Banks' TUPAS certification service for service providers

Size: px
Start display at page:

Download "Banks' TUPAS certification service for service providers"

Transcription

1 Banks' TUPAS certification service for service providers service provider's FK Federation of Finnish Financial Services

2 for service providers CHANGE LOG Version Page Comment V2.0 All Message structures changed V2.1 New banks added, some wordings changed V2.2 New message fields and message field attributes. Check from your bank whether the new attributes have been taken into use. APPROVAL Version code Date Approved by V Payment Transactions Subcommittee V Payment Transactions Subcommittee V Payment Transactions Subcommittee

3 for service providers Contents Page 1 TUPAS CERTIFICATION SERVICE Agreeing upon bank identifiers and the customer authentication Bank identifiers for private customers Bank identifiers for business/corporate customers Agreement on the use of Certification service General description of Tupas-service Service functionality Service security Definition of strong authentication FUNCTIONAL SERVICE DESCRIPTION MESSAGES IN THE TUPAS CERTIFICATION SERVICE AND RELATED DATA Certificate request Certificate request field descriptions: orming the MAC for the certificate request (A01Y_MAC) Certificate and identifier Certificate message field descriptions MAC calculation for in the Certificate Type of identification data Identifier in plain text Encrypted identifier Comparing the encrypted identifier data and authenticating the customer Bank-specific buttons Exceptional situations CHANGING THE PASS PHRASE CHARACTER SET USED IN THE SERVICE... 16

4 for service providers APPENDIX 1 BANK-SPECIFIC CONTACT INFORMATION APPENDIX 2 TYPE OF IDENTIFIER IN CERTIFICATE REQUEST (A01Y_IDTYPE) APPENDIX 3 CUSTOMER IDENTIFIER IN THE CERTIFICATE... 21

5 1 1 TUPAS certification service Banks Tupas-certification service (hereinafter Certification service ) allows businesses or corporations (hereinafter service provider ) providing electronic services on the Internet to authenticate their customers using Tupas certificates. Within certfication service, the bank authenticates its customer by a strong authentication method (see Section 1.6). Tupascertificates provided by the service can also be used for electronic signatures, if so agreed between the customer authenticating him/herself and the service provider. The certification service is jointly specified by the banks. Each bank authenticates its customers through the same bank-specific identifiers that the customer uses in the bank s own services. 1.1 Agreeing upon bank identifiers and the customer authentication Certification service is accessed through bank-specific identifiers (hereafter bank identifiers ) created and issued by a bank for its customer. For example, these can be a combination of a user ID and one-time passwords. Bank identifiers are always personal regardless of whether they are issued for use with private or business/corporate customers. Banks can use subcontractors and agents in their operations as long as the models of cooperation are compliant with the Credit Institutions Act and standards issued by the Finnish Financial Supervision Authority by virtue of the Act Bank identifiers for private customers A customer can gain personal bank identifiers on the basis of a written agreement. The individual concerned must always sign personally the agreement. The customer cannot authorise another person to sign the agreement on his/her behalf. Banks have a statutory obligation to authenticate their customers. At a bank branch or a bank s subcontractor s or agent s office, the customer s identity is verified in a manner approved by the Financial Supervision Authority using an official identity document approved by the bank, such as a driving licence, personal identity card, passport or social insurance card with photo. The first bank identifiers must be fetched in person to enable a reliable customer authentication. Subsequent one-time identifiers can then be mailed to the customer. The customer cannot authorise anyone else to fetch the identifiers for the customer.

6 Bank identifiers for business/corporate customers When making an agreement on bank identifiers for business/corporate use, the bank identifiers are agreed on and fetched in compliance with the provisions of Section above as applicable and with the practice accepted by the Finnish Financial Supervision Authority. 1.2 Agreement on the use of Certification service The service provider must enter into a contract regarding Certification service with all of the banks whose services are to be used. A separate contract must be made with each bank. Bank-specific contact information is included in Appendix 1 to this description. Certification service implementation date is agreed upon when preparing the contract. The service provider s data is registered in each bank and the service provider notifies each bank separately when changes occur to the contract data. Once the contract has been signed, the bank delivers the bank-specific service identifier and pass phrase to the service provider. The data is delivered to the service provider through a bank-specific procedure, either electronically or in paper format. The bank-specific data used in the testing phase is available with the service descriptions of each bank. The service provider can test the service in a production environment by using bank-specific testing identifiers before signing the contract. 1.3 General description of Tupas-service The customer authenticating him/herself plays a central role in the service. The customer controls the transmission of data between the service provider and the bank. The bank and the service provider are not in direct contact with each other during the service. When the service provider needs to authenticate a customer, the service provider sends a certification request to the customer, who is transferred to the bank s authentication service by clicking on the link leading to the bank s authentication service. The service provider s certification request is transmitted from the customer to the bank s Certificate service, which sends a response message to the customer ( the Certificate ). The customer checks the certificate s data. If the customer approves it, he/she returns to the service provider s service and the Certificate is transmitted to the service provider. If the customer so wishes, he/she is allowed to cancel the authentication transaction before authenticating him/herself to the bank s service or reject the Certificate given by the bank.

7 3 The service provider and customer may agree on using the certificate as a component in an electronic signature used for a legal transaction between the customer and the service provider. However, the bank is only responsible for authenticating the customer as specified in this service description. The bank is not responsible for the validity or content of the legal transaction between the customer and the service provider. 1.4 Service functionality The Certificate provided by the bank is unique and tied to the service transaction in question and to the customer with a time stamp. The Certification service contains several functionalities and possibilities for use depending on the type of the Certificate specified in the service agreement between the service provider and the bank. The certificate issued by a bank always includes the name of the customer (person and/or company). Any additional identification information can be either plain text or encrypted. If the identification information is plain text, the bank may transmit either the customer s personal identity number, the last four characters of the personal identity number, a Business Identity Code (hereinafter Business ID ) or other electronic transaction identifier in accordance with the service agreement. The bank will only transmit personal identity numbers in plain text to service providers authorised to register them. If the identification information is encrypted, the bank will provide the service provider with an identifier based on the customer s personal identity number, Business ID or other electronic transaction identifier. The actual personal identity number or other identifier will not be transmitted with the response message. Thus the service provider must have access to the customer s personal identity number, Business ID or other electronic transaction identifier in order to ensure the correct authentication of the customer s identity based on the response message provided by the bank. If the service provider does not possess the customer s code, it should be requested before sending the certificate request. This functionality is suitable for verifying the validity of data submitted by the customer by comparing the data with the data stored at the bank. The Certification service is mainly applicable to consumer services. Some banks are able to identify a corporate user through the Business ID, but not all banks offer certification service certifying corporate customers. When authenticating banks corporate customers, the banks can give, together with the certificate, either the customer s Business ID and the company name or

8 4 the customer s Business ID, company name, name of person and personal identity code Service security The SSL protocol is used in data communication between the parties of the certification service, preventing external parties from viewing the information or changing any of it. The service provider s server software must support SSL encryption implemented with 128-bit keys. The length of the key used in the session is based on the properties of the customer s browser. The Certification request and the Certificate are protected with a message authentication code ensuring data integrity, so it is not possible for the customer who controls the Certificate transmission to alter the data without the service provider or the bank noticing it. Each party is responsible for the protection and security of its own services and correctness of the data stored by them. The customer authenticating him/herself is responsible for making sure that the identifiers provided by the bank do not fall into the hands of any third parties. The service provider s service must include a notice specifying that the service uses certification service employing the customer s personal bank identifiers or corporate bank identifiers. The service provider must edit the notice text in its service according to whether the service provider wants to authenticate private customers and/or corporate customers. 1.6 Definition of strong authentication A strong authentication of a person comprises something that the user: 1) knows (such as a user ID), 2) possesses (such as a list of passwords), 3) is (such as a fingerprint). An authentication transaction can be considered to comply with the definition of the strong authentication if two of these requirements are fulfilled simultaneously. In addition to the strong authentication, the transaction must be based on a sufficiently secure procedure. One-time passwords fulfil the criteria for a strong authentication. This means that the sole combination of a fixed password and user ID does not fulfil the criteria for the strong authentication required in the Certification service.

9 5 2 Functional service description Customer Service provider Service screens 1 2 Customer service Certificate request Bank's customer authentication Customer's bank Customer authentication and Tupas certification service 8 Approval of Certificate data Service terms 6 7 Tupas Certificate Explanation of the chart describing service progression: 1. The customer identifying him/herself is in contact with the service provider s service. The data communication between the customer and the service provider must be SSL-protected when the customer begins to enter data related to the certification service. During phases 2 to 7, the data transfer link is always SSL-protected. 2. The service provider sends to the customer a certification request containing specification data related to the transaction. The customer verifies the data in the request, but cannot alter it. The customer can, however, interrupt the authentication process, if desired, and return to customer service. The certification request page in the customer s browser includes function buttons leading to the banks certification service and a Cancel button. 3. The customer clicks on a button transferring him/her to his/her bank s certification service. The certificate request transmitted to the bank contains

10 6 the data on the service provider and transaction. The bank verifies the integrity of the request and the correctness of the data. 4. The bank sends an authentication request to the customer if the service provider s certificate request is valid. The bank gives the customer an error notification if the bank notices errors in the request. Then the customer returns to the service provider s service by clicking the Cancel button. 5. The customer authenticates him/herself in the certification service of the bank. The bank returns an error message to the customer if the authentication fails, and the customer returns to the service provider s service by clicking the Cancel button. 6. After successful authentication, the bank generates the certificate. The certification service activates Accept and Cancel buttons for the customer. 7. The customer verifies the Certificate and approves the identification data to be transmitted to the service provider. By clicking Cancel, the customer can interrupt the authentication process and return to the service provider s service. 8. The service provider verifies the integrity and uniqueness of the Certificate received. The service provider attaches the Certificate to the customer s service transaction and stores it for as long as other service data is stored. Customer identification data must not be registered or used for any other purpose.

11 7 3 Messages in the TUPAS certification service and related data 3.1 Certificate request Certificate request data lies behind the bank-specific button or icon in the FORM data group, as hidden variables. CERTIFICATE REQUEST Field Name of data Length Comment 1. Type of message A01Y_ACTION_ID 3-4 Standard, "701" 2. Version A01Y_VERS 4 For example, "0002" 3. Service provider A01Y_RCVID Customer code 4. Service language A01Y_LANGCODE 2 ISO 639 identifier: FI = Finnish SV = Swedish EN = English 5. Request identifier A01Y_STAMP 20 yyyymmddhhmmssxx xxxx 6. Type of identifier A01Y_IDTYPE 2 See Appendix 2 7. Return address A01Y_RETLINK 199 OK return address for Certificate 8. Cancel address A01Y_CANLINK 199 Return address in cancellation 9. Rejected address A01Y_REJLINK 199 Return address in error situations 10. Key version A01Y_KEYVERS 4 Key generation data 11. Algorithm A01Y_ALG 2 01 = MD5 02 = SHA Control field A01Y_MAC Message Authentication Code of request Data field names are written in capital letters. The HTML structure of the FORM data group is: <FORM METHOD= POST ACTION= bank certification service URL > <INPUT NAME= A01Y_ACTION_ID TYPE= hidden VALUE= 701 > <INPUT NAME= A01Y_VERS TYPE="hidden VALUE=... > <INPUT NAME= A01Y_RCVID TYPE="hidden VALUE=... > <INPUT NAME= A01Y_LANGCODE TYPE="hidden VALUE=... > <INPUT NAME= A01Y_STAMP TYPE="hidden VALUE=... >

12 8 <INPUT NAME= A01Y_IDTYPE TYPE="hidden VALUE=... > <INPUT NAME= A01Y_RETLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_CANLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_REJLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_KEYVERS TYPE="hidden VALUE=... > <INPUT NAME= A01Y_ALG TYPE="hidden VALUE=... > <INPUT NAME= A01Y_MAC TYPE="hidden VALUE=... > </FORM> 3.2 Certificate request field descriptions: Version number of the certificate request message, which is bank- Field 1 service. Field 2 specific. Field 3 Type of message, which is a standard "701" in the certification Service provider s bank-specific customer identifier. The bank identifies the service provider based on the customer code and attaches to the certificate the service provider s name existing in its register. Field 4 The language code of the service indicates the language of the service provider s page, and the bank certification service opens in this language. Field 5 Individual code assigned to the certificate request by the service provider. The identifier can be a reference or customer number or a combination of the date, time and running identifier, as well as a reference number. Field 6 The identifier type shows what kind of an identifier the service provider wants from the customer to be authenticated. The identifier type must correspond to the functionality agreed upon in the service contract. Field 7 This is the address of the service provider s page where the service continues when OK. The service address must start with https - that is, the page must be SSL protected. Example: VALUE=" Field 8 Continuation point for the service provider s service in case the customer cancels the transmission of the Certificate.

13 9 Example: VALUE=" Field 9 Continuation point for the service provider s service in case of a technical error during identification. The return address can be the same as in field 8. Example: VALUE=" Field 10 Key version used in MAC calculation. Field 11 Algorithm type code used in MAC calculation. 01 = MD5 algorithm, which produces a 32-character MAC 01 = SHA-1 algorithm, which produces a 40-character MAC. Field 12 Message Authentication Code (MAC), calculated from the data to be protected in the certificate request and the service provider s pass phrase using the algorithm defined in data field 11. Using the MAC, the recipient can verify the integrity of the certificate request and authenticate the sender. 3.3 Forming the MAC for the certificate request (A01Y_MAC) The service provider forms a bank-specific certificate request for each bank s button, protected by a MAC attached to each request. The MAC is calculated from the bank-specific certificate request s FORM data group using the pass phrase given to the service provider by the specific bank. The calculation starts by forming a character string from the VALUE of all data fields in the FORM data group preceding the MAC (fields 1 to 11) and the service provider s pass phrase. The data is combined into character strings in sequence, and any blanks serving as fill characters are left out. The data groups in the character string are separated by & characters. An & character is also placed between the last data (field 11) and the pass phrase, as well as at the end of the pass phrase. The & characters are included in the MAC calculation. The data appears on one single line. " " indicates a line break in this document. A01Y_ACTION_ID&A01Y_VERS&A01Y_RCVID&A01Y_LANGCODE& A01Y_STAMP&A01Y_IDTYPE&A01Y_RETLINK&A01Y_CANLINK& A01Y_REJLINK&A01Y_KEYVERS&A01Y_ALG&passphrase&

14 10 The calculated MAC is converted into hexadecimal form, in which characters from A to F are represented in capitals. The hexadecimal hash value is taken to the Control field. 3.4 Certificate and identifier CERTIFICATE Field Name of data Length Obligato- Comment riness 1 1. Version B02K_VERS 4 O For example, "0002" 2. Certificate identification B02K_TIMESTMP 23 O NNNyyyymmddh hmmssxxxxxx 3. Certificate number B02K_IDNBR 10 O Number assigned to the identifier by the bank 4. Request identifier B02K_STAMP 20 O Request data field 7 (A01Y_STAMP) 5. Customer B02K_CUSTNAME 40 O Name of person or company authenticated that is in the bank s database 6. Key version B02K_KEYVERS 4 O Key generation 7. Algorithm B02K_ALG 2 O 01 = MD5 02 = SHA-1 8. Identifier B02K_CUSTID -40 O See Appendix 3 9. Type of identifier B02K_CUSTTYPE 2 O See Appendix User ID B02K_USERID -40 R Corporate user s social security number or encrypted identifier See appendix User name B02K_USERNAME -40 R Corporate user s name See appendix Control field B02K_MAC O MAC of the Certificate 1 Obligatoriness of the data: O = obligatory R = at request only

15 11 The customer s bank adds the certificate data in the response message to the OK return link in so-called query-string format. B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&B02K_CUSTID& &B02K_MAC The data BO2K_USERID and BO2K_USERNAME_are optional and are included only with identifier values 3.5 Certificate message field descriptions Field 1 Version number of the certificate message, which is bank-specific. Field 2 Time stamp formed by the bank s system, in which NNN is the bank s number: Handelsbanken = 310 Nordea Bank Finland = 200 OP Bank Group = 500 Sampo Bank = 800 Savings banks and local co-op banks = 400 Tapiola Bank = 360 Bank of Åland = 600 Field 3 Data provided for the Certificate by the bank s information system, uniquely identifying the Certificate in the bank s system. Field 4 Identification of the certificate request, picked from data field 7 in the certificate request in question (A01Y_STAMP) Field 5 Name of authenticated customer according to the bank s customer database. Field 6 Generation number of the MAC pass phrase. Field 7 MAC algorithm code. Field 8 Customer identifier with contents depending on the A01Y_IDTYPE field in the certificate request. The field may contain a customer identifier either in encrypted or in plain text format. Field 9 Type of identifier. Field 10 Corporate user s social security number or encrypted identifier.

16 12 Field 11 Corporate user s name. Field 12 MAC code of the certificate 3.6 MAC calculation for in the Certificate The control code (BO2K_MAC)is calculated from the original message, after which the Scandinavian characters and certain special characters (eg blank spaces, equal signs and quotation marks) are replaced in the corresponding hexadecimall character (eg %20) in the data communication message. The bank calculates the MAC of the Certificate with a service provider specific key. With the MAC the service provider can ensure that the Certificate has been formed at the customer s bank and that its contents are unchanged. With the Certificate s identifier type values the MAC is calculated using data fields 1 to 9 in the Certificate. When calculating the MAC, the data and the pass phrase are separated by an "&" character. The character is also appended at the end of the pass phrase. The service provider-specific key is used in calculating the MAC. MAC calculation is not executed for the optional fields 10 & 11 when they are empty and are not returned to the service provider. B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG& B02K_CUSTTYPE&passphrase& with the Certificate s identifier type values the MAC is calculated using data fields 1 to 11 in the certificate. When calculating the MAC, the data and the pass phrase are separated by an "&" character. The character is also appended at the end of the pass phrase. The service provider-specific key is used in calculating the MAC B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&B02K_CUSTID B02K_CUSTTYPE&BO2K_USERID&B02K_USERNAME&passphase& 3.7 Type of identification data The type of the identifier to be transmitted, specified in the A01Y_IDTYPE field of the certificate request, affects the response message MAC calculation.

17 Identifier in plain text The value of the A01Y_IDTYPE field in the certificate request is 02 or 03 - that is, basic identifier or truncated basic identifier in plain text. The identifier is a character string in plain text - for example, a personal identity number or the last four characters thereof - in accordance with the A01Y_IDTYPE field in the request message. The identifier will be assigned to the data field B02K_CUSTID in the Certificate in an unchanged form Encrypted identifier The value of the A01Y_IDTYPE field in the certificate request is 01 - that is, encrypted basic identifier. The bank uses the same hash algorithm for encrypting the identifier as is used for the MAC fields. The uniqueness of the identifier is ensured by using the data in the certificate data fields 2 to 4 and the customer identifier (personal identity number or Business ID) in accordance with data field 8 (A01Y_IDTYPE) in the request message as additional data. When calculating the encrypted identifier, the data and the pass phrase are separated by an "&" character. The character is also appended at the end of the pass phrase. The service provider-specific key is used for encryption. B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& customer_identifier&passphrase& The result of the calculation is converted into hexadecimal form, in which characters from A to F are represented in capitals. The final result is a character string identifying the customer. The string will be used in the B02K_CUSTID field of the Certificate. 3.8 Comparing the encrypted identifier data and authenticating the customer If the identifier is encrypted, the service provider first verifies the integrity of the Certificate. Then the service provider calculates the comparison data for the customer identifier as described in section on the basis of the customer code stored in its register. When the calculated comparison data and the identifier of the received message are identical and the message is intact, the data for the customer authenticated by the bank corresponds to that for the customer registered by the service provider.

18 Bank-specific buttons The image files for bank-specific buttons can be obtained from a website at an address separately specified by each bank. The size or colour of the buttons must not be changed. The button image must not be used for purposes other than those that have been agreed upon between the service provider and the bank Exceptional situations The service provider must be prepared for exceptional occasions, which include: 1. Customer interrupts the authentication process The customer can interrupt the transaction by clicking the Cancel button, either before the certificate request has been sent to the bank or after receiving the Certificate. The address for the Cancel button is the Cancel address in FORM data field 8 of the certificate request. 2. Customer authentication failed Customer authentication may fail if there are errors in the identifier or if the customer has requested authentication at a wrong bank. The customer can return to the service provider s service by using the Cancel button. The address for the Cancel button is the Cancel address in FORM data field 8 of the certificate request. 3. The bank notices an error in the certificate request The bank notices an error in the identification request before the customer has been authenticated. The customer returns to the service provider s service using the Cancel button assigned to the Rejected address in FORM data field The service provider notices an error in the Certificate. The service provider notices an error when verifying the Certificate that might be due to an error in the Certificate content or because the data provided by the customer to the service provider does not match the data stored in the bank s information system. The service provider should provide the customer with information relevant to the situation at hand.

19 15 5. There is no response at all The reason for the interruption may be a connection break or other technical disturbance, or the customer terminating the session halfway through. 6. The same response comes several times The service provider must be prepared for that the customer will send the same response several times or resend an old certificate when moving between browser windows with the back/forward buttons. 4 Changing the pass phrase The pass phrase (key) used when calculating the MAC values can be changed if the bank or service provider so wishes. Bank-specific procedures are used when changing the key, and these are described in the bank-specific system descriptions. Two bank-specific procedures are used when changing the key: Only the pass phrase is changed, the service provider s customer ID remains the same. Both the pass phrase and the customer ID are changed. The pass phrase is delivered to the contact person named in the contract. At the same time, the information on the new key s version number and the effective date will also be delivered. From that date onwards, all MACs will be calculated using the new key. In order to guarantee a smooth change between keys, the service provider s system must enable the entry of the new key into the system ahead of time - in other words, the simultaneous use of at least two pass phrases. At the time of transfer (for a period of about 15 minutes), it is possible that the MACs in some Certificates arriving to the service provider have been calculated using the old key and the rest have been calculated using the new key. Once the new pass phrase has been successfully taken into use, the old key can be deleted or deactivated in the service provider s system.

20 16 5 CHARACTER SET USED IN THE SERVICE An 8-bit ISO (Latin1) character set is used in the service, the codes of which are listed in the table below. æ %00 %01 %02 %03 %04 %05 %06 % %30 %31 %32 %33 %34 %35 %36 %37 ` a b c d e f g %60 %61 %62 %63 %64 %65 %66 %67 %90 %91 %92 %93 %94 %95 %96 %97 À Á Â Ã Ä Å Æ Ç %c0 %c1 %c2 %c3 %c4 %c5 %c6 %c7 ð ñ ò ó ô õ ö %f0 %f1 %f2 %f3 %f4 %f5 %f6 %f7 backspace tab linefeed c return %08 %09 %0a %0b %0c %0d %0e %0f 8 9 : ; < = >? %38 %39 %3a %3b %3c %3d %3e %3f h i j k l m n o %68 %69 %6a %6b %6c %6d %6e %6f š œ Ÿ %98 %99 %9a %9b %9c %9d %9e %9f È É Ê Ë Ì Í Î Ï %c8 %c9 %ca %cb %cc %cd %ce %cf ø ù ú û ü ý þ ÿ %f8 %f9 %fa %fb %fc %fd %fe %ff %10 %11 %12 %13 %14 %15 %16 A B C D E F G %40 %41 %42 %43 %44 %45 %46 %47 p q r s t u v w %70 %71 %72 %73 %74 %75 %76 %77 %a0 %a1 %a2 %a3 %a4 %a5 %a6 %a7 Ð Ñ Ò Ó Ô Õ Ö %d0 %d1 %d2 %d3 %d4 %d5 %d6 %d7 %18 %19 %1a %1b %1c %1d %1e %1f H I J K L M N O %48 %49 %4a %4b %4c %4d %4e %4f x y z { } ~ %78 %79 %7a %7b %7c %7d %7e %7f ª «%a8 %a9 %aa %ab %ac %ad %ae %af Ø Ù Ú Û Ü Ý Þ ß %d8 %d9 %da %db %dc %dd %de %df Space! " # $ % & ' %20 %21 %22 %23 %24 %25 %26 %27 P Q R S T U V W %50 %51 %52 %53 %54 %55 %56 %57 ƒ %80 %81 %82 %83 %84 %85 %86 %87 ± ² ³ µ %b0 %b1 %b2 %b3 %b4 %b5 %b6 %b7 à á â ã ä å æ ç %e0 %e1 %e2 %e3 %e4 %e5 %e6 %e7

21 17 ( ) * +, -. / %28 %29 %2a %2b %2c %2d %2e %2f X Y Z [ \ ] ^ _ %58 %59 %5a %5b %5c %5d %5e %5f ˆ Š Œ Ž %88 %89 %8a %8b %8c %8d %8e %8f ¹ º» ¼ ½ ¾ %b8 %b9 %ba %bb %bc %bd %be %bf è é ê ë ì í î ï %e8 %e9 %ea %eb %ec %ed %ee %ef

22 18 APPENDIX 1 BANK-SPECIFIC CONTACT INFORMATION HANDELSBANKEN Contract issues: Local branch Codes and keys: Collected from the bank Customer support and technical problems: HelpDesk During weekdays finhelp@handelsbanken.fi NORDEA Contract issues: Local branch Codes and keys: Delivered by mail to the contact person named in the contract. Customer support and technical problems: Solo information for corporate customers In Finnish: (0.11 /min + local network/mobile call fee) During weekdays between 8 18 In Swedish: (0.11 /min + local network/mobile call fee) During weekdays In English: (0.11 /min + local network/mobile call fee) During weekdays 9 18 Solo.tori@nordea.fi OP BANK GROUP Contract issues: Codes and keys: Customer support: SAMPO BANK Contract issues: Local OP bank To be collected from a branch of the bank OP Bank phone service: In Finnish: In Swedish: verkkopainikkeet@op.fi Local branch or phone (local n etwork/mobile call fee) Mon Fri 8 17

23 19 Codes and keys: Will be delivered on diskette in a sealed mail package Customer support and technical problems: Private customers (local network/mobile call fee), Mon Fri 9 18 Corporate customers (1.17 /min +local network/mobile fee), Mon Fri asiakastuki.ml@sampo.fi or varmennepalvelu@sampo.fi SAVINGS BANKS AND LOCAL CO-OPERATIVE BANKS Contract issues: Local branch Codes and keys: Collected from the bank Customer support and technical problems: phone (1.17 /min + local network fee) info@samlink.fi TAPIOLA BANK Contract issues Codes and keys Tapiola electronic services Delivered to the contact person named in the contract Customer support and technical problems: Private customers (Mon Fri) tunnistuspalvelu@tapiola.fi BANK OF ÅLAND Contract issues: Customer code: Customer support and technical problems: Local branch Delivered at the branch upon signing the contract. The pass phrase is mailed to the contact person named in the contract. Contact Center customer service In Finnish: In Swedish: During weekdays Mon Thu , Fri contactcenter@alandsbanken.fi

24 20 APPENDIX 2 TYPE OF IDENTIFIER IN CERTIFICATE REQUEST (A01Y_IDTYPE) Data field 6 in the certificate request specifies the type of identifier requested. The type is encoded with two characters XY as follows: The first figure (X) indicates the contents of the type of identifier requested: 0Y = basic identifier 1Y = personal identity number 2Y = Business ID 3Y = personal identity number or Business ID 4Y = personal identity number and Business ID 5Y = personal identity number and Business ID or personal identity number alone The latter figure (Y) indicates the form of the identifier requested: X1 = Encrypted identifier A hexadecimal MAC (Message Authentication Code) calculated on the basis of the customer s identification data. X2 = Identifier in plain text The identifier can be the customer s complete personal identity number, an electronic transaction identifier or a complete Business ID. 03 = Truncated identifier A truncated identifier can contain the last four characters of the personal identity number without the punctuation mark indicating century, or a complete Business ID. NB: Code 23 is not used.

25 21 APPENDIX 3 CUSTOMER IDENTIFIER IN THE CERTIFICATE The data field for identifier type (field 9) indicates the type of identifier data. The data is encoded with two characters XY so that the first figure indicates whether the requested information about the customer is in the bank's customer database. 0Y = The requested information was found. The Certificate is returned to the return address in the return address field of the certificate request. 00 = identifier not known Value "00" is used if no identifiers are found. 01 = personal identity number in plain text Value "01" is used if the request concerns an identifier in plain text and only the personal identity number is returned. Field 5 holds the customer's name and field 8 the personal identity number in plain text. 02 = last four characters of personal identity number in plain text Value "02" is used if the request concerns a truncated identifier and only the last four characters of the personal identity number are returned. Field 5 holds the customer's name and field 8 the last four characters of the personal identity number in plain text.

26 22 03 = Business ID in plain text Value "03" is used if the request concerns an identifier in plain text and only the Business ID is returned. Field 5 holds the company's name and field 8 the Business ID in plain text. 04 = electronic transaction identifier in plain text Value "04" is used if the request concerns an identifier in plain text and only the electronic transaction identifier is returned. Field 5 holds the customer's name and field 8 the electronic transaction identifier in plain text. 05 = encrypted personal identity number 06 = encrypted Business ID Value "05" is used if the request concerns an encrypted identifier and only the personal identity number is returned. Field 5 holds the customer's name and field 8 the encrypted personal identity number. Value "06" is used if the request concerns an encrypted identifier and only the Business ID is returned. Field 5 holds the company's name and field 8 the encrypted Business ID. 07 = encrypted electronic transaction identifier Value "07" is used if the request concerns an encrypted identifier and only the electronic transaction

27 23 identifier is returned (not in use at Sampo). Field 5 holds the customer's name and field 8 the encrypted electronic transaction identifier. 08 = Business ID and corporate user's personal identity number in plain text, or other identifier agreed between the service provider and the bank in plain text Value "08" is used if the request concerns identifiers in plain text. Field 5 holds the company's name, field 8 the Business ID in plain text, field 10 the corporate user's personal identity number in plain text and field 11 the corporate user's name. 09 = encrypted Business ID and encrypted corporate user's personal identity number, or other encrypted identifier agreed between the service provider and the bank Value "09" is used if the request has concerned encrypted identifiers. Field 5 holds the company's name, field 8 the encrypted Business ID, field 10 the corporate user's encrypted personal identity number and field 11 the corporate user's name. 1Y = The requested information or part of it was not found. The information in the type of identifier field (B02K_CUSTTYPE) is returned to the address in the rejected address field of the certificate request. The latter number (Y) in the type of identifier indicates what information was not found on the customer. In such cases, the service provider can automate its error messages to the customers in different situations.

28 24 10 = No requested information on the customer. 11 = No personal identity number for the customer. 12 = No Business ID for the customer. Example: A service provider wants to know the customer's personal identity number but the customer uses identifiers that only have a Business ID. The bank sends the information in the type of identifier field (B02K_CUSTTYPE) to the address in the rejected address field. In this case, field 9, type of identifier, holds the value 11.

29 Bulevardi 28 FI Helsinki, Finland Tel Fax

Banks Tupas Certification Service for Service Providers

Banks Tupas Certification Service for Service Providers Banks Tupas Certification Service for Service Providers Service description and guidelines Version 2.1 3 October 2005 SERVICE DESCRIPTION 2 (21) CHANGE LOG Version Page Comment V2.0 All Message structure

More information

PRECISION OF DANSKE BANK IDENTIFICATION SERVICE

PRECISION OF DANSKE BANK IDENTIFICATION SERVICE PRECISION OF DANSKE BANK IDENTIFICATION SERVICE Valid as from 31.12.2017 1. SERVICE DESCRIPTION Danske Bank Identification Service allows service providers to reliably identify private customers and corporations

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

ASCII Code - The extended ASCII table

ASCII Code - The extended ASCII table ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage

More information

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment

More information

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

Description AX5805. Default values for the permissible motors. Version: Date:

Description AX5805. Default values for the permissible motors. Version: Date: Description values for the permissible motors Version: 1.3.0 Date: 2017-06-01 Table of contents Table of contents 1 Foreword 2 1.1 Notes on the manual 2 1.1.1 Intendent audience 2 1.1.2 Origin of the

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

SMS API TECHNICAL SPECIFICATION

SMS API TECHNICAL SPECIFICATION SMS API TECHNICAL SPECIFICATION Version 2.1 Provision of the Click SMS Gateway Service is dependent upon compliance with the specifications contained in this document. Although Click SMS has taken reasonable

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

User Guide for Greek GGT-Fonts Revision date: 23 May, 2011

User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 by Graham G Thomason Copyright Graham G Thomason, 2009. Permission is granted to copy or publish this document, provided this complete notice

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

Triple DES and AES 192/256 Implementation Notes

Triple DES and AES 192/256 Implementation Notes Triple DES and AES 192/256 Implementation Notes Sample Password-to-Key and KeyChange results of Triple DES and AES 192/256 implementation For InterWorking Labs customers who require detailed information

More information

DENIC Domain Guidelines

DENIC Domain Guidelines The English translation of the DENIC Eszett Domain Guidelines is provided for the convenience of our non-german-speaking customers. Regardless of this, only the original German-language version is legally

More information

E-payment. Service description

E-payment. Service description E-payment Service description Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up... 4 2.1 Service

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats

More information

E-payment. Service description. September 2016

E-payment. Service description. September 2016 E-payment Service description September 2016 Content 1 E-payment 1.1 General description... 2 1.2 Advantages... 2 1.3 Availability... 2 1.4 Security... 2 2 Service agreement, instructions and start-up...

More information

ZN-DN312XE-M Quick User Guide

ZN-DN312XE-M Quick User Guide ZN-DN312XE-M Quick User Guide This manual provides instructions for quick installation and basic configuration of your IP device. Step1. Connect cables to IP device Connect required cables to the device

More information

Chemistry Hour Exam 2

Chemistry Hour Exam 2 Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total

More information

Acquirer JCB EMV Test Card Set

Acquirer JCB EMV Test Card Set Acquirer JCB EMV Test Card Set July, 2017 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

Pe h-ōe-jī Unicode Correspondence Table

Pe h-ōe-jī Unicode Correspondence Table Pe h-ōe-jī Correspondence Table This document contains the code points and font examples for characters needed to write Pe h-ōe-jī for Taiwanese (Hoklo). Standard latin capital and small letters are not

More information

6.1 Font Types. Font Types

6.1 Font Types. Font Types 6 Font This chapter explains basic features of GP-Pro EX's "Font" and basic ways of placing text with each font. Please start by reading "6.1 Font Types" (page 6-2) and then turn to the corresponding page.

More information

Gateway Ascii Command Protocol

Gateway Ascii Command Protocol Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4

More information

First Data Dual Interface EMV Test Card Set. Version 1.20

First Data Dual Interface EMV Test Card Set. Version 1.20 First Data Dual Interface EMV Test Card Set August, 2016 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

E-invoice. Service Description

E-invoice. Service Description E-invoice Service Description January 2017 Contents General description... 2 Benefits of the e-invoice... 2 Message descriptions... 2 E-invoice addresses... 3 E-invoice to file transfer... 3 Adoption of

More information

First Data EMV Test Card Set. Version 1.30

First Data EMV Test Card Set. Version 1.30 First Data EMV Test Card Set.30 January, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013 CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

text2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW).

text2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW). text2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW). Table of Contents API Interface Types...3 Bulk SMS interface...3

More information

First Data EMV Test Card Set. Version 2.00

First Data EMV Test Card Set. Version 2.00 First Data EMV Test Card Set.00 February, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

Scan Results - ( Essentials - Onsharp )

Scan Results -   ( Essentials - Onsharp ) Scan Results - www.onsharp.com ( Essentials - Onsharp ) Overview Open Ports (18) Scan ID: 7675527 Target: www.onsharp.com Max Score: 2.6 Compliance: Passing PCI compliance, Expires undefined Profile: 15

More information

VT420 Video Terminal Programmer Reference Manual Update

VT420 Video Terminal Programmer Reference Manual Update VT420 Video Terminal Programmer Reference Manual Update EK VT42P UP. A01 Digital Equipment Corporation The information in this document is subject to change without notice and should not be construed as

More information

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account

More information

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

TLS 1.2 Protocol Execution Transcript

TLS 1.2 Protocol Execution Transcript Appendix C TLS 1.2 Protocol Execution Transcript In Section 2.3, we overviewed a relatively simple protocol execution transcript for SSL 3.0. In this appendix, we do something similar for TLS 1.2. Since

More information

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module , Inc. DMX512 Four Channel Dimmer and Switch module Input: 5 Amps @ 6-24 VDC Outputs: 5 Amps Maximum each, total 4 outputs 8 Amps Maximum. FRONT BACK USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. Digital Lighting Systems, Inc. Four Channel Dry Contacts Relays Switch Pack DMX512 compatible USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION The is a 4-channel DMX-512 compatible electro-mechanical

More information

PCL ISO 8859/5 Latin/Cyrillic

PCL ISO 8859/5 Latin/Cyrillic Page 1 of 5 PCL Symbol Se t: 10N Unicode gly ph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space -- -- -- -- $21 U0021 Ê Exclamation mark -- -- -- -- $22 U0022 Ë Quotation

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( )

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( ) 6. Combinational Circuits George Boole (85 864) Claude Shannon (96 2) Signals and Wires Digital signals Binary (or logical ) values: or, on or off, high or low voltage Wires. Propagate digital signals

More information

General terms governing Nordea s 1 (6) e-invoice for companies January 2017

General terms governing Nordea s 1 (6) e-invoice for companies January 2017 General terms governing Nordea s 1 (6) 1. General remarks and scope of application E-invoice is a service through which Customers can send and receive e-invoices and other Finvoice messages by using an

More information

Acquirer JCB Dual Interface EMV Test Card Set

Acquirer JCB Dual Interface EMV Test Card Set Acquirer JCB Dual Interface EMV Test Card Set.00 July, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing and delivering this document

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 ANNOUNCEMENTS TA Office Hours (ITE 334): Genaro Hernandez, Jr. Mon 10am 12noon Roshan Ghumare Wed 10am 12noon Prof.

More information

First Data DCC Test Card Set. Version 1.30

First Data DCC Test Card Set. Version 1.30 First Data DCC Test Card Set.30 April, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission The following translation is provided for your convenience only. The original German text Bedingungen für Datenfernübertragung is binding in all respects.

More information

UNH-IOL MIPI Alliance Test Program

UNH-IOL MIPI Alliance Test Program DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission (As amended on 15 November 2013) 1. Scope of services (1) The Bank is available to its Customer (account holder) for remote transmission of data by electronic

More information

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip

More information

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010 ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:

More information

DBK24. Isolated Digital Output Chassis. Overview

DBK24. Isolated Digital Output Chassis. Overview DBK24 Isolated Digital Output Chassis Overview 1 Power Requirements 2 Hardware Setup 2 Card Connection 2 Card Configuration 3 DaqBook and DaqBoard Connection 4 DaqBoard/2000 Series Board Connection 5 DaqBook

More information

CDR File Information. Comments Direct PCM

CDR File Information. Comments Direct PCM IMPORTANT NOTICE: Robert Bosch LLC and the manufacturers whose vehicles are accessible using the CDR System urge end users to use the latest production release of the Crash Data Retrieval system software

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

Completion instructions 1 (7) Application for message exchange with Finnish Customs

Completion instructions 1 (7) Application for message exchange with Finnish Customs Completion instructions 1 (7) Companies registered in Finland apply for registration for message exchange based on their business IDs. Companies registered abroad apply for the same based on VAT. As a

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

ETSI TS V ( )

ETSI TS V ( ) TS 135 233 V12.1.0 (2014-10) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication

More information

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version:

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version: ID: 42417 Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Signature

More information

Guideline for support SWIFTNet for Corporates

Guideline for support SWIFTNet for Corporates Guideline for support SWIFTNet for Corporates Table of contents 1 Purpose of this document... 1 2 SWIFTNet for Corporates Service Support... 1 2.1 General information on SWIFTNet for Corporates 1 2.2 One

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. , Inc. PD402-DMX Four Channel Dimmer and Switch Packs 4 x 2.5 Amps @ 6VDC to 24 VDC DMX52 compatible DMX52 4 x 2.5 Amps Dimmer Pack C UL US LISTED Digital Lighting Systems, Inc. USER'S MANUAL User's Manual

More information

Message exchange with. Finnish Customs

Message exchange with. Finnish Customs Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 24.8.2018 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

Hash Constant C Determinants leading to collisionfree

Hash Constant C Determinants leading to collisionfree Hash Constant C Determinants leading to collisionfree (Ernst Erich Schnoor) eschnoor@multi-matrix.de Addendum to article: Core of the CypherMatrix Method http://www.telecypher.net/corecyph.htm#z6 Object

More information

ORC ACES Subscriber Instructions. Component/Server Certificates

ORC ACES Subscriber Instructions. Component/Server Certificates ORC ACES Subscriber Instructions Component/Server Certificates 1 Getting Prepared What do I need to have on hand in order to complete the certifi cate process? Print these instruction for easy reference.

More information

Digital Lighting Systems, Inc. PD405-DMX. Four Channel Dimmer and Switch Packs. DMX512 compatible. PD405-DMX-24DC DMX512 4 x 5 Amps Dimmer Pack

Digital Lighting Systems, Inc. PD405-DMX. Four Channel Dimmer and Switch Packs. DMX512 compatible. PD405-DMX-24DC DMX512 4 x 5 Amps Dimmer Pack Digital Lighting Systems, Inc. PD405DMX Four Channel Dimmer and Switch Packs DMX52 compatible PD405DMX24DC DMX52 4 x 5 Amps Dimmer Pack C UL US LISTED www.digitallighting.com Digital Lighting Systems,

More information

Technical Specification. Third Party Control Protocol. AV Revolution

Technical Specification. Third Party Control Protocol. AV Revolution Technical Specification Third Party Control Protocol AV Revolution Document AM-TS-120308 Version 1.0 Page 1 of 31 DOCUMENT DETAILS Document Title: Technical Specification, Third Party Control Protocol,

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

PCL Greek-8 - Code Page 869

PCL Greek-8 - Code Page 869 PCL Greek-8 - Code Page 869 Page 1 of 5 PCL Symbol Se t: 8G Unicode glyph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space $90 U038A Ê Greek capita l letter iota with tonos

More information

6. Specifications & Additional Information

6. Specifications & Additional Information 6. Specifications & Additional Information SIIGX52004-3.1 Transceier Blocks Table 6 1 shows the transceier blocks for Stratix II GX and Stratix GX deices and compares their features. Table 6 1. Stratix

More information

Systems/DBG Debugger Version 2.20

Systems/DBG Debugger Version 2.20 Systems/DBG Debugger Version 2.20 Copyright c 2018, Dignus, LLC Systems/DBG Debugger Version 2.20 i Copyright c 2018 Dignus LLC, 8378 Six Forks Road Suite 203, Raleigh NC, 27615. World rights reserved.

More information

Banner 8 Using International Characters

Banner 8 Using International Characters College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

Web Services. File Transfer Service Description

Web Services. File Transfer Service Description Web Services File Transfer Service Description Contents 1 General... 2 1.1 Web Services... 2 1.2 Abbreviations and terms used in the service description... 2 2 Agreement on the use of the Web Services

More information

Interac USA Interoperability EMV Test Card Set

Interac USA Interoperability EMV Test Card Set Interac USA Interoperability EMV Test Card Set.00 April, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information

More information

{c,} c 00E7 ç &ccedil LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è &egrave LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é &eacute LATIN SMALL

{c,} c 00E7 ç &ccedil LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è &egrave LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é &eacute LATIN SMALL Non-ASCII Symbols in the SCA Armorial Database by Iulstan Sigewealding, updated by Herveus d'ormonde 4 January 2014 PDF Version by Yehuda ben Moshe, 16 February 2014 Since January 1996, the SCA Ordinary

More information

Report of Independent Accountants

Report of Independent Accountants Report of Independent Accountants S.C. certsign S.A. B-dul Timisoara nr. 5A Sector 6, Bucharest, ZIP 061301, Romania We have examined the accompanying assertion 1 made by the management of S.C. certsign

More information

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 Product Introduction. Purpose of use, Features TDH-940 is a Test Disc designed for confirmation of operation of DVD

More information

EDITION : 02/01/07 DN

EDITION : 02/01/07 DN USER'S MANUAL DIGI 6 VERSION 1-2 USITT DMX ACCORDED W I R I N G D A T A EDITION : 02/01/07 DN40729601 Robert Juliat S.A.S. 2, rue de Beaumont, F 600 Fresnoy-en-Thelle - phone : + (0) 44 26 1 89 - fax :

More information

Title: Graphic representation of the Roadmap to the BMP of the UCS

Title: Graphic representation of the Roadmap to the BMP of the UCS ISO/IEC JTC1/SC2/WG2 N2045 Title: Graphic representation of the Roadmap to the BMP of the UCS Source: Ad hoc group on Roadmap Status: Expert contribution Date: 1999-08-15 Action: For confirmation by ISO/IEC

More information

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel (a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two

More information

Regulation on public telephone network numbering

Regulation on public telephone network numbering FICORA 32 S/2016 M 1 (18) Unofficial translation Regulation on public telephone network numbering Issued in Helsinki on 22 December 2016 The Finnish Communications Regulatory Authority (FICORA) has, under

More information

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page Title page GE Digital Energy D90 Plus Line Distance Protection System Communications guide D90 Plus firmware revision:.9x GE publication code: 60-9070-F (GEK-3469) GE Digital Energy 650 Markland Street

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

Special Characters in Aletheia

Special Characters in Aletheia Special in Aletheia Lat Change: 28 May 2014 The following table comprie all pecial character which are currently available through the virtual keyboard integrated in Aletheia. The virtual keyboard aid

More information

POSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS

POSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS POSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS APRIL 4, 2016 VAT ID FI0103579 1 (10) Contents 1 General... 2 2 P.O. Box... 2 2.1 Service content... 2 2.2 Service level agreement... 2 2.3 Delivery of keys...

More information

Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System

Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System PNNL-1417 Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System R.R. Hansen R.. ass R.T. Kouzes N.D. Mileson January 23 Prepared for the U.S. Department

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version:

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: ID: 59176 Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: 22.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis

More information

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Primavera Portfolio Management Configuring Web Portlets for Microsoft Project Server 2007 Copyright 1999-2014, Oracle and/or its affiliates. The Programs (which include both the software and documentation)

More information

Information technology Universal Multiple-Octet Coded Character Set (UCS)

Information technology Universal Multiple-Octet Coded Character Set (UCS) ISO/IEC ISO/IEC 10646-1: 1993/Amd. 30: 1999 (E) Information technology Universal Multiple-Octet Coded Character Set (UCS) Part 1: Architecture and Basic Multilingual Plane AMENDMENT 30: Additional Latin

More information

Getting round your Mac with Shortcut Keys

Getting round your Mac with Shortcut Keys The Mac has many useful keyboard shortcuts but these do depend on you knowing the difference between the following keys: Shift Fn Ctrl Alt (Also referred to as Option) Command (Also referred to as the

More information

KNX TinySerial 810. Communication Protocol. WEINZIERL ENGINEERING GmbH

KNX TinySerial 810. Communication Protocol. WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GmbH KNX TinySerial 810 Communication Protocol WEINZIERL ENGINEERING GmbH Bahnhofstr. 6 DE-84558 Tyrlaching GERMAY Tel. +49 8623 / 987 98-03 Fax +49 8623 / 987 98-09 E-Mail: info@weinzierl.de

More information