Banks Tupas Certification Service for Service Providers

Size: px
Start display at page:

Download "Banks Tupas Certification Service for Service Providers"

Transcription

1 Banks Tupas Certification Service for Service Providers Service description and guidelines Version October 2005

2 SERVICE DESCRIPTION 2 (21) CHANGE LOG Version Page Comment V2.0 All Message structure changed V2.1 New banks added, some wordings changed APPROVAL Version code Date Approved by V Payment Transactions Subcommittee V Payment Transactions Subcommittee

3 SERVICE DESCRIPTION 3 (21) FINNISH BANKS CERTIFICATION SERVICE FOR SERVICE PROVIDERS SERVICE DESCRIPTION AND GUIDELINE FOR SERVICE PROVIDERS Contents: 1 SERVICE Online/Electronic banking codes and customer authentication Online banking codes for personal customers Online banking codes for businesses and organisations Agreement on the use of the Tupas service General description of the Tupas service Service functionality Service security Definition of strong authentication FUNCTIONAL SERVICE DESCRIPTION SERVICE MESSAGES AND THEIR CONTENT Certification request Certification request s field descriptions: Forming of the MAC for a certification request (A01Y_MAC) Certificate and identifier Certificate message field descriptions MAC calculation for the certificate Identifier type Plain-text identifier Encrypted identifier Encrypted identifier comparison and customer authentication Bank-specific buttons Exceptional situations CHANGING THE MAC key CHARACTER SET USED IN THE SERVICE APPENDIX 1 BANKs CONTACT INFORMATION APPENDIX 2 CERTIFICATE REQUEST TYPE APPENDIX 3 CUSTOMER IDENTIFIER IN THE CERTIFICATE... 21

4 SERVICE DESCRIPTION 4 (21) 1 SERVICE Finnish banks Tupas certification service (hereafter the Tupas service ) allows businesses and organisations (hereafter service providers ) providing Internet services to authenticate their customers with Tupas certificates issued by the Tupas service. In the Tupas service a bank authenticates a customer by a strong authentication method (see section 1.6). The Tupas certificates issued by the service can also be used for signing documents electronically if so agreed by the customer and the service provider. The Tupas service is jointly defined by Finnish banks. Each bank authenticates its customers with the same bank-specific identifiers that the customer uses in the bank s own services. 1.1 Online/Electronic banking codes and customer authentication The Tupas service is used with online banking codes created and issued by a bank to its customers. The online banking codes can be a combination of a user ID and one-time passwords. Banking codes are always personal, regardless of whether they are issued to a personal customer, business or organisation. Banks can use subcontractors and agents in their operations as long as the models of cooperation are compliant with the Credit Institutions Act and the standards issued by the Finnish Financial Supervision Authority by virtue of the Act Online banking codes for personal customers A customer receives personal online banking codes after signing an agreement. The agreement must be signed personally by the customer; he or she cannot authorise another person to sign the agreement on his or her behalf. Banks have a statutory obligation to identify their customers. When a customer comes to a bank branch or an office of the bank s subcontractor or agent, his or her identity is verified from an official document approved by the bank, such as a driving licence, personal identity card, passport or social insurance card with photo, as required by the Financial Supervision Authority. The first set of online banking codes must be collected in person so that the customer can be reliably identified. Subsequent one-time banking codes can then be mailed to the customer Online banking codes for businesses and organisations When an agreement on banking codes is made with a business or organisation (hereinafter corporate customer ), it is required that the bank identifies the corporate customer and that the person signing the agreement has a mandate to do that. The corporate customer must provide the bank with its registration documents or similar clarification, unless this has been provided previously in the course of the customer relationship. The mandate of the signatory must be verified from a decision of the customer s board of directors or corresponding body, specific power of attorney or a

5 SERVICE DESCRIPTION 5 (21) document indicating the person s authorisation to sign for the corporate customer. The signatory s personal identity must also be verified. The distribution of banking codes is subject to the provisions of section above as applicable. 1.2 Agreement on the use of the Tupas service A service provider must make a Tupas service agreement with all the banks whose services it wants to use. A separate agreement must be made with each bank. The banks contact information is given in Appendix 1 to this service description. The Tupas service implementation date is agreed upon when the agreement is made. The service provider s information is registered separately in each bank. The service provider notifies each bank separately in the event of changes to its information. Once the agreement has been signed, the bank provides the service provider with a bank-specific service identifier/customer ID and pass phrase/message Authentication Code (MAC) key. These are delivered to the service provider electronically or in paper format, depending on the bank. The bank-specific data used in the testing phase is available in the service descriptions of each bank. The service provider can test the service in a production environment by using bank-specific test codes before signing the agreement. 1.3 General description of the Tupas service The key player in the use of the Tupas service is the customer who wants to authenticate him- or herself towards a service provider. The customer controls the transmission of data between the service provider and the bank. The bank and the service provider are not in direct contact with each other during the service. When a service provider needs to authenticate a customer, the service provider sends a certification request to the customer, who clicks a link/button leading to the Tupas service of the customer s bank. The service provider s certification request is transmitted from the customer to the bank s Tupas service, which sends a response message (hereinafter the Tupas certificate or the certificate ) to the customer. The customer checks the Tupas certificate s data. If the customer approves it, he or she returns to the service provider s service and the certificate is transmitted to the service provider. The customer can cancel the authentication transaction before authenticating him- or herself to the bank, and he or she can also reject the bank s certificate. The service provider and customer can agree on using the Tupas certificate as a component in an electronic signature used for a legal transaction between the customer and the service provider. In such transactions the bank is only responsible for authenticating the customer as specified in this service description. The bank is not responsible for the validity or content of the legal transaction between the customer and the service provider.

6 SERVICE DESCRIPTION 6 (21) 1.4 Service functionality The certificate provided by a bank is unique and tied with a time stamp to the service transaction and to the customer. The Tupas service has different functionalities and usage alternatives depending on the type of the certificate agreed upon by the service provider and the bank. The Tupas certificate issued by a bank always includes the name of the customer. Any additional identification data can be either in plain text or encrypted. If the identification data is in plain text, the bank may transmit the customer s personal identity number, the last four characters of the personal identity number, a Business ID or other electronic transaction identifier in accordance with the service agreement. The bank only transmits personal identity numbers in plain text to service providers authorised to register them. If the identification data is encrypted, the bank transmits an identifier derived from the customer s personal identity number, Business ID or other electronic transaction identifier. The actual personal identity number or other identifier is not transmitted with the response message. For this reason the service provider should have in its data system the customer s personal identity number, Business ID or other electronic transaction identifier so that it can reliably authenticate the customer against the bank s response message. If the service provider does not have the customer s ID, it should be requested before sending the certification request. This functionality is suitable for verifying the validity of the customer s data by comparing it with the data stored at the bank. The Tupas service is mainly applicable to consumer services. Some banks are able to identify a corporate user by the Business Identity Code (Business ID), but not all banks register companies as online banking customers. 1.5 Service security To prevent external parties from viewing or changing the information, data communication between the parties of the Tupas service is encrypted with SSL encryption. The service provider s server software must support SSL encryption implemented with 128-bit keys. The key length used in a session is based on the properties of the customer s browser. The integrity of a certification request and a certificate are protected with a message authentication code (MAC), so it is not possible for the customer (who controls the certificate transmission) to alter the data without the service provider or the bank noticing it. Each party is responsible for the protection and security of its own services and correctness of the data stored by them. A customer authenticating him- or herself is responsible for making sure that the online banking codes do not fall into the hands of external parties. The service provider s service must include a notice stating that the service uses the Tupas service which employs the customer s personal banking codes in authentication.

7 SERVICE DESCRIPTION 7 (21) 1.6 Definition of strong authentication Strong authentication of a person is based on something that the user: 1) Knows (such as a user ID), 2) Possesses (such as a list of passwords), 3) Is (such as a fingerprint). For an authentication transaction to fulfil this definition, two of these requirements must be met simultaneously. In addition to strong authentication, the transaction must be based on a sufficiently secure procedure. One-time passwords fulfil the criteria for strong authentication, but the sole combination of a fixed password and user ID does not fulfil the criteria for strong authentication required in the Tupas specification.

8 SERVICE DESCRIPTION 8 (21) 2 FUNCTIONAL SERVICE DESCRIPTION Customer Service provider Website pages Certification request page Bank's customer authentication page Customer's bank Customer authentication and Tupas certification service SP's website 8 Approval of Certificate Service terms 6 7 Tupas certificate Chart explanation: 1. A customer contacts the service provider s online service. During the phase when the customer enters the data requested by the authentication service the data communication between the customer and the service provider must be SSL encrypted. During phases 2 to 7 the data transfer link is always SSL encrypted. 2. The service provider sends the customer a certification request containing identifiers related to the transaction. The customer verifies the data in the request, but cannot change it. The customer can, however, interrupt the authentication process and return to customer s service. The certification request page in the customer s browser includes function buttons leading to the Tupas service and a Cancel button. 3. The customer clicks the button that transfers him or her to Tupas service. The certification request transmitted to the bank contains the data on the service provider and the transaction. The bank verifies the integrity of the request and the correctness of the data. 4. If the service provider s certification request is correct, the bank sends the customer an authentication request. If the bank notices errors in the request, it gives the customer an error message. In this case the customer returns to the service provider s service by clicking the Cancel button. 5. The customer authenticates him- or herself to the bank. If authentication fails, the bank sends the customer an error message and the customer returns to the service provider s service by clicking the Cancel button.

9 SERVICE DESCRIPTION 9 (21) 6. After successful authentication the bank generates a response message (the Tupas certificate). The Tupas service activates Accept and Cancel buttons for the customer. 7. The customer checks the certificate and approves the transfer of the authentication data to the service provider. By clicking Cancel, the customer can interrupt the authentication process and return to the service provider s service. 8. The service provider verifies the integrity and uniqueness of the certificate received. The service provider attaches the certificate to the customer s service transaction and stores it for as long as other service data is stored. Customer identification data must not be registered or used for any other purpose.

10 SERVICE DESCRIPTION 10 (21) 3 SERVICE MESSAGES AND THEIR CONTENT 3.1 Certification request Certification request data is in the form of hidden variables in the FORM data group behind a bank-specific button or icon. FORM DATA GROUP Field Name of data Length Comment 1. Message type A01Y_ACTION_ID 3-4 Standard, "701" 2. Version A01Y_VERS 4 For example, "0002" 3. Service provider A01Y_RCVID Customer code 4. Service language A01Y_LANGCODE 2 ISO 639 code: FI = Finnish SV = Swedish EN = English 5. Request identifier A01Y_STAMP 20 yyyymmddhhmmssxxxxxx 6. Identifier type A01Y_IDTYPE 2 See Appendix 2 7. Return address A01Y_RETLINK 199 OK return address for certificate 8. Cancel address A01Y_CANLINK 199 Return address in cancellation 9. Rejected address A01Y_REJLINK 199 Return address in error situations 10. Key version A01Y_KEYVERS 4 Key generation data 11. Algorithm A01Y_ALG 2 01 = MD5 02 = SHA Control field A01Y_MAC Message authentication code (MAC) of request The data field names are written in capital letters. The HTML structure of the FORM data group is: <FORM METHOD= POST ACTION= bank Tupas service URL > <INPUT NAME= A01Y_ACTION_ID TYPE= hidden VALUE= 701 > <INPUT NAME= A01Y_VERS TYPE="hidden VALUE=... > <INPUT NAME= A01Y_RCVID TYPE="hidden VALUE=... > <INPUT NAME= A01Y_LANGCODE TYPE="hidden VALUE=... > <INPUT NAME= A01Y_STAMP TYPE="hidden VALUE=... > <INPUT NAME= A01Y_IDTYPE TYPE="hidden VALUE=... > <INPUT NAME= A01Y_RETLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_CANLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_REJLINK TYPE="hidden VALUE=... > <INPUT NAME= A01Y_KEYVERS TYPE="hidden VALUE=... > <INPUT NAME= A01Y_ALG TYPE="hidden VALUE=... > <INPUT NAME= A01Y_MAC TYPE="hidden VALUE=... > </FORM> 3.2 Certification request s field descriptions: Field 1 The type of the message, which is a standard "701" in the Tupas service.

11 SERVICE DESCRIPTION 11 (21) Field 2 Field 3 Field 4 Field 5 Field 6 Field 7 Version number of the certification request message, which is bankspecific. Service provider s customer ID in its bank. The bank identifies the service provider from the customer ID and attaches to the Tupas certificate the service provider s name from its register. The language code of the service reveals the language of the service provider s page, and the bank service opens in this language. An identifier assigned to the certification request by the service provider. The identifier can be a reference number, customer number or a combination of date, time, a running identifier and a reference number. The identifier type shows what kind of an identifier the service provider wants from the customer. The identifier type must correspond to the functionality agreed upon in the service agreement. This is the address of the service provider s page where the service continues in OK situations. The service address must start with https - that is, the page must be SSL encrypted. Example: VALUE=" Field 8 Continuation point for the service provider s service in case the customer cancels the transmission of the certificate. Example: VALUE=" Field 9 Continuation point for the service provider s service in case of a technical error during authentication. The return address can be the same as in field 8. Example: VALUE=" Field 10 Field 11 Key version used in MAC calculation. Algorithm type code used in MAC calculation. 01 = MD5 algorithm, which produces a 32-character MAC 01 = SHA-1 algorithm, which produces a 40-character MAC. Field 12 The MAC calculated with the algorithm defined in data field 11 from the data encrypted in the certification request and the service provider s MAC key. With the MAC the recipient can verify the integrity of the certification request and authenticate the sender. 3.3 Forming of the MAC for a certification request (A01Y_MAC) The service provider forms a bank-specific certification request for each bank s button in its service. The certification request is protected by a MAC. The MAC is calculated from

12 SERVICE DESCRIPTION 12 (21) the certification request s FORM data group using the MAC key given to the service provider by the bank. The calculation starts by forming a character string from the service provider s MAC key and the VALUE of all data fields in the FORM data group preceding the MAC (fields 1 to 11).. The data is combined into character strings in sequence so that any blanks serving as fill characters are left out. The data groups in the character string are separated by & characters. An & character is also placed between the last data (field 11) and the MAC key, as well as at the end of the pass phrase. The & characters are included in the MAC calculation. The data appears on one single line. " " indicates a line break in this document. A01Y_ACTION_ID&A01Y_VERS&A01Y_RCVID&A01Y_LANGCODE& A01Y_STAMP&A01Y_IDTYPE&A01Y_RETLINK&A01Y_CANLINK& A01Y_REJLINK&A01Y_KEYVERS&A01Y_ALG&passphrase& The calculated MAC is converted into hexadecimal form, in which characters from A to F are represented in capitals. The hexadecimal hash value is taken to the Control field. 3.4 Certificate and identifier CERTIFICATE Field Name of data Length Comment 1. Version B02K_VERS 4 For example, "0002" 2. Certificate identification B02K_TIMESTMP 23 NNNyyyymmddhhmmssxxxxxx 3. Certificate number B02K_IDNBR 10 Number assigned to the certificate by the bank 4. Request identifier B02K_STAMP 20 Request data field 7 ( A01Y_STAMP) 5. Customer B02K_CUSTNAM -40 Customer s name E 6. Key version B02K_KEYVERS 4 Key generation 7. Algorithm B02K_ALG = MD5 02 = SHA-1 8. Identifier B02K_CUSTID 12 See Appendix 3 9. Identifier type B02K_CUSTTYPE 2 See description 10. Control field B02K_MAC MAC of the certificate The customer s bank adds the data in the response message to the OK return link in query string format. B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&B02K_CUSTID& &B02K_MAC The control code (BO2K_MAC) is calculated from the original message, after which the Scandinavian letters and certain special characters (such as blanks, equal signs and quotation marks) are replaced with the corresponding hexadecimal value (for example %20) in the message.

13 SERVICE DESCRIPTION 13 (21) The bank calculates the MAC for the certificate using a service provider-specific key. With the MAC the service provider can verify that the certificate has been formed by the customer s bank and that the data in the certificate has not been changed. 3.5 Certificate message field descriptions Field 1 Field 2 Version number of the Tupas certificate, which is bank-specific. Time stamp formed by the bank s system, in which NNN is the bank s number: Handelsbanken = 310 Nordea Bank Finland = 200 OP Bank Group = 500 Sampo Bank = 800 Savings banks and local co-op banks = 400 Tapiola Bank = 360 Bank of Åland = 600 Field 3 An identifier (a number) formed in the bank s information system for the certificate. Field 4 An identifier for the certification request picked from its data field 7 (A01Y_STAMP) Field 5 Field 6 Field 7 Field 8 Field 9 Field 10 Name of the authenticated customer retrieved from the bank s customer database. Generation number of the MAC key. MAC algorithm code. Customer ID, the content of which depends on the A01Y_IDTYPE field in the certification request. The field may contain an encrypted ID or a plaintext ID. Type of identifier. Tupas certificate MAC. 3.6 MAC calculation for the certificate The service provider verifies the integrity of the certificate received by calculating its MAC and comparing it with the MAC value in the control field of the message received. The MAC is calculated using data fields 1 to 9 in the certificate. When calculating the MAC, the data and the MAC key are separated by an "&" character. The & character is also appended to the end of the MAC key. The service provider-specific key is used in the MAC calculation: B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG& B02K_CUSTID&B02K_CUSTTYPE&ALG&

14 SERVICE DESCRIPTION 14 (21) 3.7 Identifier type The Tupas certificate s MAC calculation includes the identifier type specified in field A01Y_IDTYPE of the request message Plain-text identifier The value of field A01Y_IDTYPE in the certification request is 02 or 03 ; that is, a plaintext basic ID or a truncated plain-text basic ID. The identifier is a character string in plain text - for example, a personal identity number or its last four characters as required by field A01Y_IDTYPE in the certification request. The identifier is assigned as such (i.e. unchanged) to field B02K_CUSTID in the certificate Encrypted identifier The value of field A01Y_IDTYPE in the certification request is 01 ; that is, an encrypted basic ID. The bank uses the same hash algorithm for encrypting the identifier as is used for the MAC fields. The uniqueness of the identifier is confirmed from the content of the certificate s fields 2 to 4 and the customer ID (personal identity number or Business ID) in field 8 (A01Y_IDTYPE) of the certification request. When calculating an encrypted identifier, the data and the MAC key are separated by an "&" character. The & character is also appended to the end of the MAC key. The service provider-specific key is used for encryption. B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP& customer_identifier&passphrase& The result of the calculation is converted into hexadecimal form, in which characters from A to F are represented in capital letters. The final result is a character string identifying the customer, and it is placed in field B02K_CUSTID of the certificate. 3.8 Encrypted identifier comparison and customer authentication If the identifier is encrypted, the service provider first verifies the integrity of the certificate. Then the service provider calculates a comparison data for the customer identifier on the basis of the customer code stored in its register as described in section When the calculated comparison data and the identifier in the received certificate are identical and the message is intact, the data of the customer authenticated by the bank corresponds to the data registered by the service provider.

15 SERVICE DESCRIPTION 15 (21) 3.9 Bank-specific buttons The image files for bank-specific buttons can be obtained from a website at an address separately specified by each bank. The size or colour of the buttons must not be changed. The button image must not be used for purposes other than those that have been agreed upon between the service provider and the bank Exceptional situations The service provider must be prepared for exceptional situations, which include: 1. Customer interrupts the authentication process The customer can interrupt the transaction by clicking the Cancel button, either before the certification request is sent to the bank or after receiving the certificate. The address for the Cancel button is the Cancel address in FORM data field 8 of the certification request. 2. Customer authentication fails Customer authentication may fail if there are errors in the customer identifier or if the customer requests authentication with a wrong bank. The customer can return to the service provider s service by using the Cancel button. The address for the Cancel button is the Rejected address in FORM data field 8 of the certification request. 3. The bank detects an error in the certification request The bank detects an error in the certification request before the customer has been authenticated. The customer returns to the service provider s service using the Cancel button assigned to the Rejected address in FORM data field The service provider detects an error in the certificate The service provider detects an error when verifying the certificate. The error might be due to an error in the content of the certificate, or the data provided by the customer to the service provider does not match the data stored in the bank s system. The service provider should send the customer a message indicating of the situation. 5. There is no reply at all The reason for the interruption may be a connection break or other technical disturbance, or the customer terminating the session halfway through. 6. The same reply comes several times The service provider must be prepared for situations where the customer sends the same reply several times or resends an old certificate when moving between browser windows with the back/forward buttons.

16 SERVICE DESCRIPTION 16 (21) 4 CHANGING THE MAC KEY The MAC key used when calculating the MAC values can be changed at the bank s or service provider s request. Bank-specific procedures are used when changing the key, and these are described in each bank s system descriptions. Two bank-specific procedures are used in the key change: Only the MAC key is changed, the service provider s customer ID remains the same. Both the MAC key and the customer ID are changed. The MAC key is delivered to the contact person named in the agreement. The contact person is also informed of the new key s version number and the effective date. From that date onwards, MAC will be calculated using the new key. In order to guarantee a smooth key change, the service provider s system must enable the entry of the new key into the system ahead of time - in other words, the simultaneous use of at least two MAC keys. At the time of transfer (for a period of about 15 minutes), it is possible that MAC in some certificates arriving at the service provider are calculated with the old key and some are calculated with the new key. Once the new MAC key has been successfully taken into use, the old key can be deleted or deactivated in the service provider s system.

17 SERVICE DESCRIPTION 17 (21) THE FINNISH BANKERS 5 CHARACTER SET USED IN THE SERVICE An 8-bit ISO (Latin1) character set is used in the service. The below table lists the codes of the character set. æ %00 %01 %02 %03 %04 %05 %06 % %30 %31 %32 %33 %34 %35 %36 %37 ` a b c d e f g %60 %61 %62 %63 %64 %65 %66 %67 %90 %91 %92 %93 %94 %95 %96 %97 À Á Â Ã Ä Å Æ Ç %c0 %c1 %c2 %c3 %c4 %c5 %c6 %c7 ð ñ ò ó ô õ ö %f0 %f1 %f2 %f3 %f4 %f5 %f6 %f7 backspace tab linefeed c return %08 %09 %0a %0b %0c %0d %0e %0f 8 9 : ; < = >? %38 %39 %3a %3b %3c %3d %3e %3f h i j k l m n o %68 %69 %6a %6b %6c %6d %6e %6f š œ Ÿ %98 %99 %9a %9b %9c %9d %9e %9f È É Ê Ë Ì Í Î Ï %c8 %c9 %ca %cb %cc %cd %ce %cf ø ù ú û ü ý þ ÿ %f8 %f9 %fa %fb %fc %fd %fe %ff %10 %11 %12 %13 %14 %15 %16 A B C D E F G %40 %41 %42 %43 %44 %45 %46 %47 p q r s t u v w %70 %71 %72 %73 %74 %75 %76 %77 %a0 %a1 %a2 %a3 %a4 %a5 %a6 %a7 Ð Ñ Ò Ó Ô Õ Ö %d0 %d1 %d2 %d3 %d4 %d5 %d6 %d7 %18 %19 %1a %1b %1c %1d %1e %1f H I J K L M N O %48 %49 %4a %4b %4c %4d %4e %4f x y z { } ~ %78 %79 %7a %7b %7c %7d %7e %7f ª «%a8 %a9 %aa %ab %ac %ad %ae %af Ø Ù Ú Û Ü Ý Þ ß %d8 %d9 %da %db %dc %dd %de %df Space! " # $ % & ' %20 %21 %22 %23 %24 %25 %26 %27 P Q R S T U V W %50 %51 %52 %53 %54 %55 %56 %57 ƒ %80 %81 %82 %83 %84 %85 %86 %87 ± ² ³ µ %b0 %b1 %b2 %b3 %b4 %b5 %b6 %b7 à á â ã ä å æ ç %e0 %e1 %e2 %e3 %e4 %e5 %e6 %e7 ( ) * +, -. / %28 %29 %2a %2b %2c %2d %2e %2f X Y Z [ \ ] ^ _ %58 %59 %5a %5b %5c %5d %5e %5f ˆ Š Œ Ž %88 %89 %8a %8b %8c %8d %8e %8f ¹ º» ¼ ½ ¾ %b8 %b9 %ba %bb %bc %bd %be %bf è é ê ë ì í î ï %e8 %e9 %ea %eb %ec %ed %ee %ef

18 SERVICE DESCRIPTION 18 (21) APPENDIX 1 BANKS CONTACT INFORMATION HANDELSBANKEN Agreement issues: Local branch Codes and keys: Collected from the bank Customer support and technical problems: Helpdesk Banking days between finhelp@handelsbanken.fi NORDEA Agreement issues: Codes and keys: Customer support and technical problems: Local branch Delivered by mail to the contact person named in the agreement. Solo information for corporate customers In Finnish: (0.11 /min + local network charge / mobile call charge) Banking days between In Swedish: (0.11 /min + local network charge / mobile call charge) Banking days between In English: (0.11 /min + local network charge / mobile call charge) Banking days between Solo.tori@nordea.fi OP BANK GROUP Agreement issues: Codes and keys: Customer support: Local OP bank Collected from the bank OP Bank phone service: In Finnish: In Swedish: verkkopainikkeet@op.fi SAMPO BANK Agreement issues: Local branch or tel (local network charge / mobile call charge) Mon - Fri between Codes and keys: Delivered on a diskette in a sealed mail package Customer support and technical problems: Private customers (local network charge / mobile call charge), Mon - Fri between Corporate customers (1.17 /min +local network charge / mobile call charge), Mon - Fri between asiakastuki.ml@sampo.fi or tunnistuspalvelu@sampo.fi

19 SERVICE DESCRIPTION 19 (21) SAVINGS BANKS AND LOCAL CO-OPERATIVE BANKS Agreement issues: Local branch Codes and keys: Collected from the bank Customer support and technical problems: tel (1.17 /min + local network charge) info@samlink.fi TAPIOLA BANK Agreement issues: Tapiola electronic services Codes and keys: Delivered to the contact person named in the agreement Customer support and technical problems: Private customers (Mon - Fri) tunnistuspalvelu@tapiola.fi BANK OF ÅLAND Agreement issues: Customer code: Local branch Delivered at the branch upon signing the agreement. The MAC key is mailed to the contact person named in the agreement. Customer support and technical problems: Contact Center customer service In Finnish: In Swedish: Banking days Mon - Thu , Fri contactcenter@alandsbanken.fi

20 SERVICE DESCRIPTION 20 (21) APPENDIX 2 CERTIFICATE REQUEST TYPE Data field 6 in the certification request determines the type of identifier requested. The type is encoded with two characters (XY) of which the latter specifies the content of the requested identifier. 01 = Encrypted basic identifier A hexadecimal MAC calculated from the customer s identification data (identifier). The identifier can be a complete personal identity number, an electronic transaction identifier or a complete Business ID. 02 = Basic plain-text identifier The basic identifier can be the customer s complete personal identity number, an electronic transaction identifier or a complete Business ID. 03 = Truncated plain-text identifier A truncated identifier can contain the last four characters of the personal identity number without the character indicating century, or a complete business ID.

21 SERVICE DESCRIPTION 21 (21) APPENDIX 3 CUSTOMER IDENTIFIER IN THE CERTIFICATE The data field for identifier type indicates the type of identification data contained in field 8. The data is encoded with two characters (XY) of which the latter indicates the actual identification data type. Identification data: 00 = identifier not known 01 = personal identity number in plain text 02 = last four characters of personal identity number in plain text 03 = Business ID in plain text 04 = electronic transaction identifier in plain text 05 = encrypted personal identity number 06 = encrypted Business ID 07 = encrypted electronic transaction identifier 08 = other identifier in plain text (agreed between the service provider and the bank) 09 = encrypted other identifier (agreed between the service provider and the bank)

22 14 The Finnish Bankers Association BANKS 31 December 2004 THE FINNISH BANKERS Museokatu 8 A/ Box 1009 FI Helsinki Phone Fax info@fba.fi

Banks' TUPAS certification service for service providers

Banks' TUPAS certification service for service providers Banks' TUPAS certification service for service providers service provider's FK Federation of Finnish Financial Services for service providers CHANGE LOG Version Page Comment V2.0 All Message structures

More information

PRECISION OF DANSKE BANK IDENTIFICATION SERVICE

PRECISION OF DANSKE BANK IDENTIFICATION SERVICE PRECISION OF DANSKE BANK IDENTIFICATION SERVICE Valid as from 31.12.2017 1. SERVICE DESCRIPTION Danske Bank Identification Service allows service providers to reliably identify private customers and corporations

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

ASCII Code - The extended ASCII table

ASCII Code - The extended ASCII table ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage

More information

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment

More information

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

Description AX5805. Default values for the permissible motors. Version: Date:

Description AX5805. Default values for the permissible motors. Version: Date: Description values for the permissible motors Version: 1.3.0 Date: 2017-06-01 Table of contents Table of contents 1 Foreword 2 1.1 Notes on the manual 2 1.1.1 Intendent audience 2 1.1.2 Origin of the

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

SMS API TECHNICAL SPECIFICATION

SMS API TECHNICAL SPECIFICATION SMS API TECHNICAL SPECIFICATION Version 2.1 Provision of the Click SMS Gateway Service is dependent upon compliance with the specifications contained in this document. Although Click SMS has taken reasonable

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

Triple DES and AES 192/256 Implementation Notes

Triple DES and AES 192/256 Implementation Notes Triple DES and AES 192/256 Implementation Notes Sample Password-to-Key and KeyChange results of Triple DES and AES 192/256 implementation For InterWorking Labs customers who require detailed information

More information

User Guide for Greek GGT-Fonts Revision date: 23 May, 2011

User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 by Graham G Thomason Copyright Graham G Thomason, 2009. Permission is granted to copy or publish this document, provided this complete notice

More information

July Registration of a Cyrillic Character Set. Status of this Memo

July Registration of a Cyrillic Character Set. Status of this Memo Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet

More information

Acquirer JCB EMV Test Card Set

Acquirer JCB EMV Test Card Set Acquirer JCB EMV Test Card Set July, 2017 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

First Data EMV Test Card Set. Version 1.30

First Data EMV Test Card Set. Version 1.30 First Data EMV Test Card Set.30 January, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

First Data EMV Test Card Set. Version 2.00

First Data EMV Test Card Set. Version 2.00 First Data EMV Test Card Set.00 February, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

Chemistry Hour Exam 2

Chemistry Hour Exam 2 Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats

More information

Pe h-ōe-jī Unicode Correspondence Table

Pe h-ōe-jī Unicode Correspondence Table Pe h-ōe-jī Correspondence Table This document contains the code points and font examples for characters needed to write Pe h-ōe-jī for Taiwanese (Hoklo). Standard latin capital and small letters are not

More information

First Data Dual Interface EMV Test Card Set. Version 1.20

First Data Dual Interface EMV Test Card Set. Version 1.20 First Data Dual Interface EMV Test Card Set August, 2016 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

ZN-DN312XE-M Quick User Guide

ZN-DN312XE-M Quick User Guide ZN-DN312XE-M Quick User Guide This manual provides instructions for quick installation and basic configuration of your IP device. Step1. Connect cables to IP device Connect required cables to the device

More information

E-payment. Service description

E-payment. Service description E-payment Service description Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up... 4 2.1 Service

More information

text2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW).

text2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW). text2reach2 SMS API Sep 5, 2013 v1.1 This document describes application interface (API) between SMS service provider (SP) and SMS gateway (SMSGW). Table of Contents API Interface Types...3 Bulk SMS interface...3

More information

DENIC Domain Guidelines

DENIC Domain Guidelines The English translation of the DENIC Eszett Domain Guidelines is provided for the convenience of our non-german-speaking customers. Regardless of this, only the original German-language version is legally

More information

6.1 Font Types. Font Types

6.1 Font Types. Font Types 6 Font This chapter explains basic features of GP-Pro EX's "Font" and basic ways of placing text with each font. Please start by reading "6.1 Font Types" (page 6-2) and then turn to the corresponding page.

More information

Gateway Ascii Command Protocol

Gateway Ascii Command Protocol Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

Acquirer JCB Dual Interface EMV Test Card Set

Acquirer JCB Dual Interface EMV Test Card Set Acquirer JCB Dual Interface EMV Test Card Set.00 July, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing and delivering this document

More information

VT420 Video Terminal Programmer Reference Manual Update

VT420 Video Terminal Programmer Reference Manual Update VT420 Video Terminal Programmer Reference Manual Update EK VT42P UP. A01 Digital Equipment Corporation The information in this document is subject to change without notice and should not be construed as

More information

First Data DCC Test Card Set. Version 1.30

First Data DCC Test Card Set. Version 1.30 First Data DCC Test Card Set.30 April, 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available from industry

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013 CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, SPRING 2013 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point

More information

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines

The cache is 4-way set associative, with 4-byte blocks, and 16 total lines Sample Problem 1 Assume the following memory setup: Virtual addresses are 20 bits wide Physical addresses are 15 bits wide The page size if 1KB (2 10 bytes) The TLB is 2-way set associative, with 8 total

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

E-payment. Service description. September 2016

E-payment. Service description. September 2016 E-payment Service description September 2016 Content 1 E-payment 1.1 General description... 2 1.2 Advantages... 2 1.3 Availability... 2 1.4 Security... 2 2 Service agreement, instructions and start-up...

More information

PCL ISO 8859/5 Latin/Cyrillic

PCL ISO 8859/5 Latin/Cyrillic Page 1 of 5 PCL Symbol Se t: 10N Unicode gly ph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space -- -- -- -- $21 U0021 Ê Exclamation mark -- -- -- -- $22 U0022 Ë Quotation

More information

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module

Digital Lighting Systems, Inc. CD400-DMX DMX512 Four Channel Dimmer and Switch module , Inc. DMX512 Four Channel Dimmer and Switch module Input: 5 Amps @ 6-24 VDC Outputs: 5 Amps Maximum each, total 4 outputs 8 Amps Maximum. FRONT BACK USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. Digital Lighting Systems, Inc. Four Channel Dry Contacts Relays Switch Pack DMX512 compatible USER'S MANUAL -UM User's Manual - Page 1 GENERAL DESCRIPTION The is a 4-channel DMX-512 compatible electro-mechanical

More information

Scan Results - ( Essentials - Onsharp )

Scan Results -   ( Essentials - Onsharp ) Scan Results - www.onsharp.com ( Essentials - Onsharp ) Overview Open Ports (18) Scan ID: 7675527 Target: www.onsharp.com Max Score: 2.6 Compliance: Passing PCI compliance, Expires undefined Profile: 15

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account

More information

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version:

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version: ID: 42417 Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Signature

More information

TLS 1.2 Protocol Execution Transcript

TLS 1.2 Protocol Execution Transcript Appendix C TLS 1.2 Protocol Execution Transcript In Section 2.3, we overviewed a relatively simple protocol execution transcript for SSL 3.0. In this appendix, we do something similar for TLS 1.2. Since

More information

6. Specifications & Additional Information

6. Specifications & Additional Information 6. Specifications & Additional Information SIIGX52004-3.1 Transceier Blocks Table 6 1 shows the transceier blocks for Stratix II GX and Stratix GX deices and compares their features. Table 6 1. Stratix

More information

CDR File Information. Comments Direct PCM

CDR File Information. Comments Direct PCM IMPORTANT NOTICE: Robert Bosch LLC and the manufacturers whose vehicles are accessible using the CDR System urge end users to use the latest production release of the Crash Data Retrieval system software

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 ANNOUNCEMENTS TA Office Hours (ITE 334): Genaro Hernandez, Jr. Mon 10am 12noon Roshan Ghumare Wed 10am 12noon Prof.

More information

UNH-IOL MIPI Alliance Test Program

UNH-IOL MIPI Alliance Test Program DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company

More information

Interac USA Interoperability EMV Test Card Set

Interac USA Interoperability EMV Test Card Set Interac USA Interoperability EMV Test Card Set.00 April, 2018 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information

More information

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010 ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:

More information

ETSI TS V ( )

ETSI TS V ( ) TS 135 233 V12.1.0 (2014-10) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( )

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( ) 6. Combinational Circuits George Boole (85 864) Claude Shannon (96 2) Signals and Wires Digital signals Binary (or logical ) values: or, on or off, high or low voltage Wires. Propagate digital signals

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission (As amended on 15 November 2013) 1. Scope of services (1) The Bank is available to its Customer (account holder) for remote transmission of data by electronic

More information

Digital Lighting Systems, Inc.

Digital Lighting Systems, Inc. , Inc. PD402-DMX Four Channel Dimmer and Switch Packs 4 x 2.5 Amps @ 6VDC to 24 VDC DMX52 compatible DMX52 4 x 2.5 Amps Dimmer Pack C UL US LISTED Digital Lighting Systems, Inc. USER'S MANUAL User's Manual

More information

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip

More information

DBK24. Isolated Digital Output Chassis. Overview

DBK24. Isolated Digital Output Chassis. Overview DBK24 Isolated Digital Output Chassis Overview 1 Power Requirements 2 Hardware Setup 2 Card Connection 2 Card Configuration 3 DaqBook and DaqBoard Connection 4 DaqBoard/2000 Series Board Connection 5 DaqBook

More information

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel (a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

Service Segment Version 3

Service Segment Version 3 Message Implementation Service Segment Version 3 Rev 2000-02-01 Swedish Bankers Association Svenska Bankföreningen sed96a-e.xxx 20 August 1998 ver 2.0 Page 1 Revisions - Service segments Date: Changes:

More information

Web Services. File Transfer Service Description

Web Services. File Transfer Service Description Web Services File Transfer Service Description Contents 1 General... 2 1.1 Web Services... 2 1.2 Abbreviations and terms used in the service description... 2 2 Agreement on the use of the Web Services

More information

Message exchange with. Finnish Customs

Message exchange with. Finnish Customs Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 24.8.2018 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish

More information

PCL Greek-8 - Code Page 869

PCL Greek-8 - Code Page 869 PCL Greek-8 - Code Page 869 Page 1 of 5 PCL Symbol Se t: 8G Unicode glyph correspondence tables. Contact:help@redtitan.com http://pcl.to $20 U0020 Space $90 U038A Ê Greek capita l letter iota with tonos

More information

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version:

ID: Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: ID: 59176 Cookbook: browseurl.jbs Time: 19:37:50 Date: 11/05/2018 Version: 22.0.0 Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Analysis

More information

Guideline for support SWIFTNet for Corporates

Guideline for support SWIFTNet for Corporates Guideline for support SWIFTNet for Corporates Table of contents 1 Purpose of this document... 1 2 SWIFTNet for Corporates Service Support... 1 2.1 General information on SWIFTNet for Corporates 1 2.2 One

More information

Banner 8 Using International Characters

Banner 8 Using International Characters College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating

More information

E-invoice. Service Description

E-invoice. Service Description E-invoice Service Description January 2017 Contents General description... 2 Benefits of the e-invoice... 2 Message descriptions... 2 E-invoice addresses... 3 E-invoice to file transfer... 3 Adoption of

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

Systems/DBG Debugger Version 2.20

Systems/DBG Debugger Version 2.20 Systems/DBG Debugger Version 2.20 Copyright c 2018, Dignus, LLC Systems/DBG Debugger Version 2.20 i Copyright c 2018 Dignus LLC, 8378 Six Forks Road Suite 203, Raleigh NC, 27615. World rights reserved.

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

General terms governing Nordea s 1 (6) e-invoice for companies January 2017

General terms governing Nordea s 1 (6) e-invoice for companies January 2017 General terms governing Nordea s 1 (6) 1. General remarks and scope of application E-invoice is a service through which Customers can send and receive e-invoices and other Finvoice messages by using an

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

Hash Constant C Determinants leading to collisionfree

Hash Constant C Determinants leading to collisionfree Hash Constant C Determinants leading to collisionfree (Ernst Erich Schnoor) eschnoor@multi-matrix.de Addendum to article: Core of the CypherMatrix Method http://www.telecypher.net/corecyph.htm#z6 Object

More information

{c,} c 00E7 ç &ccedil LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è &egrave LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é &eacute LATIN SMALL

{c,} c 00E7 ç &ccedil LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è &egrave LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é &eacute LATIN SMALL Non-ASCII Symbols in the SCA Armorial Database by Iulstan Sigewealding, updated by Herveus d'ormonde 4 January 2014 PDF Version by Yehuda ben Moshe, 16 February 2014 Since January 1996, the SCA Ordinary

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

Regulation on public telephone network numbering

Regulation on public telephone network numbering FICORA 32 S/2016 M 1 (18) Unofficial translation Regulation on public telephone network numbering Issued in Helsinki on 22 December 2016 The Finnish Communications Regulatory Authority (FICORA) has, under

More information

DECISION OF THE EUROPEAN CENTRAL BANK

DECISION OF THE EUROPEAN CENTRAL BANK L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System

More information

Adorn. Serif. Smooth. v22622x

Adorn. Serif. Smooth. v22622x s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

More information

Digital Lighting Systems, Inc. PD405-DMX. Four Channel Dimmer and Switch Packs. DMX512 compatible. PD405-DMX-24DC DMX512 4 x 5 Amps Dimmer Pack

Digital Lighting Systems, Inc. PD405-DMX. Four Channel Dimmer and Switch Packs. DMX512 compatible. PD405-DMX-24DC DMX512 4 x 5 Amps Dimmer Pack Digital Lighting Systems, Inc. PD405DMX Four Channel Dimmer and Switch Packs DMX52 compatible PD405DMX24DC DMX52 4 x 5 Amps Dimmer Pack C UL US LISTED www.digitallighting.com Digital Lighting Systems,

More information

Digital Projector X30N/X35N

Digital Projector X30N/X35N Digital Projector X30N/X35N Operator's Guide TECHNICAL Warranty 3M warrants that when the 3M Product is used according to 3M s Intended Use Statement (www.3m.com/meetings), it will perform satisfactorily

More information

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution

More information

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page Title page GE Digital Energy D90 Plus Line Distance Protection System Communications guide D90 Plus firmware revision:.9x GE publication code: 60-9070-F (GEK-3469) GE Digital Energy 650 Markland Street

More information

Special Characters in Aletheia

Special Characters in Aletheia Special in Aletheia Lat Change: 28 May 2014 The following table comprie all pecial character which are currently available through the virtual keyboard integrated in Aletheia. The virtual keyboard aid

More information

Technical Specification. Third Party Control Protocol. AV Revolution

Technical Specification. Third Party Control Protocol. AV Revolution Technical Specification Third Party Control Protocol AV Revolution Document AM-TS-120308 Version 1.0 Page 1 of 31 DOCUMENT DETAILS Document Title: Technical Specification, Third Party Control Protocol,

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

The Use of Reserved (= Undefined) 1252 Code Page Slots in TrueType Fonts

The Use of Reserved (= Undefined) 1252 Code Page Slots in TrueType Fonts The Use of Reserved (= Undefined) 1252 Code Page Slots in TrueType Fonts Problem: How do you create a 1252 TrueType text font (= non-symbol font) with slots 128, 129, 141-144, 157-158, 173, 175, 181, 183,

More information

EDITION : 02/01/07 DN

EDITION : 02/01/07 DN USER'S MANUAL DIGI 6 VERSION 1-2 USITT DMX ACCORDED W I R I N G D A T A EDITION : 02/01/07 DN40729601 Robert Juliat S.A.S. 2, rue de Beaumont, F 600 Fresnoy-en-Thelle - phone : + (0) 44 26 1 89 - fax :

More information

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 Product Introduction. Purpose of use, Features TDH-940 is a Test Disc designed for confirmation of operation of DVD

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

imag User Manual USER MANUAL imag Magnetic Stripe Reader for iphone 3G, 3GS and ipod Touch

imag User Manual USER MANUAL imag Magnetic Stripe Reader for iphone 3G, 3GS and ipod Touch imag User Manual USER MANUAL imag Magnetic Stripe Reader for iphone 3G, 3GS and ipod Touch 80097503-001 06/10/2010 1 imag Firmware Command 1.1 Setting Command The setting data command is a collection of

More information

Report of Independent Accountants

Report of Independent Accountants Report of Independent Accountants S.C. certsign S.A. B-dul Timisoara nr. 5A Sector 6, Bucharest, ZIP 061301, Romania We have examined the accompanying assertion 1 made by the management of S.C. certsign

More information

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on

More information

MIDI-Scope. Artistic Licence Engineering Ltd. Software Version V1.3 Manual Revision V1.91

MIDI-Scope. Artistic Licence Engineering Ltd. Software Version V1.3 Manual Revision V1.91 MIDI-Scope Artistic Licence Engineering Ltd Software Version V1.3 Manual Revision V1.91 Product Registration Form Product: MIDI-Scope Version No. Serial No. Date Purchased: Supplier: Name: Company Name:

More information

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:

More information