EMV v4.3 Book 3 Application Specification 20120607062110791
EMV v4.3 Book 3 Application Specification 20120607062110791
EMV v4.3 Book 3 Application Specification 20120607062110791
( ) ( )
Transaction Target Percent = Maximum Target Percent - Target Percent Interpolation factor
Target Percent
+
Floor
Limit
Biased
Selection
Threshold
P
r
o
b
a
b
i
l
i
t
y
o
f
S
e
l
e
c
t
i
o
n
0
1
EMV 4.3 Book 3 10 Functions Used in Transaction Processing
Appli cation Specification 10.6 Terminal Risk Management
November 2011 Page 113
10.6.3 Velocity Checking
If both the Lower Consecutive Offline Limit (tag '9F14') and Upper Consecutive
Offline Limit (tag '9F23') exist, the terminal shall perform velocity checking as
described in this section.
14
If either of these data objects is not present in the ICC
application, the terminal shall skip this section.
The ATC and Last Online ATC Register shall be read from the ICC using
GET DATA commands. If either of the required data objects is not returned by
the ICC in response to the GET DATA command, or if the value of the ATC is
less than or equal to the value in the Last Online ATC Register, the terminal
shall:
Set both the Lower consecutive offline limit exceeded and the Upper
consecutive offline limit exceeded bits in the TVR to 1.
Not set the New card indicator in the TVR unless the Last Online ATC
Register is returned and equals zero.
End velocity checking for this transaction.
If the required data objects are available, the terminal shall compare the
difference between the ATC and the Last Online ATC Register with the Lower
Consecutive Offline Limit to see if the limit has been exceeded. If the difference is
equal to the Lower Consecutive Offline Limit, this means that the limit has not
yet been exceeded. If the limit has been exceeded, the terminal shall set the
Lower consecutive offline limit exceeded bit in the TVR to 1 and also compare
the difference with the Upper Consecutive Offline Limit to see if the upper limit
has been exceeded. If it has, the terminal shall set the Upper consecutive offline
limit exceeded bit in the TVR to 1.
The terminal shall also check the Last Online ATC Register for a zero value. If it
is zero, the terminal shall set the New card bit in the TVR to 1.
14
The purpose of velocity checking is to allow an issuer to request that, after a certain
number of consecutive offline transactions (the Lower Consecutive Offline Limit),
transactions should be completed online. However, if the terminal is incapable of going
online, transactions may still be completed offline until a second (Upper Consecutive
Offline Limit) limit is reached. After the upper limit is reached, the recommendation of
the issuer might be to reject any transaction that cannot be completed online. Once a
transaction has been completed online with successful issuer authentication, the count
begins anew, so that transactions may be processed offline until the lower limit is again
reached.
10 Functions Used in Transaction Processing EMV 4.3 Book 3
10.7 Terminal Action Analysis Appli cation Specification
Page 114 November 2011
10.7 Terminal Action Anal ysis
Purpose:
Once terminal risk management and application functions related to a normal
offline transaction have been completed, the terminal makes the first decision as
to whether the transaction should be approved offline, declined offline, or
transmitted online.
If the outcome of this decision process is to proceed offline, the terminal issues
a GENERATE AC command to ask the ICC to return a TC.
If the outcome of the decision is to go online, the terminal issues a
GENERATE AC command to ask the ICC for an Authorisation Request
Cryptogram (ARQC).
If the decision is to reject the transaction, the terminal issues a GENERATE
AC to ask for an Application Authentication Cryptogram (AAC).
An offline decision made here is not final. If the terminal asks for a TC from the
ICC, the ICC, as a result of card risk management, may return an ARQC or AAC.
Conditions of Execution:
The terminal action analysis function is always performed.
Sequence of Execution:
The terminal action analysis function is performed after terminal risk
management and cardholder and/or merchant transaction data entry has been
completed. It shall be performed prior to the first use of the GENERATE AC
command.
The Issuer Action Code - Default and Terminal Action Code - Default processing
described below shall also be performed after online processing is attempted in
the case where the terminal was unable to process the transaction online.
The terminal action analysis function may be executed at several places during a
transaction to eliminate the need for unnecessary processing. If any processing
results in the setting of a bit in the TVR (for example, failure of cardholder
verification), it may be desirable to perform this function immediately to
determine whether the transaction should be rejected offline based upon the
issuers parameters in the ICC or the acquirers parameters in the terminal.
Recognition of such a decision early in processing may allow the terminal to avoid
prolonging a transaction that will ultimately be rejected. Multiple execution of
this decision process is optional on the part of the terminal.
EMV 4.3 Book 3 10 Functions Used in Transaction Processing
Appli cation Specification 10.7 Terminal Action Analysis
November 2011 Page 115
Description:
The terminal shall make a preliminary decision to reject the transaction,
complete it online, or complete it offline based upon the TVR, issuer action
preferences, and acquirer action preferences according to the method described in
this section.
The ICC contains (optionally) three data elements to reflect the issuers selected
action to be taken based upon the content of the TVR. Each of the three data
elements has defaults specified here in case any of these data elements are
absent from the ICC. The three data elements are:
Issuer Action Code - Denial
Issuer Action Code - Online
Issuer Action Code - Default
Collectively, these three data objects are termed the Issuer Action Codes. The
purpose of each is described in this section. The format of each is identical and
mirrors the TVR. Each has one bit corresponding to each bit in the TVR, and the
Issuer Action Code (IAC) bit specifies an action to be taken if the corresponding
bit in the TVR is set to 1. Thus, the size and format of each of the Issuer Action
Codes is identical to the TVR.
Similarly, the terminal may contain three data elements to reflect the acquirers
selected action to be taken based upon the content of the TVR. These data
elements are:
Terminal Action Code - Denial
Terminal Action Code - Online
Terminal Action Code - Default
Collectively, these three data objects are termed the Terminal Action Codes. The
purpose of each is described in this section. The format of each is identical and
mirrors the TVR. Each has one bit corresponding to each bit in the TVR, and the
Terminal Action Code (TAC) bit specifies an action to be taken if the
corresponding bit in the TVR is set to 1. Thus, the size and format of each of the
Terminal Action Codes is identical to the TVR and to the Issuer Action Codes.
The existence of each of the Terminal Action Codes is optional. In the absence of
any Terminal Action Code, a default value consisting of all bits set to 0 is to be
used in its place. However, it is strongly recommended that as a minimum, the
Terminal Action Code - Online and Terminal Action Code - Default should be
included with the bits corresponding to Offline data authentication was not
performed, and either SDA failed, or DDA failed or CDA failed set to 1.
15
15
This protects against a fraudulent card with all the bits in the Issuer Action Code set to
0. Without this protection, such a card could be created with no possibility of going online
or declining transactions. All transactions would be approved offline.
10 Functions Used in Transaction Processing EMV 4.3 Book 3
10.7 Terminal Action Analysis Appli cation Specification
Page 116 November 2011
Processing of the action codes is done in pairs, that is, the Issuer Action Code -
Denial is processed together with the Terminal Action Code - Denial, the Issuer
Action Code - Online is processed together with the Terminal Action Code -
Online, and the Issuer Action Code - Default is processed together with the
Terminal Action Code - Default. Processing of the action codes shall be performed
in the order specified here.
If the Issuer Action Code - Denial does not exist, a default value with all bits set
to 0 is to be used. Together, the Issuer Action Code - Denial and the Terminal
Action Code - Denial specify the conditions that cause denial of a transaction
without attempting to go online. If either data object exists, the terminal shall
inspect each bit in the TVR. For each bit in the TVR that has a value of 1, the
terminal shall check the corresponding bits in the Issuer Action Code - Denial
and the Terminal Action Code - Denial. If the corresponding bit in either of the
action codes is set to 1, it indicates that the issuer or the acquirer wishes the
transaction to be rejected offline. In this case, the terminal shall issue a
GENERATE AC command to request an AAC from the ICC. This AAC may be
presented to the issuer to prove card presence during this transaction, but details
of handling a rejected transaction are outside the scope of this specification.
If the Issuer Action Code - Online is not present, a default value with all bits set
to 1 shall be used in its place. Together, the Issuer Action Code - Online and the
Terminal Action Code - Online specify the conditions that cause a transaction to
be completed online. These data objects are meaningful only for terminals
capable of online processing. Offline-only terminals may skip this test and
proceed to checking the Issuer Action Code - Default and Terminal Action Code -
Default, described below. For an online-only terminal, if it has not already
decided to reject the transaction as described above, it shall continue transaction
processing online, and shall issue a GENERATE AC command requesting an
ARQC from the card. For a terminal capable of online processing, if the terminal
has not already decided to reject the transaction as described above, the terminal
shall inspect each bit in the TVR. For each bit in the TVR that has a value of 1,
the terminal shall check the corresponding bits in both the Issuer Action Code -
Online and the Terminal Action Code - Online. If the bit in either of the action
codes is set to 1, the terminal shall complete transaction processing online and
shall issue a GENERATE AC command requesting an ARQC from the ICC.
Otherwise, the terminal shall issue a GENERATE AC command requesting a TC
from the ICC.
EMV 4.3 Book 3 10 Functions Used in Transaction Processing
Appli cation Specification 10.7 Terminal Action Analysis
November 2011 Page 117
If the Issuer Action Code - Default does not exist, a default value with all bits set
to 1 shall be used in its place. Together, the Issuer Action Code - Default and the
Terminal Action Code - Default specify the conditions that cause the transaction
to be rejected if it might have been approved online but the terminal is for any
reason unable to process the transaction online. The Issuer Action Code - Default
and the Terminal Action Code - Default are used only if the Issuer Action Code -
Online and the Terminal Action Code - Online were not used (for example, in
case of an offline-only terminal) or indicated a desire on the part of the issuer or
the acquirer to process the transaction online but the terminal was unable to go
online. In the event that an online-only terminal was unable to successfully go
online, it may optionally skip TAC/IAC Default processing (shown in Figure 7 for
a transaction that was not completed on-line)
16
. If an online-only terminal does
skip TAC/IAC Default processing, it shall request an AAC with the second
GENERATE AC command. If the terminal has not already rejected the
transaction and the terminal is for any reason unable to process the transaction
online, the terminal shall use this code to determine whether to approve or reject
the transaction offline. If any bit in Issuer Action Code - Default or the Terminal
Action Code - Default and the corresponding bit in the TVR are both set to 1, the
transaction shall be rejected and the terminal shall request an AAC to complete
processing. If no such condition appears, the transaction may be approved offline,
and a GENERATE AC command shall be issued to the ICC requesting a TC.
If CDA is to be performed (as described in section 10.3 of this book and section
6.6 of Book 2), the terminal shall set the bit for CDA Signature Requested in the
GENERATE AC command to 1.
16
Note that if an online-only terminal is unable to successfully go online and TAC/IAC
Default processing is optionally performed, this could result in a TC being requested with
the second GENERATE AC command (depending upon the TAC/IAC Default settings).
10 Functions Used in Transaction Processing EMV 4.3 Book 3
10.8 Card Action Analysis Appli cation Specification
Page 118 November 2011
10.8 Card Action Analysis
Purpose:
An ICC may perform its own risk management to protect the issuer from fraud or
excessive credit risk. Details of card risk management algorithms within the ICC
are specific to the issuer and are outside the scope of this specification, but as a
result of the risk management process, an ICC may decide to complete a
transaction online or offline or reject the transaction. The ICC may also decide
that an advice message should be sent to the issuer to inform the issuer of an
exceptional condition.
Conditions of Execution:
The card online/offline decision is specified by its response to the GENERATE AC
command. Therefore, this section applies to all transactions. Whether the ICC
performs any risk management tests is transparent to the terminal and outside
the scope of this specification.
Sequence of Execution:
The card action analysis process is performed when the terminal issues the
GENERATE AC command for a given transaction.
Description:
The result of risk management performed by the ICC is a decision for one of the
following actions to be taken by the terminal:
Approve the transaction offline. This option is available to the ICC only if the
terminal has made a preliminary decision to complete the transaction offline,
as described in section 10.7.
Complete the transaction online.
Reject the transaction.
The decision by the ICC is made known to the terminal by returning a TC, an
ARQC, or an AAC to the terminal in response to a GENERATE AC command, as
described in section 6.5.5.
Upon the completion of the card action analysis function, the terminal shall set
the Card risk management was performed bit in the TSI to 1.
EMV 4.3 Book 3 10 Functions Used in Transaction Processing
Appli cation Specification 10.8 Card Action Analysis
November 2011 Page 119
10.8.1 Terminal Messages for an AAC
An AAC returned by the card indicates either a rejection of the specific
transaction or a restriction that disallows use of the card in the environment of
the transaction (for example, the card application may be restricted only to
specific merchant categories). In both cases, the card disapproves the transaction,
but the terminal may choose to display different messages in the two cases. The
card may optionally distinguish the cases by the use of the code returned in the
Cryptogram Information Data (see the GENERATE AC command in
section 6.5.5). If an AAC is returned with b3-b1 = '001' in the Cryptogram
Information Data, the AAC was returned due to card restrictions.
10.8.2 Advice Messages
The issuer may wish for an advice message, separate from either an
authorisation request or a clearing message, to be sent in certain exception cases.
(Currently, the only identified such case is PIN Try Limit exceeded, but
allowance has been made for the addition of other cases later; see Table 14).
If b4 of the Cryptogram Information Data is 1, the terminal shall process the
transaction as shown in Book 4, sections 6.3.7 and 12.2.5. Further information
may be found in complementary payment system documentation.
10 Functions Used in Transaction Processing EMV 4.3 Book 3
10.9 Online Processing Appli cation Specification
Page 120 November 2011
10.9 Online Processing
Purpose:
Online processing is performed to ensure that the issuer can review and
authorise or reject transactions that are outside acceptable limits of risk defined
by the issuer, the payment system, or the acquirer.
Conditions of Execution:
Online processing shall be performed if the ICC returns an ARQC in response to
the first GENERATE AC command for the transaction.
Sequence of Execution:
The online processing function is performed when the terminal receives an ARQC
in response to the first GENERATE AC command.
Description:
In general, online processing is the same as online processing of magnetic stripe
transactions and is not described here. This section is limited to the additional
online processing provided in an ICC environment that is not available in a
magnetic stripe environment.
The ARQC may be sent in the authorisation request message.
17
The
authorisation response message from the issuer may contain the Issuer
Authentication Data (tag '91'). If the Issuer Authentication Data is received in
the authorisation response message and the Application Interchange Profile
indicates that the ICC supports issuer authentication, the Issuer Authentication
Data shall be sent to the ICC in the EXTERNAL AUTHENTICATE command. If
the ICC responds with SW1 SW2 other than '9000', the terminal shall set the
Issuer authentication failed bit in the TVR to 1.
17
Actions performed by the acquirer or issuer systems are outside the scope of this
specification. However, an explanation of what is expected to take place at the issuer may
be useful for clarity. The ARQC is a cryptogram generated by the card from transaction
data using an issuer key stored in the card and known at the issuer authorisation system.
The issuer uses this key to authenticate the ARQC and thereby authenticate the card.
This process is termed online card authentication or simply card authentication.
Subsequent to card authentication, the issuer may generate a cryptogram on selected
data included in the authorisation response or already known to the card. This
cryptogram is sent to the terminal in the authorisation response as part of the Issuer
Authentication Data. The terminal provides the Issuer Authentication Data to the ICC in
the EXTERNAL AUTHENTICATE command or the second GENERATE AC command,
as described in Part I. The ICC may use the Issuer Authentication Data to authenticate
that the response message originated from the issuer.
EMV 4.3 Book 3 10 Functions Used in Transaction Processing
Appli cation Specification 10.9 Online Processing
November 2011 Page 121
If the Issuer Authentication Data is received but the Application Interchange
Profile indicates that the ICC does not support issuer authentication, this
indicates that the ICC has combined the issuer authentication function with the
GENERATE AC command. In this case, or if no Issuer Authentication Data is
received, the terminal shall not execute the EXTERNAL AUTHENTICATE
command.
The ICC shall permit at most one EXTERNAL AUTHENTICATE command in a
transaction. If the terminal issues more than one, the second and all succeeding
EXTERNAL AUTHENTICATE commands shall end with SW1 SW2 = '6985'.
Upon completion of online processing, if the EXTERNAL AUTHENTICATE
command was sent to the card by the terminal, the terminal shall set the Issuer
authentication was performed bit in the TSI to 1.
Note: Annex F provides additional information about status words to be returned in
response to an EXTERNAL AUTHENTICATE command.
10 Functions Used in Transaction Processing EMV 4.3 Book 3
10.10 Issuer-to-Card Script Processing Appli cation Specification
Page 122 November 2011
10.10 Issuer-to-Card Script Processing
Purpose:
An issuer may provide command scripts to be delivered to the ICC by the
terminal to perform functions that are not necessarily relevant to the current
transaction but are important for the continued functioning of the application in
the ICC. Multiple scripts may be provided with an authorisation response, and
each may contain any number of Issuer Script Commands. Script processing is
provided to allow for functions that are outside the scope of this specification but
are nonetheless necessary.
18
A script may contain Issuer Script Commands not known to the terminal, but the
terminal shall deliver each command to the ICC individually according to this
specification.
Conditions of Execution:
None.
Sequence of Execution:
Two separate script tags are available for use by the issuer. Issuer scripts with
tag '71' shall be processed prior to issuing the final GENERATE AC command.
Issuer scripts with tag '72' shall be processed after issuing the final
GENERATE AC command.
18
An example might be unblocking of an offline PIN, which might be done differently by
various issuers or payment systems.
EMV 4.3 Book 3 10 Functions Used in Transaction Processing
Appli cation Specification 10.10 Issuer-to-Card Script Processing
November 2011 Page 123
Description:
An Issuer Script is a constructed data object (tag '71' or '72') containing
(optionally) a Script Identifier and a sequence of Issuer Script Command APDUs
to be delivered serially to the ICC. The Script Identifier is optional and is not
interpreted by the terminal; it is meaningful only to the issuer. Figure 14 and
Figure 15 illustrate an Issuer Script containing a Script Identifier and three
commands.
T L T L Script ID Commands
'71' or
'72'
L(data, including Script
ID, tags, and lengths)
'9F18' '04' Identifier
(4 bytes)
(see Figure 15)
Figure 14: Issuer Script Format
T
1
L
1
V
1
T
2
L
2
V
2
T
3
L
3
V
3
'86' L(V
1
) Command '86' L(V
2
) Command '86' L(V
3
) Command
Figure 15: Issuer Script Command Format (Shown with Three Commands)
It is possible for multiple Issuer Scripts to be delivered with a single
authorisation response. The terminal shall process each Issuer Script in the
sequence in which it appears in the authorisation response according to the
following rules:
Issuer Script Commands shall be separated using the BER-TLV coding of the
data objects defining the commands (tag '86').
Each command shall be delivered to the ICC as a command APDU in the
sequence in which it appeared in the Issuer Script.
The terminal shall examine only SW1 in the response APDU and perform one
of the following actions:
If SW1 indicates either normal processing or a warning according to the
conventions described in this specification, the terminal shall continue
with the next command from the Issuer Script (if any).
If SW1 indicates an error condition, the processing of the Issuer Script
shall be terminated.
If an Issuer Script is processed, the terminal shall set the Script processing was
performed bit in the TSI to 1. If an error occurred in processing a script, the
terminal shall set to 1 either the Script processing failed before final
GENERATE AC in the TVR if the identifying tag of the failing script was '71' or
the Script processing failed after final GENERATE AC in the TVR if the tag
was '72'.
Note: Annex E discusses TVR and TSI bit settings following script processing.
10 Functions Used in Transaction Processing EMV 4.3 Book 3
10.11 Completion Appli cation Specification
Page 124 November 2011
10.11 Completion
Purpose:
The completion function closes processing of a transaction.
Conditions of Execution:
The terminal always performs this function unless the transaction is terminated
prematurely by error processing.
Sequence of Execution:
The completion function is always the last function in the transaction processing.
(Script processing may be performed after the completion function.)
Description:
The ICC indicates willingness to complete transaction processing by returning
either a TC or an AAC to either the first or second GENERATE AC command
issued by the terminal. If the terminal decides to go online, completion shall be
done when the second GENERATE AC command is issued.
If the terminal is to perform CDA (as described in section 10.3), the terminal
shall set the CDA signature requested bit in the GENERATE AC command to 1.
See section 9 for additional information on the use of the GENERATE AC
command.
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 125
Part IV
Annexes
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 127
Annex A Data Elements Dictionary
Table 33 defines those data elements that may be used for financial transaction interchange and their mapping onto data
objects and files. Table 34 lists the data elements in tag sequence.
The characters used in the Format column are described in section 4.3, Data Element Format Convention.
A1 Data Elements by Name
Name Description Source Format Template Tag Length
Account Type Indicates the type of account selected on the
terminal, coded as specified in Annex G
Terminal n 2 5F57 1
Acquirer
Identifier
Uniquely identifies the acquirer within each
payment system
Terminal n 6-11 '9F01' 6
Additional
Terminal
Capabilities
Indicates the data input and output
capabilities of the terminal
Terminal b '9F40' 5
Amount,
Authorised
(Binary)
Authorised amount of the transaction
(excluding adjustments)
Terminal b '81' 4
Table 33: Data Elements Dictionary
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 128
Name Description Source Format Template Tag Length
Amount,
Authorised
(Numeric)
Authorised amount of the transaction
(excluding adjustments)
Terminal n 12 '9F02' 6
Amount, Other
(Binary)
Secondary amount associated with the
transaction representing a cashback amount
Terminal b '9F04' 4
Amount, Other
(Numeric)
Secondary amount associated with the
transaction representing a cashback amount
Terminal n 12 '9F03' 6
Amount,
Reference
Currency
Authorised amount expressed in the reference
currency
Terminal b '9F3A' 4
Application
Cryptogram
Cryptogram returned by the ICC in response of
the GENERATE AC command
ICC b '77' or '80' '9F26' 8
Application
Currency Code
Indicates the currency in which the account is
managed according to ISO 4217
ICC n 3 '70' or '77' '9F42' 2
Application
Currency
Exponent
Indicates the implied position of the decimal
point from the right of the amount represented
according to ISO 4217
ICC n 1 '70' or '77' '9F44' 1
Application
Discretionary
Data
Issuer or payment system specified data
relating to the application
ICC b '70' or '77' '9F05' 1-32
Application
Effective Date
Date from which the application may be used ICC n 6
YYMMDD
'70' or '77' '5F25' 3
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 129
Name Description Source Format Template Tag Length
Application
Expiration Date
Date after which application expires ICC n 6
YYMMDD
'70' or '77' '5F24' 3
Application File
Locator (AFL)
Indicates the location (SFI, range of records) of
the AEFs related to a given application
ICC var. '77' or '80' '94' var. up
to 252
Application
Dedicated File
(ADF) Name
Identifies the application as described in
ISO/IEC 7816-5
ICC b '61' '4F' 5-16
Application
Identifier (AID)
terminal
Identifies the application as described in
ISO/IEC 7816-5
Terminal b '9F06' 5-16
Application
Interchange
Profile
Indicates the capabilities of the card to support
specific functions in the application
ICC b '77' or '80' '82' 2
Application
Label
Mnemonic associated with the AID according
to ISO/IEC 7816-5
ICC ans with
the special
character
limited to
space
'61' or 'A5' '50' 1-16
Application
Preferred Name
Preferred mnemonic associated with the AID ICC ans (see
section
4.3)
'61' or 'A5' '9F12' 1-16
Application
Primary Account
Number (PAN)
Valid cardholder account number ICC cn
var. up to
19
'70' or '77' '5A' var. up
to 10
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 130
Name Description Source Format Template Tag Length
Application
Primary Account
Number (PAN)
Sequence
Number
Identifies and differentiates cards with the
same PAN
ICC n 2 '70' or '77' '5F34' 1
Application
Priority
Indicator
Indicates the priority of a given application or
group of applications in a directory
ICC b '61' or 'A5' '87' 1
Application
Reference
Currency
1-4 currency codes used between the terminal
and the ICC when the Transaction Currency
Code is different from the Application
Currency Code; each code is 3 digits according
to ISO 4217
ICC n 3 '70' or '77' '9F3B' 2-8
Application
Reference
Currency
Exponent
Indicates the implied position of the decimal
point from the right of the amount, for each of
the 1-4 reference currencies represented
according to ISO 4217
ICC n 1 '70' or '77' '9F43' 1-4
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 131
Name Description Source Format Template Tag Length
Application
Selection
Indicator
For an application in the ICC to be supported
by an application in the terminal, the
Application Selection Indicator indicates
whether the associated AID in the terminal
must match the AID in the card exactly,
including the length of the AID, or only up to
the length of the AID in the terminal
There is only one Application Selection
Indicator per AID supported by the terminal
Terminal At the
discretion
of the
terminal.
The data
is not sent
across the
interface
See
format
Application
Template
Contains one or more data objects relevant to
an application directory entry according to
ISO/IEC 7816-5
ICC b '70' '61' var. up
to 252
Application
Transaction
Counter (ATC)
Counter maintained by the application in the
ICC (incrementing the ATC is managed by the
ICC)
ICC b '77' or '80' '9F36' 2
Application
Usage Control
Indicates issuers specified restrictions on the
geographic usage and services allowed for the
application
ICC b '70' or '77' '9F07' 2
Application
Version Number
Version number assigned by the payment
system for the application
ICC b '70' or '77' '9F08' 2
Application
Version Number
Version number assigned by the payment
system for the application
Terminal b '9F09' 2
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 132
Name Description Source Format Template Tag Length
Authorisation
Code
Value generated by the authorisation authority
for an approved transaction
Issuer As defined
by the
Payment
Systems
'89' 6
Authorisation
Response Code
Code that defines the disposition of a message Issuer/
Terminal
an 2 '8A' 2
Authorisation
Response
Cryptogram
(ARPC)
Cryptogram generated by the issuer and used
by the card to verify that the response came
from the issuer.
Issuer b 4 or 8
Bank Identifier
Code (BIC)
Uniquely identifies a bank as defined in ISO
9362.
ICC var. 'BF0C' or
'73'
'5F54' 8 or 11
Card Risk
Management
Data Object
List 1 (CDOL1)
List of data objects (tag and length) to be
passed to the ICC in the first GENERATE AC
command
ICC b '70' or '77' '8C' var. up
to 252
Card Risk
Management
Data Object
List 2 (CDOL2)
List of data objects (tag and length) to be
passed to the ICC in the second GENERATE
AC command
ICC b '70' or '77' '8D' var. up
to 252
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 133
Name Description Source Format Template Tag Length
Card Status
Update (CSU)
Contains data sent to the ICC to indicate
whether the issuer approves or declines the
transaction, and to initiate actions specified by
the issuer. Transmitted to the card in Issuer
Authentication Data.
Issuer b 4
Cardholder
Name
Indicates cardholder name according to
ISO 7813
ICC ans 2-26 '70' or '77' '5F20' 2-26
Cardholder
Name Extended
Indicates the whole cardholder name when
greater than 26 characters using the same
coding convention as in ISO 7813
ICC ans 27-45 '70' or '77' '9F0B' 27-45
Cardholder
Verification
Method (CVM)
List
Identifies a method of verification of the
cardholder supported by the application
ICC b '70' or '77' '8E' 10-252
Cardholder
Verification
Method (CVM)
Results
Indicates the results of the last CVM
performed
Terminal b '9F34' 3
Certification
Authority Public
Key Check Sum
A check value calculated on the concatenation
of all parts of the Certification Authority
Public Key (RID, Certification Authority Public
Key Index, Certification Authority Public Key
Modulus, Certification Authority Public Key
Exponent) using SHA-1
Terminal b 20
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 134
Name Description Source Format Template Tag Length
Certification
Authority Public
Key Exponent
Value of the exponent part of the Certification
Authority Public Key
Terminal b 1 or 3
Certification
Authority Public
Key Index
Identifies the certification authoritys public
key in conjunction with the RID
ICC b '70' or '77' '8F' 1
Certification
Authority Public
Key Index
Identifies the certification authoritys public
key in conjunction with the RID
Terminal b '9F22' 1
Certification
Authority Public
Key Modulus
Value of the modulus part of the Certification
Authority Public Key
Terminal b NCA
(up to
248)
Command
Template
Identifies the data field of a command message Terminal b '83' var.
Cryptogram
Information
Data
Indicates the type of cryptogram and the
actions to be performed by the terminal
ICC b '77' or '80' '9F27' 1
Data
Authentication
Code
An issuer assigned value that is retained by
the terminal during the verification process of
the Signed Static Application Data
ICC b '9F45' 2
Dedicated File
(DF) Name
Identifies the name of the DF as described in
ISO/IEC 7816-4
ICC b '6F' '84' 5-16
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 135
Name Description Source Format Template Tag Length
Default Dynamic
Data
Authentication
Data Object List
(DDOL)
DDOL to be used for constructing the
INTERNAL AUTHENTICATE command if the
DDOL in the card is not present
Terminal b var.
Default
Transaction
Certificate Data
Object List
(TDOL)
TDOL to be used for generating the TC Hash
Value if the TDOL in the card is not present
Terminal b var.
Directory
Definition File
(DDF) Name
Identifies the name of a DF associated with a
directory
ICC b '61' '9D' 5-16
Directory
Discretionary
Template
Issuer discretionary part of the directory
according to ISO/IEC 7816-5
ICC var. '61' '73' var. up
to 252
Dynamic Data
Authentication
Data Object List
(DDOL)
List of data objects (tag and length) to be
passed to the ICC in the INTERNAL
AUTHENTICATE command
ICC b '70' or '77' '9F49' up to
252
Enciphered
Personal
Identification
Number (PIN)
Data
Transaction PIN enciphered at the PIN pad for
online verification or for offline verification if
the PIN pad and IFD are not a single
integrated device
Terminal b 8
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 136
Name Description Source Format Template Tag Length
File Control
Information
(FCI) Issuer
Discretionary
Data
Issuer discretionary part of the FCI ICC var. 'A5' 'BF0C' var. up
to 222
File Control
Information
(FCI)
Proprietary
Template
Identifies the data object proprietary to this
specification in the FCI template according to
ISO/IEC 7816-4
ICC var. '6F' 'A5' var.
File Control
Information
(FCI) Template
Identifies the FCI template according to
ISO/IEC 7816-4
ICC var. '6F' var. up
to 252
ICC Dynamic
Number
Time-variant number generated by the ICC, to
be captured by the terminal
ICC b '9F4C' 2-8
Integrated
Circuit Card
(ICC) PIN
Encipherment
Public Key
Certificate
ICC PIN Encipherment Public Key certified by
the issuer
ICC b '70' or '77' '9F2D' NI
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 137
Name Description Source Format Template Tag Length
Integrated
Circuit Card
(ICC) PIN
Encipherment
Public Key
Exponent
ICC PIN Encipherment Public Key Exponent
used for PIN encipherment
ICC b '70' or '77' '9F2E' 1 or 3
Integrated
Circuit Card
(ICC) PIN
Encipherment
Public Key
Remainder
Remaining digits of the ICC PIN
Encipherment Public Key Modulus
ICC b '70' or '77' '9F2F' NPE
NI + 42
Integrated
Circuit Card
(ICC) Public Key
Certificate
ICC Public Key certified by the issuer ICC b '70' or '77' '9F46' NI
Integrated
Circuit Card
(ICC) Public Key
Exponent
ICC Public Key Exponent used for the
verification of the Signed Dynamic Application
Data
ICC b '70' or '77' '9F47' 1 to 3
Integrated
Circuit Card
(ICC) Public Key
Remainder
Remaining digits of the ICC Public Key
Modulus
ICC b '70' or '77' '9F48' NIC
NI + 42
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 138
Name Description Source Format Template Tag Length
Interface Device
(IFD) Serial
Number
Unique and permanent serial number assigned
to the IFD by the manufacturer
Terminal an 8 '9F1E' 8
International
Bank Account
Number (IBAN)
Uniquely identifies the account of a customer
at a financial institution as defined in ISO
13616.
ICC var. 'BF0C' or
'73'
'5F53' Var. up
to 34
Issuer Action
Code - Default
Specifies the issuers conditions that cause a
transaction to be rejected if it might have been
approved online, but the terminal is unable to
process the transaction online
ICC b '70' or '77' '9F0D' 5
Issuer Action
Code - Denial
Specifies the issuers conditions that cause the
denial of a transaction without attempt to go
online
ICC b '70' or '77' '9F0E' 5
Issuer Action
Code - Online
Specifies the issuers conditions that cause a
transaction to be transmitted online
ICC b '70' or '77' '9F0F' 5
Issuer
Application Data
Contains proprietary application data for
transmission to the issuer in an online
transaction.
Note: For CCD-compliant applications, Annex C,
section C7 defines the specific coding of the Issuer
Application Data (IAD). To avoid potential conflicts
with CCD-compliant applications, it is strongly
recommended that the IAD data element in an
application that is not CCD-compliant should not
use the coding for a CCD-compliant application
ICC b '77' or '80' '9F10' var. up
to 32
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 139
Name Description Source Format Template Tag Length
Issuer
Authentication
Data
Data sent to the ICC for online issuer
authentication
Issuer b '91' 8-16
Issuer Code
Table Index
Indicates the code table according to
ISO/IEC 8859 for displaying the Application
Preferred Name
ICC n 2 'A5' '9F11' 1
Issuer Country
Code
Indicates the country of the issuer according to
ISO 3166
ICC n 3 '70' or '77' '5F28' 2
Issuer Country
Code (alpha2
format)
Indicates the country of the issuer as defined
in ISO 3166 (using a 2 character alphabetic
code)
ICC a 2 'BF0C' or
'73'
'5F55' 2
Issuer Country
Code (alpha3
format)
Indicates the country of the issuer as defined
in ISO 3166 (using a 3 character alphabetic
code)
ICC a 3 'BF0C' or
'73'
'5F56' 3
Issuer
Identification
Number (IIN)
The number that identifies the major industry
and the card issuer and that forms the first
part of the Primary Account Number (PAN)
ICC n 6 'BF0C' or
'73'
'42' 3
Issuer Public
Key Certificate
Issuer public key certified by a certification
authority
ICC b '70' or '77' '90' NCA
Issuer Public
Key Exponent
Issuer public key exponent used for the
verification of the Signed Static Application
Data and the ICC Public Key Certificate
ICC b '70' or '77' '9F32' 1 to 3
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 140
Name Description Source Format Template Tag Length
Issuer Public
Key Remainder
Remaining digits of the Issuer Public Key
Modulus
ICC b '70' or '77' '92' NI
NCA +
36
Issuer Script
Command
Contains a command for transmission to the
ICC
Issuer b '71' or '72' '86' var. up
to 261
Issuer Script
Identifier
Identification of the Issuer Script Issuer b '71' or '72' '9F18' 4
Issuer Script
Results
Indicates the result of the terminal script
processing
Terminal b var.
Issuer Script
Template 1
Contains proprietary issuer data for
transmission to the ICC before the second
GENERATE AC command
Issuer b '71' var.
Issuer Script
Template 2
Contains proprietary issuer data for
transmission to the ICC after the second
GENERATE AC command
Issuer b '72' var.
Issuer URL The URL provides the location of the Issuers
Library Server on the Internet.
ICC ans 'BF0C' or
'73'
'5F50' var.
Language
Preference
1-4 languages stored in order of preference,
each represented by 2 alphabetical characters
according to ISO 639
Note: EMVCo strongly recommends that cards be
personalised with data element '5F2D' coded in
lowercase, but that terminals accept the data
element whether it is coded in upper or lower case.
ICC an 2 'A5' '5F2D' 2-8
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 141
Name Description Source Format Template Tag Length
Last Online
Application
Transaction
Counter (ATC)
Register
ATC value of the last transaction that went
online
ICC b '9F13' 2
Log Entry Provides the SFI of the Transaction Log file
and its number of records
ICC b 'BF0C' or
'73'
'9F4D' 2
Log Format List (in tag and length format) of data objects
representing the logged data elements that are
passed to the terminal when a transaction log
record is read
ICC b '9F4F' var.
Lower
Consecutive
Offline Limit
Issuer-specified preference for the maximum
number of consecutive offline transactions for
this ICC application allowed in a terminal with
online capability
ICC b '70' or '77' '9F14' 1
Maximum
Target
Percentage to be
used for Biased
Random
Selection
Value used in terminal risk management for
random transaction selection
Terminal
Merchant
Category Code
Classifies the type of business being done by
the merchant, represented according to
ISO 8583:1993 for Card Acceptor Business
Code
Terminal n 4 '9F15' 2
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 142
Name Description Source Format Template Tag Length
Merchant
Identifier
When concatenated with the Acquirer
Identifier, uniquely identifies a given merchant
Terminal ans 15 '9F16' 15
Merchant Name
and Location
Indicates the name and location of the
merchant
Terminal ans '9F4E' var.
Message Type Indicates whether the batch data capture
record is a financial record or advice
Terminal n 2 1
Personal
Identification
Number (PIN)
Pad Secret Key
Secret key of a symmetric algorithm used by
the PIN pad to encipher the PIN and by the
card reader to decipher the PIN if the PIN pad
and card reader are not integrated
Terminal
Personal
Identification
Number (PIN)
Try Counter
Number of PIN tries remaining ICC b '9F17' 1
Point-of-Service
(POS) Entry
Mode
Indicates the method by which the PAN was
entered, according to the first two digits of the
ISO 8583:1987 POS Entry Mode
Terminal n 2 '9F39' 1
Processing
Options Data
Object List
(PDOL)
Contains a list of terminal resident data
objects (tags and lengths) needed by the ICC in
processing the GET PROCESSING OPTIONS
command
ICC b 'A5' '9F38' var.
Proprietary
Authentication
Data
Contains issuer data for transmission to the
card in the Issuer Authentication Data of an
online transaction.
Issuer b var. up
to 8
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 143
Name Description Source Format Template Tag Length
READ RECORD
Response
Message
Template
Contains the contents of the record read.
(Mandatory for SFIs 1-10. Response messages
for SFIs 11-30 are outside the scope of EMV,
but may use template '70')
ICC var. '70' var. up
to 252
Response
Message
Template
Format 1
Contains the data objects (without tags and
lengths) returned by the ICC in response to a
command
ICC var. '80' var.
Response
Message
Template
Format 2
Contains the data objects (with tags and
lengths) returned by the ICC in response to a
command
ICC var. '77' var.
Service Code Service code as defined in ISO/IEC 7813 for
track 1 and track 2
ICC n 3 '70' or '77' '5F30' 2
Short File
Identifier (SFI)
Identifies the AEF referenced in commands
related to a given ADF or DDF. It is a binary
data object having a value in the range 1 to 30
and with the three high order bits set to zero.
ICC b 'A5' '88' 1
Signed Dynamic
Application Data
Digital signature on critical application
parameters for DDA or CDA
ICC b '77' or '80' '9F4B' NIC
Signed Static
Application Data
Digital signature on critical application
parameters for SDA
ICC b '70' or '77' '93' NI
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 144
Name Description Source Format Template Tag Length
Static Data
Authentication
Tag List
List of tags of primitive data objects defined in
this specification whose value fields are to be
included in the Signed Static or Dynamic
Application Data
ICC '70' or '77' '9F4A' var.
Target
Percentage to be
Used for Random
Selection
Value used in terminal risk management for
random transaction selection
Terminal
Terminal Action
Code - Default
Specifies the acquirers conditions that cause a
transaction to be rejected if it might have been
approved online, but the terminal is unable to
process the transaction online
Terminal b 5
Terminal Action
Code - Denial
Specifies the acquirers conditions that cause
the denial of a transaction without attempt to
go online
Terminal b 5
Terminal Action
Code - Online
Specifies the acquirers conditions that cause a
transaction to be transmitted online
Terminal b 5
Terminal
Capabilities
Indicates the card data input, CVM, and
security capabilities of the terminal
Terminal b '9F33' 3
Terminal
Country Code
Indicates the country of the terminal,
represented according to ISO 3166
Terminal n 3 '9F1A' 2
Terminal Floor
Limit
Indicates the floor limit in the terminal in
conjunction with the AID
Terminal b '9F1B' 4
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 145
Name Description Source Format Template Tag Length
Terminal
Identification
Designates the unique location of a terminal at
a merchant
Terminal an 8 '9F1C' 8
Terminal Risk
Management
Data
Application-specific value used by the card for
risk management purposes
Terminal b '9F1D' 1-8
Terminal Type Indicates the environment of the terminal, its
communications capability, and its operational
control
Terminal n 2 '9F35' 1
Terminal
Verification
Results
Status of the different functions as seen from
the terminal
Terminal b '95' 5
Threshold Value
for Biased
Random
Selection
Value used in terminal risk management for
random transaction selection
Terminal
Track 1
Discretionary
Data
Discretionary part of track 1 according to
ISO/IEC 7813
ICC ans '70' or '77' '9F1F' var.
Track 2
Discretionary
Data
Discretionary part of track 2 according to
ISO/IEC 7813
ICC cn '70' or '77' '9F20' var.
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 146
Name Description Source Format Template Tag Length
Track 2
Equivalent Data
Contains the data elements of track 2
according to ISO/IEC 7813, excluding start
sentinel, end sentinel, and Longitudinal
Redundancy Check (LRC), as follows:
ICC b '70' or '77' '57' var. up
to 19
Primary Account Number n, var. up
to 19
Field Separator (Hex 'D') b
Expiration Date (YYMM) n 4
Service Code n 3
Discretionary Data (defined by individual
payment systems)
n, var.
Pad with one Hex 'F' if needed to ensure
whole bytes
b
Transaction
Amount
Clearing amount of the transaction, including
tips and other adjustments
Terminal n 12 6
Transaction
Certificate Data
Object List
(TDOL)
List of data objects (tag and length) to be used
by the terminal in generating the TC Hash
Value
ICC b '70' or '77' '97' var. up
to 252
Transaction
Certificate (TC)
Hash Value
Result of a hash function specified in Book 2,
Annex B3.1
Terminal b '98' 20
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 147
Name Description Source Format Template Tag Length
Transaction
Currency Code
Indicates the currency code of the transaction
according to ISO 4217
Terminal n 3 '5F2A' 2
Transaction
Currency
Exponent
Indicates the implied position of the decimal
point from the right of the transaction amount
represented according to ISO 4217
Terminal n 1 '5F36' 1
Transaction Date Local date that the transaction was authorised Terminal n 6
YYMMDD
'9A' 3
Transaction
Personal
Identification
Number (PIN)
Data
Data entered by the cardholder for the purpose
of the PIN verification
Terminal b '99' var.
Transaction
Reference
Currency Code
Code defining the common currency used by
the terminal in case the Transaction Currency
Code is different from the Application
Currency Code
Terminal n 3 '9F3C' 2
Transaction
Reference
Currency
Conversion
Factor used in the conversion from the
Transaction Currency Code to the Transaction
Reference Currency Code
Terminal n 8 4
Transaction
Reference
Currency
Exponent
Indicates the implied position of the decimal
point from the right of the transaction amount,
with the Transaction Reference Currency Code
represented according to ISO 4217
Terminal n 1 '9F3D' 1
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 148
Name Description Source Format Template Tag Length
Transaction
Sequence
Counter
Counter maintained by the terminal that is
incremented by one for each transaction
Terminal n 4-8 '9F41' 2-4
Transaction
Status
Information
Indicates the functions performed in a
transaction
Terminal b '9B' 2
Transaction
Time
Local time that the transaction was authorised Terminal n 6
HHMMSS
'9F21' 3
Transaction
Type
Indicates the type of financial transaction,
represented by the first two digits of the
ISO 8583:1987 Processing Code. The actual
values to be used for the Transaction Type
data element are defined by the relevant
payment system
Terminal n 2 '9C' 1
Unpredictable
Number
Value to provide variability and uniqueness to
the generation of a cryptogram
Terminal b '9F37' 4
Upper
Consecutive
Offline Limit
Issuer-specified preference for the maximum
number of consecutive offline transactions for
this ICC application allowed in a terminal
without online capability
ICC b '70' or '77' '9F23' 1
Table 33: Data Elements Dictionary, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A1 Data Elements by Name
November 2011 Page 149
When the length defined for the data object is greater than the length of the actual data, the following rules apply:
A data element in format n is right justified and padded with leading hexadecimal zeroes.
A data element in format cn is left justified and padded with trailing hexadecimal 'F's.
A data element in format a, an, or ans is left justified and padded with trailing hexadecimal zeroes.
When data is moved from one entity to another (for example, card to terminal), it shall always be passed in order from high
order to low order, regardless of how it is internally stored. The same rule applies when concatenating data.
Note: Data that can occur in template '70' or '77' can never occur in both.
Annex A Data Elements Dictionary EMV 4.3 Book 3
A2 Data Elements by Tag Appli cation Specification
Page 150 November 2011
A2 Data Elements by Tag
Name Template Tag
Issuer Identification Number (IIN) 'BF0C' or '73' '42'
Application Dedicated File (ADF) Name '61' '4F'
Application Label '61' or 'A5' '50'
Track 2 Equivalent Data '70' or '77' '57'
Application Primary Account Number (PAN) '70' or '77' '5A'
Cardholder Name '70' or '77' '5F20'
Application Expiration Date '70' or '77' '5F24'
Application Effective Date '70' or '77' '5F25'
Issuer Country Code '70' or '77' '5F28'
Transaction Currency Code '5F2A'
Language Preference 'A5' '5F2D'
Service Code '70' or '77' '5F30'
Application Primary Account Number (PAN)
Sequence Number
'70' or '77' '5F34'
Transaction Currency Exponent '5F36'
Issuer URL 'BF0C' or '73' '5F50'
International Bank Account Number (IBAN) 'BF0C' or '73' '5F53'
Bank Identifier Code (BIC) 'BF0C' or '73' '5F54'
Issuer Country Code (alpha2 format) 'BF0C' or '73' '5F55'
Issuer Country Code (alpha3 format) 'BF0C' or '73' '5F56'
Account Type '5F57'
Application Template '70' or '77' '61'
File Control Information (FCI) Template '6F'
Table 34: Data Elements Tags
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A2 Data Elements by Tag
November 2011 Page 151
Name Template Tag
READ RECORD Response Message Template '70'
Issuer Script Template 1 '71'
Issuer Script Template 2 '72'
Directory Discretionary Template '61' '73'
Response Message Template Format 2 '77'
Response Message Template Format 1 '80'
Amount, Authorised (Binary) '81'
Application Interchange Profile '77' or '80' '82'
Command Template '83'
Dedicated File (DF) Name '6F' '84'
Issuer Script Command '71' or '72' '86'
Application Priority Indicator '61' or 'A5' '87'
Short File Identifier (SFI) 'A5' '88'
Authorisation Code '89'
Authorisation Response Code '8A'
Card Risk Management Data Object List 1 (CDOL1) '70' or '77' '8C'
Card Risk Management Data Object List 2 (CDOL2) '70' or '77' '8D'
Cardholder Verification Method (CVM) List '70' or '77' '8E'
Certification Authority Public Key Index '70' or '77' '8F'
Issuer Public Key Certificate '70' or '77' '90'
Issuer Authentication Data '91'
Issuer Public Key Remainder '70' or '77' '92'
Signed Static Application Data '70' or '77' '93'
Application File Locator (AFL) '77' or '80' '94'
Terminal Verification Results '95'
Transaction Certificate Data Object List (TDOL) '70' or '77' '97'
Transaction Certificate (TC) Hash Value '98'
Transaction Personal Identification Number (PIN)
Data
'99'
Table 34: Data Elements Tags, continued
Annex A Data Elements Dictionary EMV 4.3 Book 3
A2 Data Elements by Tag Appli cation Specification
Page 152 November 2011
Name Template Tag
Transaction Date '9A'
Transaction Status Information '9B'
Transaction Type '9C'
Directory Definition File (DDF) Name '61' '9D'
Acquirer Identifier '9F01'
Amount, Authorised (Numeric) '9F02'
Amount, Other (Numeric) '9F03'
Amount, Other (Binary) '9F04'
Application Discretionary Data '70' or '77' '9F05'
Application Identifier (AID) - terminal '9F06'
Application Usage Control '70' or '77' '9F07'
Application Version Number '70' or '77' '9F08'
Application Version Number '9F09'
Cardholder Name Extended '70' or '77' '9F0B'
Issuer Action Code - Default '70' or '77' '9F0D'
Issuer Action Code - Denial '70' or '77' '9F0E'
Issuer Action Code - Online '70' or '77' '9F0F'
Issuer Application Data '77' or '80' '9F10'
Issuer Code Table Index 'A5' '9F11'
Application Preferred Name '61' or 'A5' '9F12'
Last Online Application Transaction Counter (ATC)
Register
'9F13'
Lower Consecutive Offline Limit '70' or '77' '9F14'
Merchant Category Code '9F15'
Merchant Identifier '9F16'
Personal Identification Number (PIN) Try Counter '9F17'
Issuer Script Identifier '71' or '72' '9F18'
Table 34: Data Elements Tags, continued
EMV 4.3 Book 3 Annex A Data Elements Dictionary
Appli cation Specification A2 Data Elements by Tag
November 2011 Page 153
Name Template Tag
Terminal Country Code '9F1A'
Terminal Floor Limit '9F1B'
Terminal Identification '9F1C'
Terminal Risk Management Data '9F1D'
Interface Device (IFD) Serial Number '9F1E'
Track 1 Discretionary Data '70' or '77' '9F1F'
Track 2 Discretionary Data '70' or '77' '9F20'
Transaction Time '9F21'
Certification Authority Public Key Index '9F22'
Upper Consecutive Offline Limit '70' or '77' '9F23'
Application Cryptogram '77' or '80' '9F26'
Cryptogram Information Data '77' or '80' '9F27'
ICC PIN Encipherment Public Key Certificate '70' or '77' '9F2D'
ICC PIN Encipherment Public Key Exponent '70' or '77' '9F2E'
ICC PIN Encipherment Public Key Remainder '70' or '77' '9F2F'
Issuer Public Key Exponent '70' or '77' '9F32'
Terminal Capabilities '9F33'
Cardholder Verification Method (CVM) Results '9F34'
Terminal Type '9F35'
Application Transaction Counter (ATC) '77' or '80' '9F36'
Unpredictable Number '9F37'
Processing Options Data Object List (PDOL) 'A5' '9F38'
Point-of-Service (POS) Entry Mode '9F39'
Amount, Reference Currency '9F3A'
Application Reference Currency '70' or '77' '9F3B'
Transaction Reference Currency Code '9F3C'
Transaction Reference Currency Exponent '9F3D'
Additional Terminal Capabilities '9F40'
Transaction Sequence Counter '9F41'
Table 34: Data Elements Tags, continued
Annex A Data Elements Dictionary EMV 4.3 Book 3
A2 Data Elements by Tag Appli cation Specification
Page 154 November 2011
Name Template Tag
Application Currency Code '70' or '77' '9F42'
Application Reference Currency Exponent '70' or '77' '9F43'
Application Currency Exponent '70' or '77' '9F44'
Data Authentication Code '9F45'
ICC Public Key Certificate '70' or '77' '9F46'
ICC Public Key Exponent '70' or '77' '9F47'
ICC Public Key Remainder '70' or '77' '9F48'
Dynamic Data Authentication Data Object List
(DDOL)
'70' or '77' '9F49'
Static Data Authentication Tag List '70' or '77' '9F4A'
Signed Dynamic Application Data '77' or '80' '9F4B'
ICC Dynamic Number '9F4C'
Log Entry 'BF0C' or '73' '9F4D'
Merchant Name and Location '9F4E'
Log Format '9F4F'
File Control Information (FCI) Proprietary Template '6F' 'A5'
File Control Information (FCI) Issuer Discretionary
Data
'A5' 'BF0C'
Table 34: Data Elements Tags, continued
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 155
Annex B Rules for BER-TLV Data Objects
As defined in ISO/IEC 8825, a BER-TLV data object consists of 2-3 consecutive
fields:
The tag field (T) consists of one or more consecutive bytes. It indicates a class,
a type, and a number (see Table 35). The tag field of the data objects
described in this specification is coded on one or two bytes.
The length field (L) consists of one or more consecutive bytes. It indicates the
length of the following field. The length field of the data objects described in
this specification which are transmitted over the card-terminal interface is
coded on one or two bytes.
Note: Three length bytes may be used if needed for templates '71' and '72' and tag
'86' (to express length greater than 255 bytes), as they are not transmitted over the
card-terminal interface.
The value field (V) indicates the value of the data object. If L = '00', the value
field is not present.
A BER-TLV data object belongs to one of the following two categories:
A primitive data object where the value field contains a data element for
financial transaction interchange.
A constructed data object where the value field contains one or more primitive
or constructed data objects. The value field of a constructed data object is
called a template.
The coding of BER-TLV data objects is defined as follows.
Annex B Rules for BER-TLV Data Objects EMV 4.3 Book 3
B1 Coding of the Tag Field of BER-TLV Data Objects Appli cation Specification
Page 156 November 2011
B1 Coding of the Tag Field of BER-TLV Data
Objects
Table 35 describes the first byte of the tag field of a BER-TLV data object:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 Universal class
0 1 Application class
1 0 Context-specific class
1 1 Private class
0 Primitive data object
1 Constructed data object
1 1 1 1 1 See subsequent bytes
Any other value <31 Tag number
Table 35: Tag Field Structure (First Byte) BER-TLV
According to ISO/IEC 8825, Table 36 defines the coding rules of the subsequent
bytes of a BER-TLV tag when tag numbers 31 are used (that is, bits b5 - b1 of
the first byte equal '11111').
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 Another byte follows
0 Last tag byte
Any value > 0 (Part of) tag number
Table 36: Tag Field Structure (Subsequent Bytes) BER-TLV
Before, between, or after TLV-coded data objects, '00' bytes without any meaning
may occur (for example, due to erased or modified TLV-coded data objects).
Note: It is strongly recommended that issuers do not use tags beginning with FF for
proprietary purposes, as existing terminals may not recognise FF as the beginning of a
constructed private class tag.
EMV 4.3 Book 3 Annex B Rules for BER-TLV Data Objects
Appli cation Specification B2 Coding of the Length Field of BER-TLV Data Objects
November 2011 Page 157
The tag field of a BER-TLV data object is coded according to the following rules:
The following application class templates defined in ISO/IEC 7816 apply:
'61' and '6F'.
The following range of application class templates is defined in Part II: '70' to
'7F'. The meaning is then specific to the context of an application according to
this specification. Tags '78', '79', '7D', and '7E' are defined in ISO/IEC 7816-6
and are not used in this specification.
The application class data objects defined in ISO/IEC 7816 and described in
Part II are used according to the ISO/IEC 7816 definition.
Context-specific class data objects are defined in the context of this
specification or in the context of the template in which they appear.
The coding of primitive context-specific class data objects in the ranges '80' to
'9E' and '9F00' to '9F4F' is reserved for this specification.
The coding of primitive context-specific class data objects in the range '9F50'
to '9F7F' is reserved for the payment systems.
The coding of tag 'BF0C' and constructed context-specific class data objects in
the range 'BF20' to 'BF4F' is reserved for this specification.
The coding of constructed context-specific class data objects in the ranges
'BF10' to 'BF1F' and 'BF50' to 'BF6F' is reserved for the payment systems.
The coding of constructed context-specific class data objects in the ranges
'BF01' to 'BF0B', 'BF0D' to 'BF0F', and 'BF70' to 'BF7F' is left to the
discretion of the issuer.
The coding of primitive and constructed private class data objects is left to the
discretion of the issuer.
B2 Coding of the Length Field of BER-TLV Data
Objects
When bit b8 of the most significant byte of the length field is set to 0, the length
field consists of only one byte. Bits b7 to b1 code the number of bytes of the value
field. The length field is within the range 1 to 127.
When bit b8 of the most significant byte of the length field is set to 1, the
subsequent bits b7 to b1 of the most significant byte code the number of
subsequent bytes in the length field. The subsequent bytes code an integer
representing the number of bytes in the value field. Two bytes are necessary to
express up to 255 bytes in the value field.
Annex B Rules for BER-TLV Data Objects EMV 4.3 Book 3
B3 Coding of the Value Field of Data Objects Appli cation Specification
Page 158 November 2011
B3 Coding of the Value Field of Data Objects
A data element is the value field (V) of a primitive BER-TLV data object. A data
element is the smallest data field that receives an identifier (a tag).
A primitive data object is structured as illustrated in Figure 16:
Tag (T) Length (L) Value (V)
Figure 16: Primitive BER-TLV Data Object (Data Element)
A constructed BER-TLV data object consists of a tag, a length, and a value field
composed of one or more BER-TLV data objects. A record in an AEF governed by
this specification is a constructed BER-TLV data object. A constructed data object
is structured as illustrated in Figure 17:
Tag
(T)
Length
(L)
Primitive or constructed
BER-TLV data object
number 1
... Primitive or constructed
BER-TLV data object
number n
Figure 17: Constructed BER-TLV Data Object
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 159
Annex C Coding of Data Elements Used in
Transaction Processing
This annex provides the coding for dynamic card data elements and specific data
elements used to control the transaction flow in the terminal or to record the
status of processing for the transaction. In the tables:
A 1 means that if that bit has the value 1, the corresponding Meaning
applies.
An x means that the bit does not apply.
Data (bytes or bits) indicated as RFU shall be set to 0.
Annex C Coding Data El ements Used in Trans Processing EMV 4.3 Book 3
C1 Application Interchange Profile Appli cation Specification
Page 160 November 2011
C1 Application Interchange Profile
AIP Byte 1 (Leftmost)
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 x x x x x x x RFU
x 1 x x x x x x SDA supported
x x 1 x x x x x DDA supported
x x x 1 x x x x Cardholder verification is
supported
x x x x 1 x x x Terminal risk management is to
be performed
x x x x x 1 x x Issuer authentication is
supported
19
x x x x x x 0 x RFU
x x x x x x x 1 CDA supported
AIP Byte 2 (Rightmost)
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 x x x x x x x Reserved for use by the EMV
Contactless Specifications
x 0 x x x x x x RFU
x x 0 x x x x x RFU
x x x 0 x x x x RFU
x x x x 0 x x x RFU
x x x x x 0 x x RFU
x x x x x x 0 x RFU
x x x x x x x 0 RFU
Table 37: Application Interchange Profile
19
When this bit is set to 1, Issuer Authentication using the EXTERNAL
AUTHENTICATE command is supported
EMV 4.3 Book 3 Annex C Coding Data El ements Used in Trans Processing
Appli cation Specification C2 Application Usage Control
November 2011 Page 161
C2 Application Usage Control
Application Usage Control Byte 1 (Leftmost)
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Valid for domestic cash
transactions
x 1 x x x x x x Valid for international cash
transactions
x x 1 x x x x x Valid for domestic goods
x x x 1 x x x x Valid for international goods
x x x x 1 x x x Valid for domestic services
x x x x x 1 x x Valid for international services
x x x x x x 1 x Valid at ATMs
x x x x x x x 1 Valid at terminals other than
ATMs
Application Usage Control Byte 2 (Rightmost)
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Domestic cashback allowed
x 1 x x x x x x International cashback allowed
x x 0 x x x x x RFU
x x x 0 x x x x RFU
x x x x 0 x x x RFU
x x x x x 0 x x RFU
x x x x x x 0 x RFU
x x x x x x x 0 RFU
Table 38: Application Usage Control
Annex C Coding Data El ements Used in Trans Processing EMV 4.3 Book 3
C3 Cardholder Verification Rule Format Appli cation Specification
Page 162 November 2011
C3 Cardholder Verification Rule Format
CV Rule Byte 1 (Leftmost): Cardholder Verification Method (CVM) Codes
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 RFU
0 Fail cardholder verification if this
CVM is unsuccessful
1 Apply succeeding CV Rule if this
CVM is unsuccessful
0 0 0 0 0 0 Fail CVM processing
0 0 0 0 0 1 Plaintext PIN verification
performed by ICC
0 0 0 0 1 0 Enciphered PIN verified online
0 0 0 0 1 1 Plaintext PIN verification
performed by ICC and signature
(paper)
0 0 0 1 0 0 Enciphered PIN verification
performed by ICC
0 0 0 1 0 1 Enciphered PIN verification
performed by ICC and signature
(paper)
0 x x x x x Values in the range 000110-011101
reserved for future use by this
specification
0 1 1 1 1 0 Signature (paper)
0 1 1 1 1 1 No CVM required
1 0 x x x x Values in the range 100000-101111
reserved for use by the individual
payment systems
1 1 x x x x Values in the range 110000-111110
reserved for use by the issuer
1 1 1 1 1 1 This value is not available for use
Table 39: CVM Codes
EMV 4.3 Book 3 Annex C Coding Data El ements Used in Trans Processing
Appli cation Specification C3 Cardholder Verification Rule Format
November 2011 Page 163
CV Rule Byte 2 (Rightmost): Cardholder Verification Method (CVM) Condition
Codes
Value Meaning
'00' Always
'01' If unattended cash
'02' If not unattended cash and not manual cash and not purchase
with cashback
'03' If terminal supports the CVM
20
'04' If manual cash
'05' If purchase with cashback
'06' If transaction is in the application currency
21
and is under X
value (see section 10.5 for a discussion of X)
'07' If transaction is in the application currency and is over X value
'08' If transaction is in the application currency and is under Y value
(see section 10.5 for a discussion of Y)
'09' If transaction is in the application currency and is over Y value
'0A' - '7F' RFU
'80' - 'FF' Reserved for use by individual payment systems
Table 40: CVM Condition Codes
Note: For Condition Codes '01', '04', and '05', please refer to EMVCo General Bulletin
No. 14 - Migration Schedule for New CVM Condition Codes.
20
Support for a CVM is described in EMV Book 4, Section 6.3.4 first paragraph..
21
That is, Transaction Currency Code = Application Currency Code.
Annex C Coding Data El ements Used in Trans Processing EMV 4.3 Book 3
C4 Issuer Code Table Index Appli cation Specification
Page 164 November 2011
C4 Issuer Code Table Index
Value Refers to
'01' Part 1 of ISO/IEC 8859
'02' Part 2 of ISO/IEC 8859
'03' Part 3 of ISO/IEC 8859
'04' Part 4 of ISO/IEC 8859
'05' Part 5 of ISO/IEC 8859
'06' Part 6 of ISO/IEC 8859
'07' Part 7 of ISO/IEC 8859
'08' Part 8 of ISO/IEC 8859
'09' Part 9 of ISO/IEC 8859
'10' Part 10 of ISO/IEC 8859
Table 41: Issuer Code Table Index
EMV 4.3 Book 3 Annex C Coding Data El ements Used in Trans Processing
Appli cation Specification C5 Terminal Verification Results
November 2011 Page 165
C5 Terminal Verification Results
TVR Byte 1: (Leftmost)
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Offline data authentication was not
performed
x 1 x x x x x x SDA failed
x x 1 x x x x x ICC data missing
x x x 1 x x x x Card appears on terminal exception
file
22
x x x x 1 x x x DDA failed
x x x x x 1 x x CDA failed
x x x x x x 0 x RFU
x x x x x x x 0 RFU
TVR Byte 2:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x ICC and terminal have different
application versions
x 1 x x x x x x Expired application
x x 1 x x x x x Application not yet effective
x x x 1 x x x x Requested service not allowed for
card product
x x x x 1 x x x New card
x x x x x 0 x x RFU
x x x x x x 0 x RFU
x x x x x x x 0 RFU
Table 42: Terminal Verification Results
22
There is no requirement in this specification for an exception file, but it is recognised
that some terminals may have this capability.
Annex C Coding Data El ements Used in Trans Processing EMV 4.3 Book 3
C5 Terminal Verification Results Appli cation Specification
Page 166 November 2011
TVR Byte 3:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Cardholder verification was not
successful
x 1 x x x x x x Unrecognised CVM
x x 1 x x x x x PIN Try Limit exceeded
x x x 1 x x x x PIN entry required and PIN pad
not present or not working
x x x x 1 x x x PIN entry required, PIN pad
present, but PIN was not entered
x x x x x 1 x x Online PIN entered
x x x x x x 0 x RFU
x x x x x x x 0 RFU
TVR Byte 4:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Transaction exceeds floor limit
x 1 x x x x x x Lower consecutive offline limit
exceeded
x x 1 x x x x x Upper consecutive offline limit
exceeded
x x x 1 x x x x Transaction selected randomly for
online processing
x x x x 1 x x x Merchant forced transaction online
x x x x x 0 x x RFU
x x x x x x 0 x RFU
x x x x x x x 0 RFU
Table 42: Terminal Verification Results, continued
EMV 4.3 Book 3 Annex C Coding Data El ements Used in Trans Processing
Appli cation Specification C5 Terminal Verification Results
November 2011 Page 167
TVR Byte 5 (Rightmost):
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Default TDOL used
x 1 x x x x x x Issuer authentication failed
x x 1 x x x x x Script processing failed before final
GENERATE AC
x x x 1 x x x x Script processing failed after final
GENERATE AC
x x x x 0 x x x RFU
x x x x x 0 x x RFU
x x x x x x 0 x RFU
x x x x x x x 0 RFU
Table 42: Terminal Verification Results, continued
Annex C Coding Data El ements Used in Trans Processing EMV 4.3 Book 3
C6 Transaction Status Information Appli cation Specification
Page 168 November 2011
C6 Transaction Status Information
TSI Byte 1 (Leftmost):
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 x x x x x x x Offline data authentication was
performed
x 1 x x x x x x Cardholder verification was
performed
x x 1 x x x x x Card risk management was
performed
x x x 1 x x x x Issuer authentication was
performed
x x x x 1 x x x Terminal risk management was
performed
x x x x x 1 x x Script processing was performed
x x x x x x 0 x RFU
x x x x x x x 0 RFU
TSI Byte 2 (Rightmost):
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 x x x x x x x RFU
x 0 x x x x x x RFU
x x 0 x x x x x RFU
x x x 0 x x x x RFU
x x x x 0 x x x RFU
x x x x x 0 x x RFU
x x x x x x 0 x RFU
x x x x x x x 0 RFU
Table 43: Transaction Status Information
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 169
Annex D Transaction Log Information
D1 Purpose
Provide support for accessing a transaction log file by special devices.
D2 Conditions of Execution
This optional function is intended to be executed by special devices.
D3 Sequence of Execution
This function may be executed after Application Selection.
Annex D Transaction Log Information EMV 4.3 Book 3
D4 Description Appli cation Specification
Page 170 November 2011
D4 Description
To get the Transaction Log information, the two following data elements are
used: Log Entry and Log Format.
Table 44 describes the format of the Log Entry data element (tag '9F4D'):
Byte Format Length Value
1 b 1 SFI containing the cyclic transaction log file
2 b 1 Maximum number of records in the transaction log
file
Table 44: Log Entry
Devices that read the transaction log use the Log Entry data element to
determine the location (SFI) and the maximum number of transaction log
records.
The SFI shall be in the range 11 to 30.
The Transaction Log records shall be accessible using the READ RECORD
command as specified in section 6.5.11. The file is a cyclic file as defined in
ISO/IEC 7816-4. Record #1 is the most recent transaction. Record #2 is the next
prior transaction, etc.
The Transaction Log records shall not be designated in the Application File
Locator. Each record is a concatenation of the values identified in the Log Format
data element. The records in the file shall not contain the Application
Elementary File (AEF) Data Template (tag '70').
The Log Format and the Transaction Log records shall remain accessible when
the application is blocked.
To read the transaction log information, the special device uses the following
steps:
Perform Application Selection and retrieve the Log Entry data element
located in the FCI Issuer Discretionary Data. If the Log Entry data element is
not present, the application does not support the Transaction Log function.
Issue a GET DATA command to retrieve the Log Format data element.
Issue READ RECORD commands to read the Transaction Log records.
EMV 4.3 Book 3 Annex D Transaction Log Information
Appli cation Specification D5 Example
November 2011 Page 171
D5 Example
Note that the following data elements are shown for example purposes only.
A Log Entry data element equal to '0F14' indicates that the transaction log file is
located in SFI 15 ('0F') and contains a maximum of 20 records ('14').
A Log Format data element equal to '9A039F21035F2A029F02069F4E149F3602'
indicates that the transaction log records have the following content:
Data Content Tag Length
Transaction Date '9A' 3
Transaction Time '9F21' 3
Transaction Currency Code '5F2A' 2
Amount, Authorised '9F02' 6
Merchant Name and Location '9F4E' 20
Application Transaction Counter '9F36' 2
Table 45: Example of Log Format
In Table 45, lengths and tags are shown for clarity. They do not appear in the log
record which is the concatenation of values (no TLV coding).
Data elements listed in the Log Format may come from the terminal and the
card. Terminal data elements such as Merchant Name and Location might have
been passed to the card in the PDOL or CDOL data.
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 173
Annex E TVR and TSI Bit Settings Following
Script Processing
Four possible scenarios can occur when processing a script. These scenarios are
described below, together with the expected results in terms of the setting of the
appropriate TVR bits, the TSI bit, and the Issuer Script Results.
In the following descriptions:
TVR bits refers to TVR byte 5 bit 6 and bit 5 (depending on whether it is a
tag '71' and/or tag '72' script) as defined in Table 42.
TSI bit refers to TSI byte 1 bit 3 as defined in Table 43.
The Issuer Script Results are defined in Book 4, Annex A5.
E1 Scenarios
Scenario 1
A script is received, it parses correctly, the commands are sent to the card, and
the card returns '9000', '62xx', or '63xx' to all commands received.
In this scenario the terminal:
shall set the TSI bit
shall not set the TVR bits
shall set the first byte of the Issuer Script Results to '2x', Script processing
successful.
Annex E TVR and TSI Bi t Settings Following Script Processing EMV 4.3 Book 3
E1 Scenarios Appli cation Specification
Page 174 November 2011
Scenario 2
A script is received, it parses correctly, the commands are sent to the card, but
the card does not return '9000', '62xx', or '63xx' to one of the commands received.
In this scenario the terminal:
shall set the TSI bit
shall set the appropriate TVR bit(s)
shall set the first byte of the Issuer Script Results to '1x', Script processing
failed
shall send no further commands from that script to the card, even if they
exist.
Scenario 3
A script is received, it does not parse correctly, and so no commands are sent to
the card.
In this scenario the terminal:
shall set the TSI bit
shall set the appropriate TVR bit(s)
shall set the first byte of the Issuer Script Results to '00', Script not
performed.
Scenario 4
No script is received. In this scenario the terminal shall set neither the TSI bit
nor the TVR bit(s).
In this event there will be no Issuer Script Results.
EMV 4.3 Book 3 Annex E TVR and TSI Bi t Settings Following Script Processing
Appli cation Specification E2 Additional Information
November 2011 Page 175
E2 Additional Information
It is possible, but not recommended, that commands may be sent to the card on
the fly as a script is parsed. In this event:
If a parsing error occurs before any commands are sent to the card, the
terminal shall set the first byte of the Issuer Script Results to '00' and shall
set the appropriate TVR bits and the TSI bit.
If a parsing error occurs after any command has been sent to the card, the
terminal shall set the first byte of the Issuer Script Results to '1x', and shall
set the appropriate TVR bits and the TSI bit.
If more than one script is received, the terminal:
shall set the TSI bit
shall set the TVR bit(s) (as described in Scenarios 2 and 3) if any error occurs
shall set the Issuer Script Results as described in Scenarios 1 through 3 for
each script on a script-by-script basis
shall process all Issuer scripts
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 177
Annex F Status Words Returned in
EXTERNAL AUTHENTICATE
The terminal shall issue an EXTERNAL AUTHENTICATE command to the card
only if the card indicates in byte 1 bit 3 of the AIP that it supports issuer
authentication using the EXTERNAL AUTHENTICATE command.
The terminal shall issue only one EXTERNAL AUTHENTICATE command to
the card during a transaction. As stated in section 10.9, there is a complementary
card requirement to this which states that the card shall return status '6985',
Command Not Supported, to the second and any subsequent EXTERNAL
AUTHENTICATE commands received during the transaction.
Table 46 explains various status values the terminal may receive in response to
the (first) EXTERNAL AUTHENTICATE command issued to the card, and the
action the terminal shall take as a result.
Status Explanation Terminal Action
'9000' Issuer authentication
was successful.
The terminal shall continue with
the transaction.
'6300' or any
other status
except '6985'
and '9000'
Issuer authentication
failed.
The terminal shall set the Issuer
authentication failed bit in the
TVR to 1, and continue with the
transaction.
'6985' Issuer authentication
failed and the card is in
an error state (it has
indicated in the AIP that
it supports EXTERNAL
AUTHENTICATE, but in
the status returned that
it does not).
This condition should never occur;
in the event that it does, the
behaviour of the terminal is
indeterminate and it shall either
terminate the transaction OR set
the Issuer authentication failed
bit in the TVR to 1, and continue
with the transaction.
Table 46: Terminal Action after (First) EXTERNAL AUTHENTICATE Response
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 179
Annex G Account Type
Value Account Type
00 Default - unspecified
10 Savings
20 Cheque/debit
30 Credit
All other
values RFU
Table 47: Account Type
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 181
Part V
Common Core
Definitions
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 182
Introduction
This Part describes an optional extension to this Book, to be used when
implementing the Common Core Definitions (CCD).
These Common Core Definitions specify a minimum common set of card
application implementation options, card application behaviours, and data
element definitions sufficient to accomplish an EMV transaction. Terminals
certified to be compliant with the existing EMV Specifications will, without
change, accept cards implemented according to the Common Core Definitions,
since the Common Core Definitions are supported within the existing EMV
requirements.
To be compliant with the Common Core Definitions, an implementation shall
implement all the additional requirements in the Common Core Definitions Parts
of all affected Books.
Changed and Added Sections
Each section heading below refers to the section in this Book to which the
additional requirements apply, or introduces new sections where required. The
text defines requirements for a common core implementation, in addition to the
requirements already specified in the referenced section of EMV.
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 183
Part II - Data Elements and Commands
6 Commands for Financial Transaction
6.2 Response APDU Format
For the following commands used during transaction processing, the body of the
response APDU is a constructed data object with tag equal to '77' of which the
value field may contain one or more BER-TLV coded data objects.
GENERATE AC
GET PROCESSING OPTIONS
INTERNAL AUTHENTICATE
Tag Value
'77' Response Message Template Format 2
Table CCD 1: Body of Response APDU Structure
6.5 Commands
6.5.4 EXTERNAL AUTHENTICATE Command-Response APDUs
6.5.4.1 Definition and Scope
The CCD-compliant application shall support issuer authentication using the
second GENERATE AC command. The CCD-compliant application shall indicate
that the EXTERNAL AUTHENTICATE command is not supported in EMV
applications by setting bit 3 in byte 1 of the AIP to 0.
6.5.5 GENERATE APPLICATION CRYPTOGRAM Command-Response
APDUs
6.5.5.1 Definition and Scope
The CCD-compliant application shall support issuer authentication using the
second GENERATE AC command.
6.5.5.3 Data Field Sent in the Command Message
CDOL2 shall include tag '8A' (Authorisation Response Code) and tag '91' (Issuer
Authentication Data).
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 184 November 2011
6.5.5.4 Data Field Returned in the Response Message
The response message shall be a BER-TLV coded constructed data object
introduced by tag '77' and contains only the data shown in Table CCD 2.
Tag Value
'9F27' Cryptogram Information Data
'9F36' Application Transaction Counter
'9F26' Application Cryptogram
'9F10' Issuer Application Data
Table CCD 2: Format 2 GENERATE AC Response Message Data Field
The required data elements for the response returned in an envelope as specified
for the CDA feature (described in section 6.6 of Book 2) are shown in Book 2
Table CCD 1 and Table CCD 2.
The Cryptogram Information Data returned in the GENERATE AC response
message is coded according to Table CCD 3:
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 AAC
0 1 TC
1 0 ARQC
1 1 RFU
0 0 Payment System-specific cryptogram
0 No advice required
0 0 0 No information given
Table CCD 3: Coding of Cryptogram Information Data
6.5.8 GET PROCESSING OPTIONS Command-Response APDUs
6.5.8.2 Command Message
The CCD-compliant application shall not preclude support for PDOL.
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 185
6.5.8.4 Data Field Returned in the Response Message
The response message shall be a BER-TLV coded constructed data object
introduced by tag '77' and contains only the data shown in Table CCD 4.
Tag Value
'82' Application Interchange Profile
'94' Application File Locator
Table CCD 4: Format 2 GET PROCESSING OPTIONS Response Message Data
Field
6.5.9 INTERNAL AUTHENTICATE Command-Response APDUs
6.5.9.4 Data Field Returned in the Response Message
The response message shall be a BER-TLV coded constructed data object
introduced by tag '77' and contains only the data shown in Table CCD 5.
Tag Value
'9F4B' Signed Dynamic Application Data
Table CCD 5: Format 2 Internal Authenticate Response Message Data Field
6.5.12.2 Command Message
To allow an issuer to use offline plaintext PIN verification as a possible CVM, a
CCD-compliant card shall support the VERIFY command with parameter
P2 = 80 as defined in Book 3, Table 23.
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 186 November 2011
Part III - Debit and Credit Application
Specification
7 Files for Financial Transaction Interchange
7.3 Data Retrievable by GET DATA Command
The ICC shall support the GET DATA command for retrieval of the primitive
data object with tag '9F17' (PIN Try Counter).
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 187
9 GENERATE AC Command Coding
9.2 Command Data
9.2.2 Transaction Certificate Data
The CCD-compliant application shall not contain a TDOL. The CCD-compliant
application shall not request the terminal to generate a TC Hash Value (that is,
tag '98' shall not be included in CDOL1 or CDOL2).
The following Section 9.2.3 applies to a CCD-compliant application.
9.2.3 Common Core Definitions Card Verification Results
In response to the GENERATE AC command and as part of the Issuer
Application Data, the CCD-compliant application shall return the Card
Verification Results (CVR). The CVR includes information for the issuer
regarding the results of Card Risk Management processing and application
processing. The format of the CVR for a CCD-compliant application is specified in
CCD Annex C7.3.
9.2.3.1 Options Related to Setting/Resetting of Counters and Indicators
The issuer shall have the option of specifying whether a new card is required to
set the Go Online on Next Transaction Was Set bit.
The issuer shall have the option of specifying whether the CCD-compliant
application requires issuer authentication to be performed for the application to
approve (TC) an online transaction.
The issuer shall have the option of specifying whether the CCD-compliant
application requires issuer authentication to pass when performed for the
application to approve (TC) an online transaction.
If the CCD-compliant application does not require issuer authentication to be
performed for the application to approve (TC) an online transaction, the issuer
shall have the option of specifying whether the CCD-compliant application
requires issuer authentication to pass for resetting all the following
non-velocity-checking indicators:
Issuer Authentication Failed
Last Online Transaction Not Completed
Issuer Script Processing Failed
Go Online on Next Transaction Was Set
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 188 November 2011
If the CCD-compliant application does not require issuer authentication to pass
when performed for the application to approve (TC) an online transaction, the
issuer shall have the option of specifying whether the CCD-compliant application
requires issuer authentication to pass for resetting all the following non-velocity
checking indicators:
Last Online Transaction Not Completed
Issuer Script Processing Failed
Go Online on Next Transaction Was Set
If the CCD-compliant application does not require issuer authentication to be
performed or does not require issuer authentication to pass when performed for
the application to approve (TC) an online transaction, the issuer shall have the
option of specifying whether the CCD-compliant application requires issuer
authentication to pass for resetting the velocity-checking offline transaction
count(s) and cumulative amount(s).
The issuer shall have the option of indicating whether the application shall use
the Update Counters bits in the CSU to update the velocity-checking count(s)
and cumulative amount(s) associated with the offline transaction limits referred
to in bits b8 - b5 of byte 3 of the CVR, if the CSU Created by Proxy for the Issuer
bit in the CSU is set to 1.
If the CSU Created by Proxy for the Issuer bit is set to 1 in the CSU, and if the
issuer specifies that Update Counters shall not be used, then the issuer shall
have the option of indicating whether the application:
shall not update the offline counters
shall set the offline counters to zero
shall set the offline counters to the upper offline limits
shall add the transaction to the offline counter(s)
9.2.3.2 Setting and Resetting of Bits in the CVR
The following describes the conditions under which each bit in the CVR of a
Common Core Definitions card is set or reset.
Application Cryptogram Type Returned in Second GENERATE AC
In the first GENERATE AC response, these bits shall be set to Second
GENERATE AC Not Requested.
In the second GENERATE AC response, these bits shall be set to the value of bits
b8 b7 of the Cryptogram Information Data returned in the response to the
second GENERATE AC command of the current transaction (AAC or TC).
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 189
Application Cryptogram Type Returned in First GENERATE AC
In both the first and second GENERATE AC response, these bits shall be set to
the value of bits b8 b7 of the Cryptogram Information Data returned in the
response to the first GENERATE AC command of the current transaction (AAC,
TC, or ARQC).
CDA Performed
In the first GENERATE AC response, this bit shall be set if and only if Signed
Dynamic Data is returned in the response to the first GENERATE AC command
of the current transaction.
In the second GENERATE AC response, this bit shall be set if and only if Signed
Dynamic Data is returned in the response to the first or second GENERATE AC
command (or both) of the current transaction.
Offline DDA Performed
In both the first and second GENERATE AC response, this bit shall be set if and
only if Signed Dynamic Application Data is returned in the response to the
INTERNAL AUTHENTICATE command of the current transaction.
Issuer Authentication Not Performed
In the second GENERATE AC response, this bit shall be set if and only if the
CCD-compliant application did not receive Issuer Authentication Data. This may
be the case either if the transaction was unable to go online or if the issuer did
not provide Issuer Authentication Data in the response message.
In the first GENERATE AC response, this bit shall be set to the value it had in
the most recent second GENERATE AC response sent by the CCD-compliant
application.
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 190 November 2011
Issuer Authentication Failed
This bit shall be set in the GENERATE AC response if and only if issuer
authentication was performed and failed. In the first GENERATE AC response,
it indicates issuer authentication failed in a previous online transaction. In the
second GENERATE AC response, it indicates either that issuer authentication
failed in the current transaction, or that issuer authentication failed in a
previous transaction and the bit was not reset.
Once set, this bit shall remain set until either:
issuer authentication is successful,
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was not performed,
the CCD-compliant application does not require issuer authentication to
be performed for the application to approve (TC) an online transaction,
and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
Low Order Nibble of PIN Try Counter
In both the first and second GENERATE AC response, these bits shall be set to
the value of the low-order nibble (bits b4-b1) of the PIN Try Counter.
Offline PIN Verification Performed
In both the first and second GENERATE AC response, this bit shall be set if and
only if Offline PIN Verification has been performed (successfully or
unsuccessfully) on the current transaction.
Offline PIN Verification Performed and PIN Not Successfully Verified
In both the first and second GENERATE AC response, this bit shall be set if and
only if Offline PIN Verification has been performed on the current transaction
and the PIN was not successfully verified during processing of the current
transaction.
PIN Try Limit Exceeded
In both the first and second GENERATE AC response, this bit shall be set if and
only if the PIN Try Counter is zero.
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 191
Last Online Transaction Not Completed
This bit shall be set in the first GENERATE AC response if and only if in the
previous transaction, the CCD-compliant application requested to go online and
the transaction was not completed (that is, the second GENERATE AC command
was not received).
Once set, this bit shall remain set until either:
issuer authentication is successful,
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was not performed,
the CCD-compliant application does not require issuer authentication to
be performed for the application to approve (TC) an online transaction,
and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was performed and failed,
the CCD-compliant application does not require issuer authentication to
pass when performed for the application to approve (TC) an online
transaction, and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
Lower Offline Transaction Count Limit Exceeded
In both the first and second GENERATE AC response, this bit shall be set if the
CCD-compliant application has exceeded an issuer-specified lower limit for the
number of transactions approved offline. This bit may represent the condition of
multiple counters. At the least, all transactions approved offline whose amounts
were not cumulated shall be included in at least one transaction count. This bit
may also be set under additional conditions specified by the issuer.
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 192 November 2011
Upper Offline Transaction Count Limit Exceeded
In both the first and second GENERATE AC response, this bit shall be set if the
CCD-compliant application has exceeded an issuer-specified upper limit for the
number of transactions approved offline. This bit may represent the condition of
multiple counters. At the least, all transactions approved offline whose amounts
were not cumulated shall be included in at least one transaction count. This bit
may also be set under additional conditions specified by the issuer.
Lower Cumulative Offline Amount Limit Exceeded
In both the first and second GENERATE AC response, this bit shall be set if the
CCD-compliant application has exceeded an issuer-specified lower limit for
cumulative amounts approved offline. This bit may represent the condition of
multiple counters. At the least, all domestic transactions approved offline shall
be included in at least one cumulative amount. This bit may also be set under
additional conditions specified by the issuer.
Upper Cumulative Offline Amount Limit Exceeded
In both the first and second GENERATE AC response, this bit shall be set if the
CCD-compliant application has exceeded an issuer-specified upper limit for
cumulative amounts approved offline. This bit may represent the condition of
multiple counters. At the least, all domestic transactions approved offline shall
be included in at least one cumulative amount. This bit may also be set under
additional conditions specified by the issuer.
Issuer-discretionary bit 1 Issuer-discretionary bit 4:
These bits are set in the first and second GENERATE AC response at the
discretion of the issuer. The meaning of these bits is defined by the issuer and is
outside the scope of this specification.
Number of Successfully Processed Issuer Script Commands Containing
Secure Messaging
In the first and second GENERATE AC response, these bits shall be set to the
number of commands successfully processed with secure messaging.
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 193
Issuer Script Processing Failed
In both the first and second GENERATE AC response, this bit shall be set if and
only if processing of a command with secure messaging failed.
Once set, this bit shall remain set until a subsequent GENERATE AC command
where either:
issuer authentication is successful,
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was not performed
the CCD-compliant application does not require issuer authentication to
be performed for the application to approve (TC) an online transaction,
and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was performed and failed,
the CCD-compliant application does not require issuer authentication to
pass when performed for the application to approve (TC) an online
transaction, and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
Offline Data Authentication Failed on Previous Transaction
In both the first and second GENERATE AC response, this bit shall be set if and
only if, in the TVR returned during the previous transaction, any of the following
bits was set:
SDA Failed
DDA Failed
CDA Failed
Once set, this bit shall remain set until a subsequent transaction is performed
that meets either of the following conditions:
the previous transaction successfully went online, or
the previous transaction was approved offline.
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 194 November 2011
If either condition is met the bit is reset in the first GENERATE AC response.
Go Online on Next Transaction Was Set
In both the first and second GENERATE AC response, this bit shall be set if and
only if the Set Go Online on Next Transaction bit of the last successfully
recovered CSU was set, or it is a new card and the issuer has specified that a new
card is required to set the Go Online on Next Transaction Was Set bit.
Once set, this bit shall remain set until a subsequent GENERATE AC command
where either:
all of the following conditions are true:
issuer authentication is successful, and
the Set Go Online on Next Transaction bit of the CSU is not set.
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was not performed,
the CCD-compliant application does not require issuer authentication to
be performed for the application to approve (TC) an online transaction,
and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was performed and failed,
the CCD-compliant application does not require issuer authentication to
pass when performed for the application to approve (TC) an online
transaction, and
the CCD-compliant application does not require issuer authentication for
resetting of non-velocity-checking indicators.
Unable to go Online
This bit shall be set in the second GENERATE AC response if and only if the
Authorization Response Code, tag '8A', returned from the terminal indicates the
terminal was unable to go online (set to 'Y3' or 'Z3').
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 195
9.2.3.3 Mandatory Actions Due to CVR Bit Settings
This section provides a list of mandatory actions that shall be taken by the
CCD-compliant application, and issuer-configurable options that shall be
supported by the CCD-compliant application.
Issuer Authentication Not Performed
The issuer shall have the option of specifying that if this bit is set, whether the
CCD-compliant application shall:
force transactions at online-capable terminals to go online,
or allow the transaction to remain offline.
The issuer shall have the option of specifying that if this bit is set, and either the
transaction occurs at an offline-only terminal or the terminal is unable to go
online, whether the CCD-compliant application shall:
be allowed to approve (TC) the transaction, or
decline the transaction.
Issuer Authentication Failed
The issuer shall have the option of specifying that if this bit is set, whether the
CCD-compliant application shall:
force transactions at online-capable terminals to go online,
or allow the transaction to remain offline.
The issuer shall have the option of specifying that if this bit is set, and either the
transaction occurs at an offline-only terminal or the terminal is unable to go
online, whether the CCD-compliant application shall:
be allowed to approve (TC) the transaction, or
decline the transaction.
PIN Try Limit Exceeded
The issuer shall have the option of specifying that if this bit is set, the
CCD-compliant application shall decline the transaction offline.
The issuer shall have the option of specifying that if this bit is set, whether the
CCD-compliant application shall:
force transactions at online-capable terminals to go online,
or allow the transaction to remain offline.
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 196 November 2011
The issuer shall have the option of specifying that if this bit is set, and either the
transaction occurs at an offline-only terminal or the terminal is unable to go
online, whether the CCD-compliant application shall:
be allowed to approve (TC) the transaction, or
decline the transaction.
The ICC shall not block the application or the card due to this bit being set.
Last Online Transaction Not Completed
If this bit is set, the CCD-compliant application shall force the transaction at
online-capable terminals to go online.
The issuer shall have the option of specifying that if this bit is set, and either the
transaction occurs at an offline-only terminal or the terminal is unable to go
online, whether the CCD-compliant application shall:
be allowed to approve (TC) the transaction, or
decline the transaction.
Lower Offline Transaction Count Limit Exceeded
If this bit is set in the first GENERATE AC response, the CCD-compliant
application shall force the transaction at online-capable terminals to go online.
Upper Offline Transaction Count Limit Exceeded
If this bit is set and either the transaction occurs at an offline-only terminal or
the terminal is unable to go online, the CCD-compliant application shall decline
the transaction. However, the issuer shall have the option of allowing the
CCD-compliant application to override this decline for a transaction at Terminal
Type 26.
Lower Cumulative Offline Amount Limit Exceeded
If this bit is set in the first GENERATE AC response, the CCD-compliant
application shall force the transaction at online-capable terminals to go online.
Upper Cumulative Offline Amount Limit Exceeded
If this bit is set and either the transaction occurs at an offline-only terminal or
the terminal is unable to go online, the CCD-compliant application shall decline
the transaction. However, the issuer shall have the option of allowing the
CCD-compliant application to override this decline for a transaction at Terminal
Type 26.
Issuer Script Processing Failed
The issuer shall have the option of specifying that if this bit is set, whether the
CCD-compliant application shall:
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 197
force transactions at online-capable terminals to go online,
or allow the transaction to remain offline.
Go Online on Next Transaction Was Set
The issuer shall have the option of specifying that if this bit is set, and either the
transaction occurs at an offline-only terminal or the terminal is unable to go
online, whether the CCD-compliant application shall:
be allowed to approve (TC) the transaction, or
decline the transaction.
9.3 Command Use
The CCD-compliant application shall respond to the first GENERATE AC with
any of the following cryptogram types:
TC
ARQC
AAC
The CCD-compliant application shall respond to the second GENERATE AC (if
applicable) with either of the following cryptogram types:
TC
AAC
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 198 November 2011
10 Functions Used in Transaction Processing
10.5 Cardholder Verification
The CCD-compliant application shall support Cardholder Verification. It shall
indicate this by setting the Application Interchange Profile byte 1, bit 5 to 1.
10.5.1 Offline PIN Processing
The CCD-compliant application shall be capable of supporting offline plaintext
PIN verification. It is the issuers option whether or not to use offline plaintext
PIN as a cardholder verification method.
10.8 Card Action Anal ysis
The CCD-compliant application shall not request that the terminal send an
advice message to the issuer.
10.8.1 Terminal Messages for an AAC
The CCD-compliant application shall set bits b3-b1 of the CID to '000' in the
GENERATE AC command response.
10.8.2 Advice Messages
The CCD-compliant application shall not request the terminal to send an advice
message. Bit b4 of the Cryptogram Information Data shall be set to 0.
10.10 Issuer-to-Card Script Processing
An issuer shall send no more than one issuer script template in an authorization
response message. The script template may contain multiple commands. The
script template may be tag '71' or tag '72'.
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 199
10.11 Completion
The following Section 10.11.1 applies to a CCD-compliant application.
10.11.1 Addi tional Completion Actions for a CCD-Compliant Application
10.11.1.1 Actions Taken by CCD-compliant Application After Issuer
Authentication is Successful
After issuer authentication is successful, if the CSU Created by Proxy for the
Issuer bit in the CSU is set to 1, and if the issuer specifies that Update
Counters shall not be used, then the following shall govern the behaviour of
velocity-checking counters and cumulative amounts associated with the offline
transaction limits referred to in bits b8-b5 of byte 3 of the CVR:
If the issuer specifies that the application shall not update the offline
counters, no offline counter or cumulative amount is modified.
If the issuer specifies that the application shall set the offline counters to
zero, the application will reset all the offline counters and cumulative
amounts to zero. By doing so, the issuer allows the application to accept
offline transactions, up to the offline limits.
If the issuer specifies that the application shall set the offline counters to the
upper offline limits, the offline counters and cumulative amounts will be set
to their respective upper limits.
If the issuer specifies that the application shall add the transaction to the
offline counter(s), the transaction will be included in the offline counters or
cumulative amounts as if it were an offline transaction.
This section describes the actions to be taken by the CCD-compliant application
due to the setting of each bit in the CSU after issuer authentication is successful..
Issuer Approves Online Transaction
If Issuer Approves Online Transaction is set and the terminal requests a TC, the
application shall approve the transaction by returning a TC.
If Issuer Approves Online Transaction is not set, the application shall decline
the transaction by returning an AAC.
Card Block
If Card Block is set, all applications in the ICC shall be permanently disabled,
including applications that may be selected implicitly. For all subsequent
SELECT commands the card shall return the status bytes Function not
supported (SW1-SW2 = '6A81') and perform no other action.
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 200 November 2011
Application Block
If Application Block is set, the currently selected application shall be
invalidated. An invalidated application shall return the status bytes Selected file
invalidated (SW1-SW2 = '6283') in response to a SELECT command and return
only an AAC in response to the GENERATE AC command.
Update PIN Try Counter
If Update PIN Try Counter is set, the application shall update the PIN Try
Counter (PTC) with the value contained in bits b4-b1 of byte 1 of the CSU. If the
PIN is blocked, updating the value of the PTC with a non-zero value unblocks the
PIN. Updating the value of the PTC with a zero value blocks the PIN.
If Update PIN Try Counter is not set, no update of the PTC shall be performed
by the application.
The value contained in bits b4-b1 of byte 1 of the CSU shall never be interpreted
by the application.
Set Go Online on Next Transaction
If Set Go Online on Next Transaction is set, the application shall force
subsequent transactions at online-capable terminals to go online (that is, the
CCD-compliant application shall return an ARQC in response to the first
GENERATE AC command if a TC or an ARQC is requested). The application
shall continue to try to go online at online-cable terminals until a subsequent
GENERATE AC command where either:
all of the following conditions are true:
issuer authentication is successful, and
the Set Go Online on Next Transaction bit of the CSU is not set.
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
issuer authentication was not performed,
the CCD-compliant application does not require issuer authentication to
be performed for the application to approve (TC) an online transaction,
and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
or all of the following conditions are true:
the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go
online),
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 201
issuer authentication was performed and failed,
the CCD-compliant application does not require issuer authentication to
pass when performed for the application to approve (TC) an online
transaction, and
the CCD-compliant application does not require issuer authentication to
pass for resetting of non-velocity-checking indicators.
Update Counters
Update Counters (bits b2-b1 of byte 2 of the CSU) govern the behaviour of
velocity-checking counters and cumulative amounts associated with the offline
transaction limits referred to in bits b8-b5 of byte 3 of the CVR if either of the
following is true:
the CSU Created by Proxy for the Issuer bit in the CSU is set to 0
the issuer specifies that the application shall use the Update Counters bits
in the CSU to update the velocity-checking count(s) and cumulative
amount(s) regardless of the bit setting for CSU Created by Proxy for the
Issuer
If Update Counters is set to Do Not Update Offline Counters, no offline counter
or cumulative amount shall be modified.
If Update Counters is set to Reset Offline Counters to Zero, the application
shall reset all the offline counters and cumulative amounts to zero. By doing so,
the issuer allows the application to accept offline transactions, up to the offline
limits.
If Update Counters is set to Set Offline Counters to Upper Offline Limits, the
application shall set the offline counters and cumulative amounts to their
respective upper limits.
If Update Counters is set to Add Transaction to Offline Counters, the
application shall include the transaction in the offline counters or cumulative
amounts as if it were an offline transaction.
10.11.1.2 Other Completion Actions
After the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go online), the
CCD-compliant application shall reset to zero the velocity-checking offline
transaction count(s) and cumulative offline amount(s) if either of the following
are true:
all of the following conditions are true:
the terminal requested a TC,
issuer authentication was not performed,
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 202 November 2011
the CCD-compliant application does not require issuer authentication to
be performed for the application to approve (TC) an online transaction,
and
the CCD-compliant application does not require issuer authentication to
pass for resetting of velocity-checking counters.
or all of the following conditions are true:
the terminal requested a TC,
issuer authentication was performed and failed,
the CCD-compliant application does not require issuer authentication to
pass when performed for the application to approve (TC) an online
transaction, and
the CCD-compliant application does not require issuer authentication to
pass for resetting of velocity-checking counters.
After the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go online), the
CCD-compliant application shall approve the transaction if all of the following
conditions are true:
the terminal requested a TC, and
one of the following is true:
issuer authentication is successful and the Issuer Approves Online
Transaction bit of the recovered CSU is set to 1, or
issuer authentication was not performed and the CCD-compliant
application does not require issuer authentication to be performed for the
application to approve (TC) an online transaction, or
issuer authentication was performed and failed and the CCD-compliant
application does not require issuer authentication to pass when performed
for the application to approve (TC) an online transaction.
After the transaction successfully went online (that is, the Authorisation
Response Code does not indicate that the terminal was unable to go online), the
CCD-compliant application shall decline the transaction in the second
GENERATE AC response if either of the following conditions are true:
both of the following are true:
issuer authentication was not performed, and
the CCD-compliant application requires issuer authentication to be
performed for the application to approve (TC) an online transaction,
or both of the following are true:
issuer authentication was performed and failed, and
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 203
the CCD-compliant application requires issuer authentication to pass
when performed for the application to approve (TC) an online transaction.
After the transaction did not successfully complete online (that is the
Authorisation Response Code indicates that the terminal was unable to go
online), the CCD-compliant application shall decide whether to approve or
decline the transaction.
Part IV - Annexes
Annex A Data Elements Dictionary
For the data elements shown in Table CCD 6:
If the source is Terminal, the data element shall not be included in any DOL
used by a CCD-compliant application.
If the source is ICC, the data element shall not be identified in the AFL of a
CCD-compliant application.
Data Element Name Tag Source
Amount, Reference Currency '9F3A' Terminal
Application Reference Currency '9F3B' ICC
Application Reference Currency Exponent '9F43' ICC
Default Dynamic Data Authentication Data
Object List (DDOL)
Terminal
Transaction Certificate (TC) Hash Value '98' Terminal
Table CCD 6: Data Elements Not Used by a CCD-Compliant Application
Table CCD 7 lists data elements (in addition to those defined in Annex A) that
are defined within the context of the Common Core Definitions.
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 204 November 2011
Name Description Source Format Templat
e
T
a
g
Leng
th
Card
Verification
Results (CVR)
Contains data sent to the
issuer indicating exception
conditions that occurred
during the current and
previous transactions.
Transmitted to the
terminal in Issuer
Application Data as
specified in Table CCD 9.
ICC b 5
Common Core
Identifier
(CCI)
Data sent to the issuer
identifying the format of
the Issuer Application
Data and the method for
calculating the Application
Cryptogram. Transmitted
to the terminal in Issuer
Application Data as
specified in Table CCD 9.
Contains the following:
Format Code (FC)
Cryptogram Version
(CV)
ICC b 1
Derivation
Key Index
(DKI)
Data sent to the issuer
identifying the issuers
derivation key for deriving
the cards ICC Master
Keys. Transmitted to the
terminal in Issuer
Application Data as
specified in Table CCD 9.
ICC b 1
Issuer
Discretionary
Data
Contains issuer
proprietary application
data for transmission to
the issuer in an online
transaction. Transmitted
to the terminal in Issuer
Application Data as
specified in Table CCD 9.
ICC b 15
Table CCD 7: Additional Data Elements Defined for CCD
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 205
Annex C Coding of Data Elements Used in
Transaction Processing
Please add the following sections after Annex C.6.
C7 Issuer Application Data for a Common Core Definitions-
Compliant Application
The CCD-compliant application shall have an Issuer Application Data (IAD) field
of fixed length, 32 bytes long, with the following attributes:
Byte 1 shall be set to '0F'.
Byte 2 shall be the Common Core Identifier (CCI).
Byte 17 shall be set to '0F'.
The CCD-compliant application shall support the selection of different Issuer
Application Data if:
the card requests the Terminal Type and the Additional Terminal
Capabilities in PDOL, and
the values provided by the terminal in the PDOL related data for the
Terminal Type and the first two bytes of the Additional Terminal Capabilities
are '34 and '0000' respectively.
C7.1 Common Core Identifier
The CCI shall identify the format of the IAD, and the Cryptogram Version (CV).
Values in the range '00' to '9F' are reserved to avoid conflict with legacy
Cryptogram Version Numbers.
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x Common Core IAD Format Code (FC).
1 0 1 0 CCD Version 4.1 IAD Format (='A')
x x x x Common Core Cryptogram Version (CV)
0 1 0 1
CCD Version 4.1 Cryptogram Version
(= '5' for Triple DES)
0 1 1 0
CCD Version 4.1 Cryptogram Version
(= '6' for AES)
Table CCD 8: Common Core Identifier
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 206 November 2011
Bits b8 - b5 of the CCI shall indicate the Format Code (FC). Values in the range
'A' - 'F' shall indicate a CCD-specified IAD format (all values RFU by EMVCo for
CCD).
Bits b4 - b1 of the CCI shall indicate the Cryptogram Version (CV) for the
Application Cryptogram. The CV indicates:
The cryptogram input data and key derivation method the CCD-compliant
application uses to generate the Application Cryptogram.
The cryptogram input data (including CSU coding), key derivation method,
and ARPC method the CCD-compliant application expects the issuer to use
when generating the Authorisation Response Cryptogram.
Values in the range '4' - 'F' shall indicate a CCD-specified cryptogram algorithm
and data set (all values RFU by EMVCo for CCD). Values in the range '0' - '3'
shall indicate a proprietary cryptogram algorithm. When using the CV range
'0' - '3', applications are not CCD-compliant.
C7.2 Issuer Application Data for Format Code ' A'
The format and coding of the IAD with a Format Code of 'A' shall be as shown in
Table CCD 9:
Byte(s) Contents Description
1 Length Indicator Length of EMVCo-defined data in IAD. Set to '0F'.
2 CCI Common Core Identifier
3 DKI Derivation Key Index
4-8 CVR Card Verification Results (see section C7.3)
9-16 Counters Contents are at the discretion of the Payment
System.
17 Length Indicator Length of Issuer Discretionary Data field in IAD.
Set to '0F'.
18-32 Issuer
Discretionary
Data
Contents are at the discretion of the issuer.
Table CCD 9: Issuer Application Data for Format Code ' A'
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 207
C7.3 Card Verification Results
The coding of the CVR for a Common Core IAD Format Code of value 'A' shall be
as shown in Table CCD 10.
CVR Byte 1
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x
Application Cryptogram Type Returned in
Second GENERATE AC
0 0 AAC
0 1 TC
1 0 Second GENERATE AC Not Requested
1 1 RFU
x x
Application Cryptogram Type Returned in
First GENERATE AC
0 0 AAC
0 1 TC
1 0 ARQC
1 1 RFU
1 CDA Performed
1 Offline DDA Performed
1 Issuer Authentication Not Performed
1 Issuer Authentication Failed
CVR Byte 2
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x Low Order Nibble of PIN Try Counter
1 Offline PIN Verification Performed
1
Offline PIN Verification Performed and
PIN Not Successfully Verified
1 PIN Try Limit Exceeded
1 Last Online Transaction Not Completed
Table CCD 10: Card Verification Results for Format Code ' A'
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 208 November 2011
CVR Byte 3
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1
Lower Offline Transaction Count Limit
Exceeded
1
Upper Offline Transaction Count Limit
Exceeded
1
Lower Cumulative Offline Amount Limit
Exceeded
1
Upper Cumulative Offline Amount Limit
Exceeded
1 Issuer-discretionary bit 1
1 Issuer-discretionary bit 2
1 Issuer-discretionary bit 3
1 Issuer-discretionary bit 4
CVR Byte 4
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x
Number of Successfully Processed Issuer
Script Commands Containing Secure
Messaging
1 Issuer Script Processing Failed
1
Offline Data Authentication Failed on
Previous Transaction
1 Go Online on Next Transaction Was Set
1 Unable to go Online
CVR Byte 5
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 0 0 0 0 0 0 RFU
Table CCD 10: Card Verification Results for Format Code ' A', continued
EMV 4.3 Book 3 Common Core Definitions
Appli cation Specification
November 2011 Page 209
C8 Card Status Update for a Common Core Definitions-
Compliant Application
The Issuer Authentication Data shall include a Card Status Update (CSU) of
fixed length, 4 bytes long. The coding of the CSU is shown in Table CCD 11.
CSU Byte 1
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 Proprietary Authentication Data Included
0 0 0 RFU
x x x x PIN Try Counter
CSU Byte 2
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
1 Issuer Approves Online Transaction
1 Card Block
1 Application Block
1 Update PIN Try Counter
1 Set Go Online on Next Transaction
1 CSU Created by Proxy for the Issuer
x x Update Counters
0 0 Do Not Update Offline Counters
0 1
Set Offline Counters to Upper Offline
Limits
1 0 Reset Offline Counters to Zero
1 1 Add Transaction to Offline Counter
Note: The CSU Created by Proxy for the Issuer bit shall be set in the CSU if and only if
the CSU is generated by a proxy for the Issuer.
Table CCD 11: Card Status Update for Cryptogram Versions '5' and '6'
Common Core Definitions EMV 4.3 Book 3
Appli cation Specification
Page 210 November 2011
CSU Byte 3
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
0 0 0 0 0 0 0 0 RFU
CSU Byte 4
b8 b7 b6 b5 b4 b3 b2 b1 Meaning
x x x x x x x x Issuer-Discretionary
Table CCD 11: Card Status Update for Cryptogram Versions '5' and '6',
continued
The default value for issuer-discretionary data in the CSU is zero.
Annex D Transaction Log Information
If the CCD-compliant application supports transaction logging, it shall be
supported using the method specified in Annex D.
EMV 4.3 Book 3
Appli cation Specification
November 2011 Page 211
Index
A
Abbreviations ........................................................ 19
AC ................................ See Application Cryptogram
Account Type .............................................. 127, 179
Acquirer Identifier ....................................... 127, 142
Additional Terminal Capabilities ........................ 127
Advice Messages ................................................. 119
AFL ........................... 59, 60, 74, 78, 93, 94, 96, 129
AID ............................................... 37, 129, 131, 144
AIP .... 59, 60, 76, 77, 79, 81, 83, 91, 92, 95, 96, 100,
120, 121, 129
Coding ............................................................ 160
Amount ............................................................... 146
Amount, Authorised ............................................ 101
API ...................................................................... 130
APPLICATION BLOCK ...................................... 49
Application Cryptogram 49, 54, 55, 56, 76, 120, 128
Application Currency Code 100, 101, 128, 130, 147,
163
Application Currency Exponent .......................... 128
Application Discretionary Data ........................... 128
Application Effective Date ............................ 99, 128
Application Elementary File ........... 37, 38, 143, 158
Application Expiration Date .................... 74, 99, 129
Application File Locator ............................. See AFL
Application Identifier .................................. See AID
Application Interchange Profile ................... See AIP
Application Label ................................................ 129
Application Preferred Name ........................ 129, 139
Application Primary Account Number (PAN) ..... 74,
129
Application Priority Indicator ............................. 130
Application Template .......................................... 131
Application Transaction Counter ............... See ATC
APPLICATION UNBLOCK ................................ 50
Application Usage Control ............................ 98, 131
Coding ............................................................ 161
Application Version Number ........................ 98, 131
ATC ............................ 55, 58, 76, 79, 113, 131, 141
AUC ...................................................... 98, 131, 161
Authorisation Code ............................................. 132
Authorisation Response Code ............................. 132
B
Bank Identifier Code ........................................... 132
BER-TLV Data Objects ...................................... 155
BIC .................................... See Bank Identifier Code
C
Card Action Analysis .......................................... 118
CARD BLOCK ..................................................... 51
Card Risk Management Data Object List 1 ......... See
CDOL1
Card Risk Management Data Object List 2 ......... See
CDOL2
Cardholder Name ................................................ 133
Cardholder Verification ............................ See CVM
Cardholder Verification Method ............... See CVM
CCD ......................... See Common Core Definitions
CDA .............................................................. 96, 160
CDOL1 .............................................. 38, 87, 88, 132
CDOL2 .......................................................... 38, 132
CID.................................................. 55, 56, 119, 134
Class Byte ............................................................. 42
Coding Conventions .............................................. 42
Command .............................................. 41, 134, 140
Command APDU Structure ................................... 41
Commands ............................................................ 48
APPLICATION BLOCK ................................. 49
APPLICATION UNBLOCK............................ 50
CARD BLOCK ................................................ 51
EXTERNAL AUTHENTICATE ..................... 52
GENERATE AC ........................................ 54, 85
GET CHALLENGE ......................................... 57
GET DATA ...................................................... 58
GET PROCESSING OPTIONS ....................... 59
INTERNAL AUTHENTICATE ...................... 61
PIN CHANGE/UNBLOCK ............................. 63
READ RECORD .............................................. 65
VERIFY ........................................................... 67
Common Core Definitions .................................. 182
Card Status Update ......................................... 209
Card Verification Results ............................... 207
Cardholder Verification .................................. 198
CID Coding .................................................... 184
Common Core Identifier ................................ 205
Completion ..................................................... 199
Data Elements ................................................ 203
Data Retrievable by GET DATA Command .. 186
EXTERNAL AUTHENTICATE ................... 183
Functions Used in Transaction Processing ..... 199
GENERATE AC
Command Coding ...................................... 187
GENERATE AC ............................................ 183
GENERATE AC Command Use .................... 197
GET PROCESSING OPTIONS ..................... 184
INTERNAL AUTHENTICATE .................... 185
Issuer Application Data .......................... 205, 206
Issuer-to-Card Script Processing .................... 198
Offline PIN Processing ................................... 198
Response APDU Format ................................ 183
Completion .......................................................... 124
Index EMV 4.3 Book 3
Appli cation Specification
Page 212 November 2011
Country Code................................................ 99, 139
Cryptogram ...................................... 54, 55, 114, 128
CryptogramInformation Data ..................... See CID
CryptogramTypes ................................................ 54
CSU .....................................................188, 199, 201
Currency ............................................................. 130
Currency Code .....................................130, 147, 163
Currency exponent .............................................. 147
CV Rule
Coding ........................................................... 162
CVM ........ 67, 79, 100, 103, 104, 133, 144, 162, 163
D
DAC ................................................................... 134
Data Authentication Code ................................... 134
Data Element Format Conventions ....................... 29
Data Elements and Files ....................................... 35
Data Elements Dictionary ................................... 127
Data Field Bytes ................................................... 44
Data Object List (DOL) ........................................ 38
Data Objects ......................................................... 36
Classes ............................................................. 36
DDF .............................................................. 37, 135
DDOL ................................................ 38, 61, 75, 135
Definitions .............................................................. 9
DF Name ............................................................ 134
Directory Definition File ............................ See DDF
Directory Definition File (DDF) Name .............. 135
Directory Definition File Name .................. 135, 143
Directory Discretionary Template ...................... 135
Dynamic Data Authentication Data Object List .. See
DDOL
E
Erroneous Data ..................................................... 77
Exception Handling .............................................. 81
Exponent ............................................................. 130
EXTERNAL AUTHENTICATE .......................... 52
Status Words Returned .................................. 177
F
FCI ...................................................................... 136
FCI Issuer Discretionary Data ................ 35, 91, 136
File Control Information ............................... See FCI
Files ...................................................................... 37
Financial Transaction ............................... 35, 41, 73
Floor Limit ......................................................... 144
Floor Limits ........................................................ 111
Format 1 ............................................................. 143
Format 2 ............................................................. 143
Function
Card Action Analysis ..................................... 118
Cardholder Verification ................................. 100
Completion .................................................... 124
Initiate Application Processing ........................ 91
Issuer-to-Card Script Processing .................... 122
Offline Data Authentication ............................. 95
Offline PIN Processing .................................. 103
Online PIN Processing ................................... 104
Online Processing .......................................... 120
Processing Restrictions .................................... 98
Read Application Data ..................................... 93
Signature Processing ...................................... 104
Terminal Action Analysis .............................. 114
Terminal Risk Management ........................... 110
Transaction Log ............................................. 169
G
GENERATE AC ...... 54, 56, 85, 110, 114, 116, 117,
118, 119, 120, 121, 122, 123, 124, 132, 140
CryptogramTypes ........................................... 54
GET CHALLENGE ............................................. 57
GET DATA .......................................................... 58
GET PROCESSING OPTIONS ........................... 59
I
IAC ...................................... See Issuer Action Code
IAD ............................................................... 55, 138
IBAN ........ See International Bank Account Number
ICC Dynamic Number ........................................ 136
IFD ..................................................................... 138
IIN ........................ See Issuer Identification Number
Initiate Application Processing ............................. 91
Instruction Byte .................................................... 43
Interface Device .......................................... 135, 138
INTERNAL AUTHENTICATE ........................... 61
International Bank Account Number .................. 138
Issuer Action Code ........................ 89, 114, 115, 138
Issuer Application Data ................................ 55, 138
Issuer Authentication Data ............ 52, 120, 121, 139
Issuer Code Table Index ............................. 139, 164
Issuer Country Code ........................................... 139
Issuer Identification Number .............................. 139
Issuer-to-Card Script Processing ........................ 122
L
Language ............................................................ 140
Last Online Application Transaction Counter ..... See
LATC
LATC ........................................................... 79, 141
LCOL .............................................. 76, 79, 113, 141
Log Entry .................................................... 141, 170
Log Format ................................................. 141, 171
Logical Channels .................................................. 47
Lower Consecutive Offline Limit ............ See LCOL
EMV 4.3 Book 3 Index
Appli cation Specification
November 2011 Page 213
M
Mandatory Data Objects........................................ 74
Mapping Data Objects ........................................... 73
MCC.................................................................... 141
Merchant Category Code .................................... 141
Merchant Identifier.............................................. 142
Missing Data ......................................................... 77
N
Non-velocity-checking indicators ....................... 187
Normative References ............................................. 5
Notations ............................................................... 27
O
Offline Data Authentication .................................. 95
Offline PIN Processing ....................................... 103
Online PIN Processing ........................................ 104
Online Processing ............................................... 120
P
Padding
Data Elements ................................................ 149
DOL ................................................................. 39
PAN .............................................................. 74, 129
PAN Sequence Number ...................................... 130
Parameter Bytes .................................................... 43
PDOL ................................................ 38, 59, 91, 142
Personal Identification Number.................... See PIN
PIN 46, 48, 58, 63, 67, 103, 104, 122, 135, 136, 137,
142, 147, 162, 163
PIN CHANGE/UNBLOCK .................................. 63
Point-of-Service (POS) Entry Mode ................... 142
POS ..................................................................... 142
Primary Account Number ............. 74, 111, 129, 142
Processing Options Data Object List ........ See PDOL
Processing Restrictions ......................................... 98
Public Key ......................................... 74, 75, 79, 133
Public Key Certificate ....................... 74, 75, 79, 139
Public Key Exponent....................... 75, 79, 137, 139
Public Key Remainder ...................... 74, 75, 79, 140
R
RandomTransaction Selection ............................ 111
Read Application Data .......................................... 93
READ RECORD ................................................... 65
Record ................................................................... 37
Reference Currency ............................................. 147
References
Normative ........................................................... 5
Response ............................................................... 41
Response APDU Structure .................................... 41
Revision Log ......................................................... iii
RFU Data .............................................................. 47
Rules for BER-TLV Data Objects ....................... 155
S
Scope ....................................................................... 3
Script ............................................. 47, 122, 124, 140
SDA Tag List ................................................ 96, 144
SDAD .............................................. 61, 62, 137, 143
Service Code ............................................... 143, 146
SFI ....................................................................... 143
Short File Identifier . 37, 38, 65, 78, 93, 96, 129, 143
Signature Processing ........................................... 104
Signed Dynamic Application Data ...........See SDAD
Signed Static Application Data ................ See SSAD
SSAD ...................................... 75, 79, 134, 139, 143
Status Bytes ........................................................... 44
Status Words
EXTERNAL AUTHENTICATE ................... 177
SVC ............................................................. 143, 146
T
TC Hash value ..................................................... 146
TDOL .............................................. 38, 88, 135, 146
Template 66, 127, 131, 134, 135, 136, 140, 143, 150
Terminal Action Analysis ................................... 114
Terminal Action Code ......................... 114, 115, 144
Terminal Capabilities .................................. 127, 144
Terminal Country Code ....................................... 144
Terminal Identification ........................................ 145
Terminal Risk Management ................................ 145
Terminal Type ..................................................... 145
Terminal Verification Results .................... See TVR
Terminology .......................................................... 31
Track 1 ................................................................ 145
Track 2 ................................................................ 145
Transaction Certificate Data Object List .. See TDOL
Transaction Date ......................................... 111, 147
Transaction Flow ................................................... 81
Transaction Log Information .............................. 169
Transaction Personal Identification Number ....... 147
Transaction Sequence Counter ............................ 148
Transaction Status Information .................... See TSI
Transaction Time ................................................ 148
Transaction Type ................................................. 148
TRM ............................................................ 110, 145
TSI 91, 95, 96, 97, 100, 102, 110, 118, 121, 123, 148
Bit Settings Following Script Processing ....... 173
Coding ............................................................ 168
TVR .... 77, 88, 91, 95, 96, 97, 98, 99, 101, 102, 103,
104, 110, 111, 112, 113, 114, 120, 123, 145, 177
Bit Settings Following Script Processing ....... 173
Index EMV 4.3 Book 3
Appli cation Specification
Page 214 November 2011
Coding ........................................................... 165
U
UCOL .............................................. 76, 79, 113, 148
UN ...................................................................... 148
Unpredictable Number........................................ 148
Upper Consecutive Offline Limit ............ See UCOL
URL .................................................................... 140
V
Velocity Checking .............................................. 113
VERIFY................................................................ 67