QPBOC expands personalization and transaction process, and qpboc expands transaction process

Source: Internet
Author: User

QPBOC expands personalization and transaction process, and qpboc expands transaction process


1 Q extended data needs to be written into Three DGI: A001, 8020,9020


1.1 A001 extended application configuration

DGI

Length

Value (example)

A001

7 * N

15 01 00 00 FF 00 00

Data is organized in 7 bytes as a unit. Each unit corresponds to the configuration information of an extended application file. The parsing is as follows:

1-byte extended application file SFI;

1-byte file type: 01 indicates a variable-length record file,

02 indicates the cyclic record file;

1-byte Read permission: 00 indicates Read using the Read CAPP Cache command

1-byte write permission: 00 indicates Update using the Update CAPP Cache command

1-byte maximum length of a single record: Limit the maximum length of records that can be used

2-byte file size configuration: for variable-length record files, 2 bytes indicates the default file size, 00 indicates the size is not limited; for cyclic record files, it is the number of 1-byte records and the size of 1-byte records.

You can adjust the DGI data domains based on the actual number of application files to be used and the actual SFI. The number and order of units consisting of 7 bytes determine the number and order of keys activated in the subsequent 8020 data domains. They must correspond one to one.

 

1.2 8020 subkey activation for extended applications


The composition and sequence of DGI data are as follows. The key sequence matches the SFI sequence of files defined in A001 and is set as the activation key of each file.

DGI

Len

Value

8020

10 * N

0x13 file extension application enable protection key (16 bytes)

0x14 file extension application enable protection key (16 bytes)

..........

 


1.3 9020: key verification value enabled for extended applications

DGI data is composed of the following data. The Checksum value (KCV) is composed of 8 bytes of each key pair in 8020 and 3 bytes left after encryption. The Checksum key order must be the same as that in 8020.

DGI

Len

Value

9020

03 * N

0x13 file Compound Application enable protection key verification value (3 bytes)

0x14 file Compound Application enable protection key verification value (3 bytes)

.......

 

 

 

2 Append Record: add industry application records

 

CPURESET () 00A4040008A00000033301010180CA9F3605 (ATC + 9000) ATC = COPY (ATC) ATC = 000000000000 + ATCCAPPK1 = encrypt // application activation key CAPPK2 = encrypt // record modification key // write 0X16 into file record B0: 10110 000ECB_3DES_EN (CAPPK2, CAPPK1, KEY2) HMD = 04E200A81E + KEY2 + 057007 + STRING (8000000000) // TLV3DES_MAC (ATC + HMD +, CAPPK1, MAC) HMD + MAC // write 0X1e cyclic file record ECB_3DES_EN (CAPPK2, CAPPK1, KEY2) HMD = 04E200F01E + KEY2 + 057007 + STRING (8000000000) 3DES_MAC (ATC + HMD +, CAPPK1, MAC) for details about HMD + MAC, see the new RECORD (record append Command) in specification 14 A.3)


 


3 (READ extended application data) command DATACAPP READ

CPURESET () 00A4040008A00000033301010180B400A8020570 // read 0X15 and convert it into a file. The 0570 record 00B201F400 // read the 0X1E circular file, the first record



 

 

4. segment deduction transaction process


4.1 DF60 = 01

2> application initialization (required): <commad 00A4040008A000000333010101/> 


 

4.2 DF60 = 01, RMAC read

</Pre> <pre code_snippet_id = "491671" snippet_file_name = "blog_20151121_2_5217923" name = "code" class = "cpp"> 2.1> read cappdata: √ CARDS support both fee deduction and offline pre-authorization <commad 80B400b00A05701234567812345678/> <return 0570070000000000000000001c895f11 (4-byte RMAC)/> 



4.3 Flowchart

 

 

 

 

5 offline pre-authorized transactions


Indicates to select or execute offline pre-authorized transactions. The value 02 of DF60 indicates to select or execute offline pre-authorized transactions. The value 03 of DF60 indicates to complete transactions. For the flowchart, see section 13. Offline pre-authorized transactions.

 


Text/Xin Xinyuan Chong  Reprinted please indicate the source http://blog.csdn.net/yxstars/article/details/40350311


DNF can be used to buy extensions. QP will initialize two extensions.

After you buy it, you won't initialize it, but after you switch the skill, your tp qp has never been added.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.