( 409 KB )
You do not have the required access level. To download this file, see below for more information.
This note describes a method of data signature management which allows keeping track of the Calypso SAMs generating these signatures. It presents algorithms and examples for terminals needing to generate or to verify such signatures.
In a system based on the usage of contactless cards, it may be necessary to ensure the identity of the entity which issued the card data (e.g. bus tickets) and wrote them in the card, and which may have received some
payment in return.
This note relates to different kinds of data that may need issuer authentication:
- Information about the card issuing, stored as a data structure called environment.
- The rights entitled to the card holder are stored as data structures called contracts. Independent data structures called counters, dedicated to counting arbitrary units, may be linked to each
- The transaction history is stored as data structures called events.
Benefits & Services:
Public documents : There is no constraint on the document diffusion. Reproduction is authorised and diffusion by e-mail is possible. It is not necessary to login to download public documentation.
Restricted documents : Diffusion is restricted to the designated persons. The information contained in these documents is not public and must be kept confidential. The original recipient is fully responsible for its re-transmission, which may only concern people involved in the project, on a need-to-know basis. You must login to download restricted classified documents (e.g. Card Specifications). Access can be requested by completing the application form for registration.
Confidential documents : Diffusion of the document is strictly restricted to the individually authorised persons. The original recipient is fully responsible for its re-transmission, which may only concern people involved in the project, on a need-to-know basis. These persons must not reproduce or transmit the document again without prior authorisation from the original recipient. It must be stored in a secure place, or encrypted (for electronic documents whose access is not secure). It can only be exchanged in a sealed envelope, or in encrypted form (if electronic version). Therefore, it is stored encrypted on the Calypso File Repository. Access can be requested by completing the application form for registration and completing the subsequent NDA.