VCPS 2.2 Jan2016
VCPS 2.2 Jan2016
VCPS 2.2 Jan2016
Specification (VCPS)
Visa Supplemental Requirements
Version 2.2
January 2016
Visa Confidential
Important Information on Confidentiality and Copyright
THIS DOCUMENT IS PROVIDED ON AN "AS IS”, “WHERE IS”, BASIS, “WITH ALL FAULTS”
KNOWN AND UNKNOWN. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, VISA
EXPLICITLY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, REGARDING THE LICENSED
WORK AND TITLES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT OF THIRD PARTY INTELLECTUAL
PROPERTY RIGHTS.
Note: This document is a supplement of the Visa Core Rules and Visa Product and Service Rules.
In the event of any conflict between any content in this document, any document referenced
herein, any exhibit to this document, or any communications concerning this document, and any
content in the Visa Core Rules and Visa Product and Service Rules, the Visa Core Rules and Visa
Product and Service Rules shall govern and control.
Contents
Visa Contactless Payment Specification: Visa Supplemental Requirements
Contents
Tables
Figures
Requirements
1 Introduction
New technology is presenting Visa with opportunities to provide enhanced payment services.
One such new technology is the ability to communicate between two entities, for instance a
card and a reader, over a contactless interface.
New technology also brings challenges and changes to existing business and technical
environments. To ensure consistent cardholder experience and prevent transactions from
being interrupted, it is crucial that the time in which the cardholder holds the payment card
close to the reader (i.e. when the card is in the field) be as minimal as possible.
qVSDC uses EMV commands and constructs whenever possible, to utilize issuer and acquirer
investment in EMV. It compresses multiple EMV commands into as few commands as possible
to save time and allow cryptographic operations to be done up front as opposed to later when
the card is leaving the field. It features:
• An online transaction with online card authentication.
• An online transaction with online card authentication and offline data authentication.
• An offline transaction with offline data authentication and a clearing cryptogram for below
floor limit transactions, and an option of restricting offline transaction values using low
value limits.
2 General Information
2.1 Audience
This document is intended for clients, Visa regions, and vendors for use in Visa contactless
programs.
2.2 Scope
This specification describes the globally interoperable contactless solution. It addresses the
requirements for:
• qVSDC
• Reader or card application-level requirements that are not covered in [VIS], as well as
differentiation from contact card or contact device requirements in the Visa Core Rules and
Visa Product and Service Rules
Requirements for physical characteristics, power and signal interfaces, initialization, collision
detection, and transmission protocols are specified in [EMV CL PAYMENT] Book D.
Any additional requirements beyond those specified in [EMV CL PAYMENT] are addressed in
this document.
[EMV CL PAYMENT] EMV Contactless Specifications for Payment Systems, Version 2.5, March
2015
Book A: Architecture and General Requirements
Book B: Entry Point Specification
Book C-3: Kernel 3 Specification
Book D: EMV Contactless Communication Protocol Specification
[ISO 639] ISO/FDIS 639-1. Codes for the Representation of Names and Languages
(Alpha-2 code).
[ISO 3166] ISO 3166. Codes for the Representation of Names and Countries.
[ISO 4217] ISO 4217. Codes for the Representation of Currencies and Funds.
[ISO 7816-4] ISO/IEC 7816-4. Identification Cards – Integrated Circuit Cards with Contacts
– Part 4: Interindustry Commands for Interchange.
[ISO 7816-5] ISO/IEC 7816-5. Identification Cards – Integrated Circuit Cards with Contacts
– part 5: Numbering System and Registration Procedure for Application
Identifiers.
[ISO 8583] ISO 8583. Financial transaction card originated messages – Interchange
message specifications
[ISO 8859] ISO/IEC 8589. Information Processing – 8-bit Single-Byte Coded Graphic
Character Sets.
[ISO 14443] ISO/IEC 14443. Identification cards – Contactless integrated circuit(s) cards –
Proximity cards
Part 1: Physical characteristics
Part 2: Radio frequency interface power and signal interface
Part 3: Initialization and anticollision
Part 4: Transmission protocol
[VIS] Visa Integrated Circuit Card Specification, Version 1.6, January 2016 –
Provides technical details related to VIS transactions and functions
performed by the chip card.
[VSDC PERSO] VSDC Personalization Specification, Version 2.1, January 2016 – Guide to
personalization of VSDC applications using the Common Personalization
approach described in [EMV CPS].
For presence of tags in the commands and responses, the following notation is used:
• M: Mandatory tag – shall always be present, otherwise the reader terminates the transaction
• R: Required tag – shall always be present, but the reader does not terminate the transaction
if the tag is not returned
• C: Conditional tag – shall be present under certain conditions, but the reader does not
terminate the transaction if the tag is not returned.
• O: Optional tag – may or may not be present
The following phrases are used in this specification to indicate that the reader should stop the
current contactless application, unless explicitly indicated otherwise.
• “Terminate the transaction”: Stop the current application. Subsequent reader processing is
outside the scope of this specification. Contact your Visa regional representative for the
requirements applicable for your region.
• “Power(s/ing) off the contactless interface”: Stop the current application, and stop
generating the RF Field (in order to put the PICC into the POWER-OFF state as defined in
[EMV CL PAYMENT] Book D). Subsequent reader processing is outside the scope of this
Note: When the reader is required to power off the contactless interface, it shall do so
immediately and shall not perform an [EMV CL PAYMENT] Book D Removal unless explicitly
stated otherwise. (An [EMV CL PAYMENT] Book D Removal is performed to ensure that the PICC
has been removed from the PCD field)
The following terminology is used in this specification to describe the implementation and
configuration requirements for card and reader functionality:
• Implementation-Mandatory: Card or reader shall implement this functionality.
• Implementation-Conditional: Card or reader shall implement this functionality if the defined
conditions are met. Conditions vary based on the functionality in question.
• Implementation-Optional: Card or reader may implement this functionality, at the discretion
of the implementer.
• Issuer-Mandatory (for card) or Acquirer-Merchant-Mandatory (for reader): Issuer or acquirer-
merchant shall enable this functionality.
• Issuer-Conditional (for card) or Acquirer-Merchant-Conditional (for reader): Issuer or
acquirer-merchant shall enable this functionality if the defined conditions are met.
Conditions vary based on the functionality in question.
• Issuer-Optional (for card) or Acquirer-Merchant-Optional (for reader): Issuer or acquirer-
merchant may enable this functionality, at their discretion.
The card and reader functionality defined in this specification are Implementation-Mandatory,
except where explicitly stated otherwise. This specification may also explicitly reiterate that
specific functionality is Implementation-Mandatory to avoid potential ambiguity.
When used to describe requirements and conditions for card or reader functionality, the
following terminology may be used:
• “Implement(ed)”: Card or reader is capable of performing the functionality. The phrase
"implement support for" may also be used.
• “Enable(d)”: Card or reader functionality has been activated (i.e. turned on).
• "Disable(d)": Card or reader functionality has been deactivated (i.e. turned off).
3.1.4.1 Reader
The word reader is used in this specification for the merchant device communicating with the
card.
The use of this word is not intended to dictate any specific implementation. Specifically there
are two scenarios in which typically a reader is used for a contactless transaction:
• Either as a reader (also called a dongle or PCD) separated from, but communicating with, a
POS device.
• Or as a reader integrated into a POS device.
The word reader in this specification will therefore cover both scenarios unless explicitly stated
otherwise. It is not intended to imply in which physical component (the reader or the POS
device) a specific action is performed.
3.1.4.2 Card
The word card is used in this specification for the consumer device that contains the
contactless payment application communicating with a payment reader.
The term card ordinarily implies a typical credit card-sized payment card, but in this
specification it indicates any type of consumer device that can operate over a contactless
interface; for instance, a key fob.
Parenthesized text following the statement “Else” is provided as supplemental information, and
does not denote a condition that must be satisfied.
In the example above, the parenthesized “(Text)” is merely supplemental information, and does
not constitute a condition that must be satisfied.
If a card condition evaluates a data element that is not present, then the specific condition
referencing the data element shall evaluate to FALSE, unless explicitly stated otherwise. For
card requirements or statements with multiple conditions, all other conditions in the
requirement or statement are unaffected and evaluated as normal.
If a card action is to be performed on a data element that is not present, then the specific
action is not performed. For requirements where multiple actions are to be taken, all other
actions in the set are unaffected and performed as normal.
Although the indicators used in this specification are explicitly assigned the values of 0 or 1,
the format of these internal indicators within an implementation is at the discretion of the
implementer.
Performance and security considerations should both be weighed when deciding on the
implementation of internal indicators.
xb, xxb Binary values. Bit values are appended with the character “b” (e.g. 1b and
0000b).
Bits within a byte are numbered from right to left, where the low-order bit
(bit 1) is the rightmost bit and the high-order bit (bit 8) is the leftmost bit.
‘Bit Name’ The bit defined as “Bit Name” within a data element. Bit names are
enclosed in single curly quotation marks.
Values in data elements marked as RFU (Reserved for Future Use) shall be set to zero, and both
the reader and card shall not; act on, operate on, or verify RFU data.
Coding of data marked as RFU shall follow the same rules as defined in [EMV] Book 3
section 6.3.6.
3.1.10 Flowcharts
Flowcharts are used to provide a high-level illustration of the processing. The flowcharts may
be simplified to illustrate a concept, and may not include all the steps that are performed.
January 2016 Visa Confidential 7
Notice: This information is proprietary and CONFIDENTIAL to Visa. It is distributed to Visa participants for use exclusively in managing their Visa
programs. It must not be duplicated, published, distributed or disclosed, in whole or in part, to merchants, cardholders or any other person without
prior written permission from Visa. © 2007-2016 Visa. All Rights Reserved.
3 Terminology and Conventions
Visa Contactless Payment Specification: Visa Supplemental Requirements
Implementations are not required to strictly follow the flowcharts, and are instead required to
comply with the requirements in the related text. In the case of a discrepancy between the
flowchart and the related text, the text shall take precedence.
Please notify Visa of any discrepancies at [email protected] so that they can be evaluated
and clarified as appropriate.
While patterned on EMV, all of Visa’s contactless implementations have the following
differences:
• Level 1 (contact versus contactless technology)
• Mandatory use of the PPSE
qVSDC is based on [EMV] card and terminal application specifications. [EMV] constructs,
commands, data elements, and functionality are utilized where possible. Contactless VSDC and
MSD are no longer supported in this specification.
qVSDC is a contactless path under a single Visa AID. Card application processing is determined
by the path within the Visa application (a single AID).
Note: For dual-interface cards supporting VIS, VIS is supported in the same application under the
same single Visa AID. When using the contact interface, path determination is not performed and
VIS processing is used.
4.1.1 qVSDC
To minimize the interaction time between the card and the reader, qVSDC readers support
Reader Preliminary Transaction Processing (Pre-processing). The Amount, Authorized (tag
'9F02') is obtained and transaction-based risk management is performed before requesting
that the card be presented and initiating card discovery.
To further decrease transaction time, qVSDC moves the following risk management features to
an earlier point in the transaction (Initiate Application Processing):
• Card risk management
• Online card authentication
• Offline card authentication
• Cryptogram generation
For online transactions without an AFL, no commands are necessary after the application has
been selected, other than the GET PROCESSING OPTIONS command.
January 2016 Visa Confidential 9
Notice: This information is proprietary and CONFIDENTIAL to Visa. It is distributed to Visa participants for use exclusively in managing their Visa
programs. It must not be duplicated, published, distributed or disclosed, in whole or in part, to merchants, cardholders or any other person without
prior written permission from Visa. © 2007-2016 Visa. All Rights Reserved.
4 Overview of the Contactless Approach
Visa Contactless Payment Specification: Visa Supplemental Requirements
For offline transactions (and online transactions with an AFL), additional data is read using the
READ RECORD command.
4.2 qVSDC
Contactless interaction is defined by the amount of time the cardholder can reasonably and
consistently hold the card in position. qVSDC, which is based on EMV concepts and uses the
existing Visa systems and rules of operation, addresses this human requirement while
protecting the investments already made in the chip (EMV) infrastructure.
qVSDC reduces the reader to card processing time by minimizing the number of commands
and responses that must be exchanged between the reader and the card. It offers an offline
quick low value (LV) payment feature, offline data authentication, and online card
authentication using one of the Cryptogram Versions listed in Appendix C Cryptogram
Versions.
In addition to a full qVSDC path incorporating all of the Card Action Analysis described in
section 6.4, a streamlined version of qVSDC Card Action Analysis is specified to offer simplified
qVSDC online-only implementations. Details on supporting qVSDC streamlined functionality
are found in Appendix H.
qVSDC uses the EMV methodology for selecting applications, initializing transaction
processing, and reading records to obtain the application data. qVSDC uses a subset of EMV
commands and requirements.
qVSDC offers support for Offline Data Authentication (using fDDA) and is compliant with EMV
in this processing, with the following exceptions:
• Generation of the dynamic signature is initiated by the GPO command. The INTERNAL
AUTHENTICATE command is not used and no DDOL is used.
• The results of fDDA are not provided online to the issuer within the TVR or protected by the
online authorization or clearing cryptograms.
Using card and reader dynamic data, fDDA validates that card data has not been fraudulently
altered and that the card is genuine and has not been created from skimmed data. In addition
to signing the (reader) Unpredictable Number, which is signed in most EMV contact chip
applications, fDDA also signs additional transaction dynamic data. The Amount, Authorized,
Transaction Currency Code, and (card) Unpredictable Number are all signed using fDDA.
qVSDC does not require that all mandatory EMV data elements be present in the card or if
present, that they be included in the card data that is read.
[VIS] counters and indicators, other than those specified in this document, are not impacted
during qVSDC processing.
This section provides an overview of a VCPS transaction. This is followed by a transaction flow
showing the order in which these functions are performed and the commands sent by the
reader to the card. Functions are mandatory unless specified otherwise.
Reader processing performed prior to powering on the contactless interface and prompting
for card presentment.
To minimize the duration in which the card must remain within the reader RF field, the reader
may obtain the transaction amount and perform some risk management checks prior to
prompting for card presentment.
Discovery Processing is performed by the reader to poll for the presence of contactless cards
that may have entered the reader’s RF field.
Application Selection is performed immediately after activation of the contactless card, and is
the process of determining which of the applications that are supported by both the card and
reader will be used to conduct the transaction. This process is performed in two steps:
1. The reader builds a candidate list of mutually supported applications. This process is
modeled after the [EMV] Directory Selection Method, except that support for the Directory
Selection Method is mandatory for readers (and cards), and the PPSE is used in place of the
PSE.
2. A single application from the candidate list is identified and selected to process the
transaction.
The response message from the card includes the Processing Options Data Object List (PDOL),
to identify the reader data needed to perform Initiate Application Processing.
During Initiate Application Processing, the reader signals to the card that transaction
processing is beginning. The reader accomplishes this by sending the GET PROCESSING
OPTIONS command to the card. When issuing this command, the reader supplies the card with
any data elements requested by the card in the Processing Options Data Object List (PDOL).
Initiate Application Processing is where the card performs Card Action Analysis, generates the
Application Cryptogram, (conditionally) generates the signature for Offline Data
Authentication, and returns card application data.
Read Application Data is performed if the Application File Locator was returned by the card
during Initiate Application Processing.
During Read Application Data, the reader reads the remaining card application data necessary
to process the transaction. Note that in VCPS, the card may return application data during
Initiate Application Processing and Read Application Data.
During Card Read Complete, the reader indicates to the cardholder that exchange of data
between the reader and the card is complete, and the card may be removed from the reader
field.
The reader determines whether all mandatory data elements for the transaction were returned
by the card, and whether any redundant primitive data elements were returned by the card.
The reader terminates the transaction if all mandatory data elements were not returned or
redundant primitive data elements were returned.
During Processing Restrictions, the reader checks the application expiration date, application
usage, and may check whether the card application PAN is on the Terminal Exception File.
Offline Data Authentication is implemented for readers supporting offline transactions, and is
performed for card requested offline transactions.
During Offline Data Authentication, the reader verifies the dynamic signature returned by the
card and authenticates the data from the card.
During Cardholder Verification, the reader determines the Cardholder Verification Method to
be performed (if any).
During Online Processing, the reader sends an authorization request to the issuer host. Online
Processing allows the issuer host to review and authorize or decline transactions using the
issuer’s host based risk management parameters. In addition to performing traditional online
fraud and credit checks, host authorization systems can perform online card authentication
using the card-generated cryptogram. The issuer may also perform online card authentication
with a Transaction Certificate type application cryptogram when Offline Data Authentication
has failed, an option that is configured by the issuer on their cards.
4.5.11 Completion
During Issuer Update Processing, the card application may be updated by the issuer through
use of the EXTERNAL AUTHENTICATE command to perform issuer authentication to (re)set risk
management counters and indicators, and/or through the application of issuer script
commands.
The cardholder is instructed to present their card once more, and Issuer Update Processing is
performed to update risk management counters and indicators on the card, and/or to update
card data elements.
Reader Card
Offline Data
Authentication
Online Processing
Completion
Card Represented fo r Issue r Upda te Pro cessing (Optiona l)
Business needs dictate that the “card-in-field” time for contactless transactions is to be
minimized. “Card-in-field” time is the duration in which the cardholder is required to keep their
card in the reader RF field for a contactless transaction.
qVSDC transaction times shall not exceed 500 milliseconds based upon the interaction
between the card and the reader, beginning at the first card response during Discovery
Processing and concluding at Card Read Complete. Of the 500 milliseconds, the time used by
the card shall not exceed 400 milliseconds, and the time used by reader shall not exceed 100
milliseconds.
This time does not include the time required to go online for an authorization or for the
qVSDC reader to validate a dynamic signature for offline data authentication.
Please contact your Visa regional representative for any additional performance requirements
that may be applicable for your region.
5 Reader Requirements
VCPS readers shall be implemented either as defined in this specification, or as defined in
[EMV CL PAYMENT] Book A, Book B, Book C-3 (Kernel 3), and Book D.
The reader functionality and requirements defined in this specification are Implementation-
Mandatory, except where explicitly stated otherwise.
Reader requirements for the contactless communication protocol are specified in [EMV CL
PAYMENT] Book D.
This section defines general reader requirements that may be applicable across multiple
functions of the VCPS transaction flow.
Receipts are not detailed in this specification, however the following applies:
Readers shall provide receipts as required by the Visa Core Rules and Visa Product and Service
Rules.
For POS devices capable of accepting transactions over multiple interfaces, all permitted
interfaces should be made available to the merchant/cardholder to perform a transaction.
However, to prevent interference between the contact chip and contactless interfaces, the
reader shall always power down the contactless interface prior to the POS device resetting
the card to initiate a contact chip transaction. The contactless interface shall remain powered
down for the duration of the transaction conducted over the contact chip interface.
For POS devices capable of accepting transactions over multiple interfaces, the transaction
data shall be from a single interface and data shall not be mixed across interfaces.
• For contact chip transactions (POS Entry Mode indicates a contact chip read), the value of
all card-originated data used for the transaction shall be as read from the contact chip
interface.
• For contactless chip transactions (POS Entry Mode indicates a contactless chip read), the
value of all card-originated data used for the transaction shall be as read from the
contactless chip interface.
• For physical magnetic stripe transactions (POS Entry Mode indicates a physical magnetic
stripe read), the value of all card-originated data used for the transaction shall be as read
from the magnetic stripe interface.
When the qVSDC-enabled reader is idle, the contactless interface should not be powered
unless the reader also supports non-Visa functionality requiring the field to be energized.
While the operation of non-Visa functionality is outside the scope of this specification, it is
recommended that the same principle should be applied, and that the contactless interface
should be powered down when the reader is idle.
Data requirements for qVSDC online messages and clearing records shall be as specified in
Appendix K.2.
The reader shall make the Form Factor Indicator and Customer Exclusive Data available for
inclusion in messages to the acquirer (when returned by the card application).
The reader shall support output of the following data object (when returned by the card
application), for possible use by the merchant and transmission to the acquirer:
• Payment Account Reference (PAR, tag '9F24')
Note: The above data object is not normally included in messages to the acquirer, but readers
must be capable of outputting the data object when returned by the card application.
If a contactless transaction is in progress (and Read Application Data has not been
completed) when a contact chip transaction is initiated, then the reader shall switch
interfaces.
Design consideration should be given to placement of the contactless reader relative to other
card interfaces. The contactless reader should not be placed such that it is frequently
activated when cardholders attempt to use other interfaces.
This section defines some of the configuration requirements for readers. Configuration of the
reader shall conform to these requirements, but the reader need not enforce configuration
requirements.
If Issuer Update Processing is supported by reader (TTQ byte 3 bit 8 is 1b), then the reader
shall support online processing (TTQ byte 1 bit 4 is 0b).
qVSDC transactions shall either be sent online or conducted over another interface when the
Amount, Authorized is zero.
Reader Risk Parameters are configured in the qVSDC-enabled reader to enforce this
requirement.
VCPS transactions directly result in the purchase of goods or services and/or in the
disbursement of cash. Refunds and credits are commonly employed to support the retail or
cash disbursement environment, but do not directly result in the purchase of goods or
services, nor in the disbursement of cash. VCPS functionality can be used to support refunds
and credits, and shall comply with the following requirement for the Transaction Type and
Amount, Authorized values used. However, all other reader processing for refunds and credits
is outside the scope of this specification.
If the Form Factor Indicator (FFI) is returned by the card application, then the qVSDC-enabled
reader shall replace FFI byte 4 bits 4-1 with the value 0000b (indicating that the transaction
was conducted using [ISO 14443]) prior to making the FFI available for inclusion in messages
to the acquirer.
If the reader is to return to Discovery Processing after card presentment, then the reader shall
discard any previously generated (Reader-Terminal) Unpredictable Number and shall
For contactless transactions, the reader (or terminal) shall clearly communicate to the
cardholder and merchant:
• Present the card
• The progress of the transaction
• The outcome of the transaction – approve, decline, or terminate
Recommended cardholder messages and indications for various transaction states are
defined in [EMV CL PAYMENT] Book A.
The qVSDC-enabled reader may display the Amount, Authorized (tag '9F02') when prompting
for a card to be presented.
If the card provides the Available Offline Spending Amount, then the qVSDC-enabled reader
may display this when it indicates a successful card read and may print it on the transaction
receipt.
Note: This specification indicates when communication with the cardholder and merchant
occurs, but does not specify the means of communication. User interface requirements are
specified on a regional basis.
It is the responsibility of the issuer to ensure that data in the card is formatted correctly, and
no format checking other than that specifically defined is required on the part of the reader.
However, if in the course of normal processing the reader recognizes that data is incorrectly
formatted, then the reader shall terminate the transaction unless otherwise specified.
Incorrectly formatted data includes, but is not limited to, the bulleted list provided in [EMV]
Book 3 section 7.5.
In order to minimize the time that the card must be in the field, qVSDC-enabled readers
supporting variable transaction amounts perform processing prior to powering on the
contactless interface and prompting for card presentment.
If Pre-processing is not performed, then the reader shall immediately power on the
contactless interface and proceed to Discovery Processing. The reader shall generate the
(Reader-Terminal) Unpredictable Number.
If the transaction amount is not a predefined value or has not been obtained, then the reader
shall use a value of all zeros for the Amount, Authorized.
The qVSDC-enabled reader performs Pre-processing to obtain the transaction amount and
perform reader risk management. The result of reader risk management is the setting of
appropriate bits in the Terminal Transaction Qualifiers (TTQ), and determination of whether the
contactless interface is to be powered on. Modification of TTQ bits during Pre-processing is
transient, and shall not affect the TTQ value obtained for subsequent transactions.
For devices where the transaction amount is a fixed value, TTQ bit settings are already known
and need not be determined on a transaction by transaction basis.
The reader shall generate the (Reader-Terminal) Unpredictable Number (tag '9F37').
The Contactless Application Not Allowed indicator and TTQ byte 2 bits 8-7 are transient
values, and reset to 0 at the start of Pre-processing.
If the Amount, Authorized is zero, an online-capable reader shall have the following
configurable options (at most one option may be enabled at a time):
• Option 1 – Indicate Online Cryptogram Required (set TTQ byte 2 bit 8 to 1b).
• Option 2 – Set the Contactless Application Not Allowed indicator for Visa AIDs to 1.
The default behavior is Option 1, but devices shall be capable of being configured to use
Option 2 instead.
If the Amount, Authorized is zero, then an offline-only reader shall set the Contactless
Application Not Allowed indicator for Visa AIDs to 1.
If the Amount, Authorized is greater than or equal to the Reader Contactless Transaction
Limit, then the reader shall set the Contactless Application Not Allowed indicator for Visa
AIDs to 1.
Note: It is strongly recommended that the Reader Contactless Transaction Limit Check be
disabled. Visa rules may require that this limit be disabled, with limited exceptions for specific
acceptance environments.
If the Amount, Authorized is greater than or equal to the Reader CVM Required Limit, then
the reader shall indicate CVM Required (set TTQ byte 2 bit 7 to 1b).
If the Amount, Authorized is greater than either the Reader Contactless Floor Limit or (if the
Reader Contactless Floor Limit is not present) the applicable Terminal Floor Limit (tag '9F1B'),
then the reader shall indicate Online Cryptogram Required (set TTQ byte 2 bit 8 to 1b).
Upon successful completion of Reader Pre-processing, the reader shall power on the
contactless interface and shall proceed to Discovery Processing.
However, if the Contactless Application Not Allowed indicator (or equivalent indicator) is 1
for all reader supported applications, then the reader may leave the contactless interface
powered off and may switch to another interface.
Discovery Processing is performed by the reader to poll for the presence of contactless cards
that may have entered the reader’s RF field.
The reader shall request that the card be presented and shall perform polling and collision
detection as defined in [EMV CL PAYMENT] Book D.
qVSDC-enabled readers shall support powering off the contactless interface for the following
situations:
• Upon merchant command. For example, to cancel the transaction.
• After a pre-defined timeout period.
Application Selection is performed immediately after activation of the contactless card, and is
the process of determining which of the applications that are supported by both the card and
reader will be used to conduct the transaction. This process is performed in two steps:
1. The reader builds a candidate list of mutually supported applications.
2. A single application from the candidate list is identified and selected to process the
transaction.
Figure 5–1: Application Selection Using Directory Selection Method briefly outlines reader
processing to perform Application Selection using the Directory Selection Method.
Reader Card
Begin Application SELECT command SELECT response for
Selection with PPSE filename the PPSE
SELECT response
SW1 SW2 =
‘9000’?
N Y
Any Directory
Process (next)
Entries in FCI Y
Directory Entry
IDD?
Out-of-scope Y N
More Directory
Choose application
N Entries in FCI
from candidate list
IDD?
Out-of-scope
N
Single
application in
Y
the candidate
list?
N
Multiple applications
in candidate list. SELECT command with SELECT response for
Determine highest ADF of the application the AID
priority application
SW1 SW2 =
N SELECT response
‘9000’?
Y
Y
Application Program
Reset Contactless
Dynamic ID returned by card
Application Not Allowed
Reader Limits Y and matches reader Y
Indicator and TTQ
supported? supported Application
transient bits
Program ID?
N
N
Perform Reader Risk
Contactless
Parameters Checking
Application Not
using Reader Limit Set
Allowed Indicator
for the matching
= 1?
Application Program ID
N
End Application
Selection
The reader shall support the SELECT command, as defined in Appendix G of this specification.
The reader shall support DF Names (AIDs) (tag '4F') up to the full 16 byte maximum length.
The construction of the candidate list is modeled after the [EMV] Directory Selection Method,
except that support for the Directory Selection Method is mandatory for readers (and cards),
and the PPSE is used in place of the PSE.
The use of proprietary selection methods is not precluded, but is outside the scope of this
specification. Users of proprietary selection methods should be aware of the potential negative
impact on performance introduced by any increase in the number of commands. The
proprietary selection method also needs to deal with the complexity of priorities amongst all
available brands and applications. If the proprietary selection method is unsuccessful and the
Directory Selection Method using the PPSE is to be used, this may require that the reader
power off the contactless interface.
The reader shall support the Directory Selection Method using the PPSE, as defined in this
section.
The reader shall perform the following procedure to determine the application to be selected:
The reader shall, using the SELECT command, select the PPSE with a file name of
'2PAY.SYS.DDF01'.
If the reader receives SW1 SW2 = '9000' in response to the SELECT command, then the
reader shall continue processing.
Else (reader receives SW1 SW2 ≠ '9000'), reader processing is outside the scope of this
specification.
Beginning with the first Directory Entry (tag '61'), the reader shall sequentially process each
Directory Entry (tag '61') from the FCI Issuer Discretionary Data (tag 'BF0C').
If there is no Directory Entry (tag '61') in the FCI Issuer Discretionary Data (tag 'BF0C'), then
reader processing is outside the scope of this specification.
The reader shall examine the ADF Name (tag '4F') of each Directory Entry (tag '61').
If the ADF Name (tag ‘4F’) in the Directory Entry (tag ‘61’) matches an AID in the reader, then
the reader shall add the application to the candidate list. The application information added
to the candidate list shall include the ADF Name (tag ‘4F’) and the Application Priority
Indicator (tag ‘87’, if present).
The ADF Name (tag ‘4F’) matches an AID in the reader if:
• The ADF Name has the same length and value as the AID (full match)
• or the ADF Name begins with the entire AID (partial match).
If the ADF Name (tag ‘4F’) is not coded according to [EMV] Book 1 section 12.2.1, then the
reader shall ignore the Directory Entry.
Once the reader determines the list of mutually supported applications, it shall perform the
following procedure to select an application.
If there are no mutually supported applications in the candidate list, then the reader shall
indicate an error to the cardholder. Subsequent processing is outside the scope of this
specification.
If there is only one mutually supported application in the candidate list, then the reader shall
select the application.
The reader shall send the SELECT command with the ADF Name (tag '4F') of the selected
application. If the selected application is not a Visa AID, then subsequent reader processing is
outside the scope of this specification.
If the reader receives SW1 SW2 = '9000' in response to the SELECT command, then the
reader shall:
• If Issuer Update Processing is supported by the reader, then the reader shall commit the
full ADF Name (AID) of the selected application to memory, for possible use during Issuer
Update Processing.
• Continue processing the transaction.
Else (reader receives SW1 SW2 ≠ '9000'), the reader shall remove the application from the
candidate list and shall return to the beginning of Final Selection processing.
DRL functionality allows the reader to apply different Reader Limit Sets for different card
applications (even if they have the same AID), allowing the reader to vary Reader Risk
Parameters on a transaction by transaction basis.
For example, a reader may apply one set of Reader Risk Parameters for domestic Visa credit
applications, and apply another set of Reader Risk Parameters for international Visa credit
applications.
If DRL functionality is enabled, then the qVSDC-enabled reader performs DRL processing to
determine the Reader Risk Parameters (see section 5.3.2.2) to use for the selected application.
The value of limits used in Reader Risk Parameters checking, and whether individual checks are
enabled or disabled, are specified in a Reader Limit Set. The Reader Limit Set indicates whether
each of the individual checks are enabled or disabled, and the value of the limit when the
corresponding check is enabled.
Each Reader Limit Set shall allow the acquirer-merchant to configure the following Reader
Risk Parameters:
• Status Check – Configurable to indicate whether this check is enabled or disabled.
• Amount, Authorized of Zero Check – Configurable to indicate whether this check is
enabled or disabled. If enabled, configurable to indicate whether Option 1 or Option 2 is
to be used.
• Reader Contactless Transaction Limit Check – Configurable to indicate whether this check
is enabled or disabled, and the value of this limit when enabled.
• Reader CVM Required Limit Check – Configurable to indicate whether this check is
enabled or disabled, and the value of this limit when enabled.
• Reader Contactless Floor Limit Check – Configurable to indicate whether this check is
enabled or disabled, and the value of this limit when enabled.
The reader shall support a default Reader Limit Set, to be used when no matching Application
Program ID (or no Application Program ID at all) is returned in the SELECT response. The
default Reader Limit Set contains the Reader Risk Parameters used during Reader Preliminary
Transaction Processing (Pre-processing).
In addition to support for the default Reader Limit Set, the reader shall implement support
for a minimum of 4 unique Application Program IDs and 4 corresponding Reader Limit Sets.
Implementations may optionally support more than 4 Application Program IDs and
corresponding Reader Limit Sets.
DRL Processing is performed to determine the Reader Limit Set applicable to the selected
application. When a matching Application Program ID is returned by the card application, the
reader replaces the results of Reader Risk Parameters Checking that used the default Reader
Limit Set (performed during Pre-processing) with the results of Reader Risk Parameters
Checking using the matching Reader Limit Set.
If DRL functionality is supported, the reader shall perform the following procedure:
The reader examines the Application Program ID returned in the SELECT response to
determine which Reader Limit Set to apply.
The card Application Program ID matches an Application Program ID in the reader if:
• The card Application Program ID has the same length and value as the reader Application
Program ID (full match)
• or the card Application Program ID begins with the entire reader Application Program ID
(partial match)
If no Application Program ID is returned or the Application Program ID does not match any
reader supported Application Program ID, then the reader shall use the results of Reader
Preliminary Transaction Processing (Pre-processing) and proceed with the Contactless
Application Allowed Check (section 5.5.5).
Else (the Application Program ID matches one or more supported reader Application
Program IDs), the reader shall:
• Reset the Contactless Application Not Allowed indicator to 0 and the transient bits of the
TTQ (byte 2 bits 8-7) to 0b.
• Perform Reader Risk Parameters Checking using the Reader Limit Set that corresponds to
the longest matching reader Application Program ID. Reader Risk Parameters Checking is
performed as defined in section 5.3.2.2.
• Proceed with the Contactless Application Allowed Check (section 5.5.5).
Note: Readers should not be configured with multiple instances of the same Application Program
ID value.
Note: If not precluded by reader support for other payment systems, some reader processing
performed during Dynamic Reader Limits Processing may be performed during Reader
Preliminary Transaction Processing (Pre-processing). To minimize the processing performed while
the card is in the reader field, it is recommended that readers perform Reader Risk Parameters
Checking for each supported Application Program ID during Pre-processing. The value of the
Contactless Application Not Allowed indicator and the TTQ are then stored for each Application
The reader examines the Contactless Application Not Allowed indicator to determine whether
the selected application is allowed to transact over the contactless interface.
If the Contactless Application Not Allowed indicator is 1, then the reader shall remove the
application from the candidate list and return to the beginning of Final Selection processing.
Else (the Contactless Application Not Allowed indicator is 0), the reader shall continue
processing the transaction.
During Initiate Application Processing, the reader issues the GET PROCESSING OPTIONS (GPO)
command to the card, and includes any data that the card has requested in the PDOL during
Application Selection. Application data necessary to process the transaction is returned by the
card application during Initiate Application Processing, and may also be returned during Read
Application Data.
To facilitate Initiate Application Processing, support for the GPO command is required.
The reader shall support the GET PROCESSING OPTIONS (GPO) command, as defined in
Appendix G of this specification.
Data Object List (DOL) coding is performed according to [EMV] Book 3 section 5.4. Readers
shall be able to provide the value of reader data elements (defined in Appendix D) requested
by the card application.
Readers shall support GPO responses in [EMV] Format 2, as defined in Appendix G of this
specification.
January 2016 Visa Confidential 33
Notice: This information is proprietary and CONFIDENTIAL to Visa. It is distributed to Visa participants for use exclusively in managing their Visa
programs. It must not be duplicated, published, distributed or disclosed, in whole or in part, to merchants, cardholders or any other person without
prior written permission from Visa. © 2007-2016 Visa. All Rights Reserved.
5 Reader Requirements
Visa Contactless Payment Specification: Visa Supplemental Requirements
Req 5.58 (Recognized and Unrecognized Data)
The reader shall store all recognized data elements read, whether mandatory or optional, for
later use in transaction processing. Data elements that are not recognized by the reader (that
is, their tags are unknown by the reader) may be ignored and do not need to be stored.
Note: As the card application may return application data in both the GPO response and in
records, the reader does not check for the presence of mandatory data elements until Card Read
Complete. For example, although the card is required to return the Issuer Application Data in the
GPO response (amongst other data elements), the reader is required to be able to handle
receiving these data elements regardless of whether they're returned in the GPO response or in a
READ RECORD response.
Figure 5–2: Initiate Application Processing (Reader) briefly outlines reader processing to
perform Initiate Application Processing.
Reader Card
Begin Initiate
Application Processing
SW1 SW2 =
Y Switch Interface
‘6984’?
Display message,
SW1 SW2 = power down CL Return to Discovery
Y
‘6986’? interface, and wait Processing
1000ms – 1500ms
N Terminate transaction
Prior to initiating the transaction with the card, the reader checks the SELECT response for the
presence of the Processing Options Data Object List (PDOL, tag '9F38'), and for the presence of
the Terminal Transaction Qualifiers (TTQ, tag '9F66') tag in the PDOL.
The reader shall perform the following procedure to initiate the transaction with the card.
The reader shall issue the GET PROCESSING OPTIONS (GPO) command. The command data
field is a data object coded according to the PDOL provided by the card, preceded by the
Command Template tag and length.
If the reader receives SW1 SW2 = '9000' in response to the GPO command, then the reader
shall continue Initiate Application Processing.
Else, if the reader receives SW1 SW2 = '6984' in response to the GPO command, then the
reader shall switch interfaces.
Else, if the reader receives SW1 SW2 = '6985' in response to the GPO command, then the
reader shall remove the application from the candidate list and shall return to the beginning
of Final Selection processing.
Else, if the reader receives SW1 SW2 = '6986' in response to the GPO command, then the
reader shall:
• Indicate to the cardholder to refer to their payment device for further instructions and
immediately power down the contactless interface.
Note: SW1 SW2 = '6986' is not returned by cards compliant to this specification. However,
reader behavior is defined in this specification to support consumer payment devices that are
capable of informing the cardholder of the subsequent action to take. For example, the
consumer payment device may be a mobile handset capable of instructing the consumer of
the action to take.
• After a duration of between 1000ms and 1500ms, the reader shall power up the
contactless interface and return to Discovery Processing. Any message displayed to the
cardholder shall continue to be displayed during the subsequent Discovery Processing.
Else (SW1 SW2 does not match any of the above), the reader shall terminate the transaction.
The reader performs Read Application Data if an Application File Locator (AFL) was returned
during Initiate Application Processing, and proceeds to Card Read Complete if an AFL is not
returned.
During Read Application Data, the reader uses the READ RECORD command to retrieve the
card data necessary to process the transaction.
The reader shall support the READ RECORD command, as defined in Appendix G of this
specification.
The reader shall perform the following procedure to read the card application data.
If the Application File Locator (AFL, tag '94') is returned during Initiate Application Processing,
then the reader shall perform Read Application Data as specified in [EMV] Book 3,
section 10.2.
If the Application File Locator (AFL, tag '94') was not returned during Initiate Application
Processing, then the reader shall proceed to Card Read Complete.
After Read Application Data has been completed, the reader indicates to the cardholder that
card read is complete, and the cardholder should remove their card from the reader’s RF field.
The reader checks the application data returned by the card to ensure that all mandatory data
for the transaction has been returned, and that redundant primitive data was not returned.
Primitive data elements are redundant if more than one occurrence of the primitive data
element was returned by the card during Initiate Application Processing and Read Application
Data.
The reader shall indicate to the cardholder and merchant that card read is complete and that
the card may be removed, but that the transaction is still in progress.
Note: As with all cardholder indication and messaging requirements, this cardholder indication
may vary per regional requirements. For example, indication that the card read is complete
may consist simply of activating indicator lights with an audible beep. Contact your Visa
regional representative for additional guidance on cardholder indication and messaging
requirements for your region.
The reader shall power off the contactless interface and continue processing the transaction.
Powering off the contactless interface in this requirement does not include stopping the
current application.
The reader examines application data returned by the card during Initiate Application
Processing and Read Application Data to determine whether all mandatory data elements were
returned, and whether redundant primitive data elements were returned.
The reader shall ensure that all mandatory data elements are returned by the card.
If any mandatory data elements are not present for the applicable path, then the reader shall
terminate the transaction.
Note: Mandatory data elements are identified in the Requirement column of Table D–1.
The reader shall perform the procedure defined in this section for qVSDC transactions.
If the Cryptogram Information Data (CID) is not returned by the card, then the reader shall:
• Construct the CID and initialize it with a value of '00'.
• Set CID bits 8-7 to the value of Issuer Application Data byte 5 bits 6-5 using identical bit
settings.
Note: Issuer Application Data byte 5 contains Card Verification Results (CVR) byte 2, indicating
the cryptogram type.
The reader examines the Cryptogram Information Data (CID) to determine the cryptogram
type (TC, ARQC, or AAC).
If an Application Authentication Cryptogram (AAC) is returned by the card, then the reader
shall set the Decline Required by Reader Indicator to 1.
If an Authorization Request Cryptogram (ARQC) is returned by the card or Online Cryptogram
Required by the reader (TTQ byte 2 bit 8 is 1b), then the reader shall set the Online Required
by Reader Indicator to 1.
If the cryptogram type cannot be determined (TC, ARQC, or AAC), then the reader shall set
the Decline Required by Reader Indicator to 1.
The reader performs Processing Restrictions to determine whether there are restrictions for the
transaction. The reader checks the application expiration date, application usage, and may
check whether the card application PAN is on the Terminal Exception File.
The reader shall perform the procedure defined in this section for qVSDC transactions.
Offline Data Authentication is performed by the reader to verify the dynamic signature and
authenticate the data from the card.
The reader shall perform the procedure defined in this section for qVSDC transactions if the
Online Required by Reader Indicator is 0 and the Decline Required by Reader Indicator is 0.
The reader shall verify the fDDA dynamic signature according to [EMV] and the definition of
fDDA in Appendix A.
If either fDDA fails or the reader is unable to perform fDDA, then the reader shall examine the
Card Transaction Qualifiers (CTQ) to determine further processing:
• If ‘Go Online If ODA Fails’ indicated by card (CTQ byte 1 bit 6 is 1b) and Online supported
by reader, then the reader shall set the Online Required by Reader Indicator to 1 and
continue processing the transaction.
Else, if ‘Switch Interface If ODA Fails’ indicated by card (CTQ byte 1 bit 5 is 1b) and EMV
contact chip supported by reader, then the reader shall switch to another interface. For
this case, the reader is aware that contact chip is supported, and shall explicitly indicate
that the contact chip interface is to be used.
Else (neither of the above or CTQ not returned), the reader shall set the Decline Required
by Reader Indicator to 1 and continue processing the transaction.
Note: A Consumer Device CVM is a CVM performed on, and validated by, the consumer's
payment device, independent of the reader.
If the reader requires a CVM and the Card Transaction Qualifiers (CTQ, tag '9F6C') is not
returned by the payment application:
• A reader that supports Signature, in addition to any other CVMs, shall acquire a signature
for the transaction.
• A reader that supports only the Consumer Device CVM and Online PIN shall perform
Online PIN and set the Online Required by Reader Indicator to 1.
• A reader that supports only the Consumer Device CVM shall set the Decline Required by
Reader Indicator to 1.
Note: Reader support for the Consumer Device CVM is mandatory, as is indication of its
support in the Terminal Transaction Qualifiers. In addition to supporting the Consumer Device
CVM, the reader may optionally be configured to support Online PIN and/or Signature.
If the CTQ (tag '9F6C') is returned by the payment application, then the reader shall examine
the CTQ (in the order specified below) to determine the CVM to be performed:
• If Online PIN Required by card (CTQ byte 1 bit 8 is 1b) and Online PIN supported by
reader, then the reader shall perform Online PIN and set the Online Required by Reader
Indicator to 1. The reader shall not examine the remaining CTQ bits for CVM processing.
Else (Online PIN not required or not supported), if Consumer Device CVM Performed by
card (CTQ byte 2 bit 8 is 1b), then:
̵ If the Card Authentication Related Data was returned during the transaction, then:
• If Card Authentication Related Data bytes 6-7 match CTQ bytes 1-2 (respectively),
then CVM processing is complete and the reader shall not examine the remaining
CTQ bits for CVM processing.
Else (Card Authentication Related Data bytes do not match CTQ bytes), the reader
shall set the Decline Required by Reader Indicator to 1. CVM processing is complete
and the reader shall not examine the remaining CTQ bits for CVM processing.
Note: If the Card Authentication Related Data returned by the card is less than 7
bytes in length, then Card Authentication Related Data bytes 6-7 cannot match CTQ
bytes 1-2.
If the reader requires a CVM and a CVM will not be performed, then the reader shall set the
Decline Required by Reader Indicator to 1.
The reader sends an authorization request to the issuer host. Online Processing allows the
issuer host to review and authorize or decline transactions using the issuer’s host based risk
management parameters.
The reader shall perform the processing defined in this section for qVSDC transactions if the
Online Required by Reader Indicator is 1 and the Decline Required by Reader Indicator is 0.
The reader shall send an online authorization request message to the acquirer. The minimum
data requirements for qVSDC online messages are specified in Appendix K.2.
5.13 Completion
The reader shall perform the procedure defined in this section for qVSDC transactions.
When Online Processing is not performed (or performed and an authorization response
message is not received), the reader shall examine internal reader transaction disposition
indicators to determine subsequent processing.
If Online Required by Reader Indicator is 1 or Decline Required by Reader Indicator is 1, then
the reader shall proceed with Transaction Declined (section 5.13.3).
Else (neither Online nor Decline Required), the reader shall proceed with Transaction
Approved (section 5.13.2).
The reader shall indicate to the cardholder and merchant that the transaction has been
approved.
If the Available Offline Spending Amount (AOSA) is returned by the card, then readers that
support displaying or printing the AOSA shall do so.
The reader is only required to print the AOSA in this situation when a receipt is provided.
The reader shall decline the transaction and indicate to the cardholder and merchant that the
transaction has been declined.
If the Available Offline Spending Amount (AOSA) is returned by the card, then readers that
support displaying or printing the AOSA shall do so.
The reader is only required to print the AOSA in this situation when a receipt is provided.
The reader shall not attempt to perform the transaction over another interface.
If supported, Issuer Update Processing is conditionally performed for qVSDC Path Processing
(see section 5.13.1).
To facilitate Issuer Update Processing, support for the EXTERNAL AUTHENTICATE command
and issuer script processing is required.
When it is supported, the reader shall implement the EXTERNAL AUTHENTICATE command,
as defined in Appendix G.5 of this specification.
When it is supported, the reader shall implement Issuer Script processing according to [EMV]
Book 3 section 10.10, and [EMV] Book 4 section 6.3.9, except for the following:
• Unlike [EMV], Issuer Script Templates with tag '71' or '72' are processed and issued by the
reader in the same manner. There is no GENERATE AC command, and Issuer Script
Templates with tag '71' and '72' are both processed during Issuer Update Processing.
• No processing is performed on the Transaction Status Information (TSI) or Terminal
Verification Results (TVR).
Figure 5–3: Issuer Update Processing (Reader) briefly outlines reader processing to perform
Issuer Update Processing.
Reader Card
SW1 SW2 =
‘9000’? SELECT response
Issuer EXTERNAL
Authentication Y: EXTERNAL AUTHENTICATE command AUTHENTICATE
Data received? processing
Issuer Script
Template(s)
EXTERNAL AUTHENTICATE response
received?
N
Send (next) issuer Issuer script
script command Issuer script command
processing
Indicate transaction N
outcome to
cardholder
The reader shall perform the following procedure to perform Issuer Update Processing.
The reader shall prompt the cardholder to (re)present their contactless card for Issuer Update
Processing, and Discovery Processing shall be performed as specified in section 5.4.
If the reader powers off the contactless interface as described in Req 5.40 (Power Off
Contactless Interface), then the reader shall proceed to Req 5.94 (Second Tap Completed).
The reader shall issue a SELECT command specifying the full ADF Name (AID) of the
contactless card application from the previous transaction. This AID will have been previously
committed to memory by the reader.
If the reader receives SW1 SW2 = '9000' in response to the SELECT command, then the
reader shall continue processing.
Else (reader receives SW1 SW2 ≠ '9000'), the reader shall return to Prompt for Card.
If Issuer Authentication Data was received in the authorization response message, then the
reader shall issue an EXTERNAL AUTHENTICATE command using the Issuer Authentication
Data received.
Note: The reader does not perform processing based on the card response to the EXTERNAL
AUTHENTICATE command. The reader continues Issuer Update Processing regardless of the
SW1 SW2 value returned by the card.
The reader issues issuer script command(s) if an Issuer Script Template was received in the
authorization response. Issuer Script Templates shall follow Issuer Script Template 1 or 2, and
an Issuer Script Template may have multiple issuer script commands.
In this version of the specification, at most one Issuer Script Template is supported in the
response message. However, readers shall parse all Issuer Script Templates received and issue
the corresponding issuer script commands.
The reader shall parse each Issuer Script Template to retrieve each issuer script command,
and shall transmit the commands to the card one by one.
If the response to an issuer script command is not SW1 SW2 = '9000', '62xx', or '63xx', then
the reader shall not send any further issuer script commands and shall discontinue Issuer
Script Command(s) processing.
The reader shall indicate to the cardholder the transaction outcome based on the issuer
authorization response, regardless of the results of Issuer Update Processing.
If the Available Offline Spending Amount (AOSA) was returned by the card (during Initiate
Application Processing or Read Application Data), then readers that support displaying or
printing the AOSA shall not do so.
6 Card Requirements
The card functionality and requirements defined in this specification are Implementation-
Mandatory, except where explicitly stated otherwise.
Card requirements for the contactless communication protocol are specified in [EMV CL
PAYMENT] Book D.
This section defines general card requirements that may be applicable across multiple
functions of the VCPS transaction flow.
qVSDC is based on [EMV] card and terminal application specifications. [EMV] constructs,
commands, data elements, and functionality are leveraged where possible.
The card shall process each command as a single atomic operation. Commands shall be
processed in their entirety or not at all, with the following exception(s):
• Incrementing the Application Transaction Counter (ATC) shall be immediate and
irreversible.
• Resetting the Last Contactless Application Cryptogram Valid Indicator to 0 shall be
immediate and irreversible.
Counters shall not be incremented above their maximum possible value (an overflow) and
shall not be decremented below zero.
If increment of a counter would result in an overflow, then the application shall set the
counter to the maximum possible value.
If decrement of a counter would result in a value less than zero, then the application shall set
the counter to a value of zero.
Dual-interface contactless and contact cards supporting both [VCPS] and [VIS] shall
implement the functionality and requirements for dual-interface cards defined in Appendix I
Dual-Interface Contactless and Contact Cards.
This requirement is only applicable after the card application has been personalized.
The card application shall only support and process commands received over the contactless
interface if they are explicitly defined in Appendix G.
If a command is received over an unsupported interface (for that command), then the card
application shall respond with an error SW1 SW2 ('6A81' is recommended).
The qVSDC path shall implement support for Cryptogram Version Number 10, Cryptogram
Version Number 17, and Cryptogram Version Number 18. The qVSDC path may implement
support for Cryptogram Version Number '22' and/or additional proprietary cryptograms at
implementer discretion. The Cryptogram Version to be used for cryptogram generation shall
be issuer configurable, and indicated by the issuer in the Cryptogram Version Number of the
Issuer Application Data returned for qVSDC transactions.
If incrementing the ATC results in the ATC reaching its maximum value, then the application
shall be permanently blocked as follows:
• APPLICATION UNBLOCK shall be permanently disabled. The APPLICATION UNBLOCK
command is defined in Appendix G.5.2.
• All applications linked to this application for application blocking shall also be
permanently blocked, and APPLICATION UNBLOCK shall be permanently disabled for
those linked applications. Applications may have been linked as defined in [VIS].
• Cryptographic operations shall be disabled.
• The application shall respond to the SELECT command with SW1 SW2 = '6283' (indicating
application blocked).
• The application shall respond to the GET PROCESSING OPTIONS command with error SW1
SW2 = '6985', which permits another application to be selected.
This section defines some of the personalization requirements for card applications.
Personalization of the card application shall conform to these requirements, but the card
application need not enforce personalization requirements.
The Application Interchange Profile (AIP) returned for the qVSDC path shall:
• Indicate MSD is not supported by card (AIP byte 2 bit 8 is 0b).
• If fDDA supported by card, then indicate ‘DDA is supported’ by card (AIP byte 1 bit 6
is 1b).
• Indicate that the AIP is for a 'Contactless transaction' (AIP byte 2 bit 6 is 1b).
The card shall not be personalized to support both the Low Value Check (CAP byte 1 bit 8
is 1b) and the Low Value AND CTTA Check (CAP byte 1 bit 7 is 1b).
The CVV present in the magnetic stripe shall not be personalized in the track data on the
chip. It is recommended that the iCVV be used in the track data returned for qVSDC
transactions.
The iCVV was developed for contact chip to prevent the skimming of track data from the chip
and using it to make a magnetic stripe card. Using the iCVV for track data for contactless
transactions serves the same purpose.
Application Selection is performed immediately after activation of the contactless card, and is
the process of determining which of the applications that are supported by both the card and
reader will be used to conduct the transaction. This process is performed in two steps:
1. The reader builds a candidate list of mutually supported applications.
2. A single application from the candidate list is identified and selected to process the
transaction.
The Application Selection procedure performed by the reader is defined in section 5.5
Application Selection.
The card shall support the SELECT command, as defined in Appendix G of this specification.
The card shall accept a SELECT command using the AID, whether or not that command was
immediately preceded by a SELECT of the PPSE.
To facilitate Application Selection using the Directory Selection Method, support for the PPSE
is required.
The card shall support the Proximity Payment System Environment (PPSE). The PPSE is a DDF
with the name '2PAY.SYS.DDF01' that contains a list of the applications supported by the card
over the contactless interface.
The File Control Information (FCI) in the response to the SELECT of the PPSE is defined in
Appendix G.4.
The PPSE shall be personalized on all contactless cards using the file name ‘2PAY.SYS.DDF01’.
The AIDs of the contactless financial applications on the card shall be provided in response to
SELECT of the PPSE within the FCI.
If more than one contactless application is personalized on the card, then the Application
Priority Indicator (tag ’87) shall be personalized in the PPSE Directory Entry (tag ‘61’) for each
application.
Note: It is recommended that, whenever possible, only one application should be listed in the FCI
of the PPSE in order to meet timing requirements. If more than one application is required, the
number of applications should be kept to a minimum.
In addition to the personalization requirements for the PPSE, this section describes (some) of
the personalization requirements that may impact Application Selection processing.
The AID shall have a minimum length of 7 bytes if a single contactless application is
supported.
If multiple contactless applications with the same Visa AID are supported, a minimum length
of 8 bytes shall be personalized to allow for an extension to differentiate between them. For
example:
• A0 00 00 00 03 10 10 01
• A0 00 00 00 03 10 10 02
The card processes the GET PROCESSING OPTIONS command, determines the processing
path, performs issuer risk management checks, and responds to the reader with application
data to process the transaction.
Reader Card
qVSDC
Begin Initiate sup ported b y N
GET PR OCES SING OPTION S command
Application Processing reader?
GPO response
Initialize data SW1 SW2 = ‘6985’
Application Blocked
ch eck
Reader Indicators
Check
Cardhold er
Verification Method
(CVM) Check
Domestic Velocity
Checkin g
Internation al Velocity
Checkin g
Con tactless
Transaction Coun ter
Velocity Checking GET PR OCES SING OPTION S
response
Reader Functionality
Check
Transaction
Decline processing
Disposition – Y
and GPO response
Offline Decline?
Transaction
GPO response
Disposition – Y
SW1 SW2 = ‘6984’
Switch In terface?
Transaction
Disposition – Online processing an d
Y
Online Approval GPO response
Req uest?
The card shall support the GET PROCESSING OPTIONS (GPO) command, as defined in
Appendix G of this specification.
qVSDC does not use the CDOLs, DDOL, or default DDOL from [EMV]. Instead, the card requests
all reader-terminal data necessary for card processing in the PDOL.
The card requests the Terminal Transaction Qualifiers so that it can determine terminal
capabilities and requirements for the transaction. Additional data elements may be requested
in support of cryptogram generation, fDDA signature generation, velocity checks, and
transaction logging.
The PDOL for the contactless interface contains tags necessary to process the qVSDC
transaction, and may include tags other than those described in this specification as the
minimum required. Issuers should balance the benefits of requesting additional data in the
PDOL against the impact the additional data transfer and processing will have on transaction
performance.
The minimum content of the PDOL required for qVSDC is dependent on the Cryptogram
Version Number supported (17 or 10/18/'22' or proprietary cryptogram) and whether the card
supports offline qVSDC transactions.
The minimum content for the PDOL described in this section is shown as a function of the
Cryptogram Version Number and whether or not the qVSDC path is offline capable. However,
additional data may be required in the PDOL for other card processing. For example, the
Terminal Country Code tag and length may be necessary in the PDOL to support velocity
checks using the terminal country code.
The card application shall be capable of parsing the GPO command message data field to
retrieve the reader data elements requested by the card in the PDOL. The reader data
elements requested by the card in the PDOL are used in subsequent transaction processing.
In addition to the tags and lengths defined as the minimum required, the card application
shall allow for the personalization of additional tags (and corresponding lengths) in the
PDOL.
58 Visa Confidential January 2016
Notice: This information is proprietary and CONFIDENTIAL to Visa. It is distributed to Visa participants for use exclusively in managing their Visa
programs. It must not be duplicated, published, distributed or disclosed, in whole or in part, to merchants, cardholders or any other person without
prior written permission from Visa. © 2007-2016 Visa. All Rights Reserved.
6 Card Requirements
Visa Contactless Payment Specification: Visa Supplemental Requirements
For example, the additional tags may be used in support of card velocity checks and
transaction logging.
Additional reader-terminal data elements requested by the card application in the PDOL and
not used during card processing are ignored by the card.
Note: For dual-interface cards, a different PDOL may be personalized for the contact interface,
as defined in Appendix I.2.
The minimum PDOL content, as a function of the Cryptogram Version Number and offline
capability of the card application, is shown in the following table.
A "" mark indicates that the tag and length of the data element is required in the PDOL.
Tag Length Data Element Name CVN17 Online CVN17 Offline CVN10 and
Only Enabled CVN18 and
CVN'22'
Note: Req 6.37 (Refunds and Credits Check) requires the Transaction Type.
Additional tags may be personalized in the PDOL, but issuers should be aware that VCPS
readers may not contain all [EMV] terminal data elements. The reader processes unknown tags
according to [EMV] Data Object List processing rules.
In order to determine whether it should proceed with the transaction, the card determines
whether the reader supports qVSDC.
If qVSDC is supported by the reader (TTQ byte 1 bit 6 is 1b), then the card shall proceed with
qVSDC transaction processing.
Else (No Matching Contactless Transaction Path), the card shall respond to the GPO
command with error SW1 SW2 = '6985' (indicating that the reader should attempt to select
another application).
The card performs qVSDC Card Action Analysis to determine its transaction disposition and
responds to the GPO command accordingly. Checks and processing are performed in the order
shown.
Implementations are not required to strictly follow the processing described in this section, so
long as they behave in a way that is indistinguishable (seen as a black box responding to the
command) from the behavior described.
The following card internal indicators are set during qVSDC Card Action Analysis based on
processing and issuer risk management parameters. After completing card risk management
processing checks, the internal indicators are evaluated to determine the card’s transaction
disposition. The card internal indicators are initialized at the start of qVSDC Card Risk
Management Processing.
Other Indicators:
• Matching Currency Indicator
• International Transaction Indicator
• Contact Chip Supported Indicator
• Issuer Update Processing Supported Indicator
• Last Contactless Application Cryptogram Valid Indicator
The card performs qVSDC risk management checks to determine its transaction disposition.
Initialization of Data
Prior to performing qVSDC risk management checks, the card initializes the value of its internal
data elements.
Note: Explicit initialization of some card internal data elements listed in this section may not be
necessary, if the transient nature of those internal data elements results in their already being
initialized to zero.
The card compares the Transaction Currency Code with 1) the Application Currency Code,
and with 2) the Conversion Currency Codes in the Currency Conversion Parameters. The
transaction is a matching currency transaction if the Transaction Currency Code matches the
Application Currency Code, or matches any of the Conversion Currency Codes in the
Currency Conversion Parameters.
If the Transaction Currency Code matches the Application Currency Code, then the card shall
set the Matching Currency Indicator to 1 and shall set the Amount, Approximated to the
value of the Amount, Authorized.
Else (the Transaction Currency Code does not match the Application Currency Code), if the
Transaction Currency Code matches any of the Conversion Currency Codes in the Currency
Conversion Parameters, then the card shall:
• Set the Matching Currency Indicator to 1.
• The card shall calculate the (approximate) value of the transaction in the application
currency using the Currency Conversion Factor associated with the matching Conversion
Currency Code, and shall set the Amount, Approximated to that calculated value.
Note: For an example of the conversion calculation, please see [VIS] section 11.4.3.9.
January 2016 Visa Confidential 61
Notice: This information is proprietary and CONFIDENTIAL to Visa. It is distributed to Visa participants for use exclusively in managing their Visa
programs. It must not be duplicated, published, distributed or disclosed, in whole or in part, to merchants, cardholders or any other person without
prior written permission from Visa. © 2007-2016 Visa. All Rights Reserved.
6 Card Requirements
Visa Contactless Payment Specification: Visa Supplemental Requirements
Else (neither of the above is true), the card shall reset the Matching Currency Indicator to 0.
Note: If the Transaction Currency Code and/or Application Currency Code are not present, then
the condition evaluates to FALSE. Recall that if a card condition evaluates a data element that is
not present, then the condition evaluates to FALSE. See section 3.1.6 Presence of Data Elements.
This particular check is only explicitly noted to remind the reader of this convention, and it is
not noted again for subsequent card application conditions and actions.
Transactions where the Transaction Currency Code does not match the Application Currency
Code or any of the supported Conversion Currency Codes are international transactions.
Additionally, the issuer may configure the application such that transactions where the
Terminal Country Code does not match the Issuer Country Code are also international
transactions.
If either of the following is true:
• Matching Currency Indicator is 0
• ‘Include country code in determining international transactions’ supported by card (CAP
byte 2 bit 8 is 1b) and the Terminal Country Code does not match the Issuer Country Code
Then the card shall set the International Transaction Indicator to 1.
Else, the card shall reset the International Transaction Indicator to 0.
If Issuer Update Processing supported by card (CAP byte 2 bit 5 is 1b) and Issuer Update
Processing supported by reader (TTQ byte 3 bit 8 is 1b), then the card shall set the Issuer
Update Processing Supported Indicator to 1.
Else, the card shall reset the Issuer Update Processing Supported Indicator to 0.
The card shall reset CTQ byte 1 bits 8-7 to 00b (indicating Online PIN Not Required and
Signature Not Required) and CTQ byte 2 bit 8 to 0b (indicating CDCVM Not Performed).
The card shall set CVR bytes 2-4 to '80 00 00' (indicating Second GENERATE AC not
requested) and, if present, CVR byte 5 to '00'. CVR byte 1 is Unchanging and does not change
from transaction to transaction.
• If CDCVM supported by card (CAP byte 3 bit 4 is 1b), then the card shall set the CVR
'CDCVM successfully performed' bit(s) to 1b.
Note: In IAD Format 2 there are two 'CDCVM successfully performed' bits in the CVR, and
the card must set both bits to 1b.
• If the card supports IAD Format 2 and the ADA ‘Secure Messaging uses EMV Session key-
based derivation’ bit is 1b, then the card shall set the CVR ‘Secure Messaging uses EMV
Session key-based derivation’ bit to 1b.
If the card supports Issuer Update Processing (CAP byte 2 bit 5 is 1b), then the card shall:
• Set CVR byte 3 bit 4 to the value of the Issuer Authentication Failure Indicator.
• Set CVR byte 4 bit 4 to the value of the Issuer Script Failure Indicator.
• Set CVR byte 4 bits 8-5 to the value of the Issuer Script Command Counter using identical
bit settings.
• If the reader supports Issuer Update Processing (TTQ byte 3 bit 8 is 1b), then the payment
application shall indicate that both the payment application and reader support Issuer
Update Processing (set Issuer Discretionary Data Identifier bit 8 to 1b).
Note: Setting of the Issuer Discretionary Data Identifier (IDD ID) is only performed if the IDD
ID is personalized.
The card shall reset the Cryptogram Information Data (CID) to '00'.
Application Blocked
If the application is blocked, then the card shall set the Decline Required by Card Indicator
to 1.
If the Transaction Type is '2x' (Refunds/Credits), then the card shall set the Decline Required
by Card Indicator to 1.
Reader Indicators
If Online Cryptogram required by reader (TTQ byte 2 bit 8 is 1b), then the card shall set the
Online Required by Card Indicator to 1.
The card determines if a CVM is required for the transaction. A CVM is required for the
transaction if either the card or reader require a CVM.
If a CVM is required for the transaction, then the card shall attempt to select a common CVM
supported by both itself and the reader, as defined in this requirement. If there is more than
one CVM supported by both the card and the reader, the selected CVM is chosen based on
the following defined CVM hierarchy: 1) Online PIN, 2) (Contact Chip) Offline PIN, 3) CDCVM,
or 4) Signature.
Note: ‘(Contact Chip) Offline PIN’ is not a CVM used for contactless transactions, but is instead
used to permit issuer preference to switch to a contact chip transaction when a CVM is required.
Note: Cards personalized to support CDCVM will always consider CDCVM to have been
successfully performed. For example, this behavior may be desired for cards that only activate
the contactless interface after on-card verification has been successfully performed, or where
cardholder verification is performed "out-of-band" by the issuer.
If both of the following are true:
• Online PIN supported by reader (TTQ byte 1 bit 3 is 1b)
• and either of the following is true:
̵ Domestic transaction (International Transaction Indicator is 0) and Online PIN
supported by card for domestic transactions (CAP byte 3 bit 8 is 1b)
̵ International transaction (International Transaction Indicator is 1) and Online PIN
supported by card for international transactions (CAP byte 3 bit 7 is 1b)
Then the card shall:
• Indicate Online PIN Required (set CTQ byte 1 bit 8 to 1b).
• Set the Online Required by Card Indicator to 1.
Else, if both of the following are true:
• (Contact Chip) Offline PIN supported by reader (TTQ byte 2 bit 6 is 1b)
• and (Contact Chip) Offline PIN supported by card (CAP byte 3 bit 6 is 1b)
Then the card shall set the Switch Interface Required by Card Indicator to 1.
Else, if both of the following are true:
• CDCVM supported by reader (TTQ byte 3 bit 7 is 1b)
• and CDCVM supported by card (CAP byte 3 bit 4 is 1b)
This check shall be performed if the Low Value Check is supported by the card (CAP byte 1
bit 8 is 1b).
If any of the following is true:
• Amount, Approximated is greater than VLP Available Funds
• or Amount, Approximated is greater than VLP Single Transaction Limit
Then the card shall:
• Set CVR byte 3 bit 6 to 1b (Exceeded velocity checking counters).
• If the Contact Chip Supported Indicator is 1, then the card shall set the Switch Interface
Required by Card Indicator to 1.
Else, the card shall set the Online Required by Card Indicator to 1.
Else, if Amount, Approximated is greater than or equal to VLP Available Funds minus VLP
Reset Threshold, then the card shall:
• Set CVR byte 3 bit 6 to 1b (Exceeded velocity checking counters).
• If the Contact Chip Supported Indicator is 1, then the card shall set the Switch Interface
Required by Card Indicator to 1.
Else, if the Issuer Update Processing Supported Indicator is 1, then the card shall set the
Online Required by Card Indicator to 1.
Else, if the CAP 'Card Prefers Online' bit is 1b, then the card shall set the Online Preferred
by Card Indicator to 1.
This check shall be performed if the Low Value AND CTTA Check is supported by the card
(CAP byte 1 bit 7 is 1b).
If any of the following is true:
• Amount, Approximated is greater than CTTA Funds
• or Amount, Approximated is greater than VLP Available Funds
• or Amount, Approximated is greater than VLP Single Transaction Limit
Then the card shall:
• Set CVR byte 3 bit 6 to 1b (Exceeded velocity checking counters).
• If the Contact Chip Supported Indicator is 1, then the card shall set the Switch Interface
Required by Card Indicator to 1.
Else, the card shall set the Online Required by Card Indicator to 1.
Else, if any of the following is true:
• Amount, Approximated is greater than the Cumulative Total Transaction Amount Limit
(CTTAL) minus the Cumulative Total Transaction Amount (CTTA)
• or Amount, Approximated is greater than or equal to VLP Available Funds minus VLP
Reset Threshold
Then the card shall:
• Set CVR byte 3 bit 6 to 1b (Exceeded velocity checking counters).
• If the Contact Chip Supported Indicator is 1, then the card shall set the Switch Interface
Required by Card Indicator to 1.
Else, if the Issuer Update Processing Supported Indicator is 1, then the card shall set the
Online Required by Card Indicator to 1.
Else, if the CAP 'Card Prefers Online' bit is 1b, then the card shall set the Online Preferred
by Card Indicator to 1.
If neither of the low value checks is supported (CAP byte 1 bits 8-7 are 00b), then the card
shall set the Online Required by Card Indicator to 1.
This set of checks shall be performed for international transactions (International Transaction
Indicator is 1).
If international transactions are not allowed (CAP byte 2 bit 7 is 1b), then the card shall:
• If the Contact Chip Supported Indicator is 1, then the card shall set the Switch Interface
Required by Card Indicator to 1.
Else, the card shall set the Decline Required by Card Indicator to 1.
If offline international transactions are not allowed (CAP byte 1 bit 3 is 0b), then the card
shall:
• If Online supported by reader (TTQ byte 1 bit 4 is 0b), then the card shall set the Online
Required by Card Indicator to 1.
Else, if the Contact Chip Supported Indicator is 1, then the card shall set the Switch
Interface Required by Card Indicator to 1.
Else, the card shall set the Decline Required by Card Indicator to 1.
If the Contactless Transaction Counter (CLTC) is greater than or equal to the Contactless
Transaction Counter Upper Limit (CLTCUL), then the card shall:
• Set CVR byte 3 bit 6 to 1b (Exceeded velocity checking counters).
• If the Contact Chip Supported Indicator is 1, then the card shall set the Switch Interface
Required by Card Indicator to 1.
Else, the card shall set the Online Required by Card Indicator to 1.
Else, if the Contactless Transaction Counter (CLTC) is greater than or equal to the Contactless
Transaction Counter Lower Limit (CLTCLL), then the card shall:
• Set CVR byte 3 bit 6 to 1b (Exceeded velocity checking counters).
• If the Contact Chip Supported Indicator is 1, then the card shall set the Switch Interface
Required by Card Indicator to 1.
Else, if the Issuer Update Processing Supported Indicator is 1, then the card shall set the
Online Required by Card Indicator to 1.
Else, if the CAP 'Card Prefers Online' bit is 1b, then the card shall set the Online Preferred
by Card Indicator to 1.
This section contains checks to determine whether the possible transaction outcome indicated
by the transaction disposition indicators should be revised, based on supported reader
functionality.
Offline-Only Reader
This check shall be performed if the Reader is Offline-Only (TTQ byte 1 bit 4 is 1b).
If the Online Required by Card Indicator is 1, then the card shall set the Decline Required by
Card Indicator to 1.
At the completion of qVSDC risk management processing checks, the card shall examine its
internal indicators to determine the transaction disposition. The hierarchy of transaction
dispositions is shown in sequence below, and the card transaction disposition shall be the first
transaction disposition where the corresponding indicator is set.
As specified in Req 6.5, if Card Action Analysis results in a transaction disposition with a
disabled GPO response, then the card does not perform the processing for the transaction
disposition defined below and instead responds with error SW1 SW2 = '6985'.
The card shall perform the following processing if the Decline Required by Card Indicator is 1.
The card shall perform the following processing if the Switch Interface Required by Card
Indicator is 1.
The card shall respond to the GPO command with error SW1 SW2 = '6984' (indicating that
the reader should switch to another interface).
The card shall perform the following processing if the Online Required by Card Indicator is 1 or
the Online Preferred by Card Indicator is 1.
Note: Req 6.51 has been deleted. Consequently, the card commits the data elements updated in
this section to persistent memory at the conclusion of GPO command processing.
If ‘Count qVSDC online transactions’ is supported by card (CAP byte 1 bit 6 is 1b), then the
card shall increment the Contactless Transaction Counter (CLTC) by one.
If none of the transaction disposition indicators above indicate that another transaction
disposition is required, the card shall request offline approval processing.
Although Req 6.54 (Tearing Protection - Offline Approval Request) involves processing for the
READ RECORD command, it is presented here as it has significant impact to processing of the
GPO command for offline requested transactions. Card and reader communications for offline
requested transactions are not complete until the last record has been read, thus the data
elements updated in this section shall not be committed until the last record has been read. As
a consequence, there exists the possibility for transaction tearing even after the GPO response
has been sent. The Tearing Protection requirement in this section attempts to minimize the
impact of tearing by not committing updated card data elements until the final READ RECORD
response is sent.
The card shall not commit the data elements updated in this section (Transaction Disposition
– Offline Approval Request) to persistent memory until immediately prior to sending the
READ RECORD response for the last record, with the exception of the Application Transaction
Counter (as increment of the ATC is effective immediately). The last record is indicated by the
Application File Locator.
If the International Transaction Indicator is 1, then the card shall increment the Consecutive
Transaction Counter International (CTCI) by one.
If ‘Count qVSDC offline transactions’ is supported by card (CAP byte 2 bit 4 is 0b), then the
card shall increment the Contactless Transaction Counter (CLTC) by one.
A number of the data elements shown in the qVSDC GPO response may be returned in either the GPO response or in a record, at
issuer discretion. For the purposes of reduced transaction times, it is recommended that these data elements be returned in the
GPO response unless they are part of the static data to be signed. However, if there is insufficient space in the GPO response to
return all the data elements, then it will be necessary to return some of the data elements in records.
Note: Although VCPS compliant readers are required to be able to handle receiving additional data elements in the GPO response
even if they are not explicitly listed in the table below, it is recommended that issuers do not personalize any additional data elements
in the GPO response beyond what is shown in the table below, in order to avoid potential interoperability issues with older readers.
Note: Readers compliant to this specification do not perform Offline Data Authentication (ODA) for qVSDC transaction disposition
Online and Decline, hence record data is not needed to complete the transaction.
'94' Application File Locator var. Always If returning record data Always
(AFL)
'57' Track 2 Equivalent Data var. up to Shall be returned in either the Always Shall be returned in either the
19 bytes GPO response or in a record. GPO response or in a record.
'5F20' Cardholder Name var. 2- 26 May be returned in either the May be returned in either the May be returned in either the
bytes GPO response or in a record. GPO response or in a record. GPO response or in a record.
'5F34' Application PAN 1 byte May be returned in either the May be returned in either the May be returned in either the
Sequence Number (PSN) GPO response or in a record. GPO response or in a record. GPO response or in a record.
'9F4B' Signed Dynamic Nic bytes If the SDAD is generated by Never If the SDAD is generated by
Application Data (SDAD) the application, then it shall be the application, then it shall be
returned in either the GPO returned in either the GPO
response or in a record. response or in a record.
'9F5D' Available Offline 6 bytes The AOSA shall be returned in the GPO response if all of the following are true:
Spending Amount (AOSA) • Return AOSA supported by card (CAP byte 1 bit 1 is 1b)
• and the Transaction Currency Code matches the Application Currency Code
'9F6C' Card Transaction 2 bytes If using CTQ functionality If using CTQ functionality If using CTQ functionality
Qualifiers (CTQ)
'9F6E' Form Factor Indicator 4 bytes Shall be returned in either the Shall be returned in either the Shall be returned in either the
(FFI) GPO response or in a record. GPO response or in a record. GPO response or in a record.
'9F7C' Customer Exclusive Data var. up to May be returned in either the May be returned in either the May be returned in either the
(CED) 32 bytes GPO response or in a record. GPO response or in a record. GPO response or in a record.
During Read Application Data, the reader uses the READ RECORD command to retrieve the
card data necessary to process the transaction. The card receives the READ RECORD command
from the reader and returns the requested record.
To facilitate Read Application Data, support for the READ RECORD command is required.
The card shall support the READ RECORD command, as defined in Appendix G of this
specification.
The card shall support the personalization and return of the Card Authentication Related
Data (tag '9F69') and Signed Dynamic Application Data (tag '9F4B') in records, as
personalized by the issuer. Unlike the other data elements normally returned in records, the
value of these data elements are conditionally generated by the card application for each
transaction.
The card shall be capable of knowing when the last record is read. The last record is indicated
by the Application File Locator (AFL).
For transactions where fDDA is performed, the Card Authentication Related Data (tag '9F69')
shall be generated and present in the last record, prior to responding to the READ RECORD
command for the last record.
The Card Authentication Related Data contains the (card) Unpredictable Number, generated
by the card prior to generation of the Signed Dynamic Application Data.
Note: The card will not know whether the reader successfully received the final READ RECORD
response. This means that tearing is still possible and if it occurs, it will negatively affect the
available offline balance. The time window for such an occurrence has been minimized. The
reader may still decline the transaction if the expiration date or offline data authentication
checks fail, but this should rarely occur for genuine cards.
The card application shall commit the data elements updated in section 6.4.4.3 to persistent
memory immediately prior to sending the READ RECORD response for the last record.
Issuer-Optional: If implemented, support for Issuer Update Processing is issuer optional. Card
support for Issuer Update Processing is indicated by setting CAP byte 2 bit 5 to 1b. ‘Card
supports Issuer Update Processing at the POS’ is indicated in CTQ byte 2 bit 7.
Note: As there is no GPO command issued during Issuer Update Processing, the Authorization
Response Cryptogram (ARPC) and issuer script MAC(s) are generated by the issuer using the ATC
returned during Initiate Application Processing (and sent in the online message).
Note: Card applications that support Issuer Update Processing can process issuer update
commands regardless of the setting of CAP byte 2 bit 5. This bit is used simply to indicate to the
card application that Issuer Update Processing is supported to allow for the card application to
set the appropriate indicators and CVR bits, and does not control whether the card application
can process issuer update commands.
If the card application supports Issuer Update Processing, support for the Issuer Update
commands is required:
The card shall support the Issuer Update commands, as defined in Appendix G.5 of this
specification.
Upon receipt of the EXTERNAL AUTHENTICATE command, the card shall process the command
according to the procedure defined in this section.
Figure 6–2: EXTERNAL AUTHENTICATE Processing (Card) briefly outlines card application
Issuer Authentication processing when the EXTERNAL AUTHENTICATE command is received.
Reader Card
EXTE RNAL AUTHENT IC ATE Last Contactless
Begin EXTER N AL EXTER N AL AU THEN TICA TE command previously Application
N N
AU THEN TICA TE command received for ATC Cryptogram Valid
value? Indicator = 0?
CVN10 Cryptogram
or CVN17 Version
Number?
CVN18 or CVN22
Generated Generated
EXT AUTH response
cryptogram = N N cryptogram =
SW1 SW2 = ‘6300’
ARPC? ARPC?
Y Y
“Set Offline
Set velocity counters to Counters to
Y
their upper limits Upper Offline
Limits”?
EXTER N AL AU THEN TICA TE
response N
“Reset Offline
Reset velocity counters
Y Counters to
to zero
Zero”?
The card shall permit at most one EXTERNAL AUTHENTICATE command per ATC value. If an
EXTERNAL AUTHENTICATE command was previously received for the ATC value, then the
card shall:
• Set the Issuer Authentication Failure Indicator to 1.
• Discontinue processing the command and respond with SW1 SW2 = '6985'.
If the Last Contactless Application Cryptogram Valid Indicator is 0, then the card shall:
• Set the Issuer Authentication Failure Indicator to 1.
• Discontinue processing the command and respond with SW1 SW2 = '6985'.
The card shall perform the procedure specified in this section for Cryptogram Version
Number 10 and Cryptogram Version Number 17.
The card shall process the EXTERNAL AUTHENTICATE command and issue the response
according to [VIS] section 12.4.3, with the following exception(s):
• The Last Contactless Application Cryptogram shall be used instead of the “ARQC returned
in the first GENERATE AC response...”
• The algorithm is applicable to CVN17 (in addition to CVN10).
Prior to responding to the EXTERNAL AUTHENTICATE command, the card application shall
determine whether the following counters and indicators are to be updated.
Prior to responding to the EXTERNAL AUTHENTICATE command, the card application shall
determine whether the following counters and indicators are reset.
If both of the following are true:
• Issuer Authentication is successfully performed
• and Authorization Response Code is 00, 10, or 11 (Issuer approval)
Then the card shall update the following indicators and counters:
• Last Online ATC Register to the value of the ATC.
• If ‘Do not reset VLP Available Funds during Issuer Authentication Processing’ (ADA byte 2
bit 1) is 0b, then the card shall set the VLP Available Funds to the VLP Funds Limit.
• If ‘Do not reset CTTA during Issuer Authentication Processing’ (ADA byte 2 bit 2) is 0b,
then the card shall reset the Cumulative Total Transaction Amount (CTTA) to zero.
• Consecutive Transaction Counter (CTC) to zero.
• Consecutive Transaction Counter International (CTCI) to zero.
• Contactless Transaction Counter (CLTC) to zero.
The card shall perform the procedure specified in this section for Cryptogram Version
Number 18 and (if implemented) Cryptogram Version Number '22'.
Compare the generated ARPC to the ARPC received in the Issuer Authentication Data of the
EXTERNAL AUTHENTICATE command.
If the generated ARPC and the ARPC received in the EXTERNAL AUTHENTICATE command data
are the same, then Issuer Authentication is considered successful and the card shall:
• Set the Issuer Authentication Failure Indicator to 0.
• If ‘Issuer Script Command Counter is cyclic’ (ADA byte 3 bit 2) is 0b, then the card shall
reset the Issuer Script Command Counter to zero.
• Set the Issuer Script Failure Indicator to 0.
• If CSU 'Issuer approves online transaction' bit is 1b, then the card shall set the Last Online
ATC Register to the value of the ATC.
• Set the Last Successful Issuer Update ATC Register to the value of the ATC
• Continue processing the command.
The card examines the ‘CSU Created by Proxy for the Issuer’ bit in the CSU and the ‘Use
Default Update Counters in ADA if CSU is generated by a proxy’ in the Application Default
Action (ADA) to determine which of the data elements are used to control the update of
counters.
If ‘CSU Created by Proxy for the Issuer’ (CSU byte 2 bit 3 is 1b) and ‘Use Default Update
Counters in ADA if CSU is generated by a proxy’ (ADA byte 4 bit 8 is 1b), then the card shall
update the counters according to the ADA Default Update Counters (the “counter control” is
ADA byte 4 bits 7-6).
Else, the card shall update the counters according to the CSU Update Counters (the “counter
control” is CSU byte 2 bits 2-1).
The card examines the appropriate counter control, as specified in Req 6.75, to determine
whether counters and indicators should be updated, and how they’re to be updated.
If ‘Set velocity-checking counters to Upper Limits’ indicated (counter control has the value
01b), then the card shall update the counters to the value of the associated upper limit as
follows:
• If ‘Do not reset VLP Available Funds during Issuer Authentication Processing’ (ADA byte 2
bit 1) is 0b, then the card shall reset the VLP Available Funds to zero.
• If ‘Do not reset CTTA during Issuer Authentication Processing’ (ADA byte 2 bit 2) is 0b,
then the card shall set the Cumulative Total Transaction Amount (CTTA) to the Cumulative
Total Transaction Amount Upper Limit (CTTAUL).
• Consecutive Transaction Counter (CTC) to Consecutive Transaction Counter Upper Limit
(CTCUL).
• Consecutive Transaction Counter International (CTCI) to Consecutive Transaction
International Upper Limit (CTIUL).
• Contactless Transaction Counter (CLTC) to Contactless Transaction Counter Upper Limit
(CLTCUL).
If ‘Reset velocity-checking counters to zero’ indicated (counter control has the value 10b),
then the card shall reset the counters as follows:
• If ‘Do not reset VLP Available Funds during Issuer Authentication Processing’ (ADA byte 2
bit 1) is 0b, then the card shall set the VLP Available Funds to the VLP Funds Limit.
• If ‘Do not reset CTTA during Issuer Authentication Processing’ (ADA byte 2 bit 2) is 0b,
then the card shall reset Cumulative Total Transaction Amount (CTTA) to zero.
• Consecutive Transaction Counter (CTC) to zero.
• Consecutive Transaction Counter International (CTCI) to zero.
• Contactless Transaction Counter (CLTC) to zero.
Note: The ‘Add transaction to velocity-checking counters’ counter control is not supported for
Issuer Update Processing. The transaction parameters necessary to determine the appropriate
counters to update may not be known by the card during Issuer Update Processing.
After Issuer Authentication has been successfully completed and CSU processing performed,
the card shall indicate that Issuer Authentication was successful by responding to the
EXTERNAL AUTHENTICATE command with SW1 SW2 = '9000'.
Issuer script commands are processed by the card application as defined in this section.
Figure 6–3: Issuer Script Command Processing (Card) briefly outlines card application issuer
script processing when an issuer script command is received.
Reader Card
Last Contactless
Issuer script response Application
Y
SW1 SW2 = ‘6985’ Cryptogram Valid
Indicator = 0?
Secure
Issuer script response
N messaging
SW1 SW2 = ‘6987’
present?
MAC
Issuer script response
N successfully
SW1 SW2 = ‘6988’
validated?
Upon receipt of an issuer script command, the card shall process the command according to
the procedure shown below.
When the Issuer Script Command Counter (ISCC) is non-cyclic, the card shall implement one
of the following: 1) increment the ISCC upon receipt of an issuer script command containing
secure messaging (as defined in the latter part of this requirement), or 2) increment the ISCC
after successful performance of the issuer script command (as defined in Req 6.82).
If the Last Contactless Application Cryptogram Valid Indicator is 0, then the card shall:
• Set the Issuer Script Failure Indicator to 1.
• Discontinue processing the command and respond with SW1 SW2 = '6985'.
The card shall perform secure messaging and validate the MAC sent in the secure message,
as defined in Appendix G.6.
If MAC validation is successful, then the card shall perform the issuer script command.
Else (an error occurred during validation of the MAC), the card shall:
• Set the Last Contactless Application Cryptogram Valid Indicator to 0.
• Set the Issuer Script Failure Indicator to 1.
• Discontinue processing the command and respond with SW1 SW2 = '6987' or SW1 SW2 =
'6988':
̵ The card should respond with SW1 SW2 = '6987' if the MAC is missing.
̵ The card should respond with SW1 SW2 = '6988' if the MAC is incorrect.
If ‘Do not reset CTTA during Issuer Authentication Processing’ supported by card (ADA byte 2
bit 2 is 1b) and a PUT DATA command updating the Cumulative Total Transaction Amount
Limit (CTTAL) is successfully performed, then the card shall reset the Cumulative Total
Transaction Amount (CTTA) to zero.
If ‘Do not reset VLP Available Funds during Issuer Authentication Processing’ supported by
card (ADA byte 2 bit 1 is 1b) and a PUT DATA command updating the VLP Funds Limit is
If the card is able to successfully validate the MAC and successfully perform the issuer script
command, then the card shall:
• If the Issuer Script Command Counter is cyclic (ADA byte 3 bit 2 is 1b) or the card is
implemented to increment the non-cyclic Issuer Script Command Counter after successful
performance of an issuer script command, then the card shall increment the Issuer Script
Command Counter by one.
Note: When the Issuer Script Command Counter (ISCC) has a value of 'F', the resulting value
of the ISCC after it is incremented by one is dependent on whether the ISCC is cyclic (ADA
byte 3 bit 2). If the ISCC is cyclic, then incrementing the ISCC by one cycles the value back to
'0'. Otherwise (the ISCC is not cyclic), incrementing the ISCC by one results in the same value
of 'F'.
• Set the Last Online ATC Register to the value of the ATC.
• Set the Last Successful Issuer Update ATC Register to the value of the ATC.
• Respond indicating the issuer script processing result.
Else (Issuer Script command processing is unsuccessful), the card shall:
• Set the Last Contactless Application Cryptogram Valid Indicator to 0.
• Set the Issuer Script Failure Indicator to 1.
• Respond indicating the issuer script processing result.
In addition to signing the (reader) Unpredictable Number, which is signed in most EMV contact
chip applications, fDDA also signs additional transaction dynamic data. The Amount,
Authorized; Transaction Currency Code; and (card) Unpredictable Number are all signed using
fDDA.
To optimize processing power and reduce transaction times, the fDDA dynamic signature is
generated during the GPO command, rather than generating the dynamic signature at the end
of the transaction when the card may be moving away from the reader field.
The card uses the PDOL to request data from the terminal for fDDA. The card receives the
requested data from the reader in the GPO command. The card uses these terminal data
elements, along with card data, to create the dynamic signature.
The AFL returned in the GPO points to records containing the RSA certificates and data related
to fDDA. Once the last record is read by the reader, the card need no longer remain in the
field. The reader then validates the dynamic signature for fDDA. If the validation process fails,
the transaction is declined offline, sent online for authorization, or terminated, dependent on
issuer preference (as indicated in the CTQ).
In order to accommodate the possibility of new fDDA algorithms and inputs, the card data
element fDDA Version Number (part of tag '9F69') is defined to identify the fDDA version used
by the card. The fDDA Version Number is returned by the card and used by the reader to
determine the fDDA version algorithm to perform. In this version of the specification, only
fDDA version '01' is defined and supported.
For cards compliant to this version of the specification, only fDDA version '01' is allowed.
For readers compliant to this version of the specification, only fDDA version '01' is allowed.
For fDDA version '01', the card includes the (Terminal) Unpredictable Number; Amount,
Authorized; and Transaction Currency Code received from the reader in the PDOL, combined
with the card ATC and Card Authentication Related Data into the calculation of the dynamic
signature.
Note: The Static Data Authentication Tag List (tag '9F4A') is supported as defined in [EMV]
Book 3 section 10.3 and [EMV] Book 2 section 6 for fDDA processing.
The concatenation of data and generation of the dynamic signature will be in accordance with
[EMV] Book 2 section 6.5.1 Step #2, with the following exception(s):
• For online authorization requests (ARQC), the Signed Data Format input to the DDA hash
algorithm ([EMV] Book 2 Table 15) shall be the value '95'. The Signed Data Format of '95'
distinguishes the dynamic signature returned for an online authorization request from the
dynamic signature returned for an offline authorization request (where Signed Data Format
'05' is used).
• For offline approval requests (TC), the Signed Data Format input to the DDA hash algorithm
([EMV] Book 2 Table 15) shall continue to be the value '05'.
The Terminal Dynamic Data elements are not specified in the DDOL (as the DDOL is not a
recognized data element for qVSDC). The Terminal Dynamic Data referenced in [EMV] Book 2
Table 15 shall consist of the concatenation of the data elements specified in Table A–1 in the
order specified. fDDA fails if any of the data elements required to support fDDA is missing.
Prior to including the Card Authentication Related Data in the Terminal Dynamic Data, the card
shall generate and include the (card) Unpredictable Number and CTQ in the Card
Authentication Related Data.
Note: If the CTQ is not personalized, then a value of zeros is used in the Card Authentication
Related Data.
The ICC Dynamic Number referenced in the paragraph after [EMV] Book 2 Table 15 shall
consist of the data element value specified in Table A–2.
Table A–1: Terminal Dynamic Data for input to DDA hash algorithm
Table A–2: ICC Dynamic Number for input to DDA hash algorithm
To verify the fDDA dynamic signature, the reader-terminal shall first retrieve the Certification
Authority Public Key Index, as specified in [EMV] Book 2 section 6.2.
Retrieval of the Issuer Public Key shall then be performed by the reader-terminal in accordance
with [EMV] Book 2 section 6.3.
Retrieval of the ICC Public Key shall be performed by the reader-terminal in accordance with
[EMV] Book 2 section 6.4.
DDA-capable qVSDC-capable
Acquirer 10 qVSDC reader 1-8 contactless card
9 supports fDDA
C Cryptogram Versions
Cryptogram Version Number 10 shall be as defined in [VIS] Appendix D, with the following
exception(s):
• Reader-terminal data objects input to the cryptographic algorithm are requested by the
card in the Processing Options Data Object List (PDOL).
[VIS] Appendix D defines the input parameters, keys, and algorithms associated with the
generation of the cryptogram for Cryptogram Version Number 10.
Cryptogram Version Number 17 uses the same algorithm and parameters as Cryptogram
Version Number 10, but differs in that it does not support all of the data elements required for
Cryptogram Version Number 10. Table C–1 lists the data elements in the required order for
Cryptogram Version Number 17.
Cryptogram Version Number 18 and Cryptogram Version Number '22' shall be as defined in
[VIS] Appendix D, with the following exception(s):
[VIS] Appendix D defines the input parameters, keys, and algorithms associated with the
generation of the cryptogram for Cryptogram Version Number 18 and Cryptogram Version
Number '22'.
CVN12, CVN'2C', and CVN50 through 59 have been made available to designate issuer
proprietary cryptogram processing.
CVN12 and CVN50 through CVN59 are supported for IAD Format 0/1/3. CVN'2C' is supported
only for IAD Format 2.
These CVNs shall be as defined in [VIS] Appendix D, with the following exception(s):
• Reader-terminal data objects input to the cryptographic algorithm are requested by the
card in the Processing Options Data Object List (PDOL).
Readers and cards shall comply with the requirements, where specified and applicable, in
Table D–1.
D.1.2 Name
The Name column lists the name of the data element, and also includes the following:
• Format (F) of the data element. The [EMV] defined supported formats are as follows:
- n (numeric)
- cn (compressed numeric)
- b (binary or bit string)
- an (alphanumeric)
- ans (alphanumeric special)
• Tag (T) of the data element in hexadecimal. Tags in the range 'DF00' – 'DFFE' are context
specific data elements that only define the corresponding data element when contained in
the listed template tag. This is shown as “DFxx in BFxx”, where 'DFxx' represents the context
specific data element, and 'BFxx' represents the template tag containing the context specific
data element.
The meaning assigned to a context-specific tag in one template will be different from the
meaning assigned to the same context-specific tag in another template.
Note: A data element that is defined with both a primitive tag and a context specific primitive
tag within a template tag shall reference the same underlying value regardless of the tag
used. The data element value shall be personalizable, updateable, and accessible using either
tag, subject to the specific restrictions for the data element.
• Length (L) of the data element in bytes. The value of the length is shown in decimal. When
the length defined for the data object is greater than the length of the actual data, the
following rules apply:
D.1.3 Requirement
The Requirement column lists the requirements for the data element:
• Mandatory – The data element must always be present and provided to the reader if the
source is the card. If the data element is not received by the reader, then the reader
terminates the transaction.
• Required – The data element must always be present, but the reader does not terminate the
transaction if the data element is not present.
• Conditional – The data element is necessary under the conditions specified.
• Optional – The data element is optional.
This column lists the Update Capability (UC), Issuer Update (IU), Retrieval (R), and Secret data
requirements for data elements that have the card as the source. The following sections further
describe the values for each of these fields.
The Update Capability (UC) entry in this column categorizes card-sourced data into the
following classifications:
• Unchanging—The data element value is set before the first transaction (either by
personalization of a starting value, or to a default value) and shall not change.
Data elements classified as unchanging or persistent may be included as part of an issuer script
command to update a record or larger data element which contains the data element and is
allowed to be updated. However, the value of the unchanging or persistent data element after
update of the record or larger data element shall be the same as the value before the update.
The application is not required to enforce this restriction, it is a requirement on the issuer
script command sent to the application.
For example, the Issuer Application Data may be updated by a PUT DATA command, but the
value of the CVN and DKI after the update shall be the same as the value before the update.
Similarly, the record that contains the Application Expiration Date may be updated, but the
value of the Application Expiration Date after the update must be the same as the value before
the update.
Issuer Update
The Issuer Update (IU) entry in this column shows whether update of the data element is
allowed using an Issuer Update, the command to be used for the update, and any conditions
on the support for update.
The following values are used to indicate support for update of data elements:
Implementations are not required to support Issuer Update of application internal data
elements returned in the GPO response. Implementations are not precluded from supporting
Issuer Update of application internal data elements returned in the GPO response, but support
for any such mechanism is outside the scope of this specification.
Retrieval
The Retrieval (R) entry in this column shows whether the data element may be retrieved by the
reader and the command to be used for the retrieval. If “(SD)” follows the retrieval command,
then the data element shall be retrieved only by special devices and not by readers during
financial transactions. If the column is blank for a data element, support for retrieval of the
data element is optional.
The following values are used to indicate support for retrieval of data elements:
• N/A—indicates that the specification does not define a mechanism to retrieve the data
element (for example, the data element does not have a tag). However, retrieval of the data
element is allowed.
• N—indicates retrieval of the value of the data element shall not be allowed.
• GET DATA—indicates that retrieval of the data element is allowed using the GET DATA
command. The GET DATA command is not used during financial transactions in this version
of the specification.
Secret Data
Data elements identified as Secret in this column shall be stored securely within the card for
each application in one or more proprietary internal files. These data elements shall never be
retrievable by a reader or any outside source and shall never be updated. The following data
elements are secret:
• Unique DEA Key A and Unique DEA Key B
• Data Encipherment DEA Key A and Data Encipherment DEA Key B
• MAC DEA Key A and MAC DEA Key B
• ICC Private Key
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Amount, Required Visa proprietary data element used UC: Transient When the Transaction Currency Code matches a
Approximated in qVSDC Card Action Analysis. IU: N Conversion Currency Code in the Currency
F: n 12 Conversion Parameters, the card application
R: N
calculates the (approximate) value of the
T: –
transaction using the associated Currency
L: 6 Conversion Factor and stores the resulting value
S: Card in the Amount, Approximated.
D: – When the Transaction Currency Code matches
the Application Currency Code, the Amount,
Approximated has the same value as the
Amount, Authorized.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Amounts Data Conditional Visa proprietary data template that UC: Dynamic The following context-specific tags are defined
Template If supported for contains the TLV-coded values for IU: PUT DATA in this specification for the Amounts Data
F: b VIS and Low the CTTA, CTTAL, and CTTAUL. Template:
R: GET DATA (SD)
T: BF58 Value AND CTTA 'DF11' – CTTA
Check supported 'DF21' – CTTAL
L: var.
S: Card 'DF31' – CTTAUL
D: Shared
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Byte 3
Default Action Note: Support for the functionality associated
(ADA) with byte 3 bits 8-6 is conditional on support for
(continued) transaction logging.
bit 8: 1 = Do not include offline approval
requested transactions in the transaction log
bit 7: 1 = Do not include online approval
requested transactions in the transaction log
bit 6: 1 = Include offline declined transactions
in the transaction log
bit 5: 1 = Reset VLP Available Funds to VLP
Funds Limit when Offline PIN successfully
verified
bit 4: Not used for VCPS
bit 3: 1 = Issuer Script MAC Chaining
supported
Note: If issuer scripts commands are supported,
it is highly recommended that byte 3 bit 2 be
set to 1b so that only successful issuer script
commands are counted.
bit 2: 1 = Issuer Script Command Counter is
cyclic
Note: Support for the functionality associated
with byte 3 bit 1 is conditional on support for
[VIS], and allows [VIS] and VCPS applications to
count international transactions using the same
single counter.
bit 1: 1 = CTCI also counts non-matching
country code transactions
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Byte 4
Default Action Note: Support for the functionality associated
(ADA) with byte 4 bits 8-6 is conditional on support for
(continued) Issuer Update Processing and Cryptogram
Version Number 18 or '22'.
bit 8: 1 = Use Default Update Counters in ADA
if CSU is generated by a proxy
bits 7-6: Default Update Counters
00 = Do not update velocity-checking
counters
01 = Set velocity-checking counters to
Upper Limits
10 = Reset velocity-checking counters to
zero
11 = Not used for VCPS
bit 5: 1 = Padding method '80' supported
bits 4-2: Not used for VCPS
bit 1: RFU(0)
– continues –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Byte 5
Default Action bits 8-5: RFU (0000)
(ADA)
bits 4-2: Not used for VCPS
(continued)
bit 1: 1 = Secure Messaging uses EMV Session
key-based derivation
Note: Support for the functionality associated
with ADA Byte 5 bit 1 is conditional on support
of IAD Format 2 and Issuer Scripting. If the
application does not support IAD Format 2 or
does not support Issuer Scripts, this bit is RFU
(0). The functionality associated with ADA Byte
5 bit 1 is described in [VIS].
Byte 6: RFU ('00')
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application File Conditional Indicates the location (SFI, range of UC: Unchanging For each file to be read, the Application File
Locator (AFL) If returning record records) of the AEFs related to a IU: N Locator contains the following four bytes:
F: var. data for the given application. Byte 1:
R: GPO
T: 94 transaction As with all data elements returned bits 8-4 = SFI
in the GPO response, the card
L: var. up to 252 The Update Capability and bits 3-1 = 000
application supports personalization
S: Card of different AFL data elements for Update of the AFLs for VCPS Byte 2: First (or only) record number to be read
D: Exclusive use in the following GPO responses: may not be the same as the for that SFI (never equal to zero)
AFLs for VIS. Byte 3: Last record number to be reader for that
• qVSDC Offline GPO Response (if
offline implemented) SFI (shall be greater than or equal to byte 2)
• qVSDC Online with ODA GPO Byte 4: Number of consecutive records involved
Response in authentication of static data, starting with
• qVSDC Online/Decline without record number in byte 2 (may range from zero
ODA GPO Response to the value of the third byte minus the value of
the second byte + 1)
Application Mandatory The ADF Name identifies the UC: Unchanging The Visa RID is 'A000000003'.
Identifier (ADF application as described in IU: N The global Visa AIDs are:
Name) [ISO 7816-5]. The AID is made up of
R: SELECT 'A0000000031010': Visa Debit or Credit
F: b 40-128 the Registered Application Provider
Identifier (RID) and the Proprietary 'A0000000032010': Visa Electron
T: 4F
Identifier Extension (PIX). 'A0000000033010': Interlink
L: 5-16
'A0000000038010': PLUS
S: Card
D: Shared
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Mandatory Indicates the capabilities of the card UC: Unchanging Byte 1
Interchange to support specific functions in the IU: N bit 8: RFU (0)
Profile (AIP) application.
R: GPO bit 7: 1 = SDA is supported (for online
F: b 16 VCPS readers shall not act on AIP authorizations)
T: 82 bit settings that are not supported
The Update Capability and Note: This bit indicates that a variant of SDA
for VCPS or that are Reserved for
L: 2 Update of the AIPs for VCPS may be supported when the card returns offline
Future Use (RFU).
S: Card may not be the same as the authentication data for online authorizations
As with all data elements returned (see the "Signed Static Application Data" entry
D: Exclusive AIPs for VIS.
in the GPO response, the card in this data dictionary). This variant of SDA
application supports personalization cannot be used for offline authorization
of different AIP data elements for requests.
use in the following GPO responses:
bit 6: 1 = DDA is supported
• qVSDC Offline GPO Response (if
bit 5: Not used for VCPS
offline implemented)
bit 4: Not used for VCPS
• qVSDC Online with ODA GPO
Response bit 3: Not used for VCPS
• qVSDC Online/Decline without bit 2: Not used for VCPS
ODA GPO Response bit 1: Not used for VCPS
Byte 2
bit 8: 1 = MSD is supported
bit 7: 1 = Mobile handset
bit 6: 1 = Contactless transaction
bits 5-1: RFU (00000)
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Conditional Visa proprietary data template that UC: Dynamic The following context specific tags are defined
Internal Data If Application contains Visa proprietary context IU: PUT DATA in this specification for the Application Internal
Template Capabilities specific tags for application internal Data Template:
R: GET DATA (SD)
F: b supported data. 'DF01' – Application Capabilities
T: BF5B
L: var.
S: Card
D: –
* (special
characters limited
to spaces)
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Conditional Valid cardholder account number. UC: Unchanging If the value of the Application PAN does not
Primary Account If fDDA supported For transactions where Offline Data IU: N match the account number in Track 2 Equivalent
Number (PAN) Authentication is performed, the Data (tag '57'), the reader shall terminate the
R: READ RECORD
F: var. up to cn 19 Application PAN is returned. transaction.
Application Optional Identifies and differentiates card UC: Unchanging Note: Although this field is optional in the card,
Primary Account applications with the same PAN. IU: N if it is present in the card it is sent in online
Number messages. If it is not sent in online messages, the
R: GPO, READ RECORD
Sequence value is assumed to be '00' for key derivations.
Number (PSN)
F: n 2
T: 5F34
L: 1
S: Card
D: E or S
Application Conditional Indicates the priority of a given UC: Unchanging bit 8: Not used for VCPS
Priority Indicator If multiple application or group of applications IU: N bits 7-5: RFU (000)
F: b 8 contactless in a directory.
R: SELECT bits 4-1:
T: 87 payment
0000 = No priority assigned
applications on
L: 1 xxxx = Order in which the application is to be
card
S: Card selected, ranging from 1 to 15, with 1 being
D: E or S the highest priority
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Optional Market-proprietary data that may UC: Unchanging The value field of the Application Selection
Selection be required by local regulatory IU: N Registered Proprietary Data follows the
Registered authority to offer specific services following format:
R: SELECT
Proprietary Data based on this information, as ID1, L1, V1, ID2, L2, V2,…
(ASRPD) defined in [EMV ASRPD].
Where
F: b The Application Selection
• IDn is a two byte Proprietary Data Identifier,
T: 9F0A Registered Proprietary Data may be
registered by EMVCo. IDs have no structure
returned by the card during
L: var. (they are not BER-TLV tags), and may appear
Application Selection – that is, it
S: Card in any order within the ASRPD.
may be present in one or both of
D: E or S the following: • Ln is the length of the value field coded in 1
byte (0 to 255).
• In any Directory Entry (tag '61')
• Vn is the value field. Its content is
within the FCI of the PPSE.
proprietary and format is out of scope of
• In the FCI Issuer Directory
EMVCo.
Discretionary Data (tag 'BF0C')
within the FCI of the ADF. See [EMV ASRPD] for additional information.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Application Mandatory Count of the number of transactions UC: Persistent Implementations may support personalizing the
Transaction initiated since personalization. IU: N ATC with an initial value. Initial value is zero
Counter (ATC) Maintained by the application in the unless optionally personalized to an initial
R: GET DATA (SD), GPO
F: b 16 card. starting value.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Authorization Conditional Indicates the transaction disposition N/A Codes generated by the issuer are as indicated
Response Code If Issuer Update of the transaction received from the in [ISO 8583]:1987.
(ARC) Processing issuer for online authorizations. • 00, 10, or 11 indicates an issuer approval.
F: an 2 supported • 01 or 02 indicates an issuer referral.
T: 8A • An ARC other than the ones listed above
L: 2 indicates an issuer decline.
S:Issuer/Reader The following codes are generated by the
reader-terminal for the following conditions:
D: –
• Y1 = Offline approved
• Z1 = Offline declined
• Y3 = Unable to go online (offline approved)
• Z3 = Unable to go online (offline declined)
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Available Offline Optional Visa proprietary data element UC: Transient Inclusion of this data element in the GPO
Spending indicating the remaining amount IU: N response is permitted if CAP byte 1 bit 1 is 1b.
Amount (AOSA) available to be spent offline. Note: Inclusion of the AOSA value in the Issuer
R: GPO
F: n 12 The AOSA is a calculated field used Discretionary Data is configured using the IDD
T: 9F5D to allow the reader to print or Options (as defined in Appendix E), and is not
display the amount of offline spend dependent on the setting of CAP byte 1 bit 1.
L: 6
that is available on the card. The Available Offline Spending Amount shall be
S: Card
calculated as follows:
D: Shared
If ‘Low Value Check supported’ by card (CAP
byte 1 bit 8 is 1b), then
AOSA = VLP Available Funds.
Else, If ‘Low Value AND CTTA Check
supported’ by card (CAP byte 1 bit 7 is 1b):
AOSA = CTTA Funds
Else, AOSA = CTTAL – CTTA
If the AOSA cannot be calculated or is a
negative value, then the card shall return the
AOSA as a value of all zeros.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Card Conditional Contains the fDDA Version Number, UC: Unchanging (byte 1) Byte 1: fDDA Version Number ('01')
Authentication If fDDA supported Card Unpredictable Number, and Transient (bytes 2-7) Byte 2-5: (Card) Unpredictable Number
Related Data Card Transaction Qualifiers.
IU: N Byte 6-7: Card Transaction Qualifiers
F: b For transactions where fDDA is
R: READ RECORD In this version of the specification, the Card
T: 9F69 performed, the Card Authentication
Authentication Related Data personalized on
Related Data is returned in the last
L: var. 5-16 the card has a length of 7 bytes, and is
record specified by the Application
S: Card personalized with the value:
File Locator for that transaction.
D: – '01 00 00 00 00 00 00'
It is recommended to be
personalized at the end of the Card Authentication Related Data bytes 2-7 are
record, as implementations may replaced with the (Card) Unpredictable Number
require it to be the last data and Card Transaction Qualifiers values during
element in the record. VCPS transaction processing.
Card CVM Limit Optional Visa proprietary data element UC: Modifiable Note: Visa recommends that this data element
F: n 12 indicating that for domestic IU: PUT DATA not be personalized nor used. If the data element
contactless transactions where this must be personalized, it is recommended that it
T: 9F6B R: GET DATA (SD)
value is exceeded, a CVM is be personalized to its maximum possible value.
L: 6 required by the card.
S: Card Online PIN and Signature are the
D: – CVMs supported by cards compliant
to this specification.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Card Transaction Conditional In this version of the specification, UC: Modifiable (byte 1 bits 6-1, Byte 1
Qualifiers (CTQ) If CVM supported used to indicate to the device the byte 2 bits 7-1) bit 8: 1 = Online PIN Required
F: b 16 card CVM requirements, issuer Transient (byte 1 bits 8-7,
or if issuer CTQ bit 7: 1 = Signature Required
preferences, and card capabilities. byte 2 bit 8)
T: 9F6C preferences bit 6: 1 = Go Online if Offline Data
L: 2 supported IU: PUT DATA Authentication Fails and Reader is online
S: Card or if Issuer Update R: GET DATA (SD), GPO capable.
Processing at the bit 5: 1 = Switch Interface if Offline Data
D: –
POS supported Authentication fails and Reader supports
contact chip.
bit 4: 1 = Go Online if Application Expired
bit 3: 1 = Switch Interface for (manual) Cash
Transactions
bit 2: 1 = Switch Interface for Cashback
Transactions
bit 1:
1 = Not valid for contactless ATM
transactions
0 = Valid for contactless ATM transactions
Byte 2
bit 8: 1 = CDCVM Performed
bit 7: 1 = Card supports Issuer Update
Processing at the POS
bits 6-1: RFU (000000)
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Card Required Visa proprietary data element UC: Unchanging (byte 1) See Table M–2.
Verification indicating the exception conditions Transient (bytes 2-4)
Results (CVR) that occurred during the current
Transient (byte 5, if
F: b 32 or 40 and previous transaction.
present)
Transmitted to the reader in the
T: part of 9F10 IU: N
Issuer Application Data.
L: 4 or 5 R: GPO
S: Card
D: Shared
Cardholder Optional Indicates cardholder name UC: Unchanging For some markets, including the cardholder
Name according to [ISO 7813]. IU: N name on the card will bring up privacy issues as
F: ans 2-26 it can be read along with the PAN information.
R: GPO, READ RECORD
The issuer should take precautions and
T: 5F20
investigate this situation before personalizing
L: 2-26 tag '5F20' or including the cardholder’s real
S: Card name in tag '5F20'.
D: E or S It is strongly recommended that this data
element not be personalized with the
cardholder’s real name, and that a generic
cardholder name should instead be
personalized.
Certificate Conditional Payment system public key used for N/A Value generated by Visa and loaded to terminal
Authority Public If fDDA supported dynamic data authentication. by acquirer. Six Visa public keys shall be
Key supported.
F: b
T: –
L: –
S: Reader
D: N/A
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Certificate Conditional Identifies the Certificate Authority’s UC: Unchanging Values assigned by Visa.
Authority Public If Offline Data public key in conjunction with the IU: N
Key Index (PKI) Authentication RID for use in offline data
R: READ RECORD
F: b 8 supported authentication.
T: 8F
L: 1
S: Card
D: E or S
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Certificate Conditional Identifies the Certificate Authority’s N/A Values assigned by Visa.
Authority Public If fDDA supported public key in conjunction with the
Key Index (PKI) RID for use in offline static and
F: b 8 dynamic data authentication.
T: 9F22
L: 1
S: Reader
D: N/A
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Consecutive Conditional Visa proprietary data element UC: Dynamic Initialized to zero unless optionally personalized
Transaction If international specifying the number of IU: CSU, PUT DATA to a starting value. Incremented by 1 each time
Counter velocity checks consecutive offline international an international transaction is approved offline
R: GET DATA (SD)
International supported transactions that have occurred for by the card application.
(CTCI) the card application since the last
F: b 8 time a transaction went online and
Issuer Authentication requirements
T: DF11 in BF57
were met.
L: 1
This counter is not used in VCPS
S: Card transaction processing (i.e. is
D: Shared considered as not present in the
application) unless the application
has been personalized to support
international velocity checks.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Contact Chip Required Visa proprietary internal indicator UC: Transient This indicator is a transient value, initialized to a
Supported used during qVSDC Card Action IU: N value of 0 at the beginning of the transaction.
Indicator Analysis. Indicates that a contact 1 = Contact chip transaction preferred by card
R: N
F: – chip transaction is preferred by the and supported by reader
T: – card and EMV contact chip is
L: – supported by the reader.
S: Card
D: –
Contactless Required Visa proprietary internal indicator N/A This indicator is a transient value, initialized to a
Application Not used during reader transaction value of 0 at the beginning of the transaction.
Allowed processing. Indicates that the 1 = Visa contactless application not allowed
Indicator transaction cannot be conducted
F: – with a Visa application.
T: –
L: –
S: Reader
D: N/A
Contactless Conditional Visa proprietary data template that UC: Dynamic The following context specific tags are defined
Counters Data If contactless contains Visa proprietary context IU: PUT DATA in this specification for the Contactless Counters
Template velocity checking specific tags for contactless Data Template:
R: GET DATA (SD)
F: b (using any of the counters and their associated limits. 'DF11' – CLTC
T: BF55 counters in this 'DF21' – CLTCLL
template) is
L: var. 'DF31' – CLTCUL
supported
S: Card 'DF41' – VLP Single Transaction Limit
P: Q 'DF51' – VLP Available Funds
D: Shared 'DF61' – VLP Reset Threshold
'DF71' – VLP Funds Limit
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Contactless Conditional Visa proprietary data element UC: Dynamic Initialized to zero unless optionally personalized
Transaction If contactless specifying the number of qVSDC IU: CSU, PUT DATA to a starting value. Incremented by 1 each time
Counter (CLTC) transaction count offline transactions that have a qVSDC offline transaction occurs. The CAP
R: GET DATA (SD)
F: b 8 velocity checks occurred since the last time a may be configured to cause the CLTC to also
supported transaction went online and Issuer increment when a qVSDC online transaction
T: DF11 in BF55
Authentication requirements were occurs, and may be configured to not increment
L: 1 met. The CAP may be configured to when a qVSDC offline transaction occurs.
S: Card cause the CLTC to also increment
D: Shared when a qVSDC online transaction
occurs, and may be configured to
not increment when a qVSDC offline
transaction occurs.
This counter is not used in VCPS
transaction processing (i.e. it is
considered as not present in the
application) unless the application
has been personalized to support
contactless transaction count
velocity checks.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Counters Data Conditional Visa proprietary data template that UC: Dynamic The following context specific tags are defined
Template If dual-interface contains Visa proprietary context IU: PUT DATA in this specification for the Counters Data
F: b card application specific tags for contact counters Template:
R: GET DATA (SD)
and contact and their associated limits. 'DF11' – CTC
T: BF56
velocity checking 'DF21' – CTCL
L: var.
(using any of the
S: Card 'DF31' – CTCUL
counters in this
D: Shared template)
supported
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Cryptogram Required Indicates the type of cryptogram UC: Transient bits 8–7
Information Data (TC, ARQC, or AAC) returned by the IU: N 00 = AAC
(CID) card and the actions to be
R: GPO 01 = TC
F: b 8 performed by the reader.
10 = ARQC
T: 9F27
11 = RFU
L: 1
bits 6-5: RFU (00)
S: Card
bits 4-1: Not used for VCPS
D: N/A
Cryptogram Required Visa proprietary data element UC: Modifiable Values assigned by Visa.
Version Number indicating the version of the IU: N/A The left nibble of the byte indicates the format
F: b 8 Application Cryptogram algorithm of Issuer Application Data.
R: GPO
used by the application.
T: part of 9F10 The only values supported in this version of
Transmitted in the Issuer
L: 1 VCPS are:
Application Data.
S: Card '0A' = Cryptogram Version Number 10
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Cumulative Total Conditional Visa proprietary data element UC: Dynamic Initialized to zero unless optionally personalized
Transaction If Low Value AND specifying the cumulative total IU: CSU, PUT DATA to a starting value. Incremented by the Amount,
Amount (CTTA) CTTA Check amount of offline domestic Approximated each time a domestic transaction
R: GPO (if included in the IDD
F: n 12 supported transactions in the designated is approved offline by the card application.
as specified in Appendix E)
currency (Application Currency Reset to zero after Issuer Authentication
T: DF11 in BF58
Code or supported Conversion requirements are met.
L: 6 Currency Codes) for the card
S: Card application since the last completed
D: Shared online transaction where Issuer
Authentication requirements were
met.
Cumulative Total Conditional Calculated value indicating the UC: Transient Equal to the Cumulative Total Transaction
Transaction If Low Value AND amount of offline funds available to IU: N Amount Upper Limit minus the Cumulative Total
Amount Funds CTTA Check spend in the Cumulative Total Transaction Amount (CTTAUL - CTTA).
R: N/A
(CTTA Funds) supported Transaction Amount. If the Cumulative Total Transaction Amount
F: n 12 Upper Limit is not present, equal to the
T: – Cumulative Total Transaction Amount Limit
minus the Cumulative Total Transaction Amount
L: 6
(CTTAL - CTTA).
S: Card
D: –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Currency Conditional Visa proprietary data element in the UC: Modifiable Byte 1
Conversion If currency Currency Conversion Parameters IU: PUT DATA bits 8-5: Number of positions the decimal
Factor conversion is to data element. The Currency separator shall be shifted from the right to
R: GET DATA (SD)
F: n 8 be performed Conversion Factor specifies a obtain the factor.
decimal value used in the
T: part of 9F73 bits 4-1: The first digit of the currency
conversion algorithm to convert an
L: 4 conversion factor
amount in the currency identified by
S: Card the corresponding Conversion Bytes 2-4
D: Shared Currency Code to the designated The remaining six digits of the currency
currency in which the application is conversion factor
managed.
This rate is an approximation and
should be limited to two significant
digits.
Currency Conditional Visa proprietary data element UC: Modifiable Bytes 1–2: Conversion Currency Code 1
Conversion If currency specifying the currency code and IU: PUT DATA Bytes 3–6: Currency Conversion Factor 1
Parameters conversion is to conversion factor for converting an
R: GET DATA (SD) Bytes 7–8: Conversion Currency Code 2
F: n be performed amount in an alternate currency to
an approximate value in the Bytes 9–12: Currency Conversion Factor 2
T: 9F73
designated currency in which the Bytes 13–14: Conversion Currency Code 3
L: var. up to 30 account is managed. Bytes 15–18: Currency Conversion Factor 3
S: Card Conversion Parameters contains Bytes 19–20: Conversion Currency Code 4
D: Shared one or more sets consisting of a
Bytes 21–24: Currency Conversion Factor 4
Conversion Currency Code and an
associated Currency Conversion Bytes 25–26: Conversion Currency Code 5
Factor. Applications that support Bytes 27–30: Currency Conversion Factor 5
Currency Conversion shall be able
to support up to five alternate
currencies.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Customer Optional Contains data for transmission to UC: Modifiable Customer Exclusive Data, if personalized,
Exclusive Data the issuer. IU: PUT DATA, UPDATE consists of one or more Issuer elements. Each
(CED) RECORD element in the CED consists of a 1-byte Visa
F: b proprietary Identifier, a 1-byte length, and a
R: GET DATA (SD), GPO, READ
value. The Identifiers currently defined for the
T: 9F7C RECORD
CED are:
L: var. up to 32
'01' – Issuer Proprietary Data
S: Card
'02' through 'FF' – RFU
D: –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Decline Required Required Visa proprietary internal indicator UC: Transient This indicator is a transient value, initialized to a
by Card Indicator used during Qvsdc Card Action IU: N value of 0 at the beginning of GPO processing.
F: – Analysis. Indicates that the card 1 = Offline decline required by card
R: N
T: – requires the transaction to be
L: – declined offline.
S: Card
D: –
Decline Required Required Visa proprietary internal indicator N/A This indicator is a transient value, initialized to a
by Reader used during transaction processing value of 0 at the beginning of the transaction.
Indicator to indicate that internal reader 1 = Offline decline required by reader
F: – processes have indicated that the
T: – transaction should be declined.
L: –
S: Reader
D: N/A
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Derivation Key Required Visa proprietary data element UC: Modifiable Value assigned by the issuer.
Index (DKI) identifying to the issuer the IU: N/A
F: b 8 appropriate issuer’s derivation key
R: GPO
to derive the card’s unique DEA
T: part of 9F10
keys for online card and issuer
L: 1 authentication. (The DKI is not used
S: Card by the card.)
D: Shared Passed as part of the Issuer
Application Data.
Directory Entry Mandatory Contains one or more data objects UC: Unchanging
F: var. relevant to an application directory IU: N
entry according to [ISO 7816-5].
T: 61 R: SELECT
L: var.
S: Card
D: Exclusive
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
fDDA Version Conditional Contains the version number for the UC: Unchanging '01' = fDDA Version Number 1
Number If fDDA supported fDDA version supported by the card IU: N
F: b 8 R: READ RECORD
T: part of 9F69
L: 1
S: Card
D: –
File Control Mandatory Issuer discretionary part of the FCI. UC: Unchanging
Information (FCI) IU: N
Issuer
R: SELECT
Discretionary
Data
F: var.
T: BF0C
L: var. up to 222
S: Card
D: E or S
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Form Factor Required Indicates the form factor of the UC: Modifiable Byte 1: Consumer Payment Device Form Factor
Indicator (FFI) consumer payment device and the IU: PUT DATA, UPDATE bits 8-6: Form Factor Indicator Version
F: b 32 type of contactless interface over RECORD Number
which the transaction was
T: 9F6E R: GET DATA (SD), GPO, READ All values not currently defined are RFU.
conducted. This information is made
L: 4 RECORD Defines the meaning of Form Factor Indicator
available to the issuer host.
S: Card byte 1 bits 5-1, byte 2, and byte 3. The
Please check with your Visa regional
definition of FFI byte 1 bits 5-1, byte 2, and
D: – representative regarding which form
byte 3 are based on the Form Factor Indicator
factors are supported for your
Version Number, and those definitions may
region.
vary for each Form Factor Indicator Version
Number.
001 = Form Factor Indicator (FFI) Version
Number 1
bits 5-1: Consumer Payment Device Form
Factor
All values not currently defined are RFU.
The definitions listed below are for FFI version
#1.
00000 = Standard card
Card conforming to the physical
dimensions for an ID-1 card type, as
specified in [ISO 7811], regardless of its
transactional capabilities (e.g. magstripe,
contact chip, contactless).
– continues –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Go Online On Conditional Visa proprietary data element UC: Modifiable Set to 1 if the ‘Set Go Online On Next
Next Transaction If dual-interface indicating that subsequent VIS IU: CSU Transaction’ bit of the last verified CSU was set
Indicator card application transactions should request online to 1b.
R: N
F: – supporting Issuer processing. Reset to 0 if the ‘Set Go Online On Next
T: – Update This indicator is used in VIS, and is Transaction’ bit of the last verified CSU was set
Processing and not evaluated in determining VCPS to 0b.
L: –
supporting transaction dispositions. The "Go
S: Card CVN18 or CVN'22' Online On Next Transaction
D: Shared Indicator" is included in this
specification as it may be set and
reset during Issuer Update
Processing.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Integrated Conditional Private key part of the ICC public UC: Unchanging The card shall implement support for ICC key
Circuit Card (ICC) If fDDA supported key pair used for fast dynamic data IU: N sizes up to and including 1408-bits. Card
Private Key authentication. support for larger ICC key sizes is at
R: N
F: b This data element may take various implementer discretion.
L: NI
S: Card
D: E or S
Integrated Conditional ICC Public Key Exponent used for UC: Unchanging A value of '03' is recommended for performance
Circuit Card (ICC) If fDDA supported the verification of the Signed IU: N reasons.
Public Key Dynamic Application Data.
R: READ RECORD
Exponent
F: b
T: 9F47
L: 1 or 3
S: Card
D: E or S
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
International Conditional Visa proprietary data template that UC: Dynamic The following context specific tags are defined
Counters Data If international contains Visa proprietary context IU: PUT DATA in this specification for the Counters Data
Template velocity checking specific tags for international Template:
R: GET DATA (SD)
F: b (using any of the counters and their associated limits. 'DF11' – CTCI
T: BF57 counters in this 'DF21' – CTCIL
template) is
L: var. 'DF31' – CTIUL
supported
S: Card
D: Shared
International Conditional Visa proprietary data element UC: Transient This indicator is a transient value, set or reset at
Transaction If domestic and indicating whether the transaction is IU: N the beginning of GPO processing.
Indicator international domestic or international, based on 1 = International transaction
R: N
F: – restrictions currency code, and may also take
0 = Domestic transaction
T: – supported into account the country code
L: – (configured by the issuer in Card
or
Additional Processes).
S: Card If domestic and
D: – international
velocity checks
supported
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Mandatory Contains proprietary application UC: See individual IAD If the Issuer Discretionary Data is personalized
Application Data data for transmission to the Issuer components with the Issuer Discretionary Data Identifier (IDD
F: b in an online transaction. IU: N/A ID) and IDD Length as described in Appendix E,
This version of VCPS supports the the application includes the IDD ID followed by
T: 9F10 R: GPO
following Issuer Application Data the values of the following data elements in the
L: var. up to 32 Issuer Discretionary Data (see Issuer
(IAD) formats:
S: Card Discretionary Data Identifier for defined values).
• IAD Format 0/1/3
D: E or S The Issuer Application Data for contactless must
• IAD Format 2
be the same as the Issuer Application Data for
Refer to Appendix M for a complete contact chip, except the CVN values may be
description of the IAD Formats. different to allow contactless to use a different
cryptogram version. However, both must use
the same IAD Format (that is, both use IAD
Format 0/1/3 or both use IAD Format 2).
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Optional Issuer data transmitted to card for N/A Note: For CVN18 and CVN'22', the optional
Authentication Passed from the Issuer Authentication. Proprietary Authentication Data is only
Data issuer through The Issuer Authentication Data supported for Field 55 issuers. The use of
F: b 64-128 the reader consists of the following for Proprietary Authentication Data is beyond the
Cryptogram Version scope of this specification.
T: 91
Number 10 ('0A') and Cryptogram Note: For CVN18 and CVN'22', third bit map
L: 8-16
Version Number 17 ('11'): issuers may send the 2-byte ARPC Response
S: Issuer Code (following the CSU) as part of Issuer
• ARPC – first 8 bytes
D: – Authentication Data sent in the online response,
• ARPC Response Code – 2 bytes
but the ‘Proprietary Authentication Data
immediately following ARPC
included’ bit of the CSU shall be set to 0b, and
the ARPC Response Code shall not be processed
The Issuer Authentication Data as optional Proprietary Authentication Data
consists of the following for when generating the ARPC.
Cryptogram Version Number 18
('12') and Cryptogram Version
Number '22' ('22'):
• ARPC – first 4 bytes
• CSU – 4 bytes immediately
following ARPC
• optional Proprietary
Authentication Data – 1-8 bytes
immediately following CSU
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Conditional Visa proprietary data element UC: Persistent 1 = Issuer Authentication was performed and
Authentication If Issuer Update indicating that Issuer Authentication IU: N failed
Failure Indicator Processing was performed and failed.
R: N
F: – supported
T: –
L: –
S: Card
D: Shared
Issuer Code Table Conditional Indicates the code table according UC: Unchanging Values are:
Index If Application to [ISO 8859] for displaying the IU: N 01 = [ISO 8859], Part 1
F: n 2 Preferred Name is Application Preferred Name. R: SELECT 02 = [ISO 8859], Part 2
T: 9F11 personalized
03 = [ISO 8859], Part 3
L: 1 04 = [ISO 8859], Part 4
S: Card 05 = [ISO 8859], Part 5
D: E or S 06 = [ISO 8859], Part 6
07 = [ISO 8859], Part 7
08 = [ISO 8859], Part 8
09 = [ISO 8859], Part 9
10 = [ISO 8859], Part 10
Issuer Country Conditional Indicates the country of the issuer, UC: Unchanging Shall match the value of tag '9F57'.
Code If Application represented according to [ISO IU: N
F: n 3 Usage Control is 3166].
R: READ RECORD
T: 5F28 supported
L: 2
S: Card
D: E or S
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Country Conditional Visa proprietary data element UC: Unchanging Shall match the value of tag '5F28'.
Code If country code indicating the country of the issuer, IU: N
F: n 3 restrictions represented according to
R: GET DATA (SD)
supported [ISO 3166].
T: 9F57
L: 2
S: Card
D: Shared
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Optional Visa proprietary data element UC: Transient (bit 8) Bit 8 is a dynamic value and initialized to a value
Discretionary indicating the format of the Modifiable (bits 7-1) of 0b at the beginning of GPO processing.
Data Identifier optional issuer discretionary data bit 8: 1 = Indication to the issuer that card and
IU: N/A
(IDD ID) transmitted in the Issuer Application reader support Issuer Update Processing
Data. R: GPO
F: b 8 bits 7-5: RFU (000)
T: part of 9F10 See Appendix E for additional
bits 4-1: IDD Option ID: Identifies the contents
information on usage of the IDD ID.
L: 1 in the remaining bytes of issuer discretionary
Note: IAD Format 2 only supports data:
S: Card
IDD ID Option '0'.
D: Shared '0' = Issuer-defined static data
'1' = VLP Available Funds
Note: IDD Option ID '1' will not be supported
in future versions of the specification. Issuers
should instead use IDD Option ID '3'.
'2' = CTTA
Note: IDD Option ID '2' will not be supported
in future versions of the specification. Issuers
should instead use IDD Option ID '4'.
'3' = VLP Available Funds followed by CTTA
'4' = CTTA followed by CTTAL
'5' = AOSA
'6' = AOSA followed by Last Successful Issuer
Update ATC Register followed by Issuer Script
Command Counter
'7'-'F' = RFU
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Public Key Conditional Issuer’s public key certified by a UC: Modifiable
Certificate If Offline Data certificate authority for use in offline IU: UPDATE RECORD
F: b Authentication data authentication.
R: READ RECORD
T: 90 supported
L: NCA
S: Card
D: E or S
Issuer Public Key Conditional Issuer public key exponent used for UC: Unchanging A value of '03' is recommended for performance
Exponent If Offline Data the verification of the ICC Public Key IU: N reasons.
F: b Authentication Certificate.
R: READ RECORD
T: 9F32 supported
L: 1 or 3
S: Card
D: E or S
Issuer Public Key Conditional Portion of the Issuer Public Key UC: Modifiable
Remainder If Offline Data Modulus which does not fit into the IU: UPDATE RECORD
F: b Authentication Issuer PK Certificate.
R: READ RECORD
T: 92 supported and
entire public key
L: NI – NCA + 36
does not fit into
S: Card certificate
D: E or S
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Script Conditional Visa proprietary data element that UC: Persistent bits 4–1: Number of Issuer Script Commands
Command If Issuer Update indicates the number of Issuer IU: N processed.
Counter (ISCC) Processing Script Commands processed by the If the ISCC is not cyclic, then a value of 'F' is
R: GPO
F: b 4 supported card application. equivalent to 15 or more Issuer Script
T: – The ISCC may be configured to be a Commands. When the ISCC is not cyclic, the
cyclic counter by setting ‘Issuer card application either 1) increments the ISCC
L: –
Script Command Counter is cyclic’ upon receipt of an issuer script command
S: Card (ADA byte 3 bit 2 to 1b). If the ISCC containing secure messaging, or 2) increments
D: Shared is cyclic, then the ISCC is never the ISCC after successful performance of an
reset, and counts from 0 (0000b) to issuer script command.
15 (1111b), after which it cycles If the ISCC is cyclic, then incrementing the ISCC
back to 0 (0000b). when it has a value of 'F' cycles it back to '0'.
If issuer scripts commands are Ex. 'F' + 1 = '0'
supported, it is highly
When the ISCC is cyclic, the card application
recommended that the ISCC be
increments the ISCC after successful
configured as a cyclic counter and
performance of an issuer script command.
that only successful issuer script
commands are counted.
Issuer Script Conditional Visa proprietary data element that UC: Persistent 1 = Issuer Script processing failed on a previous
Failure Indicator If Issuer Update indicates whether Issuer Script IU: N transaction
F: – Processing processing failed on a previous
R: N
T: – supported transaction.
L: –
S: Card
D: Shared
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Script Conditional Indicates the results of Issuer Script N/A Byte 1(Issuer Script Result):
Results If Issuer Update processing. bits 8-5: Result of the Issuer Script processing
F: b Processing When the reader-terminal performed by the reader:
T: 9F5B supported transmits this data element to the '0' = Issuer Script not performed
acquirer, in this version of VCPS, it
L: var. '1' = Issuer Script processing failed
is acceptable that only byte 1 is
S: Reader transmitted, although it is '2' = Issuer Script processing successful
D: N/A preferable for all five bytes to be bits 4-1: Sequence number of the Issuer
transmitted. Script Command:
'0' = Not specified
'1'–'E' = Sequence number 1-14
'F' = Sequence number 15 or above
Bytes 2-5 (Issuer Script Identifier):
Issuer Script Identifier received by the reader,
if available; zero filled if not available.
Mandatory if more than one Issuer Script
Template was received by the reader-
terminal.
Bytes 1-5 are repeated for each Issuer Script
Template processed by the reader-terminal,
although in this version of VCPS, only one
Issuer Script Template may be transmitted in
the response message.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Issuer Script Optional Contains proprietary issuer data for N/A [EMV] specifies that terminals and networks
Template 1 Passed from transmission to the card. must support a total length for all issuer scripts
F: b issuer through The format of the Issuer Script in an online response of up to 128 bytes.
reader Template is shown in [EMV] Book 3 Issuers may send longer issuer scripts only
T: 71
section 10.10. when the issuer knows that longer issuer
L: var. scripts are supported by all entities
S: Issuer transporting the script back to the card.
D: –
Issuer Script Optional Contains proprietary issuer data for N/A [EMV] specifies that terminals and networks
Template 2 Passed from transmission to the card. must support a total length for all issuer scripts
F: b issuer through The format of the Issuer Script in an online response of up to 128 bytes.
reader Template is shown in [EMV] Book 3 Issuers may send longer issuer scripts only
T: 72
section 10.10. when the issuer knows that longer issuer
L: var. scripts are supported by all entities
S: Issuer transporting the script back to the card.
D: –
Issuer Update Required Visa proprietary internal indicator UC: Transient This indicator is a transient value, reset at the
Processing used during qVSDC Card Action IU: N beginning of the transaction.
Indicator Analysis. Indicates that Issuer 1 = Issuer Update Processing supported by
R: N
F: – Update Processing supported by card and reader
T: – card and Issuer Update Processing
L: – supported by reader.
S: Card
D: –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Last Contactless Conditional Visa proprietary data element UC: Persistent Initialized with a value of 0.
Application If Issuer Update indicating whether the Last IU: N 1 = Last Contactless Application Cryptogram
Cryptogram Processing Contactless Application Cryptogram valid
R: N
Valid Indicator supported is valid for Issuer Update Processing.
0 = Last Contactless Application Cryptogram
F: – This data element is not used in invalid
T: – VCPS transaction processing (i.e. is
L: – considered as not present in the
S: Card application) unless the application
has been personalized to support
D: Shared
Issuer Update Processing.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Last Online ATC Conditional ATC value of the last transaction UC: Persistent
Register If Issuer Update that went online and where issuer IU: N
F: b 16 Processing authentication was performed.
R: GET DATA (SD)
T: 9F13 supported
L: 2
S: Card
D: Shared
Last Successful Conditional Visa proprietary data element UC: Persistent Initialized to a value of zeroes.
Issuer Update If Issuer Update containing the ATC value from the IU: N
ATC Register Processing last successful Issuer Update (either
R: GPO (if included in the IDD
F: b 16 supported as a result of Issuer Authentication
as specified in Appendix E)
or issuer scripting).
T: –
L: 2
S: Card
D: Shared
Log Entry Conditional Data element indicating the UC: Unchanging Byte 1: SFI containing the cyclic transaction log
F: b If transaction location (SFI) and the maximum IU: N file.
logging number of transaction log records. Byte 2: Maximum number of records in the
T: 9F4D R: SELECT
supported transaction log file.
L: 2
Note: The value of maximum number of records
S: Card
in the transaction log file is at implementer
D: Shared discretion and ’00’ is not supported.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Log Format Conditional List in tag and length format of UC: Unchanging
F: b If transaction data elements that are logged by IU: N
logging the transaction.
T: 9F4F R: GET DATA (SD)
supported
L: var.
S: Card
D: Shared
Matching Required Visa proprietary data element UC: Transient This indicator is a transient value, set or reset at
Currency indicating whether the transaction is IU: N the beginning of GPO processing.
Indicator matching currency or non-matching 1 = Matching currency transaction
R: N
F: – currency.
0 = Non-matching currency transaction
T: – Transactions are considered
L: – matching currency when the
S: Card Transaction Currency Code matches
the Application Currency Code, or
D: –
matches any of the supported
Conversion Currency Codes.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Offline Counter Optional Contains initial values for various UC: Unchanging In this version of the specification the length of
Initial Value counters to be set at IU: N the field is 1 byte, indicating the initial value of
F: b personalization time. the Consecutive Transaction Counter
R: GET DATA (SD)
In this version of the specification, International (CTCI).
T: 9F63
only the Consecutive Transaction Note: The Offline Counter Initial Value will not
L: var.
Counter International (CTCI) can be be supported in future versions of the
S: Card initialized during personalization. If specification. Issuers should instead use tag
D: Shared this tag is personalized, the CTCI will 'DF11' in 'Bf57' to initialize the value of the CTCI.
be set to the value indicated.
Online Preferred Required Visa proprietary internal indicator UC: Transient This indicator is a transient value, initialized to a
by Card Indicator used during qVSDC Card Action IU: N value of 0 at the beginning of GPO processing.
F: – Analysis. Indicates that the card
R: N
T: – prefers online processing for the
L: – transaction, but can continue
processing offline if online
S: Card
processing is unavailable.
D: –
Online Required Required Visa proprietary internal indicator UC: Transient This indicator is a transient value, reset at the
by Card Indicator used during qVSDC Card Action IU: N beginning of GPO processing.
F: – Analysis. Indicates that the card
R: N
T: – requires online processing for the
L: – transaction, and will decline offline
if online processing is unavailable.
S: Card
D: –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Online Required Required Visa proprietary internal indicator N/A This indicator is a transient value, initialized to a
by Reader used during transaction processing value of 0 at the beginning of the transaction.
Indicator to indicate that internal reader
F: – processes have indicated that the
T: – transaction requires online
L: – processing.
S: Reader
D: N/A
Payment Optional Uniquely identifies the underlying UC: Unchanging See [EMV Tokenisation].
Account This data element cardholder account to which a IU: N
Reference (PAR) may be present payment token is associated, as
R: READ RECORD
T: 9F24 on cards that defined in [EMV Tokenisation].
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
T: 9F38
L: var.
S: Card
D: E or S
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Short File Conditional Used in the commands related to UC: Unchanging Values are:
Identifier If returning an application elementary file (AEF) IU: N 1–10: Governed by joint payment systems
F: b 8 record data for to identify the file. The SFI data
R: N/A 11–20: Payment system specific
the transaction object is a binary field with the
T: 88 21–30: Issuer specific
three high-order bits set to zero.
L: 1
S: Card
D: –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Signed Static Conditional Static signature generated from UC: Modifiable The calculation of the Signed Static Application
Application Data If ODA for Online critical card data elements and IU: UPDATE RECORD Data is as specified in [EMV] Book 2, with the
F: b Authorizations is personalized on the card. following exception:
R: READ RECORD
T: 93 supported and This variant of the Signed Static • The Signed Data Format to be signed shall
card is not Application Data is not returned by have a value of '93' (instead of '03'). See
L: NI
capable of the card when used at readers [EMV] Book 2 Table 3.
S: Card performing fDDA compliant to this specification, and
D: Exclusive SDA is neither performed nor
Use of a Signed Data Format with value '93'
supported by readers compliant to
prevents the Signed Static Application Data
this specification. The card
from being used in standard POS acceptance
functionality is included in this
environments.
specification only to allow for its
potential use in special acceptance
environments.
Cards that are not capable of
performing fDDA, but support
Offline Data Authentication for
Online Authorizations, use SDA and
this variant of the Signed Static
Application Data.
Static Data Optional Contains list of tags of primitive UC: Unchanging The SDA Tag List may not contain tags other
Authentication data objects whose value fields are IU: N than the tag for Application Interchange Profile
(SDA) Tag List to be included in the ICC Public (AIP).
R: READ RECORD
F: – Key Certificate hash result.
T: 9F4A
L: var.
S: Card
D: E or S
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Switch Interface Required Visa proprietary internal indicator UC: Transient This indicator is a transient value, initialized to a
Required by Card used during qVSDC Card Action IU: N value of 0 at the beginning of GPO processing.
Indicator Analysis. Indicates that the card
R: N
F: – requires the transaction be
T: – performed over another interface.
L: –
S: Card
D: –
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Terminal Byte 3
Transaction bit 8: 1 = Issuer Update Processing supported
Qualifiers (TTQ)
bit 7: 1 = Mobile functionality supported
(continued) (Consumer Device CVM)
bits 6-1: RFU (000000)
Note: Readers compliant to this specification
set TTQ byte 3 bit 7 to 1b.
Byte 4
RFU ('00')
Terminal Required Status of the different functions as N/A Byte 1: Not used for VCPS ('00')
Verification seen from the reader/terminal. Byte 2: Not used for VCPS ('00')
Results (TVR) For qVSDC transactions, all of the Byte 3: Not used for VCPS ('00')
F: b 40 TVR bits sent online to the acquirer
Byte 4: Not used for VCPS ('00')
T: 95 shall be set to 0b.
Byte 5: Not used for VCPS ('00')
L: 5
S: Reader
D: N/A
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Transaction Date Required Local date that the transaction was N/A
F: n 6 YYMMDD authorized.
T: 9A
L: 3
S: Reader
D: N/A
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Unique DEA Key Required Proprietary Visa data element UC: Unchanging
A containing an 8-byte DEA key used IU: N
F: b 64 for Online Card Authentication,
R: N
Online Issuer Authentication, and
T: –
AC generation.
L: 8 Secret
In triple DES, the Unique DEA Key A
S: Card is used for encipherment and the
D: Shared Unique DEA Key B is used for
decipherment.
The derivation key methodology for
unique DEA keys is described in
[VIS] Appendix D.7.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
Unique DEA Key Required Proprietary Visa data element UC: Unchanging
B containing an 8-byte DEA key used IU: N
F: b 64 for Online Card Authentication,
R: N
Online Issuer Authentication, and
T: –
AC generation.
L: 8 Secret
In triple DES, the Unique DEA Key A
S: Card is used for encipherment and the
D: Shared Unique DEA Key B is used for
decipherment.
The derivation key methodology for
unique DEA keys is described in
[VIS] Appendix D.7.
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
VLP Available Conditional Visa proprietary data element that UC: Dynamic Initialized to a value of zeros.
Funds If Low Value provides a counter that is IU: CSU, PUT DATA Issuers may personalize the VLP Available Funds
F: n 12 Check supported decremented by the transaction with another initial value.
R: GET DATA (SD), GPO (if
amount for qVSDC offline approval
T: 9F79 and DF51 or included in the IDD as specified
requests.
in BF55 If Low Value AND in Appendix E)
This data element is not used in
L: 6 CTTA Check
VCPS transaction processing (i.e. is
S: Card supported
considered as not present in the
D: Shared application) unless one of the low
value checks is supported.
VLP Funds Limit Conditional Visa proprietary data element that UC: Modifiable
F: n 12 If Low Value provides the issuer limit for the VLP IU: PUT DATA
Check supported Available Funds, and is the value to
T: 9F77 and DF71 R: GET DATA (SD)
which the VLP Available Funds is
in BF55 or
reset.
L: 6 If Low Value AND
S: Card CTTA Check
supported
D: Shared
Name (Format;
Tag; Length;
Source; Path; Update Capability; Issuer
Dual Interface) Requirement Description Update; Retrieval; Secret Values
In order to permit issuers to more closely track funds at the host, an issuer option was
introduced to allow placement of specific data into the Issuer Discretionary Data portion of the
Issuer Application Data (tag '9F10'). If personalized, the Issuer Discretionary Data is returned as
part of the Issuer Application Data (whenever the Issuer Application Data is returned).
With the exception of the static data option (IDD Option '0'), the IDD Options defined in this
specification include a MAC generated as described in Appendix E.3 to ensure data integrity.
Note: The IDD data is also included in clearing messages for offline approvals.
Issuer Discretionary Data (IDD), if present, shall be returned following the Visa Discretionary
Data in the Issuer Application Data (tag '9F10').
The Issuer Discretionary Data (IDD) returned varies depending on the option chosen during
personalization as described in Table E–1.
VLP Available Funds 10 bytes '1' • Value of VLP Available Funds (5 low-order bytes) 4 bytes
Note: IDDO ID '1' will not be supported in future
versions of the specification. Issuers should instead
use IDDO ID '3' or '5'.
VLP Available Funds 15 bytes '3' • Value of VLP Available Funds 4 bytes
and CTTA (5 low-order bytes)
• Value of CTTA (5 low-order bytes)
CTTA and Cumulative 15 bytes '4' • Value of CTTA (5 low-order bytes) 4 bytes
Total Transaction • Value of CTTAL (5 low-order bytes)
Amount Limit (CTTAL)
Note: The IDD Option ID is specified using the low order nibble of the IDD ID byte. The high
order nibble of the IDD ID byte is reserved for other uses. For additional information, see the
“Issuer Discretionary Data Identifier” entry in Table D–1.
The IDD Option ID value is used to choose the type of data to be returned in the Issuer
Discretionary Data field. By default, Issuer Discretionary Data will not be returned. If the issuer
wants to receive Issuer Discretionary Data, the above length byte and identifier byte should be
appended to the tag '9F10' personalization value (following the Visa Discretionary Data).
For example, '0A02' would indicate that a 10-byte IDD should be returned in the Issuer
Application Data, containing the Identifier ('02'), Cumulative Total Transaction Amount (CTTA),
and MAC.
The data to be MACed is the 2-byte Application Transaction Counter (ATC), followed by the
amount fields and padding characters, constructed as follows:
IDD
Option Length of
ID Data Block Elements
padding 1 byte
padding 4 bytes
padding 1 byte
IDD ID 1 byte
AOSA 6 bytes
Last Successful Issuer Update ATC Register 2 bytes
padding 4 bytes
The 4-byte MAC is generated using a session key derived from the MAC UDK using the first
method defined in [VIS] Appendix B.4. Computation of the MAC is as illustrated in [VIS] Figure
B-1.
There are two padding methods supported for generation of the IDD MAC.
The first method is similar to the padding method used for CVN 10. This is referred to as the
padding method ‘00’, which adds as many bytes of ‘00’ as necessary to obtain a data block
with a length divisible by eight (see [VIS] Appendix D.3.2, step 3).
The second method is referred to as the padding method ‘80’, which adds one mandatory ‘80’
byte at the end of the data block and as many bytes of ‘00’ as necessary to obtain a data block
with a length divisible by eight. The method is identical to the padding method for [VIS] Secure
Messaging for Integrity and Authentication, as described in [VIS] Appendix B.2.4, step 4.
In order for the card to recognize the padding method chosen by the issuer, the Application
Default Action indicates the padding method to be used when generating the MAC for
inclusion in the Issuer Discretionary Data as follows:
• If ‘Padding method '80'’ is supported (ADA byte 4 bit 5 is 1b), then padding method '80'
shall be used.
• If ‘Padding method '80'’ is not supported (ADA byte 4 bit 5 is 0b), then padding method '00'
shall be used.
Length: '06'
'9F 10 09
06 01 0A 03000000
0A 02'
The application uses the personalized IDD length and ID ('0A 02') as an indicator to activate
code to supply the Cumulative Total Transaction Amount (CTTA) in the Issuer Discretionary
Data when returning the Issuer Application Data. The personalized length includes the MAC.
When the card responds with Issuer Application Data containing the IDD (with the CTTA value
= '112233445566', and the MAC = '1A2B3C4D'), the TLV for this example would be:
Tag: '9F10'
Length: '12'
Value: '06010A030000000A0222334455661A2B3C4D'
The GET DATA command is used to retrieve primitive and constructed data objects not
encapsulated in a record within the current application. Although this command is not issued
by readers as part of a VCPS transaction, the card application supports this command to
retrieve the data elements listed in Appendix D.1.
The GET DATA command shall be supported as described in [VIS] Appendix C.8, with the
following exception(s):
• [VIS] Appendix C.8.2, differentiating card data retrievable at Special Devices and for financial
transactions, need not be supported. VCPS data objects retrievable by the GET DATA
command are indicated as such in Appendix D.1, regardless of whether the GET DATA is
occurring at a Special Device or for a financial transaction.
The GET PROCESSING OPTIONS command initiates the transaction within the card application.
As the GET PROCESSING OPTIONS command signals the beginning of a transaction to the
card, the card resets transient data to zero when the command is received.
The GET PROCESSING OPTIONS command shall be supported as described in [VIS] Appendix
C.9, with the following exception(s):
• Data retrievable using the GET PROCESSING OPTIONS command is not as defined in [VIS]
Table C-4.
• The data field returned in the response to the GET PROCESSING OPTIONS command shall
be according to [EMV] Format 2. The AFL is not always included, and the data field may
include additional BER-TLV coded data elements. Inclusion of the AFL is conditional on card
application processing.
Note: For reader vendors without access to [VIS], support for the GET PROCESSING OPTIONS
command is also described in [EMV] section 6.5.8. The exceptions mentioned above also apply to
readers.
Note: The qVSDC Online with ODA GPO Response is not returned by the card when used at
readers compliant to this specification. The acceptance environment(s) where those GPO
responses may be returned are outside the scope of this specification. For dual-interface cards,
the GPO response for contact chip transactions is outside the scope of this specification
The card application shall support personalization of each GPO response to return, or not
return, the data elements specified for each GPO response (as shown in the corresponding
tables for each GPO response).
Issuers are required to personalize the data elements to be returned in the GPO response as
required by this specification, but this shall not be enforced by the card application.
A data element may have a different value for each GPO response. The card application shall
support personalization of data elements in a GPO response independently of their
corresponding values in any other GPO response.
For example, the Application File Locator (tag '94') in each GPO response may be
personalized with a different value.
The following data element is an exception to the above requirement:
• Issuer Application Data (tag '9F10') – The IAD value personalized shall be the same for
each GPO response.
In addition to the data elements explicitly defined for each GPO response, the card
application shall support the personalization of additional data elements to be returned in
each GPO response. The additional data elements shall be BER-TLV coded.
The READ RECORD command shall be supported as described in [VIS] Appendix C.13, with the
following exception(s):
• Records for application selection, as specified in [EMV] Book 1 section 11.2, need not be
supported.
Note: For reader vendors without access to [VIS], support for the READ RECORD command is
also described in [EMV] Book 3 section 6.5.11. The exceptions mentioned above also apply to
readers.
The SELECT command is used to select an application on the card corresponding to the
submitted file name or AID.
The SELECT command shall be supported as described in [VIS] Appendix C.14, with the
following exception(s):
• The selection of an application is described in section 5.5 Application Selection of this
specification.
• PPSE is used in place of the PSE. Table G–1 defines the FCI returned by a successful
selection of the PPSE.
Note: For reader vendors without access to [VIS], support for the SELECT command is also
described in [EMV] Book 1 section 11.3. The exceptions mentioned above also apply to readers.
If any of the templates in the SELECT response contain BER-TLV data elements in addition to
the data elements explicitly defined, the reader shall be able to parse the SELECT response.
Unrecognized data elements for Application Selection are not stored by the reader.
Table G–1: SELECT Response Message Data Field (FCI) of the PPSE
Tag Value Length Presence
1 If more than one contactless application is personalized on the card, then an Application Priority Indicator shall be
personalized for each application.
2 Personalized if the corresponding Directory Entry is present.
The APPLICATION BLOCK command is a post-issuance command that invalidates the currently
selected application.
The APPLICATION BLOCK command shall be supported as described in [VIS] Appendix C.2,
with the following exception(s):
• Processing of the GENERATE AC command is outside the scope of this specification.
• Following the successful completion of an APPLICATION BLOCK command (either through
Issuer Update Processing or through a [VIS] transaction), an invalidated application shall
return an Application Authentication Cryptogram (AAC) cryptogram type when an
Application Cryptogram is returned in the GPO response.
The APPLICATION UNBLOCK command shall be supported as described in [VIS] Appendix C.3.
The CARD BLOCK command is a post-issuance command that permanently disables all
applications in the card.
Note: For reader vendors without access to [VIS], support for the EXTERNAL AUTHENTICATE
command is also described in [EMV] section 6.5.4.
Implementation-Conditional: If Issuer Update Processing supported and offline PIN for dual-
interface card application supported.
The PIN CHANGE/UNBLOCK command shall be supported as described in [VIS] section 14.5.4
and [VIS] Appendix C.11.
The PUT DATA command is a post-issuance command that updates specific data objects
stored in the card.
The PUT DATA command shall be supported as described in [VIS] Appendix C.12, with the
following exception(s):
• VCPS data elements that may be updated using the PUT DATA command are indicated as
such in Appendix D.1.
The UPDATE RECORD command is a post-issuance command that is used to update a record
in a file with the data provided in the command data field.
The UPDATE RECORD command shall be supported as described in [VIS] Appendix C.15.
Secure messaging for issuer scripts shall be performed as described in [VIS] Appendix B, except
for computation of the MAC, which shall be performed as described in this appendix.
Note: Starting with VCPS 2.2, the referenced version of [VIS] is version 1.6, which introduces a
new secure messaging algorithm.
Secure messaging for issuer scripts shall be performed as described in [VIS] Appendix B, with
the following exception(s) in [VIS] Appendix B.2.4, step #2, bullet 3:
• The Last Contactless Application Cryptogram shall be used instead of the “last Application
Cryptogram...”
• If Issuer Script MAC Chaining is supported (ADA byte 3 bit 3 is 1b), then the 8-byte value
shall be persistent across communication sessions.
Note: "persistent across communication sessions" means that the 8-byte value is not lost when
the communication session ends. For example, if Issuer Script MAC chaining is supported, after
the first issuer script is applied, it should be possible to remove the card from the RF field, and
then present it again for the next issuer script using a chained MAC, not a MAC generated using
the Last Contactless Application Cryptogram as the 8-byte value.
H Streamlined qVSDC
The requirements specified in this section are intended primarily for implementations
containing only Streamlined qVSDC. However, Streamlined qVSDC may also be supported in
full qVSDC implementations, allowing for an issuer option to process qVSDC transactions as
Streamlined qVSDC.
For full qVSDC implementations supporting this option, if CAP byte 1 bit 5 is 1b or if the CAP is
not personalized, then Streamlined qVSDC processing is performed.
Streamlined qVSDC has the same requirements as full qVSDC, except that an abbreviated form
of qVSDC Card Action Analysis is performed. In addition, some implementation decisions have
been made for Streamlined qVSDC in order to facilitate simple implementations and quick
transactions.
The card streamlined qVSDC implementation shall conform to the card qVSDC path
requirements specified in section 6, with the following exception(s):
• The qVSDC path shall not support offline processing. The qVSDC Offline GPO Response is
not personalized.
• qVSDC Card Action Analysis shall be performed as defined in this appendix.
Streamlined qVSDC shall perform qVSDC Card Action Analysis as defined in this appendix.
The card qVSDC path always returns an online cryptogram in response to the GPO command,
when returning a non-error code Status Word.
Checks and processing are performed in the order shown. Implementations are not required to
strictly follow the processing described in this section, so long as they behave in a way that is
indistinguishable (seen as a black box responding to the command) from the behavior
described.
Initialization of Data
The card shall reset CTQ byte 1 bits 8-7 to 00b (indicating Online PIN Not Required and
Signature Not Required) and CTQ byte 2 bit 8 to 0b (indicating CDCVM Not Performed).
The card shall set CVR bytes 2-4 to '80 00 00' (indicating Second GENERATE AC not
requested) and, if present, CVR byte 5 to '00'. CVR byte 1 is Unchanging and does not change
from transaction to transaction.
If CDCVM supported by card (CAP byte 3 bit 4 is 1b), then the card shall set the CVR 'CDCVM
successfully performed' bit(s) to 1b.
Note: In IAD Format 2 there are two 'CDCVM successfully performed' bits in the CVR, and the
card must set both bits to 1b.
The card shall reset the Cryptogram Information Data (CID) to '00'.
Application Blocked
If the application is blocked, then the card shall discontinue processing the command and
shall respond with SW1 SW2 = '6985'.
If CVM Required by reader (TTQ byte 2 bit 7 is 1b), then a CVM is required for the transaction,
and the card shall determine the common CVM to be performed.
If a CVM is required for the transaction, then the card shall attempt to select a common CVM
supported by both itself and the reader, as defined in this requirement. If there is more than
one CVM supported by both the card and the reader, the selected CVM is chosen based on
the following defined CVM hierarchy: 1) Online PIN, 2) CDCVM, or 3) Signature.
If the Card Additional Processes (CAP) is personalized, then:
• If both of the following are true:
̵ Online PIN supported by reader (TTQ byte 1 bit 3 is 1b)
̵ and either of the following is true:
• Issuer Country Code matches the Terminal Country Code and Online PIN supported
by card for domestic transactions (CAP byte 3 bit 8 is 1b)
• Issuer Country Code does not match the Terminal Country Code and Online PIN
supported by card for international transactions (CAP byte 3 bit 7 is 1b)
Then the card shall indicate Online PIN Required (set CTQ byte 1 bit 8 to 1b).
Else, if both of the following are true:
̵ CDCVM supported by reader (TTQ byte 3 bit 7 is 1b)
̵ and CDCVM supported by card (CAP byte 3 bit 4 is 1b)
Then the card shall indicate CDCVM Performed (set CTQ byte 2 bit 8 to 1b).
Else, if both of the following are true:
̵ Signature supported by reader (TTQ byte 1 bit 2 is 1b)
̵ and Signature supported by card (CAP byte 3 bit 5 is 1b)
Then the card shall indicate Signature Required (set CTQ byte 1 bit 7 to 1b)
Else (no common CVM between card and reader), the card shall discontinue processing
and respond to the GPO command with SW1 SW2 = '6984'.
Else (the CAP is not personalized), then:
• If Signature is not supported by the reader (TTQ byte 1 bit 2 is 0b), then the card shall
discontinue processing and respond to the GPO command with SW1 SW2 = '6984'.
Dual-interface cards shall implement the functionality and requirements defined in this
appendix.
The card shall not activate the contactless interface if the contact interface is activated.
The card's contact interface should have priority over its contactless interface. If the contactless
interface is active and the contact interface is subsequently activated, the card should
deactivate the contactless interface and activate the contact interface.
If the card is configured to not support contactless transactions (that is, none of the
contactless paths on the card are enabled), then the card shall respond to SELECT commands
received over the contactless interface with an error Status Word (SW1 SW2 = '6986' is
recommended).
A card application contains a single PDOL for the contactless interface. For a dual-interface
card, the contact interface may be personalized with a different PDOL or without a PDOL.
For a dual-interface card, the card application shall be capable of supporting different PDOL’s
based on interface – contact or contactless.
Counters that are used in VCPS transaction processing are reset either through Issuer Update
Processing or through [VIS] transactions, subject to issuer requirements.
Counter reset with Issuer Update Processing is described and specified in section 6.6.
Counter reset with [VIS] transactions are described and specified in [VIS], and are briefly
summarized in this section.
The [VIS] specification has been revised to reset the counters and indicators shared by VIS and
VCPS, and to reset the counters and indicators used exclusively by VCPS, subject to issuer
requirements for resetting of counters.
In addition, VCPS introduced the ‘Reset VLP Available Funds to VLP Funds Limit when Offline
PIN successfully verified’ (ADA byte 3 bit 5) option. With this option, the VLP Available Funds is
reset to the VLP Funds Limit when the Offline PIN is successfully validated during a VIS
transaction (and other processing requirements are met).
See [VIS] for additional details regarding resetting of counters during VIS transactions.
qVSDC transactions where the Transaction Currency Code does not match the Application
Currency Code or any of the supported Conversion Currency Codes are international
transactions. Additionally, the issuer may configure the application such that transactions
where the Terminal Country Code does not match the Issuer Country Code are also
international transactions. Regardless of the issuer configuration to include international
determination based on the country code, the Consecutive Transaction Counter International
(CTCI) may be used to count qVSDC international transactions.
This behavior is unlike [VIS], where two separate counters are used to count non-matching
currency code transactions and non-matching country code transactions. ADA byte 3 bit 1
(‘CTCI also counts non-matching country code transactions’) is introduced to allow for [VIS]
applications to count international transactions using the same single counter.
If ‘CTCI also counts non-matching country code transactions’ (ADA byte 3 bit 1 is 1b), then
[VIS] transactions shall increment the Consecutive Transaction Counter International (CTCI) for
non-matching country code transactions.
This section outlines the requirements for the accessibility of contact-exclusive data,
contactless-exclusive data, and shared data.
Records that are only listed in the Application File Locator(s) used for the contactless
interface shall not be accessible over the contact interface.
Records that are only listed in AFL(s) used for the contact interface shall not be accessible
over the contactless interface.
Issuers shall (using the AFLs) be able to configure any record to be accessible over only the
contact interface, only the contactless interface, or both interfaces.
If the record requested by the READ RECORD command is not allowed to be retrieved over
the interface, the card shall respond with an error SW1 SW2 ('6A83' is recommended)
For example, a record present only in the AFL for the qVSDC path shall only be accessible
over the contactless interface, and a record present in the AFL for both qVSDC and VIS shall
be accessible over both the contactless and contact interfaces.
Records that are not listed in any AFL should be accessible over the contact interface and
shall not be accessible over the contactless interface. This excludes transaction log records,
whose accessibility is governed by Req I.5.
Note: This record retrieval restriction by interface is based only on whether the record was
personalized in the AFL for the card paths, regardless of whether or not the AFL was returned by
the card prior to the card application receiving the READ RECORD command.
GET DATA:
• [VIS] (Table A-1) defines whether card internal data elements are retrievable by the GET
DATA command over the contact interface.
The ‘Contactless Functionality Disabled’ bit (Application Capabilities byte 1 bit 8) is used to
configure whether the dual interface card is permitted to process commands received over the
contactless interface. This bit can be personalized, or set post-issuance using the PUT DATA
issuer script command, to “disable the contactless functionality” of the card.
When ‘Contactless Functionality Disabled’ is 1b, the card application shall discontinue
processing of all commands received over the contactless interface, and shall respond with
an error SW1 SW2 ('6A81' is recommended).
Application Capabilities byte 1 bit 7, ‘Restrict reset of Contactless Functionality Disabled bit’,
can be personalized or set post-issuance using the PUT DATA issuer script command to control
the conditions under which the ‘Contactless Functionality Disabled’ bit is reset to 0b.
If ‘Restrict reset of Contactless Functionality Disabled bit’ is 0b, then the ‘Contactless
Functionality Disabled’ bit shall be reset to 0b during the next [VIS] transaction where the
Issuer Update Processing introduces new counters and indicators that must be processed
during [VIS] transactions. For dual-interface cards supporting Issuer Update Processing, the
following counters shall be processed as defined:
• Last Successful Issuer Update ATC Register – During [VIS] transactions, this data element is
set to the value of the ATC when [VIS] Issuer Authentication requirements are met, or when
an issuer script command is successfully processed.
• Last Contactless Application Cryptogram Valid Indicator – If a [VIS] transaction is initiated,
then this indicator shall be set to 0 (during GPO processing).
The ICC Public Key Certificate used in DDA and fDDA contain a hash of static data from the
card application. However, different static data elements are recommended to be signed for
VCPS and VIS:
• It is recommended that VCPS not sign any static data. Transaction times are reduced if VCPS
does not sign static data, as one fewer record may be returned.
• It is recommended that VIS sign the static data as recommended in [VIS].
Although VIS and VCPS may share the same ICC Public Key Certificate, it is recommended that
VCPS and VIS use different ICC Public Key Certificates, and for the VCPS ICC Public Key
Certificate not to contain the any static data to be authenticated. Transaction times are
reduced since there is less processing.
Even when the hash in the VCPS ICC Public Key Certificate does not contain any static data, the
Application PAN and Application Expiration are still protected. The PAN is verified against the
Application PAN contained in the ICC Public Key Certificate during DDA and fDDA processing
([EMV] Book 2 section 6.4). To prevent altered Application Expiration Dates, it is strongly
recommended that the Certificate Expiration Date (from the ICC Public Key Certificate) match
Issuers should balance the benefits of using different ICC Public Key Certificates for VIS and
VCPS (reducing transaction times) against the increased complexity of generating and
personalizing two ICC Public Key Certificates.
J Reader-Terminal Data
This appendix outlines the data elements that may need to be communicated from the reader
to the merchant device connected to the acquirer for each transaction path. The data that
needs to be communicated is dependent on the architecture of the reader within the POS
acceptance environment, hence the tables below are intended only to provide guidance. The
tables do not represent a comprehensive list of all data that must be communicated, and many
of the data elements listed below may not need to be communicated at all (depending on
reader-terminal architecture).
Regardless of reader-terminal architecture, the acquirer shall be provided the data necessary to
construct online messages and clearing records with the new data specified in this appendix.
The method and means of providing this information to the acquirer is outside the scope of
this specification.
This section describes the messaging requirements for acquirers that support qVSDC
transactions.
qVSDC data requirements for online messages and clearing records are the same as for VSDC
contact chip transactions, except for new values in existing fields and new values in chip fields
(as shown in Table K–3).
The primary account number and application expiration date used in messaging are retrieved
from Track 2 Equivalent Data.
L Transaction Logging
Implementation-Optional: Implementation of transaction logging is at implementer discretion.
Issuer-Optional: If transaction logging is implemented, the issuer shall be able to enable and
disable transaction logging. Due to the increase in application processing times when
transaction logging is used, it is strongly recommended that issuers not enable transaction
logging.
If transaction logging is supported, the SFI containing the transaction log must be in the range
11-30 ('0B' to '1E'). It is recommended that the SFI containing the transaction log be an issuer
configurable value (identified at the time of personalization by the issuer in the Log Entry), but
card implementations may choose to fix the SFI value(s) which are supported for transaction
logging. If the card implementation supports [EMV CPS], then SFI values 13 and 14 ('0D' and
'0E') are reserved for other purposes and cannot be used for transaction logging.
The default behavior is to log all online and offline approval requested transactions. However,
Application Default Action (ADA) byte 3 includes three bits reserved to control logging of
transactions:
• Do not include offline approval requested transactions in the transaction log.
• Do not include online approval requested transactions in the transaction log.
• Include offline declined transactions in the transaction log.
Recognize that VCPS transaction log information represents the card applications view of the
transaction outcome, which is not necessarily the same as the actual outcome of the
transaction.
Visa recommends only updating the transaction log for the following Transaction Types:
Implementations may support an option where log access (that is, reading log records)
requires successful verification of a [VIS] Offline PIN. Visa rules for PIN entry and verification
apply.
The IAD Format is indicated in the left nibble of the CVN value, and indicates the layout of the
Issuer Application Data, such as the length of the IAD, the format of the CVR, and where to find
the Derivation Key Index (DKI) and Issuer Discretionary Data Option ID.
Byte IAD Format 0/1/3 (Current) IAD Format 2 (New in VCPS 2.2)
2 DKI CVN
3 CVN DKI
5 CVR byte 2 (bitmap) CVR byte 2 (bitmap – same as for VIS Format 0/1/3)
6 CVR byte 3 (bitmap) CVR byte 3 (bitmap – same as for VIS Format 0/1/3)
7 CVR byte 4 (bitmap) CVR byte 4 (bitmap – same as for VIS Format 0/1/3)
Byte IAD Format 0/1/3 (Current) IAD Format 2 (New in VCPS 2.2)
Byte/bit CVR for IAD Format 0/1/3 (Current) CVR for IAD Format 2 (New in VCPS 2.2)
1/7 RFU
1/6 RFU
1/5 RFU
1/4 RFU
1/3 RFU
1/2 RFU
1/1 RFU
Byte/bit CVR for IAD Format 0/1/3 (Current) CVR for IAD Format 2 (New in VCPS 2.2)
2/7 10b = Second GENERATE AC not requested 10b = Second GENERATE AC not requested
11b = RFU 11b = RFU
3/4 Issuer Authentication failure on last online Issuer Authentication failure on last online
transaction transaction
4/7
4/6
4/5
4/4 Issuer script processing failed on last transaction Issuer script processing failed on last transaction
Byte/bit CVR for IAD Format 0/1/3 (Current) CVR for IAD Format 2 (New in VCPS 2.2)
5/1 --- not available --- Secure Messaging uses EMV Session key-based
derivation
Glossary
This is a glossary of terms used in this specification; it is not intended as a data dictionary. For
descriptions of data elements, see Appendix D.
0-9
A
a alpha
AC Application Cryptogram
an alphanumeric
Application Cryptogram Cryptogram returned by the card in response to the GET PROCESSING
OPTIONS command; one of the following cryptogram types:
TC Transaction Certificate
ARQC Authorization Request Cryptogram
AAC Application Authentication Cryptogram
Term Definition
Application Authentication A cryptogram generated by the card application for offline declined
Cryptogram (AAC) transactions.
Application Elementary File A set of data or records in a file that uses a single Short File Identifier (SFI).
authentication A cryptographic process that validates the identity and integrity of data.
authorization controls Information in the chip application enabling the card to act on the issuer’s
behalf at the point of transaction. The controls help issuers manage their
below-floor-limit exposure to fraud and credit losses. Also known as offline
authorization controls.
Authorization Request Cryptogram The cryptogram generated by the card for transactions requiring online
(ARQC) authorization and sent to the issuer in the authorization request. The issuer
validates the ARQC during the Online Card Authentication (CAM) process
to ensure that the card is authentic and that the authorization request was
not created using skimmed data.
Authorization Response Cryptogram A cryptogram generated by the issuer and sent to the card in the
(ARPC) authorization response. This cryptogram is the result of the Authorization
Request Cryptogram (ARQC) and the issuer’s authorization response
encrypted with the Unique Derivation Key (UDK). It is validated by the card
during Issuer Authentication to ensure that the response came from a valid
issuer.
B
b binary
Bank Identification Number (BIN) A 6-digit number assigned by Visa and used to identify a customer or
processor for authorization, clearing, or settlement processing.
Binary Coded Decimal A code for representing decimal digits in a binary format.
C
C conditional
Term Definition
CA Certificate Authority
Candidate List A list of applications supported by both the card and reader. The Candidate
List is built by the reader during Application Selection.
card authentication A means of validating whether a card used in a transaction is the genuine
card issued by the issuer.
Card Verification Value (CVV) A unique check value encoded on a card’s magnetic stripe and chip to
validate card information during an online authorization.
cardholder verification The process of determining that the presenter of the card is the valid
cardholder.
cash disbursement Currency, including travelers checks, paid to a cardholder using a card.
Certificate Authority (CA) A trusted central administration that issues and revokes certificates.
Chinese Remainder Theorem A specific format for private RSA keys that makes the signature calculation
faster.
chip card A card embedded with a chip that communicates information to a point-
of-transaction terminal.
chip-capable A card acceptance device that is designed and constructed to facilitate the
addition of a chip reader/writer.
Term Definition
clearing The collection and delivery to the issuer of a completed transaction record
from an acquirer.
cn compressed numeric
Collision Transmission by two or more PICCs in the same PCD energizing field and
during the same time period, such that the PCD is unable to distinguish
from which PICC the data originated.
Combined DDA/Application A type of Offline Data Authentication where the card combines generation
Cryptogram generation (CDA) of a cryptographic value (dynamic signature) for validation by the terminal
with generation of the Application Cryptogram to ensure that the
Application Cryptogram came from the valid card. (Note that CDA is not
supported in qVSDC.)
Consumer Device Proximity Card (PICC) or other chip-capable device (for example, a cell
phone) that is used by consumers to conduct payment.
Contactless Transaction A transaction conducted over the contactless interface according to this
specification.
Contactless Indicator An optional indicator in the last position in the magnetic stripe data on the
chip. A value greater than zero indicates contactless and may be used to
differentiate cards with the same account number.
cryptogram A value that is the result of data elements entered into an algorithm and
then encrypted. Commonly used to validate data integrity.
cryptographic key The numeric value entered into a cryptographic algorithm that allows the
algorithm to encrypt or decrypt a message.
Term Definition
CTTA Funds Refers to the value of the Cumulative Total Transaction Amount Upper
Limit (CTTAUL) less the Cumulative Total Transaction Amount (CTTA).
If CTTAUL is not personalized, then refers to the value of the Cumulative
Total Transaction Amount Limit (CTTAL) less the Cumulative Total
Transaction Amount (CTTA).
D
data authentication Validation that data stored in the integrated circuit card has not been
altered since card issuance. See also Offline Data Authentication.
Data Encryption Algorithm (DEA) An encipherment operation and an inverse decipherment operation in a
cryptographic system.
Data Encryption Standard (DES) The public domain symmetric key cryptography algorithm of the National
Institute for Standards and Technology.
Dedicated File Name Name of file or application as defined in [EMV] and [VIS].
DF Dedicated file
digital signature A cryptogram generated by encrypting a message digest (or hash) with a
private key that allows the message content and the sender of the message
to be verified.
Discovery Contactless readers poll for contactless cards. When one or more
contactless cards enter the field of the contactless reader, this is called
discovery.
Term Definition
double-length DES Key Two secret 64-bit input parameters each of the Data Encryption Standard
algorithm, consisting of 56 bits that must be independent and random, and
8 error-detecting bits set to make the parity of each 8-bit byte of the key
odd.
Dynamic Data Authentication (DDA) Offline authentication that offers protection against skimming. The card
generates an RSA signature using transaction-specific data for validation by
the terminal.
Dynamic Signature A signature generated by the card using dynamic data from both the card
and the reader. This signature is validated by the reader to prove that the
card is genuine. When used it refers to Signed Dynamic Application Data,
tag '9F4B'.
E
encryption The process of transforming cleartext into ciphertext.
End Sentinel Indicator at the end of Track 1 or Track 2 on the magnetic stripe. It is
followed by the Longitudinal Redundancy Check.
expired card A card on which the embossed, encoded, or printed expiration date has
passed.
F
Fast DDA (fDDA) Leverages DDA as defined in [EMV] and [VIS] specifications. Used in qVSDC
transactions to allow the reader to issue READ RECORD commands to
obtain Dynamic Data Authentication (DDA) related data from the card and
perform the DDA calculations after the card has left the field.
File Control Information Provided in a card response when the card application is selected (using a
SELECT command) by a reader or terminal.
floor limit A currency amount that Visa has established for single transactions at
specific types of merchants, above which online authorization is required.
G
GPO GET PROCESSING OPTIONS command
Term Definition
Hardware Security Module (HSM) A secure module used to store cryptographic keys and perform
cryptographic functions.
Hex Hexadecimal
I
IA Issuer Authentication
IC integrated circuit
iCVV An alternate CVV to be used in the image of the Track 2 Equivalent Data
personalized on the chip.
issuer A Visa customer that issues Visa or Electron cards, or proprietary cards
bearing the PLUS or Visa Electron Symbol.
Issuer Authentication Validation of the issuer by the card to ensure the integrity of the
authorization response. See Authorization Response Cryptogram (ARPC).
Issuer Update An update of the card application and its data elements, counters, or
indicators due to Issuer Update Processing. The Issuer Update may consist
of issuer authentication using the EXTERNAL AUTHENTICATE command
and/or application of issuer script commands.
J
K
key generation The creation of a new key for subsequent use.
key management The handling of cryptographic keys and other related security parameters
during the entire life cycle of the keys, including their generation, storage,
distribution, entry and use, deletion or destruction, and archiving.
L
January 2016 Visa Confidential 219
Notice: This information is proprietary and CONFIDENTIAL to Visa. It is distributed to Visa participants for use exclusively in managing their Visa
programs. It must not be duplicated, published, distributed or disclosed, in whole or in part, to merchants, cardholders or any other person without
prior written permission from Visa. © 2007-2016 Visa. All Rights Reserved.
Glossary
Visa Contactless Payment Specification: Visa Supplemental Requirements
Term Definition
Lc Exact length of data sent by the Terminal Application Layer (TAL) in a Case
3 or 4 command
Longitudinal Redundancy Check Verification value that ensures no data has been lost in the process of
reading the data from the physical magnetic stripe. See the [VPTSM] for
additional information.
M
M mandatory
magnetic stripe The stripe on the back of the card that contains the magnetically coded
account information necessary to complete a non-chip electronic
transaction.
Magnetic Stripe Data (MSD) Contactless payment using Track 2 Equivalent Data acquired from the chip,
or Track 1 constructed from data acquired from the chip, operating under
magnetic stripe payment rules.
Magnetic Stripe Image The minimum chip payment service data replicating information in the
magnetic stripe required to process a transaction that is compliant with
EMV. (Not allowed as a contactless magnetic stripe solution.)
Master Derivation Key A double length DES key used to derive card unique keys used in online
card authentication.
Merchant Category Code (MCC) A code designating the principal trade, profession, or line of business in
which a merchant is engaged.
message authentication code (MAC) A digital code generated using a cryptographic algorithm which establishes
that the contents of a message have not been changed and that the
message was generated by an authorized entity.
Term Definition
N
n numeric
nibble The four most significant or least significant bits of a byte of data.
O
O Optional
Offline Data Authentication A process whereby the card is validated at the point of transaction using
RSA public key technology to protect against counterfeit or skimming.
VCPS supports Fast Dynamic Data Authentication (fDDA)
offline dynamic data authentication A type of Offline Data Authentication where the card generates a
cryptographic value using transaction-specific data elements for validation
by the terminal to protect against skimming. Includes both DDA and CDA.
offline PIN A PIN value stored on the card that is validated at the point of transaction
between the card and the terminal.
offline PIN verification The process whereby a cardholder-entered PIN is passed to the card for
comparison to a PIN value stored secretly on the card.
offline-only terminal A card acceptance device that is not capable of sending transactions online
for issuer authorization.
Term Definition
Online Card Authentication (CAM) Validation of the card by the issuer to protect against data manipulation
and skimming. See Authorization Request Cryptogram (ARQC).
online PIN A method of PIN verification where the PIN entered by the cardholder into
the terminal PIN pad is DES-encrypted and included in the online
authorization request message sent to the issuer.
online-capable terminal A card acceptance device that is able to send transactions online to the
issuer for authorization.
P
P1 Parameter 1
P2 Parameter 2
personalization The process of populating a card with the application data that makes it
ready for use.
PK Public Key
POS Device A terminal which is installed at the point of sale; e.g., credit card reader,
electronic cash register, vending machine.
post-issuance update A command sent by the issuer through the terminal via an authorization
response to update the electronically stored contents of a chip card.
Term Definition
private key As part of an asymmetric cryptographic system, the key that is kept secret
and known only to the owner.
Proximity Card (PICC) Identification cards of the card type ID-1 (full size card) operating in
proximity to a coupling device.
Proximity Coupling Device (PCD) The reader/writer device (for example, a dongle) that uses inductive
coupling to provide power to the Consumer Device and also to control the
data exchange with the Consumer Device.
Proximity Payment Systems A list of supported Application Identifiers (AIDs), Application Labels, and
Environment (PPSE) Application Priority Indicators for applications that are accessible over the
contactless interface. This list will be provided by the card in FCI with all
directory entries in the card response to SELECT of the PPSE
('2PAY.SYS.DDF01').
public key As part of an asymmetric cryptographic system, the key known to all
parties.
public key cryptographic algorithm A cryptographic algorithm that allows the secure exchange of information,
but does not require a shared secret key, through the use of two related
keys—a public key which may be distributed in the clear and a private key
which is kept secret.
public key pair The two mathematically related keys, a public key and a private key which,
when used with the appropriate public key cryptographic algorithm, can
allow the secure exchange of information, without the secure exchange of
a secret.
Q
quasi-cash transaction A transaction representing a merchant’s sale of items, such as gaming chips
or money orders, that are directly convertible to cash.
quick VSDC (qVSDC) VIS minimized to ensure quick transactions over the contactless interface.
Requirements are described in this document.
Term Definition
qVSDC Path For transactions conducted over the contactless interface, the qVSDC Path
is an application path taken by the card which results in card behavior
defined for qVSDC. This path is taken for contactless transactions where
the card and reader both support qVSDC.
The qVSDC Path supports only the contactless interface.
R
R required
Reader Risk Parameter Reader parameters used to perform reader risk management during
Reader Preliminary Transaction Processing (Pre-processing).
receipt A paper record of a transaction generated for the cardholder at the point
of transaction.
RF Radio Frequency
S
SAD Signed Static Application Data
SD Special Device
secret key A key that is used in a symmetric cryptographic algorithm (that is, DES),
and cannot be disclosed publicly without compromising the security of the
system. This is not the same as the private key in a public/private key pair.
secure messaging A process that enables messages to be sent from one entity to another,
and protects against unauthorized modification or viewing.
session key A temporary cryptographic key computed in volatile memory and not valid
after a session is ended.
Term Definition
Single Unit of Currency A single unit of currency is one unit of that currency. One dollar U.S.
currency, for example, or one pound in British currency. A transaction
containing a single unit of currency is used at some merchants to indicate a
Status Check on the account.
Start Sentinel Indicator at the beginning of Track 1 or Track 2 on the magnetic stripe.
Static Data Authentication (SDA) A type of Offline Data Authentication where the terminal validates a
cryptographic value placed on the card during personalization. This
validation protects against some types of counterfeit, but does not protect
against skimming.
Status Check An online authorization for a single unit of currency. In some markets,
status checks are used as authorizations for automated fuel dispensing,
implicitly allowing up to a set amount to be used. The use of status checks
is limited to automated fuel dispensing.
T
TAC Terminal Action Codes
TC Transaction Certificate
Triple DES The data encryption algorithm used with a double-length DES key.
U
UDK Unique Derivation Key
Unique Derivation Key A card-unique double-length DES key derived from a master key and used
in online card authentication.
V
VCPS Visa Contactless Payment Specification
Term Definition
VCPS Transaction A transaction conducted over the contactless interface in compliance with
this specification.
VIS Path For transactions conducted over the contact interface, the VIS Path is an
application path taken by the card which results in card behavior defined
for VIS.
The VIS Path supports only the contact interface.
Visa AID An AID using the Visa Registered Application Provider Identifier (RID,
'A0 00 00 00 03') that has a Proprietary Application Identifier Extension
(PIX) assigned by Visa International.
Visa PIXs:
'1010' – Visa Debit and Visa Credit
'2010' – Visa Electron
'3010' – Interlink
'8010' – PLUS
Regional AIDs using the reserved range of Visa assigned PIXs are
permitted.
Visa Certificate Authority (CA) A Visa-approved organization certified to issue certificates to participants
in a Visa payment service.
Visa Contactless Payment A Visa specification defining requirements for conducting a payment
Specification (VCPS) transaction over a contactless interface.
Visa Smart Debit/Credit (VSDC) The Visa payment service offerings for chip-based debit and credit
programs. These services are supported by VisaNet processing, as well as
by Visa rules and regulations; and are based on EMV and VIS, VCPS, or EMV
Common Core Definitions (CCD) – including Common Payment Application
(CPA) – specifications.
VisaNet The systems and services, including the V.I.P. and BASE II systems, through
which Visa delivers online financial processing, authorization, clearing, and
settlement services to customers.
W
X
XOR Exclusive-OR
Y
YDDD Year, day:
Y right-most digit of the year (‘0’–’9’)
DDD Julian day of the year (‘001’–’366’)
Term Definition