Reprinted please indicate the source
Author: Pony
For more information about the concept of deposit, see my other article (e-cash application ):
Http://blog.csdn.net/pony_maggie/archive/2010/01/29/5270573.aspx
The promotion of PBOC/EMV in China not only brings about the change of IC card, but also will inevitably lead to changes in the entire industry, including financial terminal products. this article describes the changes that PBOC/
Reprinted please indicate the source
Author: Pony
Most of PBOC's IC card data is in the TLV format. EMV manual describes simple encoding rules.I will analyze the TLV encoding format in detail and provide the corresponding pseudo code for TLV decoding.
TLV is the abbreviation of tag, length, and value. A basic data element includes the above three fields. The tag uniquely identifies the data element, and length is the length of the Value Field.Value
tag '4f 'can appear after '50. I used to think that the Order was fixed until the case of EMV L2 was upgraded in 2012.12.1. I added a case dedicated to test this, so that I could know that this order can be changed. this case is written as follows:
Objective:
To ensure that the terminal accepts a response to read record on
A payment ststem directory file with data stored in an order different
From example given in
PBOC/EMV has two very important concepts,SDA (static data authentication) and DDA (Dynamic Data authentication), respectively called Static data authentication and Dynamic Data authentication . These two certifications are certified offline (off-line) . the principle of SDA implementation is digital signature . The process is as follows: The data in the IC card first sign, it is to use a hash to generate a short representation of the data as a summa
Reprinted please indicate the sourceAuthor: Pony
Before reading this article, we recommend that you understand the working principles of asymmetric encryption and decryption.
SDA means static data authentication. First, how to understand this
Reprinted please indicate the source
Author: Pony
CDA is actually a derivative method of DDA, so it has many similarities with DDA. First, briefly describe several key points of CDA:
1. It also executes SDA, which is consistent with DDA.
Reprinted please indicate the source
Author: Pony
In the previous article, we talked about SDA. The steps of DDA can be understood as follows: Execute SDA first, and then perform the steps unique to DDA. this article focuses on this unique step.
Reprinted please indicate the source
Author: Pony
Strictly speaking, the 9f5d concept is qpboc, And the offline balance is available. 9f79 is called an electronic cash balance. since qpboc and e-cash are not completely independent concepts, and the
The purpose of the application selection is to select an application for the transaction being executed. Step: First create the application candidate list, then select an app from the candidate list. I. Creating a candidate list
Establish a list of
DirectoryOne, "soft mask" and "Hard Mask" ... 2Second, EMV migration process ... 3Third, the PBOC norms and the EMV standard comparison ... 3Iv. Summary ... 5V. About SDA and DDA. 6One, "soft mask" and "Hard Mask"The terms "soft mask" and "hard mask" are often used in field tests and smart card operating systems. Strictly speaking, both terms are meaningless from a purely logical point of view, because the
1. Clear two specifications, a. ISO7816 B.EMV Specification/PBOC specifications, the difference between the two, 7816 is ISO formulated, is an international norm, and the EMV specification is the card organization, is to follow the ISO7816 norms, the PBoC is copied EMV norms, must also follow the ISO7816 specification.2. Several common file types:A. Mf,df,ef, this is the file defined in ISO7816, MF is also
according to the transaction and response code. The processing flow of the POS terminal to various trades is as follows:1. Read Card processingFor POS terminals that support IC card transactions, if the cardholder is using a magnetic stripe card with a chip, the operator should first attempt to trade using an IC card.For a POS terminal that supports EMV transactions, when the magnetic stripe of the card is first read, and the service code in the trac
Preface:
Natural Language Processing (NLP) is widely used in speech recognition, machine translation, and automatic Q . The early natural language processing technology was based on "part of speech" and "Syntax". By the end of 1970s, it was replaced by the "Mathematical Statistics" method. For more information about NLP history, see the book the beauty of mathematics.
This series follows Professor Stanford Dan jurafsky and Assistant Professor Christopher Manning to learn more about NLP. Includin
Stream| string from the Sun Web site to see the stream tokenizing
In Tech Tips:june, 1998, a example of string tokenization was presented, using the class Java.util.StringTokenizer.
There ' s also another way to do tokenization, using Java.io.StreamTokenizer. Streamtokenizer operates on input streams rather than strings, and each byte into the input stream is regarded as a characte R in the range ' \u0000
recovery rate = 1/dynamic payback period x100%
Benefit-cost ratio (b-c ratio, benefit-cost Ratio) = Net benefit (present or yearly)/net cost (present or yearly value)
Project resource Utilization Dipp = Emv/etc, in which EMV: refers to the expected monetary value of the project, and if the payment risk is considered, the expected currency value is the individual payment value and the
The sum of the produc
This article is in the study process of their own problems encountered, organized.To facilitate the subsequent reference, the data for a section of the TLV structure is listed first:[6F] 4d│├─[ -] -A0000003330101│├─[a5] the││├─[ -] 0B 50424f4320437265646974││├─[ the] on on││├─[9f38] .9f33039f4e14││├─[5f2d] ,7a68656e66726465││├─[9f11] on on││├─[9f12] 0F 4341524420494d4147452030303031││├─[bf0c] to│││└─[9F4D] Geneva0b0a
BER-TLV data Object Structure
Tag (tag)
According to ISO/IE
federation (for more corpora, check the linguistic data Consortium): http://www.ldc.upenn.edu/e) Corpus content (Corpus Content) I. Type (GENRE): – News, novel, broadcast, session (Newswires, novels, broadcast, spontaneous conversations) Ii. Media (Media): text, audio, video (text, audios, videos) iii. Callout (Annotations): tokenization, Syntax tree (syntactic trees), semantics (semantic senses), translation (translations) f) Callout example (Exampl
://github.com/grangier/python-gooseIi. python Text Processing toolsetAfter obtaining the text data from the webpage, according to the task different, needs to carry on the basic text processing, for example in English, needs the basic tokenize, for Chinese, then needs the common Chinese word participle, further words, regardless English Chinese, also can the part of speech annotation, the syntactic analysis, the keyword extraction, the text classification , emotional analysis and so on. This asp
requirements document commercial contract effect.2, combined with figure 17.5, describes the retrospective, retrospective.A: a): Traceability: From customer needs-"demand-" downstream work productsb): Backtracking: From downstream work products-"demand-" customer needs3, the daily function of the PMO, strategic functions, what are the respective?A) daily sexual functions include:1 Establish a supportive environment for project management within an organization2 Training Project Management staff
track data, Z .. 35, llvar. one byte indicates the length (37), followed by the magnetic track data represented by 19 bytes BCD
Field 41, terminal number, ans8, fixed length, ASCII, the terminal number is "00001111"
Field 42, merchant ID, ans15, fixed length, ASCII representation, here the Merchant number is "102250153111111"
Field 49, currency code, N3, fixed length. After the preceding value is 0, it is represented by two bytes of BCD. The currency code here is "156"
01 80 9f 10 13 07 01
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.