EMV v4.4 Book 3 Application Specification-1
EMV v4.4 Book 3 Application Specification-1
Book 3
Application Specification
Version 4.4
October 2022
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
The EMV® Specifications are provided “AS IS” without warranties of any kind, and EMVCo neither
assumes nor accepts any liability for any errors or omissions contained in these Specifications.
EMVCO DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, AS TO THESE
SPECIFICATIONS.
EMVCo makes no representations or warranties with respect to intellectual property rights of any third
parties in or in relation to the Specifications. EMVCo undertakes no responsibility to determine
whether any implementation of these Specifications may violate, infringe, or otherwise exercise the
patent, copyright, trademark, trade secret, know-how, or other intellectual property rights of third
parties, and thus any person who implements any part of these Specifications should consult an
intellectual property attorney before any such implementation.
Without limiting the foregoing, the Specifications may provide for the use of public key encryption and
other technology, which may be the subject matter of patents in several countries. Any party seeking
to implement these Specifications is solely responsible for determining whether its activities require a
license to any such technology, including for patents on public key encryption technology. EMVCo
shall not be liable under any theory for any party’s infringement of any intellectual property rights in
connection with these Specifications.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Specification Bulletin no. 267: Clarification on Handling of Unknown ICC Data and
Track 1 Discretionary Data
Specification Bulletin no. 273: Clarification on Setting TSI bit for CDA (Mode 1 and
2) Transaction
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Contents
Part I – General
1 Scope 14
1.1 Changes in Version 4.4 14
1.2 Structure 14
1.3 Underlying Standards 15
1.4 Audience 15
2 Normative References 16
3 Definitions 19
4 Abbreviations, Notations, Conventions, and Terminology 27
4.1 Abbreviations 27
4.2 Notations 34
4.3 Data Element Format Conventions 36
4.4 Terminology 37
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
6.5 Commands 51
6.5.1 APPLICATION BLOCK Command-Response APDUs 52
6.5.2 APPLICATION UNBLOCK Command-Response APDUs 53
6.5.3 CARD BLOCK Command-Response APDUs 54
6.5.4 EXTERNAL AUTHENTICATE Command-Response APDUs 55
6.5.5 GENERATE APPLICATION CRYPTOGRAM Command-Response
APDUs 56
6.5.6 GET CHALLENGE Command-Response APDUs 60
6.5.7 GET DATA Command-Response APDUs 61
6.5.8 GET PROCESSING OPTIONS Command-Response APDUs 62
6.5.9 INTERNAL AUTHENTICATE Command-Response APDUs 64
6.5.10 PIN CHANGE/UNBLOCK Command-Response APDUs 66
6.5.11 READ RECORD Command-Response APDUs 69
6.5.12 VERIFY Command-Response APDUs 71
6.5.13 Command Chaining 75
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Part IV – Annexes
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Annex E TVR and TSI Bit Settings Following Script Processing 193
E1 Scenarios 193
E2 Additional Information 194
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Index 227
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Tables
Table 1: Structure of SFI 42
Table 2: Most Significant Nibble of the Class Byte 45
Table 3: Coding of the Instruction Byte 46
Table 4: Coding of Status Bytes SW1 SW2 48
Table 5: Allocation of Status Bytes 49
Table 6: APPLICATION BLOCK Command Message 52
Table 7: APPLICATION UNBLOCK Command Message 53
Table 8: CARD BLOCK Command Message 54
Table 9: EXTERNAL AUTHENTICATE Command Message 55
Table 10: GENERATE AC Cryptogram Types 56
Table 11: GENERATE AC Command Message 56
Table 12: GENERATE AC Reference Control Parameter 57
Table 13: Format 1 GENERATE AC Response Message Data Field 57
Table 14: Format 2 GENERATE AC Response Message Data Field 58
Table 15: Coding of Cryptogram Information Data 59
Table 16: GET CHALLENGE Command Message 60
Table 17: GET DATA Command Message 61
Table 18: GET PROCESSING OPTIONS Command Message 62
Table 19: INTERNAL AUTHENTICATE Command Message 64
Table 20: PIN CHANGE/UNBLOCK Command Message 67
Table 21: READ RECORD Command Message 69
Table 22: READ RECORD Command Reference Control Parameter 69
Table 23: VERIFY Command Message 71
Table 24: VERIFY Command Qualifier of Reference Data (P2) 72
Table 25: Plaintext Offline PIN Block Format 73
Table 26: Values of CLA in Command Chaining 75
Table 27: Data Objects Used by the Offline Data Authentication Algorithm 78
Table 28: Mandatory Data Objects 78
Table 29: Data Required for SDA 79
Table 30: Data Required for DDA and/or CDA 79
Table 31: Data Required for XDA 79
Table 32: Data Objects Retrievable by GET DATA Command 80
Table 33: Data Retrievable by GET PROCESSING OPTIONS 80
Table 34: Proposed Terminal Behaviours when Format Errors Detected for
Selected Data Elements 82
Table 35: ICC Data Missing Indicator Setting 83
Table 36: Terminal Action Regarding Application Usage Control 101
Table 37: Data Elements Dictionary 135
Table 38: Data Elements Tags 162
Table 39: Tag Field Structure (First Byte) BER-TLV 169
Table 40: Tag Field Structure (Subsequent Bytes) BER-TLV 169
Table 41: Application Interchange Profile 173
Table 42: Application Usage Control 174
Table 43: CVM Codes 175
Table 44: CVM Condition Codes 177
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Figures
Figure 1: Command APDU Structure 44
Figure 2: Response APDU Structure 44
Figure 3: Structural Scheme of Status Bytes 47
Figure 4: Format 1 GET PROCESSING OPTIONS Response Message Data Field 63
Figure 5: READ RECORD Response Message Data Field 70
Figure 6: Transaction Flow Example 85
Figure 7: Use of GENERATE AC Options (no ODA, SDA, DDA) 88
Figure 8: CVM Processing (Part 1 of 7) 107
Figure 9: CVM Processing (Part 2 of 7) 109
Figure 10: CVM Processing (Part 3 of 7) 110
Figure 11: CVM Processing (Part 4 of 7) 111
Figure 12: CVM Processing (Part 5 of 7) 112
Figure 13: CVM Processing (Part 6 of 7) 113
Figure 14: CVM Processing (Part 7 of 7) 114
Figure 15: Random Transaction Selection Example 120
Figure 16: Issuer Script Format 131
Figure 17: Issuer Script Command Format (Shown with Three Commands) 131
Figure 18: Primitive BER-TLV Data Object (Data Element) 171
Figure 19: Constructed BER-TLV Data Object 171
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Part I
General
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
1 Scope
This document, the Integrated Circuit Card Specifications for Payment Systems –
Book 3, Application Specification defines the terminal and integrated circuit card (ICC)
procedures necessary to effect a payment system transaction in an international
interchange environment.
The Integrated Circuit Card Specifications for Payment Systems includes the following
additional documents, all available on http://www.emvco.com:
• Book 1 – Application Independent ICC to Terminal Interface Requirements
• Book 2 – Security and Key Management
• Book 4 – Cardholder, Attendant, and Acquirer Interface Requirements
1.2 Structure
Book 3 consists of the following parts:
Part I – General
Part II – Data Elements and Commands
Part III – Debit and Credit Application Specification
Part IV – Annexes
Part V – Common Core Definitions
Part I includes this introduction, as well as data applicable to all Books: normative
references, definitions, abbreviations, notations, data element format convention, and
terminology.
Part II describes data elements and files as well as commands for financial transaction.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 1 Scope
Application Specification 1.3 Underlying Standards
Part III specifies the debit and credit application functions including:
• Transaction flow (the sequence of events and the commands issued to the card)
• Exception processing
• Definition of data elements and commands as they apply to the exchange of
information between an ICC and a terminal. In particular,
Structure and referencing of files
The usage of commands between the ICC and the terminal to achieve application
level functions.
The functions described are those necessary to ensure that payment system cards
conforming to this specification can perform a set of core functions in terminals
conforming to this specification. Application functions unique to individual payment
systems and those functions not performed in interchange are not described, but are not
precluded.
Part IV includes a complete data elements dictionary, rules for BER-TLV data objects,
instructions for coding of specific data elements, and transaction log information. It
discusses TVR and TSI bit settings following script processing, and Status Words
returned in response to an EXTERNAL AUTHENTICATE command.
Part V defines an optional extension to be used when implementing a card complying to
the Common Core Definitions (CCD).
The Book also includes a revision log and an index.
This specification does not address clearing and settlement or any transactions where
the ICC is not present.
1.4 Audience
This specification is intended for use by manufacturers of ICCs and terminals, system
designers in payment systems, and financial institution staff responsible for
implementing financial applications in ICCs.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
2 Normative References
The following specifications and standards contain provisions that are referenced in
these specifications. The latest version shall apply unless a publication date is explicitly
stated.
EMV Contact Interface EMV Level 1 Specifications for Payment Systems, EMV
Specification Contact Interface Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 2 Normative References
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 2 Normative References
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
3 Definitions
The following terms are used in one or more books of these specifications.
Biometric Data Block A block of data with a specific format that contains
information captured from a biometric capture device and
that could be used as follows:
• stored in the card as part of the biometric reference
template
• sent to the ICC in the data field of the PIN
CHANGE/UNBLOCK command
• sent to the ICC in the data field of the VERIFY
command for offline biometric verification
• sent online for verification
The format of the BDB is outside the scope of this
specification.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 3 Definitions
Application Specification
Byte 8 bits.
Certification Authority Trusted third party that establishes a proof that links a
public key and other relevant information to its owner.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 3 Definitions
Application Specification
Data Integrity The property that data has not been altered or destroyed
in an unauthorised manner.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 3 Definitions
Application Specification
Hash Result The string of bits that is the output of a hash function.
Integrated Circuit(s) A card into which one or more integrated circuits are
Card inserted to perform processing and memory functions.
Interface Device That part of a terminal into which the ICC is inserted,
including such mechanical and electrical devices as may
be considered part of it.
Iris Verification The process of determining that the iris presented is valid.
Issuer Action Code Any of the following, which reflect the issuer-selected
action to be taken upon analysis of the TVR:
• Issuer Action Code – Default
• Issuer Action Code – Denial
• Issuer Action Code – Online
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 3 Definitions
Application Specification
Key Withdrawal The process of removing a key from service as part of its
revocation.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 3 Definitions
Application Specification
Payment System A logical construct within the ICC, the entry point to
Environment which is a Directory Definition File (DDF) named
'1PAY.SYS.DDF01'. This DDF contains a Payment
System Directory which in turn contains entries for one or
more Application Definition Files (ADFs) which are
formatted according to this specification.
Physical Compromise The compromise of a key resulting from the fact that it
has not been securely guarded, or a hardware security
module has been stolen or accessed by unauthorised
persons.
Private Key That key of an entity’s asymmetric key pair that should
only be used by that entity. In the case of a digital
signature scheme, the private key defines the signature
function.
Public Key That key of an entity’s asymmetric key pair that can be
made public. In the case of a digital signature scheme, the
public key defines the verification function.
Public Key Certificate The public key information of an entity signed by the
certification authority and thereby rendered unforgeable.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 3 Definitions
Application Specification
Terminal The device used in conjunction with the ICC at the point
of transaction to perform a financial transaction. The
terminal incorporates the interface device and may also
include other components and interfaces such as host
communications.
Terminal Action Code Any of the following, which reflect the acquirer-selected
action to be taken upon analysis of the TVR:
• Terminal Action Code – Default
• Terminal Action Code – Denial
• Terminal Action Code – Online
Terminate Card End the card session by deactivating the IFD contacts
Session according to EMV Contact Interface Specification and
displaying a message indicating that the ICC cannot be
used to complete the transaction.
Terminate Transaction Stop the current application and deactivate the card.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 3 Definitions
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
4.1 Abbreviations
a Alphabetic (see section 4.3, Data Element Format Conventions)
AC Application Cryptogram
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.1 Abbreviations
CA Certification Authority
CV Cryptogram Version
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.1 Abbreviations
DF Dedicated File
DIR Directory
EF Elementary File
EN European Norm
FC Format Code
Hex Hexadecimal
I/O Input/Output
IC Integrated Circuit
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.1 Abbreviations
KD Key Derivation
KM Master Key
KS Session Key
L Length
M Mandatory
max. Maximum
MF Master File
NF Norme Française
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.1 Abbreviations
O Optional
P1 Parameter 1
P2 Parameter 2
PC Personal Computer
pos. Position
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.1 Abbreviations
SK Session Key
TC Transaction Certificate
UN Unpredictable Number
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.1 Abbreviations
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.2 Notations
4.2 Notations
'0' to '9' and 'A' to 'F' 16 hexadecimal characters
xx Any value
A ≡ B mod n Integers A and B are congruent modulo the integer n, that is,
there exists an integer d such that
(A – B) = dn
A mod n The reduction of the integer A modulo the integer n, that is,
the unique integer r, 0 ≤ r < n, for which there exists an
integer d such that
A = dn + r
A/n The integer division of A by n, that is, the unique integer d for
which there exists an integer r, 0 ≤ r < n, such that
A = dn + r
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.2 Notations
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.3 Data Element Format Conventions
a Alphabetic data elements contain a single character per byte. The permitted
characters are alphabetic only (a to z and A to Z, upper and lower case).
an Alphanumeric data elements contain a single character per byte. The
permitted characters are alphabetic (a to z and A to Z, upper and lower case)
and numeric (0 to 9).
There is one exception: The permitted characters for Payment Account
Reference are alphabetic upper case (A to Z) and numeric (0 to 9).
ans Alphanumeric Special data elements contain a single character per byte. The
permitted characters and their coding are shown in the Common Character
Set table in Book 4 Annex B.
There is one exception: The permitted characters for Application Preferred
Name are the non-control characters defined in the ISO/IEC 8859 part
designated in the Issuer Code Table Index associated with the Application
Preferred Name.
b These data elements consist of either unsigned binary numbers or bit
combinations that are defined elsewhere in the specification.
Binary example: The Application Transaction Counter (ATC) is defined as
“b” with a length of two bytes. An ATC value of 19 is stored as Hex '00 13'.
Bit combination example: Processing Options Data Object List (PDOL) is
defined as “b” with the format shown in Book 3 section 5.4.
cn Compressed numeric data elements consist of two numeric digits (having
values in the range Hex '0'–'9') per byte. These data elements are left
justified and padded with trailing hexadecimal 'F's.
Example: The Application Primary Account Number (PAN) is defined as “cn”
with a length of up to ten bytes. A value of 1234567890123 may be stored in
the Application PAN as Hex '12 34 56 78 90 12 3F FF' with a length of 8.
n Numeric data elements consist of two numeric digits (having values in the
range Hex '0' – '9') per byte. These digits are right justified and padded with
leading hexadecimal zeroes. Other specifications sometimes refer to this data
format as Binary Coded Decimal (“BCD”) or unsigned packed.
Example: Amount, Authorised (Numeric) is defined as “n 12” with a length of
six bytes. A value of 12345 is stored in Amount, Authorised (Numeric) as
Hex '00 00 00 01 23 45'.
var. Variable data elements are variable length and may contain any bit
combination. Additional information on the formats of specific variable data
elements is available elsewhere.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 4 Abbreviations, Notations, Conventions, and Terminology
Application Specification 4.4 Terminology
4.4 Terminology
business agreement An agreement reached between a payment system and its
business partner(s).
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Part II
Data Elements and
Commands
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 5 Data Elements and Files
Application Specification 5.2 Data Objects
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 5 Data Elements and Files
Application Specification 5.3 Files
5.3 Files
The data objects contained in data files accessible from the ICC are stored in records.
The file structure and referencing method depend on the purpose of the file. The
following sections describe structures and referencing methods. The layout of the data
files accessible from the ICC is left to the discretion of the issuer except for the directory
files described in the following section.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 5 Data Elements and Files
Application Specification 5.4 Rules for Using a Data Object List (DOL)
Value Meaning
1-10 Governed by this specification
11-20 Payment system-specific
21-30 Issuer-specific
An SFI shall be unique within an application. The coding of SFIs within the range
1 to 10 is used to address AEFs governed by this specification.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 5 Data Elements and Files
Application Specification 5.4 Rules for Using a Data Object List (DOL)
A DOL is a concatenated list of entries, with each entry representing a single data
element to be included in the constructed field. The format of each entry is a one- or two-
byte tag identifying the desired data object, followed by a one-byte length which
represents the number of bytes the field shall occupy in the command data. Only tags
representing primitive data objects constructed according to Annex B shall be used in
DOLs. Primitive data objects contained within terminal sourced constructed data objects
cannot be requested using DOLs.
The terminal shall complete the following steps to build the constructed field:
1. Read the DOL from the ICC.
2. Concatenate all data elements listed in the DOL. The following rules apply to this
concatenation:
o If the tag of any data object identified in the DOL is unknown to the terminal or
represents a constructed data object, the terminal shall provide a data element
with the length specified and a value of all hexadecimal zeroes.
o If a data object is in the list and is meaningful to the terminal but represents
optional static data that is absent from the terminal, the portion of the command
field representing the data object shall be filled with hexadecimal zeroes.
o If the length specified in the DOL entry is less than the length of the actual data
object, the leftmost bytes of the data element shall be truncated if the data object
has numeric (n) format, 1 or the rightmost bytes of the data shall be truncated for
any other format.
o If the length specified in the DOL entry is greater than the length of the actual
data, the actual data shall be padded:
with leading hexadecimal zeroes if the data has numeric format
with trailing hexadecimal 'FF's if the data has compressed numeric (cn 1)
format
with trailing hexadecimal zeroes for any other format (an, ans, or b including
bit combination data)1
o If a data object is in the list and is meaningful to the terminal but represents
data that is not applicable to the current transaction, the portion of the command
field representing the data object shall be filled with hexadecimal zeroes.
The completed list of data elements shall be concatenated in the sequence in which the
corresponding data objects appear in the DOL.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
The number of data bytes sent in the command APDU (C-APDU) is denoted by Lc
(length of command data field).
The maximum number of data bytes expected in the response APDU is denoted by
length of expected data (Le). When Le is present and contains the value zero, the
maximum number of available data bytes (up to 256) is expected. When required in a
command message, Le shall always be set to '00'.
The data field of a response APDU is an object structured as defined in Annex B. The
detailed coding of the objects is provided with the commands described in subsequent
sub-clauses.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.3 Coding Conventions
Hex Meaning
'0' Inter-industry command
'8' Proprietary to this specification
Any other value Outside the scope of this specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.3 Coding Conventions
Note: Additional INS codes may be assigned in the future by EMVCo using class '8x'. It is
strongly recommended that application providers not define proprietary commands in class '8x'
when they are to be used in the context of these specifications, so that collision is avoided.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.3 Coding Conventions
SW1 SW2
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.3 Coding Conventions
The following values of SW1 SW2 are described in EMV Contact Interface Specification
as they apply to the Transport Protocol Data Unit (TPDU) and are not returned to the
APDU:
• '61xx': SW2 indicates the number of response bytes still available.
• '6Cxx': Wrong length Le, SW2 indicates the exact length.
SW1 = '6x' or '90' denotes a normal, warning, or error condition coded according to
ISO/IEC 7816-4.
Other values of SW1 returned by the ICC are not supported by EMV Contact Interface
Specification.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.3 Coding Conventions
Table 5 shows the coding of the SW1 SW2 status bytes which this specification requires
to be returned in response to specific conditions. The card may generate status bytes not
listed in this table for error and warning conditions not specified in Part III.
INTERNAL AUTHENTICATE
APPLICATION UNBLOCK
PIN CHANGE/UNBLOCK
APPLICATION BLOCK
GET CHALLENGE
READ RECORD
CARD BLOCK
GET DATA
SELECT
VERIFY
SW1 SW2
'62' '83' X
'63' '00' X
'63' 'Cx' X
'68' '00' X
'68' '83' X
'68' '84' X
'69' '83' X
'69' '84' X
'69' '85' X X X
'6A' '81' X X
'6A' '82' X
'6A' '83' X
'6A' '88' X
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.4 Logical Channels
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
6.5 Commands
This section describes the following APDU command-response pairs:
• APPLICATION BLOCK (post-issuance command)
• APPLICATION UNBLOCK (post-issuance command)
• CARD BLOCK (post-issuance command)
• EXTERNAL AUTHENTICATE
• GENERATE APPLICATION CRYPTOGRAM
• GET CHALLENGE
• GET DATA
• GET PROCESSING OPTIONS
• INTERNAL AUTHENTICATE
• PIN CHANGE/UNBLOCK (post-issuance command)
• READ RECORD
• VERIFY
The post-issuance commands shall only be sent using script processing (see
section 10.10) and secure messaging as specified in Book 2.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '8C' or '84'; coding according to the secure messaging specified in Book 2
INS '1E'
P1 '00'; all other values are RFU
P2 '00'; all other values are RFU
Lc Number of data bytes
Data Message Authentication Code (MAC) data component; coding according
to the secure messaging specified in Book 2
Le Not present
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '8C' or '84'; coding according to the secure messaging specified in Book 2
INS '18'
P1 '00'; all other values are RFU
P2 '00'; all other values are RFU
Lc Number of data bytes
Data MAC data component; coding according to the secure messaging specified
in Book 2
Le Not present
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '8C' or '84'; coding according to the secure messaging specified in Book 2
INS '16'
P1 '00'; all other values are RFU
P2 '00'; all other values are RFU
Lc Number of data bytes
Data MAC data component; coding according to the secure messaging specified
in Book 2
Le Not present
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '00'
INS '82'
P1 '00'
P2 '00'
Lc 8-16
Data Issuer Authentication Data
Le Not present
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
The cryptogram returned by the ICC may differ from that requested in the command
message according to an internal process in the ICC (as described in section 9).
Code Value
CLA '80'
INS 'AE'
P1 Reference control parameter (see Table 12)
P2 '00'
Lc var.
Data Transaction-related data
Le '00'
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 AAC
0 1 TC
1 0 ARQC
1 1 RFU
x RFU
0 0 No CDA/XDA signature requested
1 0 CDA signature requested
0 1 XDA signature requested
1 1 RFU
x x x RFU
Value Presence
Cryptogram Information Data (CID) M
Application Transaction Counter (ATC) M
Application Cryptogram (AC) M
Issuer Application Data (IAD) O
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
• Format 2: The data object returned in the response message is a constructed data
object with tag equal to '77'. The value field may contain several BER-TLV coded
objects, but shall always include the Cryptogram Information Data, the Application
Transaction Counter, and the cryptogram computed by the ICC (either an AC or a
proprietary cryptogram). The utilisation and interpretation of proprietary data
objects which may be included in this response message are outside the scope of
these specifications.
Format 2 shall be used if the response is being returned with a signature as specified
for the CDA or XDA functions described in Book 2 sections 6.6 and 12. The data
elements for the response are shown in Table 14. These data elements may be in any
order.
Value Presence
Note 1: Application Cryptogram (AC) is not present when CDA signature is returned.
Note 2: When the card does not perform XDA or CDA, Signed Dynamic Application Data
is not included in the response.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
For both Format 1 and Format 2, the Cryptogram Information Data returned by the
GENERATE AC response message is coded as shown in Table 15:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 AAC
0 1 TC
1 0 ARQC
1 1 RFU
x x Payment System-specific cryptogram
0 No advice required
1 Advice required
x x x Reason/advice code
0 0 0 No information given
0 0 1 Service not allowed
0 1 0 PIN Try Limit exceeded
0 1 1 Issuer authentication failed
1 x x Other values RFU
For the Format 2 response template, if any mandatory data element is missing, the
terminal shall terminate the transaction.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '00'
INS '84'
P1 '00'
P2 '00'
Lc Not present
Data Not present
Le '00'
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '80'
INS 'CA'
P1 P2 '9F36', '9F13', '9F17', '9F4F', 'BF4C' or 'BF4D'
Lc Not present
Data Not present
Le '00'
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '80'
INS 'A8'
P1 '00'; all other values are RFU
P2 '00'; all other values are RFU
Lc var.
Data Processing Options Data Object List (PDOL) related data
Le '00'
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
• Format 2: The data object returned in the response message is a constructed data
object with tag equal to '77'. The value field may contain several BER-TLV coded
objects, but shall always include the AIP and the AFL. The utilisation and
interpretation of proprietary data objects which may be included in this response
message are outside the scope of these specifications.
The AIP specifies the application functions that are supported by the application in the
ICC and is coded according to Part III.
The AFL consists of the list, without delimiters, of files and related records for the
currently selected application that shall be read according to section 10.2.
For the Format 2 response template, if any mandatory data element is missing, the
terminal shall terminate the transaction.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '00'
INS '88'
P1 '00'
P2 '00'
Lc Length of authentication-related data
Data Authentication-related data
Le '00'
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
• In order to unblock the Biometric Type, the value of the Biometric (Facial, Finger,
Iris, Palm, or Voice) Try Counter for the Biometric Type being updated shall be reset
to the value of the associated Biometric (Facial, Finger, Iris, Palm, or Voice) Try
Limit.
• If requested, the biometric reference templates in the card shall be set to or replaced
by the new template in the Biometric Data Block (BDB), received in the PIN
CHANGE/UNBLOCK command.
The BDB transmitted in the PIN CHANGE/UNBLOCK command shall be enciphered
for confidentiality.
Due to the large size of the BDB, multiple PIN CHANGE/UNBLOCK commands are
typically required, as described in section 6.5.13.
Note: The biometric reference template, which is stored within the card, is the one that is
associated with the application and which the card uses to check the template captured by the
biometric capture device and transmitted within the VERIFY command.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '8C', '84', '9C', or '94'; coding according to the secure messaging specified in
Book 2 and command chaining specified in section 6.5.13
INS '24'
P1 '00'
P2 '00', '01', '02', '03', or '04'
Lc Number of data bytes
Data If P2 = '00', then the data field contains the MAC data component coded
according to the secure messaging specified in Book 2.
If P2 = '03', then the data field contains the Biometric Type, as shown in
Table 49, and the MAC data component coded according to the secure
messaging specified in Book 2.
The P2 values '01', '02', and '04' are reserved for the payment systems, but
the data field should contain one of the following:
• Enciphered PIN data component, if present, and MAC data component;
coding according to the secure messaging specified in Book 2
• The following enciphered biometric data:
o Biometric Type, as shown in Table 49
o Biometric Subtype, as shown in Table 50
o Biometric Solution ID, as shown in Table 48
o Biometric Data Block (BDB)
followed by the MAC data component coded according to the secure
messaging specified in Book 2. If the length of the enciphered biometric
data plus MAC is greater than 255 bytes, then the data should be sent to
the card over several PIN CHANGE/UNBLOCK commands. The data
encipherment and MACing should be applied to each command.
Le Not present
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
P2: If P2 is equal to '00', the reference PIN is unblocked and the PIN Try Counter is
reset to the PIN Try Limit. There is no PIN update, since the PIN
CHANGE/UNBLOCK command does not contain a new PIN value.
If P2 is equal to '03', the try counter associated with the Biometric Type specified
in the data field of the command is reset to the try limit of the specified Biometric
Type. There is no biometric update, since the PIN CHANGE/UNBLOCK
command does not contain a new BDB.
The usage of P2 equal to '01', '02', or '04' is reserved for payment systems.
Any other value of P2 allowing PIN/Biometric Type unblocking and/or
PIN/biometric reference template changing is out of the scope of this specification
and shall be described for each payment system individually.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
Code Value
CLA '00'
INS 'B2'
P1 Record number
P2 Reference control parameter (see Table 22)
Lc Not present
Data Not present
Le '00'
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x x SFI
1 0 0 P1 is a record number
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
The response message to READ RECORD for SFIs in the range 11-30 is outside the
scope of this specification, except as specified in section 10.3 and in Annex D.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
The biometric data to be sent in the VERIFY command shall be enciphered for
confidentiality, as described in Book 2 section 7.3 (for RSA) or Book 2 section 13.4 (for
ECC).
Due to the large size of the biometric data to be sent in the VERIFY command,
command chaining is typically required, as described in section 6.5.13.
Code Value
CLA '00' or '10'; coding according to the command chaining specified in
section 6.5.13
INS '20'
P1 '00'
P2 Qualifier of the reference data (see Table 24)
Lc var.
Data Transaction PIN Data or Biometric Verification Data Template
Le Not present
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 0 0 0 0 0 0 As defined in ISO/IEC 7816-4 3
The processing of the VERIFY command in the ICC will be defined in combination with
the CVM rules as specified in section 10.5.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
where:
Name Value
C Control field 4 bit binary number with value of 0010 (Hex '2')
N PIN length 4 bit binary number with permissible values of 0100 to
1100 (Hex '4' to 'C')
P PIN digit 4 bit binary number with permissible values of 0000 to
1001 (Hex '0' to '9')
P/F PIN/filler Determined by PIN length
F Filler 4 bit binary number with a value of 1111 (Hex 'F')
P2 = '00' indicates that no particular qualifier is used. The processing of the VERIFY
command in the ICC should know how to find the PIN data unambiguously.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
For the VERIFY command with CLA = '00', when for the currently selected application
the comparison between the Transaction PIN Data and the reference PIN data, or the
comparison between the biometric template captured on the biometric capture device
and contained in the command and the biometric reference template stored on the card,
performed by the VERIFY command fails, the ICC shall return SW2 = 'Cx', where 'x'
represents the number of retries still possible. When the card returns 'C0', no more
retries are left, and the CVM shall be blocked. Any subsequent VERIFY command
applied in the context of that application shall then fail with SW1 SW2 = '6983'.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 6 Commands for Financial Transaction
Application Specification 6.5 Commands
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
- - - x - - - - Command chaining control
As defined in ISO/IEC 7816-4, in response to a command that is not the last command of
a chain, SW1 SW2 is set to '9000', meaning that the process has been completed so far.
Moreover, the following specific error conditions may occur.
• If SW1 SW2 is set to '6883', then the last command of the chain was expected but
was not received.
• If SW1 SW2 is set to '6884', then command chaining is not supported.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Part III
Debit and Credit Application
Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 7 Files for Financial Transaction Interchange
Application Specification 7.2 Mandatory Data Objects
• The AFL determines the files and records to be used for processing a transaction.
The use of the AFL is described in section 10.2. The data objects listed in Table 27
are used by the offline data authentication algorithm and, when present, should be
located in the first record referenced by the AFL. 4
Tag Value
'8F' Certification Authority Public Key Index
'90' Issuer Public Key Certificate
Table 27: Data Objects Used by the Offline Data Authentication Algorithm
Table 29 lists the data objects that must be present if the ICC supports SDA. Table 30
lists the data objects that must be present if the ICC supports DDA and/or CDA. 5
Table 31 lists the data objects that must be present if the ICC supports XDA. Offline
data authentication is required to support offline transactions but is optional in cards
that support only online transactions.
4This allows the terminal to optionally perform the hashing necessary for data authentication in
parallel with reading and parsing of data for other purposes.
5 The exception may be that the Issuer Public Key Remainder or the ICC Public Key Remainder
could be absent. This is because if the public key modulus can be recovered in its entirety from
the public key certificate there is no need for a remainder.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 7 Files for Financial Transaction Interchange
Application Specification 7.2 Mandatory Data Objects
Tag Value
'8F' Certification Authority Public Key Index
'90' Issuer Public Key Certificate
'93' Signed Static Application Data
'92' Issuer Public Key Remainder
'9F32' Issuer Public Key Exponent
Tag Value
'8F' Certification Authority Public Key Index
'90' Issuer Public Key Certificate
'92' Issuer Public Key Remainder
'9F32' Issuer Public Key Exponent
'9F46' ICC Public Key Certificate
'9F47' ICC Public Key Exponent
'9F48' ICC Public Key Remainder
'9F49' Dynamic Data Authentication Data Object
List (DDOL) 6
Tag Value
'8F' Certification Authority Public Key Index
'90' Issuer Public Key Certificate
'9F46' ICC Public Key Certificate
6 In case the DDOL is not present in the card, the Default DDOL shall be used instead.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 7 Files for Financial Transaction Interchange
Application Specification 7.3 Data Retrievable by GET DATA Command
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 7 Files for Financial Transaction Interchange
Application Specification 7.5 Erroneous or Missing Data in the ICC
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 7 Files for Financial Transaction Interchange
Application Specification 7.5 Erroneous or Missing Data in the ICC
The following table lists proposed terminal behaviours when format errors are detected
for these data elements. Other behaviours are allowed as long as the previous
requirement is met.
Data Proposed Terminal Behaviour
Cardholder Name • Continue processing as if the data is not present, or
('5F20') • Print/Display the printable characters, or
Cardholder Name • Print/Display error message in place of cardholder name
Extended ('9F0B')
Issuer URL ('5F50') • Continue processing as if the data is not present
Log Entry ('9F4D') • Continue processing as if the data is not present, or
• Continue processing as if no Transaction Log file is
supported by the card, or
• Abort Transaction Log file reading, or
• Display error message when attempting to read the
Transaction Log file
Log Format ('9F4F') • Continue processing as if the data is not present, or
• Continue processing as if no Transaction Log file is
supported by the card, or
• Abort Transaction Log file reading, or
• Display error message when attempting to read the
Transaction Log file
Table 34: Proposed Terminal Behaviours when Format Errors Detected for Selected
Data Elements
It is up to the issuer to ensure that data in the card is of the correct format, and no
format checking other than that specifically defined is mandated on the part of the
terminal. However, if in the course of normal processing the terminal recognises that
data is incorrectly formatted, the terminal shall terminate the transaction unless
otherwise specified in these specifications. This rule includes (but is not limited to):
• Constructed data objects that do not parse correctly.
• Dates that are out of range (for example, months that are not in the range 1 to 12).
• Other data that must be in a specific range of values but are not.
• Multiple occurrences of a data object that should only appear once.
• An AFL with no entries.
• An AFL entry with invalid syntax, that is, any one or more of the following:
An SFI of 0 or 31.
A starting record number of 0.
An ending record number less than the starting record number (byte 3 < byte 2).
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 7 Files for Financial Transaction Interchange
Application Specification 7.5 Erroneous or Missing Data in the ICC
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
8 Transaction Flow
The Application Interchange Profile specifies the application functions that are
supported by the card. The terminal shall attempt to execute only those functions that
the ICC supports. The functions shall be performed according to the Conditions of
Execution as specified in section 10.
Book 1 describes all functionality outside the application layer, including the selection of
the application. The functions described here begin after application selection has taken
place.
The remainder of this book deals with the terminal-to-ICC dialogue on the level of the
application logical functions. Section 8.2 describes a possible transaction flow.
7 Other actions may be taken by prior agreement but are outside the scope of this specification.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 8 Transaction Flow
Application Specification 8.2 Example Flowchart
Initiate
Application
Read
Application
Data
Processing
Restrictions
Cardholder
Verification
Terminal
Action Analysis
Card Action
Analysis
Online
Online /
Processing &
Offline Online
Decision Issuer
Authentication
Offline
Script
Completion
Processing
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 8 Transaction Flow
Application Specification 8.3 Additional Functions
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 9 GENERATE AC Command Coding
Application Specification
Earlier processing
Reject Approve
offline Terminal offline
decision
Online
Offline
Card responds Reject Online reject
Card decision Card decision
with AAC
Offline
Online
approve
default
Approve
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 9 GENERATE AC Command Coding
Application Specification 9.1 Command Parameters
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 9 GENERATE AC Command Coding
Application Specification 9.3 Command Use
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 9 GENERATE AC Command Coding
Application Specification 9.3 Command Use
8 If ECC key recovery failed or XDA signature verification failed and depending on the TAC-
Denial and/or IAC-Denial, the terminal attempts to go online after the Terminal Action Analysis
with the TC returned by the ICC.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
9 There may be some exceptions in the timing for this. For example, these bits could be set to 0 at
the completion of the previous transaction or prior to application selection of this transaction.
The intent here is that the processing steps as described in the Application Specification presume
the bits have been initialised to 0.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.1 Initiate Application Processing
Note: An ICC supporting XDA or ECC ODE may request Terminal Capabilities (tag '9F33')
using PDOL.
The terminal issues the GET PROCESSING OPTIONS command using either the
command data field of '8300' (if there was no PDOL in the ICC) or a data object
constructed with a tag of '83' and the appropriate length according to BER-TLV
encoding rules and a value field that is the concatenated list of data elements resulting
from processing the PDOL. The card returns either:
• The Application Interchange Profile, the Application File Locator (identifying the
files and records containing the data to be used for the transaction), and status SW1
SW2 = '9000', or
• Status SW1 SW2 = '6985' (‘Conditions of use not satisfied’), indicating that the
transaction cannot be performed with this application.
The format of the response message is given in section 6.5.8.
If the status words '6985' are returned, the terminal shall eliminate the current
application from consideration and return to the Application Selection function to select
another application.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.2 Read Application Data
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.2 Read Application Data
The terminal shall store all recognised data objects read, whether mandatory or
optional, for later use in the transaction processing. Data objects that are not recognised
by the terminal (that is, their tags are unknown by the terminal) shall not be stored, but
records containing such data objects may still participate in their entirety in offline data
authentication, depending upon the coding of the AFL. 10
All mandatory data objects shall be present in the card. If any mandatory data objects
are not present, the terminal shall terminate the transaction.
Redundant primitive data objects are not permitted. If the terminal encounters more
than one occurrence of a single primitive data object while reading data from the ICC,
the transaction shall be terminated.
Proprietary data files may or may not conform to this specification. Records in
proprietary files may be represented in the AFL and may participate in offline data
authentication if they are readable without conditions by the READ RECORD command
coded according to this specification. Otherwise, the reading and processing of
proprietary files is beyond the scope of this specification.
10 Payment system-specific tags are interpreted within the context of the application RID. Issuer-
specific tags are interpreted within the context of the Issuer Identification Number. The Issuer
Identification Number as defined in ISO/IEC 7812-1 may be present on the card in the IIN (tag
'42') and/or IINE (tag '9F0C'). Additionally, to satisfy business requirements such as proprietary
domestic processing, multiple issuers may agree on the definition of a private class tag. Such tags
may be interpreted in the context of other data such as Issuer Country Code.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.3 Offline Data Authentication
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.3 Offline Data Authentication
Note: An ICC supporting both RSA based methods (SDA, DDA, CDA or RSA ODE) and ECC
based methods (XDA or ECC ODE) is expected to return a PDOL indicating Terminal
Capabilities (tag '9F33') in response to SELECT command. Based on the Terminal Capabilities,
the ICC selects either RSA based methods or ECC based methods. Records referenced in the AFL
contain either data objects needed for RSA based methods or data objects needed for ECC based
methods, as selected by the ICC, but not both. In particular, if RSA methods are selected by the
ICC, the certificates (tags '90' and '9F46') contained in the records referenced in the AFL are
expected to be formatted as described in Book 2 Table 13 and Table 14, while if ECC methods are
selected by the ICC, they are expected to be formatted as described in Book 2 Table 35 and Table
36.
Sequence of Execution:
For SDA and DDA the terminal shall perform offline data authentication in any order
after Read Application Data but before completion of the terminal action analysis.
For CDA and XDA the terminal shall start offline data authentication at any time after
Read Application Data, but CDA and XDA cannot be successfully completed until after
the response to the GENERATE AC command. The key recovery/authentication process
may be conducted at any time during this period, but the terminal shall check the
presence of the payment system CA Public Key prior to Terminal Action Analysis.
For XDA the terminal shall complete the ECC key recovery and XDA signature
verification processes described in Book 2 section 12 before any online authorisation
request and before the final Terminal Action Analysis prior to any second GENERATE
AC.
Description:
SDA authenticates static data put into the card by the issuer. DDA, CDA and XDA
authenticate ICC-resident data, data from the terminal, and the card itself. CDA and
XDA also authenticate that certain data passed between the terminal and card has not
been altered by an intermediate device.
For SDA, DDA, and CDA, input to the authentication process is formed from the records
identified by the AFL, followed by the data elements identified by the optional Static
Data Authentication Tag List (tag '9F4A').
For XDA, input to the authentication process is formed from the records identified by
the AFL, followed by the tag, length and value of the AIP, the tag, length and value of
Application Identifier (AID) – terminal, and, if a PDOL was received from the card, the
tag, length and value of the PDOL. This forms the Issuer Certified Card Data (which is
the Static Data to be Authenticated for XDA).
Only those records identified in the AFL as participating in offline data authentication
are to be processed. Records are processed in the same sequence in which they appear
within AFL entries. The records identified by a single AFL entry are to be processed in
record number sequence. The first record begins the input for the authentication
process, and each succeeding record is concatenated at the end of the previous record.
The records read for offline data authentication shall be TLV-coded with tag equal to
'70'.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.3 Offline Data Authentication
The data from each record to be included in the offline data authentication input
depends upon the SFI of the file from which the record was read.
• For files with SFI in the range 1 to 10, the record tag ('70') and the record length are
excluded from the offline data authentication process. All other data in the data field
of the response to the READ RECORD command (excluding SW1 SW2) is included.
• For files with SFI in the range 11 to 30, the record tag ('70') and the record length
are not excluded from the offline data authentication process. Thus all data in the
data field of the response to the READ RECORD command (excluding SW1 SW2) is
included.
If the records read for offline data authentication are not TLV-coded with tag equal to
'70' then offline data authentication shall be considered to have been performed and to
have failed; that is, the terminal shall set the ‘Offline data authentication was
performed’ bit in the TSI to 1, and shall set the appropriate ‘SDA failed’ or ‘DDA failed’
or ‘CDA failed’ or ‘ECC key recovery failed’ 11 bit in the TVR.
When CDA is performed at first GENERATE AC (CDA Mode 1 or 2), terminal shall set
‘Offline data authentication was performed’ bit in the TSI to 1 immediately after the
first GENERATE AC.
The bytes of the record are included in the concatenation in the order in which they
appear in the command response.
After all records identified by the AFL have been processed, the terminal processes the
following:
• For SDA, DDA, and CDA, the Static Data Authentication Tag List is processed, if
it exists. If the Static Data Authentication Tag List exists, it shall contain only
the tag for the Application Interchange Profile. The tag must represent the AIP
available in the current application. The value field of the AIP is to be
concatenated to the current end of the input string. The tag and length of the AIP
are not included in the concatenation.
• For XDA, the tag, length and value field of the AIP as received from the card are
concatenated to the end of the concatenated records (whether the SDA Tag List
exists or not), followed by the tag, length and value of Application Identifier
(AID) – terminal. If a PDOL was received, the tag, length and the value of the
PDOL as received from the card are appended to the end of the string. If no
PDOL was received then nothing is appended.
11 This bit is not set until after the first GENERATE AC command and is not set if CA ECC key
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.3 Offline Data Authentication
Building of the input list for offline data authentication is considered the first step in the
offline data authentication process. If the input cannot be built because of a violation of
one of the above rules but offline data authentication should be performed according to
the ‘Conditions of Execution’ above, offline data authentication shall be considered to
have been performed and to have failed; that is, the terminal shall set the ‘Offline data
authentication was performed’ bit in the TSI to 1 and shall set the appropriate ‘SDA
failed’ or ‘DDA failed’ or ‘CDA failed’ or ‘ECC key recovery failed’ 12 bit in the TVR.
See Book 2 for additional steps to be performed for offline data authentication.
If the CA ECC Public Key referred by the CA Public Key Index is not present in the
terminal or the index is missing, the bit ‘CA ECC key missing’ in the TVR must be set
before the final TAA prior to the first GENERATE AC command.
If XDA is selected but the terminal fails to authenticate and recover the Issuer Public
Key or the ICC Public Key (including verification of the Issuer Certified Card Data) and
the CA ECC key is not missing, the bit ‘ECC key recovery failed’ in the TVR shall be set
but only after issuing the first GENERATE AC command and before the TAA that is
performed after processing the first GENERATE AC response. (Refer to the Note in
Book 4 section 6.3.2.2.2 for further information regarding this).
If SDA is performed but is unsuccessful, the ‘SDA failed’ bit in the TVR shall be set to 1;
otherwise it shall be set to 0.
If DDA is performed but is unsuccessful, the ‘DDA failed’ bit in the TVR shall be set to 1;
otherwise it shall be set to 0.
If CDA is performed but is unsuccessful, the ‘CDA failed’ bit in the TVR shall be set to 1;
otherwise it shall be set to 0.
If XDA is selected, the ‘XDA selected’ bit in the TVR shall be set to 1 before the final
TAA prior to the first GENERATE AC command.
If XDA is selected but is unsuccessful, then one (and only one) of the ‘CA ECC key
missing’, ‘ECC key recovery failed’, or ‘XDA signature verification failed’ bits in the TVR
shall be set to 1; otherwise they shall be set to 0.
If XDA is selected then ECC key recovery shall have ended and XDA signature
processing shall have ended before the TAA that is performed after processing the first
GENERATE AC response. Note that ECC key recovery may have ended before or after
the first GENERATE AC either by failing or succeeding, or by aborting due to CA ECC
key missing. The bit ‘XDA signature verification failed’ in the TVR shall be set only if
CA ECC key retrieval and ECC key recovery were successful but XDA signature
verification failed.
Upon completion of the offline data authentication function, the terminal shall set the
‘Offline data authentication was performed’ bit in the TSI to 1.
12 This bit is not set until after the first GENERATE AC command and is not set if CA ECC key
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.4 Processing Restrictions
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.4 Processing Restrictions
If the Application Usage Control and Issuer Country Code are both present in the ICC,
the terminal shall make the checks described in Table 36.
If any of the above tests fail, the terminal shall set the ‘Requested service not allowed
for card product’ bit in the TVR to 1.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
13 If a card CVM List contains an entry for 'Fail CVM Processing,' it is strongly recommended
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
2. If cardholder verification was not completed in step 1 (that is, the CVM was not
recognised, was not supported, or failed), the terminal examines b7 of byte 1 of the
CV Rule.
• If b7 is set to 1, processing continues with the next CV Rule, if one is present.
• If b7 is set to 0, or there are no more CV Rules in the list, cardholder verification
is complete and unsuccessful. The terminal shall set the ‘Cardholder verification
was not successful’ bit in the TVR (b8 of byte 3) to 1.
When cardholder verification is completed, the terminal shall:
• set the CVM Results according to Book 4 section 6.3.4.5
• set the ‘Cardholder verification was performed’ bit in the TSI to 1.
Note: If an ICC supports a CVM Code using either RSA ODE or ECC ODE, but does not support
both the RSA and the ECC mode for this CVM Code, it is expected to return a PDOL indicating
Terminal Capabilities (tag '9F33') in response to SELECT command. Based on the Terminal
Capabilities, the ICC selects either RSA based methods or ECC based methods. Records
referenced in the AFL contain a CVM List that reflects the ICC capabilities for the transaction.
For instance, if the ICC supports Enciphered PIN verification performed by ICC with ECC but
not with RSA, the CVM List in the records is expected to contain the Enciphered PIN verification
performed by ICC CVM Code only if the ICC has selected ECC based methods for the
transaction.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
14This means that the terminal does not support either offline plaintext PIN verification or
offline enciphered PIN verification. If the terminal supports at least one of these functions, it is
considered to support offline PIN for the purposes of setting the TVR bits.
15 Especially for a new cardholder or during conversion to PINs, it is likely that a cardholder will
realise that he or she does not know the PIN. In this case, it is better to bypass PIN processing
with an indication to the issuer of the circumstances than it is to either terminate the transaction
or try numbers until the PIN try count is exhausted. If the transaction goes online, the issuer can
decide whether to accept the transaction without the PIN.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
CVM List
Processing
NO NO
AIP supports CVM
processing
Terminal
recognises YES
YES CVM?
CVM List NO
Set TVR 'ICC Data NO
present with CV
Missing' Is CVM Code
rules? Set 'Unrecognised
NO Supported? *
CVM' in TVR
YES
D Perform 'Selected CVM
Code is not Supported'
Logic (See T in Part 2 of YES
Set CVM Results to Terminal selects first or flow)
‘3F0000’ - 'No CVM next CV Rule
performed' in CVM List
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
Note: When a biometric card is presented to a terminal without biometric support, the Biometric
CVM Code is either not recognised or recognised but not supported by the terminal. As described
in section 10.5, the terminal will process the next CVM if CVM Code byte 1 b7 is set to 1, or will
complete cardholder verification, set CVM Results to ‘Failed’ and set ‘Cardholder verification not
successful’ bit in the TVR, if CVM Code byte 1 b7 is set to 0.
A terminal without biometric support may choose whether to recognise or not recognise
the Biometric CVM Codes. If the terminal without biometric support chooses to
recognise the Biometric CVM Codes, then the terminal shall implement the biometric
cardholder verification processing in section 10.5 and shall treat biometric data objects
as recognised data objects.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
S T
(From Part (From Part
1 of flow) 1 of flow)
YES
CVM Condition
NO
satisfied?
Set 'A selected
Biometric Type not
supported' in TVR. NO
YES
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
U V W
(From P art 1 (From P art 1 (From P art 1
of flow) of flow) of flow)
NO
Continue Continue
Terminal sets 'P IN
Set CV M Results to with Pa rt 1 of with Pa rt 1 of
entry re q'd b ut PIN
'Unkn own' flow flow
was no t entered' in
TVR.
Continue
with Pa rt 1 of
flow
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
Offline PIN
NO
PIN Try Counter NO
retrieved? Recover the
Offline public key to be
YES
Enciphered PIN? used for PIN
encipherment .
YES
NO
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
Y Z
(From Part 1 of (From Part 1 of
flow) flow)
Perform CVM 1
and CVM 2 (See
Was any CVM parts 3 and 4 of
Condition flow.)
satisfied?
Result of
Set CVM Results either CVM is
to ‘Failed’ with ‘unknown’? NO
Set CVM Results YES
the Method Code
to
and CVM
‘3F 00 01‘
Condition
reflecting the last Set CVM Set CVM
CVM performed. Results to Results to
'Unknown' 'Successful'
Continue with
Part 1 of flow
Continue with
Part 1 of flow
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
1 The Offline BIT Group Template shall be present and contain at least one BIT.
2 The terminal shall determine if the Biometric Solution ID of the BIT being processed equals to
the Biometric Solution ID of any BIT in Terminal BIT Group Template.
3 It is assumed that the biometric template is captured after the cardholder is advised on which
Biometric Subtype is required, and the BDB is obtained from the Biometric Processing
Application.
4 The SW1 SW2 shall be in response to the final VERIFY command.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
NO Reset ‘Biometric
template format not
supported’ in TVR
Continue
with Part 1
of flow
N
1 The Online BIT Group Template shall present and contain at least one BIT.
2 The terminal shall determine if the Biometric Solution ID of the BIT being processed equals to
the Biometric Solution ID of any BIT in Terminal BIT Group Template.
3 It is assumed that the biometric template is captured after the cardholder is advised on which
Biometric Subtype is required, and the BDB is obtained from the Biometric Processing
Application.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
• If the BIT in the Card BIT Group Template does not contain level 2 Biometric
Header Template (BHT) 1 and BHT 2, as shown in Table 48, and if the values of tag
'87' and '88' of the BIT in the Card BIT Group Template are equal to the values of
tag '87' and '88' (respectively) of any BIT in the Terminal BIT Group Template, the
terminal shall determine that there is a match.
• If the BIT in the Card BIT Group Template contains level 2 BHT 1 and BHT 2, as
shown in Table 48, and if the values of tag '87' and '88' in the BHT 1 of the BIT in
the Card BIT Group Template are equal to the values of tag '87' and '88'
(respectively) of any BIT in the Terminal BIT Group Template, the terminal shall
determine that there is a match.
• Otherwise, the terminal shall determine that there is no match.
Moreover, the terminal shall use the sequence of BITs in the Card BIT Group Template
and the Preferred Attempts Template (tag 'BF4D') to determine which Biometric
Subtype the terminal shall ask the user to present for verification.
As an example, if the Preferred Finger Attempts is configured as 3 and the Card BIT
Group Template is configured as following:
• BIT 1 – right index finger
• BIT 2 – right middle finger
Then, if Finger is selected by the terminal as the CVM, the terminal shall ask the user
to present the right index finger first since it is first in the list. If the verification of the
right index finger fails after 3 tries and the Finger Try Counter is not zero, the terminal
shall move to the next finger on the list and ask the user to present the right middle
finger up to 3 tries. The process continues until either the ICC returns SW1 SW2 =
'9000' or the Finger Try Counter is zero.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.5 Cardholder Verification
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.6 Terminal Risk Management
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.6 Terminal Risk Management
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.6 Terminal Risk Management
Any transaction with a transaction amount equal to or greater than the Threshold Value
for Biased Random Selection but less than the floor limit will be subject to selection with
bias toward sending higher value transactions online more frequently (biased random
selection). For these transactions, the terminal shall compare its generated random
number against a Transaction Target Percent, which is a linear interpolation of the
target percentages provided by the payment system (‘Target Percentage to be used for
Random Selection’ and ‘Maximum Target Percentage to be used for Biased Random
Selection’). 16 If the random number is less than or equal to the Transaction Target
Percent, the transaction shall be selected.
Figure 15 illustrates the probability of selection as a function of the transaction amount:
If the transaction is selected through the process described in this section, the terminal
shall set the ‘Transaction selected randomly for online processing’ bit in the TVR to 1.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.6 Terminal Risk Management
17 The purpose of velocity checking is to allow an issuer to request that, after a certain number of
consecutive offline transactions (the Lower Consecutive Offline Limit), transactions should be
completed online. However, if the terminal is incapable of going online, transactions may still be
completed offline until a second (Upper Consecutive Offline Limit) limit is reached. After the
upper limit is reached, the recommendation of the issuer might be to reject any transaction that
cannot be completed online. Once a transaction has been completed online with successful issuer
authentication, the count begins anew, so that transactions may be processed offline until the
lower limit is again reached.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.7 Terminal Action Analysis
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.7 Terminal Action Analysis
Description:
The terminal shall make a preliminary decision to reject the transaction, complete it
online, or complete it offline based upon the TVR, issuer action preferences, and
acquirer action preferences according to the method described in this section.
The ICC contains (optionally) three data elements to reflect the issuer’s selected action
to be taken based upon the content of the TVR. Each of the three data elements has
defaults specified here in case any of these data elements are absent from the ICC. The
three data elements are:
• Issuer Action Code – Denial
• Issuer Action Code – Online
• Issuer Action Code – Default
Collectively, these three data objects are termed the Issuer Action Codes. The purpose of
each is described in this section. The format of each is identical and mirrors the TVR.
Each has one bit corresponding to each bit in the TVR, and the Issuer Action Code (IAC)
bit specifies an action to be taken if the corresponding bit in the TVR is set to 1. Thus,
the size and format of each of the Issuer Action Codes is identical to the TVR.
Similarly, the terminal may contain three data elements to reflect the acquirer’s
selected action to be taken based upon the content of the TVR. These data elements are:
• Terminal Action Code – Denial
• Terminal Action Code – Online
• Terminal Action Code – Default
Collectively, these three data objects are termed the Terminal Action Codes. The
purpose of each is described in this section. The format of each is identical and mirrors
the TVR. Each has one bit corresponding to each bit in the TVR, and the Terminal
Action Code (TAC) bit specifies an action to be taken if the corresponding bit in the TVR
is set to 1. Thus, the size and format of each of the Terminal Action Codes is identical to
the TVR and to the Issuer Action Codes.
The existence of each of the Terminal Action Codes is optional. In the absence of any
Terminal Action Code, a default value consisting of all bits set to 0 is to be used in its
place. However, it is strongly recommended that as a minimum, the Terminal Action
Code – Online and Terminal Action Code – Default should be included with the bits
corresponding to ‘Offline data authentication was not performed’, ‘SDA failed’, ‘DDA
failed’, ‘CDA failed’, ‘XDA signature verification failed’, ‘ECC key recovery failed’, and
‘CA ECC key missing’ set to 1. 18
18 This protects against a fraudulent card with all the bits in the Issuer Action Code set to 0.
Without this protection, such a card could be created with no possibility of going online or
declining transactions. All transactions would be approved offline.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.7 Terminal Action Analysis
Processing of the action codes is done in pairs, that is, the Issuer Action Code – Denial is
processed together with the Terminal Action Code – Denial, the Issuer Action Code –
Online is processed together with the Terminal Action Code – Online, and the Issuer
Action Code – Default is processed together with the Terminal Action Code – Default.
Processing of the action codes shall be performed in the order specified here.
If the Issuer Action Code – Denial does not exist, a default value with all bits set to 0 is
to be used. Together, the Issuer Action Code – Denial and the Terminal Action Code –
Denial specify the conditions that cause denial of a transaction without attempting to go
online. If either data object exists, the terminal shall inspect each bit in the TVR. For
each bit in the TVR that has a value of 1, the terminal shall check the corresponding
bits in the Issuer Action Code – Denial and the Terminal Action Code – Denial. If the
corresponding bit in either of the action codes is set to 1, it indicates that the issuer or
the acquirer wishes the transaction to be rejected offline. In this case, the terminal shall
issue a GENERATE AC command to request an AAC from the ICC. This AAC may be
presented to the issuer to prove card presence during this transaction, but details of
handling a rejected transaction are outside the scope of this specification.
If the Issuer Action Code – Online is not present, a default value with all bits set to 1
shall be used in its place. Together, the Issuer Action Code – Online and the Terminal
Action Code – Online specify the conditions that cause a transaction to be completed
online. These data objects are meaningful only for terminals capable of online
processing. Offline-only terminals may skip this test and proceed to checking the Issuer
Action Code – Default and Terminal Action Code – Default, described below. For an
online-only terminal, if it has not already decided to reject the transaction as described
above, it shall continue transaction processing online, and shall issue a GENERATE AC
command requesting an ARQC from the card. For a terminal capable of online
processing, if the terminal has not already decided to reject the transaction as described
above, the terminal shall inspect each bit in the TVR. For each bit in the TVR that has a
value of 1, the terminal shall check the corresponding bits in both the Issuer Action
Code – Online and the Terminal Action Code – Online. If the bit in either of the action
codes is set to 1, the terminal shall complete transaction processing online and shall
issue a GENERATE AC command requesting an ARQC from the ICC. Otherwise, the
terminal shall issue a GENERATE AC command requesting a TC from the ICC.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.7 Terminal Action Analysis
If the Issuer Action Code – Default does not exist, a default value with all bits set to 1
shall be used in its place. Together, the Issuer Action Code – Default and the Terminal
Action Code – Default specify the conditions that cause the transaction to be rejected if
it might have been approved online but the terminal is for any reason unable to process
the transaction online. The Issuer Action Code – Default and the Terminal Action Code
– Default are used only if the Issuer Action Code – Online and the Terminal Action Code
– Online were not used (for example, in case of an offline-only terminal) or indicated a
desire on the part of the issuer or the acquirer to process the transaction online but the
terminal was unable to go online. In the event that an online-only terminal was unable
to successfully go online, it may optionally skip TAC/IAC Default processing (shown in
Figure 7 for a transaction that was not completed online) 19. If an online-only terminal
does skip TAC/IAC Default processing, it shall request an AAC with the second
GENERATE AC command. If the terminal has not already rejected the transaction and
the terminal is for any reason unable to process the transaction online, the terminal
shall use this code to determine whether to approve or reject the transaction offline. If
any bit in Issuer Action Code – Default or the Terminal Action Code – Default and the
corresponding bit in the TVR are both set to 1, the transaction shall be rejected and the
terminal shall request an AAC to complete processing. If no such condition appears, the
transaction may be approved offline, and a GENERATE AC command shall be issued to
the ICC requesting a TC.
Offline only terminals may be implemented in different ways but shall always check, at
least, (1) the Terminal Action Code – Denial and Issuer Action Code – Denial and (2) the
Terminal Action Code – Default and Issuer Action Code – Default.
When processing the first GENERATE AC command, for each bit in the TVR that has a
value of 1, the offline-only terminal shall check the corresponding bits in both the Issuer
Action Code – Denial and the Terminal Action Code – Denial. If the bit in either of the
action codes is set to 1, the terminal shall request an AAC from the ICC.
If an AAC is not requested based on the Issuer Action Code – Denial and the Terminal
Action Code – Denial processing above, the offline-only terminal continues processing
according to one of the options below:
19 Note that if an online-only terminal is unable to successfully go online and TAC/IAC Default
processing is optionally performed, this could result in a TC being requested with the second
GENERATE AC command (depending upon the TAC/IAC Default settings).
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.7 Terminal Action Analysis
(1) The offline-only terminal uses the Terminal Action Code – Online and Issuer
Action Code – Online. For each bit in the TVR that has a value of 1, the terminal
shall check the corresponding bits in both the Issuer Action Code – Online and
the Terminal Action Code – Online. If the corresponding bit in either of the
action codes is set to 1, the terminal shall request an ARQC from the ICC in the
first GENERATE AC command. Otherwise, if ARQC is not requested based on
the IAC-Online and TAC-Online processing above, the terminal shall use the
Action Code – Default. For each bit in the TVR that has a value of 1, the terminal
shall check the corresponding bits in both the Issuer Action Code – Default and
the Terminal Action Code – Default. If the bit in either of the action codes is set
to 1, the terminal shall request an AAC from the ICC in the first GENERATE AC
command. If the ICC returns an ARQC in the first GENERATE AC response
then the terminal shall use the Action Code – Default. For each bit in the TVR
that has a value of 1, the terminal shall check the corresponding bits in both the
Issuer Action Code – Default and the Terminal Action Code – Default. If the bit
in either of the action codes is set to 1, the terminal shall request an AAC from
the ICC in the second GENERATE AC command.
(2) The offline-only terminal skips the Issuer Action Code – Online and Terminal
Action Code – Online check, and shall check the Issuer Action Code – Default and
the Terminal Action Code – Default. For each bit in the TVR that has a value of
1, the terminal shall check the corresponding bits in both the Issuer Action Code
– Default and the Terminal Action Code – Default. If the corresponding bit in
either of the action codes is set to 1, the terminal shall request an AAC from the
ICC.
If CDA is to be performed (as described in section 10.3 of this book and Book 2
section 6.6), the terminal shall set b5-b4 for ‘CDA signature requested’ in the
GENERATE AC command to 10.
If XDA is to be performed (as described in section 10.3 of this book and Book 2
section 12), the terminal shall set b5-b4 for ‘XDA signature requested’ in the
GENERATE AC command to 01.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.8 Card Action Analysis
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.8 Card Action Analysis
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.9 Online Processing
20If ECC key recovery or XDA signature verification failed and depending on the TAC-Denial
and/or IAC-Denial, the terminal attempts to go online after the Terminal Action Analysis with
the TC returned by the ICC.
21 Actions performed by the acquirer or issuer systems are outside the scope of this specification.
However, an explanation of what is expected to take place at the issuer may be useful for clarity.
The ARQC is a cryptogram generated by the card from transaction data using an issuer key
stored in the card and known at the issuer authorisation system. The issuer uses this key to
authenticate the ARQC and thereby authenticate the card. This process is termed ‘online card
authentication’ or simply ‘card authentication’.
Subsequent to card authentication, the issuer may generate a cryptogram on selected data
included in the authorisation response or already known to the card. This cryptogram is sent to
the terminal in the authorisation response as part of the Issuer Authentication Data. The
terminal provides the Issuer Authentication Data to the ICC in the EXTERNAL
AUTHENTICATE command or the second GENERATE AC command, as described in Part I. The
ICC may use the Issuer Authentication Data to authenticate that the response message
originated from the issuer.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.9 Online Processing
If the Issuer Authentication Data is received but the Application Interchange Profile
indicates that the ICC does not support issuer authentication, this indicates that the
ICC has combined the issuer authentication function with the GENERATE AC
command. In this case, or if no Issuer Authentication Data is received, the terminal
shall not execute the EXTERNAL AUTHENTICATE command.
The ICC shall permit at most one EXTERNAL AUTHENTICATE command in a
transaction. If the terminal issues more than one, the second and all succeeding
EXTERNAL AUTHENTICATE commands shall end with SW1 SW2 = '6985'.
Upon completion of online processing, if the EXTERNAL AUTHENTICATE command
was sent to the card by the terminal, the terminal shall set the ‘Issuer authentication
was performed’ bit in the TSI to 1.
Note: Annex F provides additional information about status words to be returned in response to
an EXTERNAL AUTHENTICATE command.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.10 Issuer-to-Card Script Processing
T L T L Script ID Commands
'71' or L(∑data, including Script '9F18' '04' Identifier (see Figure 17)
'72' ID, tags, and lengths) (4 bytes)
T1 L1 V1 T2 L2 V2 T3 L3 V3
'86' L(V1) Command '86' L(V2) Command '86' L(V3) Command
Figure 17: Issuer Script Command Format (Shown with Three Commands)
22 An example might be unblocking of an offline PIN, which might be done differently by various
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.10 Issuer-to-Card Script Processing
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3 10 Functions Used in Transaction Processing
Application Specification 10.11 Completion
10.11 Completion
Purpose:
The completion function closes processing of a transaction.
Conditions of Execution:
The terminal always performs this function unless the transaction is terminated
prematurely by error processing.
Sequence of Execution:
The completion function is always the last function in the transaction processing. (Script
processing may be performed after the completion function.)
Description:
The ICC indicates willingness to complete transaction processing by returning either a
TC or an AAC to either the first or second GENERATE AC command issued by the
terminal. If the terminal decides to go online, completion shall be done when the second
GENERATE AC command is issued.
If the terminal is to perform CDA (as described in section 10.3), the terminal shall set
the ‘CDA signature requested’ bits in the GENERATE AC command to 10.
If the terminal is to perform XDA (as described in section 10.3), the terminal shall set
the ‘XDA signature requested’ bits in the GENERATE AC command to 01.
See section 9 for additional information on the use of the GENERATE AC command.
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Part IV
Annexes
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of
this document is permitted only pursuant to the applicable agreement between the user and EMVCo
found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC in the United
States and other countries.
EMV 4.4 Book 3
Application Specification
Card Risk List of data objects (tag and length) to be ICC b '70' or '77' '8C' var. up
Management passed to the ICC in the first GENERATE AC to 252
Data Object command
List 1 (CDOL1)
Card Risk List of data objects (tag and length) to be ICC b '70' or '77' '8D' var. up
Management passed to the ICC in the second GENERATE to 252
Data Object AC command
List 2 (CDOL2)
Card Status Contains data sent to the ICC to indicate Issuer b — — 4
Update (CSU) whether the issuer approves or declines the
transaction, and to initiate actions specified by
the issuer. Transmitted to the card in Issuer
Authentication Data.
Cardholder Indicates cardholder name according to ICC ans 2-26 '70' or '77' '5F20' 2-26
Name ISO/IEC 7813
23The preferred attempts for each Biometric Type are used to define how many attempts the issuer allows the terminal to verify using a
single BIT. It is different from any biometric try limit used within the card to limit how many tries are allowed by the issuer for a Biometric
Type.
For example, an issuer may set a finger try limit in the card (associated with the Finger Try Counter) to five, and set the Preferred Finger
Attempts to three, allowing three attempts to verify the primary finger before two additional attempts are allowed using a secondary finger.
October 2022 Page 154
© 1994-2022 EMVCo, LLC (“EMVCo”). All rights reserved. Reproduction, distribution and other use of this document is permitted only pursuant to
the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a registered trademark or trademark of EMVCo, LLC
in the United States and other countries.
EMV 4.4 Book 3 Annex A Data Elements Dictionary
Application Specification A1 Data Elements by Name
When the length defined for the data object is greater than the length of the actual data, the following rules apply:
• A data element in format n is right justified and padded with leading hexadecimal zeroes.
• A data element in format cn is left justified and padded with trailing hexadecimal 'F's.
• A data element in format a, an, or ans is left justified and padded with trailing hexadecimal zeroes.
When data is moved from one entity to another (for example, card to terminal), it shall always be passed in order from high
order to low order, regardless of how it is internally stored. The same rule applies when concatenating data.
Note: Data that can occur in template '70' or '77' can never occur in both.
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 Universal class
0 1 Application class
1 0 Context-specific class
1 1 Private class
0 Primitive data object
1 Constructed data object
1 1 1 1 1 See subsequent bytes
Any other value <31 Tag number
According to ISO/IEC 8825, Table 40 defines the coding rules of the subsequent bytes of
a BER-TLV tag when tag numbers ≥ 31 are used (that is, bits b5 – b1 of the first byte
equal 11111).
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 Another byte follows
0 Last tag byte
Any value > 0 (Part of) tag number
Before, between, or after TLV-coded data objects, '00' bytes without any meaning may
occur (for example, due to erased or modified TLV-coded data objects).
Note: It is strongly recommended that issuers do not use tags beginning with 'FF' for proprietary
purposes, as existing terminals may not recognise 'FF' as the beginning of a constructed private
class tag.
The tag field of a BER-TLV data object is coded according to the following rules:
• The following application class templates defined in ISO/IEC 7816 apply:
'61' and '6F'.
• The following range of application class templates is defined in Part II: '70' to '7F'.
The meaning is then specific to the context of an application according to this
specification. Tags '78', '79', '7D', and '7E' are defined in ISO/IEC 7816-6 and are not
used in this specification.
• The application class data objects defined in ISO/IEC 7816 and described in Part II
are used according to the ISO/IEC 7816 definition.
• Context-specific class data objects are defined in the context of this specification or in
the context of the template in which they appear.
• The coding of primitive context-specific class data objects in the ranges '80' to '9E'
and '9F00' to '9F4F' is reserved for this specification.
• The coding of primitive context-specific class data objects in the range '9F50' to
'9F7F' is reserved for the payment systems. Payment system-specific tags are
interpreted within the context of the application RID.
• The coding of tag 'BF0C' and constructed context-specific class data objects in the
range 'BF20' to 'BF4F' is reserved for this specification.
• The coding of constructed context-specific class data objects in the ranges 'BF10' to
'BF1F' and 'BF50' to 'BF6F' is reserved for the payment systems. Payment system-
specific tags are interpreted within the context of the application RID.
• The coding of constructed context-specific class data objects in the ranges 'BF01' to
'BF0B', 'BF0D' to 'BF0F', and 'BF70' to 'BF7F' is left to the discretion of the issuer.
Issuer-specific tags are interpreted within the context of the Issuer Identification
Number (as defined in ISO/IEC 7812-1). Additionally, to satisfy business
requirements such as proprietary domestic processing, multiple issuers may agree
on the definition of a private class tag. Such tags may be interpreted in the context of
other data such as Issuer Country Code.
• The coding of primitive and constructed private class data objects is left to the
discretion of the issuer. Issuer-specific tags are interpreted within the context of the
Issuer Identification Number (as defined in ISO/IEC 7812-1). Additionally, to satisfy
business requirements such as proprietary domestic processing, multiple issuers
may agree on the definition of a private class tag. Such tags may be interpreted in
the context of other data such as Issuer Country Code.
A constructed BER-TLV data object consists of a tag, a length, and a value field
composed of one or more BER-TLV data objects. A record in an AEF governed by this
specification is a constructed BER-TLV data object. A constructed data object is
structured as illustrated in Figure 19:
24 When this bit is set to 1, Issuer Authentication using the EXTERNAL AUTHENTICATE
command is supported
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 1 x x x x Values in the range 010000-011101
reserved for future use by this
specification
0 1 1 1 1 0 Signature
0 1 1 1 1 1 No CVM required
1 0 x x x x Values in the range 100000-101111
reserved for use by the individual
payment systems
1 1 x x x x Values in the range 110000-111110
reserved for use by the issuer
1 1 1 1 1 1 This value is not available for use
Value Refers to
'01' Part 1 of ISO/IEC 8859
'02' Part 2 of ISO/IEC 8859
'03' Part 3 of ISO/IEC 8859
'04' Part 4 of ISO/IEC 8859
'05' Part 5 of ISO/IEC 8859
'06' Part 6 of ISO/IEC 8859
'07' Part 7 of ISO/IEC 8859
'08' Part 8 of ISO/IEC 8859
'09' Part 9 of ISO/IEC 8859
'10' Part 10 of ISO/IEC 8859
TVR Byte 2:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x ICC and terminal have different
application versions
x 1 x x x x x x Expired application
x x 1 x x x x x Application not yet effective
x x x 1 x x x x Requested service not allowed for card
product
x x x x 1 x x x New card
x x x x x 0 x x RFU
x x x x x x 1 x Biometric performed and successful
x x x x x x x 1 Biometric template format not
supported
27 There is no requirement in this specification for an exception file, but it is recognised that some
TVR Byte 3:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Cardholder verification was not
successful
x 1 x x x x x x Unrecognised CVM
x x 1 x x x x x PIN Try Limit exceeded
x x x 1 x x x x PIN entry required and PIN pad not
present or not working
x x x x 1 x x x PIN entry required, PIN pad present,
but PIN was not entered
x x x x x 1 x x Online CVM captured
x x x x x x 1 x Biometric required but Biometric
capture device not working
x x x x x x x 1 Biometric required, Biometric capture
device present, but Biometric Subtype
entry was bypassed
TVR Byte 4:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Transaction exceeds floor limit
x 1 x x x x x x Lower consecutive offline limit
exceeded
x x 1 x x x x x Upper consecutive offline limit
exceeded
x x x 1 x x x x Transaction selected randomly for
online processing
x x x x 1 x x x Merchant forced transaction online
x x x x x 1 x x Biometric Try Limit exceeded
x x x x x x 1 x A selected Biometric Type not
supported
x x x x x x x 1 XDA signature verification failed
28 For example, if the format of BDB is compliant with ISO/IEC 19794-2, the biometric matching
algorithm parameters, including the maximum number of minutiae and the minutiae ordering
scheme, shall be present as defined in ISO/IEC 19794-2.
29 The Biometric Type "Finger" is used for both fingerprint and finger vein. The Format Type (tag
'88') contained in BIT (tag '7F60') then identifies whether it represents fingerprint or finger vein.
b8 b7 b6 b5 b4 b3 b2 b1 Biometric Subtype
0 0 0 0 0 0 0 0 No information given
x x 1 x x x 0 1 Right
x x 1 x x x 1 0 Left
x 0 1 0 0 0 x x No meaning
x 0 1 0 0 1 x x Thumb
x 0 1 0 1 0 x x Index finger
x 0 1 0 1 1 x x Middle finger
x 0 1 1 0 0 x x Ring finger
x 0 1 1 0 1 x x Little finger
x 1 1 0 0 1 x x Palm
x 1 1 0 1 0 x x Back of hand
x 1 1 0 1 1 x x Wrist
All other values RFU
Tag L Value
'9F31' var. Card BIT Group Template
Tag L Value
'BF4A' var. Offline BIT Group Template
'02' 1 Number of BITs in the group
'7F60' var. BIT 1, see Table 48
'7F60' var. BIT 2, see Table 48
… … …
'7F60' var. BIT n, see Table 48
'BF4B' var. Online BIT Group Template
'02' 1 Number of BITs in the group
'7F60' var. BIT 1, see Table 48
'7F60' var. BIT 2, see Table 48
… … …
'7F60' var. BIT n, see Table 48
Tag L Value
'02' 1 Number of BITs in the group
'7F60' var. BIT 1, see Table 48
'7F60' var. BIT 2, see Table 48
… … …
'7F60' var. BIT n, see Table 48
D1 Purpose
Provide support for accessing a transaction log file by special devices.
D2 Conditions of Execution
This optional function is intended to be executed by special devices.
D3 Sequence of Execution
This function may be executed after Application Selection.
D4 Description
To get the Transaction Log information, the two following data elements are used: Log
Entry and Log Format.
Table 53 describes the format of the Log Entry data element (tag '9F4D'):
Devices that read the transaction log use the Log Entry data element to determine the
location (SFI) and the maximum number of transaction log records.
The SFI shall be in the range 11 to 30.
The Transaction Log records shall be accessible using the READ RECORD command as
specified in section 6.5.11. The file is a cyclic file as defined in ISO/IEC 7816-4.
Record #1 is the most recent transaction. Record #2 is the next prior transaction, etc.
The Transaction Log records shall not be designated in the Application File Locator.
Each record is a concatenation of the values identified in the Log Format data element.
The records in the file shall not contain the Application Elementary File (AEF) Data
Template (tag '70').
The Log Format and the Transaction Log records shall remain accessible when the
application is blocked.
To read the transaction log information, the special device uses the following steps:
• Perform Application Selection and retrieve the Log Entry data element located in the
FCI Issuer Discretionary Data. If the Log Entry data element is not present, the
application does not support the Transaction Log function.
• Issue a GET DATA command to retrieve the Log Format data element.
• Issue READ RECORD commands to read the Transaction Log records.
D5 Example
Note that the following data elements are shown for example purposes only.
A Log Entry data element equal to '0F14' indicates that the transaction log file is located
in SFI 15 ('0F') and contains a maximum of 20 records ('14').
A Log Format data element equal to '9A039F21035F2A029F02069F4E149F3602'
indicates that the transaction log records have the following content:
In Table 54, lengths and tags are shown for clarity. They do not appear in the log record
which is the concatenation of values (no TLV coding).
Data elements listed in the Log Format may come from the terminal and the card.
Terminal data elements such as Merchant Name and Location might have been passed
to the card in the PDOL or CDOL data.
E1 Scenarios
Scenario 1
A script is received, it parses correctly, the commands are sent to the card, and the card
returns '9000', '62xx', or '63xx' to all commands received.
In this scenario the terminal:
• shall set the TSI bit
• shall not set the TVR bits
• shall set the first byte of the Issuer Script Results to '2x', ‘Script processing
successful’.
Scenario 2
A script is received, it parses correctly, the commands are sent to the card, but the card
does not return '9000', '62xx', or '63xx' to one of the commands received.
In this scenario the terminal:
• shall set the TSI bit
• shall set the appropriate TVR bit(s)
• shall set the first byte of the Issuer Script Results to '1x', ‘Script processing failed’
• shall send no further commands from that script to the card, even if they exist.
Scenario 3
A script is received, it does not parse correctly, and so no commands are sent to the card.
In this scenario the terminal:
• shall set the TSI bit
• shall set the appropriate TVR bit(s)
• shall set the first byte of the Issuer Script Results to '00', ‘Script not performed’.
Scenario 4
No script is received. In this scenario the terminal shall set neither the TSI bit nor the
TVR bit(s).
In this event there will be no Issuer Script Results.
E2 Additional Information
It is possible, but not recommended, that commands may be sent to the card ‘on the fly’
as a script is parsed. In this event:
• If a parsing error occurs before any commands are sent to the card, the terminal
shall set the first byte of the Issuer Script Results to '00' and shall set the
appropriate TVR bits and the TSI bit.
• If a parsing error occurs after any command has been sent to the card, the terminal
shall set the first byte of the Issuer Script Results to '1x', and shall set the
appropriate TVR bits and the TSI bit.
If more than one script is received, the terminal:
• shall set the TSI bit
• shall set the TVR bit(s) (as described in Scenarios 2 and 3) if any error occurs
• shall set the Issuer Script Results as described in Scenarios 1 through 3 for each
script on a script-by-script basis
• shall process all Issuer scripts
Part V
Common Core Definitions
Tag Value
'77' Response Message Template Format 2
6.5 Commands
6.5.4 EXTERNAL AUTHENTICATE Command-Response APDUs
Tag Value
'9F27' Cryptogram Information Data
'9F36' Application Transaction Counter
'9F26' Application Cryptogram
'9F10' Issuer Application Data
The required data elements for the response returned in an envelope as specified for the
CDA feature (described in Book 2 section 6.6) are shown in Book 2 Table CCD 1 and
Table CCD 2.
The Cryptogram Information Data returned in the GENERATE AC response message is
coded according to Table CCD 3:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 AAC
0 1 TC
1 0 ARQC
1 1 RFU
0 0 Payment System-specific cryptogram
0 No advice required
0 0 0 No information given
Tag Value
'82' Application Interchange Profile
'94' Application File Locator
Table CCD 4: Format 2 GET PROCESSING OPTIONS Response Message Data Field
Tag Value
'9F4B' Signed Dynamic Application Data
CDA Performed
In the first GENERATE AC response, this bit shall be set if and only if Signed Dynamic
Application Data is returned in the response to the first GENERATE AC command of
the current transaction.
In the second GENERATE AC response, this bit shall be set if and only if Signed
Dynamic Application Data is returned in the response to the first or second GENERATE
AC command (or both) of the current transaction.
Unable to go Online
This bit shall be set in the second GENERATE AC response if and only if the
Authorisation Response Code, tag '8A', returned from the terminal indicates the
terminal was unable to go online (set to 'Y3' or 'Z3').
The issuer shall have the option of specifying that if this bit is set, and either the
transaction occurs at an offline-only terminal or the terminal is unable to go online,
whether the CCD-compliant application shall:
• be allowed to approve (TC) the transaction, or
• decline the transaction.
The ICC shall not block the application or the card due to this bit being set.
10.11 Completion
The following Section 10.11.1 applies to a CCD-compliant application.
• If the issuer specifies that the application shall not update the offline counters, no
offline counter or cumulative amount is modified.
• If the issuer specifies that the application shall set the offline counters to zero, the
application will reset all the offline counters and cumulative amounts to zero. By
doing so, the issuer allows the application to accept offline transactions, up to the
offline limits.
• If the issuer specifies that the application shall set the offline counters to the upper
offline limits, the offline counters and cumulative amounts will be set to their
respective upper limits.
• If the issuer specifies that the application shall add the transaction to the offline
counter(s), the transaction will be included in the offline counters or cumulative
amounts as if it were an offline transaction.
This section describes the actions to be taken by the CCD-compliant application due to
the setting of each bit in the CSU after issuer authentication is successful..
Card Block
If ‘Card Block’ is set, all applications in the ICC shall be permanently disabled,
including applications that may be selected implicitly. For all subsequent SELECT
commands the card shall return the status bytes ‘Function not supported’ (SW1-SW2 =
'6A81') and perform no other action.
Application Block
If ‘Application Block’ is set, the currently selected application shall be invalidated. An
invalidated application shall return the status bytes ‘Selected file invalidated’
(SW1-SW2 = '6283') in response to a SELECT command and return only an AAC in
response to the GENERATE AC command.
Update Counters
‘Update Counters’ (bits b2 – b1 of byte 2 of the CSU) govern the behaviour of velocity-
checking counters and cumulative amounts associated with the offline transaction limits
referred to in bits b8 – b5 of byte 3 of the CVR if either of the following is true:
• the ‘CSU Created by Proxy for the Issuer’ bit in the CSU is set to 0
• the issuer specifies that the application shall use the ‘Update Counters’ bits in the
CSU to update the velocity-checking count(s) and cumulative amount(s) regardless of
the bit setting for ‘CSU Created by Proxy for the Issuer’
If ‘Update Counters’ is set to ‘Do Not Update Offline Counters’, no offline counter or
cumulative amount shall be modified.
If ‘Update Counters’ is set to ‘Reset Offline Counters to Zero’, the application shall reset
all the offline counters and cumulative amounts to zero. By doing so, the issuer allows
the application to accept offline transactions, up to the offline limits.
If ‘Update Counters’ is set to ‘Set Offline Counters to Upper Offline Limits’, the
application shall set the offline counters and cumulative amounts to their respective
upper limits.
If ‘Update Counters’ is set to ‘Add Transaction to Offline Counters’, the application shall
include the transaction in the offline counters or cumulative amounts as if it were an
offline transaction.
After the transaction successfully went online (that is, the Authorisation Response Code
does not indicate that the terminal was unable to go online), the CCD-compliant
application shall approve the transaction if all of the following conditions are true:
• the terminal requested a TC, and
• one of the following is true:
issuer authentication is successful and the ‘Issuer Approves Online Transaction
bit’ of the recovered CSU is set to 1, or
issuer authentication was not performed and the CCD-compliant application does
not require issuer authentication to be performed for the application to approve
(TC) an online transaction, or
issuer authentication was performed and failed and the CCD-compliant
application does not require issuer authentication to pass when performed for the
application to approve (TC) an online transaction.
After the transaction successfully went online (that is, the Authorisation Response Code
does not indicate that the terminal was unable to go online), the CCD-compliant
application shall decline the transaction in the second GENERATE AC response if
either of the following conditions are true:
• both of the following are true:
issuer authentication was not performed, and
the CCD-compliant application requires issuer authentication to be performed for
the application to approve (TC) an online transaction,
• or both of the following are true:
issuer authentication was performed and failed, and
the CCD-compliant application requires issuer authentication to pass when
performed for the application to approve (TC) an online transaction.
After the transaction did not successfully complete online (that is the Authorisation
Response Code indicates that the terminal was unable to go online), the CCD-compliant
application shall decide whether to approve or decline the transaction.
Part IV – Annexes
Table CCD 7 lists data elements (in addition to those defined in Annex A) that are
defined within the context of the Common Core Definitions.
Name Description Source For- Tem- Tag Length
mat plate
Card Contains data sent to the ICC b — — 5
Verification issuer indicating exception
Results (CVR) conditions that occurred
during the current and
previous transactions.
Transmitted to the terminal
in Issuer Application Data as
specified in Table CCD 9.
Common Core Data sent to the issuer ICC b — — 1
Identifier (CCI) identifying the format of the
Issuer Application Data and
the method for calculating
the Application Cryptogram.
Transmitted to the terminal
in Issuer Application Data as
specified in Table CCD 9.
Contains the following:
Format Code (FC)
Cryptogram Version (CV)
Derivation Key Data sent to the issuer ICC b — — 1
Index (DKI) identifying the issuer’s
derivation key for deriving
the card’s ICC Master Keys.
Transmitted to the terminal
in Issuer Application Data as
specified in Table CCD 9.
Issuer Contains issuer proprietary ICC b — — 15
Discretionary application data for
Data transmission to the issuer in
an online transaction.
Transmitted to the terminal
in Issuer Application Data as
specified in Table CCD 9.
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x Common Core IAD Format Code (FC).
1 0 1 0 CCD Version 4.1 IAD Format (= 'A')
x x x x Common Core Cryptogram Version (CV)
CCD Version 4.1 Cryptogram Version
0 1 0 1
(= '5' for Triple DES)
CCD Version 4.1 Cryptogram Version
0 1 1 0
(= '6' for AES)
Bits b8 - b5 of the CCI shall indicate the Format Code (FC). Values in the range 'A' - 'F'
shall indicate a CCD-specified IAD format (all values RFU by EMVCo for CCD).
Bits b4 – b1 of the CCI shall indicate the Cryptogram Version (CV) for the Application
Cryptogram. The CV indicates:
• The cryptogram input data and key derivation method the CCD-compliant
application uses to generate the Application Cryptogram.
• The cryptogram input data (including CSU coding), key derivation method, and
ARPC method the CCD-compliant application expects the issuer to use when
generating the Authorisation Response Cryptogram.
Values in the range '4' - 'F' shall indicate a CCD-specified cryptogram algorithm and
data set (all values RFU by EMVCo for CCD). Values in the range '0' - '3' shall indicate a
proprietary cryptogram algorithm. When using the CV range '0' - '3', applications are not
CCD-compliant.
CVR Byte 1
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
Application Cryptogram Type Returned in
x x
Second GENERATE AC
0 0 AAC
0 1 TC
1 0 Second GENERATE AC Not Requested
1 1 RFU
Application Cryptogram Type Returned in
x x
First GENERATE AC
0 0 AAC
0 1 TC
1 0 ARQC
1 1 RFU
1 CDA Performed
1 Offline DDA Performed
1 Issuer Authentication Not Performed
1 Issuer Authentication Failed
CVR Byte 2
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x Low Order Nibble of PIN Try Counter
1 Offline PIN Verification Performed
Offline PIN Verification Performed and PIN
1
Not Successfully Verified
1 PIN Try Limit Exceeded
1 Last Online Transaction Not Completed
Table CCD 10: Card Verification Results for Format Code 'A'
CVR Byte 3
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
Lower Offline Transaction Count Limit
1
Exceeded
Upper Offline Transaction Count Limit
1
Exceeded
Lower Cumulative Offline Amount Limit
1
Exceeded
Upper Cumulative Offline Amount Limit
1
Exceeded
1 Issuer-discretionary bit 1
1 Issuer-discretionary bit 2
1 Issuer-discretionary bit 3
1 Issuer-discretionary bit 4
CVR Byte 4
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
Number of Successfully Processed Issuer
x x x x Script Commands Containing Secure
Messaging
1 Issuer Script Processing Failed
Offline Data Authentication Failed on
1
Previous Transaction
1 Go Online on Next Transaction Was Set
1 Unable to go Online
CVR Byte 5
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 0 0 0 0 0 0 RFU
Table CCD 10: Card Verification Results for Format Code 'A', continued
CSU Byte 1
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 Proprietary Authentication Data Included
0 0 0 RFU
x x x x PIN Try Counter
CSU Byte 2
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 Issuer Approves Online Transaction
1 Card Block
1 Application Block
1 Update PIN Try Counter
1 Set Go Online on Next Transaction
1 CSU Created by Proxy for the Issuer
x x Update Counters
0 0 Do Not Update Offline Counters
Set Offline Counters to Upper Offline
0 1
Limits
1 0 Reset Offline Counters to Zero
1 1 Add Transaction to Offline Counter
Note: The ‘CSU Created by Proxy for the Issuer’ bit shall be set in the CSU if and only if the
CSU is generated by a proxy for the Issuer.
CSU Byte 3
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 0 0 0 0 0 0 RFU
Table CCD 11: Card Status Update for Cryptogram Versions '5' and '6'
CSU Byte 4
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x x x x x Issuer-Discretionary
Table CCD 11: Card Status Update for Cryptogram Versions '5' and '6', continued
Index
Card Risk Management Data Object List 1.... See CDOL1
Card Risk Management Data Object List 2.... See CDOL2
A Cardholder Name ........................................................ 142
CCD ................................. See Common Core Definitions
CDA ...................................................................... 98, 173
Abbreviations................................................................ 27
CDOL1 ..................................................... 42, 89, 90, 142
AC ....................................... See Application Cryptogram
CDOL2 ................................................................. 42, 142
Account Type ..................................................... 135, 196
CID ................................................... 57, 58, 59, 127, 144
Acquirer Identifier .............................................. 135, 152
Class Byte ..................................................................... 45
Additional Terminal Capabilities ................................ 135
Coding Conventions ..................................................... 45
Advice Messages ........................................................ 128
Command...................................................... 44, 144, 150
AFL ................................... 62, 63, 78, 82, 94, 97, 98, 136
Command APDU Structure .......................................... 44
AID ....................................................... 41, 137, 138, 157
Commands .................................................................... 51
AIP.... 62, 63, 80, 81, 83, 84, 86, 92, 93, 96, 98, 102, 129,
APPLICATION BLOCK ......................................... 52
130, 137
APPLICATION UNBLOCK ................................... 53
Coding ................................................................... 173
CARD BLOCK ........................................................ 54
Amount ....................................................................... 158
EXTERNAL AUTHENTICATE ............................. 55
Amount, Authorised ................................................... 103
GENERATE AC ................................................ 56, 87
API.............................................................................. 138
GET CHALLENGE ................................................. 60
APPLICATION BLOCK .............................................. 52
GET DATA.............................................................. 61
Application Cryptogram ........52, 56, 57, 58, 80, 129, 136
GET PROCESSING OPTIONS ............................... 62
Application Currency Code .102, 103, 136, 138, 159, 177
INTERNAL AUTHENTICATE .............................. 64
Application Currency Exponent.................................. 136
PIN CHANGE/UNBLOCK ..................................... 66
Application Discretionary Data .................................. 136
READ RECORD ..................................................... 69
Application Effective Date ................................. 101, 136
VERIFY ................................................................... 71
Application Elementary File ................... 41, 42, 155, 171
Common Core Definitions .......................................... 198
Application Expiration Date ......................... 78, 101, 136
Card Status Update................................................. 224
Application File Locator ..................................... See AFL
Card Verification Results ....................................... 222
Application Identifier.......................................... See AID
Cardholder Verification ......................................... 213
Application Interchange Profile ........................... See AIP
CID Coding ............................................................ 200
Application Label ....................................................... 137
Common Core Identifier ........................................ 220
Application Preferred Name ............................... 137, 148
Completion............................................................. 213
Application Primary Account Number (PAN) ...... 78, 137
Data Elements ........................................................ 218
Application Priority Indicator ..................................... 138
Data Retrievable by GET DATA Command.......... 202
Application Template ................................................. 139
EXTERNAL AUTHENTICATE ........................... 199
Application Transaction Counter ....... See ATC, See ATC
Functions Used in Transaction Processing ............. 214
APPLICATION UNBLOCK ........................................ 53
GENERATE AC
Application Usage Control ................................. 100, 139
Command Coding ............................................. 203
Coding ................................................................... 174
GENERATE AC .................................................... 199
Application Version Number .............................. 100, 139
GENERATE AC Command Use ........................... 212
ATC ............................... 57, 58, 61, 80, 83, 121, 139, 151
GET PROCESSING OPTIONS ............................. 201
AUC............................................................ 100, 139, 174
INTERNAL AUTHENTICATE ............................ 201
Authorisation Code ..................................................... 139
Issuer Application Data .................................. 220, 221
Authorisation Response Code ..................................... 139
Issuer-to-Card Script Processing ............................ 213
Offline PIN Processing .......................................... 213
Response APDU Format ........................................ 199
B Completion ................................................................. 133
Country Code ...................................................... 101, 149
Bank Identifier Code................................................... 140 Cryptogram ....................................... 56, 57, 58, 122, 136
BER-TLV Data Objects .............................................. 168 Cryptogram Information Data .............................. See CID
BIC ........................................... See Bank Identifier Code Cryptogram Types ........................................................ 56
CSU ............................................................ 204, 213, 216
Currency ..................................................................... 138
C Currency Code ............................................ 138, 159, 177
Currency exponent .............................................. 159, 160
CV Rule
Card Action Analysis .................................................. 127
Coding.................................................................... 175
CARD BLOCK............................................................. 54
CVM ...................... 83, 102, 105, 106, 143, 157, 175, 177 Terminal Action Analysis ...................................... 122
Terminal Risk Management ................................... 118
Transaction Log ..................................................... 190
D
DAC............................................................................ 144 G
Data Authentication Code ........................................... 144
Data Element Format Conventions ............................... 36 GENERATE AC .......56, 59, 87, 118, 122, 124, 125, 127,
Data Elements and Files ............................................... 39 129, 130, 131, 132, 133, 142, 150
Data Elements Dictionary ........................................... 135 Cryptogram Types.................................................... 56
Data Field Bytes ........................................................... 47 GET CHALLENGE ...................................................... 60
Data Object List (DOL) ................................................ 42 GET DATA .................................................................. 61
Data Objects ................................................................. 40 GET PROCESSING OPTIONS .................................... 62
Classes ..................................................................... 40
DDF ...................................................................... 41, 144
DDOL ............................................... 42, 64, 79, 144, 145 I
Definitions .................................................................... 19
DF Name .................................................................... 144
IAC .............................................. See Issuer Action Code
Directory Definition File .................................... See DDF
IAD ................................................................. 57, 58, 148
Directory Definition File (DDF) Name....................... 144
IBAN ................ See International Bank Account Number
Directory Definition File Name .......................... 144, 155
ICC Dynamic Number ................................................ 146
Directory Discretionary Template .............................. 145
IFD .............................................................................. 147
Dynamic Data Authentication Data Object List.......... See
IIN................................. See Issuer Identification Number
DDOL
IINE .............. See Issuer Identification Number Extended
Initiate Application Processing ..................................... 92
Instruction Byte ............................................................ 46
E Interface Device .................................................. 145, 147
INTERNAL AUTHENTICATE ................................... 64
Erroneous Data ............................................................. 81 International Bank Account Number .......................... 147
Exception Handling ...................................................... 84 Issuer Action Code................................ 91, 122, 123, 148
Exponent ..................................................................... 138 Issuer Application Data................................... 57, 58, 148
EXTERNAL AUTHENTICATE .................................. 55 Issuer Authentication Data .................... 55, 129, 130, 148
Status Words Returned........................................... 195 Issuer Code Table Index ..................................... 148, 178
Issuer Country Code ................................................... 149
Issuer Identification Number ...................................... 149
F Issuer Identification Number Extended....................... 149
Issuer-to-Card Script Processing ................................. 131
FCI .............................................................................. 145
FCI Issuer Discretionary Data ........................ 39, 92, 145
File Control Information ...................................... See FCI L
Files .............................................................................. 41
Financial Transaction........................................ 39, 44, 77 Language .................................................................... 150
Floor Limit.................................................................. 157 Last 4 Digits of PAN .................................................. 151
Floor Limits ................................................................ 119 Last Online Application Transaction Counter.. See LATC
Format 1...................................................................... 155 LATC .................................................................... 83, 151
Format 2...................................................................... 155 LCOL ...................................................... 80, 83, 121, 151
Function Log Entry ............................................................ 151, 191
Card Action Analysis ............................................. 127 Log Format ......................................................... 151, 192
Cardholder Verification ......................................... 102 Logical Channels .......................................................... 50
Completion ............................................................ 133 Lower Consecutive Offline Limit .................... See LCOL
Initiate Application Processing ................................ 92
Issuer-to-Card Script Processing ............................ 131
Offline Data Authentication ..................................... 96 M
Offline PIN Processing .......................................... 105
Online PIN Processing ........................................... 106
Mandatory Data Objects ............................................... 78
Online Processing .................................................. 129
Mapping Data Objects .................................................. 77
Processing Restrictions .......................................... 100
MCC ........................................................................... 152
Read Application Data ............................................. 94
Merchant Category Code ............................................ 152
Signature Processing .............................................. 106
Merchant Identifier ..................................................... 152
P
T
Padding
Data Elements ........................................................ 161 TC Hash value ............................................................ 159
DOL ......................................................................... 43 TDOL...................................................... 42, 90, 144, 158
PAN ...................................................................... 78, 137 Template ........ 70, 135, 139, 144, 145, 146, 150, 155, 162
PAN Sequence Number .............................................. 137 Terminal Action Analysis ........................................... 122
PAR ............................................................................ 153 Terminal Action Code................................. 122, 123, 156
Parameter Bytes ............................................................ 46 Terminal Capabilities .......................................... 135, 157
Payment Account Reference ....................................... 153 Terminal Country Code .............................................. 157
PDOL ........................................................ 42, 62, 92, 155 Terminal Identification ............................................... 157
Personal Identification Number ........................... See PIN Terminal Risk Management ........................................ 157
PIN 49, 51, 61, 66, 71, 105, 106, 131, 145, 146, 147, 153, Terminal Type ............................................................ 157
159, 175, 177 Terminal Verification Results ............................ See TVR
PIN CHANGE/UNBLOCK .......................................... 66 Terminology ................................................................. 37
Point-of-Service (POS) Entry Mode ........................... 153 Token Requestor ID .................................................... 157
POS ............................................................................. 153 Track 1 ........................................................................ 158
Primary Account Number ..................... 78, 119, 137, 153 Track 2 ........................................................................ 158
Processing Options Data Object List ............... See PDOL Transaction Certificate Data Object List .......... See TDOL
Processing Restrictions ............................................... 100 Transaction Date ................................................. 119, 159
Public Key ................................................ 78, 79, 83, 143 Transaction Flow .......................................................... 84
Public Key Certificate............................... 78, 79, 83, 149 Transaction Log Information ...................................... 190
Public Key Exponent .............................. 79, 83, 146, 150 Transaction Personal Identification Number............... 159
Public Key Remainder .............................. 78, 79, 83, 150 Transaction Sequence Counter.................................... 160
Transaction Status Information ............................ See TSI
Transaction Time ........................................................ 160
Transaction Type ........................................................ 160
R TRM ................................................................... 118, 157
TSI ....... 92, 96, 98, 99, 102, 104, 118, 127, 130, 132, 160
Random Transaction Selection ................................... 119 Bit Settings Following Script Processing ............... 193
Read Application Data .................................................. 94 Coding.................................................................... 182
READ RECORD .......................................................... 69 TVR 81, 90, 92, 96, 98, 99, 100, 101, 103, 104, 105, 106,
Record........................................................................... 41 118, 119, 120, 121, 122, 129, 132, 157, 195
Reference Currency .................................................... 159 Bit Settings Following Script Processing ............... 193
References Coding.................................................................... 179
Normative ................................................................ 16
Response ....................................................................... 44
Response APDU Structure............................................ 44
Revision Log................................................................... 3
U
RFU Data ...................................................................... 50
Rules for BER-TLV Data Objects .............................. 168 UCOL ..................................................... 80, 83, 121, 160
UN .............................................................................. 160