锘??xml version="1.0" encoding="utf-8" standalone="yes"?>国产欧美日韩在线,国产婷婷色综合av蜜臀av,国产精品专区第二http://m.shnenglu.com/MichaelLiu/category/1643.htmlTechnology changes the world, serves the people.zh-cnWed, 04 Aug 2010 01:58:04 GMTWed, 04 Aug 2010 01:58:04 GMT60Researcher Demonstrates ATM 鈥楯ackpotting鈥?at Black Hat Conferencehttp://m.shnenglu.com/MichaelLiu/articles/121725.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Fri, 30 Jul 2010 13:18:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/121725.htmlhttp://m.shnenglu.com/MichaelLiu/comments/121725.htmlhttp://m.shnenglu.com/MichaelLiu/articles/121725.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/121725.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/121725.html

Researcher Demonstrates ATM ‘Jackpotting’ at Black Hat Conference

LAS VEGAS 鈥?In a city filled with slot machines spilling jackpots, it was a “jackpotted” ATM that got the most attention Wednesday at the Black Hat security conference, when researcher Barnaby Jack demonstrated two suave hacks against automated teller machines that made them spew out dozens of crisp bills.

The audience greeted the demonstration with hoots and applause.

In one of the attacks, Jack reprogrammed the ATM remotely over a network, without touching the machine; the second attack required he open the front panel and plug in a USB stick loaded with malware.

Jack, director of security research at IOActive Labs, focused his hack research on standalone and hole-in-the-wall ATMs 鈥?the kind installed in retail outlets and restaurants. He did not rule out that bank ATMs could have similar vulnerabilities, but he hasn’t yet examined them.

The two systems he hacked onstage were made by Triton and Tranax. The Tranax hack was conducted using an authentication bypass vulnerability that Jack found in the system’s remote monitoring feature, which can be accessed over the internet or dial-up, depending on how the owner configured the machine.

Tranax’s remote monitoring system is turned on by default, but Jack said the company has since begun advising customers to protect themselves from the attack by disabling the remote system.

To conduct the remote hack, an attacker would need to know an ATM’s IP address or phone number. Jack said he believes about 95 percent of retail ATMs are on dial-up; a hacker could war dial for ATMs connected to telephone modems, and identify them by the cash machine’s proprietary protocol.

The Triton attack was made possible by a security flaw that allowed unauthorized programs to execute on the system. The company distributed a patch last November so that only digitally signed code can run on them.

Both the Triton and Tranax ATMs run on Windows CE.

Using a remote attack tool, dubbed Dillinger, Jack was able to exploit the authentication-bypass vulnerability in Tranax’s remote monitoring feature and upload software or overwrite the entire firmware on the system. With that capability, he installed a malicious program he wrote, called Scrooge.

Scrooge lurks on the ATM quietly in the background until someone wakes it up in person. It can be initiated in two ways 鈥?either through a touch-sequence entered on the ATM’s keypad or by inserting a special control card. Both methods activate a hidden menu an attacker can use to make the machine spew out money or print receipts. Scrooge will also capture magstripe data embedded in bank cards other users insert into the ATM.

To demonstrate, Jack punched keys on the keypad to call up the menu, then instructed the machine to spit out 50 bills from one of four cassettes. The screen lit up with the word “Jackpot!” as the bills came flying out the front.

To hack the Triton, he used a key to open the machine’s front panel, then connected a USB stick containing his malware. The ATM uses a uniform lock on all of its systems 鈥?the kind used on filing cabinets 鈥?that can be opened with a $10 key available on the web. The same key opens every Triton ATM.

Two Triton representatives said at a press conference after the presentation that its customers preferred a single lock on systems so they could easily manage fleets of machines without requiring numerous keys. But they said Triton offers a lock upgrade kit to customers who request it 鈥?the upgraded lock is a Medeco pick-resistant, high-security lock.

Similar malware attacks were discovered on bank ATMs in Eastern Europe last year. Security researchers at Trustwave, based in Chicago, found the malware on 20 machines in Russia and Ukraine that were all running Microsoft’s Windows XP operating system. They said they found signs that hackers were planning on bringing their attacks to machines in the United States. The malware was designed to attack ATMs made by Diebold and NCR.

Those attacks required an insider, such as an ATM technician or anyone else with a key to the machine, to place malware on the ATM. Once that was done, attackers could insert a control card into the machine’s card reader to trigger the malware and give them control of the machine through a custom interface and the ATM’s keypad.

The malware captured account numbers and PINs from the machine’s transaction application and then delivered it to the thief on a receipt printed from the machine in an encrypted format, or to a storage device inserted in the card reader. A thief could also instruct the machine to eject whatever cash was inside the machine. A fully loaded bank ATM can hold up to $600,000.

Earlier this year, in a separate incident, a Bank of America employee was charged with installing malware on his employer’s ATMs that allowed him to withdraw thousands of dollars without leaving a transaction record.

Jack was slated to give the same ATM vulnerability talk at Black Hat last year, but his then-employer Juniper Networks canceled the talk weeks before the conference after an unnamed ATM vendor expressed concern. He said on Wednesday that the earlier talk was withdrawn to allow Triton time to implement a patch to address the code-execution vulnerability targeted in his demonstration. The company released the patch eight months ago.

Jack said that so far he’s examined ATMs made by four manufacturers and all of them have vulnerabilities. “Every ATM I’ve looked at allows that ‘game over.’ I’m four for four,” he said at the press conference. He wouldn’t discuss the vulnerabilities in the two ATMs not attacked on Wednesday because he said his previous employer, Juniper Networks, owns that research.

Jack said his aim in demonstrating the hacks is to get people to look more closely at the security of systems that are presumed to be locked down and impenetrable.

Photo: Isaac Brekken/Associated Press



Read More http://www.wired.com/threatlevel/2010/07/atms-jackpotted/#ixzz0vAgMMN79



]]>
椋庨洦鍏肩▼20杞解斺旇ATM鏈鴻繘鍏ヤ腑鍥介摱琛屼笟20鍛ㄥ勾錛堣漿杞斤級http://m.shnenglu.com/MichaelLiu/articles/54682.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Thu, 26 Jun 2008 09:02:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/54682.htmlhttp://m.shnenglu.com/MichaelLiu/comments/54682.htmlhttp://m.shnenglu.com/MichaelLiu/articles/54682.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/54682.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/54682.html椋庨洦鍏肩▼20杞解斺旇ATM鏈鴻繘鍏ヤ腑鍥介摱琛屼笟20鍛ㄥ勾

http://www.fcmag.com.cn/Column/Special/28544.shtml

瀵逛簬閲戣瀺鐣屾潵璇達紝ATM鏈虹畻寰椾笂鏄?0涓栫邯鏈浼熷ぇ鐨勫彂鏄庝箣涓銆傚浜庝腑鍥界殑閾惰涓氳岃█錛孉TM鏈哄紑鍚簡涓鎵囬氬悜鐢ㄦ埛鐨勬柊紿楀彛銆傚浜庢秷璐硅呰岃█錛孉TM鏈哄凡緇忔垚涓烘棩甯哥敓媧葷殑涓閮ㄥ垎銆傝嚜1986騫寸涓鍙癆TM鏈哄湪涓浗閾惰鐝犳搗鍒嗚鎶曟斁鑷充粖錛孉TM鏈鴻繘鍏ヤ腑鍥介摱琛屼笟宸叉湁20騫存椂闂淬傞殢鐫涓浗閾惰涓氫俊鎭寲寤鴻鐨勬繁鍏ュ紑灞曪紝浜轟滑瀵笰TM鏈轟篃緇忓巻浜嗕竴涓敱闄岀敓鍒扮啛鎮夌殑榪囩▼銆傚浠婏紝閲戣瀺鑷姪璁懼宸叉垚涓洪摱琛屽紑灞曚釜浜轟笟鍔$殑涓鏉′笉鍙浛浠g殑娓犻亾銆?br>     1996騫達紝涓浗閾惰涓婃搗甯傚垎琛屽湪铏規ˉ寮鍙戝尯寮鍔炰簡鍥藉唴絎竴瀹惰嚜鍔╅摱琛岋紝涓哄鎴鋒彁渚涘叏澶╁欐湇鍔★紝閫愭鍩瑰吇浜轟滑浣跨敤鑷姪璁懼鐨勪範鎯?br>     1998騫村悗錛岄殢鐫ATM鏈虹瓑鑷姪璁懼鍦ㄩ摱琛屽簲鐢ㄧ殑閫愭笎鎴愮啛錛屽紑濮嬪嚭鐜頒簡鏇村鐨勮嚜鍔╅摱琛屻侫TM鏈鴻嚜鍔ㄦ煖鍛樻満銆丆DM鑷姩瀛樻鏈恒佸瓨鎶樿ˉ鐧繪満銆佽Е鎽稿紡澶氬獟浣撶數鑴戠瓑璁懼鐨勫嚭鐜幫紝浣胯嚜鍔╅摱琛屾洿鎺ヨ繎浜庣湡姝f剰涔変笂鐨勯摱琛屽姛鑳姐?br>     鑰屼環鏍兼槀璐碉紝鍔熻兘鍗曚竴錛屽姞涓婂悇閾惰鍙戝崱閲忎笉澶氾紝ATM鏈轟綔涓洪摱琛屼負瀹㈡埛鎻愪緵鐨勪竴縐嶄究鎹風殑“淇℃伅鍖栨湇鍔℃墜孌?#8221;騫墮潪璋佸閮界敤寰楄搗銆傛埅鑷?000騫村簳錛屾嫢鏈堿TM鏈烘暟閲忓崰鏈夌粷瀵逛紭鍔跨殑宸ュ晢閾惰錛屾姇鍏ヤ嬌鐢ㄧ殑ATM紿佺牬1涓囧彴錛屾鏃訛紝鐗′腹鍗″彂琛岄噺涓?000涓囧紶錛屽垵姝ュ艦鎴愪簡瑕嗙洊鍏ㄥ浗鐨凙TM鏈鴻嚜鍔╅摱琛屼綋緋匯傚叾浠栭摱琛屽垯鐩稿樊杈冭繙銆?br>    緇忚繃浜?锝?騫寸殑璧鋒闃舵錛屽悇鍟嗕笟閾惰甯傚満鎰忚瘑澧炲己錛岄愭鎰忚瘑鍒拌嚜鍔╄澶囧湪鏈潵涓漢閲戣瀺涓氬姟鍙戝睍涓殑閲嶈鎬с備簬鏄疉TM鏈哄湪涓浗閾惰涓氳繘鍏ヤ簡蹇熷彂灞曟湡銆?003騫翠竴鍦?#8220;闈炲吀”紿佽涓浗錛屼弗閲嶅共鎵頒簡浜轟滑鐨勬棩甯哥敓媧誨拰宸ヤ綔銆傝岃繖緇欎簡緗戜笂閾惰銆丄TM鏈虹瓑閲戣瀺娓犻亾褰版樉鍏朵紭鍔跨殑鏈轟細銆傚伐琛屻佷腑琛屻佸緩琛岀瓑鍟嗕笟閾惰鐪嬪埌浜嗗競鍦哄湪鍙樺寲錛岃瘉鍒稿競鍦恒佽祫鏈競鍦烘鍦ㄨ繀閫熷彂灞曪紝涓漢瀹㈡埛鐞嗚儲鐨勯渶姹備笉鏂鍔狅紝欏哄簲榪欑甯傚満鐨勫彉鍖栵紝綰風悍寮濮嬮噸瑙嗛浂鍞笟鍔$殑鍙戝睍銆傚叾涓紝宸ュ晢閾惰鏈鏃╁湪鍥藉唴瀹炴柦浜嗗ぇ瀹㈡埛鎴樼暐鍗抽浂鍞笟鍔″彂灞曟垬鐣ワ紝鎺ㄨ繘浜嗕釜浜洪噾铻嶄笟鍔$殑杞瀷銆備笌姝ゆ垬鐣ュ悓姝ュ彂灞曠殑鏄悇鍟嗕笟閾惰瀵歸噾铻嶈嚜鍔╄澶囩殑澶у姏鎶曞叆銆?br>    闅忕潃澶ч噺ATM鏈烘姇鏀懼競鍦猴紝鍚勮瀵笰TM鏈虹殑鐩戞帶綆$悊宸ヤ綔涔熸彁涓婃棩紼嬨傚伐琛岄氳繃瀹炴柦ATM鏈哄墠緗満鏂規錛岀洿瑙傚湴鍙嶆槧鍏ㄨ姣忓彴ATM鏈虹殑榪愯鎯呭喌錛屼互紜繚鐢ㄦ埛浣跨敤ATM鏈轟氦鏄撶殑瀹夊叏銆?005騫達紝宸ュ晢閾惰閲嶇偣鍔犲ぇ浜嗗ATM鏈哄姛鑳藉拰鏈嶅姟鐨勬敼榪涘姏搴︼紝閫氳繃縐戝璋冩暣ATM鏈虹殑甯冨眬銆佸姞寮篈TM鏈虹殑瀹夊叏闃茶寖鎺柦絳夛紝浣緼TM鏈虹殑浣跨敤鏁堢巼澶уぇ鎻愰珮銆?005騫村伐鍟嗛摱琛孉TM鏈轟氦鏄撴婚噾棰濈獊鐮?000浜垮厓銆侫TM鏈轟氦鏄撻噺杈?6.2浜跨瑪錛屽叾涓粨綆楃被浜ゆ槗閲?.34浜跨瑪錛屽悓姣斿鍔?.08浜跨瑪銆?/font>

涓?#8220;鎺掗槦鐜拌薄”瑙e洶

    浠婂勾浠ユ潵錛屽悇閾惰緗戠偣鐨勬帓闃熺幇璞¢兘姣旇緝涓ラ噸銆備負浜嗚В鍐蟲帓闃熻繖涓棶棰橈紝浜轟滑鐨勭洰鍏夎仛鐒﹀埌ATM鏈轟笂鏉ャ?br>    寤鴻閾惰涓漢閲戣瀺閮ㄥ壇鎬葷粡鐞嗙帇姣呭憡璇夎鑰咃紝浠栨浘緇忓埌寤鴻鍖椾含鐨勪竴涓綉鐐瑰綋浜嗕竴澶╁ぇ鍫傜粡鐞嗭紝緇煎悎鍏朵粬閮ㄩ棬鍙嶆槧涓婃潵鐨勬儏鍐碉紝浠栨葷粨浜嗗嚭鐜版帓闃熼棶棰樼殑涓昏鍘熷洜銆?br>    棣栧厛錛屾槸鑲″競榪炲甫涓嬬殑鍩洪噾鐏垎錛屼嬌閾惰鍜屽鎴烽兘娌℃湁鍏呭垎鐨勬濇兂鍑嗗銆傚緩璁鵑摱琛岀殑鍩洪噾浠g悊涓氬姟鏄腑闂翠笟鍔¢攢鍞殑閲嶈涓欏廣備笌鍩洪噾鐩稿叧鐨勪笟鍔¢渶姹傞噺澶у銆傚嚑涔庢墍鏈夌殑鍟嗕笟閾惰閮藉湪縐瀬鎵挎徑鍩洪噾浠i攢涓氬姟錛屽垎浜偂甯傜孩鍒┿?br>    鍏舵錛屼笌閾惰鐨勫悗鍙扮郴緇熺殑鏈嶅姟鑳藉姏鏈変竴瀹氬叧緋匯傞摱琛岀殑鍚庡彴鏈嶅姟緋葷粺嫻佺▼浠嶇劧澶鏉傦紝闇瑕佷笉鏂紭鍖栥傛瘮濡傦紝鍦ㄥ緩琛屼拱鍩洪噾闇瑕佸姙鐞嗕竴寮犱笓鐢ㄧ殑鍗★紝涓轟簡綆鍖栨祦紼嬶紝鎻愰珮鏁堢巼錛屽緩琛屽皢鍦ㄥ勾搴曞彇娑堣繖涓幆鑺傘?br>    絎笁錛屼笌涓氬姟浜哄憳瀵逛笟鍔$殑鐔熺粌紼嬪害鍜岀礌璐ㄦ湁鍏熾傝繖閲岀殑涓氬姟浜哄憳涓嶄粎鎸囨煖鍛橈紝榪樺寘鎷ぇ鍫傜粡鐞嗐備竴涓ソ鐨勫ぇ鍫傜粡鐞嗗彲浠ラ氳繃瀵瑰鎴風殑寮曞錛屽垎嫻佹帀閭d簺鑳藉湪ATM鏈轟笂瀹炵幇鐨勪笟鍔★紝鍑忚交鏌滈潰鍘嬪姏銆傚彟澶栵紝瀵瑰叕涓庡縐佷笟鍔$殑紿楀彛寮璁炬病鏈夐殢鐫涓氬姟嫻佸悜榪涜鍙婃椂璋冩暣錛屽嚭鐜?#8220;瀵瑰叕涓氬姟闂插緱娌′簨騫詫紝瀵圭涓氬姟蹇欏緱涓濉岀硦娑?#8221;鐜拌薄銆?br>    浠庤В鍐蟲帓闃熼棶棰樿繖涓搴︾湅錛孉TM鏈虹殑甯冩斁鍚堢悊鍜屽厖瓚充竴瀹氱▼搴︿笂緙撹В浜嗙溂涓嬬殑鎺掗槦闂銆?br>    宸ュ晢閾惰涓漢閲戣瀺涓氬姟閮ㄨ礋璐d漢浠嬬粛璇達紝閽堝浠婂勾鍑虹幇鐨勬帓闃熺幇璞★紝瑕佹眰灝嗗鏉傜殑涓氬姟鍜岀畝鍗曠殑涓氬姟鍖哄垎寮鏉ワ紱涓庢鍚屾椂錛屽伐琛屾鍦ㄨ繘琛屽唴閮ㄧ殑嫻佺▼鍐嶉狅紝榪欏皢浣夸笟鍔℃祦紼嬬畝媧佸寲銆傚伐鍟嗛摱琛屽姞澶т簡钀ラ攢瀹d紶鍔涘害錛屾寚瀵煎鎴鋒紜搷浣淎TM鏈猴紝涓誨姩鎻愮ず閾惰鍗″強ATM鏈轟氦鏄撶殑瀹夊叏浜嬮」錛屽憡鐭ュ鎴風壒孌婃儏鍐電殑搴旀ュ鐞嗘帾鏂斤紝鍔姏涓哄鎴鋒彁渚涗究鎹峰畨鍏ㄧ殑ATM鏈鴻嚜鍔╂湇鍔$幆澧冦傚悓鏃訛紝鍙栫幇闄愰鎻愰珮鍚庯紝ATM鏈烘敮浠樼幇閲戦噺灝嗛殢涔嬪澶氾紝宸ュ晢閾惰宸茶姹傚叏琛屾牴鎹緰鍐匒TM鏈烘敮浠樼壒鐐癸紝鍚堢悊紜畾ATM鏈哄浠橀噾濉閲忓拰鍔犻挒棰戠巼錛屼繚璇丄TM鏈轟笓鐢ㄩ挒鍒哥殑渚涘簲銆傛嵁鎮夛紝浠婂勾錛孉TM鏈哄紑鏈虹巼銆佹甯歌繍琛岀巼絳夋寚鏍囪緝鍘誨勾鎻愰珮錛屽彈鐞嗕笟鍔¢噺澶у箙澧炲姞銆備粖騫村墠5涓湀ATM鏈虹殑绱浜ゆ槗閲忚揪鍒?9618涓囩瑪錛岀瘡璁′氦鏄撻杈?496浜垮厓銆?br>    鎹忛湶錛屽伐琛屽皢緇х畫鍔犲ぇ鑷姪鏈哄叿鐨勬姇鏀懼姏搴︼紝鍦ㄥ師鏈?涓囧彴ATM鏈虹殑鍩虹涓婏紝浠婂勾鍐嶅5000鍙拌嚜鍔ㄦ煖鍛樻満錛屽ぇ閲忓璁劇即璐規満銆佺櫥鎶樻満銆佽ˉ鎵撳彂紲ㄦ満絳夊鍔熻兘鑷姪璁懼錛屽茍鍦ㄧ幇鏈?700澶氬鑷姪閾惰鐨勫熀紜涓婏紝鍦ㄥぇ鍩庡競鐨勭箒鍗庡晢涓氳鍖哄啀澶氬緩24灝忔椂鑷姪閾惰銆?br>    涓轟簡鏈夋晥綆$悊鍜屼嬌鐢ˋTM鏈猴紝2003騫達紝寤鴻閾惰灝辯爺鍙戜簡“ATM鏈哄姛鑳芥嫇灞曞拰緋葷粺鐩戞帶緋葷粺”錛屽鍏ㄨ鐨凙TM鏈哄疄鐜頒簡鍚庡彴緇熶竴鎺у埗銆備粖騫?鏈堬紝浜烘皯閾惰灝嗘瘡鏃ヨ嚜鍔╄澶囨彁嬈鵑檺棰濅笂璋冨埌2涓囧厓鍚庯紝寤鴻閾惰涓鍛ㄥ唴灝卞湪鍏ㄥ浗鐨凙TM鏈轟笂鍋氫簡鐩稿簲鐨勮皟鏁淬傜郴緇熷疄鐜板揩閫熷搷搴旓紝鏄緩绔嬪湪淇℃伅鎶鏈湁鍔涙敮鎾戠殑鍩虹涓婄殑銆?/font>

浠庢湇鍔″鎴峰埌鐩堝埄涓績

    2003騫達紝寤鴻閾惰鎷ユ湁鐨凙TM鏈鴻繕涓嶅埌1涓囧彴銆傝屽伐鍟嗛摱琛屾埅鑷?003騫?鏈堝簳錛屾姇鍏ヤ嬌鐢ㄧ殑ATM鏈哄凡緇忚揪鍒?2715鍙幫紝浣嶅眳鍏ㄥ浗涔嬮銆傜帇姣呭壇鎬葷粡鐞嗙粰璁拌呯畻浜嗕竴絎旇處錛氫粠鎶曞叆鎴愭湰鏉ョ湅錛岀幇鍦ㄤ竴鍙癆TM鏈鴻澶囧ぇ綰﹀崄鍑犱竾鍏冿紝渚垮疁鐨勫彧鏈?0涓囧厓鍑哄ご錛屽鏋滄槸闆嗕腑閲囪喘錛岃垂鐢ㄨ繕浼氬啀闄嶄笅鏉ヤ竴浜涖傝岄氳繃瀹為檯璁$畻錛屽緩琛屽湪緋葷粺涓婄嚎鍚庯紝鍦ㄧ綉鐐瑰竷鏀続TM鏈猴紝鎶曞叆浣跨敤鍚庯紝閫氬父1騫村氨鑳芥敹鍥炴垚鏈傝繖閲屾敹鍏ヤ富瑕佺泩鍒╃殑鏉ユ簮鏄法琛岃漿璐︿互鍙婂紓鍦拌漿璐︾殑鏀跺叆鎵嬬畫璐規敹鍏ャ?/font>

    鐜嬫瘏璇達紝濡傛灉鎶婂叾浠栬鍦ㄥ緩琛孉TM鏈轟笂鎻愭鐨勮垂鐢紝涓庡緩璁鵑摱琛屽崱鍦ㄥ叾浠栭摱琛屾彁嬈劇殑鎵嬬畫璐瑰鍒囧悗錛屾湁涓騫翠粎姝や竴欏癸紝浠栦滑灝辮禋浜?浜垮厓銆傛澶栵紝寮傚湴璺ㄨ杞處鐨勬敹鍏ヤ篃鐩稿綋鍙錛汚TM鏈烘浛浠d漢宸ョ綉鐐硅繕浼氱粰緗戠偣鑺傜害涓澶х瑪寮閿銆傝處綆楁竻妤氬悗錛屽緩琛屽湪ATM鏈虹殑鎶曞叆涓婅繘鍏ュ姞閫熸湡銆傛埅鑷充粖騫?鏈堬紝寤鴻ATM鏈烘暟閲忚秴榪?涓囧彴銆?br>“ATM鏈哄姛鑳芥嫇灞曞拰緋葷粺鐩戞帶緋葷粺”涓婄嚎鍚庯紝姣忓彴ATM鏈虹殑鎶曞叆鍜屽竷鏀句篃涓嶅啀鏄?#8220;鎷嶈剳琚?#8221;寮忎簡銆備粠鍚庡彴鐩戞帶瀹ゅ彲浠ュ甯冩斁鍦ㄥ叏鍥界殑2涓囧鍙癆TM鏈轟腑浠諱綍涓鍙扮粡钀ユ儏鍐電殑鏁版嵁璋冨嚭鏉ュ仛鍒嗘瀽銆傚鏋滃彂鐜版煇涓鍙癆TM鏈哄竷鏀懼悗涓嶈兘璧氶挶錛屽彲浠ラ氳繃鏁版嵁鍒嗘瀽鍘熷洜錛屽啀鏍規嵁鍒嗘瀽緇撴灉榪涜璋冩暣銆侫TM鏈烘專閽辯殑鍙﹀涓や釜鍘熷洜鍦ㄤ簬錛屽緩琛屾湁涓濂楀畬鏁寸殑緗戠偣閫夋嫨嫻佺▼錛岄厤濂楃綉鐐瑰竷鏀懼悎鐞嗭紱寤鴻鏈夊熻鍗℃帴榪?浜匡紝淇$敤鍗¤秴榪?000涓囷紝閾惰鍗$殑媧昏穬紼嬪害寰堥珮銆?/font>

    鑰?003騫翠箣鍓嶏紝寤鴻閾惰鐨凙TM鏈轟笉璁烘槸鎿嶄綔緋葷粺銆佺鐞嗘ā寮忥紝榪樻槸鎿嶄綔鐣岄潰絳夌瓑鏄簲鑺卞叓闂紝鏉備貢鏃犵珷錛屽湪鍔熻兘涓婁粎闄愪簬鍙栨銆佸瓨嬈俱佹煡璇紝闈炲父鍗曚竴銆傜帇姣呰錛岄偅鏃訛紝澶у瑙夊緱ATM鏈轟粎浠呮槸緇欏鎴鋒彁渚涙湇鍔$殑涓縐嶆槀璐電殑娓犻亾錛屽畬鍏ㄦ槸鎶曞叆寮忕殑銆備絾鏄紝緇忚繃璋冪爺鍙戠幇錛氭垚鏈腑蹇冪殑瑙傚康涓嶆紜紝蹇呴』鏀瑰彉銆侫TM鏈哄畬鍏ㄥ彲浠ユ垚涓鴻禋閽辯殑宸ュ叿錛岃鐢ㄧ粡钀ョ殑澶磋剳鏉ュ仛ATM鏈恒備粬涓嬪喅蹇冭寤鴻涓濂楃郴緇熸潵鎺у埗ATM鏈猴紝浣夸箣鎴愪負璧氶挶鐨勬満鍣ㄣ?br>    2003騫達紝鍖椾含鍙戠敓闈炲吀涔嬪墠鐨勪袱涓湀錛岀帇姣呭甫棰嗕竴闃熶漢椹窇浜嗗浗鍐?涓ぇ鍩庡競錛屾壘鍒拌繖浜涘煄甯傛渶綣佸崕鐨勮閬撳幓鍋欰TM鏈虹殑浣跨敤鐘跺喌璋冪爺銆傛瘮濡傦紝鍦ㄥ崡浜殑鏂拌鍙o紙褰撳湴鏈綣佸崕鐨勮閬擄級錛屼粬浠榪欐潯琛椾笂璁劇疆鐨勬瘡涓瀹墮摱琛岀殑鑷姪閾惰閮借繘琛屼簡浠旂粏瑙傚療錛屽茍閫愭満鎿嶄綔錛屾妸緇撴灉涓庡緩琛岃嚜宸辯殑ATM鏈哄姞浠ユ瘮杈冦傜粨鏋滃彂鐜幫紝鍚勫閾惰鐨凙TM鏈轟篃鏄簲鑺卞叓闂紝鍔熻兘鍚勬湁鍗冪銆?br>    鍥炲寳浜悗錛岀帇姣呭甫闃燂紝鑷繁鐮斿彂浜嗕竴濂?#8220;ATM鏈哄姛鑳芥嫇灞曞拰緋葷粺鐩戞帶緋葷粺”錛屽茍涓篈TM鏈哄紑鍙戝嚭46縐嶅姛鑳斤紙鐜板彂灞曚負浜斿叚鍗佺鍔熻兘錛夛紝鏍規嵁ATM鏈哄竷鏀劇偣鐨勬儏鍐墊湁閫夋嫨錛屽紑鏀句竴浜涢傚悎褰撳湴鐨勪笟鍔″搧縐嶃傝繕鍙互鏍規嵁涓氬姟闇姹傞噺鐨勪笉鍚岋紝閫傚綋璋冩暣銆傜郴緇熷彲浠ュ湪鎬昏緇熶竴綆$悊鍏ㄥ浗ATM鏈猴紝鍚勭渷鍒嗚鏈変竴涓鐞嗕腑蹇冿紝鍙互鐩戞帶鍏ㄧ渷鐨凙TM鏈鴻繍琛屾儏鍐點?br>    鑷姪鏈嶅姟鍖虹殑姣斾緥錛屽緩琛屾湁涓濂楁爣鍑嗭紝絎﹀悎瑕佹眰鐨勯兘瑕佸畨瑁匒TM鏈虹瓑鑷姪璁懼錛屽噯澶囧悜緇煎悎緗戠偣鍙戝睍銆備粖騫達紝寤鴻榪樹細澧炲ぇATM鏈虹殑甯冭閲忥紝澧炶鍒頒粈涔堟牱鐨勮妯′笉濂借銆侫TM鏈虹殑鐩堝埄鑳藉姏鐜板湪鏉ョ湅錛岃繕澶勪簬涓涓笂鍗囨湡銆傚敖綆″緩琛岀殑ATM鏈哄閫熷緢蹇紝浣嗘槸騫舵病鏈夊洜涓烘姇鍏ラ噺澧為暱鑰屼嬌姣忓彴ATM鏈虹殑鎿嶄綔絎旀暟涓嬮檷錛岀浉鍙嶄氦鏄撻噺榪樺湪涓嶆柇涓婃定銆?/font>

瀹夊叏錛岄亾楂樹竴灝洪瓟楂樹竴涓?/font>

    涓鎵囩獥鎴峰紑鍚紝浼撮殢鑰屾潵鐨勫畨鍏ㄩ棶棰樹笉瀹瑰拷瑙嗐侫TM鏈虹殑瀹夊叏鍙互鍒嗕負涓や釜灞傞潰錛屼竴鏄郴緇熻繍琛岀殑瀹夊叏錛涗簩鏄敤鎴蜂嬌鐢ˋTM鏈虹幆澧冪殑瀹夊叏銆傛嵁鍐滆鐩稿叧璐熻矗浜轟粙緇嶏紝鍦ㄧ郴緇熷畨鍏ㄨ繍琛屼笂錛屼粬浠富瑕侀氳繃浠ヤ笅鎵嬫錛氶鍏堟槸閫氳繃鍏ㄨ鐨凙TM鏈虹洃鎺х鐞嗙郴緇燂紝瀵笰TM鏈鴻繘琛屽疄鏃剁洃鎺э紱鍏舵鏄彂鐢熼棶棰樺悗閫氳繃鐭俊銆佺數璇濈瓑鏂瑰紡鍙婃椂鑱旂郴鐩稿叧鐨勮矗浠諱漢鍛樺強鍘傚晢榪涜緇翠慨錛涚涓夛紝璁炬湁涓撻棬鐨凙TM鏈虹鐞嗗憳錛屽姞寮篈TM鏈虹殑鏃ュ父緇存姢錛涚鍥涳紝瀵圭琛屽紡ATM鏈猴紝閫氳繃瀹氭湡宸℃錛屾彁楂樻甯稿紑鏈虹巼鍜屾甯歌繍琛岀巼錛涚浜旓紝閫氳繃瀹氭湡鐨勬暟鎹垎鏋愶紝鎵懼嚭姣忎釜鐗囧尯涔冭嚦姣忓彴鏈哄叿鍙戠敓鏁呴殰鐨勯鐜囧拰鏁呴殰鍘熷洜錛屽茍鍒惰鐩稿簲鐨勬帾鏂斤紝棰勯槻涓庣淮鎶ゅ茍涓俱?br>    鐜嬫瘏琛ㄧず錛岀姱緗垎瀛愮殑鐘姜鎵嬫鍏跺疄寰堜綆綰э紝瀹屽叏鍙互閫氳繃ATM鏈轟笂璁劇疆鐩稿叧鐨勮紺轟俊鎭紝鎻愰啋娑堣垂鑰呴伩鍏嶄笂姝ょ被淇℃伅鐨勫綋銆傚墠騫達紝褰撶煭淇¤瘓楠楁瘮杈冪寲鐛楃殑鏃跺欙紝寤鴻閾惰ATM鏈轟笂涔熸椂鏈夊彂鐢熴傚師鍥犲湪浜庡緩璁鵑摱琛屽綋鏃舵槸鎯熶竴涓瀹跺紑閫氫簡鍏ㄥ浗ATM鏈鴻漿璐﹀姛鑳界殑閾惰銆?#8220;褰撴椂鐨勫帇鍔涘緢澶э紝鑰冭檻瑕佷笉瑕佸叧闂繖欏瑰姛鑳姐傜粡榪囧垎鏋愶紝鎴戜滑閲囧彇浜嗛氳繃緋葷粺璁劇疆錛屽湪寤鴻鐨凙TM鏈轟笂璁劇疆鐩稿叧鎻愰啋淇℃伅錛岃鐢ㄦ埛涓鎻掑崱灝辯湅鍒拌繖涓彁紺轟俊鎭紝楠楁湳涓嶆敾鑷牬銆?#8221;寤鴻鏈変竴濂楀畬鏁寸殑緗戠偣閫夋嫨嫻佺▼銆傜帇姣呰錛屽緢澶氱姱緗喚瀛愮殑浣滄鎵嬫鍏跺疄寰堜綆綰э紝姣斿瓚佹寔鍗′漢鎻掑崱鍚庯紝鐘姜瀚岀枒浜虹獊鐒跺湪韜悗鎷嶄綘錛屼蔣縐頒笢瑗挎帀浜嗭紝絳夋秷璐硅呬綆澶存嫞鎷劇殑鏃跺欙紝鎶婂崱鎹簡銆傚緩琛岄氳繃榪滅▼鐩戞帶鎺㈠ご鎶撳埌榪囧ソ鍑犱釜鐘姜瀚岀枒浜恒侫TM鏈轟笂鐨勫鏁伴闄╂潵婧愯繕鏄寔鍗′漢鐨勭枏蹇姐傞摱琛屽垯闇瑕侀氳繃鍚勭閫斿緞瀵圭敤鍗′漢榪涜瀹夊叏鎰忚瘑鐨勫浼犳暀鑲詫紝鎻愰珮娑堣垂鑰呯殑瀹夊叏鎰忚瘑銆?/font>

绔炰簤鏃ヨ秼嬋鐑?/font>

    闅忕潃鐧懼瀵硅嚜鍔╄澶囨帴鍙楃▼搴︾殑鎻愰珮錛屼互鍙夾TM鏈轟環鏍間笅闄嶏紝ATM鏈烘鎴愪負鍚勫晢涓氶摱琛岀珵浜変笉鍙拷瑙嗙殑棰嗗煙銆?br>    鎹腑鍥介摱琛屼俊鎭鎶閮ㄥ壇鎬葷粡鐞嗗緪綰亽浠嬬粛錛屼腑琛孉TM鏈烘姇鍏ヤ嬌鐢?0騫翠互鏉ワ紝鍧氭寔浠ョ鎶涓轟緷鎵橈紝鎸夌収鍥介檯鏍囧噯鍜屽浗鍐呭閾惰鍗′笟鍙戝睍瓚嬪娍錛屾瀯寤哄叏鏂扮殑銆侀泦涓繍浣滅殑閾惰鍗¤繍浣滀綋緋伙紝鎻愬崌鐜版湁浜у搧鏈嶅姟鍔熻兘錛屼笉鏂繘琛屽伐浣滃垱鏂頒笌浜у搧鍒涙柊錛屽憟鐜板嚭涓氬姟瑙勬ā涓庣粡钀ユ晥鐩婂弻澧為暱灞闈紝鎻愬墠瀹炵幇浜烘皯甯佷俊鐢ㄥ崱鍙戝崱閲忋佸浗闄呬俊鐢ㄥ崱鍙戝崱閲忓拰鏈夋晥鍟嗘埛鏁伴噺灞呬笟鍐呯涓鐨勭洰鏍囷紝澶栧崱鏀跺崟緇х畫闆勫眳姒滈鐨勫己鍔插彂灞曞娍澶淬?br>    鎹倝錛岀洰鍓嶏紝涓浗閾惰鏈夎捶璁板崱鍙戝崱閲?30涓囷紝鍊熻鍗″彂鍗?.2浜垮紶銆傝處鎴蜂笌瀹㈡埛榪樻病鏈夊畬鍏ㄥ搴旇搗鏉ャ傛瘡騫存柊澧濧TM鏈哄湪1500锝?000鍙頒箣闂達紝涓昏甯冩斁鍦ㄥ寘鎷細鏈緗戠偣銆佽嚜鍔╅摱琛屼互鍙婂ぇ鍟嗗満銆佹満鍦恒侀キ搴楃瓑銆?br>    鎴嚦2007騫寸涓瀛e害錛屼腑鍥介摱琛屽彲浠ュ姙鐞嗕釜浜轟笟鍔$殑緇煎悎緗戠偣涓?0600瀹訛紝鎶曚駭ATM鏈?1329鍙幫紝鏈?089鍙板湪鑷姪閾惰鍐咃紝鑷姪閾惰855瀹躲傚湪閲嶇偣鍩庡競鍙婂叾綣佸崕鍦版錛屽鍔犺惀涓氱綉鐐瑰拰ATM鏈虹瓑鑷姪鏈哄叿璁懼銆傚湪钀ヤ笟闈㈢Н瓚呭嚭200騫蟲柟綾崇殑緗戠偣錛屽緩绔嬭嚜鍔╅摱琛屾垨鑷姪鏈嶅姟鍖猴紝鎻愰珮緗戠偣鑷姪璁懼閰嶅鐜囷紝鍏呭垎鍙戞尌緗戠偣鑷姪娓犻亾瀵規煖鍙頒笟鍔$殑鍒嗘祦鏁堢敤銆?br>    涓鐩墠宸茬粡鍦ˋTM鏈轟笂瀹夎浣跨敤鐩戞帶璁懼錛屼繚闅滃鎴瘋祫閲戝畨鍏ㄣ傞殢鐫涓浗閾惰瀹炴柦緗戠偣杞瀷錛岀畝鍗曚笟鍔″皢閫愭榪佺Щ鑷寵嚜鍔╄澶囦笂銆?br>    寰愮邯鎭掑壇鎬葷粡鐞嗛忛湶錛岀洰鍓嶏紝涓浗閾惰ATM鏈虹殑榪愯惀鐢卞垎琛岃嚜琛屾壙鎷咃紝閮ㄥ垎鍒嗚閫夋嫨浜嗗鍖呮柟寮忚繘琛岀淮鎶ゃ備腑琛屾鍦ㄥ紑鍙戞柊鐨勬牳蹇冨簲鐢ㄧ郴緇燂紝浠婂勾璇曠偣鎶曚駭錛屾槑騫村皢鎺ㄥ箍瀹屾垚銆傛柊緋葷粺灝嗗寘鎷鎴蜂笌璐︽埛鐨勫畬鍏ㄥ搴斻?br>    鐩墠錛屽緩璁鵑摱琛岃嚜鍔╅摱琛屾暟閲忚秴榪?000瀹訛紝紱昏寮忚嚜鍔╅摱琛屼笉瓚?00瀹訛紱紱昏寮廇TM鏈哄皢榪?000鍙般傛嵁寤鴻閾惰緇熻錛岀洰鍓嶅湪ATM鏈轟笂浣跨敤鏈澶氱殑鏄姛鑳戒粛鐒舵槸鍙栨鍜屾煡璇紝鍗犳婚噺鐨?0%錛屽叾嬈℃槸杞處銆佸瓨嬈句互鍙婁唬緙磋垂涓氬姟銆?br>    鏇句竴搴﹁惤鍚庝簬鍏朵粬澶у瀷鍟嗚鐨勪腑鍥藉啘涓氶摱琛屼篃寮濮嬬┖鍓嶉噸瑙咥TM鏈虹殑甯冩斁鍜岃繍钀ャ傛埅鑷充粖騫翠笂鍗婂勾錛屽啘琛屾嫢鏈堿TM鏈鴻繎1.9涓囧彴錛屽彂鍗¢噺鎬昏綰?.7浜垮紶銆傚幓騫村啘琛屾姠鍗犱簡鍖椾含鍦伴搧绔欏唴鍟嗘満錛岄珮瀵嗗害鍦板竷鏀続TM鏈猴紝鐢辨鑾峰緱鐩稿綋鍙鐨勬敹鐩婏紝鍦伴搧ATM鏈鴻法琛屾墜緇垂鏀跺叆宸茬粡瓚呰繃寰堝鍟嗕笟鍖虹殑ATM鏈恒傞拡瀵瑰寳浜?008濂ヨ繍鍟嗘満錛屽寳浜啘琛岀殑ATM鏈?0錛呬互涓婂紑閫氫簡澶栧崱鍙栫幇鍔熻兘銆?br>    涓皬閾惰鍥犱負緗戠偣鏁伴噺灝戯紝鏃犳硶涓庡ぇ閾惰浠ユ瘮楂樹笅錛屼篃寮濮嬮氳繃澧炲姞ATM鏈哄竷鏀劇瓑鏂瑰紡寮ヨˉ鍏剁綉鐐逛笉瓚崇殑鍔e娍銆傛嵁姘戠敓閾惰闆跺敭涓氬姟鎬婚儴榪愯淇濋殰涓績鎬葷粡鐞嗛」鑻變粙緇嶏紝浠?003騫磋搗錛屾皯鐢熼摱琛屾彁鍑鴻鍦ㄦ寜鎻佸偍钃勫拰鑷姪閾惰涓氬姟涓婂疄鐜頒笁澶х獊鐮達紝鎬昏鍦ㄨ澶囨姇鍏ャ佷漢鍛橀厤澶囩瓑鏂歸潰榧庡姏鏀寔銆傞氳繃鍥㈤槦寤鴻銆佹縺鍔辨満鍒剁瓑鎺柦錛屽悇鍒嗚鍔犲ぇ浜嗚嚜鍔╅摱琛岀殑鎶曞叆錛屽竷鏀鵑熷害鏄庢樉鍔犲揩錛屾嫇灞曢噸鐐逛粠鍦ㄨ寮忚漿鍚戠琛屽紡銆傜洰鍓嶏紝鍦ㄧ嚎榪愯鐨凙TM鏈轟粠2003騫磋搗姝ユ椂鐨勫嚑鐧懼彴榪呴熷崌鑷寵繎3000鍙幫紝瀹屾垚浜嗘皯鐢熼摱琛岃嚜鍔╅摱琛屼笟鍔$殑絎竴嬈¢璺冦傜洰鍓嶏紝鍦ㄤ竴浜涢噸鐐瑰煄甯傚鍖椾含銆佹姹夈佸お鍘熺瓑錛屾皯鐢熺殑鑷姪閾惰闈炲父閱掔洰銆傞」鑻辮錛?#8220;瀵逛簬姘戠敓閾惰榪欐牱涓涓柊鍏磋偂浠藉埗鍟嗕笟閾惰鏉ヨ錛岄櫎浜嗘妸涓氬姟鍋氱簿鍋氬ソ錛岃繕瑕侀氳繃縐瀬瀹d紶閫愭笎璧㈠緱瀹㈡埛鐨勪俊浠匯傛鏃犵枒闂紝鑷姪閾惰瀵逛簬姘戠敓閾惰鐨勫艦璞″浼犻鏈夌泭澶勩?#8221;
    鍗充嬌榪涘叆涓浗甯傚満涓嶄箙鐨勫璧勯摱琛岋紝鍦ˋTM鏈哄彂灞曟柟闈篃闈炲父縐瀬銆傜洰鍓嶏紝涓洪厤鍚堜笉鏂闀跨殑鑷姪鏈嶅姟璁炬柦鐨勯渶姹傦紝娓f墦閾惰鍦?006騫村簳鍓嶅湪涓浗閲嶇偣鍩庡競璁劇珛浜?2鍙癆TM鏈猴紝 騫惰鍒掑湪騫村簳鍓嶆妸ATM鏈虹殑鏁伴噺鎻愰珮鍒?00鍙般傛嵁鎮夛紝娓f墦閾惰宸茬粡涓庝腑鍥介摱鑱旂綰︼紝灝嗘垚涓哄叾浼氬憳銆傚眾鏃訛紝娓f墦閾惰鐨凙TM鏈虹郴緇熶笌閾惰仈緋葷粺瀹炶瀵規帴錛屽彲涓哄鎴鋒彁渚涙洿鏂逛究鐨凙TM鏈轟笂鐨勮嚜鍔╂湇鍔°?br>    涓庢鍚屾椂錛屾眹涓伴摱琛屻佽姳鏃楅摱琛屾柟闈篃鍦ㄧН鏋佹墿寮犵綉鐐廣傝姳鏃楅摱琛?005騫?鏈?鏃ュ湪涓婃搗嫻︿笢鍥介檯鏈哄満璁劇珛浜嗙涓鍙扮琛屽紡鏌滃憳鏈恒備箣鍚庯紝涓庝富瑕佺殑鎴樼暐浼欎即璇稿7-11渚垮埄搴楀悎浣滄潵鎷撳睍緗戠粶銆傛埅鑷充粖騫?鏈堬紝鍦ㄥ叏鍥?鎵鍩庡競涓叡鏈?4鍙癆TM鏈猴紝鍖呮嫭62鍙扮琛屽紡鍜?2鍙伴┗琛屽紡銆傝姳鏃椾腑鍥藉壇琛岄暱鍏間釜浜洪浂鍞笟鍔′富綆$煶瀹夋(Anand Selva)琛ㄧず錛岄夊潃鏂歸潰涓昏鏈変笁鏂歸潰鑰冭檻錛氫究鎹峰害銆佹帴瑙﹂潰鍜屽彲瑙嗘с備究鎹峰害錛氫富瑕佹牴鎹洰鏍囧鎴風兢鍦ㄥ晢涓氥侀浂鍞佷綇瀹呫佸ū涔愬拰鍏敤浜嬩笟絳夌墿涓氬艦鎬佷腑鐨勬琛屾祦閲忓拰棰戠巼榪涜閫夊潃錛屽叾涓叕鐢ㄤ簨涓氳寖鍥村寘鎷満鍦恒佺伀杞︾珯絳夈傚ū涔愬尯鍩熷寘鎷悇澶у棣嗗拰鍍忛暱鍩庤繖鏍風殑鏃呮父鑳滃湴絳夈備富瑕佺洰鐨勬槸涓轟簡澧炲姞鎴戜滑瀹㈡埛鏃ュ父鐢熸椿鐨勬柟渚跨▼搴︺傛帴瑙﹂潰錛氶櫎浜嗕細鍦ㄤ漢嫻佸瘑闆嗗害楂樼殑鍦版柟甯冪偣涔嬪錛岃繕浼氱郴緇熸у湴鍒嗘暎ATM鏈哄垎甯冩潵鎵╁ぇ鎴戜滑鐨勬帴瑙﹂潰銆傚彲瑙嗘э細閫夊潃絳栫暐鐨勫彟涓涓噸瑕佺洰鐨勬槸涓轟簡澧炲姞鑺辨棗閾惰鍝佺墝鐨勭煡鍚嶅害錛屾墍浠ヤ細閫夋嫨浜烘祦閲忓ぇ鐨勪紬澶氬尯鍩熷拰鍦扮偣銆備粖鍚庯紝灝嗚嚧鍔涗簬灝嗘洿澶氬垱鏂版х殑鏈嶅姟鍜岃В鍐蟲柟妗堝甫鍒版垜浠湪涓浗鐨凙TM鏈烘湇鍔′腑鏉ャ?/font>



]]>
綺歸氭爣鍑?/title><link>http://m.shnenglu.com/MichaelLiu/articles/37906.html</link><dc:creator>濂旇窇鐨勯樋鐢?/dc:creator><author>濂旇窇鐨勯樋鐢?/author><pubDate>Thu, 06 Dec 2007 08:19:00 GMT</pubDate><guid>http://m.shnenglu.com/MichaelLiu/articles/37906.html</guid><wfw:comment>http://m.shnenglu.com/MichaelLiu/comments/37906.html</wfw:comment><comments>http://m.shnenglu.com/MichaelLiu/articles/37906.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://m.shnenglu.com/MichaelLiu/comments/commentRss/37906.html</wfw:commentRss><trackback:ping>http://m.shnenglu.com/MichaelLiu/services/trackbacks/37906.html</trackback:ping><description><![CDATA[<span id="hvzpftn" class=newtext> 綺歸氬叕甯冨叾鍗忚鏍囧噯銆?br> <p><span id="hvzpftn" class=featuretext>Getting message </span> <p><a href="mailto:anna@networldalliance.com?Subject=Getting message">Ann All, editor</a> <br> <p>• 09 Aug 2004<br><br>For those not there when Bob Dylan picked up an electric guitar in front of audiences for the first time, in 1966, the only way to hear the music was to purchase one of a myriad of bootleg recordings made during the tour.</p> <p>Twenty-two years after an especially incendiary performance at Royal Albert Hall, Dylan's record label released an "official" version of the concert with re-mastered, state-of-the-art sound. The result: a renewed appreciation of Dylan's role in shaping popular music.</p> While it's too soon to predict if <a >Triton</a> will garner the same kind of enthusiasm with its decision to publicly release its Triton Standard ATM message specification, early reaction appears to be mostly of the "rock on" variety. <p>"If more vendors were as open as Triton, all of our lives would be a little less complicated," said Chris Klein, executive vice president of marketing for <a >Mosaic Software</a>, developer of the Postilion transaction processing platform.</p> <p>"For businesses like ACI it means supporting less device handlers and the associated maintenance like Triple DES, EMV and remote key downloading," agreed Rick DuVall, a senior product manager for <a >ACI Worldwide,</a> developer of the BASE24 transaction processing platform. "For customers, it means not having to purchase and maintain additional device handlers. It gives them the ability to shop multiple ATM vendors more easily."</p> <p><strong>A little history</strong></p> <p>Message specifications like Triton Standard dictate how ATMs communicate with host processors and vice versa. Triton was one of the early pioneers of creating specifications for ATMs using dial-up communications.</p> <p>The first dial-up specification was created by Tidel in 1992 for its AnyCard ATM. Like Triton, Tidel based the spec on the Visa II protocol, which had been developed for point-of-sale terminals. Transaction processor ACS helped produce the spec.</p> <p>Also in 1992, Triton began developing a spec for its Scrip Jr terminal, working with transaction processor Intercept. </p> <p>Before the introduction of dial-up ATMs in the early '90s, all ATMs used leased line communications. Host processors created configurations of  "states and screens" for each ATM operation. Leased-line terminals collect information when a customer requests a particular type of transaction and transmit it to the host; the host then downloads the appropriate configuration.</p> <p>The approach wasn't appropriate for retail ATMs, said Bill Jackson, Triton's vice president of research and development. "Programming screens for each terminal by the host is time consuming, so a different model was needed."</p> <p>So Triton and Tidel modeled their retail ATMs on POS terminals, with the ATM containing all of the screens, states and programming it needs to perform transactions.</p> <p>This approach makes terminal set-up and configuration "trivial" and supports communication using a far less expensive dial-up telephone line, Jackson said.</p> <p>Because of the newness of dial-up ATMs, Jackson said, Triton had to develop a new interface each time it signed with a new transaction processor. "The interface had to match something they already supported. The message formats were all similar; the same information was needed to do the job - but it was always arranged in a different way."</p> <p>By 1996, Jackson said Triton had developed more than a half dozen formats for a like number of processors. </p> <p>"We could not make changes or add new features because the host was in charge of the format. They supported other devices with the same format and did not want to change just for us," he said. "This made life miserable for programmers at Triton. We were supporting lots of versions of code and had to know what processor a customer was using before we built the terminal. Changing processors in the field meant a complete software reload and configuration."</p> <p>A new relationship with Concord EFS (then EPS) in 1996 marked a change. Concord offered to write code to support Triton's ATMs. "Up to that point in time, no one wrote code to support us. We wrote code to support them," Jackson said.</p> <p>Triton kept the Visa II protocol but started with a clean slate for the Concord message format itself, Jackson said. Based on its previous experiences with complicated, processor-specific modifications, the manufacturer built the message structure in a way that allowed for modification with no changes to the original framework.</p> <p>"A brand new RL5000 (Triton's newest and most advanced ATM) could be supported by any processor that wrote software based on the first release of Triton Standard. A 9500 (last manufactured in 1997) would work perfectly with any processor today even if they were supporting the latest version of Triton Standard," he explained. "The goal was to have the version of any terminal code be fully compatible with any version of host processor code, no matter how old or new either was."</p> <p><strong>Form of flattery?</strong></p> <p>Because of the popularity of its 9600 ATM, Triton was able to convince processors to support the new standard. Today, some 50 processors around the world do so, Jackson said. </p> <p>It has become so popular that a number of other manufacturers, including several of the largest in the world, emulate it. Such emulation occurs, said ACI's DuVall, because "it's easier for new players to get into the market by emulating someone else rather than convincing companies like ACI to build new device handlers."</p> <p>Indeed, many manufacturers also emulate 911/912, a Diebold message format, and NDC/NDC+, an NCR message format. Fujitsu's Prism software, which Triton has licensed for use with its new Windows-based ATMs, features Diebold 912 emulation.</p> <p>Jackson believes the widespread practice of emulation is tolerated -- though not encouraged -- because ultimately it helps facilitate development of new ATM applications. </p> <p>Noting that Triton's specification has been shared with partners like Mosaic Software and ACI under non-disclosure agreements, he said, "Triton has never pursued any kind of legal action against anyone, manufacturer or processor. As far as I know, neither have NCR or Diebold. I think this is because each emulates the other and what goes around, comes around. We do not sanction or condone (emulation), but also do not actively discourage it."</p> <p><strong>Cleaner copy</strong></p> <p>Triton hopes that offering freer access to its specification will result in "cleaner" emulations, with less testing and development required for software developers and processors, Jackson said.</p> <p>"If the specification isn't officially open, the emulators, due to a lack of knowledge, eventually drift away from the official specification and companies like ACI are forced to support these nuances in order to keep our customers content," DuVall said. </p> <p>Offering new functionality should become quicker and easier for manufacturers currently emulating Triton that choose to adopt Triton Standard, said Mike Cowart, operations director, ATM Services for transaction processor Lynk Systems.</p> <p>Lynk and other processors "make enhancements and updates to Triton Standard first, then look at emulations," Cowart said.</p> <p>Brad Zerman, president of <a >Qualtex Corporation</a>, which manufactures the WeatherMaster ATM, said Triton's decision to open its spec "is huge for us."</p> <p>His company is considering entering the burgeoning retail ATM market in the United Kingdom. Developing support for EMV, a smart card standard mandated in the UK, would have been costly, he said. "Triton already supports EMV, so that will allow us to minimize our development costs if and when we decide to enter that market."</p> <p><strong>Open issues</strong></p> <p>Triton originally intended to post the Triton Standard spec on its Web site. Due to security concerns, Jackson said it will post a request form instead. It will not collect a license fee, or otherwise charge anyone to use it.</p> <p>"We are modifying the plan to give it to anyone that legitimately could use it, including competitors, but with a non-disclosure agreement of some kind. While we will continue to help any legitimate processor to develop drivers for it, we will not provide any technical assistance or help to any competitor," he said.</p> <p>Jackson said Triton hopes to accelerate the development of new ATM features and functionality. "We have always solicited feedback from processors on what we could do to enhance the specification. We do not expect to solicit feedback from competitors; we will not ignore it, either."</p> <p>By opening its standard, Triton could "theoretically lose some market share due to removing a barrier to other entrants," said ACI's DuVall.</p> <p>Jackson said the manufacturer hopes Triton Standard will become a communications-independent standard for entry-level ATMs, much as IFX is becoming a standard for more sophisticated machines. <br> <br>"Open standards are good for the industry and will be good for Triton," he said.</p> <p>At least one competitor worries that encouraging adoption of existing vendor standards, including Triton Standard, could slow a broad move to IFX.</p> <p>"IFX is not solely being driven by ATM manufacturers; rather it is being driven by the financial industry as a whole. It is the first time a standard has been defined whereby institutions can truly influence what functionality each ATM provider, switch vendor or network provider should implement to meet the customer business needs," said Joe Gallagher, general manager of Software and Services for NCR's Financial Solutions division. "Releasing or advocating adoption of existing vendor standards will not encourage the industry at large to move to IFX and could potentially slow the pace of adoption."</p> Source錛?a >http://www.atmmarketplace.com/article.php?id=4938&na=1</a></span> <img src ="http://m.shnenglu.com/MichaelLiu/aggbug/37906.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://m.shnenglu.com/MichaelLiu/" target="_blank">濂旇窇鐨勯樋鐢?/a> 2007-12-06 16:19 <a href="http://m.shnenglu.com/MichaelLiu/articles/37906.html#Feedback" target="_blank" style="text-decoration:none;">鍙戣〃璇勮</a></div>]]></description></item><item><title>緹庡浗灞呮皯鍒╃敤ATM鐨勮蔣浠舵紡媧為忔敮鍙栨琚垽鍏ョ嫳10騫?/title><link>http://m.shnenglu.com/MichaelLiu/articles/16464.html</link><dc:creator>濂旇窇鐨勯樋鐢?/dc:creator><author>濂旇窇鐨勯樋鐢?/author><pubDate>Thu, 14 Dec 2006 14:43:00 GMT</pubDate><guid>http://m.shnenglu.com/MichaelLiu/articles/16464.html</guid><wfw:comment>http://m.shnenglu.com/MichaelLiu/comments/16464.html</wfw:comment><comments>http://m.shnenglu.com/MichaelLiu/articles/16464.html#Feedback</comments><slash:comments>2</slash:comments><wfw:commentRss>http://m.shnenglu.com/MichaelLiu/comments/commentRss/16464.html</wfw:commentRss><trackback:ping>http://m.shnenglu.com/MichaelLiu/services/trackbacks/16464.html</trackback:ping><description><![CDATA[ <h1 class="red"> <h1 class="red"> <font size="3">Woman steals thousands from ATM</font> </h1> </h1> <div id="hvzpftn" class="subhead"> <div id="hvzpftn" class="subhead"> <font size="2"> <b>Glitch let cash flow freely after Katrina</b> </font> </div> </div> <div id="hvzpftn" class="byln"> <font size="2">Thursday, December 07, 2006 </font> <div> <div> <font size="2">By Matt Scallan<br /><br />(鏈枃杞澆鑷?<a class="" title="" target="_blank">http://www.nola.com/search/index.ssf?/base/news-3/1165474781197240.xml?NERP&coll=1</a>)<br /><br />[Michael]: 鍓嶄笉涔呭湪鏈漢韜竟灝卞彂鐢熻繃綾諱技鎯呭喌,鍥藉唴瀹㈡埛鍦ㄤ竴ATM(鑷姩鏌滃憳鏈?涓婂彇嬈炬椂鍙戠幇ATM杞歡鐨勬紡媧?鍙?00鍏冨笎鎴峰彧琚墸1鍏?,浜庢槸鎷煎懡鍙栨涓婂崄涓囨渶緇堣緸鍘誨伐浣?閫冪浜轟滑瑙嗙嚎.<br />聽孌婁笉鐭ユ湰鏂囦腑璇ョ編鍥藉眳姘戝洜綾諱技浜嬩歡琚獸BI榪芥煡騫惰閫佷笂娉曞涵,鏈緇堜互<font size="3"><strong>鐩楃獌緗?/strong></font>灝嗚鍒ゅ鑷沖10騫寸殑寰掑垜,騫惰拷鍔犱竴瀹氱殑緗氭.<br /><br /><br /></font> </div> </div> <b> </b> </div> <p> <font size="2">A Destrehan woman with $600 in her credit union account took advantage of a software glitch to steal more than $14,000 with her ATM card in the weeks after Hurricane Katrina, U.S. Attorney Jim Letten said Wednesday. </font> </p> <p> <font size="2">Shelita Grandpre, 32, pleaded guilty to bank larceny charges in U.S. Eastern District Court last week after admitting that she knowingly spent the money after discovering a software glitch in the ASI Federal Credit Union's ATM software that allowed customers to withdraw unlimited amounts of cash and make unlimited purchases with their debit cards. </font> </p> <p> <font size="2">Five other ASI members have pleaded guilty to similar charges. The Elmwood-based credit union has 14 branches in Orleans, Jefferson, St. Tammany, St. Charles, Lafourche and Evangeline parishes. <br /></font> </p> <p> <font size="2">Audrey Cerise, ASI's chief executive officer, said credit union officers discovered the glitch three days after the storm after the institution transferred its operations to another company when the power failed at its Jefferson Parish headquarters. </font> </p> <p> <font size="2">"We had a choice. We could have cut off ATM services for all of our members, or we could take the chance on losing some money," she said. </font> </p> <p> <font size="2">Many of the credit union's members who evacuated from the storm took advantage of the glitch and withdrew more than they had in their accounts. But the vast majority repaid the money after the storm, Cerise said. </font> </p> <p> <font size="2">"Our faith was not misplaced," Cerise said. </font> </p> <p> <font size="2">Cerise said many who withdrew more than they had thanked her employees for letting them make overdrafts in the weeks after the storm. </font> </p> <p> <font size="2">"I don't know that I wouldn't have done the same thing in their shoes," she said. "They didn't have money for food. They didn't have money for gas." </font> </p> <p> <font size="2">Cerise said the credit union has moved to avoid repeating the problem by mirroring its computerized transactions at its Ville Platte branch, rather than using an outside vendor. </font> </p> <p> <font size="2">According to Grandpre's guilty plea, she made withdrawals and purchases totaling $14,056.21 in the Monroe, Baton Rouge and New Orleans areas between Aug. 30, 2005, and Sept. 17, 2005. She admitted to FBI agents that she knowingly overdrafted her account, Letten said. </font> </p> <p> <font size="2">Grandpre pleaded guilty to bank larceny and could be sentenced to up to 10 years in prison and a $250,000 fine. Sentencing is scheduled for March 6 before U.S. District Judge Jay Zainey. </font> </p> <p> <font size="2">Others who have pleaded guilty on similar charges, along with the amount they are accused of overdrafting, are Renesha Brown of New Orleans, $8,483; Chassity Deshone Hulbert Irving of New Orleans, $18,334; Michelle Taylor of New Orleans, $7,488; Charlotte J. Whitley of Gretna, $8,024; and her daughter, Graylyn Whitley of New Orleans, $7,943. The defendants are set to be sentenced early next year. <br /></font> </p> <p> <font size="2">More cases are pending, Letten said. </font> </p> <p> <font size="2">. . . . . . . </font> </p> <p> <font size="2">Matt Scallan may be reached at mscallan@timespicayune.com or (985) 652-0953. </font> </p> <img src ="http://m.shnenglu.com/MichaelLiu/aggbug/16464.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://m.shnenglu.com/MichaelLiu/" target="_blank">濂旇窇鐨勯樋鐢?/a> 2006-12-14 22:43 <a href="http://m.shnenglu.com/MichaelLiu/articles/16464.html#Feedback" target="_blank" style="text-decoration:none;">鍙戣〃璇勮</a></div>]]></description></item><item><title>鍏絎﹀悎WOSA/XFS鏍囧噯鐨凙TMC杞歡http://m.shnenglu.com/MichaelLiu/articles/14662.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Sat, 04 Nov 2006 05:37:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/14662.htmlhttp://m.shnenglu.com/MichaelLiu/comments/14662.htmlhttp://m.shnenglu.com/MichaelLiu/articles/14662.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/14662.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/14662.html 鍏絎﹀悎WOSA/XFS鏍囧噯鐨凙TMC杞歡
Michael 2006騫?1鏈?鏃?br />

Diebold錛圲SA錛? Agilis
Fujitsu錛圝APAN錛? Prism
NCR錛圲SA錛? APTRA
KAL錛圲K錛? Kalignite
Phoenix Interactive錛圕ANADA錛? VISTAatm
Wincor-Nixdorf錛圙ERMANY錛? ProTopas


]]>20涓栫邯鈥滈噾閽扁濇妧鏈崄澶у彂鏄庯紙涓嬶級http://m.shnenglu.com/MichaelLiu/articles/11753.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Sun, 27 Aug 2006 08:17:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/11753.htmlhttp://m.shnenglu.com/MichaelLiu/comments/11753.htmlhttp://m.shnenglu.com/MichaelLiu/articles/11753.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/11753.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/11753.htmlMichael 2006騫?鏈?7鏃?br />
6錛変俊鐢ㄥ崱錛圕redit Card錛? 1950

聽聽聽 1950騫達紝Frank McNamara錛屸滄櫄槨愪勘涔愰儴鈥濓紙Diners' Club錛夌殑鍒涘姙鑰咃紝琚叕璁や負鍙戞槑浜嗛寮犵粺涓淇$敤鍗°侳rank鍚?00鍚嶉【瀹㈠彂琛屼簡璇ュ崱錛岀敤浜庡湪緹庡浗綰界害鐨?7瀹墮棣嗘秷璐廣?958騫達紝緹庡浗蹇掑叕鍙革紙American Express錛変篃鍙戣浜嗗叾緇熶竴淇$敤鍗°?br />聽聽聽 淇$敤鍗¤涓氬疄闄呬笂鍦?0涓栫邯30騫翠唬灝卞凡緇忓湪緹庡浗鎴愬艦錛屽綋鏃訛紝涓浜涚噧娌瑰叕鍙稿拰榪為攣鏃呭簵鍚戦【瀹㈠彂鏀句俊鐢ㄥ崱錛岀敤浜庡湪浠栦滑鑷繁鐨勫姞娌圭珯鍜屾梾棣嗗埛鍗℃秷璐廣?br />聽聽聽 浜屾垬鏈熼棿錛屽ぇ閲忕殑璧勯噾琚姇鍏ュ埌鏀垮簻鐨勫啗浜嬫垬浜変腑銆傜敺浜哄璧存垬鍦猴紝浣垮緱宸ュ晢涓氱殑涓績鍚戞垬浜夌敤鍝佷笂杞Щ銆備簩鎴樼粨鏉熷悗錛屽搴噸鏁達紝緹庡浗緇忔祹閲嶆柊鍥炲埌浜嗘櫘閫氬鎴風殑娑堣垂琛屼笟錛屽洜鑰屽叕浼楀張寮濮嬬儹琛蜂簬浣跨敤淇$敤鍗°?br />聽聽聽 閾惰淇$敤鍗★紝鏄湪20涓栫邯50騫翠唬鎵嶅嚭鐜扮殑銆傚湪褰撴椂錛岃澶氶噾铻嶆満鏋勭悍綰瘋仈鐩熺粍鎴愪粖澶╂垜浠湅鍒扮殑涓浜涗富瑕佷俊鐢ㄥ崱鍏徃銆?951騫達紝綰界害鐨勫紬鍏板厠鏋楀浗瀹墮摱琛岋紙Franklin National Bank錛夊彂琛屼簡絎竴寮犵湡姝g殑淇$敤鍗°?966騫?鏈?6鏃ワ紝澶氬閾惰鑱斿悎緇勫緩浜嗕粖澶╃殑涓囦簨杈懼叕鍙革紙MarsterCard錛夈?br />聽聽聽 1958騫存湯錛岀編鍥介摱琛岋紙Bank of America錛夊彂琛屼簡BankAmericard錛堢幇鍦ㄧ殑Visa鍗★級錛岀涓寮犻摱琛屼俊鐢ㄥ崱銆備粬浠渶鍒濅粎渚涢攢鍞漢鍛樺嚭琛屼嬌鐢ㄣ?0涓栫邯60騫翠唬鏃╂湡錛岃秺鏉ヨ秺澶氱殑鍏徃寮濮嬪彂琛屼俊鐢ㄥ崱錛屽茍鍦ㄥ箍鍛婁笂澹扮О鈥滃畠涓嶆槸淇$敤鐨勫艦寮忥紝鑰屾槸涓縐嶈妭綰︽椂闂寸殑璁懼鈥濄?br />聽聽聽 緹庡浗蹇掑拰涓囦簨杈懼叕鍙鎬竴澶滄毚瀵岋紝鍥犱粬浠悜涓浜涗笉闇瑕佷俊鐢ㄥ崱鐨勪漢澶ч噺閭掑崱鐗囷紝70騫翠唬涓湡錛岀編鍥藉浗浼氫笉寰椾笉棰佸竷娉曚護鍒舵榪欑琛屼負錛屽茍瀵逛俊鐢ㄥ崱琛屼笟榪涜浜嗚鑼冩暣欏褲?br />聽聽聽 浠婂ぉ錛孷isa銆丮asterCard鍜孉merican Express宸茬粡鎴愪負浜嗕笘鐣岀煡鍚嶇殑鍝佺墝銆?br />
聽聽聽 紺句細璐$尞錛氫俊鐢ㄥ崱鐨勫嚭鐜扮偣鐕冧簡浜轟滑鐨勬秷璐圭儹鎯呫傚畠鍦ㄤ漢浠氨涓氾紝鏃呰絳夋柟闈㈣搗鐫閲嶈浣滅敤銆傚悓鏃訛紝鍥犱負淇$敤鍗$殑閽辨槸鏃犲艦鐨勶紝寰堝浜哄洜瀹冭岀牬浜с?br />
7錛夋潯褰㈢爜錛圔arcode錛?1952

聽聽聽 鏉″艦鐮佹渶鍒濅嬌鐢ㄤ簬閾佽礬緋葷粺涓紝鐢ㄤ簬璁板綍姣忎釜杞﹀帰鐢ㄤ簡鍝寮曟搸銆傛潯褰㈢爜鎵撳嵃鍦ㄨ濺鍘㈢殑杈逛笂錛屽湪鍦伴潰鐨勬煇涓珮搴︿笂瀹夎鏈変竴涓笓闂ㄧ殑緋葷粺銆傚悗鏉ワ紝鍟嗕笟鐣屾剰璇嗗埌浜嗚繖涓郴緇熺殑浠峰鹼紝榪欎簺閾佽礬鏉″艦鐮佷篃灝辨紨鍙樻垚浠婂ぉ鎴戜滑鎵鐔熸倝鐨勭粺涓浜у搧鏍囪瘑鐮侊紙UPC-Uniform Product Code錛変簡銆?br />聽聽聽 1932騫達紝Wallace Flint絎竴涓彁鍑烘瀯寤鴻嚜鍔ㄧ粨綆楃郴緇燂紙Automated Checkout System錛夌殑鎯蟲硶錛岃櫧鐒朵粬鐨勬柟妗堢粡嫻庝笂涓嶅彲琛岋紝浣嗘槸錛岃繖涓柟妗堢殑鎻愬嚭鍚戜粖澶╃殑鏉″艦鐮佽繄鍑轟簡閲嶈鐨勪竴姝ャ?0騫村悗錛孎lint浣滀負鍥藉椋熺墿榪為攣鍗忎細錛圢ational Association of Food Chains錛夌殑鍓昏錛屽姏鎸鴻繖縐嶈嚜鍔ㄧ粨綆楃郴緇熺殑寮鍙戠爺絀訛紝浜庢槸浜х敓浜哢PC銆?br />聽聽聽 20涓栫邯40騫翠唬鏈湡錛岃秴甯備笟鍚戣垂鍩庣殑Drexel鐞嗗伐瀛﹂櫌璇鋒眰寮鍙戜竴濂楁煖鍙扮粨綆楄嚜鍔ㄥ寲鐨勬柟妗堛傚綋鏃訛紝鏌滃憳闇瑕佽姳璐瑰ぇ閲忕殑鏃墮棿鍦ㄧ粰瀹㈡埛緇撶畻涓婏紝鑰屼笖鍦ㄥ綍鍏ヨ揣鍝佹暟鎹殑鏃跺欑粡甯稿嚭鐜伴敊璇傞櫌闀挎嫆緇濅簡榪欎釜欏圭洰錛屼絾鏄竴浣嶆満姊板伐紼嬩笓涓氱殑璁插笀錛圛nstructor錛塏orman Joseph Woodland鍜屼粬鐨勬湅鍙婤ernard Bob Silver涓や漢鎺ユ敹浜嗚繖涓」鐩紝1952騫達紝浠栦滑涓璧瘋幏寰椾簡涓撳埄銆?br />聽聽聽 鍚庢潵錛孞oseph Woodland鍏ヨ亴IBM鍏徃錛屼粬鍒╃敤鑷繁鐨勫彂鏄庡紑濮嬪紑鍙戣嚜鍔ㄥ寲鐨勭粨綆楁煖鍙般?959騫存垚鍔熷紑鍙戝嚭浜嗗師鍨嬶紝浣嗘槸涓緋誨垪琛屾х爺絀舵姤鍛婁嬌浠栧喅瀹氭殏鍋滆繖涓」鐩傚悗鏉hilco鍏徃浠嶹oodland鍜孲ilver閭h喘涔頒簡榪欓」涓撳埄錛屾鍚庝笉涔咃紝Philco鍏徃鍙堟妸涓撳埄杞崠緇欎簡RCA鍏徃銆俁CA鐨凢rancis Beck鍒墮犱簡涓涓嚜鍔ㄥ寲緇撶畻鏌滃彴騫惰幏寰椾笓鍒┿?br />聽聽聽 1972騫?鏈堬紝淇勪亥淇勫窞Kenwood鍩庣殑Kroger's鎴愪負絎竴瀹跺畬鍏ㄨ嚜鍔ㄥ寲鐨勮秴甯傘?973騫達紝Beck鐨勪竴涓嚜鍔ㄥ寲緇撶畻鏌滃彴鍘熷瀷琚檲鍒楀湪Smithsonian鐨勭編鍥藉巻鍙插浗瀹跺崥鐗╅銆?br />聽聽聽 1974騫?鏈?6鏃ワ紝涓涓法澶х殑Wrigley's Spearmint鍙i緋栬繛鍚屼粖澶╃殑UPC鐮佹垚涓虹涓涓鎵弿鐨勫晢鍝侊紝鏍囧織鐫鏉″艦鐮佷笘鐣岀殑寮濮嬨?br />聽聽聽
聽聽聽 紺句細璐$尞錛氭潯褰㈢爜琛嶇敓鍑轟簡鏁版嵁鎸栨帢棰嗗煙錛屼漢浠彲浠ラ氳繃鏁版嵁鎸栨帢鎶鏈鐭ヤ駭鍝佺殑嫻侀氬拰閿鍞俊鎭傝繖浜涗俊鎭彲浠ュ府蹇欏彂鎺樹漢浠渶瑕佺殑浜у搧錛屼粠鑰屽噺灝戝簱瀛樻垚鏈紝娣卞叆鐞嗚В渚涘簲閾撅紝璐拱妯″紡浠ュ強澶ч噺鐨勫叾瀹冪壒鎬с?br />
8錛夋櫤鑳藉崱錛圫mart Card錛夛紞1974

聽聽聽 寰姱涔嬬埗Roland Moreno錛?974騫?鏈堣幏寰椾簡鏅鴻兘鍗$殑絎竴欏逛笓鍒┿傚騫村悗鏅鴻兘鍗¢嬈″彂琛岋紝浣嗘槸鍙嶅簲騫沖鉤銆傝繖浜涘垰鍙戣鐨勫崱闈炲父鍏堣繘浣嗘槸閫犱環鐩稿綋鏄傝吹銆?br />聽聽聽 1978騫寸數瀛愬厓浠剁殑浣撶Н澶уぇ緙╁皬錛屼嬌寰楀ぇ瑙勬ā鐢熶駭閫氱敤鏅鴻兘鍗℃垚涓哄彲鑳姐傝嚜閭d互鍚庯紝闇姹備笉鏂笂鍗囷紝鐜板湪鎴戜滑鍑犱箮鍙互鍦ㄤ笘鐣屼笂姣忎竴涓钀界湅鍒版櫤鑳藉崱銆?br />聽聽聽
聽聽聽 紺句細璐$尞錛?鏅鴻兘鍗″厑璁稿瓨鍌ㄦ洿澶氬鏉傜殑淇℃伅錛屽寘鎷祫閲戝彲浠庝腑蹇冭漿縐誨埌鍗′笂
錛圡ovement of currency from the center(credit card centralized network) to the edges(stored value on the card)錛夈傝櫧鐒舵櫤鑳藉崱鐨勫簲鐢ㄩ鍩熸秹鍙婂涓柟闈紝浣嗘槸瀹冨甫鏉ョ殑鐪熸鐨勭ぞ浼氬彉闈╄繕鏈夊緟瀵熻錛屽洜涓鴻秺鏉ヨ秺澶氱殑浜ゆ槗淇℃伅灝嗕細琚洿鎺ュ瓨鍌ㄥ湪鏅鴻兘鍗¢噷銆?br />
9錛夌數瀛愭暟鎹〃錛圫preadsheet錛夛紞1978

聽聽聽 浼氳琛ㄥ崟宸茬粡瀛樺湪鏁頒笘綰紝浣嗘槸Dan Bricklin鐨勭數瀛愭暟鎹〃涓嶄粎浣夸細璁′笟鍙戠敓浜嗗彉闈╋紝鑰屼笖鎴愪負浜嗕釜浜虹數鑴戠殑棣栦釜鏉鎵嬮攺搴旂敤銆?br />聽聽聽 1961騫達紝鍔犲窞澶у浼厠鍔涘垎鏍★紙UC Berkeley錛夋暀鎺圧ichard Mattessich鍦?961騫?鏈堝垔鐨勩奣he Accounting Review銆嬩笂鍙戣〃璁烘枃鈥滈綆楁ā鍨嬪拰緋葷粺妯℃嫙鈥濓紙Budgeting Models and System Simulation錛夛紝浠ュ強闅忓悗鐨勪袱鏈憲浣溿婁細璁″拰鍒嗘瀽鏂規硶銆嬶紙Accounting and Analytical Methods錛夈併婁紒涓氶氳繃璁$畻鏈洪綆楃▼搴忕殑妯℃嫙銆嬶紙Simualtion of the Firm Through a Budget Computer Program錛夐嬈℃彁鍑轟簡寮鍙戠數瀛愬寲琛ㄥ崟鐨勬兂娉曘傚湪閭d袱鏈憲浣滀腑錛岃繕緇欏嚭浜嗙敱Mattessich鏁欐巿鐨勪袱浣嶅姪鐞嗙爺絀跺憳閲囩敤FORTRAN IV璇█緙栧啓鐨勮綆楁満紼嬪簭妯℃嫙錛屼粬浠垎鍒槸Tom C.Schneider鍜?Paul A. Zitlau.
聽聽聽 鐒惰岋紝Mattessich鐨勫伐浣滃茍娌℃湁甯︽潵寰堝ぇ鐨勫獎鍝嶃傞殢鍚庯紝Bricklin緇х畫鎺ㄨ繘錛屽紑鍙戜簡鐢靛瓙鏁版嵁琛ㄥ崟棰嗗煙鐨勭涓涓彲鐢ㄤ駭鍝侊紝浠栧洜姝ゆ垚涓轟簡鐢靛瓙鏁版嵁琛ㄥ崟涔嬬埗銆?br />聽聽聽 褰撴椂Dan Bricklin姝e湪涓哄搱浣涘晢瀛﹂櫌錛圚arvard Business School錛夌殑鈥滄渚嬪垎鏋愨濓紙Case Study錛夋姤鍛婂噯澶囦竴浠芥暟鎹〃鍗曞垎鏋愶紝浠栬涔堝彧鑳芥墜鍔ㄥ埗浣滀竴涓紝瑕佷箞浣跨敤涓涓瀬闅劇敤鐨勬椂闂村叡浜殑涓繪満紼嬪簭銆侭ricklin璁や負涓瀹氬瓨鍦ㄦ洿濂界殑鍔炴硶鏉ュ埗浣滆〃鍗曪紝浠栧笇鏈涙湁榪欎箞涓涓▼搴忥細浜轟滑鍙互鐪嬪埌鍒涘緩琛ㄥ崟鐨勫叏榪囩▼銆備粬鐨勬兂娉曟剰鍛崇潃鈥滃湪鏁欏閲屽瓨鍦ㄤ竴鍙數瀛愰粦鏉垮拰鐢靛瓙綺夌瑪鈥濓紙an electronic blackboard and electronic chalk in a classroom錛夈?br />聽聽聽 1978騫寸錛孊ricklin宸茬粡鐢ㄦ暣鏁癇ASIC(Interger Basic錛夎璦緙栧啓鍑轟簡浠栨蹇典腑鐨勭涓涓師鍨嬬▼搴忋傝繖涓▼搴忓府鍔╃敤鎴瘋緭鍏ュ拰鎿嶄綔涓涓?0琛?鍒楃殑鐭╅樀銆傜涓涓増鏈姛鑳芥瘮杈冪畝鍗曪紝鎵浠ricklin鎵炬潵鍦ㄩ夯鐪佺悊宸ュぇ瀛︼紙MIT錛夌殑鐔熶漢Bob Frankston鏀瑰杽鍜屾墿鍏呰繖涓▼搴忕殑鍔熻兘銆?br />聽聽聽 VisiCalc浜у搧浠庤癁鐢熷埌鎺ㄥ嚭甯傚満錛屾誨叡鍗栧嚭浜嗙害1鐧句竾濂楃數瀛愭暟鎹〃鍗曠▼搴忋?br />聽聽聽 20涓栫邯80騫翠唬鏃╂湡錛岀數瀛愭暟鎹〃鍗曠殑甯傚満榪呴熷彂灞曪紝浣哣isiCalc鐨勮偂涓滃閲囩敤Intel鑺墖鐨処BM PC鐢佃剳鐨勫嚭鐜板弽搴斾笉澶熺伒鏁忋?983騫?鏈堝錛孷isiCorp鍜孲oftware Arts鍏徃鐨勬硶寰嬬籂綰蜂嬌VisiCalc寮鍙戣匓ricklin鍜孎rankston鐨勬敞鎰忓姏杞Щ錛岃繖孌墊椂闂達紝Mitch Kapor寮鍙戜簡Lotus錛屽叾鐢靛瓙鏁版嵁琛ㄥ崟紼嬪簭榪呴熸垚涓轟簡鐢靛瓙琛ㄥ崟琛屼笟鏂版爣鍑嗐?br />聽聽聽 绱ф帴鐫鐨勪笅涓涓椂浠i殢鐫寰蔣Excel琛ㄥ崟鐨勫嚭鐜拌屽紑濮嬨?987騫村井杞惎鍔╓indows鎿嶄綔緋葷粺錛孍xcel鏄殢涔嬩竴璧峰彂甯冪殑搴旂敤杞歡涔嬩竴銆?989騫存湯錛學indows 3.0鑾峰緱鐢ㄦ埛鐨勫ぇ閲忚鍙紝姝ゆ椂錛孍xcel宸茬粡鎴愪負浜嗗井杞殑鏃楄埌浜у搧銆?br />
聽聽聽 紺句細璐$尞錛?鐜板湪涓漢鍜屼紒涓氶兘鍙互鍋氬鏉傚緱澶氱殑璐㈠姟瑙勫垝銆佺爺絀跺拰鍦烘櫙寮鍙戯紙development of scenarios錛夊伐浣溿傛暟瀛楀彲浠ョ敤鏂圭▼鏉ヨ〃紺猴紝榪欐牱琛ㄥ崟涓殑淇℃伅鍙互闅忕潃涓涓肩殑鏀瑰彉鑰屽叏閮ㄦ洿鏂般?br />
10錛塕SA鍔犲瘑 錛?1983

聽聽聽 RSA瀵嗛挜鏈澶х殑璐$尞鍦ㄤ簬瀹冨厑璁稿湪澶氱敤鎴風殑鐜涓嬪姞鍑忓瘑錛屾崲鍙ヨ瘽璇達紝鍔犲瘑鏁版嵁鏂瑰拰瑙e瘑鏁版嵁鏂逛笉闇瑕佺洿鎺ョ殑鍙備笌浜や簰銆?br />聽聽聽 RSA綆楁硶浜?976-1977騫村湪緹庡浗楹葷渷鐞嗗伐瀛﹂櫌鐨勮綆楁満縐戝瀹為獙瀹ょ敱Ronald Rivest 錛孉di 聽Shamir 鍜孡en聽 Adelman涓変漢鍙戞槑錛屸淩SA鈥濅竴璇嶆簮鑷瘡浜虹殑鍚嶅瓧棣栧瓧姣嶃?br />聽聽聽 浠栦滑涓変漢鍙戞槑RSA綆楁硶鍓嶅彈鍒頒簡Whitfield Diffie鍜孧artin Hellman鍦ㄦ柉鍧︾澶у鐨勫伐浣滅殑鍚彂錛孌iffie鍜孒ellman涓や漢閮芥浘涓鐩村湪鐮旂┒鎺㈢儲澶氱敤鎴風殑鍔犲瘑鎶鏈?br />聽聽聽 Rivest鏈変竴嬈″湪闀挎涓婃帴鍙楀ご鐥涙不鐤楁椂鍐掑嚭榪欎箞涓涓瀯寤篟SA緋葷粺鐨勬兂娉曪紝瀹冨熀浜庤繖鏍蜂竴涓濊礬錛氭妸涓や釜澶ц川鏁扮浉涔樺緢瀹規槗寰楀埌涓涓洿澶х殑鏁幫紝浣嗘槸浠庝竴涓ぇ鏁板嵈寰堥毦鎵懼埌瀹冪殑鏈灝忓洜瀛愩傚瘑鏂囬氳渚濊禆浜庨氳鍙屾柟鍒嗗埆鎸佹湁涓鍏挜鍜屼竴縐侀挜銆傚彧瑕佷粠鏌愭柟澶勮幏寰楀叕閽ワ紝閭d箞灝辨湁鍙兘鍦ㄧ害瀹氱殑綆楁硶涓嬪拰瀵規柟浜ゆ崲縐樻枃淇℃伅銆?br />聽聽聽 鍦≧SA涓変漢婕旂ず浠栦滑鐨勭郴緇熶箣鍓嶏紝Rivest寰楀埌涓浣嶆潵鑷浗瀹跺畨鍏ㄩ儴錛圢ational Security Administration錛夊伐浣滀漢鍛樼殑鑱旂郴錛屽茍琚鍛婂鏋滀粬鍦ㄥ嵆灝嗗彫寮鐨勪細璁笂婕旂ず榪欎釜鍔犲瘑綆楁硶錛屼粬鍙兘闈復瑙︾姱1954鍐涗簨綆$悊琛屼負鏉′緥錛?954 Munitins Control Act錛夌殑鍗遍櫓銆傝繖涓潯渚嬭瀹氫換浣曚漢涓嶅緱瀵瑰鍑烘巿瀵嗛挜鐭ヨ瘑錛屽洜涓哄湪鍗沖皢涓捐鐨勪細璁笂灝嗘湁璁稿澶栫睄浜哄+鍙傚姞錛屼粬寰堝彲鑳藉皢浼氭硠闇茶紱佹鍑烘巿鐨勫姞瀵嗘妧鏈侻IT鍑洪潰鍜孨SA榪涜騫叉秹騫惰В鍐充簡璇ラ棶棰橈紝鍚庢潵NSA瑙i噴閬撻偅浣嶅伐浣滀漢鍛樼殑琛屼負騫朵笉浠h〃瀹夊叏閮紝鑰屼粎灞炰釜浜鴻寰勩?br />聽聽聽 MIT鍐沖畾瀵硅繖涓畻娉曠敵璇蜂笓鍒╋紝浣嗗洜涓哄湪閫掍氦鐢寵涔嬪墠瀹冨凡緇忚鍏紑榪囷紝鎵浠ユ棤娉曡幏寰楁壒鍑嗭紙it couldn't get foreign rights to it錛夈?983騫?鏈?0鏃ワ紝MIT鑾峰緱浜嗕笓鍒╋紝騫剁壒璁窻SA Security鍏徃浣跨敤銆?br />聽聽聽
聽聽聽 紺句細璐$尞錛?鍔犲瘑鏄湪鍏叡淇℃伅緗戯紙鍖呮嫭鍥犵壒緗戯級涓婅繘琛岀浜轟俊鎭氦鎹㈢殑蹇呴』鎵嬫銆備釜浜烘潈鍒╁拰鏀垮簻鑱岃兘涔嬮棿鐨勬枟浜夊皢鍐沖畾浜庡灝戜氦鎹俊鎭槸鍦ㄦ斂搴滃厑璁哥殑綆¤緰鑼冨洿涔嬪唴銆?br />
緇撹
聽聽聽
聽聽聽 涔熻榪涜榪欓」10澶ф妧鏈爺絀舵渶鍏鋒剰涔夌殑閮ㄥ垎鍦ㄤ簬鎺㈢┒涓縐嶆柊鎶鏈粠寮鍙戝埌琚ぇ浼楀競鍦烘帴鍙楁墍闇瑕佺殑鏃墮棿銆傛瘮濡侫TM錛屽畠緇忓巻浜?0澶氬勾銆傛垜浠娌℃湁鏄犲叆浼椾漢鐪煎笜鐨勬妧鏈父鎰熷埌濂藉錛屼粬浠湪鍙互鐪熸鑾峰緱甯傚満鐨勯璧犲墠灝卞寙鍖嗙寮浜嗘垜浠殑瑙嗙嚎銆?br />
聽聽聽 榪樻湁涓浜涙柊鎶鏈鍦ㄢ滈噾閽扁濅笘鐣岄噷寮鎷撳墠琛岋紝寰敮浠樻妧鏈紙Micropayment technologies錛夛紝棰勪粯淇$敤鍗★紙Prepaid credit cards錛夛紝縐誨姩鏀粯緋葷粺錛圡obile payment system錛変互鍙婄敓鐗╄瘑鍒妧鏈紙Biometrics錛夐兘鏄厖婊″笇鏈涚殑琛屼笟銆傚叕鍏辨斂絳?public policy decisions)錛岀粡嫻庣幆澧?General economic conditions)錛岃祫閲戝偍澶?financial backing)錛屾灉鏂喅絳?sheer determination)浠ュ強鍒濆鍥㈤槦鐨勭粍緇囷紝灝嗘槸鎴戜滑鍓嶈閬撹礬涓婂獎鍝嶈緭璧㈢殑涓昏鍥犵礌銆?br />
[鍏ㄦ枃瀹宂


]]>
20涓栫邯鈥滈噾閽扁濇妧鏈崄澶у彂鏄庯紙涓婏級http://m.shnenglu.com/MichaelLiu/articles/11592.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Tue, 22 Aug 2006 16:45:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/11592.htmlhttp://m.shnenglu.com/MichaelLiu/comments/11592.htmlhttp://m.shnenglu.com/MichaelLiu/articles/11592.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/11592.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/11592.html 20涓栫邯鈥滈噾閽扁濇妧鏈崄澶у彂鏄?/font>
娉細鏈枃鍦═homas Frey, Executive Director of the DaVinci Institute鐨勬枃绔犲熀紜涓婃暣鐞嗙紪鍐欍?/font>
Michael 2006騫?鏈?3鏃?/font>

杈捐姮濂囧闄㈢殑鐮旂┒灝忕粍鑰楁椂鍏湀鎼滈泦鏁寸悊浜嗚繎鐧鵑」鍦ㄩ噾閽遍鍩熺殑鍒涙柊鎶鏈紝騫剁敱瀛?/font> 闄㈡垚鍛樺強涓撳鎸夌収褰卞搷鍔涚殑澶у皬瀵規瘡欏規妧鏈繘琛屼簡璇勫垎銆備竴浜涙妧鏈彂鏄庡鍞揣鏈?/font> 錛圴ENDING MACHINE)錛屾梾琛屾敮紲?TRAVELERS CHEQUES)錛屽拰SLOT MACHINES鍥犱負鍙戞槑 浜?9涓栫邯鑰屾病鏈夎閫夎繘鏉ャ傛垜浠殑鐩爣灝嗕富瑕侀泦涓湪涓婁笘綰殑鍒涙柊鎶鏈傛湁浜涗駭鐢?/font> 浜?0涓栫邯90騫翠唬鐨勬妧鏈洜涓哄叾褰卞搷娌℃湁浠ヤ笅榪欎簺閭d箞澶ц屾病鏈夊湪鍚嶅崟涔嬪垪銆?br />浠ヤ笅鏄崄澶ф妧鏈細
1錛夌數瀛愮幇閲戞敹鍏ヨ褰曟満錛圗LECTRONIC CASH REGISTER錛夛紞 1906

緹庡浗鍙戞槑瀹禖harles Franklin Kettering(1876-1958)浜?906騫村彂鏄庝簡涓栫晫涓婄涓鍙癊CR錛?/font> 浠?904騫存瘯涓氫簬緹庡浗淇勪亥淇勫窞宸炵珛澶у錛屽伐紼嬩笓涓氥備粬涓鐢熻礎鐚樉钁楋紝鑾峰緱榪?40澶?/font> 欏逛笓鍒╂妧鏈茍浜湁榪?0鎵澶у鐨勮崳瑾夊崥澹ご琛斻傚厛鍚庝換鑱屼簬NCR, DELCO, GM銆?/font>

紺句細璐$尞錛欵CR鐨勫嚭鐜頒負鍚庢潵鐨勪氦鏄撴暟鎹敹闆嗕笌鍒嗘瀽閾哄鉤浜嗛亾璺紝騫墮殢涔嬩駭鐢熶簡鐜板湪 鐨勯鍒嗘瀽妯″瀷錛圥redictive Modeling錛夊拰瀛樿揣鎺у埗銆?/font>

2錛夌數瀛愯揣甯?錛?1918

1918騫寸編鑱斿偍閾惰(Federal Reserve Banks)閫氳繃鐢墊姤鐨勫艦寮忚漿縐昏祫閲戯紝榪欐槸鐢靛瓙璐у竵 鐨勭涓嬈″嚭鐜般傜劧鑰岋紝鐢靛瓙璐у竵鐨勫箍娉涗嬌鐢ㄧ洿鍒?972騫寸編鑱斿偍璁劇珛鑷姩娓呯畻涓績錛圓 CH-Automated Clearing House錛夊悗鎵嶅紑濮嬶紝榪欎釜娓呯畻涓績鐢ㄤ簬緇欑編鍥借儲鏀塊儴鍙婂晢涓氶摱 琛屾彁渚涚數瀛愬艦寮忕殑鏀エ澶勭悊銆傜揣鎺ョ潃綾諱技鐨勭郴緇熷湪嬈ф床涔熼愭笎鍑虹幇錛屽洜姝ょ數瀛愯揣甯?/font> 鐨勫箍娉涗嬌鐢ㄥ疄闄呬笂宸茬粡鎸佺畫浜?0澶氬勾銆?/font>

紺句細璐$尞錛?br />聽聽聽 浠婂ぉ錛屼笘鐣屼笂鎵鏈夐摱琛岀郴緇熺殑璐у竵鏀粯鍑犱箮閮芥槸閫氳繃涓緋誨垪鐨勮法琛岀綉緇滆繘琛岀數瀛?/font> 澶勭悊銆傚叾涓紝綰界害娓呯畻涓績榪愯鎿嶄綔鐨凜HIPS(Clearing House Interbank Payments System)灝辨槸鏈澶х殑緗戠粶涔嬩竴錛屽畠涓昏澶勭悊宸ㄩ璧勯噾鐨勮漿甯愩?994騫碈HIPS鍜孎edwir e錛堢編鑱斿偍緗戠粶緋葷粺錛夎仈鍚堝鐞嗕簡11750涓囩瑪浜ゆ槗錛屾諱環鍊?066鍗冧嚎緹庨噾銆?br />聽聽聽 铏界劧閾惰宸茬粡閲囩敤鐢靛瓙璐у竵杞笎鏈?0澶氬勾錛屼絾鏄洿鍒版渶榪戯紝瀹冩墠鐪熸鎰忎箟涓婂湴琚?/font> 鏅氭秷璐硅呬嬌鐢ㄨ搗鏉ャ傝綆楁満鍔熻兘鐨勬棩鐩婂己澶у拰鎴愭湰鐨勭緝鍑忥紝浠ュ強浣垮叏鐞冧氦浜掓垚鏈?/font> 澶уぇ闄嶄綆鐨勭幇浠g綉緇滈氳鎶鏈殑鍙戝睍錛岃繖浜涘洜绱犲凡緇忎嬌寰楀叏鐞冩暟鐧句竾鐨勪釜浜虹敤鎴瘋繘 琛岀數瀛愯揣甯佽漿甯愭垚涓虹幇瀹炪傚洜姝わ紝鐢靛瓙璐у竵鐨勫嚭鐜拌鎴戜滑瑙佽瘉浜嗘暟瀛楃粡嫻庡彂灞曠殑鏃?/font> 鏈熼樁孌點?/font>

3錛夌涓杈嗚繍閽炶濺錛?920

聽聽聽 鏈変簺浜鴻涓鴻揪鑺(Leonardo da Vinci)鍙戞槑浜嗚鐢茶濺錛屽疄闄呬笂涓嶆槸銆備粖澶╃殑瑁呯敳杞?/font> 闇瑕佽拷韙埌1920騫寸編鍥芥槑灝艱嫃杈懼窞鍦d繚緗楃殑絎竴杈嗗晢鐢ㄨ鐢茶濺鐨勫嚭鐜般?/font>

聽聽聽 紺句細璐$尞錛氳繍閽炶濺鐨勫嚭鐜頒嬌寰楀法棰濈幇閲戠殑榪愰佹洿蹇洿瀹夊叏錛岄摱琛屼笉闇瑕佹墜鎻″ぇ閲?/font> 鐜伴噾鑰岃繘琛岃漿閫併?/font>

4錛変俊鐢ㄦ満鏋勶紞1937
聽聽聽
聽聽聽 19涓栫邯30騫翠唬錛屽晢浜篖ewis Tappan鍦ㄦ浖鍝堥】涓轟粬鍝ュ摜鐨勪笣緇告壒鍙戠敓鎰忓仛瀹㈡埛淇$敤鐨?/font> 璇勫畾錛屽茍鍒╃敤澶勭悊鐢熸垚鐨勫ぇ閲忎俊鐢ㄨ褰曞仛涓轟粬浠紑灞曚笟鍔$殑鏂歸拡銆俆appan鎰忚瘑鍒頒粬 浠仛鎵瑰彂鐢熸剰鏃墮渶瑕佷俊鐢ㄨ褰曡繖涓鐐瑰皢浼氬歡浼稿埌鍏朵粬闇瑕佷俊鎭殑渚涘簲鍟嗕笂銆傞氳繃涓?/font> 闂ㄥ鐞嗚繖浜涗俊鐢ㄤ俊鎭茍鎻愪緵緇欏叾浠栦緵搴斿晢錛孴appan璁よ瘑鍒頒簡緇忔祹瀛﹀闂ㄦ墍縐扮殑鈥滆妯?/font> 緇忔祹鈥濓紝騫跺府蹇欏垱绔嬩簡緹庡浗淇$敤鎶ュ憡涓氬姟錛圔usiness of credit reporting錛夈俆appan鍜屽叏 鍥界殑浠g悊鍙婇氳紺劇璁㈠悎鍚岋紝寮杈熶笓鏍忚璁哄綋鍦頒紒涓氱殑鐗圭偣銆佽繍琛岀姸鍐典互鍙婃湭鏉ュ墠 鏅備粬鍒涚珛浜嗕竴涓俊鎭腑蹇冨彲蹇熷湴鎻愪緵淇℃伅鍜ㄨ銆俆appan鐨勪俊鎭腑蹇冨悗鏉ユ垚涓轟紬 鎵鍛ㄧ煡鐨凴.G.Dun&Co.鍏徃錛?933騫村拰Bradstreet鍏徃鍚堝茍鎴愮珛浜咲un&Bradstreet錛岀幇鍦?/font> 宸茬粡鍗犳嵁浜嗗晢涓氫俊鐢ㄦ姤鍛婇鍩熶笟鍔°?br />聽聽聽
聽聽聽 紺句細璐$尞錛氫粖澶╁湪緹庡浗鏈変笁澶т俊鐢ㄦ姤鍛婄郴緇燂紞Equifax, Experian, Trans Union錛屾瘡涓?/font> 緋葷粺鎷ユ湁澶ч噺鐨勫皬鍨嬬殑闄勫睘淇$敤鏈烘瀯銆?998騫碅CB(Associated Credit Bureau)鍦ㄦ暣涓編 鍥芥嫢鏈?91涓垚鍛樻満鏋勶紝姣忓勾鍑哄敭6浜夸喚淇$敤鎶ュ憡銆?/font>

5錛夎嚜鍔ㄦ煖鍛樻満錛圓TM-Automatic Teller Machine錛夛紞1939

聽聽聽 Luther George Simjian錛?905錛?997錛夛紝鍙戞槑瀹訛紝鍑虹敓浜庡湡鑰沖叾錛?920騫寸Щ灞呯編鍥?/font> 銆?939騫翠粬鍒墮犱簡涓栫晫涓婄涓鍙癆TM錛屼絾鏄疉TM鍙戞槑鑰呯殑澶磋騫朵笉灞炰簬浠栥?br />聽聽聽 1939騫碨imjian鍒墮犲嚭絎竴鍙癆TM錛岃幏寰椾簡20欏圭浉鍏充笓鍒╋紙寰堝鍦ㄤ粖澶╃殑ATM涓粛鏃?/font> 浣跨敤錛夛紝褰撴椂寰堝閾惰瀵硅繖縐嶆満鍣ㄦ寔鎬鐤戞佸害錛屾渶緇圫imjian璇存湇浜嗙幇鍦ㄧ殑鑺辨棗閾惰錛?/font> CitiBank錛夊茍鍚屾剰璇曠敤6涓湀銆備絾鏄紝閾惰鏈緇堝茍娌℃湁鎺ュ彈榪欑鏈哄櫒錛屽洜涓洪渶姹備笉瓚熾?/font> 褰撴椂Simjian鍐欓亾錛屸滅湅鏉ヤ嬌鐢ㄨ繖縐嶆満鍣ㄧ殑浜哄彧鏄竴灝忛儴鍒嗙殑濡撳コ鍜岃祵寰掞紝鍥犱負浠栦滑涓?/font> 鎯蟲帴鍙楁煖鍙版湇鍔″憳褰撻潰鐨勬湇鍔♀濄係imjian鍥犺屼笉鍐嶅瀹冭繘琛岃繘涓姝ョ殑鐮旂┒鍜屾帹閿銆?br />聽聽聽 1968騫達紝Donald Wetzel錛屽綋鏃禗ocutel鍏徃浜у搧瑙勫垝閮ㄧ殑鍓昏錛屽湪杈炬媺鏂竴瀹墮摱琛屾帓 闃熺瓑鍊欐湇鍔$殑鏃跺欙紝钀岀敓浜嗗埗閫燗TM鏈哄櫒鐨勬兂娉曘侱ocutel鐨勯甯満姊板伐紼嬪笀Tom Barnes鍜岀數瀛愬伐紼嬪笀George Chastain錛屽拰Donal Wetzel涓璧瘋姳璐?00涓囩編閲戝紑濮嬪紑鍙戠 涓鍙扮幇浠f剰涔変笂鐨凙TM錛屽茍浜?969騫翠駭鐢熼洀褰€?973騫碊ocutel鍏徃鑾峰緱涓欏逛笓鍒┿?br />聽聽聽 絎竴鍙癆TM鍦ㄧ編鍥界航綰︾殑鍖栧伐閾惰錛圕hemical Bank錛夊畨瑁呬嬌鐢ㄣ傚畠紱葷嚎宸ヤ綔錛屽 浣跨敤瀹㈡埛鐨勪俊鐢ㄨ姹傝緝楂樸?br />聽聽聽 Wetzel錛孊arnes錛孋hastain涓変漢寮鍙戜簡絎竴寮犵湡姝g殑ATM鍗★紝鎸佸崱浜烘牴鎹崱涓殑紓侀亾鏁版嵁 鍜屼釜浜哄瘑鐮佷粠ATM鑾峰彇鐜伴噾銆傝繖涓変漢鍏卞悓鍙戞槑浜咥TM鑰岃閾鍙插唽銆?/font>

聽聽聽 紺句細璐$尞錛氬浠夾TM琚畨瑁呭湪閾惰鍜屾湇鍔″満鎵姣忎釜瑙掕惤錛岀粰瀹㈡埛鎻愪緵浜嗗揩鎹鋒柟渚?/font> 鐨勭幇閲戝強鍚勭鍏朵粬鏈嶅姟銆?/font>



]]>
濡備綍鍦ˋTM涓婂疄鐜癊MV浜ゆ槗http://m.shnenglu.com/MichaelLiu/articles/11042.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Wed, 09 Aug 2006 05:39:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/11042.htmlhttp://m.shnenglu.com/MichaelLiu/comments/11042.htmlhttp://m.shnenglu.com/MichaelLiu/articles/11042.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/11042.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/11042.html濡備綍鍦ˋTM涓婂疄鐜癊MV浜ゆ槗
Michael 2006騫?鏈?鏃?br />
鍗沖皢鎺ㄥ嚭銆?/font>


鍥犺繎鏃ュ伐浣滅箒蹇?灝嗕簬浠栨棩闂叉殗鏃墮棿鍐嶅啓.(2006-10)


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬪崄涓 Completionhttp://m.shnenglu.com/MichaelLiu/articles/10422.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Mon, 24 Jul 2006 13:44:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/10422.htmlhttp://m.shnenglu.com/MichaelLiu/comments/10422.htmlhttp://m.shnenglu.com/MichaelLiu/articles/10422.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/10422.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/10422.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬪崄涓 Completion
Michael 2006騫?鏈?4鏃?br />
1 /* ----------------------------------------------------------------
2 鍚嶇О錛欳ompletion
3 鍙傛暟錛?br /> 4 聽聽聽聽聽聽聽聽鏃犮?br /> 5 澶勭悊錛?br /> 6 聽聽聽聽聽聽聽聽榪欐槸EMV浜ゆ槗鐨勭粓鐐圭珯銆?br /> 7 聽聽聽聽聽聽聽聽ICC鍗¤繑鍥濼C(Transaction聽Certificate錛屽綋鍝嶅簲絎竴嬈ENERATE聽AC鍛戒護)鎴栬匒AC(Application聽Authentication聽Cryptogram錛屽綋鍝嶅簲絎簩嬈ENERATE聽AC鍛戒護)緇欑粓绔紺篒CC瀵規墍鏈塃MV鍑芥暟鐨勬墽琛岀粨鏉燂紙鍗蟲巿鏉冩垨鑰呮嫆緇濅氦鏄擄級銆?br /> 8 ----------------------------------------------------------------- */


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬪崄 Issuer-to-Card Script Processinghttp://m.shnenglu.com/MichaelLiu/articles/10421.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Mon, 24 Jul 2006 13:43:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/10421.htmlhttp://m.shnenglu.com/MichaelLiu/comments/10421.htmlhttp://m.shnenglu.com/MichaelLiu/articles/10421.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/10421.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/10421.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬪崄 Issuer-to-Card Script Processing
Michael 2006騫?鏈?4鏃?br />
聽1 /**//*----------------------------------------------------------------
聽2鍚嶇О錛欼ssuer-to-Card聽Script聽Processing
聽3鍙傛暟錛?br />聽4聽聽聽聽聽聽聽聽[IN]聽Authorization聽Response聽Message錛堝寘鍚獻ssuer聽Script聽-聽Tag'71'聽or聽'72'錛?br />聽5聽聽聽聽聽聽聽聽[OUT]聽TVR(Terminal聽Verification聽Result)
聽6聽聽聽聽聽聽聽聽[OUT]聽TSI(Transaction聽Status聽Information)
聽7澶勭悊錛?br />聽8聽聽聽聽聽聽聽聽榪欐槸鍙戝崱琛?ICC)鍜屽彂鍗¤鑷韓(涓繪満)涔嬮棿鐨勫張涓嬈″璇濄?br />聽9聽聽聽聽聽聽聽聽涓繪満鍙互鍦ㄥ彂緇欑粓绔殑浜ゆ槗鍝嶅簲鍖呬腑鍖呭惈涓浜涚壒孌婂懡浠ょ殑鑴氭湰
10錛堟瘮濡倁nblocking聽of聽an聽offline聽PIN鍛戒護錛屽浜庝笉鍚岀殑鍙戝崱琛屽懡浠よ駿寮傛墍浠ョ敱鍙戝崱琛岀洿鎺ュ彂閫侊級渚汭CC鎵ц錛岀粓绔彧瑕佸皢榪欎簺鍛戒護杞彂緇橧CC鍗沖彲銆?br />11聽聽聽聽聽聽聽聽鍏蜂綋鍦幫紝緇堢鎺ユ敹鍒頒富鏈虹殑浜ゆ槗鍝嶅簲鍖呭悗鍙栧嚭ICC鎵ц鑴氭湰(Issuer聽Script-Tag'71'聽or聽'72'錛屄犳瘡涓搷搴斿寘涓彲鑳藉寘鍚涓墽琛岃剼鏈?錛岀粓绔姣忎釜鎵ц鑴氭湰榪涜瑙f瀽寰楀埌璇ヨ剼鏈殑ICC鍛戒護搴忓垪(Tag-'86')錛岀劧鍚庨愪竴鎸夊簭緇橧CC鍙戦両CC鍛戒護錛屽鏋淚CC鎵ц璇ュ懡浠ゅけ璐ュ垯璇ヨ剼鏈殑鍚庣畫鍛戒護涓嶅啀鎵ц錛岃剼鏈墽琛岀粨鏉燂紱濡傛灉璇ュ懡浠ゆ墽琛屾垚鍔熷垯緇х畫鎵ц鍚庣畫瑙f瀽鍑烘潵鐨勫懡浠わ紝鐩村埌鎵鏈夊懡浠ゆ墽琛屾垚鍔熷悗璇ヨ剼鏈殑鎵ц鎴愬姛瀹屾垚銆?br />12聽聽聽聽聽聽聽聽鍙鑴氭湰琚墽琛屽垯璁劇疆TSI鐨?Script聽processing聽was聽performed"涓?錛岃嫢鎵ц澶辮觸鍒欒緗甌VR鐨勭浉搴斾綅涓?錛堝Tag'71'鍜?72'鐨勮剼鏈緗殑TVR浣嶄笉鍚岋級銆?br />13-----------------------------------------------------------------*/


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬩節 Online Processinghttp://m.shnenglu.com/MichaelLiu/articles/10420.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Mon, 24 Jul 2006 13:41:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/10420.htmlhttp://m.shnenglu.com/MichaelLiu/comments/10420.htmlhttp://m.shnenglu.com/MichaelLiu/articles/10420.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/10420.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/10420.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬩節 Online Processing
Michael 2006騫?鏈?4鏃?br />
聽1 /* ----------------------------------------------------------------
聽2 鍚嶇О錛歄nline聽Processing
聽3 鍙傛暟錛?br /> 聽4 聽聽聽聽聽聽聽聽[IN]聽ARQC(Authorization聽Request聽Cryptogram)
聽5 聽聽聽聽聽聽聽聽[IN]聽AIP(Application聽Interchange聽Profile)
聽6 聽聽聽聽聽聽聽聽[OUT]聽TVR(Terminal聽Verification聽Result)
聽7 聽聽聽聽聽聽聽聽[OUT]聽TSI(Transaction聽Status聽Information)
聽8 澶勭悊錛?br /> 聽9 聽聽聽聽聽聽聽聽榪欐槸鍙戝崱琛?ICC)鍜屽彂鍗¤鑷韓(涓繪満)涔嬮棿鐨勪竴嬈″璇濄?br /> 10 聽聽聽聽聽聽聽聽褰撶粓绔敹鍒癐CC鐨凙RQC鍐崇瓥鏃墮渶瑕佽繘琛屽湪綰挎巿鏉冦?br /> 11 聽聽聽聽聽聽聽聽鍏蜂綋鍦幫紝ARQC錛堢敤鍙戝崱琛岀殑瀵嗛挜瀵逛氦鏄撴暟鎹繘琛岃繍綆楀緱鍒扮殑涓孌典唬鐮侊級琚寘鍚湪浜ゆ槗璇鋒眰鍖呬腑鍙戦佺粰涓繪満錛屼富鏈鴻繘琛屾巿鏉冪‘璁ゅ悗榪斿洖浜ゆ槗鍝嶅簲鍖呫?br /> 12 聽聽聽聽聽聽聽聽濡傛灉浜ゆ槗鍝嶅簲鍖呬腑鍖呭惈IAD(Issuer聽Authentication聽Data聽-聽tag'91')錛岀粓绔鏌IP鍊肩湅ICC鏄惁鏀寔IA(Issuer聽Authentication)錛屽鏋滄敮鎸佸垯緇堢緇橧CC鍙戦丒XTERNAL聽AUTHENTICATE鍛戒護錛堜竴嬈′氦鏄撳彧鑳藉彂涓嬈★級錛屾牴鎹甀CC榪斿洖鐨勫懡浠ゆ墽琛岀粨鏋滆緗甌VR鐩稿簲浣嶃傝嫢緇堢涓嶆敮鎸両A鎴栦氦鏄撳搷搴斿寘娌℃湁IAD鏁版嵁錛屽垯涓嶅彂閫佷換浣曞懡浠ゃ?br /> 13 聽聽聽聽聽聽聽聽鑻XTERNAL聽AUTHENTICATIE鍛戒護鏈夎鍙戦侊紝鍒欒緗甌SI鐨勭浉搴斾綅涓?銆?br /> 14 ----------------------------------------------------------------- */


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬪叓 Card Action Analysishttp://m.shnenglu.com/MichaelLiu/articles/10312.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Fri, 21 Jul 2006 07:11:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/10312.htmlhttp://m.shnenglu.com/MichaelLiu/comments/10312.htmlhttp://m.shnenglu.com/MichaelLiu/articles/10312.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/10312.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/10312.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬪叓 Card Action Analysis
Michael 2006騫?鏈?1鏃?br />
聽1/*----------------------------------------------------------------
聽2鍚嶇О錛欳ard聽Action聽Analysis錛堝崱琛屼負鍐崇瓥錛?br />聽3鍙傛暟錛?br />聽4聽聽聽聽聽聽聽聽[IN]聽GENERATE聽AC聽Command
聽5聽聽聽聽聽聽聽聽[IN]聽CDOL(Card聽Risk聽Management聽Data聽Object聽List)
聽6聽聽聽聽聽聽聽聽[IN]聽AIP(Application聽Interchange聽Profile)
聽7聽聽聽聽聽聽聽聽[OUT]聽TSI(Transaction聽Status聽Information)
聽8聽聽聽聽聽聽聽聽[OUT]聽GENERATE聽AC聽Response
聽9澶勭悊錛?br />10聽聽聽聽聽聽聽聽鍗¤涓哄喅絳栵紝鍗沖緇堢鍙戜笅鏉ョ殑GENERATE聽AC鍛戒護榪涜澶勭悊騫跺仛鍑哄搷搴旓紙紱葷嚎鎷掔粷錛屽湪綰挎巿鏉冿紝鍦ㄧ嚎'鍐叉'榪樻槸紱葷嚎鎺堟潈錛夛紝浠ュ鍙戝崱琛岀殑椋庨櫓榪涜綆$悊銆備笉鍚屼簬緇堢琛屼負(Terminal聽Action聽Analysis)鐨勬煡琛ㄥ喅絳栵紝鍙戝崱琛屽浣曞鐞咥C鍛戒護鍙婂仛浣曠鍝嶅簲瀹屽叏鐢卞彂鍗¤鑷韓鍐沖畾錛孍MV騫舵棤瑙勫畾銆?br />11-----------------------------------------------------------------*/


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬩竷 Terminal Action Analysishttp://m.shnenglu.com/MichaelLiu/articles/10310.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Fri, 21 Jul 2006 07:04:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/10310.htmlhttp://m.shnenglu.com/MichaelLiu/comments/10310.htmlhttp://m.shnenglu.com/MichaelLiu/articles/10310.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/10310.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/10310.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬩竷 Terminal Action Analysis
Michael 2006騫?鏈?1鏃?br />
聽1/*----------------------------------------------------------------
聽2鍚嶇О錛歍erminal聽Action聽Analysis錛堢粓绔涓哄喅絳栵級
聽3鍙傛暟錛?br />聽4聽聽聽聽聽聽聽聽[IN]聽TVR(Terminal聽Verification聽Result)
聽5聽聽聽聽聽聽聽聽[IN]聽IAC(Issuer聽Action聽Codes)錛屽拰TVR瀹屽叏涓鏍風殑鏁版嵁緇撴瀯錛岃褰曚簡閽堝TVR涓瘡浣嶇粨鏋滃簲閲囧彇鐨勫喅絳栧寘鎷綰挎巿鏉冿紝紱葷嚎鎷掔粷鎴栧湪綰挎巿鏉冦侷AC鍖呮嫭:
聽6聽聽聽聽聽聽聽聽聽聽聽聽聽聽Issuer聽Action聽Code聽-聽Denial聽(Tag聽'9F0E'),聽榛樿鍊間負鍏?
聽7聽聽聽聽聽聽聽聽聽聽聽聽聽聽Issuer聽Action聽Code聽-聽Online聽(Tag聽'9F0F'),聽榛樿鍊間負鍏?
聽8聽聽聽聽聽聽聽聽聽聽聽聽聽聽Issuer聽Action聽Code聽-聽Default(Tag聽'9F0D'),聽榛樿鍊間負鍏?
聽9聽聽聽聽聽聽聽聽IAC-Denial鎸囧畾TVR涓摢浜涚粨鏋滀綅涓?鏃墮渶瑕佺綰挎嫆緇濄?br />10聽聽聽聽聽聽聽聽IAC-Online鎸囧畾TVR涓摢浜涚粨鏋滀綅涓?鏃墮渶瑕佸湪綰挎巿鏉冦?br />11聽聽聽聽聽聽聽聽IAC-Default鎸囧畾褰撹姹傚湪綰挎巿鏉冧絾鏄粓绔病鍔炴硶鍦ㄧ嚎鐨勬儏鍐典笅TVR涓摢浜涚粨鏋滀綅涓?鏃墮渶瑕佺綰挎嫆緇濄傚涓?鐨勭粨鏋滀綅鍒欑綰挎巿鏉冦傚鏋滅粓绔彲浠ュ湪綰夸氦鏄撳垯IAC-Default涓嶈鎵ц銆?br />12聽聽聽聽聽聽聽聽[IN]聽TAC(Terminal聽Action聽Codes)錛屾垨鑰呯О浣淎AC(Acquirer聽Action聽Codes)錛屽拰TVR瀹屽叏涓鏍風殑鏁版嵁緇撴瀯錛屽寘鎷?
13聽聽聽聽聽聽聽聽聽聽聽聽聽聽Terminal聽Action聽Code聽-聽Denial,聽
14聽聽聽聽聽聽聽聽聽聽聽聽聽聽Terminal聽Action聽Code聽-聽Online,
15聽聽聽聽聽聽聽聽聽聽聽聽聽聽Terminal聽Action聽Code聽-聽Default
16聽聽聽聽聽聽聽聽TAC鍜孖AC瀹屽叏涓鏍風殑鎰忎箟錛屽湪榪涜琛屼負鍐崇瓥鐨勬椂鍊欓渶瑕佺患鍚堣冭檻IAC鍜孴AC錛屽彧瑕佸叾涓煇涓涓殑鐩稿簲浣嶈姹傚仛鍑烘煇縐嶈涓哄垯闇瑕佹墽琛岃琛屼負銆傛瘮濡傦紝褰揟VR涓煇浣嶄負1鏃禝AC瑕佹眰Denial錛堢綰挎嫆緇濓級錛屼絾鏄疶AC娌℃湁瑕佹眰Denial錛岄偅涔堢粨鏋滄槸闇瑕佺綰挎嫆緇濄?br />17聽聽聽聽聽聽聽聽[OUT]聽GENERATE聽AC聽Command
18澶勭悊錛?br />19聽聽聽聽聽聽聽聽緇堢琛屼負鍐崇瓥錛屽氨鏄牴鎹甌VR緇撴灉鏌ユ壘IAC鍜孴AC琛ㄦ潵鍐沖畾鍚慖CC鍙戦丟ENERATE聽AC鍛戒護鏃墮渶瑕佽姹侫AC,聽ARQC榪樻槸TC錛屽嵆紱葷嚎鎷掔粷錛屽湪綰挎巿鏉冭繕鏄綰挎巿鏉冦?br />20聽聽聽聽聽聽聽聽鍚慖CC鍙戦丟ENERATE聽AC鍛戒護鍚庯紝ICC鏈韓榪樿鍋氬嚭琛屼負鍐崇瓥錛圕ard聽Action聽Analysis錛夛紝浠ユ渶緇堢‘瀹氳浜ゆ槗鏄綰挎嫆緇?鍦ㄧ嚎鎺堟潈/紱葷嚎鎺堟潈銆?br />21聽聽聽聽聽聽聽聽琛屼負鍐崇瓥鐨勯『搴忔槸浠嶪AC/TAC-Denial,聽IAC/TAC-Online鍒癐AC/TAC-Default銆?br />22-----------------------------------------------------------------*/


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬪叚 Terminal Risk Managementhttp://m.shnenglu.com/MichaelLiu/articles/10256.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Thu, 20 Jul 2006 10:09:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/10256.htmlhttp://m.shnenglu.com/MichaelLiu/comments/10256.htmlhttp://m.shnenglu.com/MichaelLiu/articles/10256.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/10256.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/10256.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬪叚 Terminal Risk Management
Michael 2006騫?鏈?0鏃?br />
聽1/*----------------------------------------------------------------
聽2鍚嶇О錛歍erminalRiskManagement
聽3鍙傛暟錛?br />聽4聽聽聽聽聽聽聽聽[IN]聽AIP(Application聽Interchange聽Profile)
聽5聽聽聽聽聽聽聽聽[IN]聽Terminal聽LOG
聽6聽聽聽聽聽聽聽聽聽聽聽聽鐢ㄤ簬鑾峰緱鏈浜ゆ槗甯愬彿鐨勬渶榪戜竴嬈′氦鏄撻噾棰?br />聽7聽聽聽聽聽聽聽聽[IN]聽TFL(Terminal聽Floor聽Limit聽-聽Tag聽'9F1B')
聽8聽聽聽聽聽聽聽聽[IN]聽TPURS(Target聽Percentage聽to聽be聽Used聽for聽Random聽Selection聽-聽緇堢鏁版嵁)
聽9聽聽聽聽聽聽聽聽[IN]聽TVBRS(Threshold聽Value聽for聽Biased聽Random聽Selection聽-聽緇堢鏁版嵁)
10聽聽聽聽聽聽聽聽[IN]聽MTPUBRS(Maximum聽Target聽Percentage聽to聽be聽Used聽for聽Biased聽Random聽Selection聽-聽緇堢鏁版嵁)
11聽聽聽聽聽聽聽聽[IN]聽LCOL(Lower聽Consecutive聽Offline聽Limit聽-聽tag聽'9F14')
12聽聽聽聽聽聽聽聽[IN]聽UCOL(Upper聽Consecutive聽Offline聽Limit聽-聽tag聽'9F23')
13聽聽聽聽聽聽聽聽[IN]聽ATC(Application聽Transaction聽Counter聽-聽tag聽'9F36')
14聽聽聽聽聽聽聽聽[IN]聽LOAR(Last聽Online聽ATC聽Register聽-聽tag聽'9F13')
15聽聽聽聽聽聽聽聽[OUT]聽TVR(Terminal聽Verification聽Result)
16聽聽聽聽聽聽聽聽[OUT]聽TSI(Transaction聽Status聽Information)
17澶勭悊錛?br />18聽聽聽聽聽聽聽聽鍖呮嫭錛?br />19聽聽聽聽聽聽聽聽[閲戦涓婇檺媯楠?Floor聽Limit聽checking)]聽鍒ゆ柇鏈浜ゆ槗閲戦鍜屼笂嬈′氦鏄撻噾棰濈殑鎬誨拰鏄惁瓚呰繃緇堢浜ゆ槗閲戦涓婇檺(Terminal聽Floor聽Limit)錛岃緗甌VR鐩稿簲浣嶃?br />20聽聽聽聽聽聽聽聽[鍦ㄧ嚎浜ゆ槗鍒ゆ柇(Random聽Transaction聽Selection)]聽瀵逛簬浜ゆ槗閲戦灝忎簬TVBRS鐨勬儏鍐碉紝緇堢闇瑕佷駭鐢熶竴涓?錛?9鐨勯殢鏈烘暟錛屽鏋滆闅忔満鏁板皬浜庣瓑浜嶵PURS鍒欒浜ゆ槗闇瑕佸湪綰塊獙璇併傚浜庨噾棰濆ぇ浜庣瓑浜嶵VBRS浣嗗皬浜嶵FL鐨勪氦鏄擄紝緇堢闇瑕佹瘮杈冧駭鐢熺殑闅忔満鏁板拰TTP(Transaction聽Target聽Percent)錛屽鏋滈殢鏈烘暟灝忎簬絳変簬TTP錛屽垯浜ゆ槗闇瑕佸湪綰塊獙璇併傚叾涓紝TTP=(聽(MTPUBRS-TPURS)聽*聽((Amount,Authorised-TVBRS)/(TFL-TVBRS))聽)+TPURS銆傝嫢闇瑕佸湪綰塊獙璇佸垯璁劇疆TVR鐨勭浉搴斾綅涓?銆?br />21聽聽聽聽聽聽聽聽[浜ゆ槗鍛ㄦ湡鏍¢獙(Velocity聽Checking)]聽鍙戦丟ET聽DATA鍛戒護璇誨彇ATC鍜孡ast聽Online聽ATC聽Register錛岃嫢璇誨彇澶辮觸鍒欐牎楠岀粨鏉熷茍緗甌VR鐩稿簲浣嶃傝嫢璇誨彇鎴愬姛鍒欎袱鍊肩浉鍑忕殑緇撴灉鍚孡COL姣旇緝錛岃嫢緇撴灉澶т簬LCOL鍒欒浜ゆ槗闇瑕佸湪綰挎巿鏉冦傝嫢緇堢褰撴椂鏃犳硶鍦ㄧ嚎浜ゆ槗鍒欏彲浠ョ戶緇綰夸氦鏄撶殑涓婇檺涓篣COL錛屽綋UCOL嬈℃暟杈懼埌鏃跺繀欏昏繘琛屽湪綰挎巿鏉冿紝鍚﹀垯浜ゆ槗搴斿綋琚嫆緇濄傝嫢LOAR涓?鍒欒璁劇疆TVR鐨勨滄柊鍗♀濅綅涓?銆?br />22聽聽聽聽聽聽聽聽TRM鎵ц瀹屽悗緗甌VR鍜孴SI鐩稿簲浣嶃?br />23-----------------------------------------------------------------*/

24


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬩簲 Cardholder Verificationhttp://m.shnenglu.com/MichaelLiu/articles/10255.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Thu, 20 Jul 2006 10:05:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/10255.htmlhttp://m.shnenglu.com/MichaelLiu/comments/10255.htmlhttp://m.shnenglu.com/MichaelLiu/articles/10255.html#Feedback4http://m.shnenglu.com/MichaelLiu/comments/commentRss/10255.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/10255.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬩簲 Cardholder Verification
Michael 2006騫?鏈?0鏃?br />
聽1/*----------------------------------------------------------------
聽2鍚嶇О錛欳ardholderVerification
聽3鍙傛暟錛?br />聽4聽聽聽聽聽聽聽聽[IN]聽AIP(Application聽Interchange聽Profile)
聽5聽聽聽聽聽聽聽聽[IN]聽CVM聽List(Tag聽'8E')
聽6聽聽聽聽聽聽聽聽聽聽聽聽聽聽鍖呮嫭涓や釜4-BYTE鐨凙MOUNT聽FIELDs鍜屾暟涓?-BYTE鐨凜VRs(Cardholder聽Verification聽Rule)錛屾瘡涓狢VR鍖呮嫭涓や釜瀛楄妭錛屽垎鍒槸CVM(Cardholder聽Verification聽Method錛岃〃紺鴻韓浠介獙璇佺殑鍙夋柟娉?聽Codes鍜孋VM聽Condition聽Codes(琛ㄧず榪涜韜喚楠岃瘉鐨勬潯浠?銆?br />聽7聽聽聽聽聽聽聽聽[OUT]聽TVR(Terminal聽Verification聽Result)
聽8聽聽聽聽聽聽聽聽[OUT]聽TSI(Transaction聽Status聽Information)
聽9澶勭悊錛?br />10聽聽聽聽聽聽聽聽緇堢鍒ゆ柇CVR鍒楄〃鐨勭涓涓狢VM聽Condition鏄惁婊¤凍錛屽鏋滄弧瓚沖垯閲囩敤瀵瑰簲鐨凜VM榪涜楠岃瘉銆傚鏋滈獙璇佹垚鍔熷垯CV榪囩▼緇撴潫錛屽惁鍒欓渶瑕佹鏌ヨCVM聽Code鐨勭7浣嶏紝浠ュ喅瀹氭槸鍚﹂渶瑕佽鍙栫浜屼釜CVR鍏冪礌緇х畫楠岃瘉銆?br />11聽聽聽聽聽聽聽聽濡傛灉絎竴涓狢VR鐨凜ondition涓嶆弧瓚籌紝鎴栬呰鏉′歡涓嶈緇堢鐞嗚В錛屽垯闇瑕佽鍙栦笅涓涓狢VR緇х畫楠岃瘉銆?br />12聽聽聽聽聽聽聽聽褰撳叾涓彧瑕佹湁涓涓狢VR楠岃瘉鎴愬姛錛屽垯CV鎴愬姛緇撴潫錛岃嫢鎵鏈夐獙璇侀兘澶辮觸鍒機V澶辮觸銆侰V緇撴灉鍦═VR鐩稿簲浣嶄腑浣滆緗?br />13聽聽聽聽聽聽聽聽鍑犱釜鍏稿瀷鐨凜VM鏂規硶鏈夛細Offline聽PIN,聽Online聽PIN,聽Signature,聽Combination聽CVMs.
14----------------------------------------------------------------*/


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬪洓 Processing Restrictionshttp://m.shnenglu.com/MichaelLiu/articles/9858.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Fri, 14 Jul 2006 09:02:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/9858.htmlhttp://m.shnenglu.com/MichaelLiu/comments/9858.htmlhttp://m.shnenglu.com/MichaelLiu/articles/9858.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/9858.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/9858.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬪洓 Processing Restrictions
Michael 2006騫?鏈?4鏃?/strong>

聽1 /* ----------------------------------------------------------------
聽2 鍚嶇О錛歅rocessingRestrictions
聽3 鍙傛暟錛?br /> 聽4 聽聽聽聽聽聽聽聽[IN]聽TERMINAL鍜孖CC涓婄殑AVN(Application聽Version聽Number)
聽5 聽聽聽聽聽聽聽聽[IN]聽AUC(Application聽Usage聽Control)
聽6 聽聽聽聽聽聽聽聽[IN]聽Issuer聽Country聽Code
聽7 聽聽聽聽聽聽聽聽[IN]聽Terminal聽Country聽Code
聽8 聽聽聽聽聽聽聽聽[IN]聽Application聽Effective聽Date
聽9 聽聽聽聽聽聽聽聽[IN]聽Application聽Expiration聽Date
10 聽聽聽聽聽聽聽聽[OUT]聽TVR
11 澶勭悊錛?br /> 12 聽聽聽聽聽聽聽聽鍖呮嫭錛?br /> 13 聽聽聽聽聽聽聽聽[搴旂敤鐗堟湰鍒ゆ柇]聽姣旇緝TERMINAL鍜孖CC鐨凙VN錛岃緗甌VR鐩稿簲浣嶃?br /> 14 聽聽聽聽聽聽聽聽[ICC鍦板煙鍒ゆ柇]聽鏍規嵁浜ゆ槗綾誨瀷錛屾瘮杈僆ssuer聽Country聽Code鍜孴erminal聽Country聽
15
16 Code錛屼緷鎹瘮杈冪粨鏋滃拰AUC鐨勭浉搴斾綅鍖歸厤涓庡惁錛岃緗甌VR鐩稿簲浣嶃?br /> 17 聽聽聽聽聽聽聽聽[鏈夋晥鏈熷垽鏂璢聽鍒ゆ柇褰撳墠浜ゆ槗鏃ユ湡鏄惁鍦ㄦ湁鏁堟湡鍐咃紝璁劇疆TVR鐩稿簲浣嶃?br /> 18
19 ---------------------------------------------------------------- */


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬩笁 Offline Data Authenticationhttp://m.shnenglu.com/MichaelLiu/articles/9856.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Fri, 14 Jul 2006 08:57:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/9856.htmlhttp://m.shnenglu.com/MichaelLiu/comments/9856.htmlhttp://m.shnenglu.com/MichaelLiu/articles/9856.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/9856.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/9856.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬩笁 Offline Data Authentication
Michael 2006騫?鏈?4鏃?br />
聽1
聽2/*----------------------------------------------------------------
聽3鍚嶇О錛歄fflineDataAuthentication(ODA)
聽4鍙傛暟錛?br />聽5聽聽聽聽聽聽聽聽[IN]聽AIP(Application聽Interchange聽Profile)
聽6聽聽聽聽聽聽聽聽[IN]聽AFL(Application聽File聽Locator)
聽7聽聽聽聽聽聽聽聽[IN]聽AFL涓寚瀹氱殑璁板綍鏁版嵁
聽8聽聽聽聽聽聽聽聽[IN]聽SDA聽Tag聽List(tag聽'9F4A')
聽9聽聽聽聽聽聽聽聽[OUT]聽TVR(Terminal聽Verification聽Results)
10聽聽聽聽聽聽聽[OUT]聽TSI(Transaction聽Status聽Information)
11澶勭悊錛?br />12聽聽聽聽聽聽聽聽緇堢浠嶢IP鏁版嵁鍒ゆ柇鎵ц鍝綾誨瀷鐨凮DA銆?br />13聽聽聽聽聽聽聽聽濡傛灉ICC鍜孴ERMINAL閮芥敮鎸丆DDA/ACG(Combined聽Dynamic聽Data聽Authentication/Application聽Cryptogram聽Generation)錛屽垯緇堢闇瑕佹墽琛孋DDA/ACG銆?br />14聽聽聽聽聽聽聽聽濡傛灉緇堢涓嶆墽琛孋DDA/ACG錛屾鏃訛紝鑻CC鍜孴ERMINAL閮芥敮鎸丱FFLINE聽DDA錛屽垯緇堢鎵цOFFLINE聽DDA銆?br />15聽聽聽聽聽聽聽聽濡傛灉緇堢涓嶆墽琛孫FFLINE聽DDA錛屾鏃訛紝鑻CC鍜孴ERMINAL閮藉彧鎸丱FFLINE聽SDA錛屽垯緇堢鎵цOFFLINE聽SDA銆?br />16聽聽聽聽聽聽聽聽濡傛灉浠ヤ笂涓夌ODA閮戒笉鎵ц鍒欒緗甌VR鐨勨淥DA鏈墽琛屸濇爣蹇椾負1銆?br />17
18----------------------------------------------------------------*/


]]>
EMV浜ゆ槗榪囩▼瑙f瀽涔嬩簩 Read Application Datahttp://m.shnenglu.com/MichaelLiu/articles/9545.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Fri, 07 Jul 2006 07:39:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/9545.htmlhttp://m.shnenglu.com/MichaelLiu/comments/9545.htmlhttp://m.shnenglu.com/MichaelLiu/articles/9545.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/9545.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/9545.html EMV浜ゆ槗榪囩▼瑙f瀽涔嬩簩 Read Application Data
Michael 2006騫?鏈?鏃?br />
榪欎釜榪囩▼鐢ㄦ潵閬嶅巻ICC涓殑鏂囦歡/璁板綍/TLV瀵硅薄錛屽茍淇濆瓨鍦ㄧ粓绔笂銆?br />


]]>EMV浜ゆ槗榪囩▼瑙f瀽涔嬩竴 Initiate Applicationhttp://m.shnenglu.com/MichaelLiu/articles/9540.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Fri, 07 Jul 2006 06:28:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/9540.htmlhttp://m.shnenglu.com/MichaelLiu/comments/9540.htmlhttp://m.shnenglu.com/MichaelLiu/articles/9540.html#Feedback6http://m.shnenglu.com/MichaelLiu/comments/commentRss/9540.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/9540.htmlEMV浜ゆ槗榪囩▼瑙f瀽涔嬩竴 Initiate Application
Michael 2006騫?鏈?鏃?br />
EMV鏍囧噯瀹氫箟浜嗗崄涓涓繃紼嬶紝榪欎簺榪囩▼涓昏閫氳繃浜ゆ槗鏁版嵁鐨勮璇併佹寔鍗′漢韜喚楠岃瘉浠ュ強椋庨櫓綆$悊絳夋潵瀹炵幇浜ゆ槗鐨勫畨鍏紝鎺ヤ笅鏉ユ垜浠皢瀵硅繖浜涜繃紼嬮愪竴榪涜鍓栨瀽錛屼粠鑰屾槑鐧斤紝涓轟粈涔圗MV浜ゆ槗鏄畨鍏ㄧ殑銆?br />鎴戝皢鎶婃瘡涓繃紼嬪柣浣滀竴涓嚱鏁幫紝閲囩敤鍑芥暟鐨勮娉曡繘琛岃В鏋愩?br />
鍒濆鍖栧簲鐢紙Initiate Application錛夋槸鎸佸崱浜鴻繘琛屽簲鐢ㄩ夋嫨鍚庣殑絎竴涓繃紼嬨?br />



]]>
浠涔堟槸AC(Application Cryptogram)http://m.shnenglu.com/MichaelLiu/articles/9507.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Thu, 06 Jul 2006 13:05:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/9507.htmlhttp://m.shnenglu.com/MichaelLiu/comments/9507.htmlhttp://m.shnenglu.com/MichaelLiu/articles/9507.html#Feedback2http://m.shnenglu.com/MichaelLiu/comments/commentRss/9507.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/9507.html 浠涔堟槸AC(Application Cryptogram)?
Michael 2006騫?鏈?鏃?br />
鎴戜滑浠庡墠闈簡瑙e埌錛岀洰鍓嶇粓绔拰ICC涔嬮棿鏈?3涓懡浠や氦浜掞紝鍏朵腑鏈変竴涓緢鍏抽敭鐨勫懡浠ゅ彨GENERATE AC錛岄偅涔堬紝浠涔堟槸AC錛屽畠鍙堟槸鐢ㄦ潵鍋氫粈涔堢殑錛?br />綆鍗曞湴璇達紝AC鏄竴涓?strong>ICC浜х敓鐨勪氦鏄撲唬鐮?/strong>錛孏ENERATE AC鏄竴涓?strong>ICC鍋氫氦鏄撳喅絳?/strong>鐨勮繃紼嬨備篃灝辨槸璇達紝緇堢鎵ц姣忔浜ゆ槗鏃訛紝閮借鍙戦佽鍛戒護緇橧CC榪涜浜ゆ槗鍐崇瓥錛堟瘮濡傛嫆緇濅氦鏄撹繕鏄姹傝仈鏈烘巿鏉冿級錛屾潵鍐沖畾璇ョ瑪浜ゆ槗鎺ュ彈涓庡惁浠ュ強濡備綍鎺ュ彈銆?br />緇堢鍦ㄥ彂閫丟ENERATE AC涔嬪墠錛岃嚜宸遍鍏堟湁涓?strong>緇堢琛屼負鍒嗘瀽鐨勮繃紼嬶紝鍒嗘瀽鐨勭粨鏋滄槸鍐沖畾闇瑕佸悜ICC鍙戦佷粈涔堟牱鐨凙C璇鋒眰錛氳仈鏈烘巿鏉冿紙ONLINE錛夈佽劚鏈烘嫆緇濓紙REJECT OFFLINE錛夎繕鏄劚鏈烘巿鏉?APPROVE OFFLINE)銆侷CC鍦ㄦ帴鏀跺懡浠ゅ茍澶勭悊鍚庤繑鍥炲叾鍐崇瓥緇撴灉鍗矨C鍊箋?br />閽堝緇堢鐨勪笉鍚岃姹傦紝鐩稿簲鍦幫紝AC鏈変互涓嬪嚑縐嶇被鍨嬶細
綾誨瀷聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽鎰忎箟
Application Authentication Cryptogram (AAC)聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽鎷掔粷浜ゆ槗
Application Authorisation Referral(AAR)聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽Referral requested by the card
Authorisation Request Cryptogram(ARQC)聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽瑕佹眰鑱旀満鎺堟潈
Transaction Certificate(TC)聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽鎺ュ彈浜ゆ槗

鍊煎緱娉ㄦ剰鐨勬槸錛岀粓绔彂閫丟ENERATE AC鍛戒護鐨勬暟鎹茍涓嶆槸TLV緙栫爜鐨勶紝鑰屾槸鐢變竴涓彨鍋欳DOL鐨勬暟鎹璞℃潵鍐沖畾鐨勩侰DOL錛屾寚Card Risk Management Data Object List錛屽畠鎸囧畾浜咷ENERATE AC鐨勫懡浠ゆ暟鎹渶瑕佸寘鎷摢浜涘璞°侷CC涓渶瑕佹湁涓や釜CDOL瀵硅薄錛孋DOL1(TAG-'8C')鍜孋DOL2(TAG-'8D')鍒嗗埆鐢ㄤ簬涓ゆ鍛戒護鐨勫彂閫侊紝鍦ㄤ竴嬈′氦鏄撲腑鏈澶氬彧鑳藉彂閫佷袱嬈ENERATE AC 鍛戒護錛岃秴榪?嬈″垯浼氭墽琛屽け璐ュ鑷翠氦鏄撶粓姝€?br />GENERATE AC鍛戒護鐨勬暟鎹彲鑳借繕浼氬寘鍚竴涓彨鍋歍C Hash Value鐨勬暟鎹紝榪欎釜鍊奸氳繃TDOL(Transaction Certificate Data Object List)緇忚繃HASH綆楁硶璁$畻寰楀埌銆傚鏋淚CC涓病鏈塗DOL錛岀粓绔彲鑳介渶瑕佷繚瀛樹竴涓粯璁ょ殑TDOL錛屼互璁$畻TC HASH VALUE.

鍓嶉潰鎻愬埌GENERATE AC鐨勫喅絳栫粨鏋滄槸AC錛堟湁鍥涚綾誨瀷錛夛紝閭d箞鎴戜滑鐪嬬湅鍏跺叿浣撶殑鏁版嵁緇撴瀯鏄浣曠殑銆?br />聽聽聽聽聽聽鍊悸犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犅犳槸鍚﹀繀欏昏繑鍥?/strong>
Cryptogram Information Data聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽鏄?br />Application Transaction Counter (ATC)聽聽聽聽聽聽聽鏄?br />Application Cryptogram (AC)聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽鏄?br />Issuer Application Data聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽鍙壜犅犅犅犅犅?br />鍏朵腑CID(Cryptogram Information Data)涓寚鏄庝簡鍐崇瓥緇撴灉灞炰簬鍝AC綾誨瀷銆?br />
GENERATE AC鏄崱琛屼負鍒嗘瀽鐨勯噸瑕佽繃紼嬶紝濡傛灉ICC榪斿洖TC錛屽垯浜ゆ槗鎴愬姛錛屽鏋滆繑鍥濧AC鍒欎氦鏄撳け璐ワ紝榪斿洖鍏朵粬鏃跺垯緇堢灝嗕細鍙戦佺浜屾GENERATE AC鍛戒護錛屼互鍐沖畾浜ゆ槗鎺堟潈緇撴灉銆?br />
[瀹宂



]]>
ICC鐨勬暟鎹紪鐮?/title><link>http://m.shnenglu.com/MichaelLiu/articles/9169.html</link><dc:creator>濂旇窇鐨勯樋鐢?/dc:creator><author>濂旇窇鐨勯樋鐢?/author><pubDate>Thu, 29 Jun 2006 10:06:00 GMT</pubDate><guid>http://m.shnenglu.com/MichaelLiu/articles/9169.html</guid><wfw:comment>http://m.shnenglu.com/MichaelLiu/comments/9169.html</wfw:comment><comments>http://m.shnenglu.com/MichaelLiu/articles/9169.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://m.shnenglu.com/MichaelLiu/comments/commentRss/9169.html</wfw:commentRss><trackback:ping>http://m.shnenglu.com/MichaelLiu/services/trackbacks/9169.html</trackback:ping><description><![CDATA[ <p> <font style="BACKGROUND-COLOR: #ffffff" size="2"> <font size="3">ICC鐨勬暟鎹紪鐮?br /></font>Michael 2006/6/29<br /><br />榪欓噷鎴戜滑璁ㄨICC鍜岃鍗″櫒緇堢涔嬮棿浜や簰鏁版嵁鐨勭紪鐮佹牸寮忋?br />BER-TLV(Basic Encoding Rule - Tag Length Value)緙栫爜錛岃繖涓槸ISO/IEC 8825瀹氫箟鐨勬爣鍑嗭紝鍦‥MV瑙勮寖涓紝TAG鍖呭惈1錛?涓瓧鑺傦紝LENGTH鍖呭惈1錛?涓瓧鑺傦紝VALUE涓烘暟鎹厓绱狅紙瀵逛簬鍘熷鏁版嵁瀵硅薄錛夋垨鑰呮ā鏉匡紙瀵逛簬緇勫悎鏁版嵁瀵硅薄錛夈?br />鍦ㄦ煇浜涙儏鍐典笅錛屼負浜嗙畝鍖朓CC鍐呴儴鐨勫鐞嗭紝ICC瑕佹眰緇堢鍙戦佺粰瀹冪殑鏁版嵁鎸夌収ICC瀹氫箟鐨勬牸寮忕紪鐮侊紝鑰岄潪TLV鏍煎紡銆傝繖縐嶆牸寮忚姹傜粓绔畝鍗曞湴鎶奍CC瀹氫箟浜嗙殑鏁版嵁鍏冪礌榪炴帴涓鍧楋紝緇勮鎴愪竴涓煙錛屽啀鍙戦佺粰ICC銆傞偅涔堝幓鍝噷寰楀埌ICC瀹氫箟鐨勭紪鐮佹牸寮忓憿錛烮CC涓畾涔変簡鏁版嵁瀵硅薄鍒楄〃錛圖OL,DATA OBJECT LIST錛夛紝緇堢閫氳繃鍙戦佺浉鍏沖懡浠ょ粰ICC錛屽嵆鍙幏寰桪OL瀹氫箟錛岄偅涔堢粓绔氨鐭ラ亾浜嗚鎶婂摢浜涙暟鎹厓绱犵粍瑁呰搗鏉ャ?br /><br /></font> </p> <img src ="http://m.shnenglu.com/MichaelLiu/aggbug/9169.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://m.shnenglu.com/MichaelLiu/" target="_blank">濂旇窇鐨勯樋鐢?/a> 2006-06-29 18:06 <a href="http://m.shnenglu.com/MichaelLiu/articles/9169.html#Feedback" target="_blank" style="text-decoration:none;">鍙戣〃璇勮</a></div>]]></description></item><item><title>ICC鐨勬暟鎹瓨鍌?/title><link>http://m.shnenglu.com/MichaelLiu/articles/9156.html</link><dc:creator>濂旇窇鐨勯樋鐢?/dc:creator><author>濂旇窇鐨勯樋鐢?/author><pubDate>Thu, 29 Jun 2006 08:49:00 GMT</pubDate><guid>http://m.shnenglu.com/MichaelLiu/articles/9156.html</guid><wfw:comment>http://m.shnenglu.com/MichaelLiu/comments/9156.html</wfw:comment><comments>http://m.shnenglu.com/MichaelLiu/articles/9156.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://m.shnenglu.com/MichaelLiu/comments/commentRss/9156.html</wfw:commentRss><trackback:ping>http://m.shnenglu.com/MichaelLiu/services/trackbacks/9156.html</trackback:ping><description><![CDATA[ <p> <font size="2"> <font size="3">ICC鐨勬暟鎹瓨鍌?br /></font>Michael 2006/06/29<br /><br />ICC鍗℃敮鎸佸搴旂敤錛屾瘡涓簲鐢ㄩ兘瀛樺偍鐫鐩稿叧鐨勪俊鎭紝榪欎簺淇℃伅鍍忔搷浣滅郴緇熺殑鏂囦歡緇撴瀯涓鏍峰瓨鍌ㄣ?br />鏈灝忕殑淇℃伅鍗曚綅鏄?strong>鏁版嵁鍏冪礌</strong>錛屽畠鍖呭惈鏁版嵁鍏冪礌鍚嶇О銆佸唴瀹規弿榪般佹牸寮忓拰緙栫爜錛屾瘮濡傦細<br /><strong>Name聽聽聽聽聽聽聽聽聽聽|聽聽聽聽聽聽聽聽聽聽Description聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽|聽聽聽Source聽聽|聽聽聽聽聽聽聽Format聽聽聽聽聽聽聽聽聽聽|Template |聽Tag聽聽聽|聽聽聽聽Length</strong><br />Application聽|聽Valid cardholder account number聽| ICC聽| cn var. up to 19 |聽聽'70' or '77' |聽'5A'聽|聽var. up to 10<br />Primary Account<br />Number (PAN)<br /><br /><strong>鏁版嵁瀵硅薄</strong>錛岀敱TAG銆丩ENGTH銆乂ALUE緇勬垚錛屾瘡涓暟鎹璞$敱涓涓搴旂敤鑼冨洿鍐呭敮涓鐨凾AG榪涜鏍囪瘑銆傚拰OS鐨勬枃浠跺す綾諱技錛屼竴涓暟鎹璞″彲浠呬粎鍖呭惈鏁版嵁鍏冪礌錛屾垨鑰呭瓙鏁版嵁瀵硅薄錛屽鏋滆鏁版嵁瀵硅薄鍊間負鏁版嵁鍏冪礌錛屽垯琚О浣溾?strong>鍘熷鏁版嵁瀵硅薄</strong>(Primitive Data Object)鈥濓紱濡傛灉璇ユ暟鎹璞″間負鍏朵粬錛堜竴涓垨澶氫釜錛夋暟鎹璞★紝鍒欏畠琚О浣溾?strong>緇勫悎鏁版嵁瀵硅薄</strong>(Constructed Data Object)鈥濓紝鐩稿簲鍦幫紝瀹冪殑鍊艱縐頒綔鈥?strong>妯℃澘</strong>(Template)鈥濄傝繖涓ょ被鏁版嵁瀵硅薄鐨凾AG鏄笉涓鏍風殑錛屾墍浠ワ紝浠嶵AG鍙互鐭ラ亾瀹冨睘浜庡摢涓縐嶇被鍨嬨備緥濡傦紝77099F1A0208409F350101錛屽畠鏄竴涓粍鍚堝璞★紝TAG='77'錛岀粍鍚堝璞$殑闀垮害涓?涓瓧鑺傦紝緇勫悎瀵硅薄鐨勫間負"9F1A0208409F350101"錛屽嵆瀹冨寘鍚袱涓師濮嬫暟鎹璞★紝鍒嗗埆鏄璞?9F1A"(LEN=02, VALUE=0840)鍜?9F35"(LEN=01, VALUE=01)銆?br /><br />涓婇潰鎴戜滑璁ㄨ浜嗕竴浜涢昏緫姒傚康錛岀幇鍦ㄨ鎴戜滑鍏蜂綋鐪嬬湅ICC涓涓婅堪姒傚康鏄浣曞瓨鍌ㄧ殑銆?br /><br />姣忎釜搴旂敤鍖呭惈涓涓垨澶氫釜<strong>鏂囦歡</strong>(Files)錛屽畠鏄疘CC涓俊鎭殑瀛樺偍鏍煎紡錛屾枃浠朵腑鍖呭惈澶ч噺鐨?strong>璁板綍</strong>(Records)錛岃褰曞氨鏄ā鏉匡紙鍗沖畠瀛樻斁浜嗕竴涓垨澶氫釜鏁版嵁瀵硅薄錛夈傚叧浜庝粬浠箣闂寸殑鍏崇郴錛屾垜浠彲浠ュ仛涓艦璞$殑姣斿柣錛?em>鏂囦歡</em>灝卞儚鏁版嵁搴撶郴緇熶腑鐨勬暟鎹簱錛?em>璁板綍</em>濡傚悓鏁版嵁搴撲腑鐨勮〃錛?em>鏁版嵁瀵硅薄</em>鍒欎技琛ㄤ腑鐨勬瘡鏉¤褰曘?br /><br />閭d箞濡備綍璁塊棶鏂囦歡鍛紵<br />鏂囦歡鏈変笁縐嶇被鍨嬶細AEF(Application Elementary File)銆丄DF(Application Definition File)銆丏DF(Directory Definition File)銆傚浜嶢DF鍜孌DF錛岄噰鐢ㄦ枃浠跺悕縐拌繘琛岃闂紝鏂囦歡涓嶅彲浠ラ噸鍚嶏紝瀹冨湪<strong>鍗?/strong>涓繀欏繪槸鐙竴鏃犱簩鐨勩傚浜嶢EF錛岄噰鐢ㄤ竴涓暣鏁版爣璇嗭紙鑼冨洿浠?錛?0錛夊嵆SFI(Short File Identifier)榪涜璁塊棶錛屽悓鏍峰湴錛岃鏍囪瘑涓嶅彲浠ラ噸澶嶏紝瀹冨湪<strong>鍚屼竴搴旂敤</strong>涓槸鐙竴鏃犱簩鐨勩?/font> </p> <p> <font size="2">鎴戜滑鍐嶆潵鐪嬬湅緇堢閫氳繃鍝簺鍛戒護鏉ュ拰ICC浜や簰銆?br />涓嶅悓鐨勫彂鍗¤瀵笽C鍗$殑瀹氫箟鏄笉涓鏍風殑錛屽湪EMV鏍囧噯涓紝瀹氫箟浜嗕互涓嬪懡浠ら泦錛岄櫎姝や箣澶栵紝鍙戝崱琛屽彲浠ュ畾涔夐拡瀵硅嚜韜殑鍛戒護闆嗐?br />緇堢鍙戠粰ICC鐨勫懡浠ら泦鍚堬紙鍏?3涓級錛?br />鍛戒護綾誨埆 聽 鎸囦護鐮?聽 鍚箟<br />鈥?x鈥?聽聽 聽聽 聽 鈥?E鈥?聽聽聽 APPLICATION BLOCK<br />鈥?x鈥?聽聽聽 聽聽聽 鈥?8鈥?聽聽聽 APPLICATION UNBLOCK<br />鈥?x鈥?聽聽 聽聽 聽 鈥?6鈥?聽聽聽 CARD BLOCK<br />鈥?x鈥?聽聽 聽聽 聽 鈥?2鈥?聽聽聽 EXTERNAL AUTHENTICATE銆愯姹侷CC鏍¢獙ISSUER AUTHENTICATION DATA銆?br />鈥?x鈥?聽聽 聽聽 聽 鈥楢E鈥?聽聽聽 GENERATE APPLICATION CRYPTOGRAM銆愯繑鍥濩ID(Cryptogram Information Data),聽ATC<br />聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽(Application聽聽Transaction Counter, AC(Application Cryptogram)鏁版嵁銆?br />鈥?x鈥?聽聽 聽聽 聽 鈥?4鈥櫬犅?聽 GET CHALLENGE銆愯幏鍙栭殢鏈烘暟銆?br />鈥?x鈥?聽 聽聽聽 聽 鈥楥A鈥?聽聽聽 GET DATA銆愰檺浜庤鍙朅TC(tag '9F36'), Last Online ATC Register(tag '9F13'), PIN Try<br />聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽Counter(tag '9F17')銆?br />鈥?x鈥?聽聽聽 聽 聽 鈥楢8鈥櫬犅?聽 GET PROCESSING OPTIONS銆愯繑鍥濧IP(Application Interchange Profile錛夊拰AFL<br />聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽(Application聽File Locator)銆?br />鈥?x鈥?聽聽 聽聽 聽 鈥?8鈥櫬犅?聽 INTERNAL AUTHENTICATE銆愯姹侷CC璁$畻騫惰繑鍥濻igned Dynamic Application Data銆?br />鈥?x鈥?聽 聽聽聽 聽 鈥?4鈥櫬犅?聽 PERSONAL IDENTIFICATION NUMBER (PIN)CHANGE/UNBLOCK銆愭縺媧籔IN錛?br />聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽閲嶈PIN RETRY Counter銆?br />鈥?x鈥?聽聽 聽聽 聽 鈥楤2鈥櫬犅?聽 READ RECORD銆愯鍙朢ECORD鏁版嵁錛屽Application Expiration Date, Application PAN,聽<br />聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽Card Risk聽Managemt Data Object List1, Card Risk Management Data Object List2, etc銆?br />鈥?x鈥?聽 聽聽聽 聽 鈥楢4鈥櫬犅?聽 SELECT<br />鈥?x鈥?聽聽 聽聽 聽 鈥?0鈥櫬犅?聽 VERIFY銆愯姹侷CC榪涜鑴辨満瀵嗙爜鏍¢獙錛圱ransaction PIN & Reference PIN錛夈?br />鈥?x鈥?聽 聽聽聽 聽 鈥楧x鈥櫬犅?聽 RFU for the payment systems<br />鈥?x鈥?聽 聽聽聽 聽 鈥楨x鈥櫬犅?聽 RFU for the payment systems<br />鈥?x鈥?聽 聽聽聽 聽 鈥榵x鈥櫬犅?聽 RFU for manufacturers for proprietary INS coding<br />鈥楨x鈥?聽聽 聽聽 聽 鈥榵x鈥櫬犅?聽 RFU for issuers for proprietary INS coding</font> </p> <p> <font size="2">緇堢鍙戠粰ICC鐨勫懡浠ょ敱4涓瓧鑺傜殑鍛戒護鍖呭ご鍜屽懡浠ょ爜浠ュ強鐩稿叧鍙傛暟緇勬垚銆侷CC榪斿洖緇欑粓绔殑鏁版嵁鏄垜浠湪鍓嶉潰鎻愬埌鐨?b>鏁版嵁瀵硅薄</b>鎴?b>妯℃澘錛?/b>鍐嶆坊鍔?涓瓧鑺傜殑鍛戒護鎵ц鐘舵併?/font> </p> <p> <font size="2">鍒拌繖閲岋紝鎴戜滑鐭ラ亾浜咺CC涓湁鍝簺鏁版嵁錛屼互鍙婂畠浠浣曞瓨鍌紝緇堢濡備綍璁塊棶瀹冧滑銆?br /></font> </p> <img src ="http://m.shnenglu.com/MichaelLiu/aggbug/9156.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://m.shnenglu.com/MichaelLiu/" target="_blank">濂旇窇鐨勯樋鐢?/a> 2006-06-29 16:49 <a href="http://m.shnenglu.com/MichaelLiu/articles/9156.html#Feedback" target="_blank" style="text-decoration:none;">鍙戣〃璇勮</a></div>]]></description></item><item><title>濡備綍瀹炵幇EMV鍗$殑鐢靛瓙鍟嗗姟緋葷粺http://m.shnenglu.com/MichaelLiu/articles/8235.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Wed, 07 Jun 2006 02:37:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/8235.htmlhttp://m.shnenglu.com/MichaelLiu/comments/8235.htmlhttp://m.shnenglu.com/MichaelLiu/articles/8235.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/8235.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/8235.html 濡備綍瀹炵幇EMV鍗$殑鐢靛瓙鍟嗗姟(E-Commerce)緋葷粺
Michael 2006/05/20

涓 緋葷粺鏋舵瀯
IC鍗?lt;-->CS(Cardholder System)<-->MS(Merchant Server)<-->PG(Payment Gateway)銆?br />Cardholder System鍜孧erchant Server涔嬮棿閲囩敤SET(Secure Electronic Transaction)message protocol銆?/font>

浜?鎸佸崱浜虹郴緇燂紙Cardholder System錛夌殑璁捐
鍦ㄧ數瀛愬晢鍔$郴緇熺殑鎸佸崱浜虹郴緇熶腑錛岄渶瑕佽冭檻浠ヤ笅鍥犵礌錛?/font>


1銆侰S闇瑕佸疄鐜扮殑IC鍗′氦浜掑姛鑳?br />鍖呮嫭錛欳ard Selection, Application Selection, Application Initiation, Read Application Data, Cardholder Verification, Terminal Action Analysis, Issuer Script Processing&Completion錛屼笉闇瑕佸疄鐜頒互涓嬪姛鑳斤細Offline Data Authentication, Processing Restrictions, Terminal Risk Management.

2銆侰S闇瑕佹敮鎸佺殑IC鍗″懡浠ら泦
鍖呮嫭錛歋ELECT, GET PROCESSING OPTIONS, READ RECORD, GET DATA, VERIFY, GENERATE AC, EXTERNAL AUTHENTICATE銆傚悓鏃訛紝CS闇瑕佽兘澶熻В閲奍C鍗¤繑鍥炵殑鏁版嵁銆?/font>

3銆侰S闇瑕佷繚瀛樺拰澶勭悊鐨勬暟鎹?br />鍦ㄤ氦鏄撹繃紼嬩腑錛孋S闇瑕佷繚瀛樻湁浠ヤ笅鏁版嵁鍏冪礌錛?br />1) Amount Other: Cashback amount, 鍦‥-Commerce緋葷粺涓間負絀恒?br />2) BrandID-AID Table:
3) ISO8859 Code Table: 甯姪瑙f瀽Application Preferred Name絳夋暟鎹?br />4) Terminal Type: E-Commerce緋葷粺鐨勭粓绔被鍨嬫槸鈥渦nattended, online, controlled by cardholder鈥?value=34).
5) Transaction Type: E-Commerce緋葷粺鎵ц鐨勪氦鏄撴槸"purchase of goods or service"(value=00).
6) Terminal Verification Results: CS鎵ц瀹屾瘡涓姛鑳戒繚瀛樼殑緇撴灉錛堝叡5 BYTES錛?0BITS錛夈?br />4銆係ET鍗忚鎵╁睍娑堟伅
SET娑堟伅鍖呬腑闇瑕佸寘鍚互涓嬩俊鎭互鎵цEMV浜ゆ槗銆?br />1) commonChip: the cryptogram and related data錛岀敱CS鐢熸垚錛屽瓨鏀懼湪PReq娑堟伅涓?br />2) acqCardExtensions: Issuer Authentication and Issuer Script data錛岀敱Payment Gateway鐢熸垚錛屽瓨鏀懼湪PRes娑堟伅鐨凙cqCardMsgData鍩熶腑銆?br />3) onlinePIN: PIN data entered by the cardholder錛岀敱CS鐢熸垚錛屽瓨鏀懼湪PReq娑堟伅涓?/font>

涓?Merchant Server鐨勮璁?br />鏃犵壒孌婇渶姹傘?/font>

鍥?PG(Payment Gateway)鐨勮璁?br />PG闇瑕佽兘澶熷鐞嗕笂榪板畾涔夌殑SET鍗忚鎵╁睍娑堟伅銆?/font>

浜?浜ゆ槗澶勭悊榪囩▼
瀹氫箟IC鍗?lt;-->CS(Cardholder System)<-->MS(Merchant Server)<-->PG(Payment Gateway)涔嬮棿鐨勪氦浜掓帴鍙c?br />1銆備氦鏄撴祦紼嬫昏
濡傚浘銆?br />2銆侰S鍜孖C鍗$殑鍔熻兘浜や簰鎺ュ彛
1) Card Selection: 鎸佸崱浜洪夋嫨鐩稿簲鐨勬敮浠樺崱鎵ц浜ゆ槗
榪囩▼錛?br />Merchant Server鏀寔鐨勬墍鏈夋敮浠樺崱闇瑕佽鏄劇ず錛?br />CS闇瑕佹彁渚涙墍鏈夊彲鏀粯鐨勬柟寮忥紱
CS闇鎻愮ず鎸佸崱浜哄湪浜ゆ槗鏈熼棿IC鍗′笉鑳介鍑猴紝闄ら潪鎻愮ず榪欎箞鍋?/font>

2) Application Selection: CS浠嶪C鍗′腑閫夋嫨鐩稿簲搴旂敤騫舵樉紺?br />榪囩▼錛?br />CS浠嶮S鍙戦佺殑SET Initiation Message涓幏鍙栧彲鐢ㄤ簬浜ゆ槗鏀粯鐨勬満鏋凚rand錛屽茍浣跨敤BrandID-AID琛ㄦ壘鍒板茍鍒涘緩鏀寔鐨勫簲鐢ㄦ爣璇?AIDs)銆傚鏋淎ID娌℃湁鎵懼埌錛屽垯瑕佹眰鎸佸崱浜哄皾璇曞彟涓寮犲崱鎴栬呮洿鏂癇randID-AID琛ㄣ?br />鍦↖C鍗$粰SELECT鍛戒護鐨勭瓟澶嶄腑鑻ュ寘鍚獳pplication Preferred Name錛屽垯璇ュ悕縐伴渶瑕佹樉紺虹粰鎸佸崱浜猴紝鑻ヤ笉鍖呭惈錛屽垯鏄劇ずApplication Label緇欐寔鍗′漢銆傚鏋滅瓟澶嶄腑榪樺寘鍚獻ssuer URL錛屽垯CS鍚屾椂榪橀渶瑕佹樉紺鴻Issuer鐨凩OGO緇欑敤鎴楓?/font>

3) Application Initiation: 鍒濆鍖栧簲鐢?/font>

4) Read Application Data: CS璇誨彇IC鍗″簲鐢ㄦ暟鎹?/font>

5) Cardholder Verification: CS浠庢寔鍗′漢澶勮幏鍙朠IN淇℃伅鍙戠粰IC鍗℃垨鑰匢SSUER鍋氳韓浠芥牎楠?br />褰揂IP絎竴瀛楄妭鐨勭浜斾綅涓?鏃訛紝闇瑕佸仛鎸佸崱浜鴻韓浠介獙璇併?/font>

6) Terminal Action Analysis: IC鍗¢拡瀵笴S鐨勪氦鏄撴巿鏉冭姹傚喅瀹欴ECLINE OFFLINE榪樻槸鍚屾剰ONLINE AUTHORISATION REQUEST
瑕佹眰錛氬湪緇橧C鍗$殑GENERATE AC鍛戒護涓彂閫佺殑鏁版嵁鍏冪礌闇瑕佹寜鐓т竴瀹氱殑鏍煎紡杞崲錛屼互鏂逛究IC鍗$悊瑙c?/font>

7) Issuer Script Processing and Completion: CS鏍規嵁鑴氭湰鎵ц鎿嶄綔騫舵彁紺虹敤鎴峰彇鍗?/font>

3銆侰S鍜孧S鐨勬秷鎭氦浜掓帴鍙?br />1) SET Initiation: MS閫氱煡CS騫跺憡鐭ユ敮浠樺崱鏂瑰紡絳変氦鏄撶粏鑺?br />MS闇瑕佸垱寤篠ET Payment Initiation娑堟伅騫跺彂閫佺粰CS錛孋S闇瑕佽兘澶熻В鏋愬鐞嗚娑堟伅銆?br />2) Purchase Initiation: CS鍒涘緩Purchase璇鋒眰騫墮獙璇丮S鍜孭G鐨勮韓浠斤紝鍚屾椂鍙戦佷氦鏄撲俊鎭粰MS
榪囩▼錛欳S鍒涘緩鍙戦丳InitReq娑堟伅錛堝寘鍚獿anguage, BrandID, BIN鏁版嵁錛夛紝MS鍒涘緩鍝嶅簲PInitRes娑堟伅
3) Purchase Request&Response
PReq鍖呭惈Language, BrandID, PAN, BIN, AID, Application Expiration Date絳夋暟鎹?/font>

4銆侻S鍜孭G鐨勬秷鎭氦浜掓帴鍙?br />1) Authorization Request(AuthReq) & Response(AuthRes)
2) Capture Request(CapReq) & Response(CapRes)



]]>
DDA 榪囩▼瑙f瀽http://m.shnenglu.com/MichaelLiu/articles/6609.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Wed, 03 May 2006 15:22:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/6609.htmlhttp://m.shnenglu.com/MichaelLiu/comments/6609.htmlhttp://m.shnenglu.com/MichaelLiu/articles/6609.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/6609.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/6609.htmlDDA(Dynamic data authentication) is performed by the terminal using a digital signature
scheme based on public key techniques to authenticate the ICC, and confirm the
legitimacy of critical ICC-resident/generated data and data received from the
terminal. This precludes the counterfeiting of any such card.

DDA鐨勬濊礬鏄妸姣忎釜CERTIFICATE浣滀負杈撳叆閫氳繃鎸囧畾鐨勭畻娉曡繘琛岃繕鍘?RECOVER)錛屽榪樺師
鍚庣殑緇撴灉鏁版嵁榪涜閫愰」鍦版牎楠岋紝鑻ユ湁浠諱綍涓欏逛笉婊¤凍鍒橠DA澶辮觸錛屽綋涓斾粎褰撴墍鏈夌殑欏圭洰閮介氳繃
鍚嶥DA鎵嶆垚鍔熴?br />
涓 ICC蹇呴』鍖呭惈鐨勬暟鎹?/strong>
a) Certification Authority Public Key Index
b) Issuer Public Key Certificate
c) ICC Public Key Certificate
d) Issuer Public Key Remainder
e) Issuer Public Key Exponent
f) 聽ICC Public Key Remainder
g) ICC Public Key Exponent
h) ICC Private Key : An ICC internal variable-length data element used to
generate the Signed Dynamic Application Data.
i)聽 Signed Dynamic Application Data: A variable-length data element generated by
the ICC using the private key that corresponds to the public key authenticated
in the ICC Public Key Certificate. It is a digital signature covering critical ICCresident/
generated and terminal data elements,

浜?Terminal搴斾繚瀛樻暟鎹細
a) Six CA public keys per RID(Registered Application Provider Identifier)
b) Key-related information for each CA public key
c) Corresponding algorithm

涓?DDA鐨勬墽琛岃繃紼嬫寜嬈″簭鍒嗕負鍥涗釜姝ラ錛屼換浣曚竴涓楠よ嫢鍑虹幇寮傚父鍒橠DA澶辮觸錛屽彧鏈夋墍鏈?br />姝ラ閮藉畬鎴愬悗DDA鎵嶆垚鍔燂細

a) Retrieval of the Certification Authority Public Key
The terminal reads the Certification Authority Public Key Index. Using this index
and the RID, the terminal can identify and retrieve the terminal-stored
Certification Authority Public Key Modulus and Exponent and the associated keyrelated
information, and the corresponding algorithm to be used. If the terminal
does not have the key stored associated with this index and RID, dynamic data
authentication has failed
.

b) Retrieval of the Issuer Public Key
1. If the Issuer Public Key Certificate has a length different from the length of the
Certification Authority Public Key Modulus obtained in the previous section,
dynamic data authentication has failed.
2. In order to obtain the recovered data specified in Table 9, apply the recovery
function specified in Annex A2.1 on the Issuer Public Key Certificate using the
Certification Authority Public Key in conjunction with the corresponding
algorithm. If the Recovered Data Trailer is not equal to 鈥楤C鈥? dynamic data
authentication has failed
.
3. Check the Recovered Data Header. If it is not 鈥?A鈥? dynamic data authentication
has failed
.
4. Check the Certificate Format. If it is not 鈥?2鈥? dynamic data authentication has
failed
.
5. Concatenate from left to right the second to the tenth data elements in Table 9
(that is, Certificate Format through Issuer Public Key or Leftmost Digits of the
Issuer Public Key), followed by the Issuer Public Key Remainder (if present) and
finally the Issuer Public Key Exponent.
6. Apply the indicated hash algorithm (derived from the Hash Algorithm Indicator)
to the result of the concatenation of the previous step to produce the hash result.
7. Compare the calculated hash result from the previous step with the recovered
Hash Result. If they are not the same, dynamic data authentication has failed.
8. Verify that the Issuer Identification Number matches the leftmost 3-8 PAN digits
(allowing for the possible padding of the Issuer Identification Number with
hexadecimal 鈥楩鈥檚). If not, dynamic data authentication has failed.
9. Verify that the last day of the month specified in the Certificate Expiration Date
is equal to or later than today's date. If the Certificate Expiration Date is earlier
than today's date, the certificate has expired, in which case dynamic data
authentication has failed.

10.Verify that the concatenation of RID, Certification Public Key Index, and
Certificate Serial Number is valid. If not, dynamic data authentication has
failed
.
11.If the Issuer Public Key Algorithm Indicator is not recognised, dynamic data
authentication has failed
.
12.If all the checks above are correct, concatenate the Leftmost Digits of the Issuer
Public Key and the Issuer Public Key Remainder (if present) to obtain the Issuer
Public Key Modulus, and continue with the next steps for the retrieval of the ICC
Public Key.

c) Retrieval of the ICC Public Key
1. If the ICC Public Key Certificate has a length different from the length of the
Issuer Public Key Modulus obtained in the previous section, dynamic data
authentication has failed
.
2. In order to obtain the recovered data specified in Table 10, apply the recovery
function specified in Annex A2.1 on the ICC Public Key Certificate using the
Issuer Public Key in conjunction with the corresponding algorithm. If the
Recovered Data Trailer is not equal to 鈥楤C鈥? dynamic data authentication has
failed
.
3. Check the Recovered Data Header. If it is not 鈥?A鈥? dynamic data authentication
has failed.

4. Check the Certificate Format. If it is not 鈥?4鈥? dynamic data authentication has
failed
.
5. Concatenate from left to right the second to the tenth data elements in Table 10
(that is, Certificate Format through ICC Public Key or Leftmost Digits of the ICC
Public Key), followed by the ICC Public Key Remainder (if present), the ICC
Public Key Exponent and finally the static data to be authenticated specified in
Part II of Book 3 of these specifications. If the Static Data Authentication Tag
List is present and contains tags other than 鈥?2鈥? then dynamic data
authentication has failed
.
6. Apply the indicated hash algorithm (derived from the Hash Algorithm Indicator)
to the result of the concatenation of the previous step to produce the hash result.
7. Compare the calculated hash result from the previous step with the recovered
Hash Result. If they are not the same, dynamic data authentication has failed.
8. Check if the recovered PAN is equal to the Application PAN, read from the ICC.
If not, dynamic data authentication has failed.
9. Verify that the last day of the month specified in the Certificate Expiration Date
is equal to or later than today's date. If not, dynamic data authentication has
failed
.
10.If the ICC Public Key Algorithm Indicator is not recognised, dynamic data
authentication has failed
.
11.If all the checks above are correct, concatenate the Leftmost Digits of the ICC
Public Key and the ICC Public Key Remainder (if present) to obtain the ICC
Public Key Modulus, and continue with the actual dynamic data authentication
described in the two sections below.
d) Dynamic Data Authentication
鍒嗕負STANDARD鍜孋OMBINED涓ょ鏂瑰紡銆?br />d.1 Standard Dynamic Data Authentication
d.1.1. Dynamic Signature Generation

Terminal鍚慖CC鍙戦佷竴涓狪NTERNAL AUTHENTICATE鍛戒護騫墮檮甯DOL涓畾涔夌殑鏁版嵁錛?br />縐頒負Terminal Dynamic Data錛夈?br />ICC瀵筎erminal Dynamic Data閲嶆柊緇勫悎鍙婃牸寮忓寲澶勭悊鍚庣敓鎴?em>Dynamic Application Data銆?br />ICC瀵笵ynamic Application Data鐢ㄨ嚜宸辯殑縐侀挜鍜岀浉搴旂畻娉曡繘琛岀鍚嶏紝鏈緇堢敓鎴?br />Signed Dynamic Application Data.

d.1.2. Dynamic Signature Verification
鎺ヤ笅鏉ョ殑榪囩▼鍜孲DA綾諱技銆?br />1. If the Signed Dynamic Application Data has a length different from the length of
the ICC Public Key Modulus, dynamic data authentication has failed.
2. To obtain the recovered data specified in Table 13, apply the recovery function
specified in Annex A2.1 on the Signed Dynamic Application Data using the ICC
Public Key in conjunction with the corresponding algorithm. If the Recovered
Data Trailer is not equal to 鈥楤C鈥? dynamic data authentication has failed.
3. Check the Recovered Data Header. If it is not 鈥?A鈥? dynamic data authentication
has failed.

4. Check the Signed Data Format. If it is not 鈥?5鈥? dynamic data authentication has
failed
.
5. Concatenate from left to right the second to the sixth data elements in Table 13
(that is, Signed Data Format through Pad Pattern), followed by the data
elements specified by the DDOL.
6. Apply the indicated hash algorithm (derived from the Hash Algorithm Indicator)
to the result of the concatenation of the previous step to produce the hash result.
7. Compare the calculated hash result from the previous step with the recovered
Hash Result. If they are not the same, dynamic data authentication has failed.

If all the above steps were executed successfully, dynamic data authentication was
successful
. The ICC Dynamic Number contained in the ICC Dynamic Data
recovered in Table 13 shall be stored in Tag 鈥?F4C鈥?
d.2 Combined Dynamic Data Authentication/Application Cryptogram Generation
鍜宒.1涓鏍烽渶瑕丼ignature creation鍜寁erification涓ゆ錛屼笉鍚岀殑鏄湪creation涓紝d.2闇瑕?br />Cryptogram Information聽Data object鍙備笌緇勬垚 ICC Dynamic Data錛岃繘鑰屾牸寮忓寲鎴愮浉搴?br />鐨凞ynamic Application Data錛岀劧鍚庣敤鍏剁閽ュ拰綆楁硶榪涜絳懼悕錛屽艦鎴怱igned Dynamic
Application Data.
Verification榪囩▼鍚宒.1綾諱技銆?br />


]]>SDA 榪囩▼瑙f瀽http://m.shnenglu.com/MichaelLiu/articles/6594.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Wed, 03 May 2006 09:15:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/6594.htmlhttp://m.shnenglu.com/MichaelLiu/comments/6594.htmlhttp://m.shnenglu.com/MichaelLiu/articles/6594.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/6594.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/6594.html SDA(Static data authentication) is performed by the terminal using a digital signature
scheme based on public key techniques to confirm the legitimacy of critical ICCresident
static data identified by the AFL and by the optional Static Data Authentication Tag List.
This detects unauthorised alteration of data after personalisation.

涓 ICC搴斾繚瀛樻暟鎹細
a) CA Public Key Index
b)Issuer Public Key Certificate
c) Signed Static Application Data

浜?Terminal搴斾繚瀛樻暟鎹細
a) Six CA public keys per RID(Registered Application Provider Identifier)
b) Key-related information for each CA public key
c) Corresponding algorithm

涓?SDA榪囩▼鎸夋搴忓垎涓変釜姝ラ錛屽叾涓換涓姝ラ鑻ュ嚭鐜板紓甯稿垯SDA澶辮觸錛屽彧鏈変笁涓楠ら『鍒╁畬鎴?br />鍚嶴DA鎵嶆垚鍔燂細

a) Retrieval of the Certification Authority Public Key
The terminal reads the Certification Authority Public Key Index. Using this index
and the RID, the terminal shall identify and retrieve the terminal-stored
Certification Authority Public Key Modulus and Exponent and the associated keyrelated
information, and the corresponding algorithm to be used. If the terminal does not have the
key stored associated with this index and RID, static data authentication has failed.

b) Retrieval of the Issuer Public Key
1. If the Issuer Public Key Certificate has a length different from the length of the
Certification Authority Public Key Modulus obtained in the previous section,
static data authentication has failed.
2. In order to obtain the recovered data specified in Table 4, apply the recovery
function specified in Annex A2.1 to the Issuer Public Key Certificate using the
Certification Authority Public Key in conjunction with the corresponding
algorithm. If the Recovered Data Trailer is not equal to 鈥楤C鈥? static data
authentication has failed.
3. Check the Recovered Data Header. If it is not 鈥?A鈥? static data authentication has
failed.
4. Check the Certificate Format. If it is not 鈥?2鈥? static data authentication has
failed.
5. Concatenate from left to right the second to the tenth data elements in Table 4
(that is, Certificate Format through Issuer Public Key or Leftmost Digits of the
Issuer Public Key), followed by the Issuer Public Key Remainder (if present) and
finally the Issuer Public Key Exponent.
6. Apply the indicated hash algorithm (derived from the Hash Algorithm Indicator)
to the result of the concatenation of the previous step to produce the hash result.
7. Compare the calculated hash result from the previous step with the recovered
Hash Result. If they are not the same, static data authentication has failed.
8. Verify that the Issuer Identification Number matches the leftmost 3-8 PAN digits
(allowing for the possible padding of the Issuer Identification Number with
hexadecimal 鈥楩鈥檚). If not, static data authentication has failed.
9. Verify that the last day of the month specified in the Certificate Expiration Date
is equal to or later than today's date. If the Certificate Expiration Date is earlier
than today's date, the certificate has expired, in which case static data
authentication has failed.
10. Verify that the concatenation of RID, Certification Authority Public Key Index,
and Certificate Serial Number is valid. If not, static data authentication has
failed4.
11. If the Issuer Public Key Algorithm Indicator is not recognised, static data
authentication has failed.
12. If all the checks above are correct, concatenate the Leftmost Digits of the Issuer
Public Key and the Issuer Public Key Remainder (if present) to obtain the Issuer
Public Key Modulus, and continue with the next steps for the verification of the
Signed Static Application Data.

c) Verification of the Signed Static Application Data
1. If the Signed Static Application Data has a length different from the length of the
Issuer Public Key Modulus, static data authentication has failed.
2. In order to obtain the Recovered Data specified in Table 5, apply the recovery
function specified in Annex A2.1 on the Signed Static Application Data using the
Issuer Public Key in conjunction with the corresponding algorithm. If the
Recovered Data Trailer is not equal to 鈥楤C鈥? static data authentication has failed.
3. Check the Recovered Data Header. If it is not 鈥?A鈥? static data authentication has
failed.
4. Check the Signed Data Format. If it is not 鈥?3鈥? static data authentication has
failed.
5. Concatenate from left to right the second to the fifth data elements in Table 5
(that is, Signed Data Format through Pad Pattern), followed by the static data to
be authenticated as specified in Part II of Book 3 of these specifications. If the
Static Data Authentication Tag List is present and contains tags other than 鈥?2鈥?
then static data authentication has failed.
6. Apply the indicated hash algorithm (derived from the Hash Algorithm Indicator)
to the result of the concatenation of the previous step to produce the hash result.
7. Compare the calculated hash result from the previous step with the recovered
Hash Result. If they are not the same, static data authentication has failed.
If all of the above steps were executed successfully, static data authentication was
successful. The Data Authentication Code recovered in Table 5 shall be stored in
Tag 鈥?F45鈥?

鍙傝冿細<<EMV2000 Integrated Circuit Card Specification for Payment Systems Book 2
聽- Security and Key Management>>


]]>Digital Signaturehttp://m.shnenglu.com/MichaelLiu/articles/6592.html濂旇窇鐨勯樋鐢?/dc:creator>濂旇窇鐨勯樋鐢?/author>Wed, 03 May 2006 06:32:00 GMThttp://m.shnenglu.com/MichaelLiu/articles/6592.htmlhttp://m.shnenglu.com/MichaelLiu/comments/6592.htmlhttp://m.shnenglu.com/MichaelLiu/articles/6592.html#Feedback0http://m.shnenglu.com/MichaelLiu/comments/commentRss/6592.htmlhttp://m.shnenglu.com/MichaelLiu/services/trackbacks/6592.html 鏁板瓧絳懼悕鐨勫師鐞?/b>

1 琚彂閫佹枃浠墮噰鐢ㄥ搱甯岀畻娉曞鍘?濮嬫姤鏂囪繘琛岃繍綆楋紝寰楀埌涓涓浐瀹氶暱搴︾殑鏁板瓧涓詫紝縐頒負鎶ユ枃鎽樿 (Message Digest)錛屼笉鍚岀殑鎶ユ枃鎵寰楀埌鐨勬姤鏂囨憳瑕佸悇寮傦紝浣嗗鐩?鍚岀殑鎶ユ枃瀹冪殑鎶ユ枃鎽樿鍗存槸鍞竴鐨勩?br />2 鍙戦佹柟鐢熸垚鎶ユ枃鐨勬姤鏂囨憳瑕侊紝鐢ㄨ嚜宸辯殑縐侀挜瀵規憳 瑕佽繘琛屽姞瀵嗘潵褰㈡垚鍙戦佹柟鐨勬暟瀛楃鍚嶃?br />3 榪欎釜鏁板瓧絳懼悕灝嗕綔涓烘姤鏂囩殑闄勪歡鍜屾姤鏂囦竴璧峰彂閫佺粰鎺ユ敹鏂廣?br />4 鎺ユ敹鏂歸鍏堜粠鎺ユ敹鍒扮殑鍘熷鎶ユ枃涓敤鍚屾牱鐨勭畻娉曡綆楀嚭鏂扮殑鎶ユ枃鎽樿錛?鍐嶇敤鍙戦佹柟鐨勫叕閽ュ鎶ユ枃闄勪歡鐨勬暟瀛楃鍚嶈繘琛岃В瀵嗭紝姣旇緝涓や釜鎶ユ枃 鎽樿錛屽鏋滃肩浉鍚岋紝鎺ユ敹鏂瑰氨鑳界‘璁よ鏁板瓧絳懼悕鏄彂閫佹柟鐨勩?br />



]]>
青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
      <noscript id="pjuwb"></noscript>
            <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
              <dd id="pjuwb"></dd>
              <abbr id="pjuwb"></abbr>
              91久久在线播放| 亚洲日本一区二区| 欧美gay视频| 欧美美女视频| 欧美福利视频一区| 狠狠色丁香久久综合频道| 中文精品99久久国产香蕉| 亚洲欧美中文另类| 欧美另类女人| 久久综合五月| 亚洲欧洲另类国产综合| 亚洲国产成人久久综合| 久久久久久久久久久成人| 亚洲专区一二三| 亚洲欧洲三级| 久久精品日韩欧美| 欧美激情女人20p| 国产一区二区三区四区三区四| 老司机aⅴ在线精品导航| 亚洲欧洲午夜| 亚洲影视综合| 在线一区亚洲| 亚洲精品久久久蜜桃| 国产精品久久77777| 蜜臀久久99精品久久久久久9 | 亚洲精品视频免费| 99国产精品视频免费观看一公开| 国产麻豆午夜三级精品| 午夜精品福利电影| 欧美大片免费久久精品三p | 国产精品乱码久久久久久| 欧美福利一区二区| 欧美国产第二页| 亚洲欧美精品在线| 亚洲男人的天堂在线观看| 亚洲国产成人精品久久久国产成人一区| 一区二区三区久久精品| 久久九九99| 欧美日韩精品系列| 国产精品videossex久久发布| 欧美日韩精品综合| 一区二区欧美亚洲| 欧美激情偷拍| 免费在线国产精品| 久久本道综合色狠狠五月| 久久久99久久精品女同性| 久久久蜜桃精品| 欧美日韩国产123| 好吊日精品视频| 精品成人久久| 亚洲经典一区| 亚洲欧美制服另类日韩| 久久av资源网| 一区二区日韩伦理片| 亚洲欧美国产视频| 欧美日本在线播放| 精品成人乱色一区二区| 午夜精品影院在线观看| 久久裸体艺术| 亚洲黄色免费网站| 亚洲一本大道在线| 国产欧美日韩亚洲| 亚洲嫩草精品久久| 最新日韩中文字幕| 欧美三级午夜理伦三级中文幕 | 亚洲精品一区二区三区四区高清| 蘑菇福利视频一区播放| 女人天堂亚洲aⅴ在线观看| 在线精品国产欧美| 久久综合伊人77777| 亚洲一区二区黄色| 欧美日韩国产二区| 亚洲欧美日韩高清| 国产伦一区二区三区色一情| 亚洲精品免费看| 日韩午夜电影av| 中文一区字幕| 一区二区av| 亚洲国产精品一区二区久| 999在线观看精品免费不卡网站| 免费成人在线观看视频| 一区二区成人精品| 欧美大色视频| 久久gogo国模啪啪人体图| 欧美视频在线观看免费| 亚洲国产日韩欧美在线图片| 亚洲欧美日韩久久精品| 久久久中精品2020中文| 亚洲精品1234| 亚洲精选中文字幕| 亚洲国产天堂久久综合网| 美国十次了思思久久精品导航| 久久久久一本一区二区青青蜜月| 亚洲精品免费在线播放| 亚洲精品乱码视频| 嫩草影视亚洲| 麻豆九一精品爱看视频在线观看免费| 久久久久国产精品一区| 一区二区三区免费网站| 欧美色道久久88综合亚洲精品| 鲁鲁狠狠狠7777一区二区| 国产乱码精品| 欧美激情一区二区三区全黄| 国产精品久久久久久五月尺| 一区二区日本视频| 午夜国产精品视频免费体验区| 欧美精品情趣视频| 91久久精品国产91久久性色tv | 日韩亚洲精品视频| 亚洲国产日韩在线一区模特| 欧美韩日一区二区| 欧美三级欧美一级| 久久综合色播五月| 国产精品激情| 亚洲电影免费观看高清完整版在线| 欧美理论电影在线播放| 久久久久免费视频| 欧美视频国产精品| 牛人盗摄一区二区三区视频| 国产精品美女| 亚洲精品在线二区| **欧美日韩vr在线| 亚洲欧美三级伦理| 亚洲一区二区三区在线看| 欧美a级片网站| 噜噜噜久久亚洲精品国产品小说| 国产精品视频yy9299一区| 国产日韩精品一区| 国产欧美91| 六月丁香综合| 欧美激情中文不卡| 欧美成人亚洲成人日韩成人| 国产久一道中文一区| 洋洋av久久久久久久一区| 亚洲国产午夜| 欧美成人精品一区| 欧美顶级大胆免费视频| 激情欧美日韩| 久久一区精品| 欧美大色视频| 亚洲精品国产精品国自产观看| 久久一区中文字幕| 免费观看在线综合色| 国产在线精品成人一区二区三区 | 久久久久久久久久久久久女国产乱 | 欧美日韩在线亚洲一区蜜芽| 亚洲日本乱码在线观看| 夜夜嗨av一区二区三区| 欧美日韩免费一区二区三区视频 | 午夜一级在线看亚洲| 国产精品久久久久久妇女6080| av成人手机在线| 午夜日韩福利| 激情五月婷婷综合| 欧美xart系列在线观看| 亚洲精品久久久蜜桃| 亚洲欧美国产77777| 亚洲国产欧美一区二区三区同亚洲 | 一区二区三区久久精品| 香蕉成人久久| 国产欧美日韩另类一区| 久久精品国产成人| 欧美激情中文不卡| 亚洲午夜小视频| 国产精品日本| 久久色在线播放| 日韩亚洲一区在线播放| 久久激情中文| 日韩午夜三级在线| 国产精品自拍小视频| 久久久蜜桃一区二区人| 亚洲精品乱码久久久久久蜜桃麻豆| 夜色激情一区二区| 国内在线观看一区二区三区 | 欧美日韩国产精品| 欧美亚洲免费高清在线观看| 亚洲国产精品毛片| 欧美一区深夜视频| 亚洲精品色婷婷福利天堂| 国产精品青草久久| 欧美大片在线看免费观看| 亚洲一区二区三区精品在线观看| 久久一区二区三区超碰国产精品 | 欧美1区2区| 亚洲在线一区| 亚洲高清视频的网址| 国产精品黄视频| 欧美交受高潮1| 欧美一区二区三区视频| 99国产精品私拍| 亚洲成人在线视频播放| 在线观看精品视频| 欧美午夜一区二区| 牛牛影视久久网| 性欧美长视频| 亚洲网在线观看| 一本不卡影院| 亚洲国产日韩欧美综合久久| 久久久久久久久蜜桃| 欧美一进一出视频|