total System Services, Inc. and TSYS are federally registered service marks of Total System Services, Inc. in the
United States. Total System Services, Inc. owns a number of service marks that are registered in the United States
and in other countries. All other products and company names are trademarks or registered trademarks of their
respective companies.
Disclaimer
This document describes a generic product or service and should be read in conjunction with other documents
relevant to the configuration of any specific system. The recipient of this document is responsible for ensuring that
the products and/or services described herein meets its own requirements. The information contained in this
document is subject to change without notice and should not be taken as a commitment by TSYS. TSYS assumes no
responsibility for any errors that may appear in this document.
Confidentiality
®
The information contained herein is the property of Total System Services, Inc. . This document contains
CONFIDENTIAL information that is produced solely for the benefit of the named parties. All parties should keep all
information contained herein confidential and on no account should the information, in whole or in part, be disclosed
or disseminated to any third party without the express written permission of TSYS.
Page 2 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 3 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 4 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
1. Tables of Contents
1. Tables of Contents ............................................................................................................................ 5
1.1 Requirements ................................................................................................................................. 11
1.2 Best Practices ................................................................................................................................ 13
1.3 Tables ............................................................................................................................................. 15
2. Introduction...................................................................................................................................... 19
2.1 Target Audience ............................................................................................................................. 19
2.2 Implementation Guide Overview .................................................................................................... 19
2.2.1 EMVCo LLC ...................................................................................................................... 20
2.3 EMV and Contactless Configurations ............................................................................................ 20
2.3.1 Fully Integrated ECR Solution ........................................................................................... 22
2.3.2 Partially Integrated ECR Solution ..................................................................................... 23
2.3.3 Semi-Integrated ECR Solution .......................................................................................... 24
2.3.4 Standalone POS Solution (Internal PINPad) .................................................................... 25
2.3.5 Standalone POS Solution (External PINPad) ................................................................... 26
2.4 EMV and Contactless Solution Components ................................................................................. 27
2.5 Supported Configurations............................................................................................................... 27
2.6 EMV Configuration Type ................................................................................................................ 27
2.7 U.S. Debit ....................................................................................................................................... 28
2.8 EMV and Contactless Migration ..................................................................................................... 32
3. Development Process ..................................................................................................................... 33
3.1 Configuration Review ..................................................................................................................... 35
3.2 Training........................................................................................................................................... 36
3.3 Technical Support .......................................................................................................................... 36
3.4 Testing and Certification................................................................................................................. 37
3.5 Pilot Requirements ......................................................................................................................... 38
3.6 Production Notification ................................................................................................................... 39
3.7 Development Host Connection Information ................................................................................... 39
3.8 TSYS Certification and Testing Service ........................................... Error! Bookmark not defined.
3.8.1 New Users ........................................................................... Error! Bookmark not defined.
3.9 EMV and Contactless Test Tool Requirements ............................................................................. 40
3.9.1 Collis Merchant Test Suite ................................................................................................ 40
3.10 Integration Validation Test Cards ................................................................................................... 42
3.11 Card Brand Certification ................................................................................................................. 42
4. EMV Overview .................................................................................................................................. 43
4.1 EMV Benefits .................................................................................................................................. 43
4.2 Online vs. Offline EMV Transactions ............................................................................................. 43
4.3 EMV Smart Card Schemes ............................................................................................................ 43
4.4 EMV Transaction Set ..................................................................................................................... 43
4.4.1 EMV Credit Transaction Set ............................................................................................. 44
4.4.2 EMV Debit Transaction Set ............................................................................................... 45
Page 5 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 6 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 7 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 10 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
1.1 Requirements
RQ 00100 All EMV POS Solutions must support MSR transactions ...................................................... 32
RQ 00200 A Configuration Review is required before development begins .......................................... 36
RQ 00300 Multiple certifications required if multiple kernel configurations supported ........................... 36
RQ 00400 EMV certification letters must be current .............................................................................. 36
RQ 00500 qVSDC certification is required for contactless-only EMV POS Solutions ............................ 38
RQ 00600 Transactions must go online for issuer authorization ............................................................ 43
RQ 00700 Purchase transactions must be processed as Full EMV transactions .................................. 46
RQ 00800 AFD Pre-Authorizations must be processed as Full EMV transactions ................................ 46
RQ 00900 Incremental Authorizations must be sent as keyed transactions .......................................... 46
RQ 01000 Completions require Pre-Authorization chip data.................................................................. 46
RQ 01100 Credit Refunds must be Partial EMV transactions ................................................................ 47
RQ 01200 Debit Refunds must be Full EMV transactions ...................................................................... 47
RQ 01300 CVM processing must be performed for QSR transactions .................................................. 47
RQ 01400 Transaction Currency Code (Tag 5F2A) must be set to CC currency .................................. 48
RQ 01500 Transaction amounts must be converted to selected currency ............................................. 48
RQ 01600 Transaction Currency Code (Tag 5F2A) must be used in G3v032 ....................................... 48
RQ 01800 Issuer decision must be used for MasterCard 2nd Gen AC chip error ................................. 55
RQ 02000 Total transaction amount must be known before card is presented ..................................... 63
RQ 02100 Transaction Amount (Tag 9F02) must be set to total transaction amount ............................ 63
RQ 02200 Cardholder amount confirmation is mandatory ..................................................................... 63
RQ 02300 Transaction Amount (Tag 9F02) must include the cashback amount................................... 63
RQ 02400 Other Amount (Tag 9F03) must contain the cashback amount ............................................ 63
RQ 02500 Cashback only allowed for debit AIDs ................................................................................... 64
RQ 02600 Service Code „2xx‟ and „6xx‟ must force a chip usage .......................................................... 65
RQ 02700 Cancel transaction if card accepted but removed before host authorization ........................ 66
RQ 02800 Reverse and cancel if host approves but card removed before 2nd Gen AC ....................... 66
RQ 02900 Decline transaction if host declines and card is removed before 2nd Gen AC ..................... 66
RQ 03000 Service Code „2xx‟ and „6xx‟ must be accepted for fallback card swipes ............................. 68
RQ 03100 Fallback must be cancelled when a card is inserted at fallback card entry .......................... 68
RQ 03200 Fallback must be cancelled if a non-EMV card is swiped during fallback ............................. 68
RQ 03300 Fallback must be allowed for empty Candidate List .............................................................. 68
RQ 03400 MSR Fallback transaction must be sent to host as a swipe transaction ............................... 69
RQ 03500 Technical Fallback transactions must be identified in the host message ............................. 69
RQ 03600 Fallback is not allowed if not supported by card scheme ...................................................... 70
RQ 03700 Partial Selection must be supported ..................................................................................... 71
RQ 03800 The AID list must be loaded into the kernel at kernel initialization ........................................ 72
RQ 03900 Transaction must be cancelled if Cardholder Application Confirmation fails ........................ 77
RQ 04000 PAN must be MOD10 verified ............................................................................................... 77
RQ 04100 PAN tag must match account number in Track2 Equivalent Data ........................................ 77
RQ 04200 BIN must be found in BIN table ............................................................................................. 77
RQ 04300 Application Expiration Date must match Track2 Equivalent Data expiry date ...................... 78
Page 11 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 04400 Service Code must not be validated against Track2 Equivalent Data .................................. 78
RQ 04500 AID list must be supported with associated Application Version Numbers ........................... 81
RQ 04600 All Offline CAM failures must be sent for online authorization .............................................. 82
RQ 04700 If offline CAM is not performed transaction must go online .................................................. 82
RQ 04800 All Offline Card Authentication Methods must be supported ................................................ 82
RQ 04900 Online PIN CVM must be supported if solution supports PIN ............................................... 84
RQ 05000 Signature CVM must be supported by attended solutions .................................................... 84
RQ 05100 PIN Bypass is only allowed for U.S. Debit AIDs .................................................................... 84
RQ 05200 Maximum number of PIN tries must not exceed PIN Try Counter (Tag 9F17) ..................... 84
RQ 05300 Cardholder must be notified of last offline PIN attempt ......................................................... 84
RQ 05400 Cardholder must be notified when maximum Offline PIN tries is exceeded ......................... 84
RQ 05500 EMV Floor Limit must be zero ............................................................................................... 86
RQ 05600 A Default DDOL is required for EMV POS Solutions that support DDA ............................... 87
RQ 05700 EMV PIN Debit transactions must always be sent online for authorization .......................... 91
RQ 05800 Issuer Response Code must be set based on host Response Code ................................... 94
RQ 05900 Issuer scripts must be supported in host responses ............................................................. 95
RQ 06000 Reversal must be sent if cardholder declines partial authorization ....................................... 95
RQ 06100 Transaction Amount (Tag 9F02) must reflect the partially authorized amount ..................... 95
RQ 06200 Partially authorized amount must be sent in the settlement message .................................. 95
RQ 06300 Referral transactions must be cancelled ............................................................................... 96
RQ 06400 Issuer Scripts must be executed for approved and declined transactions ............................ 97
RQ 06500 Must support Issuer Scripts up to 128 bytes in length .......................................................... 97
RQ 06600 Handling Issuer Script errors ................................................................................................. 97
RQ 06700 EMV transaction reversals must include EMV tags .............................................................. 98
RQ 06800 Last EMV transaction data must be available even if transaction is declined ...................... 99
RQ 06900 Application Name must be printed on the receipt ............................................................... 142
RQ 07000 Application PAN must be printed on receipt ........................................................................ 142
RQ 07100 Receipt must identify EMV and Fallback transactions ........................................................ 142
RQ 07200 Transaction amount and a currency indicator must be printed on the receipt .................... 142
RQ 07300 CVM used must be printed on the receipt ........................................................................... 142
RQ 07400 A signature line is required for attended terminals when CVM is “NO CVM” ..................... 142
RQ 07500 Receipt must contain mandatory EMV tags ........................................................................ 143
RQ 07600 Offline Decline EMV receipt data required for all card schemes ......................................... 143
RQ 07700 Chip Transaction Report is mandatory ................................................................................ 152
RQ 07800 EMV Configuration Report is mandatory ............................................................................. 159
Page 12 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 13 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 14 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
1.3 Tables
Table 01 EMV Configuration Types ..................................................................................................... 27
Table 02 EMV Configuration Modes – By Terminal Type .................................................................... 28
Table 03 U.S. Common Debit AIDs ...................................................................................................... 28
Table 04 U.S. Common Debit Scenarios ............................................................................................. 30
Table 05 Development and Certification Process ................................................................................ 33
Table 06 Vendor Certification Documents............................................................................................ 35
Table 07 Testing and Certification Process.......................................................................................... 37
Table 08 General Lab Contact Information .......................................................................................... 40
Table 09 Full vs. Partial EMV Transaction Steps ................................................................................. 44
Table 10 EMV Credit Transaction Set .................................................................................................. 44
Table 11 EMV Debit Transaction Set ................................................................................................... 45
Table 12 Contactless Card Schemes ................................................................................................... 51
Table 13 EMV Contactless Transaction Set......................................................................................... 51
Table 14 Full EMV Transaction Flow ................................................................................................... 53
Table 15 Partial EMV Transaction Flow ............................................................................................... 57
Table 16 Chip Service Codes Processing ............................................................................................ 65
Table 17 Chip Reader Flow .................................................................................................................. 65
Table 18 Magstripe Reader Flow ......................................................................................................... 65
Table 19 Fallback Timelines ................................................................................................................. 70
Table 20 Application Identifiers (AID) ................................................................................................... 71
Table 21 Cardholder Approval Indicator (Tag 87 – bit 8) ..................................................................... 77
Table 22 Recommended Card Entry Prompting .................................................................................. 79
Table 23 Recommended PIN Entry Prompting .................................................................................... 79
Table 24 Recommended Cardholder Amount Confirmation ................................................................ 80
Table 25 Cardholder Verification Methods ........................................................................................... 83
Table 26 (CVM) Cardholder Verification Method Results (Tag 9F34) – Byte 1 ................................... 85
Table 27 (CVM) Cardholder Verification Method Results (Tag 9F34) – Byte 2 ................................... 85
Table 28 (CVM) Cardholder Verification Method Results (Tag 9F34) – Byte 3 ................................... 85
Table 29 Risk Management Requirements .......................................................................................... 85
Table 30 Random Selection Parameters ............................................................................................. 86
Table 31 EMV Reversal Types ............................................................................................................. 97
Table 32 Transaction Batch EMV Tag Information Required............................................................... 98
Table 33 Contact EMV Parameters .................................................................................................... 103
Table 34 Contactless EMV Parameters ............................................................................................. 105
Table 35 EIS 1080 Request Message Format ................................................................................... 107
Table 36 EIS 1080 Response Message Format ................................................................................ 109
Table 37 EIS 1081 Chip Card Addendum Record Format ................................................................. 110
Table 38 Cardholder ID Code ............................................................................................................ 111
Table 39 Account Data Source .......................................................................................................... 111
Table 40 Chip Condition Code ........................................................................................................... 112
Table 41 Group III Version 027 (POS Data Code) ............................................................................. 113
Page 15 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Table 42 Group III Version 055 (TLV EMV Tag Data) – Request Tags ............................................. 114
Table 43 Group III Version 055 (TLV EMV Tag Data) – Response Tags .......................................... 116
Table 44 Summit Request Message Format ...................................................................................... 117
Table 45 Summit Response Message Format ................................................................................... 117
Table 46 Field <A21> POS Entry Data .............................................................................................. 118
Table 47 Field <A58> Visa Contactless Data Group ......................................................................... 119
Table 48 Field <A111> Request Tags ................................................................................................ 120
Table 49 Field <A111> Response Tags ............................................................................................. 122
Table 50 Field <A116> MasterCard PayPass Data Group ................................................................ 123
Table 51 Host Approval Response Codes ......................................................................................... 124
Table 52 EIS Reversal Request Message Format ............................................................................. 125
Table 53 EIS Reversal Response Message Format .......................................................................... 126
Table 54 EMV Receipt Information .................................................................................................... 141
Table 55 Offline Decline EMV Receipt Data ...................................................................................... 143
Table 56 EMV & Contactless Data Elements – Sorted by Element Name ........................................ 161
Table 57 Basic ATR for T=0 Cards Only ............................................................................................ 179
Table 58 Basic ATR for T=1 Cards Only ............................................................................................ 179
Table 59 Application Interchange Profile (Tag 82) – Byte 1............................................................... 180
Table 60 Application Interchange Profile (Tag 82) – Byte 2............................................................... 180
Table 61 Application Priority Indicator (Tag 87) – Byte 1 ................................................................... 181
Table 62 Application Usage Control (Tag 9F07) – Byte 1 .................................................................. 181
Table 63 Application Usage Control (Tag 9F07) – Byte 2 .................................................................. 181
Table 64 Cardholder Verification Rule – Byte 1 ................................................................................. 182
Table 65 Cardholder Verification Method Results (Tag 9F34) – Byte 1 ............................................ 183
Table 66 Cardholder Verification Method Results (Tag 9F34) – Byte 2 ............................................ 183
Table 67 Cardholder Verification Method Results (Tag 9F34) – Byte 3 ............................................ 183
Table 68 Card Verification Results – Byte 1....................................................................................... 184
Table 69 Card Verification Results – Byte 2....................................................................................... 184
Table 70 Card Verification Results – Byte 3....................................................................................... 184
Table 71 Card Verification Results – Byte 4....................................................................................... 185
Table 72 Card Verification Results – Byte 5....................................................................................... 185
Table 73 Cryptogram Information Data (Tag 9F27) ........................................................................... 185
Table 74 Terminal Capabilities (Tag 9F33) – Byte 1 .......................................................................... 186
Table 75 Terminal Capabilities (Tag 9F33) – Byte 2 .......................................................................... 186
Table 76 Terminal Capabilities (Tag 9F33) – Byte 3 .......................................................................... 186
Table 77 Additional Terminal Capabilities (Tag 9F40) – Byte 1 ......................................................... 187
Table 78 Additional Terminal Capabilities (Tag 9F40) – Byte 2 ......................................................... 187
Table 79 Additional Terminal Capabilities (Tag 9F40) – Byte 3 ......................................................... 187
Table 80 Additional Terminal Capabilities (Tag 9F40) – Byte 4 ......................................................... 188
Table 81 Additional Terminal Capabilities (Tag 9F40) – Byte 5 ......................................................... 188
Table 82 Terminal Verification Results (Tag 95) – Byte 1 (Offline Data Authentication) ................... 188
Table 83 Terminal Verification Results (Tag 95) – Byte 2 (Processing Restrictions) ........................ 189
Table 84 Terminal Verification Results (Tag 95) – Byte 3 (Cardholder Verification) ......................... 189
Page 16 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Table 85 Terminal Verification Results (Tag 95) – Byte 4 (Terminal Risk Management) .................. 189
Table 86 Terminal Verification Results (Tag 95) – Byte 5 (Transaction Completion) ........................ 189
Table 87 Transaction Status Indicator (Tag 9B) – Byte 1 .................................................................. 190
Table 88 Transaction Status Indicator (Tag 9B) – Byte 2 .................................................................. 190
Table 89 APPLICATION BLOCK Command Values .......................................................................... 192
Table 90 APPLICATION UNBLOCK Command Values .................................................................... 192
Table 91 CARD BLOCK Command Values ....................................................................................... 193
Table 92 EXTERNAL AUTHENTICATE Command Values ............................................................... 193
Table 93 EXTERNAL AUTHENTICATE Response Codes ................................................................ 193
Table 94 GENERATE AC Command Values ..................................................................................... 194
Table 95 GENERATE AC Reference Control Parameter .................................................................. 194
Table 96 Coding of Cryptogram Information Data ............................................................................. 195
Table 97 GET CHALLENGE Command Values ................................................................................ 195
Table 98 GET DATA Command Values ............................................................................................. 196
Table 99 GET PROCESSING OPTIONS Command Values ............................................................. 196
Table 100 INTERNAL AUTHENTICATE Command Values ................................................................ 197
Table 101 PIN CHANGE/UNBLOCK Command Values ...................................................................... 198
Table 102 READ RECORD Command Values .................................................................................... 199
Table 103 READ RECORD Reference Control Parameter .................................................................. 199
Table 104 SELECT Command Values ................................................................................................. 200
Table 105 SELECT Reference Control Parameter (P1) ...................................................................... 200
Table 106 SELECT Command Options Parameter (P2) ...................................................................... 200
Table 107 SELECT Response Message Data Field (FCI) of the PSE ................................................ 200
Table 108 SELECT Response Message Data Field (FCI) of the DDF ................................................ 201
Table 109 SELECT Response Message Data Field (FCI) of the ADF ................................................ 201
Table 110 VERIFY Command Values .................................................................................................. 202
Table 111 VERIFY Reference Data (P2) ............................................................................................. 202
Table 112 EMV Response Codes (SW1 SW2) .................................................................................... 203
Table 113 Certification Parameters – Amex Credit .............................................................................. 207
Table 114 Certification Parameters – Diners Credit ............................................................................. 208
Table 115 Certification Parameters – Discover Credit ......................................................................... 209
Table 116 Certification Parameters – JCB Credit ................................................................................ 210
Table 117 Certification Parameters – MasterCard Credit .................................................................... 211
Table 118 Certification Parameters – MasterCard Debit ..................................................................... 212
Table 119 Certification Parameters – Visa Credit ................................................................................ 213
Table 120 Certification Parameters – Visa Debit ................................................................................. 214
Table 121 Glossary of Terms ............................................................................................................... 215
Page 17 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 18 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
2. Introduction
This document is the TSYS EMV Implementation Guide specific to Point of Sale environments. This
document is intended for integrators and developers who wish to interface an EMV POS Solution with the
TSYS “Summit” or “Gen2” (referred to in this document as “EIS”) host, to process EMV and contactless
credit and debit card transactions.
This document outlines the guidelines for developing an EMV and contactless capable device:
Development Process
EMV Transaction Flow
Testing and Certification Processes
EMV Reference Material
TSYS EMV Requirements
TSYS EMV Best Practices
Page 19 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following documents should be obtained from your PINPad vendor. The names shown are generic
names for the documents as each PINPad vendor will have their own document naming convention:
The PINPad EMV Kernel Interface document
This document will provide information required to interface your EMV POS Solution with the
PINPad vendor‟s EMV kernel.
External PINPad API Documentation
This document will provide information required to interface your EMV POS Solution with an
external PINPad using the vendor‟s PINPad API.
This guide is intended to provide the minimum requirements to process EMV transactions. Additionally,
developers should consult other EMV documents that provide additional EMV information useful to
developers. These documents can be obtained directly from the PINPad vendor, EMVCo and the specific
card brands (i.e. Visa, MasterCard, etc.).
EMVCo LLC is the regulator agency originally formed by Europay International, MasterCard International
and Visa International to manage, maintain and enhance the EMV Integrated Circuit Card specification for
Payment Systems. EMVCo is responsible for the EMV type approval process and compliance testing. It
is imperative that developers are familiar with the EMVCo requirements when developing their EMV POS
Solution. Current active EMVCo members are Amex, Discover, JCB, MasterCard, UnionPay and Visa.
This TSYS EMV Implementation Guide provides insight into the EMVCo requirements and outlines the
expected EMV transaction flow. However, because EMV rules differ for each card brand and include
rules specific to the PINPad kernel and related EMV chip interaction, it is not possible to provide all
EMVCo and certification requirements; nor is it possible to ensure this document always reflects the most
current EMVCo requirements. For the most current EMV information and to keep up to date with all EMV
regulatory updates, please refer to the EMVCo web site at www.emvco.com.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Standalone solutions consist of a POS terminal that utilizes a PINPad to provide the EMV contact and
contactless functionality. The smartcard reader, PIN entry capability and EMV kernel all reside within the
PINPad. There are two supported standalone solutions. Both solutions are within PCI scope and require
a full EMV certification:
Internal PINPad – The standalone POS terminal includes an internal PINPad that provides EMV
functionality.
External PINPad – The standalone POS terminal interfaces with an external PINPad that
provides EMV functionality.
Note: Within this document all EMV and contactless configurations are generically referred to as the
“EMV POS Solution” and the customer that is implementing the TSYS EMV POS Solution is referred to
as the “Developer”.
Page 21 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
In Fully Integrated mode the ECR application controls the transaction, provides the TSYS host interface
and stores the authorization batch data. The ECR interfaces with an external PINPad for card entry
(swipe / insert / tap) and EMV kernel functionality.
TSYS Host
Visa payWave
Note: For Fully Integrated implementations the ECR is within PCI scope as the ECR can see non-
encrypted card data. An EMV certification of the complete solution is required.
Page 22 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
In Partially Integrated mode the ECR application controls the transaction, communicates with the host
and stores the authorization data. The ECR interfaces with an external PINPad for card entry (swipe /
insert / tap) and EMV kernel functionality. In this mode the PINPad is also used to build the host request
messages and parse the host response messages.
Partially Integrated mode is generally used when the ECR wants to control the host interface and see
card data without having to implement the host request and response message logic. This
implementation is ideal for companies with ECR applications that connect to multiple hosts as the ECR
application can remain consistent and just the PINPad logic would need to differ.
TSYS Host
Visa payWave
Note: For Partially Integrated implementations the ECR is within PCI scope as the ECR can see non-
encrypted card data. An EMV certification of the complete solution is required.
Page 23 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
In Semi-Integrated mode the ECR initiates the transaction and utilizes the external PINPad to provide the
TSYS host interface, to store the authorization data, for card entry (swipe / insert / tap) and to provide
EMV kernel functionality.
In this mode the PINPad interface generally consists of high level commands that are simple to
implement on an ECR. This is ideal for companies with multiple ECR vendors (or types) as most of the
host and EMV functionality is contained within the PINPad, meaning that host and EMV development
would not need to be replicated on each ECR type supported.
Note: For Semi-Integrated implementations the ECR is not within PCI scope as the transaction is
controlled by the external PINPad so the ECR will not see cardholder data. An EMV certification of the
complete solution is not required as the PINPad contains the complete payment application.
Page 24 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
In this mode a single standalone POS terminal is used that includes an internal PINPad. The POS
terminal contains the POS application and utilizes the EMV kernel residing in the internal PINPad to
provide EMV functionality.
This is often the simplest and most cost effective EMV POS Solution.
TSYS Host
Visa payWave
Page 25 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
In this mode a standalone POS terminal controls the transaction, provides the TSYS host interface and
stores the authorization batch data. The POS terminal interfaces with an external PINPad for card entry
(swipe / insert / tap) and EMV kernel functionality.
This is a cost effective EMV POS Solution for environments where the merchant and customer cannot
easily share the same device, or if you have an existing terminal base that is not EMV compliant and you
wish to cost effectively add EMV functionality by just adding an EMV certified PINPad.
Page 26 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following table shows the EMV Terminal Types and identifies whether they are supported by the
TSYS host.
Page 27 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Offline Only 23 No No
Offline Only 26 No No
Note: The Terminal Type (Tag 9F35), Terminal Capabilities (Tag 9F33) and Additional Terminal
Capabilities (Tag 9F40) tags are used to set and identify the current EMV kernel configuration.
In addition to Visa and MasterCard, the DNA (Debit Network Alliance) and other individual debit networks
may offer their own U.S. Debit AIDs that will only reside on non-Visa and non-MasterCard branded cards.
On the release date of this guide, only the Visa and MasterCard AIDs are supported.
Visa or MasterCard branded chip cards issued in the U.S. under debit and prepaid card programs, will
support both a U.S. Common Debit AID and a Global Debit AID (either the standard Visa AID, the
standard MasterCard AID or the Maestro AID).
If a Global Debit AID (Visa, MasterCard or Global Maestro) is used to initiate the chip transaction, the
transaction must be routed via a Visa or MasterCard network only. The network used is based on the
AID selected.
If a U.S. Common Debit AID is used to initiate the chip transaction, the transaction may also be routed
Page 28 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
via unaffiliated networks that have executed the necessary access agreement with Visa or
MasterCard.
For both contact and contactless transactions, EMV POS Solutions should use the standard Application
Selection process described for EMV transactions. However, the merchant may filter the Candidate List to
remove multiple AIDs which access the same underlying funding account. EMV POS Solutions must not
assume that if a U.S. Common Debit AID is present that this AID can be automatically selected to the
exclusion of all other AIDs on the card as those AIDs may relate to alternative products which the
cardholder wishes to use (such as a credit product which is issued together with a debit product).
All AIDs which relate to debit or prepaid programs will be identified in the data read during Application
Selection. The presence of both of the following data elements identifies the AID as relating to a U.S.
Debit or prepaid program:
Issuer Country Code (Tag 5F55) - Two alpha characters with a value of 0x5553 (“US”)
Issuer Identification Number (Tag 42) - Contains the Bank Identification Number (BIN)
Page 29 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 30 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
For each of the scenarios described above, the method used by the EMV POS Solution to identify the
AID(s) to eliminate from the Candidate List is described in more detail in section 8.5.2.
Note: It is not advisable to use legacy processes, such as Credit/Debit option buttons when migrating
to EMV. The method used to eliminate AIDs from the Candidate List is described in more detail in the
Credit / Debit Selection and U.S. Debit Processing section (page 73).
Page 31 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The EMV and contactless migration will take time. Magstripe only cards and fallback support
will be required for the foreseeable future. Therefore, all EMV POS Solutions being certified by
TSYS must continue to support MSR transactions.
Page 32 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
3. Development Process
Developers should be aware that developing an EMV POS Solution is a much more difficult and time
consuming process than developing a non-EMV solution. EMV POS Solutions are more complex and are
subject to an extended and more rigorous certification process which, in addition to the standard TSYS
certification, includes certification by the card brands and a mandatory pilot.
Note: TSYS charges to certify an EMV POS Solution. The actual cost will vary depending on the
complexity of your implementation. Contact your Implementation Manager to determine the actual cost
to certify your solution.
The following table outlines the steps that must be completed when developing an EMV POS Solution
with TSYS.
2. TSYS Implementation TSYS will assign an Implementation Manager to your project. The
Manager Assigned Implementation Manager will send you an introductory email including:
o Information related to completing the TSYS Project Intake Document
(required to define your project)
o Host connection and support information:
Developer ID Number
Merchant ID Number
BIN
Agent #
Chain #
Store #
Terminal Number
Category Code
Terminal ID Number
Test Analyst Assigned (name / email / phone)
General Lab Information (email / phone)
o TSYS EMV Implementation Guide (this document)
3. Complete Intake Document Developer completes the TSYS Intake document and returns it to their TSYS
Implementation Manager.
Page 33 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
4. Configuration Review Your TSYS Implementation Manager will review the completed Intake
document to ensure the proposed configuration is understood and supported
by TSYS. You will be notified if your configuration is accepted or if TSYS has
any questions or concerns.
Once completed you will be sent the TSYS EMV Test Plan including:
o TSYS certification scripts (MSR, EMV and contactless)
o MasterCard M-TIP questionnaire
5. Training EMV and contactless projects are much more complex than standard
magstripe applications. First time EMV POS Solution developers and testers
should undergo EMV training prior to beginning an EMV project.
6. Certification Test Tools The developer can purchase the Collis Merchant Test Suite (MTS) which
includes the Brand Test Tool (BTT) software that will be used for testing, TSYS
certification and card brand certification. TSYS uses this tool internally and if
the developer is using the same tool, issues may be resolved in a more timely
manner.
For more information on the Collis Merchant Test Suite and BTT software see
page 40.
Order forms for the Collis Merchant Test Suite can be obtained from the TSYS
Partner Portal www.TSYSPartnerPortal.com.
7. Development The developer begins development of the EMV POS Solution that includes
EMV and non-EMV functionality.
8. Testing During development the developer tests against the TSYS Certification and
Testing Service platform.
For more information about this test platform see page Error! Bookmark not
defined.. If you require additional information, contact your Implementation
Manager.
9. Certification Scheduling The developer notifies their TSYS Implementation Manager to schedule the
start of certification.
Make sure you‟re ready for certification. The certification process is rigorous
and time consuming. It‟s generally best if you perform your own pre-
certification by running all of the TSYS and card brand test cases before
scheduling certification.
TSYS recommends that you schedule certification three (3) months in
advance.
10. Certification Preparation The TSYS Implementation Manager will co-ordinate the EMV certification
process with you and will provide any required host connectivity and
scheduling information.
11. Certification The developer certifies the EMV POS Solution with the assistance of their
TSYS Implementation Manager.
Page 34 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
12. Certification Review The developer submits all certification results (test case results, M-TIP
questionnaire, receipts etc.) required by TSYS and the card brands. Once
received the TSYS Implementation Manager will:
o Review the certification results to determine if the EMV POS Solution
has successfully completed all testing
o Submit the brand certification test results to the card brands for brand
approval
If any certification tests have failed, part or all of the Certification will have to be
repeated.
13. Pilot Once certification has been successfully completed, the EMV POS Solution
must be piloted in a limited number of locations before beginning a full rollout.
Once the TSYS pilot criteria has been met, the Implementation Manager will
send an email informing you that the pilot has been successfully completed
and a Live rollout may begin.
Note: It is possible that MasterCard will also require that your EMV POS
Solution undergo MasterCard End-To-End Demonstration (ETED) testing. If
required, this must be completed to MasterCard‟s satisfaction during the pilot
before a full rollout may begin.
14. Live A full rollout of the EMV POS Solution may begin.
15. Rollout Complete Keep up to date on the status of your EMV hardware and kernel certifications.
EMV POS Solutions are not certified forever. It may be necessary to re-certify
due to expiring certifications or regulatory changes.
Page 35 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
EMV certification letters must be current and not about to expire. TSYS will not certify a
device if any of the certification letters is scheduled to expire within six (6) months of the date
of certification.
3.2 Training
It is important that everyone involved in the development and testing of an EMV project receive EMV
training before beginning an EMV project. This is considered critical as EMV and contactless solutions
are much more complex than traditional magstripe solutions. Beginning EMV projects without proper
training often leads to extended project timelines and certification issues that can result in extensive re-
development to resolve.
There are several sources available where this training may be obtained:
www.emv-connection.com
www.smartcardalliance.org
www.b2ps.com/education
www.ul-ts.com/elearning
Page 36 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
TSYS cannot provide low level EMV, contactless or PINPad kernel integration support. It is up to the
developer to obtain this information from other sources.
EMV requirements and guidelines can be obtained from the EMVCo website www.emvco.com.
For PINPad kernel technical support refer to the PINPad vendor‟s documentation or contact the
PINPad vendor to inquire about PINPad integration training.
There are external EMV technical support resources that can be utilized. Please note that these
are not TSYS services and are available at an additional cost.
1. Pre-Certification The developer tests the EMV POS Solution to ensure it connects to the TSYS host
and performs all implemented transactions. This includes testing EMV,
contactless and non-EMV transactions.
o Receipts and host messages should be checked to ensure they conform to
the best practices and requirements outlined in this document.
o The developer provides test results to TSYS for validation, along with the
receipts generated during testing.
2. Class B Certification The developer runs the TSYS Class B certification scripts that test non-EMV, EMV
and contactless transactions.
o When complete, forward the test script results, along with any required
receipts, to TSYS for verification.
Page 37 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
3. Brand Certification The developer uses the Collis Brand Test Tool to execute test cases required by
each of the brands supported.
Brand EMV Suite Contactless Suite
Amex AEIPS ExpressPay
Discover/Diners D-PAS
MasterCard M-TIP M-TIP
JCB TCI
Visa ADVT CDET
qVSDC (required for contactless-only
device certifications)
4. Card Brand The developer will submit the card brand testing results to TSYS for review and
Certification Results submission to the card brands:
o Collis Brand Test Tool test case results
o Completed M-TIP questionnaire
o Receipts
o Sample Reports
5. Card Brand TSYS will ensure all card brand test cases have been completed satisfactorily and
Submission will submit the results to the card brands for brand approval.
This process takes 10 – 15 days to complete per kernel configuration supported.
If you have questions or require more detailed information related to the TSYS EMV certification process
please contact your Implementation Manager.
Page 38 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
In addition to the TSYS pilot requirements MasterCard will sometimes require that End-To-End
Demonstration (ETED) testing be performed at the first pilot site. If this is required, a MasterCard
representative will go to the pilot site to perform live EMV transactions and to analyze the results.
The exact TSYS pilot completion requirements may vary based on the EMV POS Solution being
implemented. In most cases they will be as follows (please contact your TSYS Implementation Manager
to confirm your exact pilot criteria):
Pilot will be run in 2-3 locations
Pilot will be considered complete when both of the following conditions have been met:
- The pilot has either been running for three (3) months or 30 EMV transactions have been
successfully processed and settled
- All MasterCard mandated ETED pilot requirements have been completed to MasterCard‟s
satisfaction
When TSYS determines that all pilot completion criteria has been met, a pilot completion email will be
sent informing you that your EMV POS Solution pilot has been completed and that a live rollout may
begin.
Page 39 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Code and Terminal ID Number). You should have also received the name, email address and phone
number of the Test Analyst assigned to your project.
If you do not received your host access information or are unable to contact your assigned Test Analyst,
you can contact Developer Services by email or phone:
3.8
EMV and Contactless Test Tool Requirements
Before implementing an EMV POS Solution you will need to obtain a certification test tool. These test
tools include EMV card simulators and physical “fallback” cards that can be used for testing, certification
and card brand certification. B2 and UL Transaction Security (UL-TS formally known as Collis) together
can deliver a comprehensive set of testing products that can support all of your EMV, contactless and
mobile needs.
The Collis Merchant Test Suite (MTS) is a fully-equipped hardware and software suite that provides
merchants, acquirers, processors and acceptance device vendors with the tools necessary to validate
their EMV configurations, and to run all of the major card brand certification test suites.
The Collis MTS supports both Point of Sale (POS) terminals and
Automated Teller Machines (ATM), and includes detailed scripts that
guide the user through the testing process, eliminating much of the
complexity and confusion associated with EMV and contactless brand
certifications.
The Collis MTS comes with all of the hardware and software required for
contact and contactless EMV certifications and it includes a robust
carrying case so the complete MTS kit can be easily taken to wherever
you need it.
The Collis Merchant Test Suite includes two unique boxes (SmartLink™
and SmartWave™) to emulate both contact and contactless cards. The
MTS software provides true card simulation by emulating all the functions
of actual EMV and contactless cards.
Page 40 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
PINPads.
All of the Collis MTS software applications provide a comprehensive interface that displays and
interprets all of the commands being passed between an EMV capable device and the EMV chip
card. This information is invaluable to developers and testers when debugging EMV applications.
The real key to the Collis MTS is the Collis Brand Test Tool (BTT) software. Using the Collis BTT
software you can test EMV devices within the environment in which they will be operated, and test them
using the actual brand settings that will be used for development, certification and production.
The BTT software produces reports that can be used for local examination and documentation of the test
cases. The reports can also be easily exchanged with other parties involved in the certification process.
Using the BTT software results in a more robust, repeatable and well-documented development
environment which leads to a contact and contactless-compliant, brand-certified payment device that can
perform trouble-free EMV transactions within the payment infrastructure.
The BTT is constantly being improved and upgraded to keep up with the latest brand certification
requirements. It currently supports the following certification suites:
Visa ADVT, qVSDC, CDET, payWave™
MasterCard M-TIP, PayPass™
Amex AEIPS
Discover D-PAS
Diners
JCB TCI
Interac Flash™
Collis is constantly updating their products to add functionality, improve their usability and to keep pace
with ever changing card brand certification requirements. The Collis product roadmap can be found at:
Collis Product Roadmap.
For more information on the Collis MTS visit www.b2ps.com or email [email protected].
Page 41 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: Physical test cards can also be very useful for development testing, training and demonstration
purposes as multiple sets of cards are often required and physical cards are the most economical
solution.
Physical cards can be purchased using the order form on the TSYS partner portal.
Note: Card brand certification requires connecting to a different URL than used for other testing.
Contact your Implementation Manager to obtain the correct URL and port information.
Page 42 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
4. EMV Overview
Page 43 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Partial EMV Transaction – EMV chip is used to read card data but, the chip does not participate
in the authorization decision (referred to as non-EMV transactions that use EMV functionality)
Notes:
1. Partial EMV transactions request an AAC at the 1st Generate AC to terminate the card usage.
For information relating to the Full EMV and Partial EMV transaction flow see page 52.
The following table lists the EMV credit transactions supported by TSYS and indicates how they should
utilize the EMV chip.
Page 44 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Notes:
1. Column indicates if the final EMV cryptogram (TC – Transaction Certificate) should be stored with an
approved transaction.
2. The EMV chip is only used to obtain the card PAN.
3. The EMV cryptogram will be required when performing the Pre-Authorization Completion.
4. The card must be presented if the Pre-Authorization transaction did not store the PAN.
5. The final Pre-Authorization cryptogram is used for the Pre-Authorization Completion.
6. The original transaction PAN is read from the transaction database. If desired that card may also be used to
validate that the cardholder is present by comparing the original PAN to the card PAN.
7. Cryptogram must be stored if the Card Authentication transaction will ever be completed. If the transaction
will not be completed, the cryptogram does not need to be stored.
The following table lists the EMV debit transactions and indicates how the transaction should utilize the
EMV chip.
Notes:
1. Column indicates if the final EMV cryptogram (TC – Transaction Certificate) should be stored with an
approved transaction.
Page 45 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Credit and debit Purchase transactions are processed as Full EMV transactions.
All credit and debit Purchase transactions must follow the Full EMV transaction flow and the
cryptogram requested at the 2nd Generate AC must be based on the issuer authorization
decision.
Pre-Authorizations are Full EMV transactions performed with the cardholder present.
Incremental Authorizations are required when a transaction amount exceeds the original authorization
limits. Incremental authorizations are not EMV transactions and do not require chip data.
Automated Fuel Dispenser (AFD) Pre-Authorization transactions must follow the Full EMV
transaction flow and the cryptogram requested at the 2nd Generate AC must be based on the
issuer authorization decision.
4.5.3 Completions
Completions are Partial EMV transactions that use EMV data from the original Pre-Authorization
transaction. The cardholder does not need to be present when the Completion is performed.
Page 46 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
4.5.4 Refunds
The Refund transaction processing differs depending on the type of refund being performed.
For traditional magstripe Quick Service Transactions receipt printing is optional if the transaction amount
is below the “no signature floor limit”. However, “no signature floor limit” processing does not apply to Full
EMV transactions. EMV transactions must follow CVM processing rules for determining if a signature or
PIN is required.
Quick Service Restaurants may wish to have a floor limit under which NO CVM is used and over which a
Signature or PIN CVM is used. To do this multiple selectable kernel configurations must be implemented.
One kernel configuration would include a standard configuration supporting multiple CVMs (i.e. PIN,
Signature and/or NO CVM) and the other would support only the NO CVM option. The kernel
configuration to be used for each transaction would be selected by the EMV POS Solution based on the
transaction amount.
Note: EMV POS Solutions that implement a selectable kernel configuration must undergo multiple
EMV card brand certifications. One certification for each kernel configuration supported.
Cardholder Verification Method (CVM) processing must be performed for EMV QSR
transactions. If a Signature CVM is selected, a receipt must be printed regardless of the
transaction amount. Using a selectable kernel configuration will allow for the transaction to use
a NO CVM kernel configuration, in which case, no receipt is required.
Currency Conversion allows cardholders to have the transaction amount converted to an alternate
currency rather than using the merchant currency.
Currency Conversion is supported for EMV transactions as long as the currency is selected before
performing the 1st Generate AC and the TSYS host request message reflects the chosen currency.
Page 47 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
BP 00800 Use the Application Currency Code (Tag 9F42) to determine CC eligibility
The Application Currency Code (Tag 9F42) should be used to determine if the card is eligible
for Currency Conversion.
The Acquirer Transaction Currency Code and Settlement Currency Code fields in Group 3
Version 32 “Currency Conversion Data” must be set to the Transaction Currency Code (Tag
5F2A) value.
Page 48 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
5. Contactless Overview
For the magstripe environment, there is only one implementation option and it is magstripe replacement.
In this implementation, the contactless interface accesses the chip through the contactless antenna.
A magstripe replacement contactless card contains a magnetic stripe on the back of the card and an
antenna and chip inside it. The only way to know that a card is a contactless magstripe replacement card
is by looking for the contactless icon on the front or back of the card.
Transaction must always go online for authorization
The cardholder may be prompted for a signature or PIN (depending upon the transaction
amount)
For EMV complement implementations, a “dual interface” card is used. A dual interface card supports
both a contact and a contactless interface to the same chip.
These cards are referred to as dual interface cards because the contact interface accesses the chip using
the contact plate, while the contactless interface accesses the same chip through the contactless
antenna. You can tell the card is a dual interface card by the contactless icon on the front or back of the
card and the contact plate which is visible on the front of the card.
Page 49 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
EMV Risk Management and decision making are supported by the chip through both interfaces:
The contactless interface is aimed primarily at the micropayments market. Transactions are
mostly offline where there is no need for PIN or signature.
The contact interface is used for higher transaction amounts, where online is needed and
consumer verification is required (i.e. PIN or Signature), or when EMV risk management
parameters need to be updated.
EMV replacement is when the card is replaced with a different form factor, such as a mobile phone.
With a mobile phone only a contactless interface exists; there is no contact interface. For a contactless
mobile phones:
Online and offline transactions are supported
Online and offline PIN are supported
EMV Risk Management updates are achieved via Over the Air (OTA) protocols
Page 50 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Notes:
1. Column indicates whether the final EMV cryptogram (TC – Transaction Certificate) should be stored with an
approved transaction.
2. The CFF is used interactively only up until the 1st Generate Application Cryptogram or until the magstripe
data has been received by the reader.
Page 51 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 52 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
1. Tender Initialization Transaction type is selected and the total transaction amount is determined
including:
o Tax
o Tip
o Cashback
o Surcharge
3. Application Selection A Candidate List is created of AIDs that are mutually supported by both the
card and the EMV POS Solution:
o U.S. Common Debit selection processing (see page 73)
o If the Candidate List is empty fallback processing is performed
o If only one mutually supported AID is found:
AID is automatically selected
Cardholder is required to confirm selection if Cardholder Approval
Indicator (Application Priority Indicator (Tag 87 – bit 8) is set to „1‟
o If more than one mutually supported AID is found, the user is prompted
to select an application or, if prompting is not possible, the highest
priority AID is auto-selected
4. Read Data Records Card data is read for the selected AID:
o Card PAN (Tag 5A)
o Expiry Date (Tag 5F24)
o Track2 Equivalent Data (Tag 57)
o Card Validation Checks (BIN, MOD10, etc.)
o Etc.
Card Validation Checks (BIN, MOD10, etc.) are performed on data read.
Page 53 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
5. Risk Management The kernel and chip perform multiple Risk Management processes. The
results are stored in the TVR (Tag 95) and CVR (part of Tag 9F10) and will be
transmitted to the issuer as part of the authorization request:
o Offline Card Authentication (SDA / DDA / CDA)
o Processing Restrictions
Application Version Number
Card Usage Control
Application Effective Date
Application Expiry Date
o Cardholder Verification (PIN / Signature / NO CVM)
o Terminal Risk Management
6. 1st Generate AC The EMV POS Solution requests an authorization from the chip. The EMV
chip will respond with an Application Cryptogram:
o Offline Approved (returns TC) – TSYS has zero floor limit so a TC
should never be generated
o Offline Declined (returns AAC)
o Online Authorization Required (returns ARQC)
7. Host Authorization The EMV POS Solution sends the transaction to the TSYS host for
authorization.
If unable to go online, the EMV POS Solution may, based on floor limits and
Merchant STIP processing, locally approve or decline the transaction.
Note: EMV U.S. Debit transactions cannot be approved locally.
8. Transaction Completion The authorization decision is sent to the EMV chip for final processing
Processing including:
o Issuer Authentication Data (Tag 91)
o Issuer Scripts (Tag 71 or Tag 72)
o Issuer Response Code (Tag 8A) – from the issuer or locally generated
Completion processing includes:
o External Authenticate (if an ARPC is returned by the issuer and card
supports Issuer Authentication in the AIP (Tag 82 Byte1 Bit3))
o Script Processing (if Tag 71 or Tag 72 returned by the issuer)
o 2nd Generate AC (to determine the final transaction disposition –
Approved (TC) or Declined (AAC)
9. Host Reversal Processing If the issuer approves the transaction and any of the following occur during
(if required) Transaction Completion Processing, a reversal must be sent to the host:
o PINPad not available
o Card removed prior to the completion of processing
o Chip Malfunction (except MasterCard – see requirement below)
o Chip declines the transaction (2nd Generate AC)
o Cardholder cancels transaction
10. Store Transaction Results The transaction results including the Application Cryptogram should be stored
in the transaction database.
Note: It is optional whether Decline and Reversal transactions are stored in the
transaction database however, the information relating to the transaction must
be available for the EMV Transaction report.
11. Remove Card The cardholder is prompted to remove the EMV card.
Page 54 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
12. Receipt Printing The EMV transaction receipt is printed. The receipt must contain the following
EMV information:
o Chip Indicator (to indicate cardholder data was read from a chip)
o AID
o Application Preferred Name (or Application Label)
o TVR
o TSI
o IAD
o Signature Line (if the CVM was Signature or NO CVM)
o “PIN Verified” (if the CVM was one of the PIN types)
RQ 01800 Issuer decision must be used for MasterCard 2nd Gen AC chip error
For chip malfunctions at the 2nd Generate AC, MasterCard requires that the transaction be
approved or declined based on the issuer authorization decision returned in the host response.
Page 55 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
OK
Yes Failed
Application Selection
Process Build AID Candidate List
as non-EMV
Transaction
OK
No
OK
OK
Risk Management
Offline Card Authentication
Processing Restrictions
Cardholder Verification
Terminal Risk Management
Store Transaction
Print
Transaction Declined Approved
“Declined” 1st Generate AC
Unsuccessful AAC Returned TC Returned EMV data is saved with
Receipt
transaction
Go Online
ARQC Returned
Print
Host Authorization “Approved”
Receipt
Build host message and send
to host and receive response
Yes
Error
Page 56 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
1. Tender Initialization Transaction type is selected and the total transaction amount is determined
including:
o Tax
o Tip
o Cashback
o Surcharge
Note: For transactions such as reversals or completions this information may
be read from the transaction batch.
3. Application Selection A Candidate List is created of AIDs that are mutually supported by both the
chip and the EMV POS Solution:
o USA Common Debit selection processing (see page 73)
o If the Candidate List is empty, fallback processing is performed
o If only one mutually supported AID is found:
AID is automatically selected
Cardholder is required to confirm selection if Cardholder Approval
Indicator (Application Priority Indicator (Tag 87 – bit 8) is set to „1‟
o If more than one mutually supported AID is found, the user is prompted
or, if prompting is not possible, the highest priority AID is auto-selected
4. Read Data Records EMV POS Solution reads data records for the AID selected (including):
o Card PAN (Tag 5A)
o Expiry Date (Tag 5F24)
o Track2 Equivalent Data (Tag 57)
o Etc.
Card Validation Checks (BIN, MOD10, etc.) are performed on data read.
5. 1st Generate AC The EMV POS Solution requests an AAC to terminate the chip interaction.
7. Store Transaction Results The transaction results are stored in the transaction batch.
Page 57 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
9. Receipt Printing The EMV transaction receipt is printed. The receipt must contain the following
EMV information:
o Chip Indicator (to indicate cardholder data was read from a chip)
o AID
o Application Preferred Name (or Application Label)
o Signature Line (always)
10. Transaction Upload The transaction is sent to the host prior to or at settlement.
Page 58 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
OK
Yes Failed
Application Selection
Process Build AID Candidate List
as non-EMV
Transaction
OK
No
OK
OK
Force AAC
1st Generate AC
Page 59 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 60 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 61 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Contactless
Not Accepted
Read Error Y Retry? N
Use Contact/MSR
N Y Contactless
App/Card
Y Not Accepted
Blocked?
Exceed
Not Accepted
Contactless Y
Use Contact/MSR
Limit?
Exceed CVM
Y Set CVM Required
Limit
Transaction
MSD Card? Y
Completed
AAC
Generated?
Y
N
ARQC
Y
Generated?
Transaction
TC Generated? Y
Completed
Use Contact/MSR
Page 62 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 02000 Total transaction amount must be known before card is presented
All EMV POS Solutions must complete the tendering process before prompting for card entry.
RQ 02100 Transaction Amount (Tag 9F02) must be set to total transaction amount
The Transaction Amount (Tag 9F02) must be set to the total transaction amount including
cashback, surcharge and tip.
Cashback is supported for debit card transactions only. The cashback amount must be known before
card entry. Therefore, if a cashback amount is entered and the AID selected is not a debit AID, the
transaction must be cancelled.
RQ 02300 Transaction Amount (Tag 9F02) must include the cashback amount
The cashback amount must be included in the full transaction amount stored in Transaction
Amount (Tag 9F02).
RQ 02400 Other Amount (Tag 9F03) must contain the cashback amount
The cashback amount must be stored in Other Amount (Tag 9F03) and sent to the host as part
of the authorization message.
Page 63 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Historically, an Authorization would be performed for the pre-tip amount (e.g. the meal amount in a
restaurant) and the settled amount would be for the pre-tip amount + tip amount. As EMV POS Solutions
will always have a cardholder entry device (e.g. PINPad), it is recommended that the EMV Purchase
transaction be used for transactions that would include a tip. This would allow the authorization amount
and settlement amount to be the same.
The EMV Purchase (with tip) transaction flow would be:
1. Display transaction amount on the PINPad for cardholder approval
2. Prompt cardholder to add a tip amount
3. Confirm total (Transaction Amount (including cashback and surcharge) + Tip)
4. Begin standard EMV Purchase transaction flow using the new total
5. Settle transaction using the authorized amount.
For environments such as Restaurants that require tipping it is recommended that a Pay at
Table solution be implemented so that Purchase transactions with a tip prompt can be used.
Also if a PIN is required the customer will be able to enter it while remaining at the table.
When processing the magnetic stripe information, the EMV POS Solution must read and act upon the
Track 2 Service Code.
EMV chip cards contain a Track 2 Service Code beginning with “2” or “6”. The Service Code value must
be checked to determine if a chip read is required.
Page 64 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 02600 Service Code „2xx‟ and „6xx‟ must force a chip usage
If a card is swiped with Service Code „2xx‟ or „6xx‟ (indicating that a chip is present), the EMV
POS Solution must prompt for the card to be inserted into the chip reader.
Page 65 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 02700 Cancel transaction if card accepted but removed before host authorization
When an EMV card is successfully read but is removed during EMV processing, before
performing an online authorization, the transaction must be cancelled.
RQ 02800 Reverse and cancel if host approves but card removed before 2nd Gen AC
If a host authorization is performed and the transaction is approved by the issuer, but the card
is removed before the 2nd Generate AC completes, a host reversal must be sent and then the
transaction must be cancelled.
RQ 02900 Decline transaction if host declines and card is removed before 2nd Gen AC
If a host authorization is performed and the transaction is declined by the issuer, but the card is
removed before the 2nd Generate AC completes, the transaction must be declined.
Page 66 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
No Yes
No Yes
No
Yes
No
Yes
Execute Commands up
to and including the
1st Generate AC Fallback
Transaction
Successful
Proceed with EMV
Command? Yes
Transaction
SW=9000
No
No
No
Transaction
Terminated
Page 67 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 03000 Service Code „2xx‟ and „6xx‟ must be accepted for fallback card swipes
In a fallback situation the magnetic stripe reader must accept a swiped EMV card and process
it as a non-chip card (i.e. as a standard magstripe card) even though the Service Code is „2xx‟
or „6xx‟.
RQ 03100 Fallback must be cancelled when a card is inserted at fallback card entry
When waiting for a fallback card swipe, if an EMV card is inserted or tapped, fallback
processing must be cancelled and the transaction must proceed as an EMV transaction.
When waiting for a fallback card swipe, if the card swiped does not have a „2xx‟ or „6xx‟
Service Code, fallback must be cancelled and the transaction must be performed as a
traditional magstripe transaction.
MSR Fallback is used when Application Selection fails (i.e. when none of the AIDs supported by the EMV
POS Solution matches any of the AIDs loaded on the EMV card). This scenario is also known as an
“Empty Candidate List”. When this occurs the transaction must be completed as a fallback transaction
using the magnetic stripe.
Page 68 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
When a MSR Fallback is performed the TSYS host request message must have the Account
Data Source field is set to “W” indicating that the EMV POS Solution does not have any EMV
applications (AIDs) in common with the chip card.
Technical Fallback is used when a chip enabled device is unable to read a chip card. In these cases the
card information must be obtained by reading the magnetic stripe. There a several situations where
Technical Fallback may occur:
1. When the chip on the card is inoperative (No ATR received from the chip)
2. An invalid ATR is received from the chip
3. When the PINPad chip reader is malfunctioning
After successfully completing Application Selection there are several reasons why a chip transaction may
fail and fallback processing is not allowed:
1. The card has been blocked
2. The card application has been blocked
3. The transaction is offline declined (AAC generated at 1st Generate AC)
4. Premature card removal before the transaction has been completed
5. Fallback is not supported by the card brand
6. Transaction is cancelled at any point
When any of these situations occur, another form of payment is required.
If fallback is required, the cardholder should be prompted to use the magnetic-stripe reader, followed by a
standard card entry prompt indicating that a card may be inserted, swiped or tapped (if supported). Even
though fallback is active the cardholder should be allowed to insert or tap the same or a different EMV
card.
Page 69 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
When a fallback prompt is displayed it should only be enabled for 30 – 90 seconds. After that
period, if a card is swiped with an EMV Service Code („2xx‟ or „6xx‟), a prompt to use the chip
reader should be displayed.
When in fallback it is recommended that the EMV POS Solution allows the cardholder to
swipe, insert or tap a card. This allows a second attempt at the chip usage and allows the
cardholder to switch to a different EMV cards without restarting the transaction.
Fallback is a temporary practice that will only be allowed for a limited time, after which fallback
transactions will not be permitted. EMV POS Solutions should have the technical capability to allow or
disallow fallback transactions by card scheme and should be able to activate/deactivate this capability
based on rules established by the card brands and subsequently directed by TSYS.
When fallback is discontinued for a card scheme, the EMV chip cards for that scheme may no longer be
processed as magnetic stripe cards.
The chart below shows the date fallback will be disallowed by each card brand.
Page 70 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The EMV POS Solution must be configured with the AIDs of all chip payment applications it supports. If
none of the AIDs supported by the EMV POS Solution match any AID supported by the card, a chip
transaction cannot be performed. In this case MSR Fallback processing must be initiated.
The AID consists of three components:
Registered Application Identifier (RID) – Represents the payment scheme (e.g. Visa,
MasterCard, etc.)
Proprietary Application Identifier Extension (PIX) – Represents the payment application type
(i.e. credit, debit, prepaid, ATM-only, etc.)
Issuer Suffix – Optional suffix sometimes added to the end of the AID by the issuer
An Application Selection Indicator associated with each AID designates how application matching is
performed:
Full Selection – The EMV POS Solution AID must exactly match the entire card AID, including
any issuer assigned suffix, to be selected
Partial Selection – The EMV POS Solution can select an AID based on only its AID matching
the card AID excluding the issuer assigned suffix (if any)
Page 71 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
EMV POS Solutions should only accept AIDs supported based on your merchant agreement.
Any AID that has not been approved for use should be rejected by the EMV POS Solution
without being sent to the host for authorization.
The first step of Application Selection is to build a Candidate List of AIDs supported by both the card and
the EMV POS Solution. There are two methods that may be used by the kernel to build the Candidate
List. The method used is dependent on whether or not the card has a Payment System Environment
(PSE) present:
Implicit Application Selection Method – used when PSE is present on the chip
Explicit Application Selection Method – used when PSE is not present on the chip
Note: The Payment System Environment (PSE) is a list of all payment applications (AIDs) that exist on
the card.
Implicit or Explicit Application Selection is performed by the kernel not the EMV POS Solution. It is up to
the kernel to determine which selection method to use and to build the initial Candidate List of commonly
supported AIDs.
Implicit Application Selection is the most efficient selection method but, it can only be used when the chip
contains a Payment System Environment (PSE). Therefore, the first step of Application Selection is for
the kernel to read the PSE from the card. If a PSE is returned, Implicit Application Selection will be
performed. If no PSE is returned, Explicit Application Selection will be performed.
RQ 03800 The AID list must be loaded into the kernel at kernel initialization
As part of kernel initialization, all AIDs supported by the EMV POS Solution must be loaded
into the kernel for use during Application Selection.
Page 72 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
In the traditional magstripe debit transactions, merchants can decide when selecting the card type, what
cardholder verification to use for the debit transaction. This may be either to:
1. Prompt the cardholder to enter the PIN (commonly referred to as “PIN Preferring Merchants”).
The cardholder can bypass the PIN to allow for a signature transaction.
2. Prompt the cardholder to select either “Credit” or “Debit” (commonly referred to as “Credit/Debit
button supporting merchants”). In this situation:
- Credit – means perform a Signature Debit transaction
- Debit – means perform a PIN Debit transaction
This section describes how to perform Application Selection for EMV U.S. Debit so that the routing choice
of the merchant is retained and the expected cardholder verification is performed based on merchant
and/or cardholder preferences.
The following assumptions have been made when describing the Application Selection process for U.S.
Debit:
Solutions supporting U.S. Debit will have two kernel configurations:
- All CVM Config – Terminal Capabilities (Tag 9F33) is set to support all CVMs the merchant
wishes to support (e.g. PIN, Signature, and NO CVM).
- NO CVM Only Config – Terminal Capabilities (Tag 9F33) is set to support only NO CVM.
When using a configurable kernel the Terminal Type (Tag 9F35) and Additional Terminal
Capabilities (Tag 9F40) values will remain the same regardless of the value used for Terminal
Capabilities (Tag 9F33).
PIN Bypass is supported in all PIN supporting kernel configurations (regardless of merchant
option – PIN Preferring or Credit/Debit button).
The payment application supports a NO CVM limit for all interfaces other than contactless for all
payment products.
The steps required to manipulate the Candidate List to fully support U.S. Debit are:
1. For each transaction the final amount for the transaction must be known prior to manipulating the
Candidate List.
2. Once the final amount is known and the Candidate List is created, the card type will be identified
based on the list of AIDs in the Candidate List. There are two options:
- The Candidate List doesn‟t contain any U.S. Common Debit AIDs – This is either an
international or domestic credit card or an international debit card. In this case there are no
additional steps needed and the application can continue to Final Selection (section 8.5.4).
- The Candidate List contains one or more U.S. Common Debit AIDs – This is a U.S. Debit
card.
3. For U.S. Debit cards, the EMV POS Solution must determine which AIDs should remain in the
Candidate List (based on the various options described in section 2.6 and where applicable
always ensuring that the U.S. Common Debit AID is the only AID that will remain in the Candidate
List). Based on the number of AIDs the following should be performed:
- Candidate List only contains one AID – Continue to step 4 below.
- Candidate List contains more than one AID – Continue to Final Selection step (section 8.5.4).
4. If the Candidate List only contains the U.S. Common Debit AID, the EMV POS Solution needs to
decide if the transaction is under or over the U.S. Debit CVM limit:
Page 73 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
- Transaction is under the U.S. Debit CVM limit – Set Terminal Capabilities (Tag 9F33) to “NO
CVM Only Config” and continue to Final Selection (section 8.5.4).
- Transaction is over the U.S. Debit CVM limit – continue to step 5 below.
5. If the Candidate List contains only the U.S. Common Debit AID and the transaction is over the
NO CVM limit for U.S. Debit, the following should be performed based on the cardholder
verification process supported by the merchant:
- PIN Preferred Merchants – Set the Terminal Capabilities (Tag 9F33) to “All CVM Config”.
Later during Cardholder Verification the application will prompt for PIN and may allow the
cardholder to bypass the PIN.
- Credit/Debit Button Merchants – Prompt the cardholder to select either Credit or Debit.
o Credit Selected – Set the Terminal Capabilities (Tag 9F33) to “NO CVM only
Config”. In this case the transaction will be defined as a “NO CVM”; however,
since the transaction is over the NO CVM limit the application should capture or
print a signature at the end of the transaction.
o Debit Selected – Set the Terminal Capabilities (Tag 9F33) to “All CVM Config”
and proceed to the Final Selection step (section 8.5.4) PIN Bypass may still be
allowed during the Cardholder Verification step of EMV.
Note: The U.S. Common Debit AIDs supported are MasterCard US Maestro (A0000000042203) and
Visa Common Debit (A0000000980840).
When migrating to EMV the cardholder verification used is handled by the EMV kernel and the
card application (based on the issuer priority and choice), TSYS recommends that solutions no
longer use the Credit/Debit button option.
Page 74 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Chip Reader
Yes
No
No Yes
Yes
No
Is Transaction Amount
>= NO CVM Limit
Yes No
Final Selection
Page 75 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Once the Candidate List has been built and U.S. Common Debit processing has been performed, Final
Selection can begin. During this process the AID to be used for the transaction is selected.
If the Candidate List only contains one application it is automatically selected, Final Selection ends and
Cardholder Application Confirmation is performed.
If the Candidate List contains two or more mutually supported applications (AIDs), the application list
must be presented to the cardholder for selection. The list of applications may be presented all on one
screen or may be displayed with one application name per screen using navigation buttons (e.g. „Next‟
and „Previous‟) to view the list.
Regardless of the method used to display the Candidate List, the application names displayed are
determined as follows:
1. Display the Application Preferred Name (Tag 9F12) if it is stored in a character set supported by
the display. This can be determined by checking the Issuer Code Table Index (Tag 9F11). A
value of “1” indicates that the Application Preferred Name is encoded using the Latin character
set (i.e. contains standard English alphabetic characters).
2. Display the Application Label (Tag 50) if the Application Preferred Name is not present or cannot
be displayed.
3. If the Application Preferred Name and Application Label are not present or cannot be displayed,
display a default application name assigned to the AID by the EMV POS Solution.
Once the application has been chosen, the kernel may relay the application information back to the
payment application so the following can be performed:
1. Set the Terminal Capabilities (Tag 9F33) – This will be based on the NO CVM limit for the card
type based on the AID that has been selected (either the “All CVM Config” or the “NO CVM Only
Config”):
- Transaction is over the NO CVM limit – Select the All CVM Config
- Transaction is under the NO CVM limit – Select the NO CVM Only Config
2. Set the Processing Code:
- International AID selected – a credit Processing Code should be used
- U.S. Common Debit AID selected – a debit Processing Code should be used
The kernel can now select the card AID on the chip and Final Selection ends.
In some implementations, it may not be feasible to perform cardholder Application Selection. For these
implementations an EMV transaction should not be performed if the chip card contains multiple
applications, unless there is a method to inform the cardholder which application is being used.
Note: Certification will test that up to five mutually supported applications can be supported in the
Candidate List.
The EMV POS Solutions should have a default application name assigned to each supported
AID to be used to display and print the application name when the Application Preferred Name
and Application Label are not present or cannot be used.
Page 76 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Cardholder Application Confirmation is only required when the Candidate List contains only one AID and
the Cardholder Approval Indicator (Application Priority Indicator (Tag 87 – bit 8) is set to „1‟.
If cardholder confirmation is required, the cardholder must be prompted to confirm that the selected
application may be used. To do this the Application Preferred Name (Tag 9F12) or the Application Label
(Tag 50) is displayed to the cardholder who must confirm the selection.
RQ 04100 PAN tag must match account number in Track2 Equivalent Data
The PAN (Tag 5A) value should be the same as the account number included as part of
Track2 Equivalent Data (Tag 57). If they are different then the card must be rejected.
Page 77 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 04300 Application Expiration Date must match Track2 Equivalent Data expiry date
The Application Expiration Date (Tag 5F24) should be the same as the expiry date included as
part of Track2 Equivalent Data (Tag 57). If they are different the card must be rejected.
RQ 04400 Service Code must not be validated against Track2 Equivalent Data
The Service Code (Tag 9F30) must not be validated against the Service Code included as part
of the Track2 Equivalent Data (Tag 57).
If the EMV POS Solution supports multiple languages and none of them match a language in
the Language Preference (Tag 5F2D) list, the cardholder should be prompted to choose one of
the languages supported by the EMV POS Solution.
During the EMV transaction process there are several steps that require PINPad prompting to obtain
cardholder confirmation or provide instructions to the cardholder. This prompting must be performed in
the cardholder language determined by the Cardholder Language Selection process.
TSYS recommends that the following prompts be used for card entry.
Page 78 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Chip card is swiped with Service Code „2xx‟ or „6xx‟ “Use Chip Reader”
BP 02100 Do not use “remove” in the cardholder prompt to leave card inserted
TSYS highly recommends that the prompt informing the cardholder to leave the EMV card
inserted does not include the word “remove”. Doing this often leads to confusion with the
remove card prompt, displayed at the end of the transaction, causing the EMV card to be
removed prematurely (i.e. Avoid using the prompt “Do Not Remove Card”).
Several prompts are required for PIN entry to inform the cardholder of the status of the PIN entry process.
Only one PIN try remaining before card is blocked “Last PIN Try”
PIN tries exceeded and card has been blocked “PIN Tries Exceeded”
There are a number of transaction amounts that require confirmation during transaction processing.
When multiple amounts require confirmation, the amount confirmation prompts should be combined onto
a single display.
Page 79 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 80 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: An Issuer may use Application Usage Controls to restrict a card‟s use for domestic or
international transactions; as well as cash, goods, services or cashback.
The Processing Restrictions steps involve comparing data read from the EMV chip with data resident in
the EMV POS Solution. Depending on the PINPad capabilities, this step may be performed by the kernel
or the EMV POS Solution. Please refer to the EMV PINPad specification to determine your PINPad
capabilities.
The Processing Restrictions steps are as follows:
1. Check the Card Application Version Number (Tag 9F08) to ensure it matches one of the
application versions supported. Some kernels are able to support a primary and a secondary
application version number. The table below shows the Application Version Numbers currently
supported for each brand.
Primary Secondary
Card Brand
Version Version
Amex 001
Diners 001
Discover 001
JCB 200 120
MasterCard 002
Visa 08C 096
2. Verify that the type of transaction (POS, cash advance, purchase, cashback) is in domestic or
international mode and is compatible with the card‟s Application Usage Control. The Application
Usage Control (Tag 9F07) bits are checked as follows:
- Valid at EMV POS Solutions other than ATMs (Byte1-bit1) must be „On‟
- Valid for domestic use:
o Issuer Country Code (Tag 5F28) = Terminal Country Code (Tag 9F1A)
o Goods and Services (Byte1-bit6, Byte1-bit4) must be „On‟
- Valid for international use:
o Issuer Country Code (Tag 5F28) ≠ Terminal Country Code (Tag 9F1A)
o Goods and Services (Byte1-bit7, Byte1-bit5) must be enabled
3. Verify that the Application Effective Date (Tag 5F25) is equal to or before the current date.
4. Verify that the Application Expiration Date (Tag 5F24) is after the current date.
The results of these tests are stored in the Terminal Verification Results (Tag 95).
RQ 04500 AID list must be supported with associated Application Version Numbers
The EMV POS Solution must maintain a list of supported AIDs and corresponding Application
Version Numbers.
Page 81 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
EMV defines three offline Card Authentication Methods (CAM). All three methods use Certificate of
Authority Public Key (CAPK) technology to protect against card counterfeiting and / or card skimming.
Static Data Authentication (SDA) – is comparable to CVV checking on magnetic-stripe
transactions as it detects alteration of selected static data elements after personalization. SDA
differs from CVV in that it is performed offline at the PINPad
Dynamic Data Authentication (DDA) – has all the benefits of SDA and additionally protects
against copying of chip data by generating a dynamic signature for each transaction
Combined DDA/Application Cryptogram Generation (CDA) – has all the benefits of DDA and
additionally assures that the transaction data is not altered between the card and kernel by
including transaction data as part of the DDA calculation
RQ 04600 All Offline CAM failures must be sent for online authorization
For each of the offline CAM failure TVR bits, the TAC settings must ensure the transaction is
selected for online for authorization.
RQ 04800 All Offline Card Authentication Methods must be supported
All three offline Cardholder Authentication Methods must be supported (SDA, DDA and CDA).
Page 82 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: Visa recommends merchants retain CVM information for 180 days to assist in chargeback
resolution.
The PINPad prompts the cardholder for a PIN, encrypts it with public key technology
and sends it to the card, where the card decrypts it. The card then compares the
Offline Enciphered PIN cardholder-entered PIN to the Reference PIN stored secretly in the chip.
Note: PIN Bypass is only allowed for U.S. PIN Debit AIDs (i.e. pressing „Enter‟ at PIN
entry without entering a PIN will not skip the PIN entry).
The PINPad prompts the cardholder for a PIN and encrypts it using the same DUKPT
key used for magstripe debit PIN encryption. The encrypted PIN block is sent to the
Online PIN host in the online authorization message.
Note: PIN Bypass is not allowed except for U.S. Debit AIDs (i.e. Pressing Enter at PIN
entry without entering a PIN will not skip the PIN entry).
This method operates in the same manner as in the magnetic-stripe environment. The
Signature cardholder signs the transaction receipt and the merchant compares this signature to
the signature on the card.
This method operates in the same manner as in the magnetic-stripe environment where
transaction authorization is independent of cardholder verification.
NO CVM No cardholder verification is currently supported in some merchant environments, such
as certain unattended environments, quick service restaurants and other small ticket
environments. For attended environments, signature is required.
The EMV POS Solution should use the CVM Results (Tag 9F34) to determine if a signature line is
required on the receipt. For more information on receipt CVM requirements see page 140.
Note: A failed CVM does not mean that the transaction has failed or is declined. The CVM failure is
logged in the Cardholder Verification Results (CVR) and forwarded along with the Terminal Verification
Results (TVR) to the host during online authorization.
Page 83 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 04900 Online PIN CVM must be supported if solution supports PIN
Online PIN CVM must be supported by all EMV POS Solutions that support PIN entry.
RQ 05000 Signature CVM must be supported by attended solutions
Signature CVM must be supported by all attended EMV POS Solutions.
PIN Bypass is only allowed for U.S. Debit AIDs. For other AIDs pressing the „Enter‟ key during
PIN entry without entering a PIN must not skip PIN entry. If the „Cancel‟ key is pressed during
PIN entry, the transaction must be cancelled.
The EMV POS Solution must have the ability to perform PIN prompting. Several rules must be followed
for this process:
1. The prompt text displayed for offline and online PIN entry should be identical
2. PIN Bypass is only allowed for PIN entry for U.S. Debit cards. If PIN Bypass is attempted for
other cards (by pressing the „Enter‟ key at the PIN prompt with no PIN entered), PIN entry must
not be skipped
3. The PIN Try Counter (Tag 9F17) value must be obtained before PIN entry begins and its value
must be used as the maximum number of PIN attempts allowed
4. The cardholder must be notified before the last Offline PIN attempt and when the card is blocked
because the maximum Offline PIN tries have been exceeded
Note: The PIN Try Counter (Tag 9F17) is reset every time a valid Offline PIN is entered.
RQ 05200 Maximum number of PIN tries must not exceed PIN Try Counter (Tag 9F17)
The number of Offline PIN tries allowed must not exceed the initial PIN Try Counter (Tag
9F17) value.
RQ 05400 Cardholder must be notified when maximum Offline PIN tries is exceeded
The cardholder must be notified when Offline PIN tries have been exceeded.
Page 84 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 85 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following EMV Risk Management parameters control the EMV 1st Generate AC offline approval
process. These parameters are described in more detail in the following sections:
EMV Floor Limit – Defines the maximum transaction amount that can be approved offline at the
1st Generate AC
EMV Random Selection – Defines values used to force transactions online even if the
transaction amount is below the EMV Floor Limit
For a transaction to be approved offline by the chip the EMV Floor Limit must be greater than zero. Each
card scheme has defined a maximum EMV Floor Limit that can be used for each Merchant Category
Code. TSYS does not support non-zero EMV Floor Limits; therefore, all transactions will be sent online
and will never be approved offline by the card.
Note: Even if the transaction amount is below the EMV Floor Limit the card can decline the transaction
offline for other reasons.
EMV Risk Management parameters can be set to ensure that all transactions are “Randomly Selected to
Go Online” at the 1st Generate AC, even if the transaction amount is below the EMV Floor Limit. Even
when the EMV Floor Limit is set to zero the following values should be set.
Page 86 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: Most EMV kernels interpret 99% as being 100% but that should be confirmed with your
hardware vendor.
The DDOL is stored on the card and contains the list of data objects (tag and length) to be passed in the
INTERNAL AUTHENTICATE command. However, in some cases the chip does not contain a DDOL.
Therefore, if the EMV POS Solution supports DDA, a Default DDOL must be defined that can be used
when the chip DDOL is not present.
RQ 05600 A Default DDOL is required for EMV POS Solutions that support DDA
EMV POS Solutions supporting DDA must have a Default DDOL defined that can be used
when the chip does not contain a DDOL. The Default DDOL must only contain the
Unpredictable Number (Tag 9F37).
The TDOL is stored on the chip and contains the list of data objects (tag and length) to be used by the
EMV application to generate the TC Hash value. In some cases the chip does not contain a TDOL.
Therefore, the EMV POS Solution should have a Default TDOL defined that can be used when the chip
TDOL is not present.
The Transaction Amount (Tag 9F02) is sometimes contained in the card PDOL list. Therefore, it is
mandatory that the Transaction Amount (Tag 9F02) be set to the total transaction amount before the Get
Processing Options step is performed.
Page 87 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The IACs are three data elements personalized on the card by the issuer. The IACs consist of a series of
bits with each bit corresponding to a bit in the Terminal Verification Results (TVR). When an IAC bit is set
to „1‟ and the corresponding TVR bit is set to „1‟ then the action specified by the IAC is taken. There are
three possible actions; decline offline, go online for an authorization and decline offline if online
authorization is unable to complete:
IAC-Denial – Tag 9F0E (used at 1st Generate AC)
The issuer sets the IAC bits to „1‟ that correspond to the TVR bits for conditions which the issuer
wants to result in a 1st Generate AC offline decline.
IAC-Online – Tag 9F0F (used at 1st Generate AC)
The issuer sets the bits to „1‟ that correspond to the TVR bits for conditions which the issuer
wants to result in the 1st Generate AC requesting an online authorization.
IAC-Default – Tag 9F0D (used at 2nd Generate AC)
The issuer sets the bits to „1‟ that correspond to the TVR bits for conditions which the issuer
wants to result in a 2nd Generate AC decline when online processing was requested, but was not
possible.
The TACs are three data elements set by the card scheme and loaded as parameters by the EMV POS
Solution. The TACs consist of a series of bits with each bit corresponding to a bit in the Terminal
Verification Results (TVR). Similar to the card‟s IACs, when a TAC bit is set to „1‟ and the corresponding
TVR bit is set to „1‟, the action specified by the TAC is taken. There are three possible actions: decline
offline; go online for an authorization; decline offline if online authorization is unable to complete.
The three TACs defined by the card schemes are:
TAC-Denial – No Tag defined (used at 1st Generate AC)
The card scheme sets the TAC bits to „1‟ that correspond to TVR bits for conditions which the
card scheme wants to result in a 1st Generate AC offline decline.
TAC-Online – No Tag defined (used at 1st Generate AC)
Page 88 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The card scheme sets the bits to „1‟ that correspond to TVR bits for conditions which the card
scheme wants to result in the 1st Generate AC requesting an online authorization.
TAC-Default – No Tag defined (used at 2nd Generate AC)
The card scheme sets the bits to „1‟ that correspond to the TVR bits for conditions which the card
scheme wants to result in a 2nd Generate AC decline when online processing was requested, but
was not possible.
During Terminal Action Analysis the kernel analyzes the IAC, TAC and TVR values, and sends a
GENERATE AC command requesting the card to return an Application Cryptogram with its offline
authorization decision. This 1st Generate AC command must:
1. Specify whether a CDA signature is requested
2. Indicate the type of Application Cryptogram being requested based on the kernel‟s preliminary
authorization decision:
- AAC – Decline the transaction (this is generally used to terminate chip interaction for Partial
EMV transactions, e.g. credit Refund after card data has been obtained)
- ARQC – Process the transaction online
- TC – Approve the transaction offline (should never occur as TSYS requires the EMV Floor
Limit be set to zero)
3. Provide the transaction data required by the card to perform Card Risk Management
4. Provide the transaction data required to calculate the Application Cryptogram (data required by
the chip is specified by CDOL1 (Tag 8C) retrieved from the chip during the Read Application Data
stage).
The EMV card performs Card Action Analysis and responds with one of three possible decisions based
on the type of cryptogram requested in the 1st Generate AC command. This decision is returned in the
Cryptogram Information Data (Tag 9F27):
1. AAC ( Decline) Requested – card must respond with:
- AAC – Declined
2. ARQC (Online authorization CID=80/90) Requested – card may respond with either:
- ARQC – Go Online (online issuer authorization required)
Page 89 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
- AAC – Declined
3. TC (Approval CID=40/50) Requested – card may respond with any of the following:
- TC – Approved
- ARQC – Online Authorization Required
- AAC – Declined
Note: The Application Cryptogram returned by the card will always be the same or more restrictive
than the Application Cryptogram requested.
For example, if the GENERATE AC command requests that the transaction go online for authorization
(requests an ARQC), the chip will either agree (return an ARQC) or decline the transaction (return an
AAC). In this case the chip cannot offline approve the transaction (return a TC).
Page 90 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 05700 EMV PIN Debit transactions must always be sent online for authorization
Merchant stand-in processing is not supported for EMV debit transactions. All EMV PIN debit
transactions must be sent online for authorization. If this is not possible the transaction must
be declined.
The following transaction flow describes the steps required to perform Merchant Stand-in Authorization
for an EMV credit card transaction:
1. Check if Stand-in processing is enabled and if not, decline the transaction
2. Check if the transaction amount is below the Stand-in Floor Limit for this card type. Each card
scheme could have a different Stand-in Floor Limit. Proceed if the transaction amount is below
the Stand-in Floor Limit; otherwise, decline the transaction.
3. Check if the card is domestic (i.e. issued within USA). This can be determined by ensuring the
that Issuer Country Code (Tag 5F28) = “840”. International cards pose a higher risk and should
not be approved using stand-in authorization. Proceed if card is domestic; otherwise, decline the
transaction.
4. Apply the TVR Mask to the transaction‟s Terminal Verification Results (Tag 95) value. If any of
the bits in the TVR match the corresponding bits in the TVR Mask then a condition exists that
indicates the transaction should not be approved via stand-in authorization. The recommended
TVR Mask is „FD 7F FB 27 0F‟ which means that if any of the following conditions exists, the
transaction should be declined:
- Offline data authentication not performed
- Offline static data authentication failed
- ICC data missing
- Card appears on terminal exception file
- Offline dynamic data authentication failed
- Offline CDA failed
- Application expired
- Application not effective
- Requested service not allowed
- Cardholder verification not successful
- PIN entry required and PINPad not present or inoperable
- PIN entry required, PINPad present but PIN was not entered
- Upper consecutive off-line limit exceeded
- Any reserved for future use bits
Proceed if a bitwise AND of the TVR and TVR Mask bits are all zero; otherwise, decline the
transaction.
5. Use the TSI Mask and the transaction‟s Transaction Status Indicator (Tag 9B) value to check that
the required EMV transaction steps were performed. If any of the bits in the TSI are zero in the
corresponding bits of the TSI Mask then a required EMV transaction step was not performed.
The recommended TSI Mask is „E8 00‟ which means that the following transaction steps were
performed:
- Off-line data authentication performed
- Cardholder Verification performed
Page 91 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Page 92 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
If the host is not available and an AAC cryptogram is generated at the 2nd Generate AC, Merchant
Stand-in Processing may be performed.
Auth Host
Not
Available
2nd GENERATE AC
Authorization Response Code (Tag 8A) = Z3
(Host Not Available, Zero EMV Floor Limit)
AAC (Declined)
Merchant STIP
Standin
No
Enabled?
Yes
Yes
Is EMV Card
Domestic?
No
Yes
TVR &
No
TVR_Mask = 0?
Notes:
1. Stand-in Floor limit should be Yes
defined for each card scheme
2. A card will be considered
domestic if the Issuer Country TSI & TSI_Mask No
Code tag = 840 = TSI_Mask?
3. TVR Mask = FD 7F FB 27 0F
Yes
4. TSI Mask = E8 00
Stand-in Declined
Approved
Page 93 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Tag 8A
Host Decision
ASCII Hex
Approved 00 0x3030
Declined 05 0x3035
Issuer Authentication Data (Tag 91) – Used for External Authenticate (see page 90) - as
returned in the EIS Group 3 Version 55 field (TLV EMV Tag Data) / Summit <A111> field
Issuer Scripts (Tag 71 or Tag 72) – Issuer Script commands are forwarded to the card by the
PINPad kernel for execution - as returned in the EIS Group 3 Version 55 field (TLV EMV Tag
Data) / Summit <A111> field
The card will return one of the following in the 2nd Generate AC response:
TC (CID=40/50) – The transaction was approved
AAC (CID=00) – The transaction was declined (If the transaction was originally approved by the
issuer, a Reversal must be sent to the host)
RQ 05800 Issuer Response Code must be set based on host Response Code
The EMV POS Solution must interpret the host Response Code field and set the Authorization
Response Code (Tag 8A) to indicate if the transaction was approved or declined by the host.
This must be done before the 2nd Generate AC command is sent to the card.
Page 94 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The TSYS host may return an Issuer Script (Tag 71 or Tag 72) in the host response. The
EMV POS Solution must be capable of extracting the script and forwarding it to the kernel for
execution by the card.
For gift or pre-paid cards it is possible for the host to partially approve a transaction for an amount less
than the amount requested. When this occurs the cardholder must be prompted to accept the lower
authorization amount before the External Authenticate or 2nd Generate AC processing is performed.
If the cardholder does not approve the authorized amount, the cardholder should be prompted to remove
the card, a host reversal should be sent and the transaction should be cancelled.
If the cardholder wishes to continue the transaction using the lower amount the EMV POS Solution must:
1. Store the lower authorized amount in Transaction Amount (Tag 9F02) and make sure it is
updated in the kernel
2. Set Authorization Response Code (Tag 8A) = 0x3030 to indicate the transaction was approved
3. Perform an External Authenticate (if required by kernel)
4. Perform a 2nd Generate AC
The transaction is now complete and the receipt should be printed using the updated Transaction Amount
(Tag 9F02).
If the host returns a partial authorization and the cardholder does not wish to continue the
transaction using the lower amount, the EMV POS Solution must request a decline (AAC) at
the 2nd Generate AC, reverse the transaction to the host and set the Authorization Response
Code (Tag 8A) to 0x3035.
RQ 06100 Transaction Amount (Tag 9F02) must reflect the partially authorized amount
If the host returns a partial authorization and the cardholder wishes to continue the transaction,
the Transaction Amount (Tag 9F02) must be updated to reflect the lower authorized amount
and then sent to the kernel prior to the 2nd Generate AC.
8.18.2 Referrals
The TSYS host will return a Referral response when additional information is required and a voice
authorization should be attempted. When this occurs, the current transaction must be cancelled. If the
voice authorization is successful another transaction can be processed to obtain the funds.
Page 95 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: Some cards do not support the EXTERNAL AUTHENTICATE command and will validate the
ARPC as part of the 2nd Generate AC processing. This is managed by the EMV kernel.
The EMV chip responds with one of two possible decisions based on the type of cryptogram requested in
the 2nd Generate AC command:
1. AAC (Decline requested) – card must respond with:
- AAC – Declined
2. TC (Approval requested) – card may respond with either of the following:
- TC – Approved
- AAC – Declined
Note: The Application Cryptogram returned by the card will always be the same or more restrictive
than the Application Cryptogram requested by the Generate AC command.
For example, if the 2nd Generate AC command requests that the transaction be declined (requests an
AAC), the chip will always agree (return an AAC). In this case the chip cannot approve the transaction
(return a TC).
Page 96 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
If an Issuer Script is returned by the issuer it must be sent to the kernel for execution by the card prior to
performing the 2nd Generate AC. Tag 71 scripts will be executed before the 2nd Generate AC decision
and Tag 72 scripts will be executed after the 2nd Generate AC.
A host response will never contain both Tag 71 and Tag 72 Issuer Scripts. A maximum of one Issuer
Script will be returned in each host response message.
RQ 06400 Issuer Scripts must be executed for approved and declined transactions
Issuer Scripts returned in the host response message must be sent to the card for execution
regardless of whether the transaction was approved or declined.
RQ 06500 Must support Issuer Scripts up to 128 bytes in length
The EMV POS Solution must support Issuer Scripts up to 128 bytes in length.
If an error is returned from an Issuer Script command, the transaction should not be terminated
but no other issuer commands should be sent to the card. If a Tag 71 Issuer Script returns an
error, the application should continue to the 2nd Generate AC command.
Card Removed 1st Generate AC Card was removed card before 2nd Generate AC
Page 97 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
All reversals for EMV transactions must include tag data from either the 1st or 2nd Generate
AC. The list of tags sent must match the original authorization message but must be updated
to include 2nd Generate AC values if a 2nd Generate AC is performed.
When the transaction completes the cardholder should be prompted to remove their card before receipts
are printed.
BP 02500 Do not print receipt until the card has been removed
It is recommended that the EMV POS Solution does not print a receipt until the cardholder has
removed the card. This decreases the incidence of the cardholder forgetting their card.
Page 98 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 06800 Last EMV transaction data must be available even if transaction is declined
It is mandatory that the f EMV transaction tag data be retained so it can be printed if
necessary. This applies to all transactions regardless of whether they are approved or
declined.
It is preferred that EMV transaction data be available for every transaction in the batch.
Page 99 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Additional Terminal Addl Capability Indicates the data input and output capabilities of the
9F40
Capabilities terminal.
Allow Fallback Flag Allow Fallback Controls whether fallback to swipe is allowed for a
card type when an error occurs while reading the
chip.
Allow PIN Bypass Allow PIN Bypass Identifies if PIN entry can be bypassed by pressing
the „Enter‟ key without entering a PIN.
Note: Method used to bypass the PIN prompt may
differ based on the PINPad being used.
9F06 Application Identifier (AID) AID Uniquely identifies the application (RID + PIX).
Application Version Number App Ver Num Pri Version number assigned for the application by the
9F09
(Primary) payment system.
Application Version Number App Ver Num Sec (Optional) Secondary version number assigned for
9F09
(Secondary) the application by the payment system.
Certificate Authority Public CAPKx Index Certificate Authority Public Key index number.
Key Index Number
Certificate Authority Public CAPKx Exp Date Certificate Authority Public Key expiry date.
Key Expiry Date
Default AID Label AID Label EMV POS Solution assigned AID label.
Used when both Application Preferred Name (Tag
9F11) and Application Label (Tag 50) are unavailable
or unusable.
Default DDOL (Dynamic Default DDOL Used to construct the Internal Authenticate command
Data Authentication Data if card DDOL is not present on the card.
Object List) Padded with trailing zeroes.
Default TDOL (Transaction Default TDOL Used to construct the TC Hash Value if card TDOL is
Certificate Data Object List) not present on the card.
Padded with trailing zeroes.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
EMV Random Selection Rand Sel Max% Maximum percentage of transactions having a value
Maximum Percentage more than the EMV Random Selection Threshold
that must be sent online.
Numeric, 0 to 99.
EMV Random Selection Rand Sel Target% Percentage of transactions having a value more than
Target Percentage EMV the Random Selection Threshold that must be
sent online.
Numeric, 0 to 99.
EMV Random Selection Rand Sel Thresh The transaction amount which is used to determine
Threshold when to apply random selection to go online.
Numeric, whole numbers.
Merchant Category Code Merch Cat Code Type of business being performed by the merchant‟s
9F15 device, represented according to ISO standard
8583:1993.
Partial Name Selection Flag Partial Select Used to determine whether the terminal„s AID must
exactly match the entire card AID including issuer
suffix or whether only the AID portion must match to
be selected.
Terminal Action Code – TAC Default Identifies conditions where the transaction should be
Default offline declined at the 2nd Generate AC if unable to
go online.
Terminal Action Code – TAC Denial Identifies conditions that cause a transaction to be
Denial offline declined at the 1st Generate AC.
Terminal Action Code – TAC Online Identifies conditions that cause a transaction to be
Online sent for online authorization at the 1st Generate AC.
5F2A Terminal Currency Code Term Currency “840” represents U.S. Dollars.
Terminal Currency Trans Curr Exp Number of digits to the right of the decimal place in
5F36 Exponent the currency.
E.g. If the value is „2‟ then 12345 represents 123.45.
Terminal Floor Limit (EMV) Term Floor Lim The amount indicating the lowest value at which
9F1B
EMV transactions must seek online authorization.
Terminal Type Term Type Indicates the environment of the terminal, its
9F35 communications capability and its operational
control.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Contactless Floor Limit CTLS Floor Limit The number indicating the lowest value at which
contactless EMV transactions must seek
authorization online.
Contactless Transaction CTLS Trans Limit Amounts above this limit cannot be performed as
Limit contactless transactions.
Enable ExpressPay EMV Enable ExPay Flag indicating if ExpressPay contactless EMV is
EMV supported.
Amex Only
9F6D MSD Version Number MSD Version Num Version number assigned by the payment system for
the specific PayPass – Mag Stripe functionality of the
application.
MasterCard Only
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The EIS 1080 EMV request message format is almost identical to the non-EMV request message format.
The “Reference” column identifies the fields that are related to EMV transactions.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The EIS 1080 EMV response message format is almost identical to the non-EMV response message
format. The “Reference” column identifies the fields that are related to EMV transactions.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: Where the card brand requirements determine if a field needs to be included or not:
R – Required
O – Optional
C – Conditional
Notes:
1. If this field is available
2. If an Issuer Script (Tag 71 or Tag 72) was processed
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following sections identify the fields required for EIS EMV transactions.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Service code begins with two (2) or six (6); last Chip Card Read Data at the chip capable terminal
was successful, was not a chip transaction or was unknown.
1
This value should be used when the EMV POS Solution is in fallback due to a chip malfunction.
(i.e. The chip returned an error code like 0x6985)
Service code begins with two or six; last transaction at the chip capable terminal was unsuccessful
chip read.
2
This value should be used when the EMV POS Solution is in fallback due to a chip read error where
no communication with the chip card was possible.
4761739001010010D151220114380448F
Notes:
1. Hex „D‟ (0xD) is used (Instead of “=”) to separate the PAN and expiry date.
2. Hex „F‟ (0xF) is used to right pad the data to an even number of nibbles.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: Request tags should be requested from the kernel prior to building the TLV formatted EMV Tag
Data. This ensures that the values used by the card to build the cryptogram are the same values sent
in the request message. The tags should be sent in the following order; fixed length tags in ascending
order by tag number, followed by variable length tags in ascending order by tag number.
Tag 9F34 is a fixed length tag but it should be included with the variable length tags as it is sometimes
not present on the chip.
Table 42 Group III Version 055 (TLV EMV Tag Data) – Request Tags
Tag Name Description
82 AIP Application Interchange Profile
Indicates the type of financial transaction, represented by the first two digits
9C Transaction Type of ISO 8583:1987 Processing Code.
0x00 = Goods and Services
Transaction Indicates the currency code of the transaction according to ISO 4217.
5F2A
Currency Code 840 = U.S. Dollars
Transaction
9F02 Transaction amount of the transaction.
Amount
Issuer Action Code which specifies the issuer's conditions that cause a
9F0D IAC-Default transaction to be declined when an online authorization was attempted, but
the terminal is unable to process the transaction online.
Issuer Action Code which specifies the issuer's conditions that cause a
9F0E IAC-Denial
transaction to be declined offline.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Terminal Country Indicates the country of the terminal, represented according to ISO 3166.
9F1A
Code o 840 = United States
Indicates the card data input, CVM and security capabilities of the terminal.
Terminal
9F33 This field must match the value for the EMV kernel configuration being used
Capabilities
for the transaction.
Indicates the method by which the PAN was entered (the first two digits of
9F39 POS Entry Mode
the ISO 8583:1987 POS Entry Mode).
Additional Indicates the data input and output capabilities of the terminal.
9F40 Terminal This field must match the EMV kernel configuration being used for the
Capabilities transaction.
Dedicated File Identifies the name of the Dedicated File as described in ISO/IEC 7816-4
84
Name (usually the same as Tag 4F).
Language Two alphabetical characters indicating the language preference used for
5F2D
Preference the transaction (the card can have 1-4 languages).
PAN Sequence
5F34 Identifies and differentiates cards with the same PAN.
Number
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The manufacturer's unique serial number of the device that interacts with
Device Serial the chip card.
DF78
Number
(variable 1 - 20)
The version number of the kernel used to process the chip data in the
Kernel Version
DF79 transaction.
Number
(variable 1 - 32)
Response Tags
Table 43 Group III Version 055 (TLV EMV Tag Data) – Response Tags
Tag Name Description
Response code that indicates the approved/declined status of the
transaction.
Authorization This tag must be provided to the kernel. If this tag is not present in the
8A
Response Code response message, the following values should be used:
o “00” (0x3030) if the transaction was approved
o “05” (0x3035) if the transaction was declined
Contains proprietary Issuer Script commands that must be sent to the card
Issuer Script before the 2nd Generate AC command.
71
Template 1 The Issuer Script must be provided to the EMV kernel for both approved and
declined transactions.
Contains proprietary Issuer Script commands that must be sent to the card
Issuer Script after the 2nd Generate AC command.
72
Template 2 The Issuer Script must be provided to the EMV kernel for both approved and
declined transactions.
This tag contains the ARPC cryptogram. Data must be sent to the card for
Issuer online issuer authentication.
91 Authentication
This tag must be provided to the EMV kernel so that it can be authenticated
Data
by the card.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The EMV request message format is almost identical to the non-EMV request message format. The
“Reference” column identifies the fields that are related to EMV transactions.
The EMV response message format is almost identical to the non-EMV response message format. The
“Reference” column identifies the fields that are related to EMV transactions.
Other fields…
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following sections identify the fields required for Summit EMV transactions.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Request Tags
The request tags should be requested from the kernel prior to building the TLV EMV Tag Data to ensure
that the same values that were used by the card to build the cryptogram are used in the request
message.
The tags should be sent in the order; fixed length tags in ascending order by tag number, followed by
variable length tags in ascending order by tag number.
Indicates the type of financial transaction, represented by the first two digits of
9C Transaction Type ISO 8583:1987 Processing Code.
o 0x00 = Goods and Services
Transaction Indicates the currency code of the transaction according to ISO 4217.
5F2A
Currency Code o 840 = US Dollars
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Issuer Action Code which specifies the issuer's conditions that cause a
9F0D IAC-Default transaction to be declined if online authorization was requested, but the
terminal is unable to process the transaction online.
Issuer Action Code which specifies the issuer's conditions that cause a
9F0E IAC-Denial
transaction to be declined offline.
Issuer Action Code which specifies the issuer's conditions that cause a
9F0F IAC-Online
transaction to be transmitted online.
Terminal Country Indicates the country of the terminal, represented according to ISO 3166.
9F1A
Code o 840 = United States
Indicates the card data input, CVM and security capabilities of the terminal.
Terminal
9F33 This field must match the value for the EMV kernel configuration being used for
Capabilities
the transaction.
Indicates the environment of the terminal, its communications capability and its
operational control.
9F35 Terminal Type
This field must match the value for the EMV kernel configuration being used for
the transaction.
9F36 ATC Application Transaction Counter which is maintained by the chip card.
Unpredictable
9F37 Value to provide variability and uniqueness to the generation of a cryptogram.
Number
Indicates the method by which the PAN was entered, according to the first two
9F39 POS Entry Mode
digits of the ISO 8583:1987 POS Entry Mode.
Additional Indicates the data input and output capabilities of the terminal.
9F40 Terminal This field must match the value for the EMV kernel configuration being used for
Capabilities the transaction.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Language Two alphabetical characters indicating language preference used for the
5F2D
Preference transaction. A card can have 1 - 4 languages.
PAN Sequence
5F34 Identifies and differentiates cards with the same PAN.
Number
Issuer Application Contains proprietary application data for transmission to the issuer in an online
9F10
Data transaction.
The manufacturer's unique serial number of the device that interacts with the
Device Serial chip card.
DF78
Number
(variable 1 - 20)
The version number of the kernel used to process the chip data in the
Kernel Version transaction.
DF79
Number
(variable 1 - 32)
Response Tags
Contains proprietary Issuer Script commands for transmission to the card after
Issuer Script the 2nd Generate AC command.
72
Template 2 The Issuer Script must be provided to the EMV kernel for both approved and
declined transactions.
Data sent to the chip card for online issuer authentication. This tag contains the
Issuer
ARPC cryptogram.
91 Authentication
Data This tag must be provided to the EMV kernel so that it can be authenticated by
the card.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
If the host approves a transaction, the Response Code field in the header record will be set to one of the
following values.
In addition to the reasons non-EMV transactions may be reversed, EMV POS Solution must also reverse
transactions that have been approved by the issuer host but the host response either cannot be
processed by the EMV chip due to an error (e.g. card was prematurely removed) or the EMV chip
declines the transaction (at 2nd Generate AC). In these cases the transaction must be considered a
declined transaction and the host approval must be reversed. This is done by sending an Authorization
Reversal message to the host.
When the card declines the transaction by generating an AAC at the 2nd Generate AC, the Authorization
Reversal sent to the host must contain an updated Group3v55 field containing the field values set when
generating the AAC cryptogram.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following table shows the Reversal Message Format. When performing an Authorization Reversal
transaction, the Settlement Amount field must contain the 1-12-character numeric transaction amount to
be settled. The Settlement Amount must be set to zero to reverse the transaction. The Settlement amount
is submitted in the Secondary Amount field.
When performing an Authorization Reversal transaction, the Transaction Amount field contains the total
sum of all amounts authorized for this transaction (including any and all incremental authorizations).
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
11.5.1 Example #1: EMV Online Purchase using Visa ADVT 01 Card
The following example shows a Visa chip card transaction using a VISA ADVT test card.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: The host response message may contain an Issuer Script (Tag 71 or Tag 72). When present
the Issuer Script must be sent to the EMV chip. A maximum of one Issuer Sript will be returned in a
host response message.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
11.5.2 Example #2: EMV Online Purchase using MasterCard MTIP06 Card
The following example shows a MasterCard chip card transaction using a MasterCard M-TIP test card.
The response for this example also contains an Issuer Script.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following example shows a Visa chip card transaction using a VISA test card.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The Application PAN (Tag 5A) must be printed on the receipt as follows:
Application PAN o PAN must be truncated to remove any trailing hex „F‟s
o The PAN must be masked
Indicator identifying how the card information was obtained.
The receipt Amount line must identify the currency used to process the transaction.
For U.S. dollar transactions “USD$” should be printed.
If the receipt has no Cashback, Surcharge or Tip lines the Amount line must reflect the
Transaction Total Transaction Amount (Tag 9F02).
If the receipt has a Cashback, Surcharge or Tip line the Amount line must be the base
transaction amount and a Total line must be printed showing the total Transaction
Amount (Tag 9F02).
Identifies the Cardholder Verification Method (CVM) must be one of the following:
o PIN VERIFIED – PIN CVM was selected and a PIN was entered
Cardholder o SIGN – Signature CVM selected (a signature line must be printed)
Verification o NONE – NO CVM was used (for attended implementations a signature line
Method must be printed)
The Cardholder Verification must be printed on both the merchant and customer
receipts.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Field Description
Several EMV tag values must be printed on all receipts to assist in problem resolution.
These fields should be printed in the order shown and may be identified by either their
tag name or tag number.
BP 03000 Merchant and Customer receipts should contain the same data
It is recommended that the same information be printed on both the merchant and customer
receipts with the exception of the Merchant/Customer copy indicator printed at the bottom of
the receipt.
The Application Preferred Name (Tag 9F12) must be printed on the receipt if it is stored on the
chip in a character set supported by the printer. Otherwise, the Application Label (Tag 50)
must be printed.
The Card Entry Method must always be printed on the receipt. The text printed must be “Chip”
for an inserted transaction, “Contactless” for a contactless transaction or “Fallback Swipe” for a
fallback transaction.
RQ 07200 Transaction amount and a currency indicator must be printed on the receipt
The receipt must show the transaction total amount as stored in Transaction Amount (Tag
9F02) and include text to identify the currency used for the transaction. For U.S. dollar
transactions “USD$” must be used.
The Cardholder Verification Method must be printed on the receipt. If the CVM is PIN “PIN
VERIFIED” must be printed, if the CVM is signature “SIGN” must be printed and for NO CVM
“NONE” must be printed.
RQ 07400 A signature line is required for attended terminals when CVM is “NO CVM”
Attended devices must print a signature line on the receipt when the CVM selected is
“Signature” or “NO CVM”.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
RQ 07600 Offline Decline EMV receipt data required for all card schemes
Offline Decline EMV data is required on all offline decline receipts regardless of card scheme.
The data fields must be printed in the order shown in the table above and be identified by the
label defined „Receipt Text‟ or “Description” column.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following is an example of a receipt for a credit Purchase transaction approved online by the host.
The CVM used was signature and the Track 2 information was obtained by a contactless tap.
X_________________________________________
Cardholder Signature
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following is an example of a receipt for a credit Purchase transaction approved online by the host.
The CVM used was PIN and the Track 2 information was obtained by reading the EMV chip. Additionally
the Application Preferred Name was not present on the card in a character set supported by the printer.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following is an example of a receipt for a credit transaction approved online by the host. The card
had a chip present Service Code, but there was a chip read error, so the card was swiped and the
transaction was completed as a fallback transaction.
X_________________________________________
Cardholder Signature
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following is an example of a receipt for a credit transaction declined offline by the EMV chip. The
CVM used was Signature and the Track 2 PAN was obtained by reading the EMV chip.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Tag 5F2A:
Tag 5F34: 12
Tag 82: 1234
Tag 95: 1234567890
Tag 9A: 140516
Tag 9C: 115528
Tag 9F02: 90.0417117 Walder
Tag 9F03: 0.00
Tag 9F07: 1234
Tag 9F0D: 1234567890
Tag 9F0E: 1234567890
Tag 9F0F: 1234567890
Tag 9F10: 0123456789ABCDEF
Tag 9F12: VISA CREDIT
Tag 9F1A: 123
Tag 9F26: 0123456789ABCDEF
Tag 9F27: 12
Tag 9F34: 123456
Tag 9F36: 1234
Tag 9F37: 12345678
TAC Default: DC4000A800
TAC Denial: 0010000000
TAC Online: DC4004F800
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
5A PAN xxxxxxxxxxxx1234
82 AIP 5C00
84 Dedicated file name A0000000031010
9A Transaction Date YYMMDD
9F21 Transaction Time HHMMSS
9C Transaction Type 00
5F34 PAN Seq Num 01
5F2A Tran Currency Code 840
9F02 Amount, authorized 000000001000
($10.00)
9F03 Amount, Other 000000000000
9F08 ICC App Version Num 008C
9F09 Term App Version Num 008C
9F1A Term Country Code 840
9F33 Terminal Capabilities F0 00 D8 80 01
9F34 CVM Results 040302
9F35 Terminal Type 22
9F36 ATC 0197
9F37 Unpredictable Number 1234567890
9F0D IAC Denial 0010000000
9F0E IAC Online F040009800
9F0F IAC Default F040008800
TAC Denial 0010000000
TAC Online D84004F800
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
BP 03100 Chip Transaction Report includes data element name and tag number
It is recommended that the Chip Transaction Report show both the data element name and the
tag number (if assigned) for each field.
It is mandatory that the EMV POS Solution includes a Chip Transaction Report that prints the
EMV data element values. At a minimum this report must be available for the last transaction
processed regardless of whether the transaction was approved or declined. It is preferred that
this report be available for all transactions in the current batch.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
It is recommended that the EMV POS Solution include Technical Fallback reports to identify
clerks and PINPads with high Technical Fallback rates. The card brands also monitor fallback
rates so it‟s best to keep them as low as possible.
This report shows Technical Fallback transactions by clerk and will help identify personnel who may need
additional training. The report should only identify the clerks that have a Technical Fallback percentage
over a defined threshold.
Note: This report may be created by a store controller or back office system and contain statistics for
multiple devices. In this case the „TID‟ is not required and should be replaced with a site identifier.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
This report shows Technical Fallback transactions by PINPad and will help identify hardware that requires
servicing. The report should only identify the PINPads that have a Technical Fallback percentage over a
defined threshold percentage.
Note: This report may be created by a store controller or back office system and include statistics for
multiple PINPads. In this case the „TID‟ is not required and should be replaced with a site identifier. If
the report is created for a single terminal ID, the report will generally only list one PINPad unless the
PINPad was replaced during the period being printed.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
AID A00000002501
AID Label American Express Credit
Term Type 22
Term Capability E0B8C8
Addl Capability 7000F8AF
Term Country 840
Merch Cat Code 7411
TAC Default C8 00 00 00 00
TAC Denial 00 00 00 00 00
TAC Online C8 00 00 00 00
Term Country 840
Term Currency 840
Trans Curr Exp 2
Trans Cat Code
App Ver Num Pri 0x0001
App Ver Num Sec N/A
Term Floor Lim 0.00
Rand Sel Thresh 0.00
Rand Sel Max% 99
Rand Sel Target% 99
Partial Select Y
AllowFallback Y
AllowPINBypass N
Acquirer ID 00000
Default DDOL 9F3704
Default TDOL
----- Contactless -----
TAC Default DC 50 84 00 00
TAC Denial 00 00 00 00 00
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
TAC Online C4 00 00 00 00
CTLS Floor Limit 15.00
CTLS Trans Limit 0.00
CTLS Req CVMLim 10.00
Enable ExPay MSD N
Enable ExPay EMV N
----- CAPK -----
CAPK1 Index 03
CAPK1 Exp Date 141231
CAPK2 Index 0E
CAPK2 Exp Date 180631
CAPK3 Index 0F
CAPK3 Exp Date 210631
CAPK4 Index 10
CAPK4 Exp Date 210631
AID A0000001523010
AID Label Discover Credit
Term Type 22
Term Capability E0B8C8
Add Capability 7000F8AF
Term Country 840
Merch Cat Code 7411
TAC Default DC 00 00 20 00
TAC Denial 00 10 00 00 00
TAC Online FC E0 9C F8 00
Term Country 840
Term Currency 840
Trans Curr Exp 2
Trans Cat Code
App Ver Num Pri 0x0001
App Ver Num Sec
Term Floor Limit 0.00
Rand Sel Thresh 0.00
Rand Sel Max 99
Rand Sel Target 99
Partial Select Y
Allow Fallback Y
Allow PIN Bypass N
Acquirer ID 610046
Default DDOL 9F3704
Default TDOL
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
AID A0000000041010
AID Label MasterCard Credit
Term Type 22
Term Capability E0B8C8
Addl Capability 7000F8AF
Term Country 840
Merch Cat Code 7411
TAC Default FC 50 B8 A0 00
TAC Denial 00 00 00 00 00
TAC Online FC 50 B8 F8 00
Term Country 840
Term Currency 840
Trans Curr Exp 2
Trans Cat Code R
App Ver Num 1 0x0002
App Ver Num 2 0x0002
Term Floor Lim 0.00
RandSel Thresh 0.00
RandSel Max 99
RandSel Target 99
Partial Select Y
AllowFallback Y
AllowPINBypass N
Acquirer ID 12097
Default DDOL 9F3704
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
AID A0000000031010
AID Label Visa Credit
Term Type 22
Term Capability E0B8C8
Addl Capability 7000F8AF
Term Country 840
Merch Cat Code 7411
TAC Default DC 40 00 A8 00
TAC Denial 00 10 00 00 00
TAC Online DC 40 04 F8 00
Term Country 840
Term Currency 840
Trans Curr Exp 2
Trans Cat Code
App Ver Num Pri 8C
App Ver Num Sec 96
Term Floor Lim 0.00
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Note: For a definition of the report field names refer to the EMV and Contactless Parameters section
page 102.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
When the length defined for the data object is greater than the length of the actual data, the following
rules apply for each data element:
„n‟ – is right justified and padded with leading hexadecimal zeroes.
„cn‟ – is left justified and padded with trailing hexadecimal „F‟ (0xF).
„a‟, „an‟ or „ans‟ – are left justified and padded with trailing hexadecimal zeroes.
When data is moved from one entity to another (e.g. card to terminal), it will always be passed in order of
high order to low order, regardless of how it is internally stored. The same rule applies when
concatenating data.
Additional
Indicates the data input and output capabilities of the
Terminal Terminal b „9F40‟ 5
terminal.
Capabilities
Amount,
Authorized amount of the transaction (excluding
Authorized Terminal b „81‟ 6
adjustments).
(Binary)
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Amount,
Authorized amount expressed in the reference
Reference Terminal b „9F3A‟ 4
currency.
Currency
Application
Issuer or payment system specified data relating to
Discretionary ICC b „9F05‟ 1-32
the application.
Data
Application n6
Date from which the application may be used. ICC „5F25‟ 6
Effective Date YYMMDD
Application n6
Date after which application expires. ICC „5F24‟ 3
Expiration Date YYMMDD
Application File Indicates the location (SFI, range of records) of the <=
ICC Var. „94‟
Locator (AFL) AEFs related to a given application 252
Application
Identifies the application as described in ISO/IEC
Identifier (AID) – ICC b „4F‟ 5-16
7816-5.
ICC
Application
Identifies the application as described in ISO/IEC
Identifier (AID) – Terminal b „9F06‟ 5-16
7816-5.
Terminal
Application
Indicates the capabilities of the card to support
Interchange ICC b „82‟ 2
specific functions in the application.
Profile
Application
Preferred mnemonic associated with the AID. ICC an 1-16 „9F12‟ 1-16
Preferred Name
Application
cn
Primary Account Valid cardholder account number. ICC „5A‟ <= 10
<= 19
Number (PAN)
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Application
Primary Account
Identifies and differentiates cards with the same
Number (PAN) ICC n2 „5F34‟ 1
PAN.
Sequence
Number
Application
Counter maintained by the application in the ICC
Transaction ICC b „9F36‟ 2
(incrementing the ATC is managed by the ICC).
Counter (ATC)
Application
Version number assigned by the payment system for
Version Number ICC b „9F08‟ 2
the application.
(ICC)
Application
Version number assigned by the payment system for
Version Number Terminal b „9F09‟ 2
the application.
(Terminal)
Authorization Issuer /
Code that defines the disposition of a message. an 2 „8A‟ 2
Response Code Terminal
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Authorization
Response Cryptogram generated by the issuer and used by the
Issuer b N/A 4 or 8
Cryptogram card to verify that the response came from the issuer
(ARPC)
Card CVM Limit If present, indicates that when card and reader
(Visa) currencies match and a contactless transaction ICC n 12 „9F6B‟ 6
exceeds this value, a CVM is required by the Card.
Card Risk
Management List of data objects (tag and length) to be passed to <=
ICC b „8C‟
Data Object List the ICC in the 1st GENERATE AC command. 252
1 (CDOL1)
Card Risk
Management List of data objects (tag and length) to be passed to <=
ICC b „8D‟
Data Object List the ICC in the 2nd GENERATE AC command. 252
2 (CDOL2)
Cardholder
Indicates cardholder name according to ISO 7813. ICC ans 2-26 „5F20‟ 2-26
Name
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Cardholder
Verification Identifies a method of verification of the cardholder <=
ICC b „8E‟
Method (CVM) supported by the application. 252
List
Cardholder
Verification
Indicates the results of the last CVM performed. Terminal b „9F34‟ 3
Method (CVM)
Results
Certification
Value of the exponent part of the Certification
Authority Public Terminal b -- 1 or 3
Authority Public Key
Key Exponent
Certification
Identifies the certification authority's public key in
Authority Public ICC b „8F‟ 1
conjunction with the RID
Key Index
Certification
Identifies the certification authority's public key in
Authority Public Terminal b „9F22‟ 1
conjunction with the RID
Key Index
Certification NCA
Value of the modulus part of the Certification
Authority Public Terminal B -- (<=
Authority Public Key
Key Modulus 248)
Command
Identifies the data field of a command message Terminal b „83‟ var.
Template
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Default Dynamic
Data DDOL to be used for constructing the INTERNAL
Authentication AUTHENTICATE command if the DDOL in the card Terminal b -- var.
Data Object List is not present
(DDOL)
Default
Transaction
TDOL to be used for generating the TC Hash Value if
Certificate Data Terminal b -- var.
the TDOL in the card is not present
Object List
(TDOL)
Directory
Identifies the name of a DF associated with a
Definition File ICC b „9D‟ 5 – 16
directory
(DDF) Name
Directory var.
Issuer discretionary part of the directory according to
Discretionary ICC var. „73‟ <=
ISO/IEC 7816-5
Template 252
Dynamic Data
List of data objects (tag and length) to be passed to
Authentication <=
the ICC in the INTERNAL AUTHENTICATE ICC b „9F49‟
Data Object List 252
command
(DDOL)
Enciphered
Personal Transaction PIN enciphered at the PINPad for online
Identification verification or for offline verification if the PINPad and Terminal b -- 8
Number (PIN) IFD are not a single integrated device
Data
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
File Control
Information
<=
(FCI) Issuer Issuer discretionary part of the FCI ICC var. „BF0C‟
222
Discretionary
Data
File Control
Identifies the data object proprietary to this
Information
specification in the FCI template according to ICC var. „A5‟ var.
(FCI) Proprietary
ISO/IEC 7816-4
Template
File Control
Identifies the FCI template according to ISO/IEC <=
Information ICC var. „6F‟
7816-4 252
(FCI) Template
PayPass Third
The PayPass Third Party Data contains proprietary var 5 -
Party Data ICC b „9F6E‟
information from a third party. 32
(MasterCard)
Integrated
Circuit Card
(ICC) PIN ICC PIN Encipherment Public Key certified by the
ICC b „9F2D‟ NI
Encipherment issuer
Public Key
Certificate
Integrated
Circuit Card
(ICC) PIN ICC PIN Encipherment Public Key Exponent used for
ICC b „9F2E‟ 1 or 3
Encipherment PIN encipherment
Public Key
Exponent
Integrated
Circuit Card
NPE −
(ICC) PIN Remaining digits of the ICC PIN Encipherment Public
ICC b „9F2F‟ NI +
Encipherment Key Modulus
42
Public Key
Exponent
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Integrated
Circuit Card
(ICC) PIN
ICC Public Key certified by the issuer ICC b „9F46‟ NI
Encipherment
Public Key
Remainder
Integrated
Circuit Card ICC Public Key Exponent used for the verification of
ICC b „9F47‟ 1 to 3
(ICC) Public Key the Signed Dynamic Application Data
Certificate
Integrated
NPE −
Circuit Card
Remaining digits of the ICC Public Key Modulus ICC b „9F48‟ NI +
(ICC) Public Key
42
Remainder
Interface Device
Unique and permanent serial number assigned to the
(IFD) Serial Terminal an 8 „9F1E‟ 8
IFD by the manufacturer.
Number
Issuer
Authentication Data sent to the card for online issuer authentication. Issuer b „91‟ 8-16
Data
Issuer Code Indicates the code table according to ISO 8859 for
ICC n2 „9F11‟ 1
Table Index displaying the Application Preferred Name.
Issuer Country
Issuer Country Code (alpha 3 format) ICC a3 „5F56‟ 3
Code (Alpha 3)
Issuer
Issuer Identification Number – this tag is used as part
Identification
of the Candidate List editing for U.S. Common Debit ICC b „42‟ 3
Number (IIN or
AIDs
BIN)
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Issuer Public
Issuer public key certified by a certification authority ICC b „90‟ NCA
Key Certificate
NI −
Issuer Public
Remaining digits of the Issuer Public Key Modulus ICC b „92‟ NCA +
Key Remainder
36
Issuer Script
Identification of the Issuer Script Issuer b „9F18‟ 4
Identifier
Issuer Script
Indicates the result of the chip script processing. Terminal b „9F5B‟ var.
Results
Last Online
Application
Transaction ATC value of the last transaction that went online ICC b „9F13‟ 2
Counter (ATC)
Register
Mag Stripe
Version number assigned by the payment system for
Application
the specific PayPass – Mag Stripe functionality of the ICC B „9F6C‟ 2
Version Number
application.
(MasterCard)
Mag Stripe
Version number assigned by the payment system for
Application
the specific PayPass – Mag Stripe functionality of the Terminal B „9F6D‟ 2
Version Number
application.
(MasterCard)
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Maximum Target
Percentage to
Value used in terminal risk management for random
be used for Terminal -- -- --
transaction selection.
Biased Random
Selection
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Processing
Contains a list of terminal resident data objects (tags
Options Data
and lengths) needed by the ICC in processing the ICC b „9F38‟ var.
Object List
GET PROCESSING OPTIONS command.
(PDOL)
Service Code Service Code as defined on Track 1 and Track 2 ICC n3 „5F30‟ 2
Target
Percentage to
Value used in terminal risk management for random
be used for Terminal -- -- --
transaction selection.
Random
Selection
Terminal
Indicates the transaction amount limit for the related
Contactless
AID above which transactions must be authorized Terminal n 12 -- 6
Floor Limit (Visa,
online.
MasterCard)
Terminal
Indicates the transaction amount limit for the related
Contactless
AID above which the selection of the AID on the card
Transaction Terminal n 12 -- 6
is not allowed. It is permitted to attempt the
Limit (Visa,
transaction over another interface.
MasterCard)
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Terminal
Contactless
Indicates for the related AID if the Terminal
Floor Exceeded Terminal -- -- --
Contactless Floor Limit is exceeded.
Flag
(MasterCard)
Terminal
Contactless
Transaction Indicates for the related AID if the Terminal
Terminal -- -- --
Limit Exceeded Contactless Transaction Limit is exceeded.
Flag
(MasterCard)
Terminal CVM
Required Limit Indicates for the related AID if the Terminal CVM
Terminal -- -- --
Exceeded Flag Required Limit is exceeded.
(MasterCard)
Terminal Risk
Application-specific value used by the card for risk
Management Terminal b „9F1D‟ 1-8
management purposes.
Data
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Terminal
Status of the different functions as seen from the
Verification Terminal b „95‟ 5
terminal.
Results
Threshold Value
for Biased Value used in terminal risk management for random
Terminal -- -- --
Random transaction selection.
Selection
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Track 1
Discretionary part of track 1 according to ISO/IEC
Discretionary ICC an „9F1F‟ var.
7813.
Data
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Transaction
Result of a hash function specified in Book 2, Annex
Certificate (TC) Terminal b „98‟ 20
B3.1 of the EMVCo Specifications.
Hash Value
Transaction
var.
Certificate Data List of data objects (tag and length) to be used by the
ICC b „97‟ <=
Object List terminal in generating the TC Hash Value
252
(TDOL)
Transaction n6
Local date that the transaction was authorized. Terminal „9A‟ 3
Date YYMMDD
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Transaction
Personal
Data entered by the cardholder for the purpose of the
Identification Terminal b „99‟ var.
PIN verification
Number (PIN)
Data
Transaction
Counter maintained by the terminal that is
Sequence Terminal n 4-8 „9F41‟ 2–4
incremented by one for each transaction
Counter
Transaction
Status Indicates the functions performed in a transaction. Terminal b „9B‟ 2
Information
Transaction n6
Local time that the transaction was authorized. Terminal „9F21‟ 3
Time HHMMSS
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
VLP Single
Transaction ICC n12 „9F78‟ 6
Limit (Visa)
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
T0 „6x‟ TB1 to TC1 present; x indicates the number of historical bytes present
TC1 „00‟ to „FF‟ Indicates the amount of extra guard time required
T0 „Ex‟ TB1 to TD1 present; x indicates the number of historical bytes present
TC1 „00‟ to „FF‟ Indicates the amount of extra guard time required.
TD1 „81‟ TA2, TB2 and TC2 absent; TD2 present; T=1 to be used
TD2 „31‟ TA3 and TB3 present; TC3 and TD3 absent; T=1 to be used
Returns IFSI, which indicates initial value for information field size for ICC
TA3 „10‟ to „FE‟
and IFSC of 16-254 bytes
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The following Card Verification Results (CVR) definition is as per the EMVCo CCD specifications.
Specific card brand definitions may differ.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Table 85 Terminal Verification Results (Tag 95) – Byte 4 (Terminal Risk Management)
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 Transaction exceeds floor limit.
1 Lower consecutive off-line limit exceeded.
1 Upper consecutive off-line limit exceeded.
1 Transaction selected randomly for online processing.
1 Merchant forced transaction online.
0 Reserved for future use
0 Reserved for future use
0 Reserved for future use
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Where:
CLA – Class Byte of the Command Message
INS – Instruction Byte of Command Message
P1 – Parameter 1
P2 – Parameter 2
Lc – Length of command Data field
Data – Command data
Le – Maximum length of expected data returned (when set to zero - 256 bytes may be returned)
Note: The CLA, INS, P, P2, Lc, Data and Le values have been provided for each of the commands
described in the sections below.
Body Trailer
Where:
Data – Response Data
SW1 – Status Byte 1
SW2 – Status Byte 2
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The APPLICATION BLOCK command is a post-issuance command that invalidates the currently selected
application.
Following the successful completion of an APPLICATION BLOCK command:
An invalidated application will return the status bytes SW1 SW2 = '6283' („Selected file
invalidated‟) in response to a SELECT command.
An invalidated application will return only an Application Authentication Cryptogram (AAC) as AC
in response to a GENERATE AC command.
CLA '8C' or '84'; coding according to the secure messaging specified in Book 2
INS '1E'
Le Not present
CLA '8C' or '84'; coding according to the secure messaging specified in Book 2
INS '18'
Message Authentication Code (MAC) data component; coding according to the secure
Data
messaging specified in Book 2
Le Not present
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The CARD BLOCK command is a post-issuance command that permanently disables all applications in
the ICC. This command will disable all applications in the ICC, including applications that may be
selected implicitly. Following the successful completion of a CARD BLOCK command, all subsequent
SELECT commands will return the status bytes SW1 SW2 = '6A81' („Function not supported‟) and
perform no other action.
CLA '8C' or '84'; coding according to the secure messaging specified in Book 2
INS '16'
Message Authentication Code (MAC) data component; coding according to the secure
Data
messaging specified in Book 2
Le Not present
The EXTERNAL AUTHENTICATE command is used to request the ICC to verify a cryptogram returned
by the issuer after going online.
CLA '00'
INS '82'
P1 '00'
P2 '00'
Lc 8-16
Le Not present
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
15.3.5 Generate AC
The GENERATE AC command sends transaction-related data to the ICC, which computes and returns a
cryptogram.
CLA '80'
INS 'AE'
P2 '00'
Lc Var.
Le '00'
The data field of the response message consists of a TLV coded data object. The coding of the data
object will be according to one of the following two formats.
Format 1 – The data object returned in the response message is a primitive data object with tag
equal to '80'. The value field consists of the concatenation without delimiters (tag and length) of
the value fields of the data objects specified in the table below:
Value Presence
Cryptogram Information Data (CID) M
Application Transaction Counter (ATC) M
Application Cryptogram (AC) M
Issuer Application Data (IAD) O
Format 2 – The data object returned in the response message is a constructed data object with
tag equal to '77'. The value field may contain several TLV coded objects, but will always include
the Cryptogram Information Data, the Application Transaction Counter and the cryptogram
computed by the ICC (either an AC or a proprietary cryptogram). The utilization and
interpretation of proprietary data objects which may be included in this response message are
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
outside the scope of these specifications. Format 2 will be used if the response is being
returned in a signature as specified for the CDA function described in section 6.6 of Book 2. The
required data elements for the response are shown in the appropriate tables in that section.
The GET CHALLENGE command is used to obtain an unpredictable number from the ICC for use in a
security-related procedure. The challenge will be valid only for the next issued command.
CLA '00'
INS '84'
P1 '00'
P2 '00'
Lc Not present
Le '00'
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The GET DATA command is used to retrieve a primitive data object not encapsulated in a record within
the current application. The usage of the GET DATA command is limited to the retrieval of the following
primitive data objects:
ATC (Tag 9F36)
Last Online ATC Register (Tag 9F13)
PIN Try Counter (Tag 9F17)
Log Format (Tag 9F4F)
CLA '80'
INS 'CA'
Lc Not present
Le '00'
The GET PROCESSING OPTIONS command initiates the transaction within the ICC. The ICC returns
the Application Interchange Profile (AIP) and the Application File Locator (AFL).
CLA '80'
INS 'A8'
P1 '00'
P2 '00'
Lc Var.
Le '00'
The coding of the data object will be according to one of the following two formats.
Format 1 – The data object returned in the response message is a primitive data object with tag
equal to '80'. The value field consists of the concatenation without delimiters (tag and length) of
the value fields of the AIP and the AFL. The coding of the data object returned in the response
message is shown below:
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Format 2 – The data object returned in the response message is a constructed data object with
tag equal to '77'. The value field may contain several TLV coded objects, but will always include
the AIP and the AFL. The utilization and interpretation of proprietary data objects which may be
included in this response message are outside the scope of these specifications.
- The AIP specifies the application functions that are supported by the application in the ICC.
- The AFL consists of the list, without delimiters, of files and related records for the currently
selected application.
CLA '00'
INS '88'
P1 '00'
P2 '00'
Le '00'
The ICC returns the Signed Dynamic Application Data to the terminal.
The data field of the response message consists of a TLV coded data object. The coding of the data
object will be according to one of the following two formats.
Format 1 – The data object returned in the response message is a primitive data object with tag
equal to '80'. The value field consists of the value field of the Signed Dynamic Application Data.
Format 2 – The data object returned in the response message is a constructed data object with
tag equal to '77'. The value field may contain several TLV coded objects, but will always include
the Signed Dynamic Application Data. The utilization and interpretation of proprietary data
objects which may be included in this response message are outside the scope of these
specifications.
Note: To ensure that the INTERNAL AUTHENTICATE command response data length is within the
256 byte limit, the length of the Signed Dynamic Application Data plus the length of the TLV encoded
optional data (if present) will remain within the limits as specified in Book 2 Annex D.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The PIN CHANGE/UNBLOCK command is a post-issuance command. Its purpose is to provide the
issuer the capability either to unblock the PIN or to simultaneously change and unblock the reference
(offline) PIN.
CLA '8C' or '84'; coding according to the secure messaging specified in Book 2
INS '24'
P1 '00'
'00' – Unblock the reference (offline) PIN by resetting the PIN Try Counter to the PIN Try Limit.
There is no PIN update, since the PIN CHANGE/UNBLOCK command does not contain a new
P2 PIN value
'01' – reserved for each payment scheme
'02' – reserved for each payment scheme
Enciphered PIN data component, if present and MAC data component; coding
Data
(according to the secure messaging specified in Book 2)
Le Not present
Upon successful completion of the command, the card will perform the following functions:
The value of the PIN Try Counter will be reset to the value of the PIN Try Limit
If requested, the value of the reference PIN will be set to the new PIN value
If PIN data is transmitted in the command it will be enciphered for confidentiality.
Note: The reference (offline) PIN, stored within the card, is the PIN associated with the application and
is the one the card uses to check the Transaction PIN Data transmitted within the VERIFY command.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
The READ RECORD command reads a file record in a linear file. The response from the ICC consists of
returning the record.
CLA '00'
INS 'B2'
P1 Record Number
Lc Not present
Le '00'
The data field of the of a successful READ RECORD command response message contains the record
read. For SFIs in the range 1-10, the record is a TLV constructed data object and is coded as shown
below:
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
15.3.12 Select
The SELECT command is used to select the ICC PSE, DDF or ADF corresponding to the submitted file
name or AID.
CLA '00'
INS 'A4'
Lc '05' – '10'
Le '00'
The data field of the response message contains the FCI specific to the selected PSE, DDF or ADF. No
additional data elements will be present in the FCI template (tag '6F') returned in the SELECT command
response other than those contained in template 'BF0C'. Data elements present in templates '6F' and/or
'BF0C' that are not expected or understood by the terminal because the terminal does not support any
issuer-specific processing will be ignored.
Table 107 SELECT Response Message Data Field (FCI) of the PSE
Tag Value Presence
'6F' FCI Template M
'84' DF Name M
'A5' FCI Proprietary Template M
'88' SFI of the Directory Elementary File M
'5F2D' Language Preference O
'9F11' Issuer Code Table Index O
'BF0C' FCI Issuer Discretionary Data O
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Table 108 SELECT Response Message Data Field (FCI) of the DDF
Tag Value Presence
'6F' FCI Template M
'84' DF Name M
'A5' FCI Proprietary Template M
'88' SFI of the Directory Elementary File M
'BF0C' FCI Issuer Discretionary Data O
1 or more additional
proprietary data
elements from an
'XXXX' application provider,
(Tag constructed issuer or IC card O
according to Book
3, Annex B) supplier or
EMV-defined tags that
are specifically allocated
to 'BF0C'
Table 109 SELECT Response Message Data Field (FCI) of the ADF
Tag Value Presence
'6F' FCI Template M
'84' DF Name M
'A5' FCI Proprietary Template M
'50' Application Label M
'87' Application Priority Indicator O
'9F38' PDOL O
'5F2D' Language Preference O
'9F11' Issuer Code Table Index O
'9F12' Application Preferred Name O
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
15.3.13 Verify
The VERIFY command initiates in the ICC the comparison of the Transaction PIN Data sent in the data
field of the command with the reference PIN data associated with the application. The manner in which
the comparison is performed is proprietary to the application in the ICC.
The VERIFY command applies when the Cardholder Verification Method (CVM) chosen from the CVM
List is an offline PIN.
CLA '00'
INS '20'
P1 '00'
Lc Var.
Le Not present
Where:
C = Control Field (4 bits „0010‟)
N = Length of PIN (4 to 12) (4 bits)
P = PIN Digit (4 bits)
F = Hex „F‟ for padding (4 bits „1111‟)
Page 202 of 230
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
61 xx xx=the number of response bytes still available. Use GET_RESPONSE (C0) to access this data.
62 00 No information given
63 00 No information given
63 Cx Counter value is x
64 00 Execution error
65 00 No information given
66 xx Security error
67 xx Check error
68 00 No information given
69 00 No information given
6A 00 No information given
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
6A 88 Referenced data or reference data not found (exact meaning depending on the command)
6C xx Wrong L field; SW2 encodes the exact number of available data bytes
6F 00 No precise diagnosis
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Dec Bin Hex Char Dec Bin Hex Char Dec Bin Hex Char
00 00000000 00 NUL 44 00101100 2C , 88 01011000 58 X
01 00000001 01 SOH 45 00101101 2D - 89 01011001 59 Y
02 00000010 02 STX 46 00101110 2E . 90 01011010 5A Z
03 00000011 03 ETX 47 00101111 2F / 91 01011011 5B [
04 00000100 04 EOT 48 00110000 30 0 92 01011100 5C \
05 00000101 05 ENQ 49 00110001 31 1 93 01011101 5D ]
06 00000110 06 ACK 50 00110010 32 2 94 01011110 5E ^
07 00000111 07 BEL 51 00110011 33 3 95 01011111 5F _
08 00001000 08 BS 52 00110100 34 4 96 01100000 60 `
09 00001001 09 HT 53 00110101 35 5 97 01100001 61 a
10 00001010 0A LF 54 00110110 36 6 98 01100010 62 b
11 00001011 0B VT 55 00110111 37 7 99 01100011 63 c
12 00001100 0C FF 56 00111000 38 8 100 01100100 64 d
13 00001101 0D CR 57 00111001 39 9 101 01100101 65 e
14 00001110 0E SO 58 00111010 3A : 102 01100110 66 f
15 00001111 0F SI 59 00111011 3B ; 103 01100111 67 g
16 00010000 10 DLE 60 00111100 3C < 104 01101000 68 h
17 00010001 11 DC1 61 00111101 3D = 105 01101001 69 i
18 00010010 12 DC2 62 00111110 3E > 106 01101010 6A j
19 00010011 13 DC3 63 00111111 3F ? 107 01101011 6B k
20 00010100 14 DC4 64 01000000 40 @ 108 01101100 6C l
21 00010101 15 NAK 65 01000001 41 A 109 01101101 6D m
22 00010110 16 SYM 66 01000010 42 B 110 01101110 6E n
23 00010111 17 ETB 67 01000011 43 C 111 01101111 6F o
24 00011000 18 CAN 68 01000100 44 D 112 01110000 70 p
25 00011001 19 EM 69 01000101 45 E 113 01110001 71 q
26 00011010 1A SUB 70 01000110 46 F 114 01110010 72 r
27 00011011 1B ESC 71 01000111 47 G 115 01110011 73 s
28 00011100 1C FS 72 01001000 48 H 116 01110100 74 t
29 00011101 1D GS 73 01001001 49 I 117 01110101 75 u
30 00011110 1E RS 74 01001010 4A J 118 01110110 76 v
31 00011111 1F US 75 01001011 4B K 119 01110111 77 w
32 00100000 20 SP 76 01001100 4C L 120 01111000 78 x
33 00100001 21 ! 77 01001101 4D M 121 01111001 79 y
34 00100010 22 " 78 01001110 4E N 122 01111010 7A z
35 00100011 23 # 79 01001111 4F O 123 01111011 7B {
36 00100100 24 $ 80 01010000 50 P 124 01111100 7C |
37 00100101 25 % 81 01010001 51 Q 125 01111101 7D }
38 00100110 26 & 82 01010010 52 R 126 01111110 7E ~
39 00100111 27 ' 83 01010011 53 S 127 01111111 7F DEL
40 00101000 28 ( 84 01010100 54 T
41 00101001 29 ) 85 01010101 55 U
42 00101010 2A * 86 01010110 56 V
43 00101011 2B + 87 01010111 57 W
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Application Default Action – Visa and Amex proprietary data element indicating
issuer-specified action for the ICC to take for certain exception conditions.
ADA This data element is required for Issuer Authentication checks, offline PIN verification
checks, new card checks and Issuer Script processing checks. If this data element is
not present, the ICC behaves as if the value is all zeroes.
Application Dedicated File – The ADF contains application specific data for a
ADF
specific AID (also see DF)
Acquirer Device Validation Tool Kit – Tool kit used for end-to-end Visa contact
transaction certification of deployed EMV devices. ADVT is the Visa brand level
ADVT
certification which follows the device‟s previous EMV level 1 (Hardware) and EMV
level 2 (EMV Kernel) certifications completed by the device vendor.
Application File Locator – AFLs identify the location and number of application
records that contain data that must be read by the CAD in order to conduct a
AFL
transaction. In addition to the location and number of records the AFL also indicates
which data elements have been signed by the issuer as part of the SDA process.
Application Identifier – AIDs are used to identify the scheme and type of
application(s) present on an ICC. The AID is made up of two fields, the Registered ID
(RID) which identifies the scheme and the Proprietary Application Identifier Extension
AID (PIX) which identifies the application type. ICCs and CADs use AIDs to determine
which applications are mutually supported, as both the ICC and the CAD must
support an AID to initiate a transaction. Both ICCs and CADs may support multiple
AIDs.
Application Interchange Profile – The AIP contains details of the ICC‟s capabilities
AIP to support specific security functions in the application (e.g. SDA/DDA/CDA,
Cardholder Verification etc.).
Application Protocol Data Unit – APDU is the command message sent from the
APDU interface device (in the CAD) and the response message returned by the ICC to the
interface device.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Authorization Response Code – The ARC is a two digit code generated by the
issuer and sent to the CAD to approve, decline or refer a transaction. The most
commonly used ARC consists of online approval (00), online decline (05) and referral
(01). The CAD is prohibited to alter the ARC from the issuer. The CAD is allowed to
generate an ARC in the following exception conditions:
ARC
Y1 – Offline Approved
Z1 – Offline declined
Y3 – Unable to go online (offline approved)
Z3 – Unable to go online (offline declined)
Answer To Reset – An ATR is sent from the ICC to the CAD (after the supply
ATR voltage, the clock and reset signal) containing various information related to the
transmission protocol supported by the ICC.
Application Usage Control – The AUC details the ICC‟s processing restrictions.
AUC These restrictions relate to the geographical settings (domestic vs. international) and
the support for specific services (e.g. cash, cash back, goods and services, etc.).
BCD Binary Coded Decimal – A code for representing decimal digits in a binary format.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Bank Identification Number – The BIN is the first six digits of the PAN and is used
st
BIN to identify the issuer of the card. It is comprised of a Major Industry Identifier (MII) (1
digit) and an Issuer Identifier (up to 5 digits).
Card Action Analysis – CAA involves the analysis of the Card Risk Management
(CRM) results and responding to the CAD with an appropriate cryptogram (TC, AAC
CAA
or ARQC). CAA is performed by the ICC after the ICC completes the CRM process
and sets the CVR.
Card Acceptance Device – Any device capable of reading and processing data from
CAD a magnetic stripe, ICC (contact or contactless interfaces) or manual entry keyboard
for the purpose of performing a payment transaction.
Candidate List – The list of AIDs that are mutually supported by the ICC and EMV
Candidate List
POS Solution.
Certificate Authority Public Key – RSA Public key assigned by a card brand used
CAPK
by an EMV kernel to decrypt chip information signed with a card brand private key.
Certificate Authority Public Key File – A file containing the current card brand
CAPK File assigned RSA public keys, key indexes and expiry dates. The file is downloaded to
the EMV kernel.
Cardholder Activated Terminal – CAT are typically unattended CADs that accept
various payment cards. This type of CAD is frequently installed at rail ticketing
stations, petrol stations, toll roads, parking garages and other merchant locations.
There are four types of cardholder-activated terminals:
Automated Dispensing Machines / Level 1.
CAT Self-Service Terminals / Level 2.
Limited Amount Terminals / Level 3.
In-flight Commerce (IFC) Terminals / Level 4.
The CAT requirements specify related transaction liability for each CAT type and
maximum allowable transaction amounts as well as authorization,
clearing, chargeback and addendum record requirements.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Common Core Definitions – CCD defines a common data element content and
format for sending ICC information between an ICC and the issuer via the acquirer.
CCD
When CCD is incorporated into an ICC specification, issuers of multi-branded cards
can achieve the benefits of the common issuer support system.
Contactless Device Evaluation Toolkit – Tool kit used for Visa contactless
CDET
transaction certification of deployed EMV devices.
Card Data Object List 1 – CDOL1 is the list of TLV data objects (tags / lengths)
personalized on the ICC that are used for the generation of the first cryptogram. The
CDOL1
CAD will send these data object values to the ICC with the 1st Generate AC
command.
Card Data Object List 2 – CDOL2 is the list of TLV data objects (tags / lengths)
personalized on to the ICC that are used for the generation of the final cryptogram.
CDOL2
The CAD will send these data object values to the ICC with the Second Generate AC
command.
Card Issuer Actions Codes – CIAC specifies the ICC conditions that cause a
transaction to be approved off-line, sent on-line or declined if the CAD cannot go on-
CIAC
line. During card risk management the ICC makes its decision by comparing the CVR
with the CIAC. There are three groups of CIAC (Denial, Online and Default).
Cryptogram Information Data – CID Indicates the type of cryptogram (AAC, TC and
CID ARQC) and the actions to be performed by the CAD (e.g. Advice required and the
reason; such as Service not allowed, PTL exceeded etc.).
Class Byte of the Command Message – CLA is the first byte of five consecutive
CLA bytes that create the header in the C-APDU. For this purpose the CLA serves as the
instruction class and may take any value except 'FF'.
Card Not Present – CNP transactions are transactions that are conducted over an
CNP open network (e.g. telephone, Internet, mail order) where a physical card is not
present and therefore the MSD or ICC data can‟t be obtained and used.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Card Production Life Cycle – CPLC is a Visa proprietary data element that provides
auditability for the ICC through the use of card life cycle data. It is composed of
several data elements (e.g. Operating system identifier, personalization machine and
CPLC date etc.)
CPLC is only used with the VIS 1.4 specs (it has been deleted from the VIS 1.5
specs) and is only supported on Global platform cards.
Certificate Revocation List – A list of certificates that have been revoked and
CRL
therefore, should no longer be trusted or used.
Card Status Update – CSU contains data sent to the ICC to indicate whether the
issuer has approved or declined a transaction and to identify actions required by the
CSU
issuer (e.g. update counters). CSU is transmitted to the card in the Issuer
Authentication Data.
Card Transaction Qualifiers – A card value defining what actions will take place at
CTQ
the POS when a transaction occurs.
Cumulative Total Transaction Amount Upper Limit – Visa proprietary tag 9F5C
specifying the maximum total amount of offline transactions in the designated
CTTAUL
currency or designated and secondary currency allowed for the card application
before a transaction is declined if an online transaction is unable to be performed.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Card Verification Code 1 –The name given to the three digit field coded on the MSR
CVC – 1 of a MasterCard branded card. The value is generated using TDES from the PAN,
expiry date and Service Code.
Card Verification Code 2 – The name given to the three digit field printed on the
signature panel of a MasterCard branded card. The value is generated using TDES
CVC – 2
from the PAN, Expiry Date and Service Code „000‟. CVC2 is used for CNP to prove
the presence of a legitimate card.
Card Verification Code 3 – Also referred to as dynamic CVC. CVC3 is the process
of generating a two byte cryptogram returned by the card in the response to the
CVC – 3
COMPUTE CRYPTOGRAPHIC CHECKSUM command. CVC3 is used by
MasterCard for the security of the PayPass contactless MSD application.
Cryptogram Version Number – Informs the issuer about the algorithm and data
CVN used for the Application Cryptogram computation during online transactions (in the
authorization request) and after transaction completion in the clearing record.
Card Verification Value 1 – Name given to the three digit field coded on the MSR of
CVV – 1 a Visa branded card. The value is generated using TDES from the PAN, expiry date
and Service Code.
Card Verification Value 2 – Name given to the three digit field printed on the
signature panel of a Visa branded card. The value is generated using TDES from the
CVV – 2
PAN, Expiry Date and Service Code. CVV2 is used for CNP to prove the presence of
a legitimate card.
DDF Directory Dedicated File – An entry point to other ADFs or DDFs (also see DF).
Dynamic Data Object List – List of data objects (tags and lengths) that are
personalized on the ICC and used to generate the ICC‟s RSA digital signature during
DDOL
the DDA or CDA process. The CAD will send the required data object values with the
Internal Authenticate command.
Developer – Generic term used within this document to identify anyone (merchant,
Developer
integrator, developer, etc…) implementing and certifying and EMV POS Solution.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Dedicated File – A dedicated file (DF) in EMV follows the ISO/IEC 7816-4 definition.
The DF contains an FCI and is mapped onto an ADF or a DDF. It may give access to
DF
Elementary Files (EF) and DFs. The DF at the highest level of the card is the Master
File (MF).
Derivation Key Index/Key Derivation Index – Two digit hexadecimal field located
DKI/KDI on the card issuer host to identify a set of Master DES keys used to generate
cryptograms.
Data Object List – A flexible list of data elements built be the CAD and passed to the
ICC under the ICC‟s direction. To minimize processing within the ICC, such a list is
DOL not TLV-encoded but is a single constructed field built by concatenating several data
elements together. Since the elements of the constructed field are not TLV-encoded,
it is imperative that the ICC knows the format of this field when the data is received.
Derived Unique Key Per Transaction – A key management scheme in which for
DUKPT
every transaction a unique key is used which is derived from a fixed key.
Elementary File – An elementary file (EF) in EMV follows the ISO/IEC 7816-4
definition. The EF is accessed through a specific DF and consists of one or more
EF
records (up to 256 bytes for each record), identifying where the data is stored. An EF
is never used as an entry point to another file.
Europay, MasterCard, Visa – The Integrated Circuit Card (ICC) Specification for
EMV Payment Systems defines the functionality of credit/debit transaction processing at
the CAD level to ensure correct operation and interoperability.
EMVCo – The name of the non-profit organization formed in 1999 between Europay,
EMVCo
MasterCard and Visa that maintains the EMV specifications.
EMV POS Solution – Generic term used within this document to describe any
EMV POS Solution
integrated or standalone EMV implementation being developed and certified.
EMV Transaction Type – Type of transaction being performed (e.g. Sale, Return,
EMV Transaction Type
etc.).
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Easy Test Cards (MasterCard test card suite) – Test cards used for MasterCard
TIP processing. MasterCard ETEC is suitable for any kind of terminal (POS, ATM,
ETEC integrated-POS and others). ETEC are used in conjunction with the MasterCard host
simulator for authorizations. The ETEC are grouped into different subsets, each with a
specific objective to test different EMV criteria and terminal applications.
Fallback – The term used to describe the process and rules relating to using the
Fallback magnetic stripe reader of the CAD to obtain card information when the ICC or EMV
PINPad is inoperable, or no mutually supported AIDs are found.
Field Identifier – Used in various types of host messages to identify a single data
FID
field.
Floor Limit – The maximum transaction amount that can be locally authorized by the
Floor Limit
merchant without receiving an authorization from the Issuer.
Get Processing Options – Command sent by the CAD to initiate a transaction within
the ICC application. The ICC application returns the CAD the Application Interchange
GPO
Profile (AIP) and the Application File Locator (AFL). Each time a GPO command is
processed the ICC increments the ATC of the application selected by one.
Issuer Authentication – The name given to the process of authenticating the issuer
by the ICC. During the IA process the ICC will authenticate the issuer by validating
IA
the ARPC sent from the issuer to make sure it has not been changed by any
unauthorized entity along the way.
Issuer Action Codes – A set of three data fields, IAC denial, IAC online and IAC
default, defined in EMV, for use during Terminal Risk Management processing. IACs
IAC
are set by the issuer and loaded on to the ICC during the card personalization
process.
Integrated Chip Card – Refers to a plastic card that contains a small electronic chip.
ICC
Also known as smartcards or chip cards.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Integrated Card Verification Value – An alternate CVV defined for storage on a Visa
EMV chip card. It is calculated using a SVC of „999‟ instead of the SVC encoded on
iCVV
the magnetic stripe image of the chip. iCVV enables issuers to identify fraudulent use
of ICC data in magnetic-stripe read transaction processing.
IDD Issuer Discretionary Data – Data encoded on magnetic stripe by the issuer.
Issuer Working Key – A Visa key used exclusively to encrypt/decrypt PIN blocks
IWK
being sent between the Issuer and the Visa network.
KEK Key Encryption Key – A key used exclusively to encrypted/decrypt other keys.
Kernel – The part of the PINPad application that contains all the EMV commands
Kernel
used between the CAD and ICC and that has been EMV type approved (Level 2).
Local Master Key – The highest level administrative key, generated in clear in a
LMK HSM. The LMK is used to encrypt all ZMK and application keys (AC, MAC and ENC
keys) used in cryptographic processing by the HSM.
Last Online Application Transaction Counter – A dynamic data field used by the
ICC application. It is set equal to the ATC after every successful online transaction.
LOATC
The LOATC in conjunction with the ATC can be used to detect how many offline
transactions have been conducted by the ICC since the last online transaction.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Longitudinal Redundancy Check – A mathematically calculated value at the end of
LRC data streams that represents the data that precedes it. The LRC is used to ensure
data streams have been received exactly as transmitted.
Master DES Key – Used to derive UDKs which are loaded on to the ICC application
MDK
during personalization. There are three types of MDKs: AC, MAC and ENC keys.
Master File – The peak of the hierarchy of the ICC file structure. It contains
MF information and locations of the Dedicated Files (DF). DFs contain the actual data
files which are called Elementary Files (EF).
Major Industry Identifier – The first digit of the card PAN (or BIN / IIS) is the Major
Industry Identifier (MII), which represents the category of the entity which issued the
MII card.
e.g. Visa uses „4‟ and MasterCard uses „5‟ which are both defined as Banking and
Financial categories
Magnetic Stripe – Strip of magnetic tape, affixed to bank credit and debit cards,
encoded with cardholder identifying information, such as the PAN and card expiration
MSD/MSR
date, allowing for automated handling of transactions. The bank card industry
standard for magnetic stripes allows three separate tracks of encoded data.
MSR Fallback – The term used to describe the process and rules relating to using
MSR Fallback the magnetic stripe reader of the CAD to obtain card information when the ICC or the
EMV PINPad are operable but the Candidate List is empty.
P1 Parameter 1
P2 Parameter 2
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
PayPass PayPass – MasterCard contactless payment card or device implementation.
Payment Card Industry – Sometimes more specifically used to refer to the Payment
Card Industry Security Standards Council (PCI-SSC). An independent council
PCI originally formed by Amex, Discover, JCB, MasterCard and Visa, with the goal of
managing the on-going evolution of the Payment Card Industry Data Security
Standard (PCI-DSS).
Position of CVC3 – Field defining the location of the CVC3 in the Track-2 data for a
PCVC3
contactless MSD PayPass transaction.
Processing Data Object List – A list of terminal-related data objects (tags and
PDOL lengths), requested by the ICC, to be transmitted in the GET PROCESSING
OPTIONS command.
PED PIN Entry Device – A secure device used by a consumer to enter their PIN.
PIN Encryption Key – The PEK is a key used exclusively to encrypt PIN blocks
PEK between the various Issuer card personalization environments (from Issuer host
through Data Preparation to Personalization).
Personal Identification Number Block – When a cardholder enters his PIN, the
information is first encoded into a plain text PIN block using one of several PIN Block
PIN Block formats defined. Regardless of which format is used, once the PIN Block has been
constructed, the plain text PIN block can be encrypted using a standard algorithm
(when specified by the CVM).
Public Key – A key used in RSA that does not have to be kept secret. It is used to
PK reverse any cryptographic operation that is performed using the Private Key. The
Public key has a mathematical link to the Private key which makes them a key pair.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Public Key Infrastructure – A set of hardware, software, people, policies and
procedures needed to create, manage, distribute, use, store and revoke digital
PKI
certificates. A PKI is an arrangement that binds PKs with respective user identities by
means of a CA.
PIN Try Counter – Indicates the number of offline PIN tries remaining. The initial
value is set to the PIN Try Limit (PTL). The PTC is decremented by 1 each time an
PTC incorrect offline PIN is entered. The PTC is reset to the PTL value when a correct
offline PIN is entered, when the PIN is changed or when the PIN is unblocked by the
issuer.
Personalization Validation Tool – PVT is a tool used by Visa and Visa members to
PVT ensure that a Technical Product (e.g. chip card) has been personalized in such a
manner that it is compliant with the recommendations and the mandates of Visa.
PIN Verification Value – The name given to a 4 digit field coded on the bank card
MSR that can be used to validate the online PIN. The PVV is generated using TDES
PVV algorithm using the last eleven digits of the PAN (excluding the mod 10 check value),
a one digit PIN Verification Key Index (between 1-6) positioned before the PVV on the
MSR and the four left most digits of the PAN.
qVSDC Quick Visa Smart Debit Credit – Part of the Visa contactless payment specification.
Registered Identification Number – The first part of the AID used to identify the
RID
scheme (e.g. Visa, MasterCard, etc.).
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Rivest-Shamir-Adleman – An asymmetric algorithm used for cryptography named
RSA
after its three inventors.
(Static) Signed Application Data – A digital signature generated from critical card
SAD (SSAD) data elements and personalized on the ICC.
The SAD is validated by the terminal during the SDA process.
Store and Forward – A process used when a single host transaction message is
used (i.e. Host Capture) and the transaction has been completed offline (i.e. between
SAF
the ICC and CAD). The transaction is “stored” locally and then “forwarded” to the
host before settlement occurs.
Static Data Authentication – An option for offline CAM which protects against
counterfeit attacks. During the SDA process the terminal will validate the SAD to
SDA
ensure the information on the ICC has not been changed since the ICC was
personalization by the Issuer.
Secure Hashing Algorithm – A secure hashing algorithm designed for use with the
SHA -1
digital signatures. The SHA-1 algorithm output is always 20 bytes in length.
Signature Fallback – The term used to identify the fallback of offline PIN to signature
as the CVM for a particular ICC transaction. The ability of an ICC to perform
Signature Fallback signature fallback is indicated in the ICC‟s CVM list.
It is important not to confuse Signature Fallback with MSR Fallback or Technical
Fallback.
Secure PIN Entry Device – Used by cardholders to securely enter their PIN in
privacy. SPEDs safeguard the PIN from the time the cardholder enters the number
SPED
through its processing in the POS system by encrypting the PIN before it leaves the
SPED.
Stand-in Process – The process where a third party entity stands in to authorize an
STIP
online electronic bank transaction on behalf of the Issuer.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Service Code – The three digit code that follows the expiry date on the card‟s Track 2
magnetic stripe. In EMV it is used to identify the technology supported by payment
card being swiped (e.g. chip, MSR). The values for the three digits are as follows:
First digit
1: International interchange OK
2: International interchange, use IC (chip) where feasible
5: National interchange only except under bilateral agreement
6: National interchange only except under bilateral agreement, use IC (chip) where
feasible
7: No interchange except under bilateral agreement (closed loop)
9: Test
Second digit
SVC 0: Normal
2: Contact issuer via online means
4: Contact issuer via online means except under bilateral agreement
Third digit
0: No restrictions, PIN required
1: No restrictions
2: Goods and services only (no cash)
3: ATM only, PIN required
4: Cash only
5: Goods and services only (no cash), PIN required
6: No restrictions, use PIN where feasible
7: Goods and services only (no cash), use PIN where feasible
Terminal Action Analysis – Following the completion of TRM and the setting of the
TAA TVR the CAD will perform the TAA which involves the CAD analyzing the TRM
processes and requesting the appropriate cryptogram (AAC, ARQC or TC).
Terminal Action Code – A set of three data fields, TAC Denial, TAC Online and TAC
Default, defined in EMV, for use during the Terminal Risk Management processing.
TAC
TACs are set by the schemes and must be loaded per AID to each CAD that process
EMV transactions. Merchants should receive the TACs from their Acquirer.
Tag – Method used to exchange information with the EMV chip. Each EMV Tag is
Tag
assigned a Tag Number denoting the type of information it contains.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Terminal Check for Implementation – Test suite used for JCB EMV contact
TCI
transaction certification of deployed EMV devices.
Transaction Certificate (TC) Data Object List – A CDOL may request a TC Hash
Value to be included in the command data of a GENERATE AC command. The TDOL
is a list of the data objects the CAD should use to generate the TC Hash Value. The
TDOL
ICC may contain the TDOL, however there should also be a default TDOL in the
CAD, specified by the payment system, for use in cases where the TDOL is not
present in the ICC.
Technical Fallback – The process and rules relating to using the magnetic stripe
Technical Fallback reader of the CAD to obtain card information if the ICC or the EMV PINPad is
inoperable.
Tag/Length/Value – A variable length data format that uses a label (tag) to uniquely
TLV
identify a field followed by its field value length and then the field value.
The Terminal Verification Result – An EMV tag containing the status of several
TVR
different EMV checks performed by the PINPad Kernel or the EMV POS Solution.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved
Title: EMV Implementation Guide Version: 1.2
Prepared by: B2 Payment Solutions Published on: 09/04/14
Term Description
Upper Cumulative Offline Transaction Amount – Issuer-specified preference for
the maximum total amount of offline approved transactions, in the supported
UCOTA application currency, before a transaction must be sent online. Once this amount is
reached no offline transactions are allowed for that application until an online
transaction is approved.
Unique DES Key – A unique key derived using the MDK, PAN and PAN Sequence
UDK Number. The UDKs are loaded onto the ICC application during personalization.
There are three types of UDKs: AC, MAC and ENC keys.
Universal Integrated Circuit Card – The smart card used in GSM network mobile
UICC terminals. The UICC ensures the integrity and security of personal data. The UICC
will typically contain a few hundred kilobytes of personal data.
Visa Smart Debit Credit – An EMV based ICC application specified by Visa. In
VSDC
many cases this is often used to refer to the VIS specifications.
Zone Master Key – A high level administrative key established manually between
ZMK two entities using key custodians under split knowledge. Once the ZMK is exchanged
it can be used to transfer secret data (e.g. keys) between the two entities.
CONFIDENTIAL
©2015 Total Systems Services, Inc. All rights reserved