S.R. CWA 15748-6:2008
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION - RELEASE 3.10 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE
Hardcopy , PDF
09-09-2008
English
25-04-2008
Foreword
1 Introduction
1.1 Background to Release 3.10
1.2 XFS Service-Specific Programming
2 Pin Keypad
3 References
4 Info Commands
4.1 WFS_INF_PIN_STATUS
4.2 WFS_INF_PIN_CAPABILITIES
4.3 WFS_INF_PIN_KEY_DETAIL
4.4 WFS_INF_PIN_FUNCKEY_DETAIL
4.5 WFS_INF_PIN_HSM_TDATA
4.6 WFS_INF_PIN_KEY_DETAIL_EX
4.7 WFS_INF_PIN_SECUREKEY_DETAIL
4.8 WFS_INF_PIN_QUERY_LOGICAL_HSM_DETAIL
5 Execute Commands
5.1 Normal PIN Commands
5.1.1 WFS_CMD_PIN_CRYPT
5.1.2 WFS_CMD_PIN_IMPORT_KEY
5.1.3 WFS_CMD_PIN_DERIVE_KEY
5.1.4 WFS_CMD_PIN_GET_PIN
5.1.5 WFS_CMD_PIN_LOCAL_DES
5.1.6 WFS_CMD_PIN_CREATE_OFFSET
5.1.7 WFS_CMD_PIN_LOCAL_EUROCHEQUE
5.1.8 WFS_CMD_PIN_LOCAL_VISA
5.1.9 WFS_CMD_PIN_PRESENT_IDC
5.1.10 WFS_CMD_PIN_GET_PINBLOCK
5.1.11 WFS_CMD_PIN_GET_DATA
5.1.12 WFS_CMD_PIN_INITIALIZATION
5.1.13 WFS_CMD_PIN_LOCAL_BANKSYS
5.1.14 WFS_CMD_PIN_BANKSYS_IO
5.1.15 WFS_CMD_PIN_RESET
5.1.16 WFS_CMD_PIN_HSM_SET_TDATA
5.1.17 WFS_CMD_PIN_SECURE_MSG_SEND
5.1.18 WFS_CMD_PIN_SECURE_MSG_RECEIVE
5.1.19 WFS_CMD_PIN_GET_JOURNAL
5.1.20 WFS_CMD_PIN_IMPORT_KEY_EX
5.1.21 WFS_CMD_PIN_ENC_IO
5.1.22 WFS_CMD_PIN_HSM_INIT
5.1.23 WFS_CMD_PIN_SECUREKEY_ENTRY
5.1.24 WFS_CMD_PIN_GENERATE_KCV
5.1.25 WFS_CMD_PIN_SET_GUIDANCE_LIGHT
5.1.26 WFS_CMD_PIN_MAINTAIN_PIN
5.1.27 WFS_CMD_PIN_KEYPRESS_BEEP
5.1.28 WFS_CMD_PIN_SET_PINBLOCK_DATA
5.1.29 WFS_CMD_PIN_SET_LOGICAL_HSM
5.1.30 WFS_CMD_PIN_IMPORT_KEYBLOCK
5.1.31 WFS_CMD_PIN_POWER_SAVE_CONTROL
5.2 Common commands for Remote Key Loading Schemes
5.2.1 WFS_CMD_PIN_START_KEY_EXCHANGE
5.3 Remote Key Loading Using Signatures
5.3.1 WFS_CMD_PIN_IMPORT_RSA_PUBLIC_KEY
5.3.2 WFS_CMD_PIN_EXPORT_RSA_ISSUER_SIGNED_ITEM
5.3.3 WFS_CMD_PIN_IMPORT_RSA_SIGNED_DES_KEY
5.3.4 WFS_CMD_PIN_GENERATE_RSA_KEY_PAIR
5.3.5 WFS_CMD_PIN_EXPORT_RSA_EPP_SIGNED_ITEM
5.4 Remote Key Loading with Certificates
5.4.1 WFS_CMD_PIN_LOAD_CERTIFICATE
5.4.2 WFS_CMD_PIN_GET_CERTIFICATE
5.4.3 WFS_CMD_PIN_REPLACE_CERTIFICATE
5.4.4 WFS_CMD_PIN_IMPORT_RSA_ENCIPHERED_PKCS7_KEY
5.5 EMV
5.5.1 WFS_CMD_PIN_EMV_IMPORT_PUBLIC_KEY
5.5.2 WFS_CMD_PIN_DIGEST
6 Events
6.1 WFS_EXEE_PIN_KEY
6.2 WFS_SRVE_PIN_INITIALIZED
6.3 WFS_SRVE_PIN_ILLEGAL_KEY_ACCESS
6.4 WFS_SRVE_PIN_OPT_REQUIRED
6.5 WFS_SRVE_PIN_CERTIFICATE_CHANGE
6.6 WFS_SRVE_PIN_HSM_TDATA_CHANGED
6.7 WFS_SRVE_PIN_HSM_CHANGED
6.8 WFS_EXEE_PIN_ENTERDATA
6.9 WFS_SRVE_PIN_DEVICEPOSITION
6.10 WFS_SRVE_PIN_POWER_SAVE_CHANGE
7 C - Header File
8 Appendix-A
8.1 Remote Key Loading Using Signatures
8.1.1 RSA Data Authentication and Digital Signatures
8.1.2 RSA Secure Key Exchange using Digital Signatures
8.1.3 Initialization Phase - Signature Issuer and ATM PIN
8.1.4 Initialization Phase - Signature Issuer and Host
8.1.5 Key Exchange - Host and ATM PIN
8.1.6 Key Exchange (with random number) - Host and ATM PIN
8.1.7 Enhanced RKL, Key Exchange (with random number) -
Host and ATM PIN
8.1.8 Default Keys and Security Item loaded during
manufacture
8.2 Remote Key Loading Using Certificates
8.2.1 Certificate Exchange and Authentication
8.2.2 Remote Key Exchange
8.2.3 Replace Certificate
8.2.4 Primary and Secondary Certificates
8.3 German ZKA GeldKarte
8.3.1 How to use the SECURE_MSG commands
8.3.2 Protocol WFS_PIN_PROTISOAS
8.3.3 Protocol WFS_PIN_PROTISOLZ
8.3.4 Protocol WFS_PIN_PROTISOPS
8.3.5 Protocol WFS_PIN_PROTCHIPZKA
8.3.6 Protocol WFS_PIN_PROTRAWDATA
8.3.7 Protocol WFS_PIN_PROTPBM
8.3.8 Protocol WFS_PIN_PROTHSMLDI
8.3.9 Protocol WFS_PIN_PROTGENAS
8.3.10 Protocol WFS_PIN_PROTCHIPPINCHG
8.3.11 Protocol WFS_PIN_PROTPINCMP
8.3.12 Protocol WFS_PIN_PROTISOPINCHG
8.3.13 Command Sequence
8.4 EMV Support
8.4.1 Keys loading
8.4.2 PIN block management
8.4.3 SHA-1 Digest
8.5 French Cartes Bancaires
8.5.1 Data Structure for WFS_CMD_PIN_ENC_IO
8.5.2 Command Sequence
8.6 Secure Key Entry
8.6.1 Keyboard Layout
8.6.2 Command Usage
9 Appendix-B (Country Specific WFS_CMD_PIN_ENC_IO protocols)
9.1 Luxemburg Protocol
9.1.1 WFS_CMD_ENC_IO_LUX_LOAD_APPKEY
9.1.2 WFS_CMD_ENC_IO_LUX_GENERATE_MAC
9.1.3 WFS_CMD_ENC_IO_LUX_CHECK_MAC
9.1.4 WFS_CMD_ENC_IO_LUX_BUILD_PINBLOCK
9.1.5 WFS_CMD_ENC_IO_LUX_DECRYPT_TDES
9.1.6 WFS_CMD_ENC_IO_LUX_ENCRYPT_TDES
9.1.7 Luxemburg-specific Header File
10 Appendix-C (Standardized lpszExtra fields)
10.1 WFS_INF_PIN_STATUS
10.2 WFS_INF_PIN_CAPABILITIES
DocumentType |
Standard
|
Pages |
205
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Withdrawn
|
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ANSI X9 TR 31 : 2010 | INTEROPERABLE SECURE KEY EXCHANGE KEY BLOCK SPECIFICATION FOR SYMMETRIC ALGORITHMS |
ISO 9564-1:2017 | Financial services — Personal Identification Number (PIN) management and security — Part 1: Basic principles and requirements for PINs in card-based systems |
ANSI X9.8 : 1995 | BANKING - PERSONAL IDENTIFICATION NUMBER MANAGEMENT AND SECURITY - PART 1: PIN PROTECTION PRINCIPLES AND TECHNIQUES - PART 2: APPROVED ALGORITHMS FOR PIN ENCIPHERMENT |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO 8731-2:1992 | Banking Approved algorithms for message authentication Part 2: Message authenticator algorithm |
ANSI INCITS 92 : 1981 | DATA ENCRYPTION ALGORITHM |
ISO 9564-2:2014 | Financial services — Personal Identification Number (PIN) management and security — Part 2: Approved algorithms for PIN encipherment |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.