Banks' TUPAS certification service for service providers
|
|
- Peregrine Watkins
- 5 years ago
- Views:
Transcription
1 Banks' TUPAS certification service for service providers service provider's FK Federation of Finnish Financial Services
2 for service providers CHANGE LOG Version Page Comment V2.0 All Message structures changed V2.1 New banks added, some wordings changed V2.2 New message fields and message field attributes. Check from your bank whether the new attributes have been taken into use. APPROVAL Version code Date Approved by V Payment Transactions Subcommittee V Payment Transactions Subcommittee V Payment Transactions Subcommittee
3 for service providers Contents Page 1 TUPAS CERTIFICATION SERVICE Agreeing upon bank identifiers and the customer authentication Bank identifiers for private customers Bank identifiers for business/corporate customers Agreement on the use of Certification service General description of Tupas-service Service functionality Service security Definition of strong authentication FUNCTIONAL SERVICE DESCRIPTION MESSAGES IN THE TUPAS CERTIFICATION SERVICE AND RELATED DATA Certificate request Certificate request field descriptions: orming the MAC for the certificate request (A01Y_MAC) Certificate and identifier Certificate message field descriptions MAC calculation for in the Certificate Type of identification data Identifier in plain text Encrypted identifier Comparing the encrypted identifier data and authenticating the customer Bank-specific buttons Exceptional situations CHANGING THE PASS PHRASE CHARACTER SET USED IN THE SERVICE... 16
4 for service providers APPENDIX 1 BANK-SPECIFIC CONTACT INFORMATION APPENDIX 2 TYPE OF IDENTIFIER IN CERTIFICATE REQUEST (A01Y_IDTYPE) APPENDIX 3 CUSTOMER IDENTIFIER IN THE CERTIFICATE... 21
5 1 1 TUPAS certification service Banks Tupas-certification service (hereinafter Certification service ) allows businesses or corporations (hereinafter service provider ) providing electronic services on the Internet to authenticate their customers using Tupas certificates. Within certfication service, the bank authenticates its customer by a strong authentication method (see Section 1.6). Tupascertificates provided by the service can also be used for electronic signatures, if so agreed between the customer authenticating him/herself and the service provider. The certification service is jointly specified by the banks. Each bank authenticates its customers through the same bank-specific identifiers that the customer uses in the bank s own services. 1.1 Agreeing upon bank identifiers and the customer authentication Certification service is accessed through bank-specific identifiers (hereafter bank identifiers ) created and issued by a bank for its customer. For example, these can be a combination of a user ID and one-time passwords. Bank identifiers are always personal regardless of whether they are issued for use with private or business/corporate customers. Banks can use subcontractors and agents in their operations as long as the models of cooperation are compliant with the Credit Institutions Act and standards issued by the Finnish Financial Supervision Authority by virtue of the Act Bank identifiers for private customers A customer can gain personal bank identifiers on the basis of a written agreement. The individual concerned must always sign personally the agreement. The customer cannot authorise another person to sign the agreement on his/her behalf. Banks have a statutory obligation to authenticate their customers. At a bank branch or a bank s subcontractor s or agent s office, the customer s identity is verified in a manner approved by the Financial Supervision Authority using an official identity document approved by the bank, such as a driving licence, personal identity card, passport or social insurance card with photo. The first bank identifiers must be fetched in person to enable a reliable customer authentication. Subsequent one-time identifiers can then be mailed to the customer. The customer cannot authorise anyone else to fetch the identifiers for the customer.
6 Bank identifiers for business/corporate customers When making an agreement on bank identifiers for business/corporate use, the bank identifiers are agreed on and fetched in compliance with the provisions of Section above as applicable and with the practice accepted by the Finnish Financial Supervision Authority. 1.2 Agreement on the use of Certification service The service provider must enter into a contract regarding Certification service with all of the banks whose services are to be used. A separate contract must be made with each bank. Bank-specific contact information is included in Appendix 1 to this description. Certification service implementation date is agreed upon when preparing the contract. The service provider s data is registered in each bank and the service provider notifies each bank separately when changes occur to the contract data. Once the contract has been signed, the bank delivers the bank-specific service identifier and pass phrase to the service provider. The data is delivered to the service provider through a bank-specific procedure, either electronically or in paper format. The bank-specific data used in the testing phase is available with the service descriptions of each bank. The service provider can test the service in a production environment by using bank-specific testing identifiers before signing the contract. 1.3 General description of Tupas-service The customer authenticating him/herself plays a central role in the service. The customer controls the transmission of data between the service provider and the bank. The bank and the service provider are not in direct contact with each other during the service. When the service provider needs to authenticate a customer, the service provider sends a certification request to the customer, who is transferred to the bank s authentication service by clicking on the link leading to the bank s authentication service. The service provider s certification request is transmitted from the customer to the bank s Certificate service, which sends a response message to the customer ( the Certificate ). The customer checks the certificate s data. If the customer approves it, he/she returns to the service provider s service and the Certificate is transmitted to the service provider. If the customer so wishes, he/she is allowed to cancel the authentication transaction before authenticating him/herself to the bank s service or reject the Certificate given by the bank.
7 3 The service provider and customer may agree on using the certificate as a component in an electronic signature used for a legal transaction between the customer and the service provider. However, the bank is only responsible for authenticating the customer as specified in this service description. The bank is not responsible for the validity or content of the legal transaction between the customer and the service provider. 1.4 Service functionality The Certificate provided by the bank is unique and tied to the service transaction in question and to the customer with a time stamp. The Certification service contains several functionalities and possibilities for use depending on the type of the Certificate specified in the service agreement between the service provider and the bank. The certificate issued by a bank always includes the name of the customer (person and/or company). Any additional identification information can be either plain text or encrypted. If the identification information is plain text, the bank may transmit either the customer s personal identity number, the last four characters of the personal identity number, a Business Identity Code (hereinafter Business ID ) or other electronic transaction identifier in accordance with the service agreement. The bank will only transmit personal identity numbers in plain text to service providers authorised to register them. If the identification information is encrypted, the bank will provide the service provider with an identifier based on the customer s personal identity number, Business ID or other electronic transaction identifier. The actual personal identity number or other identifier will not be transmitted with the response message. Thus the service provider must have access to the customer s personal identity number, Business ID or other electronic transaction identifier in order to ensure the correct authentication of the customer s identity based on the response message provided by the bank. If the service provider does not possess the customer s code, it should be requested before sending the certificate request. This functionality is suitable for verifying the validity of data submitted by the customer by comparing the data with the data stored at the bank. The Certification service is mainly applicable to consumer services. Some banks are able to identify a corporate user through the Business ID, but not all banks offer certification service certifying corporate customers. When authenticating banks corporate customers, the banks can give, together with the certificate, either the customer s Business ID and the company name or
8 4 the customer s Business ID, company name, name of person and personal identity code Service security The SSL protocol is used in data communication between the parties of the certification service, preventing external parties from viewing the information or changing any of it. The service provider s server software must support SSL encryption implemented with 128-bit keys. The length of the key used in the session is based on the properties of the customer s browser. The Certification request and the Certificate are protected with a message authentication code ensuring data integrity, so it is not possible for the customer who controls the Certificate transmission to alter the data without the service provider or the bank noticing it. Each party is responsible for the protection and security of its own services and correctness of the data stored by them. The customer authenticating him/herself is responsible for making sure that the identifiers provided by the bank do not fall into the hands of any third parties. The service provider s service must include a notice specifying that the service uses certification service employing the customer s personal bank identifiers or corporate bank identifiers. The service provider must edit the notice text in its service according to whether the service provider wants to authenticate private customers and/or corporate customers. 1.6 Definition of strong authentication A strong authentication of a person comprises something that the user: 1) knows (such as a user ID), 2) possesses (such as a list of passwords), 3) is (such as a fingerprint). An authentication transaction can be considered to comply with the definition of the strong authentication if two of these requirements are fulfilled simultaneously. In addition to the strong authentication, the transaction must be based on a sufficiently secure procedure. One-time passwords fulfil the criteria for a strong authentication. This means that the sole combination of a fixed password and user ID does not fulfil the criteria for the strong authentication required in the Certification service.
9 5 2 Functional service description Customer Service provider Service screens 1 2 Customer service Certificate request Bank's customer authentication Customer's bank Customer authentication and Tupas certification service 8 Approval of Certificate data Service terms 6 7 Tupas Certificate Explanation of the chart describing service progression: 1. The customer identifying him/herself is in contact with the service provider s service. The data communication between the customer and the service provider must be SSL-protected when the customer begins to enter data related to the certification service. During phases 2 to 7, the data transfer link is always SSL-protected. 2. The service provider sends to the customer a certification request containing specification data related to the transaction. The customer verifies the data in the request, but cannot alter it. The customer can, however, interrupt the authentication process, if desired, and return to customer service. The certification request page in the customer s browser includes function buttons leading to the banks certification service and a Cancel button. 3. The customer clicks on a button transferring him/her to his/her bank s certification service. The certificate request transmitted to the bank contains
10 6 the data on the service provider and transaction. The bank verifies the integrity of the request and the correctness of the data. 4. The bank sends an authentication request to the customer if the service provider s certificate request is valid. The bank gives the customer an error notification if the bank notices errors in the request. Then the customer returns to the service provider s service by clicking the Cancel button. 5. The customer authenticates him/herself in the certification service of the bank. The bank returns an error message to the customer if the authentication fails, and the customer returns to the service provider s service by clicking the Cancel button. 6. After successful authentication, the bank generates the certificate. The certification service activates Accept and Cancel buttons for the customer. 7. The customer verifies the Certificate and approves the identification data to be transmitted to the service provider. By clicking Cancel, the customer can interrupt the authentication process and return to the service provider s service. 8. The service provider verifies the integrity and uniqueness of the Certificate received. The service provider attaches the Certificate to the customer s service transaction and stores it for as long as other service data is stored. Customer identification data must not be registered or used for any other purpose.
11 7 3 Messages in the TUPAS certification service and related data 3.1 Certificate request Certificate request data lies behind the bank-specific button or icon in the FORM data group, as hidden variables. CERTIFICATE REQUEST Field Name of data Length Comment 1. Type of message A01Y_ACTION_ID 3-4 Standard, "701" 2. Version A01Y_VERS 4 For example, "0002" 3. Service provider A01Y_RCVID Customer code 4. Service language A01Y_LANGCODE 2 ISO 639 identifier: FI = Finnish SV = Swedish EN = English 5. Request identifier A01Y_STAMP 20 yyyymmddhhmmssxx xxxx 6. Type of identifier A01Y_IDTYPE 2 See Appendix 2 7. Return address A01Y_RETLINK 199 OK return address for Certificate 8. Cancel address A01Y_CANLINK 199 Return address in cancellation 9. Rejected address A01Y_REJLINK 199 Return address in error situations 10. Key version A01Y_KEYVERS 4 Key generation data 11. Algorithm A01Y_ALG 2 01 = MD5 02 = SHA Control field A01Y_MAC Message Authentication Code of request Data field names are written in capital letters. The HTML structure of the FORM data group is: <FORM METHOD= POST ACTION= bank certification service URL > <INPUT NAME= A01Y_ACTION_ID TYPE= hidden VALUE= 701 > <INPUT NAME= A01Y_VERS TYPE="hidden VALUE=... > <INPUT NAME= A01Y_RCVID TYPE="hidden VALUE=... > <INPUT NAME= A01Y_LANGCODE TYPE="hidden VALUE=... > <INPUT NAME= A01Y_STAMP TYPE="hidden VALUE=... >
12 8 <INPUT NAME= A01Y_IDTYPE TYPE="hidden VALUE=... > <INPUT NAME= A01Y_RETLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_CANLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_REJLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_KEYVERS TYPE="hidden VALUE=... > <INPUT NAME= A01Y_ALG TYPE="hidden VALUE=... > <INPUT NAME= A01Y_MAC TYPE="hidden VALUE=... > </FORM> 3.2 Certificate request field descriptions: Version number of the certificate request message, which is bank- Field 1 service. Field 2 specific. Field 3 Type of message, which is a standard "701" in the certification Service provider s bank-specific customer identifier. The bank identifies the service provider based on the customer code and attaches to the certificate the service provider s name existing in its register. Field 4 The language code of the service indicates the language of the service provider s page, and the bank certification service opens in this language. Field 5 Individual code assigned to the certificate request by the service provider. The identifier can be a reference or customer number or a combination of the date, time and running identifier, as well as a reference number. Field 6 The identifier type shows what kind of an identifier the service provider wants from the customer to be authenticated. The identifier type must correspond to the functionality agreed upon in the service contract. Field 7 This is the address of the service provider s page where the service continues when OK. The service address must start with https - that is, the page must be SSL protected. Example: VALUE=" Field 8 Continuation point for the service provider s service in case the customer cancels the transmission of the Certificate.
13 9 Example: VALUE=" Field 9 Continuation point for the service provider s service in case of a technical error during identification. The return address can be the same as in field 8. Example: VALUE=" Field 10 Key version used in MAC calculation. Field 11 Algorithm type code used in MAC calculation. 01 = MD5 algorithm, which produces a 32-character MAC 01 = SHA-1 algorithm, which produces a 40-character MAC. Field 12 Message Authentication Code (MAC), calculated from the data to be protected in the certificate request and the service provider s pass phrase using the algorithm defined in data field 11. Using the MAC, the recipient can verify the integrity of the certificate request and authenticate the sender. 3.3 Forming the MAC for the certificate request (A01Y_MAC) The service provider forms a bank-specific certificate request for each bank s button, protected by a MAC attached to each request. The MAC is calculated from the bank-specific certificate request s FORM data group using the pass phrase given to the service provider by the specific bank. The calculation starts by forming a character string from the VALUE of all data fields in the FORM data group preceding the MAC (fields 1 to 11) and the service provider s pass phrase. The data is combined into character strings in sequence, and any blanks serving as fill characters are left out. The data groups in the character string are separated by & characters. An & character is also placed between the last data (field 11) and the pass phrase, as well as at the end of the pass phrase. The & characters are included in the MAC calculation. The data appears on one single line. " " indicates a line break in this document. A01Y_ACTION_ID&A01Y_VERS&A01Y_RCVID&A01Y_LANGCODE& A01Y_STAMP&A01Y_IDTYPE&A01Y_RETLINK&A01Y_CANLINK& A01Y_REJLINK&A01Y_KEYVERS&A01Y_ALG&passphrase&
14 10 The calculated MAC is converted into hexadecimal form, in which characters from A to F are represented in capitals. The hexadecimal hash value is taken to the Control field. 3.4 Certificate and identifier CERTIFICATE Field Name of data Length Obligato- Comment riness 1 1. Version B02K_VERS 4 O For example, "0002" 2. Certificate identification B02K_TIMESTMP 23 O NNNyyyymmddh hmmssxxxxxx 3. Certificate number B02K_IDNBR 10 O Number assigned to the identifier by the bank 4. Request identifier B02K_STAMP 20 O Request data field 7 (A01Y_STAMP) 5. Customer B02K_CUSTNAME 40 O Name of person or company authenticated that is in the bank s database 6. Key version B02K_KEYVERS 4 O Key generation 7. Algorithm B02K_ALG 2 O 01 = MD5 02 = SHA-1 8. Identifier B02K_CUSTID -40 O See Appendix 3 9. Type of identifier B02K_CUSTTYPE 2 O See Appendix User ID B02K_USERID -40 R Corporate user s social security number or encrypted identifier See appendix User name B02K_USERNAME -40 R Corporate user s name See appendix Control field B02K_MAC O MAC of the Certificate 1 Obligatoriness of the data: O = obligatory R = at request only
15 11 The customer s bank adds the certificate data in the response message to the OK return link in so-called query-string format. B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&B02K_CUSTID& &B02K_MAC The data BO2K_USERID and BO2K_USERNAME_are optional and are included only with identifier values 3.5 Certificate message field descriptions Field 1 Version number of the certificate message, which is bank-specific. Field 2 Time stamp formed by the bank s system, in which NNN is the bank s number: Handelsbanken = 310 Nordea Bank Finland = 200 OP Bank Group = 500 Sampo Bank = 800 Savings banks and local co-op banks = 400 Tapiola Bank = 360 Bank of Åland = 600 Field 3 Data provided for the Certificate by the bank s information system, uniquely identifying the Certificate in the bank s system. Field 4 Identification of the certificate request, picked from data field 7 in the certificate request in question (A01Y_STAMP) Field 5 Name of authenticated customer according to the bank s customer database. Field 6 Generation number of the MAC pass phrase. Field 7 MAC algorithm code. Field 8 Customer identifier with contents depending on the A01Y_IDTYPE field in the certificate request. The field may contain a customer identifier either in encrypted or in plain text format. Field 9 Type of identifier. Field 10 Corporate user s social security number or encrypted identifier.
16 12 Field 11 Corporate user s name. Field 12 MAC code of the certificate 3.6 MAC calculation for in the Certificate The control code (BO2K_MAC)is calculated from the original message, after which the Scandinavian characters and certain special characters (eg blank spaces, equal signs and quotation marks) are replaced in the corresponding hexadecimall character (eg %20) in the data communication message. The bank calculates the MAC of the Certificate with a service provider specific key. With the MAC the service provider can ensure that the Certificate has been formed at the customer s bank and that its contents are unchanged. With the Certificate s identifier type values the MAC is calculated using data fields 1 to 9 in the Certificate. When calculating the MAC, the data and the pass phrase are separated by an "&" character. The character is also appended at the end of the pass phrase. The service provider-specific key is used in calculating the MAC. MAC calculation is not executed for the optional fields 10 & 11 when they are empty and are not returned to the service provider. B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG& B02K_CUSTTYPE&passphrase& with the Certificate s identifier type values the MAC is calculated using data fields 1 to 11 in the certificate. When calculating the MAC, the data and the pass phrase are separated by an "&" character. The character is also appended at the end of the pass phrase. The service provider-specific key is used in calculating the MAC B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&B02K_CUSTID B02K_CUSTTYPE&BO2K_USERID&B02K_USERNAME&passphase& 3.7 Type of identification data The type of the identifier to be transmitted, specified in the A01Y_IDTYPE field of the certificate request, affects the response message MAC calculation.
17 Identifier in plain text The value of the A01Y_IDTYPE field in the certificate request is 02 or 03 - that is, basic identifier or truncated basic identifier in plain text. The identifier is a character string in plain text - for example, a personal identity number or the last four characters thereof - in accordance with the A01Y_IDTYPE field in the request message. The identifier will be assigned to the data field B02K_CUSTID in the Certificate in an unchanged form Encrypted identifier The value of the A01Y_IDTYPE field in the certificate request is 01 - that is, encrypted basic identifier. The bank uses the same hash algorithm for encrypting the identifier as is used for the MAC fields. The uniqueness of the identifier is ensured by using the data in the certificate data fields 2 to 4 and the customer identifier (personal identity number or Business ID) in accordance with data field 8 (A01Y_IDTYPE) in the request message as additional data. When calculating the encrypted identifier, the data and the pass phrase are separated by an "&" character. The character is also appended at the end of the pass phrase. The service provider-specific key is used for encryption. B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& customer_identifier&passphrase& The result of the calculation is converted into hexadecimal form, in which characters from A to F are represented in capitals. The final result is a character string identifying the customer. The string will be used in the B02K_CUSTID field of the Certificate. 3.8 Comparing the encrypted identifier data and authenticating the customer If the identifier is encrypted, the service provider first verifies the integrity of the Certificate. Then the service provider calculates the comparison data for the customer identifier as described in section on the basis of the customer code stored in its register. When the calculated comparison data and the identifier of the received message are identical and the message is intact, the data for the customer authenticated by the bank corresponds to that for the customer registered by the service provider.
18 Bank-specific buttons The image files for bank-specific buttons can be obtained from a website at an address separately specified by each bank. The size or colour of the buttons must not be changed. The button image must not be used for purposes other than those that have been agreed upon between the service provider and the bank Exceptional situations The service provider must be prepared for exceptional occasions, which include: 1. Customer interrupts the authentication process The customer can interrupt the transaction by clicking the Cancel button, either before the certificate request has been sent to the bank or after receiving the Certificate. The address for the Cancel button is the Cancel address in FORM data field 8 of the certificate request. 2. Customer authentication failed Customer authentication may fail if there are errors in the identifier or if the customer has requested authentication at a wrong bank. The customer can return to the service provider s service by using the Cancel button. The address for the Cancel button is the Cancel address in FORM data field 8 of the certificate request. 3. The bank notices an error in the certificate request The bank notices an error in the identification request before the customer has been authenticated. The customer returns to the service provider s service using the Cancel button assigned to the Rejected address in FORM data field The service provider notices an error in the Certificate. The service provider notices an error when verifying the Certificate that might be due to an error in the Certificate content or because the data provided by the customer to the service provider does not match the data stored in the bank s information system. The service provider should provide the customer with information relevant to the situation at hand.
19 15 5. There is no response at all The reason for the interruption may be a connection break or other technical disturbance, or the customer terminating the session halfway through. 6. The same response comes several times The service provider must be prepared for that the customer will send the same response several times or resend an old certificate when moving between browser windows with the back/forward buttons. 4 Changing the pass phrase The pass phrase (key) used when calculating the MAC values can be changed if the bank or service provider so wishes. Bank-specific procedures are used when changing the key, and these are described in the bank-specific system descriptions. Two bank-specific procedures are used when changing the key: Only the pass phrase is changed, the service provider s customer ID remains the same. Both the pass phrase and the customer ID are changed. The pass phrase is delivered to the contact person named in the contract. At the same time, the information on the new key s version number and the effective date will also be delivered. From that date onwards, all MACs will be calculated using the new key. In order to guarantee a smooth change between keys, the service provider s system must enable the entry of the new key into the system ahead of time - in other words, the simultaneous use of at least two pass phrases. At the time of transfer (for a period of about 15 minutes), it is possible that the MACs in some Certificates arriving to the service provider have been calculated using the old key and the rest have been calculated using the new key. Once the new pass phrase has been successfully taken into use, the old key can be deleted or deactivated in the service provider s system.
20 16 5 CHARACTER SET USED IN THE SERVICE An 8-bit ISO (Latin1) character set is used in the service, the codes of which are listed in the table below. æ %00 %01 %02 %03 %04 %05 %06 % %30 %31 %32 %33 %34 %35 %36 %37 ` a b c d e f g %60 %61 %62 %63 %64 %65 %66 %67 %90 %91 %92 %93 %94 %95 %96 %97 À Á Â Ã Ä Å Æ Ç %c0 %c1 %c2 %c3 %c4 %c5 %c6 %c7 ð ñ ò ó ô õ ö %f0 %f1 %f2 %f3 %f4 %f5 %f6 %f7 backspace tab linefeed c return %08 %09 %0a %0b %0c %0d %0e %0f 8 9 : ; < = >? %38 %39 %3a %3b %3c %3d %3e %3f h i j k l m n o %68 %69 %6a %6b %6c %6d %6e %6f š œ Ÿ %98 %99 %9a %9b %9c %9d %9e %9f È É Ê Ë Ì Í Î Ï %c8 %c9 %ca %cb %cc %cd %ce %cf ø ù ú û ü ý þ ÿ %f8 %f9 %fa %fb %fc %fd %fe %ff %10 %11 %12 %13 %14 %15 %16 A B C D E F G %40 %41 %42 %43 %44 %45 %46 %47 p q r s t u v w %70 %71 %72 %73 %74 %75 %76 %77 %a0 %a1 %a2 %a3 %a4 %a5 %a6 %a7 Ð Ñ Ò Ó Ô Õ Ö %d0 %d1 %d2 %d3 %d4 %d5 %d6 %d7 %18 %19 %1a %1b %1c %1d %1e %1f H I J K L M N O %48 %49 %4a %4b %4c %4d %4e %4f x y z { } ~ %78 %79 %7a %7b %7c %7d %7e %7f ª «%a8 %a9 %aa %ab %ac %ad %ae %af Ø Ù Ú Û Ü Ý Þ ß %d8 %d9 %da %db %dc %dd %de %df Space! " # $ % & ' %20 %21 %22 %23 %24 %25 %26 %27 P Q R S T U V W %50 %51 %52 %53 %54 %55 %56 %57 ƒ %80 %81 %82 %83 %84 %85 %86 %87 ± ² ³ µ %b0 %b1 %b2 %b3 %b4 %b5 %b6 %b7 à á â ã ä å æ ç %e0 %e1 %e2 %e3 %e4 %e5 %e6 %e7
21 17 ( ) * +, -. / %28 %29 %2a %2b %2c %2d %2e %2f X Y Z [ \ ] ^ _ %58 %59 %5a %5b %5c %5d %5e %5f ˆ Š Œ Ž %88 %89 %8a %8b %8c %8d %8e %8f ¹ º» ¼ ½ ¾ %b8 %b9 %ba %bb %bc %bd %be %bf è é ê ë ì í î ï %e8 %e9 %ea %eb %ec %ed %ee %ef
22 18 APPENDIX 1 BANK-SPECIFIC CONTACT INFORMATION HANDELSBANKEN Contract issues: Local branch Codes and keys: Collected from the bank Customer support and technical problems: HelpDesk During weekdays finhelp@handelsbanken.fi NORDEA Contract issues: Local branch Codes and keys: Delivered by mail to the contact person named in the contract. Customer support and technical problems: Solo information for corporate customers In Finnish: (0.11 /min + local network/mobile call fee) During weekdays between 8 18 In Swedish: (0.11 /min + local network/mobile call fee) During weekdays In English: (0.11 /min + local network/mobile call fee) During weekdays 9 18 Solo.tori@nordea.fi OP BANK GROUP Contract issues: Codes and keys: Customer support: SAMPO BANK Contract issues: Local OP bank To be collected from a branch of the bank OP Bank phone service: In Finnish: In Swedish: verkkopainikkeet@op.fi Local branch or phone (local n etwork/mobile call fee) Mon Fri 8 17
23 19 Codes and keys: Will be delivered on diskette in a sealed mail package Customer support and technical problems: Private customers (local network/mobile call fee), Mon Fri 9 18 Corporate customers (1.17 /min +local network/mobile fee), Mon Fri asiakastuki.ml@sampo.fi or varmennepalvelu@sampo.fi SAVINGS BANKS AND LOCAL CO-OPERATIVE BANKS Contract issues: Local branch Codes and keys: Collected from the bank Customer support and technical problems: phone (1.17 /min + local network fee) info@samlink.fi TAPIOLA BANK Contract issues Codes and keys Tapiola electronic services Delivered to the contact person named in the contract Customer support and technical problems: Private customers (Mon Fri) tunnistuspalvelu@tapiola.fi BANK OF ÅLAND Contract issues: Customer code: Customer support and technical problems: Local branch Delivered at the branch upon signing the contract. The pass phrase is mailed to the contact person named in the contract. Contact Center customer service In Finnish: In Swedish: During weekdays Mon Thu , Fri contactcenter@alandsbanken.fi
24 20 APPENDIX 2 TYPE OF IDENTIFIER IN CERTIFICATE REQUEST (A01Y_IDTYPE) Data field 6 in the certificate request specifies the type of identifier requested. The type is encoded with two characters XY as follows: The first figure (X) indicates the contents of the type of identifier requested: 0Y = basic identifier 1Y = personal identity number 2Y = Business ID 3Y = personal identity number or Business ID 4Y = personal identity number and Business ID 5Y = personal identity number and Business ID or personal identity number alone The latter figure (Y) indicates the form of the identifier requested: X1 = Encrypted identifier A hexadecimal MAC (Message Authentication Code) calculated on the basis of the customer s identification data. X2 = Identifier in plain text The identifier can be the customer s complete personal identity number, an electronic transaction identifier or a complete Business ID. 03 = Truncated identifier A truncated identifier can contain the last four characters of the personal identity number without the punctuation mark indicating century, or a complete Business ID. NB: Code 23 is not used.
25 21 APPENDIX 3 CUSTOMER IDENTIFIER IN THE CERTIFICATE The data field for identifier type (field 9) indicates the type of identifier data. The data is encoded with two characters XY so that the first figure indicates whether the requested information about the customer is in the bank's customer database. 0Y = The requested information was found. The Certificate is returned to the return address in the return address field of the certificate request. 00 = identifier not known Value "00" is used if no identifiers are found. 01 = personal identity number in plain text Value "01" is used if the request concerns an identifier in plain text and only the personal identity number is returned. Field 5 holds the customer's name and field 8 the personal identity number in plain text. 02 = last four characters of personal identity number in plain text Value "02" is used if the request concerns a truncated identifier and only the last four characters of the personal identity number are returned. Field 5 holds the customer's name and field 8 the last four characters of the personal identity number in plain text.
26 22 03 = Business ID in plain text Value "03" is used if the request concerns an identifier in plain text and only the Business ID is returned. Field 5 holds the company's name and field 8 the Business ID in plain text. 04 = electronic transaction identifier in plain text Value "04" is used if the request concerns an identifier in plain text and only the electronic transaction identifier is returned. Field 5 holds the customer's name and field 8 the electronic transaction identifier in plain text. 05 = encrypted personal identity number 06 = encrypted Business ID Value "05" is used if the request concerns an encrypted identifier and only the personal identity number is returned. Field 5 holds the customer's name and field 8 the encrypted personal identity number. Value "06" is used if the request concerns an encrypted identifier and only the Business ID is returned. Field 5 holds the company's name and field 8 the encrypted Business ID. 07 = encrypted electronic transaction identifier Value "07" is used if the request concerns an encrypted identifier and only the electronic transaction
27 23 identifier is returned (not in use at Sampo). Field 5 holds the customer's name and field 8 the encrypted electronic transaction identifier. 08 = Business ID and corporate user's personal identity number in plain text, or other identifier agreed between the service provider and the bank in plain text Value "08" is used if the request concerns identifiers in plain text. Field 5 holds the company's name, field 8 the Business ID in plain text, field 10 the corporate user's personal identity number in plain text and field 11 the corporate user's name. 09 = encrypted Business ID and encrypted corporate user's personal identity number, or other encrypted identifier agreed between the service provider and the bank Value "09" is used if the request has concerned encrypted identifiers. Field 5 holds the company's name, field 8 the encrypted Business ID, field 10 the corporate user's encrypted personal identity number and field 11 the corporate user's name. 1Y = The requested information or part of it was not found. The information in the type of identifier field (B02K_CUSTTYPE) is returned to the address in the rejected address field of the certificate request. The latter number (Y) in the type of identifier indicates what information was not found on the customer. In such cases, the service provider can automate its error messages to the customers in different situations.
28 24 10 = No requested information on the customer. 11 = No personal identity number for the customer. 12 = No Business ID for the customer. Example: A service provider wants to know the customer's personal identity number but the customer uses identifiers that only have a Business ID. The bank sends the information in the type of identifier field (B02K_CUSTTYPE) to the address in the rejected address field. In this case, field 9, type of identifier, holds the value 11.
29 Bulevardi 28 FI Helsinki, Finland Tel Fax
Banks Tupas Certification Service for Service Providers
Banks Tupas Certification Service for Service Providers Service description and guidelines Version 2.1 3 October 2005 SERVICE DESCRIPTION 2 (21) CHANGE LOG Version Page Comment V2.0 All Message structure
More informationPRECISION OF DANSKE BANK IDENTIFICATION SERVICE
PRECISION OF DANSKE BANK IDENTIFICATION SERVICE Valid as from 31.12.2017 1. SERVICE DESCRIPTION Danske Bank Identification Service allows service providers to reliably identify private customers and corporations
More informationAPPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC
APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date
More informationASCII Code - The extended ASCII table
ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage
More informationOOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement
OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment
More informationUSB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual
USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product
More informationCIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1
Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is
More informationCIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router
More informationCIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next
More informationDescription AX5805. Default values for the permissible motors. Version: Date:
Description values for the permissible motors Version: 1.3.0 Date: 2017-06-01 Table of contents Table of contents 1 Foreword 2 1.1 Notes on the manual 2 1.1.1 Intendent audience 2 1.1.2 Origin of the
More informationCIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More informationCIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1
Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5
More informationSMS API TECHNICAL SPECIFICATION
SMS API TECHNICAL SPECIFICATION Version 2.1 Provision of the Click SMS Gateway Service is dependent upon compliance with the specifications contained in this document. Although Click SMS has taken reasonable
More information4. Specifications and Additional Information
4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control
More informationCIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1
Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is
More informationUser Guide for Greek GGT-Fonts Revision date: 23 May, 2011
User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 by Graham G Thomason Copyright Graham G Thomason, 2009. Permission is granted to copy or publish this document, provided this complete notice
More informationCMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes
Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter
More informationTriple DES and AES 192/256 Implementation Notes
Triple DES and AES 192/256 Implementation Notes Sample Password-to-Key and KeyChange results of Triple DES and AES 192/256 implementation For InterWorking Labs customers who require detailed information
More informationDENIC Domain Guidelines
The English translation of the DENIC Eszett Domain Guidelines is provided for the convenience of our non-german-speaking customers. Regardless of this, only the original German-language version is legally
More informationE-payment. Service description
E-payment Service description Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up... 4 2.1 Service
More informationJuly Registration of a Cyrillic Character Set. Status of this Memo
Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012
CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats
More informationE-payment. Service description. September 2016
E-payment Service description September 2016 Content 1 E-payment 1.1 General description... 2 1.2 Advantages... 2 1.3 Availability... 2 1.4 Security... 2 2 Service agreement, instructions and start-up...
More informationZN-DN312XE-M Quick User Guide
ZN-DN312XE-M Quick User Guide This manual provides instructions for quick installation and basic configuration of your IP device. Step1. Connect cables to IP device Connect required cables to the device
More informationChemistry Hour Exam 2
Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total
More informationAcquirer JCB EMV Test Card Set
Acquirer JCB EMV Test Card Set July, 2017 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available
More informationPe h-ōe-jī Unicode Correspondence Table
Pe h-ōe-jī Correspondence Table This document contains the code points and font examples for characters needed to write Pe h-ōe-jī for Taiwanese (Hoklo). Standard latin capital and small letters are not
More information6.1 Font Types. Font Types
6 Font This chapter explains basic features of GP-Pro EX's "Font" and basic ways of placing text with each font. Please start by reading "6.1 Font Types" (page 6-2) and then turn to the corresponding page.
More informationGateway Ascii Command Protocol
Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4
More informationFirst Data Dual Interface EMV Test Card Set. Version 1.20
First Data Dual Interface EMV Test Card Set August, 2016 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available
More informationE-invoice. Service Description
E-invoice Service Description January 2017 Contents General description... 2 Benefits of the e-invoice... 2 Message descriptions... 2 E-invoice addresses... 3 E-invoice to file transfer... 3 Adoption of
More informationFirst Data EMV Test Card Set. Version 1.30
First Data EMV Test Card Set.30 January, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013
CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point
More informationCIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1
Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,
More informationtext2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW).
text2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW). Table of Contents API Interface Types...3 Bulk SMS interface...3
More informationFirst Data EMV Test Card Set. Version 2.00
First Data EMV Test Card Set.00 February, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry
More informationScan Results - ( Essentials - Onsharp )
Scan Results - www.onsharp.com ( Essentials - Onsharp ) Overview Open Ports (18) Scan ID: 7675527 Target: www.onsharp.com Max Score: 2.6 Compliance: Passing PCI compliance, Expires undefined Profile: 15
More informationVT420 Video Terminal Programmer Reference Manual Update
VT420 Video Terminal Programmer Reference Manual Update EK VT42P UP. A01 Digital Equipment Corporation The information in this document is subject to change without notice and should not be construed as
More informationAnnex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission
Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account
More informationThe cache is 4-way set associative, with 4-byte blocks, and 16 total lines
Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total
More informationCIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationTLS 1.2 Protocol Execution Transcript
Appendix C TLS 1.2 Protocol Execution Transcript In Section 2.3, we overviewed a relatively simple protocol execution transcript for SSL 3.0. In this appendix, we do something similar for TLS 1.2. Since
More informationDigital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module
, Inc. DMX512 Four Channel Dimmer and Switch module Input: 5 Amps @ 6-24 VDC Outputs: 5 Amps Maximum each, total 4 outputs 8 Amps Maximum. FRONT BACK USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION
More informationDigital Lighting Systems, Inc.
Digital Lighting Systems, Inc. Four Channel Dry Contacts Relays Switch Pack DMX512 compatible USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION The is a 4-channel DMX-512 compatible electro-mechanical
More informationPCL ISO 8859/5 Latin/Cyrillic
Page 1 of 5 PCL Symbol Se t: 10N Unicode gly ph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space -- -- -- -- $21 U0021 Ê Exclamation mark -- -- -- -- $22 U0022 Ë Quotation
More informationC1098 JPEG Module User Manual
C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command
More information6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( )
6. Combinational Circuits George Boole (85 864) Claude Shannon (96 2) Signals and Wires Digital signals Binary (or logical ) values: or, on or off, high or low voltage Wires. Propagate digital signals
More informationGeneral terms governing Nordea s 1 (6) e-invoice for companies January 2017
General terms governing Nordea s 1 (6) 1. General remarks and scope of application E-invoice is a service through which Customers can send and receive e-invoices and other Finvoice messages by using an
More informationAcquirer JCB Dual Interface EMV Test Card Set
Acquirer JCB Dual Interface EMV Test Card Set.00 July, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing and delivering this document
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012
CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 ANNOUNCEMENTS TA Office Hours (ITE 334): Genaro Hernandez, Jr. Mon 10am 12noon Roshan Ghumare Wed 10am 12noon Prof.
More informationFirst Data DCC Test Card Set. Version 1.30
First Data DCC Test Card Set.30 April, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry
More informationEnhanced Play Fair Cipher
P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and
More informationTerms and Conditions for Remote Data Transmission
Terms and Conditions for Remote Data Transmission The following translation is provided for your convenience only. The original German text Bedingungen für Datenfernübertragung is binding in all respects.
More informationUNH-IOL MIPI Alliance Test Program
DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company
More informationTerms and Conditions for Remote Data Transmission
Terms and Conditions for Remote Data Transmission (As amended on 15 November 2013) 1. Scope of services (1) The Bank is available to its Customer (account holder) for remote transmission of data by electronic
More informationegov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO
egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip
More informationECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010
ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:
More informationDBK24. Isolated Digital Output Chassis. Overview
DBK24 Isolated Digital Output Chassis Overview 1 Power Requirements 2 Hardware Setup 2 Card Connection 2 Card Configuration 3 DaqBook and DaqBoard Connection 4 DaqBoard/2000 Series Board Connection 5 DaqBook
More informationCDR File Information. Comments Direct PCM
IMPORTANT NOTICE: Robert Bosch LLC and the manufacturers whose vehicles are accessible using the CDR System urge end users to use the latest production release of the Crash Data Retrieval system software
More informationAppendix C. Numeric and Character Entity Reference
Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your
More informationCompletion instructions 1 (7) Application for message exchange with Finnish Customs
Completion instructions 1 (7) Companies registered in Finland apply for registration for message exchange based on their business IDs. Companies registered abroad apply for the same based on VAT. As a
More informationFundamentals of Cryptography
Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network
More informationETSI TS V ( )
TS 135 233 V12.1.0 (2014-10) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication
More informationID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version:
ID: 42417 Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Signature
More informationGuideline for support SWIFTNet for Corporates
Guideline for support SWIFTNet for Corporates Table of contents 1 Purpose of this document... 1 2 SWIFTNet for Corporates Service Support... 1 2.1 General information on SWIFTNet for Corporates 1 2.2 One
More informationDigital Lighting Systems, Inc.
, Inc. PD402-DMX Four Channel Dimmer and Switch Packs 4 x 2.5 Amps @ 6VDC to 24 VDC DMX52 compatible DMX52 4 x 2.5 Amps Dimmer Pack C UL US LISTED Digital Lighting Systems, Inc. USER'S MANUAL User's Manual
More informationMessage exchange with. Finnish Customs
Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 24.8.2018 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish
More informationOne subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.
FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts
More informationPersonal Conference Manager (PCM)
Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her
More informationHash Constant C Determinants leading to collisionfree
Hash Constant C Determinants leading to collisionfree (Ernst Erich Schnoor) eschnoor@multi-matrix.de Addendum to article: Core of the CypherMatrix Method http://www.telecypher.net/corecyph.htm#z6 Object
More informationORC ACES Subscriber Instructions. Component/Server Certificates
ORC ACES Subscriber Instructions Component/Server Certificates 1 Getting Prepared What do I need to have on hand in order to complete the certifi cate process? Print these instruction for easy reference.
More informationDigital Lighting Systems, Inc. PD405-DMX. Four Channel Dimmer and Switch Packs. DMX512 compatible. PD405-DMX-24DC DMX512 4 x 5 Amps Dimmer Pack
Digital Lighting Systems, Inc. PD405DMX Four Channel Dimmer and Switch Packs DMX52 compatible PD405DMX24DC DMX52 4 x 5 Amps Dimmer Pack C UL US LISTED www.digitallighting.com Digital Lighting Systems,
More informationTechnical Specification. Third Party Control Protocol. AV Revolution
Technical Specification Third Party Control Protocol AV Revolution Document AM-TS-120308 Version 1.0 Page 1 of 31 DOCUMENT DETAILS Document Title: Technical Specification, Third Party Control Protocol,
More informationERNST. Environment for Redaction of News Sub-Titles
ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or
More informationPCL Greek-8 - Code Page 869
PCL Greek-8 - Code Page 869 Page 1 of 5 PCL Symbol Se t: 8G Unicode glyph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space $90 U038A Ê Greek capita l letter iota with tonos
More information6. Specifications & Additional Information
6. Specifications & Additional Information SIIGX52004-3.1 Transceier Blocks Table 6 1 shows the transceier blocks for Stratix II GX and Stratix GX deices and compares their features. Table 6 1. Stratix
More informationSystems/DBG Debugger Version 2.20
Systems/DBG Debugger Version 2.20 Copyright c 2018, Dignus, LLC Systems/DBG Debugger Version 2.20 i Copyright c 2018 Dignus LLC, 8378 Six Forks Road Suite 203, Raleigh NC, 27615. World rights reserved.
More informationBanner 8 Using International Characters
College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating
More informationState of Connecticut Workers Compensation Commission
State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,
More informationWeb Services. File Transfer Service Description
Web Services File Transfer Service Description Contents 1 General... 2 1.1 Web Services... 2 1.2 Abbreviations and terms used in the service description... 2 2 Agreement on the use of the Web Services
More informationInterac USA Interoperability EMV Test Card Set
Interac USA Interoperability EMV Test Card Set.00 April, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information
More information{c,} c 00E7 ç ç LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è è LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é é LATIN SMALL
Non-ASCII Symbols in the SCA Armorial Database by Iulstan Sigewealding, updated by Herveus d'ormonde 4 January 2014 PDF Version by Yehuda ben Moshe, 16 February 2014 Since January 1996, the SCA Ordinary
More informationReport of Independent Accountants
Report of Independent Accountants S.C. certsign S.A. B-dul Timisoara nr. 5A Sector 6, Bucharest, ZIP 061301, Romania We have examined the accompanying assertion 1 made by the management of S.C. certsign
More informationTEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940
TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 Product Introduction. Purpose of use, Features TDH-940 is a Test Disc designed for confirmation of operation of DVD
More informationEDITION : 02/01/07 DN
USER'S MANUAL DIGI 6 VERSION 1-2 USITT DMX ACCORDED W I R I N G D A T A EDITION : 02/01/07 DN40729601 Robert Juliat S.A.S. 2, rue de Beaumont, F 600 Fresnoy-en-Thelle - phone : + (0) 44 26 1 89 - fax :
More informationTitle: Graphic representation of the Roadmap to the BMP of the UCS
ISO/IEC JTC1/SC2/WG2 N2045 Title: Graphic representation of the Roadmap to the BMP of the UCS Source: Ad hoc group on Roadmap Status: Expert contribution Date: 1999-08-15 Action: For confirmation by ISO/IEC
More informationCIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel
(a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two
More informationRegulation on public telephone network numbering
FICORA 32 S/2016 M 1 (18) Unofficial translation Regulation on public telephone network numbering Issued in Helsinki on 22 December 2016 The Finnish Communications Regulatory Authority (FICORA) has, under
More informationCommunications guide. Line Distance Protection System * F1* GE Digital Energy. Title page
Title page GE Digital Energy D90 Plus Line Distance Protection System Communications guide D90 Plus firmware revision:.9x GE publication code: 60-9070-F (GEK-3469) GE Digital Energy 650 Markland Street
More informationIII. CLAIMS ADMINISTRATION
III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800
More informationSpecial Characters in Aletheia
Special in Aletheia Lat Change: 28 May 2014 The following table comprie all pecial character which are currently available through the virtual keyboard integrated in Aletheia. The virtual keyboard aid
More informationPOSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS
POSTI LTD MAIL RECEIVING SERVICES PRODUCT TERMS APRIL 4, 2016 VAT ID FI0103579 1 (10) Contents 1 General... 2 2 P.O. Box... 2 2.1 Service content... 2 2.2 Service level agreement... 2 2.3 Delivery of keys...
More informationImplementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System
PNNL-1417 Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System R.R. Hansen R.. ass R.T. Kouzes N.D. Mileson January 23 Prepared for the U.S. Department
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version:
ID: 59176 Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: 22.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis
More informationOracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.
Primavera Portfolio Management Configuring Web Portlets for Microsoft Project Server 2007 Copyright 1999-2014, Oracle and/or its affiliates. The Programs (which include both the software and documentation)
More informationInformation technology Universal Multiple-Octet Coded Character Set (UCS)
ISO/IEC ISO/IEC 10646-1: 1993/Amd. 30: 1999 (E) Information technology Universal Multiple-Octet Coded Character Set (UCS) Part 1: Architecture and Basic Multilingual Plane AMENDMENT 30: Additional Latin
More informationGetting round your Mac with Shortcut Keys
The Mac has many useful keyboard shortcuts but these do depend on you knowing the difference between the following keys: Shift Fn Ctrl Alt (Also referred to as Option) Command (Also referred to as the
More informationKNX TinySerial 810. Communication Protocol. WEINZIERL ENGINEERING GmbH
WEINZIERL ENGINEERING GmbH KNX TinySerial 810 Communication Protocol WEINZIERL ENGINEERING GmbH Bahnhofstr. 6 DE-84558 Tyrlaching GERMAY Tel. +49 8623 / 987 98-03 Fax +49 8623 / 987 98-09 E-Mail: info@weinzierl.de
More information