P. 1
EMV v4.1 Book 2 Security and Key Management

EMV v4.1 Book 2 Security and Key Management

|Views: 906|Likes:
Published by ashishkar

More info:

Published by: ashishkar on May 27, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/14/2013

pdf

text

original

Table CCD 3 lists the set of data elements to be included in the Application
Cryptogram generation for a cryptogram defined by the Common Core
Definitions with a Cryptogram Version of ‘4’. The data elements shall be
included in the order shown in Table CCD 3 [which, for CCD, supplants
Table 25].

Value

Source

Amount, Authorised (Numeric)

Terminal

Amount Other (Numeric)

Terminal

Terminal Country Code

Terminal

Terminal Verification Results

Terminal

Transaction Currency Code

Terminal

Transaction Date

Terminal

Transaction Type

Terminal

Unpredictable Number

Terminal

Application Interchange Profile

ICC

Application Transaction Counter

ICC

Issuer Application Data

ICC

Table CCD 3: Data Elements for Application Cryptogram Generation

Common Core Definitions

EMV 4.1 Book 2

Security and Key Management

Page 158

May 2004

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->