29.06.2013 Views

Table of Contents - APTAStandards.com

Table of Contents - APTAStandards.com

Table of Contents - APTAStandards.com

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SMART CARD STANDARDS<br />

AND SPECIFICATIONS<br />

RESEARCH<br />

American Public Transportation<br />

Association (APTA)<br />

Version 1.2<br />

San Francisco<br />

March 2005<br />

This report is confidential and intended solely for the use and<br />

information <strong>of</strong> the <strong>com</strong>pany to whom it is addressed.


<strong>Table</strong> <strong>of</strong> <strong>Contents</strong><br />

1.0 INTRODUCTION....................................................................................................... 4<br />

1.1 OBJECTIVES ............................................................................................................... 4<br />

1.1.1 APTA Objective...................................................................................................... 4<br />

1.1.2 Objectives <strong>of</strong> the Analysis....................................................................................... 6<br />

1.2 APTA EFFORTS TO DATE ...................................................................................... 8<br />

2.0 METHODOLOGY ..................................................................................................... 8<br />

3.0 PROJECT SCREENING CRITERIA ...................................................................... 9<br />

4.0 ANALYSIS OF STANDARDS AND SPECIFICATIONS.................................... 12<br />

4.1 ISO/IEC 8583............................................................................................................ 13<br />

4.1.1 Description <strong>of</strong> the Standard.................................................................................. 13<br />

4.1.2 Applicability to UTFS Effort ................................................................................ 14<br />

4.1.3 Common Message Structure ................................................................................ 14<br />

4.1.4 Message Types ...................................................................................................... 16<br />

4.1.5 Data Elements....................................................................................................... 18<br />

4.1.6 Message Sequences ............................................................................................... 19<br />

4.1.7 Security Requirements.......................................................................................... 20<br />

4.1.8 Timing & Routing ................................................................................................ 20<br />

4.1.9 Usability................................................................................................................ 22<br />

4.2 INTEGRATED TRANSPORT SMARTCARD ORGANIZATION (ITSO)........ 23<br />

4.2.1 Description <strong>of</strong> the Specification ............................................................................ 23<br />

4.2.2 Applicability to UTFS Effort ................................................................................ 24<br />

4.2.3 Common Message Structure ............................................................................... 24<br />

4.2.4 Message Types ...................................................................................................... 25<br />

4.2.5 Data Elements....................................................................................................... 29<br />

4.2.6 Message Sequences ............................................................................................... 30<br />

4.2.7 Security Requirements.......................................................................................... 30<br />

4.2.8 Timing & Routing ................................................................................................ 30<br />

4.2.9 Usability................................................................................................................ 30<br />

4.3 OPEN FINANCIAL EXCHANGE (OFX) ............................................................. 31<br />

4.3.1 Description <strong>of</strong> the Specification ............................................................................ 31<br />

4.3.2 Applicability to UTFS Effort ................................................................................ 32<br />

4.3.3 Common Message Structure ................................................................................ 33<br />

4.3.4 Message Types ..................................................................................................... 34<br />

4.3.5 Data Elements....................................................................................................... 36<br />

4.3.6 Message Sequences ............................................................................................... 38<br />

4.3.7 Security Requirements.......................................................................................... 38<br />

4.3.8 Timing & Routing ................................................................................................ 39<br />

4.3.9 Usability................................................................................................................ 39<br />

4.4 VENDING EQUIPMENT INTERFACE (VEI) ..................................................... 40<br />

4.4.1 Description <strong>of</strong> the Specification ............................................................................ 40<br />

4.4.2 Applicability to UTFS Effort ................................................................................ 40<br />

4.4.3 Common Message Structure ................................................................................ 41<br />

4.4.4 Message Types ...................................................................................................... 42<br />

4.4.5 Data Elements....................................................................................................... 44<br />

4.4.6 Message Sequences ............................................................................................... 44


4.4.7 Security Requirements.......................................................................................... 45<br />

4.4.8 Timing & Routing ................................................................................................ 45<br />

4.4.9 Usability................................................................................................................ 45<br />

4.5 CEN TC278 – INTEROPERABLE PUBLIC TRANSPORT FARE<br />

MANAGEMENT SYSTEM ARCHITECTURE (IFMSA) .................................... 46<br />

4.5.1 Description <strong>of</strong> the Standard.................................................................................. 46<br />

4.5.2 Applicability to UTFS Effort ................................................................................ 46<br />

4.5.3 Common Message Structure ................................................................................ 47<br />

4.5.4 Message Types ...................................................................................................... 47<br />

4.5.5 Data Elements....................................................................................................... 48<br />

4.5.6 Message Sequences ............................................................................................... 48<br />

4.5.7 Security Requirements.......................................................................................... 48<br />

4.5.8 Timing & Routing ................................................................................................ 48<br />

4.5.9 Usability................................................................................................................ 48<br />

4.6 CUBIC TRANSPORTATION SYSTEM (CTS) CID EDGE INTERFACES ....... 48<br />

4.6.1 Description <strong>of</strong> the Specification ............................................................................ 48<br />

4.6.2 Applicability to UTFS Effort ................................................................................ 48<br />

4.6.3 Common Message Structure ............................................................................... 48<br />

4.6.4 Message Types ...................................................................................................... 49<br />

4.6.5 Data Elements....................................................................................................... 50<br />

4.6.6 Message Sequences ............................................................................................... 50<br />

4.6.7 Security Requirements.......................................................................................... 50<br />

4.6.8 Timing and Routing ............................................................................................. 51<br />

4.6.9 Usability................................................................................................................ 51<br />

4.7 TRANSLINK ® ........................................................................................................... 51<br />

4.7.1 Description <strong>of</strong> the Specification ............................................................................ 51<br />

4.7.2 Applicability to UTFS Effort ................................................................................ 52<br />

4.7.3 Common Message Structure ................................................................................ 52<br />

4.7.4 Message Types ...................................................................................................... 52<br />

4.7.5 Data Elements....................................................................................................... 56<br />

4.7.6 Message Sequences ............................................................................................... 56<br />

4.7.7 Security Requirements.......................................................................................... 56<br />

4.7.8 Timing and Routing ............................................................................................. 57<br />

4.7.9 Usability................................................................................................................ 58<br />

4.8 ERG APTA SPECIFICATIONS .............................................................................. 58<br />

4.8.1 Description <strong>of</strong> the Specification ............................................................................ 58<br />

4.8.2 Applicability to UTFS Effort ................................................................................ 58<br />

4.8.3 Common Message Structure ................................................................................ 59<br />

4.8.3.1 APTA System Header............................................................................................ 59<br />

4.8.3.2 APTA System Common Header ............................................................................ 60<br />

4.8.3.3 Variant Data .......................................................................................................... 61<br />

4.8.4 Message Types ...................................................................................................... 61<br />

4.8.5 Data Elements....................................................................................................... 65<br />

4.8.6 Message Sequences ............................................................................................... 65<br />

4.8.7 Security Requirements.......................................................................................... 65<br />

4.8.8 Timing and Routing ............................................................................................. 65<br />

4.8.9 Usability................................................................................................................ 65


4.9 REGIONAL INTEROPERABILITY STANDARD (RIS) PART 4....................... 66<br />

4.9.1 Description <strong>of</strong> the Standard.................................................................................. 66<br />

4.9.2 Applicability to UTFS Effort ................................................................................ 66<br />

4.9.3 Common Message Structure ................................................................................ 67<br />

4.9.3.1 PART 1 ............................................................................................................. 67<br />

4.9.3.2 PART 2 ............................................................................................................. 67<br />

4.9.3.3 PART 3 ............................................................................................................. 67<br />

4.9.3.4 PART 4 ............................................................................................................. 68<br />

4.9.4 Message Types ...................................................................................................... 68<br />

4.8.6 Data Elements....................................................................................................... 74<br />

4.8.7 Message Sequences ............................................................................................... 74<br />

4.8.8 Security Requirements.......................................................................................... 74<br />

4.8.9 Timing and Routing ............................................................................................. 74<br />

4.8.9 Usability................................................................................................................ 74<br />

5.0 FINDINGS................................................................................................................. 75<br />

5.1 SUMMARY ............................................................................................................... 77<br />

APPENDIX A RESEARCH CONTACTS ............................................................................. 80<br />

APPENDIX B COMPLETED CRITERIA FORMS ............................................................ 83<br />

VENDING EQUIPMENT INTERFACE (VEI) VERSION 1.2 ........................................ 83<br />

ITSO ..................................................................................................................................... 84<br />

ISO/IEC 8583........................................................................................................................ 85<br />

CID EDGE INTERFACES ................................................................................................... 86<br />

TRANSLINK ® ....................................................................................................................... 87<br />

ERG APTA ............................................................................................................................ 88<br />

RIS PART 4............................................................................................................................ 89<br />

APPENDIX C DATA ELEMENTS........................................................................................ 90<br />

VENDING EQUIPMENT INTERFACE (VEI) VERSION 1.2 ........................................ 90<br />

ITSO DATA ELEMENTS .................................................................................................... 91<br />

ISO/IEC 8583 DATA ELEMENTS..................................................................................... 95<br />

CID EDGE INTERFACES DATA ELEMENTS................................................................ 97<br />

TRANSLINK......................................................................................................................... 99<br />

ERG APTA .......................................................................................................................... 102<br />

RIS PART 4 ......................................................................................................................... 105<br />

Appendix D RIS PART 4 RCH-To-RCH Messages........................................................ 106


Document History<br />

Revision Reason For Issue Date<br />

0.1 Initial Draft June 1, 2004<br />

1.0 Final Draft July 30, 2004<br />

1.1 Inclusion <strong>of</strong> RIS Part 4 and ERG December 15,<br />

APTA-000 review and analysis 2004<br />

1.2 Clarified scope <strong>of</strong> WP4 March, 2005<br />

Page 1


Acronym List<br />

ACCTRQ Activation Request Aggregate<br />

APTA American Public Transportation Association<br />

ASCII American Standard Code for Information Interchange<br />

ASL Agent Session Layer<br />

ATIP Australian Transport Interoperability Protocol<br />

ATL Agent Transport Layer<br />

CEN European Committee for Standardization<br />

CEPS Common Electronic Purse Specification<br />

CID Card Interface Device<br />

CSC Contactless Smart Card<br />

DAC Data Authentication Code<br />

EFT Electronic Financial Transaction<br />

EMV Europay Mastercard Visa<br />

GSC-IS Government Smart Card Interoperability Standard<br />

HOPS Host Operator or Processing System (ITSO)<br />

HTML Hyper Text Mark Up Language<br />

ICC Integrated Circuit Card<br />

IFMSA Interoperable Public Transport Fare Management System<br />

IOPTA Interoperable PT Applications for Smart Cards<br />

IPE ITSO Product Entities<br />

ISAM ITSO Specific SAM Module<br />

ISO/IEC International Organization for<br />

Standardization/International Electrotechnical Commission<br />

ITSO Integrated Transport Smartcard Organization<br />

MAC Message Authentication Code<br />

MTC Metropolitan Transportation Commission<br />

NIST National Institute <strong>of</strong> Standards and Technology<br />

NTTWG National Ticketing and Tolling Workgroup<br />

OFX Open Financial Exchange<br />

OSI Open System Interconnection<br />

PANY/NJ Port Authority <strong>of</strong> New York and New Jersey<br />

PICC Proximity Integrated Circuit Card<br />

POS Point <strong>of</strong> Sale<br />

POST Point <strong>of</strong> Service Terminal<br />

RCH Regional Clearing House<br />

RIS Regional Interoperability Standard<br />

SGML Standard Generalized Mark Up Language<br />

SSL Secure Socket Layer<br />

SV Stored Value<br />

TCP/IP Transmission Control Protocol/Internet Protocol<br />

TLV Tag Length Value<br />

TVM Ticket Vending Machine<br />

Page 2


Acronym List<br />

UTFS Universal Transit Farecard Standards<br />

VDV Verband Deutscher Verkehsunternehmen<br />

VEI Vending Equipment Interface<br />

WMATA Washington Metropolitan Area Transit Authority<br />

XML eXtensible Markup Language<br />

Page 3


1.0 INTRODUCTION<br />

A growing trend in North America and abroad is a move towards regional fare<br />

payment systems. Regional programs involve multiple transit systems linked by a<br />

<strong>com</strong>mon fare payment instrument, most <strong>com</strong>monly a smart card. Open standards and<br />

interoperability between different vendor equipment within an electronic fare payment<br />

system have be<strong>com</strong>e highly desirable, and in some instances, necessary.<br />

Interoperability is defined in this report as follows:<br />

1. The ability <strong>of</strong> fare payment devices to exchange data with other vendor devices<br />

within a single fare collection payment system<br />

2. The ability for independently implemented multiple fare payment systems to be<br />

operable with each other regardless <strong>of</strong> the underlying technology <strong>of</strong> the each<br />

system<br />

Transit agencies deploying smart card technology have very few industry standards to<br />

facilitate interoperability and reduce their reliance on proprietary technology. Agencies<br />

locked into proprietary technology have fewer procurement options and limited ability<br />

to participate in regional systems. Moving forward, individual transit agency devices<br />

and <strong>com</strong>puter systems must be interoperable, and preferably based on open standards.<br />

Today, transit agencies participating in regional programs, absent <strong>of</strong> industry wide<br />

standards, have encountered difficulties such as the following:<br />

• New systems<br />

- Increased coordination required between participating agencies before<br />

equipment procurements<br />

- No independent source to <strong>com</strong>pare different proprietary approaches<br />

between <strong>com</strong>peting vendors<br />

- Less <strong>com</strong>petitive initial marketplace<br />

• Existing systems<br />

- Post implementation equipment options are constrained<br />

- Reduced ability to collaborate with non-transit industry partners due to<br />

proprietary interfaces<br />

- Few options for replacing non-performing vendors in mid-stream<br />

1.1 Objectives<br />

1.1.1 APTA Objective<br />

The American Public Transportation Association (APTA) standards activity, through<br />

the work <strong>of</strong> the Universal Transit Farecard Standards (UTFS) Program, defines interface<br />

standards and best practices for use at transit systems throughout the United States that<br />

provide uniform guidelines for system interoperability. The program aims to produce<br />

standards and re<strong>com</strong>mended practices to help transit systems deploying smart card<br />

Page 4


technology to achieve interoperability with peer transit systems, and interoperability<br />

between systems provided by different vendors. WP4 focuses primarily on producing<br />

standards and guidelines to achieve the following objectives:<br />

• Interoperability between a single transit system’s fare payment devices, and a<br />

central system as illustrated in Exhibit 1.1-1.<br />

• Interoperability (possibly limited) between two regional central systems as<br />

illustrated in 1.1-2<br />

These objectives support APTA’s goal <strong>of</strong> increasing interoperability among smart card<br />

based transit systems in the U.S. This will benefit all transit systems by increasing<br />

<strong>com</strong>petition among vendors when expanding or upgrading their systems and<br />

facilitating a staged regional rollout approach. The typical regional payment system<br />

has four tiers <strong>of</strong> devices and <strong>com</strong>puter systems:<br />

• Regional Central System – Consolidates and processes transactions and<br />

establishes settlement positions between agencies<br />

• Headquarters Computer/Operator Central Tier – Utilized by participating<br />

agencies to collect transactions for internal auditing and reporting and/or<br />

control agency specific functionality. This tier is optional, as some agencies pass<br />

data straight from the station/depot <strong>com</strong>puter tier to the central system. In<br />

addition, some systems will include an “audit <strong>com</strong>puter” to audit the data in the<br />

central system instead <strong>of</strong> a headquarter <strong>com</strong>puter system.<br />

• Station/Depot Computer Tier – Deployed in stations or bus depots to collect<br />

usage data from fare payment devices and download configuration data to<br />

devices from the Headquarters Computer/Operator Central Tier. This tier is<br />

optional, as some agencies have opted to pass data straight from the Device Tier<br />

to the Headquarters Computer/Operator Central Tier.<br />

• Device Tier – Deployed on vehicles or at stations and other points where the<br />

patron’s card interfaces with the system<br />

The system tiers and related interfaces explained in this section are illustrated in<br />

Exhibits 1.1-1 and 1.1-2.<br />

Page 5


Regional System<br />

Interface<br />

Operator System<br />

Interface<br />

Station<br />

Computer<br />

Operator CID Interface Device<br />

Interface<br />

Exhibit 1.1-1 Regional Smart Card System Interface<br />

Operator Central<br />

System<br />

Station<br />

Computer<br />

Faregate POS<br />

TVM TVM<br />

Terminal<br />

Regional Central<br />

System<br />

Operator Central<br />

System<br />

Depot<br />

Computer<br />

Farebox<br />

Smart Card<br />

Validator<br />

TVM<br />

Operator Central<br />

System<br />

Smart Card<br />

Validator<br />

Rail Operator Bus Operator Bus Operator<br />

Regional Central<br />

System<br />

Operator<br />

Network<br />

Exhibit 1.1-2 Regional Peer to Peer System Interface<br />

Operator<br />

Network<br />

1.1.2 Objectives <strong>of</strong> the Analysis<br />

Operator Central<br />

System<br />

Regional Peer-to-Peer<br />

Interface<br />

Page 6<br />

Operator<br />

Network<br />

Operator<br />

Network<br />

Regional Central<br />

System<br />

Operator Central<br />

System<br />

Depot<br />

Computer


This report en<strong>com</strong>passe s the review and analysis<br />

<strong>of</strong> existing smart card interoperability<br />

standards and smart card related specifications. The terms “Standard” and<br />

“Specification” have been used per the document<br />

titles as defined by their issuing<br />

organizations.<br />

The d ocuments listed in Exhibit 1.1-3 below were<br />

reviewed in this effort.<br />

Exhibit 1.1-3 Documents Reviewed<br />

for This Report<br />

Document Issuer Title Comments<br />

Smart Card Industry Specifications<br />

Innovatron-RATP-SNCF Calypso Smart card ticketing application<br />

RKF RKF Specification for interoperable electronic<br />

ticketing system<br />

VDV VDV German public transit specification<br />

ITSO ITSO Interoperable Transit Smart Card<br />

Specification<br />

IOPTA IOPTA Interoperable<br />

Public Transit Application<br />

SNCF Intercode Interoperable French ticketing<br />

specification<br />

OFX OFX Non-smart card XML specification<br />

EMVCO EMV Interoperable contact smart card<br />

specification for credit/debit cards<br />

Global Platform Global Platform Multi application smart card platform for<br />

financial institutions<br />

NIST GSC-IS U.S. government smart card specification<br />

CEPS<br />

Smart Card Standards<br />

CEPS Interoperable e-purse specification<br />

CEN CEN TC278/IFM Interoperable fare management system<br />

for public transit fare collection system<br />

ISO/IEC ISO/IEC 8583 Message type and structure for financial<br />

data exchange between banks and<br />

financial institutions.<br />

ISO/IEC ISO/IEC 14443 Contactless smart card standards<br />

ISO/IEC ISO/IEC 7816<br />

Contact-based smart card standards<br />

NTTWG<br />

Vendor Specifications<br />

ATIP Australian, transit<br />

ticketing and tolling<br />

standard<br />

Agent Systems VEI Control and monitoring <strong>of</strong> networked<br />

equipment<br />

Cubic CID Edge<br />

Interfaces Message type and structures for device to<br />

Central System data exchange<br />

Mark IV EZ-Pass Message<br />

Back <strong>of</strong>fice transaction and clearing and<br />

Specifications<br />

settlement messages<br />

ERG APTA WG4 Transaction Device to Higher Level Computer Data<br />

Definitions Elements/Messaging Specifications<br />

Smart Card Project Specific Specifications<br />

Washington<br />

®<br />

SmartTrip<br />

Back <strong>of</strong>fice transaction exchange<br />

Metropolitan Area Interoperability<br />

Regional including clearing and settlement<br />

Transit Authority<br />

(WMATA)<br />

Specification (SIRS)<br />

Page 7


Document Issuer Title Comments<br />

Metropolitan<br />

®<br />

TransLink Data and Transaction and data types for back <strong>of</strong>fice<br />

Transportation<br />

Messaging Format<br />

messaging between CID and the higher<br />

Commission<br />

(MTC) Specification<br />

tier<br />

Port<br />

Authority New Regional Interoperability RIS scope is defined to detail card, card to<br />

York/New<br />

Jersey Specification (RIS) Part 4 CID and agency Central Computer (ACC)<br />

( PANY/NJ)<br />

to Regional Clearing House (RCH)<br />

specifications<br />

OCTOPUS Documentation Relevant to Back-<strong>of</strong>fice clearing and settlement<br />

the UTFS Effort<br />

messaging<br />

1.2 APTA Efforts<br />

To Date<br />

As a preliminary activity to the development <strong>of</strong> WP4 interface specifications, the UTFS<br />

Financial Management Committee Systems Workpackage 4 developed the Interface<br />

Specification Functional Description document that describes the following interfaces<br />

in<br />

detail:<br />

• Regional System Interface<br />

• Operator System Interface<br />

• Operator to Operator Interface<br />

Additionally, the Functional Description document defines the<br />

functionality that must<br />

be present for each interface in order to be deemed “<strong>com</strong>pliant” by the future APTA<br />

standards. The document also provides a framework to evaluate the required<br />

functionality by the following criteria:<br />

• Messages<br />

• Data structures<br />

• Commands<br />

2.0 METHODOLOGY<br />

For this research effort Booz Allen employed a methodology that first included an<br />

identification<br />

<strong>of</strong> relevant smart card standards and specifications (transit and nontransit).<br />

The next step<br />

in the methodology was to apply screening criteria to each <strong>of</strong> the<br />

documents in order to determine their relevancy to the UTFS effort. The documents<br />

that fulfilled the project screening criteria became candidates for detailed analysis.<br />

The<br />

methodology is illustrated in Exhibit 2-1.<br />

Page 8


Identify S m art Card<br />

Indust ry S ta ndards &<br />

Sp ecif ica tions<br />

Exhibit 2-1 Selection Methodology<br />

Apply Project<br />

Screening Criteria<br />

Does it Meet<br />

all the<br />

Criteria?<br />

Yes<br />

Detailed An alysis<br />

(Section 3.0) (Section 4.0)<br />

Not Applicable to the<br />

UTFS Effort<br />

No<br />

Relevant but Unable to<br />

Obtain Permission<br />

(Exhibit 3-1) (Exhibit 3-2)<br />

Could Not Obtain –<br />

Can’t Ascertain<br />

Relevance<br />

(Exhibit 3-2)<br />

Booz Allen began this research effort by identifying a candidate pool <strong>of</strong> standards and<br />

specifications that address smart card or electronic payment transactions. We selected<br />

the documentation based on the following factors:<br />

• Our work on various smart card implementations in North America,<br />

Europe and<br />

Asia/Australia<br />

• Our relationships with vendors in the<br />

smart card <strong>com</strong>munity<br />

• Our knowledge <strong>of</strong> smart card or messaging specifications introduced in other<br />

industries (e.g. financial, electronic toll collection) that may have applicability<br />

to the<br />

UTFS<br />

effort<br />

In addition, APTA, through its work in UTFS Workpackages, identified several<br />

standards and specifications for analysis.<br />

3.0 PROJECT SCREENING CRITERIA Two preliminary criteria were established to evaluate<br />

each standard and specification in<br />

order to identify those that qualified for further analysis.<br />

• Relevance <strong>of</strong> the standard or specification to the UTFS efforts<br />

- Tiers the standard or specification<br />

is targeted to match WP4 focus (see<br />

Exhibits 3.1-1 and 3.1-2)<br />

• Availability for use by APTA<br />

- Timeline for acquisition <strong>of</strong> the documentation<br />

- Willingness <strong>of</strong> the issuing agency to share documentation with APTA<br />

- Requirements for use (licensing fee or contractual agreements)<br />

The<br />

first criterion was applied to each <strong>of</strong> the standards or specifications; if the document<br />

failed,<br />

it was deemed not applicable to the UTFS effort. If the standard or specification<br />

passed<br />

the first criteria, the second was applied. If it failed the second criteria it fell into<br />

one<br />

<strong>of</strong> the categories in Exhibit 3-2. The disposition for each <strong>of</strong> the standards and<br />

specifications is documented in the discussion and exhibits <strong>of</strong> this section.<br />

Page 9


Exhibit 3-1 lists the standards or specifications that did not meet the initial project<br />

screening criteria, and were determined not applicable to the UTFS, based on their card<br />

level interoperability foc us.<br />

Exhibit 3-1 Not Applicable to APTA’s Efforts<br />

Title<br />

Sm art Card Specifications<br />

Description <strong>of</strong> Non-Applicability<br />

Calypso Card architecture and device-to-card interface<br />

specification<br />

RKF Card architecture and device-to-card interface<br />

specification<br />

Intercode Card architecture and device-to-card interface<br />

specification<br />

VDV (Interoperability Standard In<br />

Card architecture and device-to-card interface<br />

Germany)<br />

Smart Card Specifications (non-Transit)<br />

specification<br />

EMV (Europay MasterCard Visa) Card architecture and device-to-card interface<br />

specification<br />

Global Platform Smart card multi-application card platform<br />

CEPS (Common Electronic Purse<br />

Specification)<br />

Card based universal purse application specification<br />

GSC-IS (Government Smart Card<br />

Card architecture and device-to-card interface<br />

Interoperability Standard)<br />

specification<br />

Exhibit 3-2 illustrates the standards or specifications that are deemed relevant to the<br />

UTFS effort by passing the first project screening criteria. However, attempts to contact<br />

project sponsoring organizations to obtain the necessary documentation were either<br />

unsuccessful (as <strong>of</strong> December, 2004) or permission for APTA’s use was not granted.<br />

Therefore, these documents failed the second screening criteria.<br />

Exhibit 3-2: Documentation That Failed Second Criteria<br />

Document Issuer Title Comments<br />

Smart Card Standards<br />

NTTWG ATIP Standard is in<strong>com</strong>plete<br />

Smart Card Specifications<br />

IOPTA IOPTA Unable to obtain, Relevance is unknown<br />

Smart Card Project Specific Specifications<br />

Octopus OCTOPUS No Response from the Issuer<br />

At the time <strong>of</strong> the release <strong>of</strong> this report, explicit authorization is still being worked on<br />

and has not been worked out for the inclusion <strong>of</strong> the SmartTrip® Interoperability<br />

Regional Specification (SIRS).<br />

Page 10


The standards and specifications that passed the two initial screening criteria qualified<br />

for further analysis. The results <strong>of</strong> the analysis are presented in Section 4.0.<br />

Page 11


4.0 ANALYSIS OF STANDARDS AND SPECIFICATIONS<br />

Each <strong>of</strong> the standards and specifications in this section were analyzed for their<br />

adherence to the criteria outlined in Section 3.0 and their overall relevance to the<br />

UTFS<br />

effort.<br />

The information presented in this section was obtained through various<br />

including:<br />

channels<br />

• Discussions with transit operator personnel, smart card equipment<br />

vendors and<br />

project managers<br />

• A review <strong>of</strong> public information (web sites and project documents)<br />

• Booz Allen’s<br />

direct involvement through engagements with the planning, design<br />

and implementation <strong>of</strong> many <strong>of</strong> the regional fare payment systems.<br />

Exhibit<br />

4-1 illustrates the documentation that met the entire project screening criteria<br />

explained in Section 3, and are included in the analysis presented in this section.<br />

Exhibit 4-1 Documentation That Met All Criteria<br />

Document Issuer<br />

Smart Card Standards<br />

Title Comments<br />

European Committee for<br />

Standardization (CEN)<br />

Smart Card Specifications<br />

CEN TC278/IFM<br />

Analyzed in detail<br />

ITSO Integrated Transport<br />

Smartcard<br />

Organization (ITSO)<br />

Analyzed in detail<br />

Smart Card Standards (non-Transit)<br />

International Standards<br />

Organization (ISO/IEC)<br />

ISO/IEC 8583 Analyzed in detail<br />

Smart Card Specifications (non-Transit)<br />

OFX<br />

Vendor Specifications<br />

Open Financial<br />

Exchange (OFX)<br />

Analyzed in detail<br />

Agent Systems Vending Equipment<br />

Interface (VEI)<br />

Analyzed in detail<br />

Cubic CID Edge Interfaces Analyzed in detail<br />

ERG APTA WG4<br />

Transaction Definitions<br />

Analyzed in detail<br />

Smart Card Project Specific Specifications<br />

Metropolitan<br />

Transportation<br />

Commission (MTC)<br />

®<br />

TransLink<br />

Analyzed in detail<br />

Port Authority New Regional<br />

Analyzed in detail<br />

York/New Jersey Interoperability<br />

(PANY/NJ)<br />

Specification (RIS)<br />

Part 4<br />

Page 12


These standards and specifications were subjected to detailed analysis in order to assess<br />

their level <strong>of</strong> applicability to UTFS WP4 efforts. The established criteria for the level <strong>of</strong><br />

applicability were developed based on the input from the APTA Financial Committee’s<br />

Interface<br />

Specification Functional Description and Booz Allen’s experience in<br />

implementing regional fare payment systems.<br />

The criteria included:<br />

• Common Message Structure that is supported by all data exchange<br />

• Message Types that are applicable to UTFS WP4 proposed messages<br />

• Data Elements that are specific to the transit industry<br />

• Message Sequences that support an organized flow <strong>of</strong> data<br />

• Security Requirements to allow for the protection <strong>of</strong> sensitive transit data and the<br />

fiscal integrity <strong>of</strong> the larger payments scheme implemented for all participant in a<br />

region<br />

• Timing and Routing that dictates the operational requirements <strong>of</strong> the system<br />

• Usability <strong>of</strong> the standard or specification by APTA<br />

The following sections include the detailed analysis for each <strong>of</strong> the standards<br />

and<br />

specifications listed in the Exhibit 4-1.<br />

4.1 ISO/IEC 8583<br />

4.1.1 Description <strong>of</strong> the Standard<br />

ISO/IEC<br />

8583 is designed as an interface standard enabling messages to be exchanged<br />

between systems that employ different application specifications. This standard <strong>of</strong>fers<br />

application designers freedom from overall design<br />

constraints because messages can be<br />

converted<br />

to the format <strong>of</strong> this interface for international interchange to take place.<br />

This international standard uses a concept called bitmap, whereby each data element is<br />

assigned a pos ition indicator in a control field (or bitma p). A “1” in the assigned<br />

position indicates the presence <strong>of</strong> a data element in a specific message, and a “0” in the<br />

assigned<br />

position, indicates the absence <strong>of</strong> a data element. This will allow application<br />

designers to choose variable length data elements and messages, and the flexibility to<br />

utilize data element types that are best suited for a specific application.<br />

The standard is designed to<br />

ac<strong>com</strong>modate real-time “request-response,” and batch and<br />

file<br />

transfer type information exchange. It can also be utilized for both peer-to-peer and<br />

centralized settlement schemes due to its flexible design.<br />

ISO/IEC 8583 specifies a well-defined message structure, and message format and<br />

content.<br />

It is widely used in the financial industry, particularly in the handling <strong>of</strong> all<br />

credit and debit card transactions among financial institutions and merchants around<br />

the world.<br />

Page 13


Though the majority <strong>of</strong> the messages and related data elements have been designed for<br />

financial transaction interchange, they share some <strong>com</strong>monalities with public transit<br />

electronic fare payment transactions.<br />

4.1.2 Applicability to UTFS Effort<br />

ISO/IEC 8583 lacks transit industry specific data elements and message types that need<br />

to be defined by APTA. The addition <strong>of</strong> this new information requires their submission<br />

to ISO/IEC, the international standards body that controls and maintains the changes to<br />

the standard. The timeline for an effort such as this is largely unknown, but estimated<br />

to be lengthy. For all the benefits <strong>of</strong>fered, this standard may serve as a model for<br />

UTFS<br />

WP4 efforts.<br />

Of all the standards and specifications analyzed, ISO/IEC 8583 is the most established<br />

and widely implemented standard throughout the world. Financial data exchange<br />

<strong>of</strong><br />

all magnetic stripe based credit card transactions follows this standard. Following the<br />

advancements in the card technologies, ISO/IEC 8583 has been updated to<br />

ac<strong>com</strong>modate mostly contact based smart card transactions. Its financial industry focus<br />

led<br />

to the presence <strong>of</strong> a variety <strong>of</strong> clearing and settlement transactions exchanged<br />

between entities. Though it is mostly used for on-line real time “request-response”<br />

type<br />

transactions, the standard provides details for batch<br />

and file transfer mechanisms.<br />

4.1.3 Common Message Structure<br />

ISO/IEC 8583 provides a <strong>com</strong>mon message structure, which defines three main sections<br />

for<br />

each message as illustrated in Exhibit 4.1-1.<br />

Exhibit 4.1-1 Common Message Structure<br />

Message Type Message Bitmap(s) Data Elements<br />

Message type consists <strong>of</strong> two elements, a version number and a message type identifier.<br />

The version number is allocated to indicate the version <strong>of</strong> the ISO/IEC 8583 standard<br />

followed by the interchange. The message type identifier is a three digit numeric field<br />

identifying the following:<br />

• Message class<br />

• Message function<br />

• Transaction originator<br />

Message class identifies whether it is a financial, administrative, or network<br />

management type <strong>of</strong> a message. Message function specifies if it is a request, response,<br />

notification or advice. The transaction originator digit identifies the originator <strong>of</strong> the<br />

message (e.g., issuer or acquirer).<br />

Page 14


Although there is no “one-to-one” relationship between UTFS defined<br />

message types<br />

and<br />

ISO/IEC 8583 defined message classes, this standard provides a flexible model, or<br />

foundation<br />

to further define transit industry related data elements in its body.<br />

The<br />

second element in the message structure defines whether it contains one or two<br />

bitmaps.<br />

A “1” in the bitmap indicates the presence <strong>of</strong> the corresponding data element<br />

in the message. Each bitmap has 64 bits, thus two bitmaps can provide the total <strong>of</strong> 128<br />

data<br />

elements, as defined by the standard. The first (primary) bitmap is mandatory and<br />

represents<br />

the most frequently used data elements. The presence <strong>of</strong> the secondary<br />

bitmap is signified by a “1” in bit 01 <strong>of</strong> the primary bitmap.<br />

Bitmaps provide the application providers with the flexibility <strong>of</strong> choosing among a<br />

greater pool <strong>of</strong> data elements for varying industry segments, however, they tend to<br />

add<br />

extra<br />

overhead to the transaction speeds, especially in real-time data processing<br />

environments. The effects <strong>of</strong> this overhead may not be as significant for backend,<br />

processing environments such as clearing and settlement or reporting that are not as<br />

time sensitive as card to reader transactions.<br />

Messages are constructed using the message bit map as an index <strong>of</strong> present data<br />

elements. There are three types <strong>of</strong> data elements:<br />

• Primitive data element<br />

• Constructed data element<br />

• Composite data element<br />

Primitive data elements represent a single piece <strong>of</strong> information, whereas the constructed<br />

data element consists <strong>of</strong> a fixed number <strong>of</strong> sub-elements, all <strong>of</strong> which must be present.<br />

Composite data element consists <strong>of</strong> a large number <strong>of</strong> sub-elements. Most <strong>of</strong> these sub-<br />

elements fall into industry related categories such as auto rental data, or airline data. In<br />

order to define these categories, the concept <strong>of</strong> a “dataset” has been introduced. All<br />

the<br />

sub elements in<br />

a <strong>com</strong>posite data element are divided into a certain number <strong>of</strong> datasets,<br />

each<br />

<strong>of</strong> which relates to an industry and contain a dataset identifier. The structure <strong>of</strong> a<br />

dataset is based on the message structure explained in this standard. There is also a<br />

provision<br />

for identifying sub-elements using the TLV data encoding method as an<br />

alternative to using a second level bitmap. Each <strong>com</strong>posite data element can therefore<br />

contain a variable number <strong>of</strong> different datasets and can include both TLV and bitmap<br />

formats as illustrated in Exhibit 4.1-2.<br />

Page 15


Dataset<br />

Identifier<br />

4.1.4<br />

Message Types<br />

Exhibit 4.1-2 Composite Data Element<br />

Dataset<br />

Length<br />

The standard provides the following general message classes, some <strong>of</strong> which can<br />

be<br />

applied<br />

to back end transaction types for public transit as defined by UTFS WP4.<br />

• Authorization Messages<br />

• Verification Messages<br />

• Financial Presentment Messages<br />

• Financial Accumulation Presentment<br />

• File action messages<br />

• Reversal Message Class<br />

• Chargeback message class<br />

• Reconciliation message class<br />

• Administrative message class<br />

• Error messages<br />

• Fee collection messages<br />

• Network Management messages<br />

• Key management messages<br />

The following sections addresses the relevance and application <strong>of</strong> the messages to the<br />

message types defined by the UTFS WP4 in<br />

the Interface Specification Functional<br />

Description.<br />

4.1.4.1 Transaction<br />

Data<br />

Composite Data Element<br />

Dataset Sub Optional TLV<br />

Bitmap(s)<br />

Element Sub Elements<br />

The MTI 240, Financial Presentment Notification Messages have been designed to<br />

<strong>com</strong>municate the financial data for an approved transaction amount for billing or<br />

posting purposes. This<br />

message type can be applied to Fare Card Usage and Add Value<br />

Transaction types defined by UTFS. The message has 37 optional and mandatory data<br />

elements. (See Appendix C for a full list <strong>of</strong> data elements in this message)<br />

In addition to its standard financial transaction message types, this standard allocates<br />

further<br />

sub-classification for an electronic purse transaction type within the financial<br />

presentment message class.<br />

Page 16


4.1.4.2 Card Management Data<br />

The standard provides MTI 800 series network management message class to control<br />

the following types <strong>of</strong> network management activity:<br />

• System condition management, which is used to establish and report system<br />

availability and to give instructions<br />

pertaining to message handling during<br />

periods <strong>of</strong> system unavailability<br />

• System security management, which is used to control security aspects <strong>of</strong> the<br />

interchange system<br />

such as key and password management and security alerts.<br />

These messages may be used as part <strong>of</strong> a security procedure, e.g., automatic<br />

periodic key changes<br />

• System accounting management, which is used to identify the end <strong>of</strong> a<br />

reconciliation period. These messages may be used as part <strong>of</strong><br />

a reconciliation<br />

process<br />

• System audit controls management, which is used to test integrity <strong>of</strong> interchange<br />

links and/or used as a part <strong>of</strong> an integrity check or failure recovery scheme<br />

• Batch and file transfer header and trailer control management, which is used<br />

to<br />

denote the start and/or end <strong>of</strong> batch or file transfer<br />

File Action Instruction/Notification Messages (362/340) can be utilized to inform the<br />

receiver <strong>of</strong> a file action to be <strong>com</strong>pleted. The sender can periodically specify<br />

that the<br />

receiver<br />

acknowledge the receipt <strong>of</strong> the most recently sent group <strong>of</strong> instruction<br />

messages. The Da ta Record data element present in these<br />

message classes is utilized for<br />

the<br />

actual transfer <strong>of</strong> data and may or may not be based on the message types identified<br />

in this standard. Data Record data element is variable length and its structure and the<br />

content can be specified by the parties involved in the exchange. This allows parties<br />

in<br />

the transmission to further define the requirements <strong>of</strong> the Data Record data element,<br />

allowing the File Action Instruction/Notification messages to be utilized for Card<br />

Management transactions as proposed by the WP4. The types <strong>of</strong> file actions that are<br />

defined by the standard<br />

are listed below:<br />

• Add record<br />

• Change record<br />

• Delete record<br />

• Replace record<br />

• Inquiry<br />

• Replace file<br />

• Add file<br />

• Delete File<br />

• Card administration<br />

• Reserved for private<br />

use<br />

Page 17


4.1.4.3 System and Device Data<br />

The system and device data related messages are not addressed by this standard.<br />

However, the MTI 300 series File Action message class (including 362/340), as<br />

explained in the previous section, provides some flexibility to achieve the functionality<br />

similar to what is proposed by the Interface Specification Functional Description. The<br />

File Action messages<br />

are used to:<br />

• Add, change,<br />

delete or replace a file or record<br />

• Inquire into a file<br />

• Perform card administration (such as reporting lost or stolen cards)<br />

Therefore<br />

this message class can be utilized for Negative List, Hotlist, CID Parameter<br />

update<br />

and Application Update messages proposed by the WG4.<br />

4.1.4.4 Event Data<br />

Similar<br />

to the schema in the System and Device Data section, there is no specific<br />

coverage for this message type in this standard. The MTI 300 series File Action Message<br />

class (including 362/340)<br />

can also be utilized to carry event data in the Data Record<br />

data element <strong>of</strong> the message.<br />

Further definition <strong>of</strong> the structure, format and content <strong>of</strong><br />

this<br />

data element would be required for the event data transmission.<br />

4.1.4.5<br />

Peer to Peer Clearing & Settlement<br />

The ISO/IEC 8583 provides support for bo th peer-to-peer and central system based<br />

clearing and settlement schemes. The reconciliation message class supports the<br />

exchange <strong>of</strong> data between<br />

two institutions to reach agreement on financial totals. The<br />

calculation <strong>of</strong> the Amount Net Reconciliation data element is achieved by netting<br />

the<br />

debit and credit amounts in the reconciliation message. The standard<br />

defines two types<br />

<strong>of</strong> reconciliation:<br />

• Checkpoint reconciliation<br />

• Final reconciliation<br />

Checkpoint reconciliation period is defined by the Reconciliation Indicator field in the<br />

message. A final reconciliation period is ident ified with the Date Reconciliation field<br />

and contains any number <strong>of</strong> checkpoint reconciliation periods. The Reconciliation<br />

Data<br />

Primary<br />

<strong>of</strong> 12 parts contains all the individual values needed to calculate the net<br />

reconciliation in the Amount Net Reconciliation data element.<br />

4.1.5 Data Elements<br />

Bit 55 is the Integrated Circuit Card (ICC) data element and is a special form <strong>of</strong><br />

<strong>com</strong>posite data element used to transmit ICC related data. If the data is in accordance<br />

Page 18


with ISO/IEC 7816-6, there is no requirement for a dataset identifier or dataset bitmap<br />

as these functions are covered by the ISO/IEC 7816-6 TLV coding structures. The result<br />

is that the dataset identifier is replaced by the “T” element, the dataset length object<br />

by<br />

the “L” element, and the sub elements by the “V” element. Data that is not <strong>com</strong>pliant<br />

with the ISO/IEC 7816-6 can still be submitted in this<br />

field as long as it follows the<br />

standard <strong>com</strong>posite data element structure as defined by the standard as illustrated in<br />

Exhibit 4.1-3.<br />

Exhibit 4.1-3 Standard Composite Data Element Structure<br />

Dataset<br />

Identifier<br />

Field 55 ICC Related Data<br />

Dataset<br />

Length<br />

Dataset<br />

Bitmaps<br />

Sub<br />

Element<br />

Exhibit 4.1-4 contains a sample application <strong>of</strong> the ICC field with the transit industry<br />

related data elements.<br />

Exhibit 4.1-4 Sample Structure <strong>of</strong> Field 55<br />

Field 55 ICC Data<br />

Name Value Description<br />

Dataset Identifier 71 Fare Transaction<br />

Dataset Length 512 Total length <strong>of</strong> the sub-elements present<br />

Dataset Bitmap 0110000001100000 Indicates the following fields that are present<br />

Sub-elements<br />

Transit Application Pr<strong>of</strong>ile Object<br />

Product Index Object<br />

Pass and Transfer Object<br />

Transaction History Object<br />

Dataset Identifier 43 Load Value Transaction<br />

Dataset Length 384 Total length <strong>of</strong> the sub-elements present<br />

Dataset Bitmap 0001010000100000 Indicates the following fields that are present<br />

Sub-elements<br />

Stored Value (SV) Product Object<br />

Add Value Transaction History Object<br />

Transaction History Object<br />

4.1.6 Message Sequences<br />

The standard provides detailed sequences for message exchange and routing rules.<br />

Typically messages consist <strong>of</strong> a “request-response” pair that is initiated by either card<br />

issuers or acquirers, as illustrated in Exhibit 4.1-5. There are provisions for message<br />

repetitions when original request message is not responded. Additionally, the standard<br />

Page 19


defines instruction, notification and advice message types for unique operating<br />

conditions. “Request-Response” message pairs were originally intended for exchange<br />

between an operator central system and a regional central system. However,<br />

depending on the system architecture, the message pairs can be configured for<br />

exchange between two operator central systems.<br />

Operator Central<br />

System<br />

4.1.7 Security Requirements<br />

Exhibit 4.1-5 Request Response Pair<br />

Regional Central<br />

System<br />

Request/Response Request/Response<br />

Request/Response<br />

Operator Central<br />

System<br />

The standard mandates th e last bit position within any message bit map to be reserved<br />

for<br />

the Message Authentication Code (MAC) data element to validate<br />

the source and<br />

the<br />

text <strong>of</strong> the message between the sender and the receiver. The standard also makes<br />

reference to ISO/IEC 9807 (Banking and Related Financial Services) for message<br />

authentication.<br />

4.1.8 Timing & Routing<br />

ISO Standard 8583 defines two alternative information exchange schemes including<br />

examples to ac<strong>com</strong>modate transfer <strong>of</strong> data, in a batch or a file transfer format, in<br />

addition to the standard real-time “request-response” messages. These alternative<br />

approaches can be especially beneficial in a back-end information exchange, where a<br />

real time transfer <strong>of</strong> data to the higher tier or the central system is not as critical. These<br />

two alternatives provide a viable foundation for information exchange between both<br />

intra<br />

agency system <strong>com</strong>ponents and different central systems that operate on a peer-topeer<br />

basis. Therefore these exchange schemes are applicable to the UTFS efforts.<br />

ISO/IEC 8583 describes a file transfer process that is designed to allow transfer <strong>of</strong> larger<br />

volumes <strong>of</strong> data in the minimum number <strong>of</strong> messages. The file transfer consists <strong>of</strong><br />

submission <strong>of</strong> a group <strong>of</strong> file action messages (300 series), where the total number <strong>of</strong><br />

Page 20


these messages constitutes a file. The File Name data element in the message indicates<br />

the name <strong>of</strong> the file to be updated<br />

at the receiver’s location. The Data Record data<br />

element<br />

in each one <strong>of</strong> these messages contains data from a number <strong>of</strong> business<br />

transactions. The data contained in the Data Record data element may, or may not be<br />

based on the message types identified<br />

in this standard. The structure <strong>of</strong> this data<br />

element<br />

is left to the parties involved in the exchange. A file transfer is initiated with a<br />

network message set (804/814), followed by a series <strong>of</strong> file action (340)<br />

messages and<br />

ended with another network message, as illustrated<br />

in Exhibit 4.1-6.<br />

Device<br />

Or<br />

Station/Depot<br />

Computer<br />

Exhibit 4.1-6 File Transfer Process<br />

804<br />

814<br />

340<br />

340<br />

350<br />

804<br />

814<br />

N times<br />

File<br />

Operator Central<br />

System<br />

or<br />

Regional Central<br />

System<br />

Batch transfer allows transaction details to be sent as a series <strong>of</strong> notification, or<br />

instruction messages with an optional reconciliation transaction. The Batch Transfer<br />

does not require a response message for every message sent. Control is maintained by<br />

the use <strong>of</strong> notification, or instruction acknowledgement messages, which may be sent<br />

periodically within the transmission <strong>of</strong> a batch. There are no specific message types<br />

needed to support the Batch Transfer. It is achieved<br />

by the use <strong>of</strong> the existing message<br />

types provided<br />

by the standard.<br />

The batch transfer is initiated by an 804/814 network management messages that define<br />

transfer related control data such as number <strong>of</strong> messages contained in the batch. In the<br />

example flow illustrated in Exhibit 4.1-7, a series <strong>of</strong> Financial Presentment Notification<br />

Messages (240) are used in the batch transfer.<br />

Page 21


ACQUIRER<br />

4.1.9 Usability<br />

Exhibit 4.1-7 Batch Transfer Process<br />

804<br />

814<br />

240<br />

240<br />

250<br />

804<br />

814<br />

N times<br />

BATCH<br />

ISSUER<br />

ISO 8583 is a standard developed in ISO Technical Committee #68, which is represented<br />

by the Accredited Standards Committee X9, Inc., also referred to as ASC X9, in the US.<br />

Due to the organizational structure <strong>of</strong> ISO, APTA can pursue its adoption efforts by<br />

be<strong>com</strong>ing<br />

a member <strong>of</strong> X9.<br />

The following fee schedule is based on the membership level and effective the fiscal<br />

year <strong>of</strong> September 1 – August 31:<br />

Category A – Board Membership and Full Privileges $8,000<br />

Category B - Voting Privileges $4,750<br />

Category C - Limited Voting $2,500<br />

Category D – Non Voting $1,150<br />

Category E -- Workgroup Only $ 400<br />

Membership applications are usually processed in 24-48 hours. There is no cost<br />

involved in obtaining (or adapting to transit) the standard for membership categories A,<br />

B and C. However, the members can only distribute the standard within their own<br />

organization. Members can request changes to the standard and the length <strong>of</strong> the change process<br />

depends upon urgency <strong>of</strong> the<br />

change. Typically, the review and approval process takes<br />

somewhere between three months to a year, based on the type <strong>of</strong> changes to the<br />

standard,<br />

which are reviewed every 5-6 years.<br />

The<br />

use <strong>of</strong> the standard by non-members is subject to royalties, which are based on the<br />

amount <strong>of</strong> information extracted from the standard. The process <strong>of</strong> using<br />

the standard<br />

for non-members involves a written request identifying the parts <strong>of</strong> the standard<br />

intended<br />

for use.<br />

Page 22


Phone<br />

interviews and/or email correspondence were used to obtain this information,<br />

and<br />

it is accurate as <strong>of</strong> July 2004. However, if APTA is interested in using any parts <strong>of</strong><br />

the standard, formal negotiations are necessary.<br />

4.2 Integrated Transport Smartcard Organization (ITSO)<br />

4.2.1 Description <strong>of</strong> the Specification<br />

The<br />

International Ticketing Smart Card Organization (ITSO) was founded in 1998 as<br />

collaboration between various UK Passenger Transport Authorities<br />

addressing the lack<br />

<strong>of</strong><br />

suitable standards for interoperable smart card ticketing. ITSO was formed to build<br />

and maintain a specification for secure end-to-end interoperable ticketing transactions,<br />

utilizing relevant ISO/IEC and emerging<br />

European Committee for Standardization<br />

(CE N ) standards.<br />

The ITSO set <strong>of</strong> specifications is advisory and not<br />

binding. They aim to provide a<br />

platform and the toolbox for the provision <strong>of</strong> interoperable contactless smart card<br />

public<br />

transport ticketing and related services in the UK. The specification is divided<br />

into ten parts to cover the various entities involved<br />

in a typical fare payment system:<br />

• Part 0 – Concept and Content<br />

• Part 1 – General Reference<br />

• Part 2 – Customer Media Data and Customer Media Architecture<br />

• Part 3 – Terminals<br />

• Part 4 – Host Operator<br />

or Processing System (HOPS)<br />

• Part 5 – Customer Media Data<br />

Record Definitions<br />

• Part 6 – Message Data<br />

• Part 7 – ITSO Security Subsystem<br />

• Part 8 – ITSO Specific SAM Module (ISAM) Detailed Operation<br />

• Part 9 – Communications<br />

• Part 10 – Customer Media Definitions<br />

The emphasis <strong>of</strong> this analysis is on the Parts 4, 5 and 6 due to the scope <strong>of</strong> this project<br />

and the objectives <strong>of</strong> the WP4. The back <strong>of</strong>fice messages are designed to allow<br />

flexibility<br />

for adopting the specification for either peer-to-peer, or central system<br />

clearing and settlement operations.<br />

ITSO has deliberately opted to minimize data storage space requirements in order to<br />

allow organizations the most flexibility. This is especially critical where the data<br />

storage space is at a premium, such as in a bus driver controller module. To achieve<br />

this, data fields<br />

mainly have fixed sequences and lengths, freeing them from the<br />

requirements<br />

<strong>of</strong> a TLV type <strong>of</strong> encoding such as the one defined in ANS.1 specification.<br />

However, the specification still allows the use <strong>of</strong> TLV coding in number <strong>of</strong> ways at<br />

several levels when desired.<br />

Page 23


4.2.2 Applicability to UTFS Effort<br />

The ITSO specifications are very applicable to the UTFS WP4 efforts for the following<br />

reasons: • Detailed coverage for all the <strong>com</strong>ponents involved in a fare collection system<br />

• Transit industry<br />

specific messages and data elements<br />

• Smart card oriented architecture<br />

• Availablity to APTA<br />

• Easily adaptable by APTA<br />

Despite its advantages, ITSO does have some disadvantages:<br />

• ITSO has not been implemented in a public transit environment<br />

• ITSO defines Security Access<br />

Module (ISAM) currently provided through a<br />

single vendor<br />

• No support for clearing and settlement messages<br />

• Adoption <strong>of</strong> specification may cause impact on other APTA Workpackage efforts<br />

4.2.3 Common Message Structure<br />

ITSO<br />

uses the ISO/IEC/ENV 14904 model for the data messages described in the<br />

specification. Message Header:<br />

The ITSO message header (including the frame header) contains:<br />

• Message sender identification<br />

• Message recipient identification<br />

• Unique message<br />

identifier<br />

• Starting and ending<br />

sequence numbers<br />

• Stored Value<br />

deductions and additions<br />

• Message Authentication<br />

Code (MA<br />

Message Body and Transaction Data Blocks:<br />

The message body consists <strong>of</strong> ITSO Transaction Data Blocks, each <strong>of</strong> which includes the<br />

following data elements:<br />

• Sequence Number<br />

• Date and time stamp<br />

• Data, or transaction record<br />

• MAC Certificate based on the first three fields <strong>of</strong> the data block<br />

Page 24


The ITSO message body consists <strong>of</strong> individual transaction blocks,<br />

each one representing<br />

a single business transaction, or device event as illustrated in Exhibit 4.2-1.<br />

Message Header Message Frame<br />

ITSO Message Header<br />

Exhibit 4.2-1 ITSO Message<br />

Structure<br />

Frame Header Message Body<br />

Seq Time Stamp Data MAC<br />

Transaction<br />

Data<br />

Blocks<br />

Message Code Count <strong>of</strong> Destinations Destinations Data Content<br />

The<br />

data portion <strong>of</strong> the<br />

transaction data blocks is dependent upon the message type and<br />

c an be configured to send to multiple<br />

destinations. This provision allows flexibility to<br />

separate “on-us” and “not on-us” transactions at the card reader level, and route them<br />

to their respective destinations if desired. Individual transaction data blocks<br />

can<br />

transmit<br />

multiple transactions, essentially acting as a file or batch transfer<br />

<strong>of</strong><br />

information.<br />

Listed below are the parts <strong>of</strong> the Data or the transaction record <strong>com</strong>ponent <strong>of</strong> the<br />

transaction<br />

data block:<br />

• Message Code<br />

• Count <strong>of</strong> destinations<br />

• Destinations<br />

• Data content<br />

The actual data elements are contained within<br />

the data content <strong>com</strong>ponent <strong>of</strong> the<br />

tr ansaction record.<br />

4.2.4 Message Types<br />

The ITSO specification provides the data flows and processes for card issuer, product<br />

owner, and retailer and transit service provider.<br />

The specification provides for data to<br />

be directed to any <strong>of</strong> the following entities:<br />

• A single entity (HOPS)<br />

Page 25


• A number <strong>of</strong> entities<br />

• Proprietary scheme data<br />

transmission systems<br />

Every message consists <strong>of</strong> 12 standard fields with a total <strong>of</strong> 34 bytes and a set <strong>of</strong><br />

additional fields based on the type <strong>of</strong> message. Listed below are the main ITSO<br />

message types:<br />

• ITSO Shell<br />

• IPE Administration<br />

• Card Issue Records<br />

• ITSO ID<br />

• Stored Value<br />

• Charge to account<br />

• Loyalty<br />

• Predefined ticket and journey ticket<br />

• Refund<br />

• Journey Record<br />

• Exception<br />

• Miscellaneous<br />

4.2.4.1 Transaction<br />

Data<br />

Stored value use and load transactions are treated different than the non-stored value<br />

load transactions. In general, pass and ticket-book loads are treated as new product<br />

creations and require addition <strong>of</strong> product type specific data to the message. The ITSO<br />

product ty pes are illustrated<br />

in Exhibit 4.2-2.<br />

Page 26


Exhibit 4.2-2 Product Types<br />

Type Code IPE (Product) Title<br />

0 Private Entry within ITSO Directory<br />

16 ITSO ID<br />

2 Stored Value<br />

3 Loyalty Type 1<br />

4 Charge to Account<br />

17 Loyalty Type 2<br />

22 Pre-defined Ticket (Area Based)<br />

6 Pre-defined ticket with days selection and action list capability<br />

23 Pre-defined specif ic journey ticket<br />

7 Pre-defined specif ic journey ticket with multi-ride and action list capability<br />

24 Pre-defined specific journey ticket including reservation and restrictions<br />

8 Pre-defined specific journey<br />

ticket including reservation<br />

and restrictions<br />

with action list capability<br />

25 Travel related Voucher<br />

9 Travel related Vouc her with multi-use and<br />

action list capability<br />

26 Open system tolling<br />

10 Open system tolling with multi-use and action list capability<br />

In non-stored value product usage and loads, the messages are structured<br />

in the<br />

following sequence:<br />

• Common data (required)<br />

• Stored Use data (Present when the product supports free transfers)<br />

• Product Specific Data (presence dependent on product type)<br />

Product specific data includes the following additional elements to the 53-byte long<br />

<strong>com</strong>mon data that is required in the message as described<br />

in Exhibit 4.2-3.<br />

Exhibit 4.2-3 Product Specific Data<br />

Product Type Additional Bytes<br />

6,22 37 and 2 Variable Length fields<br />

7,23 59<br />

8, 24 57 and 2 variable length fields<br />

9, 25 34<br />

10,26 26<br />

4.2.4.2 Card Management Data<br />

The ITSO Shell is the ITSO application with a file structure, directory entries and a<br />

security schema loaded onto the smart card platform. The ITSO Shell transactions fall<br />

into one <strong>of</strong> the following four groups:<br />

• Creating an ITSO Shell<br />

• Activating an ITSO Shell<br />

Page 27


•<br />

Create/amend ITSO ID<br />

• Deleting an ITSO Shell<br />

The Creating ITSO Shell message would be the equivalent <strong>of</strong> an initialization message,<br />

while Activating ITSO Shell is the equivalent <strong>of</strong> an issuing transaction. The<br />

Create/Amend ITSO ID message is designed to transmit cardholder specific data (see<br />

Appendix C) and would represent both the Registration and Personalization messages<br />

<strong>of</strong> UTFS. The Interoperability List Transaction is intended to exchange operating<br />

parameters between the host and the CID. Even though the specification allows the<br />

definition <strong>of</strong> implementation specific parameter types, the following list contains the<br />

currently set-up parameter tables:<br />

• Card Type<br />

Parameters<br />

• Peak Times<br />

• Public Holidays<br />

• Transfers<br />

• Rebates<br />

• Loyalty Rules<br />

• Currency<br />

• Zone <strong>Table</strong> Reference<br />

• Zone <strong>Table</strong> Bitmap<br />

• Sale Price<br />

• Format Version Code parameters<br />

• Change Instructions<br />

4.2.4.3 System and Device Data<br />

HOPS<br />

to POST Configuration messages are designed to update or change the main<br />

devic e and application related parameters between a central system and a CID as<br />

illustrated<br />

in Exhibit 4.2-4.<br />

Exhibit 4.2-4 HOPS to POST Configuration Messages<br />

Capability Values<br />

Location 0=Not Used<br />

1=Fixed<br />

2= mobile<br />

or RFU<br />

Security 0= Not Used<br />

1=Not tamper pro<strong>of</strong>,<br />

2=Tamper Pro<strong>of</strong>,<br />

3= Tamper pro<strong>of</strong> and no radiation<br />

Communication 0= Not Used<br />

1= Offline,<br />

2=permanently online<br />

3= dial out capability,<br />

4=dial in/polled capability<br />

Page 28


Capability Values<br />

or RFU<br />

Product Priority Selection Prioritization according to a table<br />

Message Security 0=Not Used<br />

1=Messages Saved after<br />

Transmission<br />

2= Messages Not Saved after<br />

Transmission<br />

RFU<br />

Printing Capability 0=Not Used<br />

1=Receipt Printer Available<br />

RFU<br />

Cardholder Display 0=Not Used<br />

1=Display Facing Cardholder<br />

RFU<br />

Maximum Purse Value 0=Not Used<br />

1=Cannot Modify<br />

2=Can modify<br />

IPE Priority Selection 0=Not Used<br />

1=Prioritization According to<br />

parameter table<br />

2= Prioritization According to<br />

customer stated preference<br />

RFU<br />

The device level <strong>com</strong>mands are intended for very high-level device configuration<br />

settings and not for low-level device hardware status data, or parameter update.<br />

4.2.4.4 Event Data<br />

ITSO<br />

does not define any device level message types.<br />

4.2.4.5 Peer to Peer Clearing & Settlement<br />

Since<br />

the clearing and reimbursement arrangements may vary dramatically between<br />

schemes, ITSO does not define financial settlement between entities. Settlement is<br />

beyond the scope <strong>of</strong> this specification.<br />

4.2.5 Data Elements<br />

The specification provides a wide variety <strong>of</strong> data elements that represent most product<br />

types and entities <strong>of</strong>fered in Europe and North America. ITSO includes 34 fixed length<br />

standard data elements (fields) that are present in every message, and supplemented<br />

with transaction specific data based on the message type. The fields that are not utilized<br />

by a particular implementation should be “0” filled and presented in messages where<br />

required. This may create messages with lengths up to 100 bytes per message.<br />

Page 29


4.2.6 Message Sequences<br />

The structure <strong>of</strong> data within messages is designed to support error-free transmission in<br />

that steps are taken to ensure that system is able to determine that losses may have<br />

occurred or data otherwise corrupted. A positive mechanism <strong>of</strong> acknowledgement is<br />

used to guarantee error-free transmission. The recipient <strong>of</strong> the message will return<br />

a<br />

positive or negative acknowledgement <strong>of</strong> the message to the sender. If the sender<br />

receives positive acknowledgement, the original message may<br />

be deleted, or it will be<br />

retained for re-transmission. Each data block includes a certificate to validate its<br />

contents as well as to sequence the data block within a set <strong>of</strong> data blocks. A header<br />

block, containing relevant summary information, precedes each set <strong>of</strong> data blocks in all<br />

messages. Data blocks holding different types <strong>of</strong> data may be mixed without restriction<br />

in messages.<br />

4.2.7 Security Requirements<br />

The end-to-end “loss-less” transmission objective led to a design solution involving an<br />

ITSO specific SAM module (ISAM). All the <strong>com</strong>ponents that are involved in the<br />

processing <strong>of</strong> data within the system (such as card reader devices and central systems)<br />

are required to carry ISAMs accredited by ITSO. Individual transaction and batch<br />

headers are also required to contain MAC fields. Each transmitted record/data block<br />

has a certificate associated with it. The certificate is an ISAM generated MAC <strong>of</strong> the<br />

transmission<br />

block data. All records transmitted must be sequence numbered.<br />

4.2.8 Timing & Routing<br />

ITSO provides the following minimum suggested performance<br />

levels in processing<br />

back <strong>of</strong>fice transactions:<br />

• 98% <strong>of</strong> data should be received by the owner <strong>of</strong> data and processed against the<br />

IPA by 5:00 am on the day after the POST activity for that item<br />

• Remaining data should be received and processed within the following 24 hours<br />

Each<br />

HOPS must perform the following actions between midnight and 5:00 am:<br />

• Poll and collect batches from any POSTs directly under its control<br />

• Distribute not on-us transactions<br />

- Receive on-us transactions from other<br />

HOPS<br />

- Process the data<br />

4.2.9 Usability<br />

The ITSO specification requires that a central body provide the core facilities <strong>of</strong> Security<br />

Management (provision <strong>of</strong> keys), Compliance Management, Certification Service and<br />

Registrar (to register the schemes and products for provision <strong>of</strong> security keys. ITSO has<br />

Page 30


opted to contract these services out in the UK and <strong>of</strong>fered the Request For Proposals<br />

for<br />

these activities to be made available to APTA without charge if needed. ITSO<br />

representatives from UK <strong>of</strong>fered two alternative scenarios for adoption <strong>of</strong> the<br />

specification.<br />

• APTA is allowed to use and modify the current ITSO specification in any way<br />

they desire to <strong>com</strong>e up with their own specification based on ITSO. No licensing<br />

or memberships fees are required. Only the specification documents on the<br />

Internet will be available in this option, therefore APTA will have to 'reverse<br />

engineer' the SIM card Secure Application Module and the security key<br />

management service, if needed<br />

• A subset <strong>of</strong> ITSO can be formed in the US, which APTA can manage. There<br />

is no<br />

cost involved in this option. A USA implementation <strong>of</strong> ITSO under the APTA<br />

name would constitute a separate security domain and therefore all the keys<br />

would be different. APTA can therefore set its own rules. The ITSO rules will be<br />

made available to APTA to implement at will. APTA does not need to use the<br />

ITSO <strong>of</strong>ficial name or logo.<br />

Setting up an APTA equivalent to ITSO can be done as soon as their membership<br />

groups are defined and the membership is elected. This process can take approximately<br />

three months. Putting in place the (few) full-time people, the contracts and the<br />

processes raises the time estimate to at least six months. The current suppliers to ITSO<br />

(ecebs for the ISAMs, Integri for Certifcation and Royal Bank <strong>of</strong> Scotland for Security<br />

Key Management) would all be willing to supply the sub-contract services at a fee, if<br />

necessary.<br />

4.3<br />

Open Financial Exchange (OFX)<br />

4.3.1 Description <strong>of</strong> the Specification<br />

Open Financial Exchange is a specification for the electronic exchange <strong>of</strong> financial<br />

data<br />

between financial institutions, businesses and consumers via the Internet. Created by<br />

CheckFree,<br />

Intuit and Micros<strong>of</strong>t in early 1997, Open Financial Exchange supports a<br />

wide range <strong>of</strong> financial<br />

activities, including consumer and small business banking,<br />

consumer and small business bill payment, bill presentment and investments tracking<br />

(including stocks,<br />

bonds, mutual funds, and 401(k) account details). Since the 2000<br />

release <strong>of</strong> the Version<br />

2.0, OFX has be<strong>com</strong>e XML 1.0 <strong>com</strong>pliant and has added 1098,<br />

1099 and W2 tax form<br />

download capabilities. Open Financial Exchange (OFX) is a<br />

broad-based<br />

framework<br />

for exchanging financial data and instructions between<br />

customers and their financial institutions. It is based on open standards for data<br />

formatting (such as XML), connectivity (TCP/IP), and security (SSL). It defines the<br />

request and response messages used by each financial service as well as the <strong>com</strong>mon<br />

framework and infrastructure to support the <strong>com</strong>munication <strong>of</strong> those messages.<br />

Page 31


eXtensible Markup Language (XML) is a standard for the <strong>com</strong>munication<br />

<strong>of</strong><br />

information in a text format that is structured, well formed and validated against a<br />

model (schema). XML grew out <strong>of</strong> Standard Generalized Mark Up Language<br />

(SGML), a<br />

presentation-oriented language designed to display information<br />

in printed and<br />

electronic form in a wide variety <strong>of</strong> formats. Hyper Text Mark Up Language (HTML),<br />

the language <strong>of</strong> web browsers, is another cousin <strong>of</strong> XML. XML focuses on data<br />

structures and document formatting. The data can be validated for both structure and<br />

content, to whatever extent desired by the schema designer.<br />

OFX is based on XML, a “tagged” protocol, where each aggregate and data element has<br />

a name. The data is presented as a serial string, where<br />

each aggregate, or data element<br />

is preceded by a “” and followed by a ““. Naming <strong>of</strong> tags<br />

within an XML schema is <strong>com</strong>pletely up to the user, as is their organization<br />

and<br />

structure.<br />

The entire message strings can be encrypted or <strong>com</strong>pressed, or individual<br />

aggregates can be encrypted. All that is required is that both the sender and the<br />

receiver operate the same schema to define the contents<br />

<strong>of</strong> the messages. This makes<br />

<strong>com</strong>munication among different <strong>com</strong>puter architectures<br />

very simple, since they only<br />

have to agree on a character representation (normally ASCII) and a schema. Binary,<br />

Boolean, decimal and bitwise data are all represented as character data during<br />

transmission. Attributes can further define a tag’s values<br />

by permitting defaults and<br />

mandating content or enumerations <strong>of</strong> acceptable<br />

values. For example, a “rideroute”<br />

aggregate might consi st <strong>of</strong> a bus id, a route id and a direction<br />

as illustrated in Exhibit<br />

4.3-1.<br />

Exhibit 4.3-1 Example Rideroute Aggregate<br />

<br />

1456<br />

2671<br />

inbound<br />

<br />

In order to <strong>com</strong>municate among a number <strong>of</strong> parties or organizations, schemas are<br />

being standardized within many industries and groups with <strong>com</strong>mon needs. One such<br />

schema that defines tags attributes and aggregates for the financial <strong>com</strong>munity is OFX.<br />

The<br />

Open Financial Exchange specification is publicly available for implementation by<br />

any financial institution or vendor. As <strong>of</strong> September 2003, over 2400 banks and<br />

brokerages, as well as major payroll processing <strong>com</strong>panies support OFX. The latest<br />

version <strong>of</strong> OFX as <strong>of</strong> July 2004 is version 2.0.1.<br />

4.3.2 Applicability to UTFS Effort<br />

Althou gh a well-defined and widely implemented specification, OFX, in its current<br />

form, does not provide schemas that are applicable to the efforts <strong>of</strong> the UTFS.<br />

However, it certainly serves as a viable model for the development <strong>of</strong> a similar transit<br />

industry standard based on XML. Even though XML is admittedly bulky, it should<br />

Page 32


e given careful consideration for adoption as the basis for development <strong>of</strong> an<br />

interchan ge specification for transit. This will require<br />

significant efforts to define<br />

<strong>com</strong>mon elements and aggregates <strong>of</strong> the transit industry specific data elements in XML.<br />

Secondly, it requires definition <strong>of</strong> the APTA proposed message types<br />

as XML schemas.<br />

XML is widely accepted, and replacing a variety<br />

<strong>of</strong> fixed and variable format messages<br />

in other industries. With the rapid emergence <strong>of</strong> fast and efficient<br />

XML parsers,<br />

interface s<strong>of</strong>tware development is minimized. XML parsers that create and breakdown<br />

XML messages and convert them to and from<br />

internal formats are widely available.<br />

Micros<strong>of</strong>t is s trongly supporting XML throughout their s<strong>of</strong>tware products, which<br />

encourages even wider familiarity and adoption <strong>of</strong> the standard.<br />

Tags theoretically add<br />

bulk to data transmission, however,<br />

this is be<strong>com</strong>ing<br />

less significant in practice with the<br />

advent <strong>of</strong> faster and cheaper <strong>com</strong>munication networks. Also, schemas are traditionally<br />

more <strong>com</strong>plicated than message layouts but are more powerful, describing<br />

the<br />

requirements, and enumerations <strong>of</strong> values in a consistent, and standard manner.<br />

Extensibility is critical when designing a message protocol. A consistent problem with<br />

fixed and vari able format messaging is that new needs are <strong>of</strong>ten difficult to<br />

ac<strong>com</strong>modate.<br />

XML is easier to extend to new device and message needs.<br />

4.3.3 Common Message Structure<br />

Basic OFX data consists <strong>of</strong> a declaration and an OFX data block. The standard XML<br />

declaration must <strong>com</strong>e first, which includes an option to specify the version <strong>of</strong> XML<br />

being used, and options to show such things as the encoding declaration and the<br />

standalone status <strong>of</strong> the document as illustrated in Exhibit 4.3-2.<br />

Exhibit 4.3-2 Processing Instructions<br />

<br />

The OFX declaration must <strong>com</strong>e next in the file with the following attributes as<br />

described in the following list and Exhibit 4.3-3.<br />

• OFXHEADER<br />

• VERSION<br />

• SECURITY<br />

• OLDFILEUID<br />

• NEWFILEUID<br />

Page 33


Exhibit<br />

4.3-3 OFX XML Declaration Attributes<br />

<br />

The OFX data block<br />

includes a Sign-on message and optional additional messages. A<br />

message is the unit <strong>of</strong> work in OFX. It refers<br />

to a request<br />

and response pair, and the<br />

status codes as sociated with the response. For example, the message to download a<br />

bank statement consists <strong>of</strong> the request and the response . OFX<br />

uses several <strong>com</strong>mon message types to perform specific functions,<br />

which <strong>com</strong>ply with<br />

the naming conventions illustrated in Exhibit 4.3-4:<br />

Exhibit 4.3-4 OFX Naming Conventions<br />

Function Type<br />

ADD<br />

Format<br />

Request <br />

Response<br />

MODIFY<br />

<br />

Request<br />

<br />

Response<br />

DELETE<br />

<br />

Request<br />

<br />

Response<br />

CANCEL<br />

<br />

Request <br />

Response<br />

<br />

4.3.4 Message Types<br />

OFX<br />

schemas would be the equivalent <strong>of</strong> different messages as defined in the UTFS<br />

WP4 Interface Specification Functional<br />

Description. Currently, there are no publicly<br />

shared<br />

transit industry schemas. However, some <strong>of</strong> the financial industry related<br />

schemas <strong>of</strong>fer simila rities to the proposed message types and may be utilized by the<br />

UTFS.<br />

Currently, the OFX provides over 40 financial industry related schemas none <strong>of</strong><br />

which are directly applicable to UTFS.<br />

Since OFX does not <strong>of</strong>fer any transit industry specific schemas,<br />

each APTA proposed<br />

message<br />

type needs to be defined as a schema in XML. The applicability <strong>of</strong> XML<br />

schemas is illustrated in the examples provided in the following sections. The process<br />

<strong>of</strong><br />

specifying an interchange begins with an agreement about the minimum data that<br />

needs to be exchanged. The following Farecard Usage Transaction and Add Value<br />

Transaction<br />

examples are based on data elements provided for illustrative purposes.<br />

• The Farecard Usage Transaction data elements might include:<br />

- Card Number<br />

- Agency providing service<br />

- Route ID<br />

Page 34


- Transaction date and time<br />

- Transaction sequence number on card<br />

- Fare amount<br />

- Remaining balance in purse<br />

• Value add transaction data elements might include:<br />

- Card Number<br />

- Agency providing value add<br />

- Machine or<br />

terminal ID<br />

- Transaction sequence nu mber on terminal<br />

- Value add date and time<br />

- Payment method indicator (credit card, debit card, cash)<br />

- Value add amount<br />

- Transaction sequence numb er on card<br />

- New balance<br />

in purse<br />

• Settlement transaction at end <strong>of</strong> day ( one side settles<br />

to other via bank transfer)<br />

Data elements might include:<br />

- Count <strong>of</strong> rides A cards in B<br />

- Value <strong>of</strong> rides<br />

A cards in B<br />

- Count <strong>of</strong> rides B cards in A<br />

- Value <strong>of</strong> rides B cards in A<br />

- Count <strong>of</strong> value adds for A cards in B<br />

- Sum <strong>of</strong> value adds for A cards in B<br />

- Count <strong>of</strong> value adds for B cards in A<br />

- Sum <strong>of</strong> value<br />

adds for B cards in A<br />

- Net settlement money transferred (credit or debit)<br />

- Batch<br />

start date and time<br />

- Batch end date and time<br />

Each <strong>of</strong> the potential messages is the n modeled in XML, giving each tag an aggregate an<br />

appropriate name that can be used across arbitrary regional boundaries.<br />

A very small batch <strong>of</strong> transactions (two + a control total) might<br />

look like the example<br />

provided in Exhibit 4.3-5.<br />

Page 35


Exhibit 4.3-5 Example Transaction Batch<br />

<br />

<br />

6847102847615489<br />

S F Muni<br />

1265<br />

Sequence=”23643” TimeStamp=”04/23/04 16:23:06”<br />

Type=”Credit” <br />

10.00<br />

Sequence=”1021” PurseAfter=”10.75” <br />

<br />

<br />

6847102847615489<br />

S F Muni<br />

2102<br />

Sequence=”4343” TimeStamp=”04/23/04 16:27:42”<br />

1.50<br />

Sequence=”1022” PurseAfter=”9.25”<br />

<br />

< BatchControl><br />

Count=”1” Total=”10.00” <br />

Count=”1”<br />

Total=”1.50” <br />

< NetAmount>8.50CR<br />

<br />

<br />

4.3.4.2 Card Management Data<br />

OFX does not specify card management data.<br />

4.3.4.3 System and Device Data<br />

OFX does not specify system and device data.<br />

4.3.4.4 Event Data<br />

OFX does not specify event data.<br />

4.3.4.5 Peer to Peer Clearing & Settlement<br />

OFX does not specify peer-to-peer clearing and settlement data.<br />

4.3.4.5 Additional Messages Offered<br />

Not applicable to OFX.<br />

4.3.5 Data Elements<br />

Data elements fall into two main categories in OFX, “Elements” and “Aggregates”. An<br />

element is data bounded by a leading start tag and a trailing end tag. An OFX element<br />

must contain data and may not contain other elements. This is different than the more<br />

generic definition <strong>of</strong> an element in XML. An aggregate is a collection <strong>of</strong> elements<br />

and/or other aggregates. The enrollment request aggregate can be utilized to transmit<br />

Page 36


cardholder related data as in the case <strong>of</strong> Registration and Personalization messages as<br />

proposed by WP4. The structure <strong>of</strong> the ENROLLRQ aggregate is described in Exhibit<br />

4.3-6.<br />

Exhibit 4.3-6 ENROLLQ Description<br />

Tag Description<br />

<br />

Enrollment request Aggregate<br />

First Name<br />

Middle Name<br />

Last Name<br />

<br />

Address Line 1<br />

<br />

Address Line 2<br />

<br />

Address Line 3<br />

<br />

City<br />

<br />

State or Province<br />

Postal Code<br />

3-letter Country Code<br />

Daytime Phone<br />

Evening Phone<br />

<br />

E-mail<br />

<br />

Actual User ID if known<br />

<br />

ID Used for tax purposes<br />

<br />

Mother’s maiden name or other<br />

<br />

<br />

Date <strong>of</strong> birth<br />

Service activation request aggregates are utilized to start, modify, or terminate a service<br />

for<br />

an account by sending service activation requests. These requests can be utilized to<br />

represent CID/card parameter and application update messages in UTFS. The<br />

description <strong>of</strong> the activation request aggregate in OFX is illustrated in<br />

Exhibit 4.3-7.<br />

Exhibit 4.3-7 Activation Request Aggregate (ACCTRQ)<br />

Tag Description<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Account Service Request Aggregate<br />

Service Addition Aggregate<br />

Service Change Aggregate<br />

Service deletion Aggregate<br />

Service to be added/changed/deleted<br />

Page 37


For example, the element could be further defined to represent some <strong>of</strong> the<br />

transit industry related services as follows:<br />

• CARDSRV= Card services (e.g. Autoload, Balance Protection)<br />

• CIDPRMT= Device Parameter Services (e.g. Display and Audio Configuration)<br />

• CIDAPPL = Transit Application Services (e.g. Business end-<strong>of</strong>-day)<br />

Each Service aggregate above needs to be further defined<br />

for structure and content for<br />

the<br />

sub-services available underneath them. Exhibit 4.3-8 below provides an example <strong>of</strong><br />

possible elements in the card services (CARDSRV) aggregate.<br />

Exhibit 4.3-8 CARDSV Aggregate Elements<br />

<br />

TYPE = “Threshold” THRESHVAL= “10.00” LOADAMNT=”20.0 0”<br />

<br />

<br />

<br />

4.3.6 Message Sequences<br />

OFX is a client-server system where an end-user uses a client application to<br />

<strong>com</strong>municate with a server at a financial institution. The form <strong>of</strong> <strong>com</strong>munication is<br />

requests<br />

from the client to the server and responses from the server back to the client.<br />

One or more requests can be batched in a single file.<br />

4.3.7 Security Requirements<br />

The main goals <strong>of</strong> OFX security are privacy, authentication and integrity. OFX utilizes<br />

encryption to maintain privacy, certificates to identify and authenticate servers, and a<br />

cryptographic hash to assist integrity verification. With OFX, security is applied at two<br />

different levels in the message exchange process, channel level and application level.<br />

The<br />

channel level security refers to the lower level security that is implemented in the<br />

<strong>com</strong>munication layer, whereas the application level security is independent <strong>of</strong> the<br />

underlying <strong>com</strong>munication protocol and aimed at protecting the data at the user level,<br />

just like password protecting word-processing documents. Exhibit 4.3-9 illustrates how<br />

these two level security schemes are applied.<br />

Page 38


CLIENT<br />

Exhibit 4.3-9 OFX Security Schemes<br />

The password is encrypted by both the client<br />

application and the Secure Socket Layer<br />

(SSL)<br />

protocol. The web server removes the SSL encryption and forwards the<br />

encrypted password and the plaintext OFX data. The channel level<br />

security is sufficient<br />

for most transit related messages, provided that<br />

the network architecture is adequately<br />

secure. However, the application level password encryption can allow a higher level <strong>of</strong><br />

security when desired.<br />

4.3.8 Timing & Routing<br />

OFX does not provide any timing and routing requirements.<br />

4.3.9 Usability<br />

SSL ENCRYPTION<br />

OFX DATA<br />

OFX DATA<br />

WEB<br />

OFX<br />

SERVER SERVER<br />

Encrypted Encrypted<br />

Password Password<br />

The OFX board maintains<br />

the OFX specification with members from a wide industry<br />

base. Membership to OFX is free and the process required<br />

for joining the organization,<br />

depending on the work group, typically involves an informal request. There are no<br />

royalties for adapting the specification<br />

to transit. Furthermore, OFX does not require<br />

any fees for<br />

making changes and/or additions to the specification<br />

for members.<br />

Typically,<br />

it takes about six months to process and finalize a change, such as adding 10<br />

new data<br />

elements (aggregates). The process<br />

is estimated to take somewhere between<br />

9-12 months to add a new scheme such<br />

as transit fare collection. This process assumes<br />

the design and development work is <strong>com</strong>pleted by APTA. This data was obtained<br />

through phone interviews and/or email correspondence.<br />

The information is accurate<br />

as <strong>of</strong> July 2004. If APTA is interested in<br />

using any parts <strong>of</strong> the specification, formal<br />

notification and/or negotiations are necessary.<br />

Page 39


4.4 Vending Equipment Interface (VEI)<br />

4.4.1 Description <strong>of</strong> the Specification<br />

The Vending Equipment Interface (VE I) specification was developed by Agent Systems<br />

<strong>of</strong> Texas to provide a <strong>com</strong>mon interface that allows managed data exchange between<br />

central<br />

c omputing systems and vending equipment. This interface was developed<br />

for<br />

use<br />

between any type <strong>of</strong> vending<br />

equipment<br />

and central <strong>com</strong>puting environment and is<br />

operating system and manufacturer independent.<br />

The development <strong>of</strong> VEI came about as<br />

a natural response to the trend towards<br />

automation<br />

in vending equipment.<br />

Market segments that have<br />

interest in this interface<br />

include,<br />

mass transit, parking<br />

and merchandise<br />

vending. There is an increasing need<br />

for<br />

encapsulation <strong>of</strong> Electronic Financial<br />

Transaction (EFT) data in a secure manner.<br />

Along with the <strong>com</strong>mands<br />

and event data that are normally exchanged between<br />

vending<br />

equipment<br />

and a managing server, VEI <strong>of</strong>fers a vehicle for EFT data handling.<br />

The VEI specification permits the development and deployment <strong>of</strong> an integrated<br />

network <strong>of</strong><br />

vending equipment and managing servers using an open standard free <strong>of</strong><br />

proprietary<br />

restrictions. As VEI is adopted by industry, the possibility <strong>of</strong> procuring <strong>of</strong>fthe-shelf<br />

vending equipment<br />

and pre-written server s<strong>of</strong>tware applications that have a<br />

<strong>com</strong>patible<br />

messaging format increases dramatically.<br />

4.4.2 Applicability to UTFS Effort<br />

As it stands<br />

today, VEI requires considerable amount <strong>of</strong> work by the WP4 to be<br />

modeled<br />

for the UTFS efforts. Additional data elements would need to be added to<br />

t his protocol specification in order to fully support the UTFS<br />

WP4 proposed<br />

requirements<br />

and it lacks an industry wide implementation<br />

base. However, there is<br />

an inhere nt mechanism built into the<br />

specification, which involves submission and<br />

acceptanc e <strong>of</strong> proposed changes by the issuer, Agent Systems.<br />

The VEI protocol can serve<br />

as a messaging protocol between servers <strong>of</strong> different<br />

organizations (i.e. local and regional entities); however, it is not<br />

the optimal solution.<br />

Unfortunately,<br />

the use <strong>of</strong> VEI can be costly, as each service that must be re-programmed<br />

by the application developer<br />

requires layering <strong>of</strong> services. The mechanisms in VEI used<br />

to preserve data integrity and sequencing are very useful, however, they<br />

are redundant<br />

to those in an underlying transport protocol such as TCP/IP. This amounts to<br />

additional overhead in each<br />

frame and provides no real advantage when running on<br />

top<br />

<strong>of</strong> a reliable network protocol. This overhead is likely to have little influence on<br />

transaction times, as most transaction decisions (e.g. accept or reject card) are made<br />

locally between the device and the card. The biggest cost inherent with the use <strong>of</strong> VEI<br />

is<br />

the level <strong>of</strong> effort in developing and testing the protocol. Because <strong>of</strong> the <strong>com</strong>plexity<br />

<strong>of</strong><br />

additional layers, an inordinate amount <strong>of</strong> time is required to fully test and deploy a<br />

VEI solution, when <strong>com</strong>pared to XML or another simple strategy. This disadvantage<br />

Page 40


may well be eliminated if, and when, <strong>of</strong>f the shelf VEI parsers or server<br />

applications<br />

be<strong>com</strong>e<br />

available.<br />

4.4.3 Common Message Structure<br />

T he VEI protocol is similar to the OSI model, with a well-defined dialog sequence<br />

in the<br />

application layer.<br />

Each message that is a <strong>com</strong>ponent <strong>of</strong> a dialog adheres to a standard format. A message<br />

always<br />

contains a message header, followed by the body <strong>of</strong> the message (see Exhibit<br />

4.4-1). The body <strong>of</strong> the message differs for each<br />

<strong>of</strong> the six dialogs explained in the<br />

following<br />

sections. An initial message sent is referred to<br />

as the request message. A<br />

request message can have a response message returned. Also, an acknowledgement<br />

message can follow a response message.<br />

Exhibit 4.4-1 VEI Message Structure<br />

Data Link Header Transport Header Session Header<br />

Message Header:<br />

Protocol Headers Exhibit 4.4-2 further describes the message header.<br />

Message Header Message<br />

File Transfer Direction File Name<br />

File Attributes<br />

Exhibit 4.4-2 Message Header<br />

Field # Field Name Description<br />

1 Message Identifier This field specifies uniquely the dialog class and the service<br />

2 Message Type This field specifies the part <strong>of</strong> the<br />

dialog that this message<br />

constitutes. For example, request,<br />

response, or<br />

acknowledgment<br />

3 Message Sequence Number For the first request<br />

message <strong>of</strong> a dialog, its value is always<br />

one. For<br />

the first response to a request, its value is echoed<br />

back. For acknowledgments,<br />

its value is always echoed<br />

back. For subsequent requests or responses, its value<br />

increments on each message<br />

4 Dialog Sequence Number A number that the requester increments after each dialog<br />

(set <strong>of</strong> messages), but the responder and acknowledger<br />

only echo back<br />

5 Message length Number <strong>of</strong> bytes in the message, including the header,<br />

records and field separators<br />

6 Sender’s Device ID A unique number within a system that identifies the device<br />

Page 41


Field # Field Name Description<br />

that is sending the message. This may be used for return<br />

routing through a gateway<br />

7 Receiver’s Device ID A unique number within a system that identifies the<br />

device. This may be used for routing through a gateway.<br />

When messages are used in a broadcast (instead <strong>of</strong> a<br />

device-to-device connection), this field is empty<br />

8 Routing Information The type <strong>of</strong> this field is unspecified. It shall be used to<br />

further direct intermediate sites how to deliver the message<br />

to its final destination. An example<br />

usage would be the<br />

channel number <strong>of</strong> a device in a multi-drop<br />

connection<br />

9 Version The Vending Equipment Interface<br />

Specification Version.<br />

The value shall be “1.1"<br />

10 Response Needed Needed True if the sender<br />

expects a response or<br />

acknowledgment. False if not. Always false for broadcasts<br />

Message<br />

Body:<br />

The message body consists <strong>of</strong> three or four fields depending on the type <strong>of</strong> the dialogue<br />

being utilized. The details <strong>of</strong> the message body are further evaluated in the following<br />

sections.<br />

4.4.4 Message Types<br />

VEI<br />

defines six dialog classes with several services provided by each. A dialog class<br />

is a<br />

grouping <strong>of</strong> functionally similar services, which are fulfilled by sending and receiving a<br />

set<br />

<strong>of</strong> messages. The table in Exhibit 4.4-3 describes the six<br />

dialog classes <strong>of</strong>fered by<br />

VEI.<br />

Exhibit 4.4-3 Dialog Classes<br />

Dialogue Description<br />

Condition A particular circumstance or situation at a device<br />

Variable Access Access, by name, data items that are resident on the device<br />

Log Files Historic record <strong>of</strong> events and other archived information that can be used to<br />

determine a sequence <strong>of</strong> events at the device<br />

File Management Allows remote access to file systems<br />

Transaction Support use<br />

<strong>of</strong> credit/debit cards as a payment medium at the vending<br />

equipment<br />

Program Execution Action or set <strong>of</strong> actions to be carried out by the device<br />

4.4.4.1 Transaction Data<br />

Condition dialogues are best suited for Transaction Data messages proposed by WP4.<br />

A condition dialogue is used to report a particular circumstance, or a situation at a<br />

device, such as an intrusion alarm, a <strong>com</strong>ponent failure, or a sale <strong>of</strong> a product.<br />

Ac<strong>com</strong>panying attributes might include for example the time <strong>of</strong> day, the value <strong>of</strong><br />

products<br />

sold, or the method <strong>of</strong> payment. The structure <strong>of</strong> the condition dialogue is<br />

contained<br />

in Exhibit 4.4-4.<br />

Page 42


Exhibit 4.4-4 Condition Dialogue Structure<br />

Field Description <strong>of</strong> Field/Attributes<br />

1 Message Header<br />

2 Condition Attributes<br />

3 Additional Attributes<br />

By incorporating the relevant Additional Attributes (Full list <strong>of</strong> attributes can be found<br />

in Chapter 17 <strong>of</strong> the specification), the conditional dialogue can be configured to<br />

ac<strong>com</strong>modate the Farecard Usage and Add Value Transactions as proposed by WP4.<br />

4.4.4.2 Card Management Data<br />

Variable access dialogue can be utilized for Financial Audit Data and Negative List<br />

messages. Variable access dialogues are related to accessing, by name, data items that<br />

are resident on the device. A variable is a data item that can assume any one <strong>of</strong> a set <strong>of</strong><br />

values. The Variable Access dialogue structure is illustrated in Exhibit 4.4-5.<br />

Exhibit 4.4-5 Variable<br />

Access Dialogue Structure<br />

Field Description <strong>of</strong> Field/Attributes<br />

1 Message Header<br />

2 List <strong>of</strong> Variable Names<br />

3 Variable Value List<br />

By adding the relevant Variables indicated in the field three <strong>of</strong> the message (Full list <strong>of</strong><br />

variables<br />

can be found in Chapter 17 <strong>of</strong> the specification), the Variable dialogue can be<br />

configured to ac<strong>com</strong>modate the Negative List and Financial Audit Data messages as<br />

proposed by WP4.<br />

File management dialogues allow remote access to file systems on the devices and are<br />

structured as illustrated in Exhibit 4.4-6.<br />

Exhibit 4.4-6 File Management Dialogue Structure<br />

Field Description <strong>of</strong> Field/Attributes<br />

1 Message Header<br />

2 File Transfer Direction<br />

3 File Name<br />

4 File Attributes<br />

The File Management dialogue can be formatted to ac<strong>com</strong>modate certain WP4 Card<br />

Management Data and System and Device Data messages (Appendix B). This can be<br />

achieved by incorporating the appropriate File Attributes (Full list <strong>of</strong> attributes can be<br />

found in Chapter 17 <strong>of</strong> the specification) into the dialogue.<br />

Page 43


4.4.4.3 System and Device Data<br />

Most <strong>of</strong> the system and device data messages can be represented with the Condition,<br />

Variable and the File Management Dialogues as explained in the previous sections.<br />

However,<br />

Program Execution Dialogue is the most suitable for Device Command<br />

messages. A Program Execution is an action or set <strong>of</strong> actions to be carried out by the<br />

CID. The format <strong>of</strong> this dialogue is illustrated in Exhibit 4.4-7.<br />

Exhibit 4.4-7 Program Execution Dialogue<br />

Field Description <strong>of</strong> Field/Attributes<br />

1 Message Header<br />

2 Program Needing Input<br />

3 Program Producing Output<br />

4 Program Name<br />

5 Parameter List<br />

Program Name is the same format as the File Name explained in the previous section.<br />

The Parameter List consists <strong>of</strong> parameters that are unspecified and in ASCII Text<br />

forma t.<br />

4.4.4.4 Event Data<br />

The event data messages are represented by Condition Dialogues (Appendix B).<br />

4.4.4.5 Peer to Peer Clearing & Settlement<br />

The VEI does not define any clearing and settlement related messages.<br />

4. 4.5 Data Elements<br />

Wh ile V EI was not designed with smart cards in mind, it is a flexible protocol and can<br />

be extended to include smart card related data elements. It is also possible to define<br />

implementation<br />

specific data types within the protocol when used within a closed<br />

system; although the greatest benefit is obtained by using VEI in its standard identifiers.<br />

4.4.6 Message Sequences<br />

The VEI provides a simple structure <strong>of</strong> dialogue exchanges between a requester and a<br />

responder. A dialog consists <strong>of</strong> a request message, a response message( s) and<br />

sometimes<br />

an acknowledgement <strong>of</strong> the response(s). A request message with or without<br />

data may require a response at the discretion <strong>of</strong> the requester. A response message that<br />

contains data may require an acknowledgement, at the discretion <strong>of</strong> the responder.<br />

However,<br />

some responses contain no data and act as acknowledgements. In this case<br />

no<br />

separate acknowledgement message is required.<br />

Page 44


4.4.7 Security Requirements<br />

The Message Sequences and Data Integrity requirements<br />

from the Applicability Matrix<br />

are<br />

supported natively within VEI via the Agent Transport Layer (ATL). The transport<br />

layer is entrusted with end-to-end data integrity achieved by retransmitting <strong>of</strong> lost<br />

blocks and discarding duplicated blocks. This layer is also in charge <strong>of</strong> sequence<br />

control to ensure that the higher levels <strong>of</strong> the protocol receive packets in the<br />

exact order<br />

in which they were sent. The ATL achieves this integrity and sequencing by assigning a<br />

sequence number to each block and acknowledging<br />

blocks by sequence number at the<br />

message<br />

level.<br />

The<br />

Authentication and Encryption requirements from the Applicability Matrix are<br />

supported by VEI via the Agent Session Layer (ASL). The session layer handles<br />

identification,<br />

authentication and optional <strong>com</strong>pression and encryption <strong>of</strong> messages.<br />

Any time a connection is established, it must successfully<br />

exchange the identification<br />

and<br />

authentication messages before normal <strong>com</strong>munication can continue. If messages<br />

are sent without the identification/authentication,<br />

the receiver must disconnect, and<br />

optionally<br />

attempt to reconnect.<br />

4.4.8 Timing & Routing<br />

VEI<br />

leaves timing and routing <strong>of</strong> the messages to the discretion <strong>of</strong> implementing<br />

organization.<br />

4.4.9 Usability<br />

The VEI specification is available for public use without any patent<br />

and copyright<br />

requirements.<br />

Based on a phone interview with Agent Systems, APTA can take any, or<br />

all parts <strong>of</strong> it for its individual use. However, if APTA desires to adapt the VEI<br />

specification<br />

in its entirety and request for changes and additions, these modifications<br />

will be handled by Agent Systems for a consulting fee.<br />

This data was obtained through<br />

phone<br />

interviews and/or email correspondence. The information is accurate as <strong>of</strong> July<br />

2004. If APTA is interested in using any part <strong>of</strong> the specification,<br />

formal notification<br />

and/or<br />

negotiations are necessary.<br />

Page 45


4.5 CEN TC278 – Interoperable Public Transport Fare Management System<br />

Architecture (IFMSA)<br />

4.5.1 Description <strong>of</strong> the Standard<br />

CEN TC278 provides the basis for the development <strong>of</strong> a multi-operator/multi-modal<br />

interoperable<br />

Public Transport Fare Management System (IFM). The IFM system<br />

provides a reference functional architecture for electronic fare payment systems and<br />

identifies<br />

requirements that are relevant to ensure interoperability between the entities<br />

in the system.<br />

The IFM system addresses all the functions involved in the fare management<br />

process<br />

including:<br />

• Management <strong>of</strong> application(s)<br />

• Management <strong>of</strong> products<br />

• Security management<br />

• Customer management<br />

• Inspection/enforcement<br />

• Reporting and monitoring<br />

When<br />

<strong>com</strong>pleted, this standard will <strong>com</strong>prise several parts; currently only Part 1 is<br />

available in draft format. Part 1 describes the following main elements:<br />

• Identification <strong>of</strong> the different functional entities in relation to the overall fare<br />

management system<br />

• Definition <strong>of</strong> a generic model <strong>of</strong> IFM system describing the logical and<br />

functional architecture and the interfaces within the system and with other IFM<br />

systems<br />

• Use cases describing the interactions and data flows between the entities<br />

• Definition <strong>of</strong> the security requirements<br />

4.5.2 Applicability<br />

to UTFS Effort<br />

Although IFM provides a well-defined<br />

model for the management <strong>of</strong> an interoperable<br />

transit fare collection system, it is an in<strong>com</strong>plete draft as <strong>of</strong> today. In its current<br />

form,<br />

IFM is a high level document and does not include the<br />

level <strong>of</strong> detail that APTA is<br />

looking for and therefore is not applicable to APTA’s scope <strong>of</strong> work.<br />

On a higher level, this document is useful in defining the <strong>com</strong>ponents and entities<br />

involved in an electronic fare payment system as illustrated in Exhibit 4.5-1.<br />

Page 46


Application<br />

Retailer Product<br />

Retailer<br />

Custome<br />

r<br />

Exhibit 4.5-1 IFM Components<br />

Product<br />

Owner<br />

Customer<br />

Service<br />

Applic Application ation<br />

Owner<br />

Collection<br />

&<br />

Forwarding<br />

Service<br />

Operator<br />

Security<br />

Manager<br />

Registrar<br />

Roles and responsibi lities <strong>of</strong> each entity and the flow <strong>of</strong><br />

information between entities<br />

have clearly been defined on a summary level. Lower level details <strong>of</strong> the interfaces<br />

between entities are to be addressed by up<strong>com</strong>ing parts<br />

<strong>of</strong> the standard.<br />

4.5.3 Common Message Structure<br />

IFM does not specify <strong>com</strong>mon message structure in its current form.<br />

4.5.4 Message Types<br />

IFM<br />

does not specify message types in its current form.<br />

4.5.4.1 Transaction Data<br />

IFM does not specify transaction data in its current form.<br />

4.5.4.2<br />

Card Management Data<br />

IFM does not specify card management data in its current form.<br />

4.5.4.3 System<br />

and Device Data<br />

IFM does not specify system and device data in its current form.<br />

4.5.4.4 Event Data<br />

IFM<br />

does not specify event data in its current form.<br />

Page 47


4.5.4.5 Peer to Peer Clearing & Settlement<br />

IFM does not specify peer-to-peer clearing and settlement in its current form.<br />

4.5.5 Data Elements<br />

IFM does not specify data elements in its current form.<br />

4.5.6 Message Sequences<br />

IFM<br />

does not specify message sequences in its current form.<br />

4.5.7 Security Requirements<br />

IFM<br />

does not specify security requirements in its current form.<br />

4.5.8 Timing & Routing<br />

IFM<br />

does not specify timing and routing in its current form.<br />

4.5.9 Usability<br />

IFM is not usable<br />

by APTA in its current form.<br />

4.6 Cubic Transportation System (CTS) CID EDGE<br />

INTERFACES<br />

4.6.1 Description <strong>of</strong> the Specification<br />

This document is based on CTS's suggestions for future RIS based “CID to Back End”<br />

System<br />

protocols and not meant to represent any <strong>of</strong> Cubic's existing implementations.<br />

Data elements defined by the Edge Interfaces are based on RIS Part 03 v1.1 data formats<br />

and still subject to change by APTA UTFS WG1.<br />

4.6.2 Applicability to UTFS Effort<br />

CID<br />

Edge Interfaces defined messages are directly applicable to the WP4’s efforts<br />

since messages have been based on transit industry related smart<br />

card data. However,<br />

this<br />

specification lacks real life implementation. The document’s <strong>com</strong>pliance with the<br />

UTFS Workpackage 1 defined card data structure would simplify the additional work<br />

necessary<br />

by WP4.<br />

4.6.3 Common Message Structure<br />

CID Edge Interfaces’ message structure consists <strong>of</strong> a header followed by individual sub-<br />

groups<br />

and a MAC. The description and structure <strong>of</strong> the header is illustrated in Exhibit<br />

4.6-1.<br />

Page 48


Exhibit 4.6-1 CID Edge Interface Message Header Structure<br />

Sequence Name Data Type Range Description<br />

1 Header<br />

[..]<br />

1.1 Transtype<br />

1.2 date-time DATETIM<br />

E<br />

1.3 Normalorenhanced<br />

1.4<br />

Transstatus<br />

UBYTE 0=Reserved<br />

1=PICC Initialized<br />

2=PICC Issued<br />

3=PICC Negative<br />

Listed/Disabled<br />

4=Value Product<br />

Add/Deduct<br />

5=Pass Product Load<br />

6= Pass Product<br />

Remove<br />

7=Product/ s<br />

Validation/Use<br />

UBYTE 0 - Normal Transaction<br />

1 - Data Enhancement<br />

Transaction<br />

UBYTE 0=Normal<br />

1=Not confirmed by<br />

PICC<br />

Type <strong>of</strong> Transaction:<br />

1-Transmitted on PICC Initialization<br />

2-Transmitted on PICC Issue<br />

3-Transmitted on PICC Negative<br />

Listing<br />

4-Transmitted on Value add, deduct,<br />

or Autoload/Auto-unload<br />

5-Transmitted on Product Load or<br />

Autoload<br />

6-Transmitted on Product un-load or<br />

Auto-unload<br />

7-Transmitted on Product/s [Pass<br />

&/or SV/Purse] Validations & Uses<br />

Device’s Date and Time <strong>of</strong> this<br />

transaction. Seconds since Jan 1 1970<br />

Indicates a Data Enhancement<br />

transaction.<br />

This contains the<br />

transmission <strong>of</strong> the PICC’s previous<br />

Transaction Details<br />

Status <strong>of</strong> the transaction. This field can<br />

be used to identify whether the write<br />

to the card was confirmed or not.<br />

Optional - not available for an<br />

Enhancement Transaction<br />

The body <strong>of</strong> a message consists <strong>of</strong> a series <strong>of</strong> sub-groups. Each sub-group contains<br />

individual data elements with similar functional characteristics such as the CID Details<br />

and the Location Details as listed in Appendix C.<br />

4.6.4 Message Types<br />

CID Edge Interfaces currently defines the following six message types that can serve<br />

a model for device to backend data exchange:<br />

• PiccUse<br />

• PiccPurseLoad<br />

• PiccPassLoad<br />

• PiccInitialize<br />

• PiccNegativeList<br />

• PiccAutoLoadUnloadList<br />

Page 49<br />

as


4.6.4.1 Transaction Data<br />

The PiccUse message consists <strong>of</strong> 10 sub-groups to represent the Farecard Usage<br />

Transaction as proposed by WP4. Both the PiccPurseLoad, and the PiccPassLoad<br />

messages are equivalent <strong>of</strong> the Add Value Transaction Data message.<br />

4.6.4.2 Card Management Data<br />

The PiccInitialize message is designed to exchange data related to card issuance and<br />

initialization,<br />

and would be <strong>com</strong>parable to the Initialization and Issuance message types<br />

as proposed by WP4. Both PiccNegativeList and PiccAutoLoadUnloadList messages<br />

would be the equivalents <strong>of</strong> Negative List and Action List message types respectively.<br />

4.6.4.3 System and Device Data<br />

This<br />

specification does not define any system and device data category messages.<br />

4.6.4.4 Event Data<br />

The CID Edge Interfaces does not define any event data category messages.<br />

4.6.4.5 Peer to Peer<br />

Clearing & Settlement<br />

The CID Edge Interf aces does not define any clearing and settlement data category<br />

messages.<br />

4.6.4.6 Additional Mes sages Offered<br />

The<br />

CID Edge Interfaces does not define any additional messages.<br />

4.6.5 Data Elements<br />

Most messages consist <strong>of</strong> constructed type data elements called sub-groups. Each subgroup<br />

includes one or more individual data elements. The type and format <strong>of</strong> the data<br />

elements follow those defined in the RIS Part 03 v1.1 data formats.<br />

4.6.6 Message Sequences<br />

The CID Edge Interfaces does not define message sequences.<br />

4.6.7 Security Requirements<br />

The CID Edge Interfaces defines MAC to be appended to the end <strong>of</strong> every message and<br />

ensures the integrity <strong>of</strong> the message between a sender and a recipient.<br />

Page 50


4.6.8 Timing and Routing<br />

The CID Edge Interfaces does not define timing or routing requirements.<br />

4.6.9 Usability<br />

CID Edge Interfaces is under development by CTS. APTA can openly<br />

review the CID<br />

Edge Interface documentation and make changes, or use it as a model, without any cost<br />

and intellectual property rights. Since the CID Edge Interfaces is not a living<br />

specification or standard, there is no managing body or organization.<br />

Therefore, there<br />

is no change process, cost, or timeline other than the one APTA would like to undertake<br />

at its own discretion. This data was collected in phone interviews and/or email<br />

correspondence. The data is accurate as <strong>of</strong> July 2004. If APTA is interested in using any<br />

parts <strong>of</strong> the documentation, formal notification should take place.<br />

.7 TRANSLINK ®<br />

4<br />

4.7.1 Description <strong>of</strong> the Specification<br />

The Metropolitan Transportation Commission (MTC) and several San Francisco Bay<br />

Area transit agencies are currently implementing TransLink<br />

t rail, <strong>com</strong>muter rail and ferry services<br />

rovided by multiple operators throughout the Bay Area.<br />

®, a regional fare collection<br />

program for public transit in the Bay Area. TransLink ® cardholders can use a single<br />

smart card to utilize bus, heavy rail, ligh<br />

p<br />

The contractor, ERG Group, is providing a full range <strong>of</strong> cardholder customer services<br />

and financial clearing and settlement among participants. Customer services include<br />

a<br />

live<br />

operator help desk, 24-hour automated customer service, registration for Autoload<br />

and balance protection and card distribution services.<br />

The TransLink ® card is an ISO 14443 Type B smart<br />

card containing both contact and<br />

contac tless interfaces. TransLink ® cardholders place their card within range <strong>of</strong> a card<br />

interfa ce device (CID) onboard a vehicle or at<br />

a station platform. The CID automatically<br />

deducts the correct fare, calculating transfers and<br />

appropriate senior, disabled and<br />

you th discounts.<br />

The TransLink ers dedicated to<br />

®<br />

® Fare Payment System (FPS) consists <strong>of</strong> separate ti<br />

specific processing tasks required by the TransLink scheme. When a patron uses a<br />

smart card at any TransLink ® device, usage data (UD) is created and uploaded through<br />

the TransLink ® network to the central system.<br />

There are four major tiers within the TransLink stem:<br />

® cility (TCF)<br />

m (HCS)<br />

® Sy<br />

• TransLink Central Fa<br />

• Headquarters Computer Syste<br />

• TransLink ® Data Server (TDS)<br />

Page 51


• Front-end devices<br />

4.7.2 Applicability to UTFS Effort<br />

TransLink<br />

modate the unique fare and business<br />

le structures <strong>of</strong> at least 26 participating transit agencies. It currently supports majority<br />

<strong>of</strong> the fare t t the US public transit industry. Of all the<br />

ocuments analyzed, this specification is the only one that is based on an actual<br />

d<br />

® is the first smart card based regional transit fare payment system in the<br />

United States. The system is designed to ac<strong>com</strong><br />

ru<br />

produc ypes that are available in<br />

d<br />

implementation. There is a one to one match between most <strong>of</strong> the TransLink UD an<br />

WP 4 message types.<br />

ERG stated that the APTA-000 specifications analyzed in the Section 4.9 <strong>of</strong> this<br />

document will supercede the Phase I TransLink document analyzed below, and<br />

represent<br />

the foundation <strong>of</strong> the Translink Phase II messages.<br />

4.7.3 Common Message Structure<br />

The TransLink ® message structure consists <strong>of</strong> a header followed by a UD record, which<br />

contains the tr ansaction specific usage data as illustrated<br />

in Figure 4.7-1. The structure<br />

is designed to allow bat ch transmission <strong>of</strong> multiple card transactions or event data<br />

under a sin gle header. The UD record consists <strong>of</strong> 18 sub fields, which include both<br />

financial and non-financial transaction data and support VEI data structures by<br />

utilizing VEI log file dialogs.<br />

Header<br />

Version<br />

Header<br />

Header<br />

Length<br />

Card<br />

SN<br />

Transaction<br />

Sequence<br />

Batch<br />

Sequence<br />

Contract<br />

ID<br />

Operator<br />

ID<br />

Exhibit 4.7-1 TransLink ® Usage Data Records<br />

Header UD RECORD<br />

Contract<br />

SN<br />

4.7.4 Message Types<br />

Security<br />

Module<br />

ID<br />

Contract<br />

Sequence<br />

#<br />

Device<br />

ID<br />

Contract<br />

Sync<br />

#<br />

Payment<br />

Method<br />

Key UD UD<br />

Version<br />

NO<br />

Transaction<br />

Qualifier<br />

MAC Header<br />

Version<br />

Amount<br />

Operator<br />

ID<br />

Sequence<br />

#<br />

Date<br />

and<br />

Time<br />

Location Balance<br />

UD<br />

Type<br />

Last<br />

Add<br />

Value<br />

Summary<br />

The TransL ink transactions fall into one <strong>of</strong> the following six UD types:<br />

®<br />

• Fare Transaction<br />

• Add Value Transaction<br />

• Card Management Events<br />

• Device Events<br />

• Audit Register Snapshots<br />

UD<br />

Sub-<br />

Type<br />

Card<br />

Sync<br />

No<br />

UD<br />

Version<br />

Each UD type is further divided into subtypes within them as listed in Appendix B.<br />

Page 52<br />

Fare<br />

Category<br />

Usage<br />

Data<br />

Destination<br />

Location<br />

MAC<br />

MAC


4.7.4.1 Transaction Data<br />

The “Fare Transaction” UD record is generated by card reader devices and can be<br />

considered the equivalent <strong>of</strong> the “Farecard Usage Transaction” as proposed by the<br />

WG4. Different subtypes <strong>of</strong> the Fare Transaction record are defined as follows:<br />

• Single-tag fare payment, ride destination unknown<br />

• Dual-tag entry transaction,<br />

maximum fare deducted (purse debit)<br />

• Dual-tag exit transaction,<br />

fare adjustment (purse rebate)<br />

• Dual-tag entry transaction, no fare deduction<br />

• Dual-tag exit transaction, fare payment<br />

• Single-tag fare payment, known ride destination<br />

Two record subtypes are defined for a single-tag system. One subtype is generated<br />

when<br />

the reader does not know the destination, and the other subtype is generated<br />

when the reader device obtains the destination location from either the driver console<br />

or the patron.<br />

Using<br />

a card in a dual-tag system results in two Fare Transaction UD records being<br />

genera ted. A dual-tag entry transaction (maximum fare deducted) record is generated<br />

at the start <strong>of</strong> a ride on an open two-tag system, with a matching dual-tag exit<br />

transaction (fare adjustment) record being generated at then end <strong>of</strong> the ride. Similarly, a<br />

dual-tag entry transaction (no fare deduction) record will be generated at the start <strong>of</strong> a<br />

ride on a closed-barrier two-tag system, matched by a dual-tag exit transaction (fare<br />

payment) record at the end <strong>of</strong> the ride.<br />

An “Add Value Transaction” UD record, the equivalent <strong>of</strong> WG4 proposed Add Value<br />

Transaction Data message, is generated by all devices that add value to TransLink<br />

cards. The following record subtypes reflect the variances in the payment method:<br />

• Cash payment at a Ticket Office Terminal (TOT) or Add Value Machine (AVM)<br />

• Check payment at a TOT<br />

• Credit card payment at a TOT or AVM<br />

• Debit card payment at a TOT or AVM<br />

• Periodic Autoload at a reader device<br />

• ThresholdAutoload at a reader device<br />

• Remote re-load at a reader device<br />

• Remote load <strong>of</strong> a new pass or ride book at a reader device<br />

Tra L udit register snapshots. Audit<br />

gisters are non-resettable counters and accumulators used within the TransLink ®<br />

ns ink<br />

it<br />

® also provides a separate message type for a<br />

re<br />

system to give an independent method <strong>of</strong> verifying UD <strong>com</strong>pleteness. Different aud<br />

register snapshot subtypes are defined as follows:<br />

• CID audit registers<br />

Page 53


• Driver console audit registers<br />

• Distribution device audit registers<br />

CID audit registers specifies the audit registers maintained by all the CID devices<br />

and<br />

other devices that use the TransLink r<br />

mote loading <strong>of</strong> value onto the card. The driver console audit registers and the<br />

console<br />

® card for payment, or support autoloading o<br />

re<br />

distribution device audit registers specify the registers maintained by driver<br />

devices and distribution devices respectively.<br />

4.7.4.2 Card Management Data<br />

® <strong>of</strong>fers card management event UD records (Type 3) that are generated in<br />

sponse to an exception or a specific event occurred on a TransLink ® card. There is a<br />

one-to-on be e WG4 proposed message<br />

pes. TransLink ® TransLink<br />

re<br />

e match tween the TransLink<br />

also <strong>of</strong>fers additional card management event messages as listed in<br />

® messages and th<br />

ty<br />

Exhibit 4.7-2.<br />

Exhibit 4.7-2: TransLink ® Additional Card Management Messages<br />

Sub Type Description<br />

1 Product block/unblock<br />

2 Product block/unblock<br />

3 Card block/unblock at Ticket Office Terminal (TOT)<br />

4 Card block via hotlist<br />

5 Card Validation failure<br />

6 Card <strong>com</strong>munication failure<br />

7 Business rules rejected transaction<br />

8 Reserved<br />

9 Autoload failed<br />

10 Not used<br />

11 Autoload enabled/disabled<br />

12 Fare Category Changed<br />

13 Card Issue<br />

14 Card Registration<br />

15 Card de-registration<br />

16 Balance protection<br />

17 Card Retention<br />

18 Pass-back condition cleared<br />

19 Overstay Condition cleared<br />

20 EFT Transaction Reversal<br />

Page 54


4.7.4.3 System and Device Data<br />

The data that customizes TransLink e in<br />

le<br />

re<br />

® device s<strong>of</strong>tware operation to support the devic<br />

a specific operational context is referred to as “Configuration Data” (CD). The CD<br />

includes all s<strong>of</strong>tware <strong>com</strong>ponents that are transferred to the device as downloadab<br />

files including device application s<strong>of</strong>tware executable images and parameters. There a<br />

three main types <strong>of</strong> CD:<br />

• Common CD<br />

• Device specific CD<br />

• Operator specific CD<br />

Common CD contains data elements that apply to all TransLink devices for all<br />

perators in the system such as system parameters and hotlists. System parameters<br />

a<br />

®<br />

o<br />

have potentially different values for different operators. All devices supporting<br />

particular operator will be loaded with the same system parameters.<br />

Device specific CD depends as much on a devices internal s<strong>of</strong>tware design, as on the<br />

external<br />

functional requirements it supports. A sample <strong>of</strong> the device specific CD<br />

payloads is as follows:<br />

• TOT, AVM, DC, HCR and CID parameters<br />

• Action List<br />

• Contracts<br />

• Transfers<br />

• Calendar<br />

• Fare Patterns<br />

• Fare Code Matrix<br />

• Fare <strong>Table</strong><br />

• Max Fare <strong>Table</strong><br />

• Routes<br />

• Zone <strong>Table</strong><br />

• UI Resources<br />

4.7.4.4 Event Data<br />

TransLink ® system generates device event UD records in response to non-card related<br />

device actions and changes <strong>of</strong> state. Event data messages consist <strong>of</strong> three subtypes:<br />

• Subtype 1 – Simple event with no additional information<br />

• Subtype 5 – Device event with status information<br />

• Subtype 16 – Device event with additional data<br />

Subtype 1 is designed to report only the event code together with the standard UD<br />

record header in order to specify the event. Device simple events are usually non-<br />

Page 55


emergency routine activities (e.g. start <strong>of</strong> business day, end <strong>of</strong> business day, operator<br />

logged-on, device access door opened), that will serve as the diary for device actions.<br />

Subtype 5, device event with status, conveys more information about an event in the<br />

device. The event code is supplemented with a status field, as well as the standard<br />

UD<br />

record header fields. This type <strong>of</strong> message is used to report information on<br />

configuration<br />

errors, with the additional status field providing type <strong>of</strong> the error.<br />

The<br />

device event with data messages, Subtype 16, has a variable amount <strong>of</strong><br />

ac<strong>com</strong>panying data. In addition to specifying the underlying event, this UD record<br />

provides additional details. For<br />

example, where “valid maintenance card presented” is<br />

a device event code, “Card Serial Number” would be the additional event data that is<br />

sent in the UD. The interpretation <strong>of</strong> the data is specific to a particular event being<br />

reported.<br />

4.7.4.5 Peer-to-Peer Clearing and Settlement<br />

TransLink ® does not provide any messages for peer-to-peer clearing. The system is<br />

designed and implemented based on a regional settlement approach.<br />

4.7.4.6 Additional Messages Offered<br />

TransLink ® does not define any additional messages.<br />

4.7.5 Data Elements<br />

Listed below are the standard data types used to represent TransLink<br />

tion data:<br />

® card data, usage<br />

data and configura<br />

• ASCII<br />

• Bitmap<br />

• Binary<br />

TransLink<br />

lements is provided in Appendix C)<br />

® data elements cover a majority <strong>of</strong> the data elements supported by the UTFS<br />

Workpackage 1. (A full list <strong>of</strong> data e<br />

4.7.6 Message Sequences<br />

Not part <strong>of</strong> the documents reviewed.<br />

4.7.7 Security Requirements<br />

To achieve high data integrity both parties involved in a <strong>com</strong>munication session<br />

authenticate each other through three-pass authentication scheme using MAC.<br />

Page 56


Following the authentication process a session<br />

key is generated for each transmission.<br />

All data transfers are also encrypted against eavesdropping.<br />

4.7.8 Timing<br />

and Routing<br />

The TransLink ® system architecture i l structure with the TransLink ®<br />

Central System (TCS) at the top. The T d to all platforms at the next tier<br />

rough Headquarter Computer Systems (HCS). An HCS has connections to, and<br />

anages many TransLink ® s a hierarchica<br />

CS is connecte<br />

th<br />

m<br />

Data Servers (TDS). The TDS manages one or more Card<br />

Interface Devices (CID)<br />

or Distribution Devices (AVM).<br />

Each node at a tier in the system <strong>com</strong>municates to all subordinate nodes and has a<br />

single connection to the next higher tier. This requires all transactions in the TransLin<br />

Fare Payment System (FPS) to be transported through each processing tier before<br />

arriving at the TCS. The processing requirements <strong>of</strong> each level<br />

determine what<br />

transactions<br />

are filtered and formatted into database structures.<br />

All messages<br />

must be forwarded to a higher<br />

level until they reach the TCS. For<br />

example, a message generated at a device is submitted<br />

to the TDS then forwarded to the<br />

HCS. The HCS then has the responsibility for sending<br />

its transactions to the TCS.<br />

provides four different date definitions in operation cycle as follows:<br />

TransLink ®<br />

• Operating<br />

Date<br />

• Business<br />

Date<br />

• Reconciliation Date<br />

• Settlement<br />

Date<br />

T he current operating date is a date tha t may be different from the current calendar<br />

date. For example, the current cal endar date may already be 18 February<br />

2004, at 1:00<br />

am, but the current operating date is still 17 February 2004 because the operating<br />

date<br />

changes eve ry day at 3:00 am.<br />

The transaction business date is generated by a device, and added to the transaction<br />

at<br />

the TDS level. It is the current operating date <strong>of</strong> the device or TDS acquiring the device<br />

UD. Typically, business dates reflect the operational business date <strong>of</strong> a transit<br />

operator—the<br />

period <strong>of</strong> their normal daily business hours. For example, if a transit<br />

oper ator operates from 6:00 am to 2:00<br />

am, (their business day), the business date<br />

changeover will occur at 2:00 am. This allows the system to generate operational reports<br />

that reflect transaction/passenger loads tied to their operational schedules. The<br />

business date usually is applied at the devices or the TDS because these nodes typically<br />

operate <strong>of</strong>fline. The business date is typically incremented during the<br />

transit operator<br />

end-<strong>of</strong>-day<br />

process.<br />

The reconciliation date is added to the transaction<br />

at the transit operator level. It is the<br />

current operating date on the transit<br />

operator’s central system. This date is used to<br />

Page 57<br />

k ®


econcile between the Central Clearinghouse (CCH), acquirer, and the transit operator<br />

systems. This date stamp is applied when the transaction is received by the TCS and<br />

used for re conciliation. This allows for more direct reconciliation between<br />

the TCS and<br />

the CCH/I ssuer than would be possible<br />

with the business date.<br />

The settlement date is added<br />

to the transaction at the CCH. It is the current<br />

operating<br />

date on the CCH system. This is the date used to perform daily CCH financial<br />

operations related to distribution <strong>of</strong> funds.<br />

4.7.9 Usability<br />

As <strong>of</strong> the production date <strong>of</strong> this report, no response<br />

has been received from the<br />

owners’ <strong>of</strong> this specification.<br />

4.8 ERG APTA SPECIFICATIONS<br />

4.8.1 Description <strong>of</strong> the Specification<br />

ERG APTA Sepcifications consist <strong>of</strong> 3 documents which are based on the evolution <strong>of</strong><br />

the TransLink rk in Hong Kong, Rome, Las Vegas<br />

and Singa<br />

device central<br />

® specification and ERG’s similar wo<br />

pore. These documents provide information<br />

on message specifications from<br />

level to regional system.<br />

The first document, APTA-001 , “Device to Higher Level Computer Data Elements/Messaging<br />

Specifications”, provides the APTA WG4 equivalent transaction definitions. The second<br />

document, APTA-002 “APTA Base Types Re<strong>com</strong>mendation”,<br />

defines data types for the<br />

message content and <strong>com</strong>pliments<br />

the APTA-001. The third document, APTA-003<br />

APTA T ransaction and CD Security,<br />

defines the requirement for the "security"<br />

mechanisms to be implemente d in the message exchange between the devices and the<br />

backend systems.<br />

The ERG Business Model is based on the principle that there exists a contract between<br />

system s participants and the regional scheme manager. The contact represents a<br />

registration to the scheme and regulates rights, business rules and obligations <strong>of</strong> the<br />

respective participants. The transit operators, as participants, accept fare payment from<br />

valid cards <strong>of</strong> the scheme at face value and clear<br />

and settle the transaction data through<br />

the regional central<br />

clearinghouse.<br />

4.8.2 Applicability to UTFS<br />

Effort<br />

ERG APTA specifications have been based on ERG’s implementations <strong>of</strong> smart card<br />

based fare collection systems around the world. The specifications provide a wide<br />

variety <strong>of</strong> data elements designed to en<strong>com</strong>pass the most fare product types <strong>of</strong>fered<br />

in<br />

the transit industry. Though th e documents do not support the “System and Device<br />

Page 58


Data” transaction messages proposed by the WP4, the “Transaction Data” and the<br />

“Card Management Data” equivalent messages are applicable to APTA UTFS efforts.<br />

4.8.3 Common Message Structure<br />

The ERG APTA-0001 proposed message layout consists <strong>of</strong> two parts as illustrated<br />

in<br />

Exhibit 4.8-1:<br />

Exhibit 4.8-1<br />

APTA Header Variant Data<br />

APTA System Header APTA System Common Header<br />

Both APTA System Header and the APTA System Common Header make up the<br />

header <strong>of</strong> the message. The body <strong>of</strong> the message, called “Variant Data”, is made <strong>of</strong><br />

a<br />

series <strong>of</strong> data structures, each containing individual data elements. Exhibit 4.8-2<br />

provides a list <strong>of</strong> data structures used in all the messages.<br />

4.8.3.1 APTA System Header<br />

Exhibit 4.8-2 Data Structures<br />

HEADER VARIANT DATA SCOPE<br />

{SysHdr_t} ALL messages<br />

{SysComHdr_t} ALL messages-<br />

{SysFinDetails_t} or {SysFinDetails2_t}<br />

ALL messages with CbTxnPurpose = “F”<br />

{SysSecurityHdr_t}<br />

ALL messages requiring a secured payload<br />

{SysPiccCom_t}<br />

Messages with picc details<br />

{SysApplicationCom_t}<br />

Messages with application details<br />

{SysProductCom_t} Messages with product details<br />

{SysPiccHolderCom_t}<br />

Messages with piccHolder details<br />

{DevPurseCommonHdr_t} Transactions involving a purse product<br />

{DevPassCommonHdr_t} Transactions involving a pass product<br />

{DevMultirideCommonHdr_t} Transactions involving a multiride product<br />

{DevJourneyHdr_t} Transactions journey data involving a any product<br />

{DevPurseJourneyHdr_t} Transactions with journey data involving a purse product<br />

{DevPassJourneyHdr_t} Transactions with journey data involving a pass product<br />

{DevMultirideJourneyHdr_t} Transactions with journey data involving a multiride product<br />

{DevPurseLavHdr_t} Transactions with last add value data involving a purse product<br />

{DevPassLavHdr_t} Transactions with last add value data involving a pass product<br />

{DevMultirideLavHdr_t} Transactions with last add value data involving a multiride product<br />

This<br />

header contains system related information required to enable validations and<br />

reporting<br />

to be performed on the transactions and is present in every message. Exhibit<br />

4.8-2<br />

lists the data elements contained in the APTA System Header:<br />

Page 59


4.8-3 APTA System<br />

Header<br />

Field Name Description<br />

SettlementDate Current<br />

settlement date <strong>of</strong> the system.<br />

ReconciliationDate Agency operation date<br />

Hostname Host<br />

name <strong>of</strong> the Site Computer that<br />

receives<br />

transaction from the Picc Device<br />

AcquirerId The Unique ID <strong>of</strong> the Acquirer involved in<br />

the transaction.<br />

4.8.3.2 APTA System Common Header<br />

This<br />

is the <strong>com</strong>mon header structu re that immediately follows the System Header in<br />

every UD message. UD is defined as “Usage Data” in the context <strong>of</strong> the ERG<br />

specifications.<br />

Exhibit 4.8-4 APTA System Common Header<br />

Field Name Description<br />

formatVersion Format version (ie structure) <strong>of</strong> the usage data<br />

payload. This field is updated every time a new<br />

structure definition is released.<br />

The formatVersion <strong>of</strong> this APTA Data Definition<br />

is: 0x000001<br />

txnDateTime The time (in seconds) at which the UD record is<br />

generated. Format is Unix Time_t (UTC 0) i.e. 0 =<br />

1/1/1970,<br />

00:00:00 UTC.<br />

BusinessDate The Business Date on which this UD record was<br />

generated<br />

sourceParticipantId The Unique ID <strong>of</strong> the Operator associated with<br />

the Picc device on which the UD transaction<br />

is<br />

generated.<br />

DeviceId A unique number<br />

assigned to each device<br />

SamId The numeric identification <strong>of</strong> the Security Access<br />

Module (SAM) used in the transaction. This field<br />

is 0 if no sam was involved.<br />

This field should be used to identify the source<br />

device <strong>of</strong> the transaction since it is<br />

the SAM that<br />

MACs the transaction. A mapping between<br />

SamId and deviceId could be maintained<br />

by<br />

Page 60


Field Name Description<br />

reading the SamId and DeviceId data arriving in<br />

the header.<br />

Udsn UD sequence number. The UDSN will reset back<br />

to 0 when it increments past 0xFFFFFFFF.<br />

Transac tion Status Indicates if the UD transaction is a normal<br />

or test<br />

transaction. Test transactions are ignored.<br />

UdTyp e Main UD group that defines the type <strong>of</strong><br />

transaction.<br />

UdSubtype Sub UD groups within UD.<br />

4.8.3.3 Variant Data<br />

Variant<br />

Data consist <strong>of</strong> a group <strong>of</strong> selected data structures to form the body <strong>of</strong> a<br />

message. The message type determines the kind and quantity <strong>of</strong> data structures to exist<br />

in a message.<br />

For example a “Product Purse Use” Message contains the following data<br />

structures<br />

from the Exhibit 4.8-2:<br />

• SysComHdr_t<br />

• SysPiccCom_t<br />

• SysApplicationCom_t • DevUdPurseCommonHdr_t<br />

• SysFinDetails_t<br />

• DevUdPurseLavHdr_t • SysSecurityHdr_t 4.8.4 Message Types<br />

As in the TransLink system, ERG specifications break transaction data into types and<br />

subtypes to provide the system with a unique level <strong>of</strong> message identification.<br />

Messages fall into one <strong>of</strong> the following<br />

seven main transaction types (UdType), as<br />

illustrated<br />

in Exhibit 4.8-5. Each transaction group contains further message types<br />

(UDSubType)<br />

within them.<br />

Page 61


Exhibit 4.8-5 Transaction Groups<br />

Group UdType Description<br />

Picc 1 Picc transactions- transactions related<br />

to Picc<br />

ad justments such as issue, unblock<br />

Application 2 Application transactions- transactions<br />

related to<br />

Application adjustment such as create, delete, block,<br />

unblock<br />

Product 3 Product transactions- transactions<br />

related to fare<br />

processing, autoloads, add values, actionlists, product<br />

usage<br />

Other 4 Other transactions<br />

Audit registers 5 Audit registers<br />

Events 6 Event records<br />

Project Specific Txns 7 Project specific transactions. Use <strong>of</strong> the UDSubType<br />

values must be non-overlapping across projects.<br />

The “Audit Registers”, “Events”, “Project Specific Transactions”<br />

and the “Other”<br />

transactions are deemed optional and beyond the scope <strong>of</strong> this specification. The<br />

messages that fall into these transaction groups depend<br />

on the requirements <strong>of</strong> the<br />

specific operator/scheme manager.<br />

All messages have a purpose field, which allows transactions <strong>of</strong> the same purpose to be<br />

processed<br />

via different paths from transactions <strong>of</strong> another purpose. They also allow<br />

grouping for reporting purposes. Exhibit 4.8-6 provides a list <strong>of</strong> the purpose codes<br />

supported by the specification.<br />

4.8-6 Transaction Purposes<br />

Transaction Description<br />

Purpose<br />

code<br />

M Maintenance Transactions<br />

F Financial Transactions which affect the<br />

Master Database<br />

B Blocking Transactions<br />

S Miscellaneous Transactions<br />

U Non Financial Usage Transactions<br />

4.8.4.1<br />

Transaction Data<br />

The<br />

Product Transaction Group (UD Type=3) messages, listed in exhibit 4.8-7, are ERG<br />

equivalent to the “Farecard Usage Transaction” messages as proposed by the WG4.<br />

Each message in every transaction group is assigned a unique sub-type ID based on the<br />

fare product used and the entry/exit condition <strong>of</strong> the journey.<br />

Page 62


4.8-7 Product Transactions Usage Messages<br />

UdSubType MESSAGE<br />

8 TXN_PRODUCT_PURSE_USE<br />

31 TXN_PRODUCT_PURSE_USE_JOURNEY<br />

32 TXN_PRODUCT_PASS_USE_JOURNEY<br />

33 TXN_PRODUCT_MULTIRIDE_USE_JOURNEY<br />

34 TXN_PRODUCT_PURSE_REBATE_ON_EXIT<br />

35 TXN_PRODUCT_PURSE_USE_ON_ENTRY<br />

41 TXN_PRODUCT_PASS_USE_ON_ENTRY<br />

36 TXN_PRODUCT_MULTIRIDE_USE_ON_ENTRY<br />

37 TXN_PRODUCT_PURSE_USE_ON_EXIT<br />

38 TXN_PRODUCT_PASS_USE_ON_EXIT<br />

39 TXN_PRODUCT_MULTIRIDE_USE_ON_EXIT<br />

40 TXN_PRODUCT_SURCHARGE_REBATE_ON_EXIT<br />

The following Product Transaction Group messages, listed on exhibit 4.8-8, are<br />

equivalent to the “Add Value Transaction” messages as proposed by the WG4.<br />

ERG specifications do not <strong>of</strong>fer any messages that are equivalent <strong>of</strong> “Financial Audit<br />

Data”.<br />

Exhibit 4.8-8 Product Transactions Add Value Messages<br />

UdSubType Description<br />

1 TXN_PRODUCT_PURSE_ADD<br />

2 TXN_PRODUCT_PASS_ADD<br />

3 TXN_PRODUCT_MULTIRIDE_ADD<br />

9 TXN_PRODUCT_PURSE_ADD_REVERSE<br />

10 TXN_PRODUCT_PASS_ADD_REVERSE<br />

11 TXN_PRODUCT_MULTIRIDE_ADD_REVERSE<br />

4.8.4.2 Card Management Data<br />

The “PICC related transactions” group <strong>of</strong>fers fourteen messages that are generated in<br />

response<br />

to an exception or a specific event occurred on a card. Ten <strong>of</strong> these messages<br />

are listed in Exhibit 4.8-9, and have direct equivalents in the WP4 proposed Card<br />

Management Data messages:<br />

Page 63


UdSubType Title<br />

Exhibit 4.8-9 Picc Transaction Messages<br />

Description<br />

1 TXN_PICC_INITIALISE PICC initialization <strong>of</strong> reinitialization<br />

2 TXN_PICC_ISSUE Issue <strong>of</strong> personalized or<br />

anonymous card.<br />

3 TXN_PICC_PERSONALISE Personalization <strong>of</strong> the card.<br />

4 TXN_PICC_PERSONALISE_UP Personalization details are<br />

DATE<br />

amended.<br />

5 TXN_PICC_BLOCK CID blocks a PICC from usage<br />

due to hotlisting or failure to<br />

meet other validity processing<br />

rules such as expiry. Or as part<br />

<strong>of</strong> the initialization/issuing<br />

process.<br />

6 TXN_PICC_UNBLOCK CID unblocks a previously<br />

blocked PICC.<br />

7 TXN_PICC_KEYS_UPDATE CID upgrades the security keys<br />

on a PICC to a later version.<br />

12 TXN_PICC_ACTIONLIST Actionlist performed on a PICC.<br />

13 TXN_PICC_UNACTIONLIST Un-actionlist a PICC.<br />

14 TXN_PICC_RANGE_ACTIONLI<br />

ST_UPDATE<br />

A new PICC range actionlist is<br />

generated.<br />

The “ Application<br />

Transactions” group <strong>of</strong>fers messages intended for the creation and<br />

management <strong>of</strong> a transit application on the card. The following are the message types<br />

<strong>of</strong>fered<br />

by the specification:<br />

• Create<br />

• Delete<br />

• Block<br />

• Unblock<br />

• Replace<br />

The ERG APTA specifications do not provide any messages for CID in the “Card<br />

Parameter Update” category.<br />

4.8.4.3 System and Device Data<br />

This specification does not define any System and Device Data category messages.<br />

4.8.4.4 Event Data<br />

This specification does not define any Event Data category messages.<br />

Page 64


4.8.4.5 Peer-to-Peer Clearing and Settlement<br />

ERG APTA Specifications have been developed for the regional system settlement<br />

approach but some <strong>of</strong> the messages could be conceivably used for a peer-peer<br />

settlement<br />

model.<br />

4.8.4.6 Additional Messages<br />

Offered<br />

The following additional messages are <strong>of</strong>fered by the ERG specifications and intended<br />

for card/product activities conducted by customer service personnel.<br />

• Product and e-cash refund<br />

• Product replacement<br />

• Bad Debt settlement<br />

• Issuing reversal<br />

4.8.5 Data Elements<br />

The ERG APTA specifications<br />

cover the data elements supported by the UTFS<br />

Workpackage 1 and are listed in Appendix C. The APTA-002 specification provides the<br />

type definitions for the data elements used in conjunction with the APTA-001<br />

specification.<br />

4.8.6 Message Sequences<br />

The<br />

ERG APTA Specifications do not define message sequences.<br />

4.8.7<br />

Security Requirements<br />

ERG’s approach to message security is to protect each transaction with a MAC,<br />

ensuring that the content and source <strong>of</strong> the transaction can be validated. This<br />

MAC is<br />

applied<br />

over a subset <strong>of</strong> the <strong>com</strong>plete message structure.<br />

4.8.8 Timing and Routing<br />

The ERG APTA Specification s do not define Timing and Routing requirements.<br />

4.8.9 Usability<br />

ERG<br />

provided the specification in its entirety for APTA to use within their APTA UTFS<br />

WP 4 efforts at no cost. It<br />

may be openly reviewed and changed if necessary. However,<br />

ERG prefers that it be not used piecemeal. In case APTA prefers to adapt the<br />

specification in its entirety and submit changes to it, ERG is willing to <strong>of</strong>fer their<br />

internal change process to maintain the central control <strong>of</strong> the document in return for a<br />

fee based on time and materials.<br />

Page 65


4.9 REGIONAL INTEROPERABILITY STANDARD (RIS) PART 4<br />

4.9.1 Description <strong>of</strong> the Standard<br />

RIS, the smart card based Regional Interoperability Standard for Electronic Transit Fare<br />

Payments, has been developed for Port Authority <strong>of</strong> New York and New Jersey<br />

(PANY/NJ), and currently consists <strong>of</strong> four parts. Part-1 is the User Guide and provides<br />

an overview <strong>of</strong> the RIS system approach. Part-2 <strong>of</strong> the RIS establishes the physical and<br />

electrical<br />

requirements for a Proximity Integrated Circuit Card (PICC) and a Card<br />

Interface Device (CID). Part-3 addresses the data structure <strong>of</strong> a PICC at a technical<br />

specification level <strong>of</strong> detail. RIS Part 4 defines standards for the exchange <strong>of</strong> messages<br />

between the Regional Clearing House (RCH) and other <strong>com</strong>puter systems required to<br />

interface to it. Other <strong>com</strong>puter systems include transit agency fare collection systems,<br />

card<br />

reload agent payment systems, transit benefits operators’ transaction processing<br />

systems, and card issuers’ card management systems.<br />

The message protocols and formats defined and standardized in RIS Part 4 cover the<br />

following exchange <strong>of</strong> data:<br />

• All messages originating from<br />

the RCH for management and accounting <strong>of</strong> all<br />

cards under its control.<br />

• Receipt <strong>of</strong> all issuance and fare payment-related transactional<br />

data generated<br />

within or for the benefit <strong>of</strong> a regional<br />

program for smart card-based electronic<br />

fare payments.<br />

• Settlement <strong>of</strong> transactions between multiple RCHs<br />

for instances where a PICC<br />

from one region is used to perform a fare payment-related transaction in a<br />

different<br />

region.<br />

RIS Part 4 messages are primarily designed to transmit card data objects defined in RIS<br />

Part 3 and provide flexibility for transmitting<br />

four additional non-RIS Part 3 objects.<br />

4.9.2 Applicability to UTFS Effort<br />

Overall RIS Part 4 is a well-documented standard that is applicable to WP 4 efforts.<br />

The<br />

standard provides a conceptual fare system model where functions and responsibilities<br />

<strong>of</strong> a regional clearinghouse and system participants are defined. The establishment <strong>of</strong><br />

this model is a crucial prerequisite to the WP 4 standard development effort. Following<br />

are<br />

the key advantages <strong>of</strong> the standard.<br />

• Direct support<br />

for WP1 card data structure due to its <strong>com</strong>pliance with RIS Part 3<br />

• Availability for APTA WP4 to adapt<br />

RIS Part 4 defines the requirements for messages to and from the RCH(s). Although the<br />

RIS Part 4 can be applied to messages generated by CIDs, in its current form, the<br />

Page 66


standard does not mandate the <strong>com</strong>pliance <strong>of</strong> transactions originating from Tier 1<br />

devices. Following are some <strong>of</strong> the disadvantages <strong>of</strong> RIS Part 4.<br />

• Limited support for data elements (objects) not <strong>com</strong>pliant with WP1 data formats<br />

• In a draft form and not implemented<br />

4.9.3 Com mon Message<br />

Structure<br />

RIS messages consist <strong>of</strong> four<br />

parts as shown in Exhibit 4.8-1. The total message length<br />

varies based on the number <strong>of</strong> objects included in Part<br />

3 <strong>of</strong> the message. Each<br />

individual mes sage is iden tified by the “Message Identifier” and contains<br />

the message<br />

specific mandatory and optional data objects as designated by the object<br />

map. The<br />

details <strong>of</strong> these messages have been described in the following sections. 4.9.3.1 PART 1<br />

Exhibit 4.9-1 RIS Message Structure<br />

T he Part 1 consists <strong>of</strong> fixed number <strong>of</strong> fields within each message category described in<br />

Section<br />

4.9.4.<br />

The “Message Identifier” determines type<br />

<strong>of</strong> the message such as “Product Activation”<br />

or<br />

“Use <strong>of</strong> Stored Value”.<br />

4.9.3.2 PART 2<br />

The<br />

Part 2 includes message authentication data represented by the<br />

“AuthenticationDataGroup”. This group contains the data elements that will be<br />

required by the receiver to authenticate the message or series <strong>of</strong> messages.<br />

4.9.3.3<br />

PART 3<br />

Exhibit<br />

4.9-9<br />

AuthenticationDataGroup<br />

MessageAuthCode<br />

MACKeyID<br />

AlgorithmID, optional<br />

MACHashID, optional<br />

This part contains the standard RIS object map and the objects required to be included<br />

in a specific transaction. The purpose <strong>of</strong> the object map is similar to the “bitmap” in<br />

ISO/IEC<br />

8583, as explained in section 4.1.1. The Object Map is an 8 Byte, (64 Bit) binary<br />

Page 67


it map where each bit represents the presence or absence<br />

<strong>of</strong> a specific RIS Data Object.<br />

E ach “1” in the object map indicates the presence <strong>of</strong><br />

the corresponding object in the<br />

message,<br />

and each “0” indicates the absence <strong>of</strong> the object. Any additional<br />

object may be<br />

adde d to the message simply by marking the Object bit map and<br />

placing the objects in<br />

the correct sequence in part 3 <strong>of</strong> the message. There are four extra<br />

bits that are reserved<br />

for implementer definition in the object bitmap. These<br />

extra bits can be utilized to send<br />

implementation<br />

specific objects or data elements that are not necessarily <strong>com</strong>pliant with<br />

RIS Part 3.<br />

4.9.3.4 PART 4<br />

Part 4 contains transaction specific data elements that<br />

are unique to the type <strong>of</strong> the<br />

message such as the cardholder personal information in a “PICC Registration” message.<br />

4.9.4 Message Types<br />

R IS Part 4 provides the following six main<br />

message categories with unique individual<br />

messages within the each<br />

category.<br />

• CID Transaction<br />

Messages<br />

• PICC Scheme Control<br />

Messages<br />

• Interface to Transit Benefits Processors<br />

• Interface to Other Clearing houses<br />

• ISO 8583 Interchange message specifications<br />

• ACH – Automated Clearing house messages<br />

4.9.4.1 CID Transaction<br />

Messages<br />

CID Transaction messages include the following<br />

three categories <strong>of</strong> transactions that are<br />

based on the CID to PICC interactions:<br />

• PICC Initialization messages include such card activities as initialization,<br />

issuance, registration, card inquiry, and limited use card initialization<br />

• Load and Unload messages include all direct load and autoload activities<br />

performed on the card<br />

• Fare payment (Usage) messages document in- and out-<strong>of</strong>-region card use for all<br />

<strong>com</strong>mon fare product types available in the US.<br />

The Part 1 <strong>of</strong> the CID Transaction Messages contains twelve<br />

data elements as illustrated<br />

in Exhibit 4.9-2.<br />

Page 68


Item<br />

Number<br />

Exhibit 4.9-2 Part 1 Fields<br />

Data Element Name Exhibit<br />

1.1 MessageIdentifier<br />

1.2 MessageVersion<br />

1.3 MessageRevision<br />

1.4 LocationDataGroup (GRP) 4.8-3<br />

1.5 VehicleDataGroup (GRP) 4.8-4<br />

1.6 EquipmentDataGroup (GRP) 4.8-5<br />

1.7 PICCDataGroup (GRP) 4.8-6<br />

1.8 TransactionDatetime<br />

1.9 EmployeeDataGroup (GRP)* 4.8-7<br />

1.10 PostDateTime<br />

1.11 ApplicationCertCode<br />

1.12 ActionEventDataGroup (GRP) 4.8-8<br />

The location data group describes different characteristics <strong>of</strong> the location a transaction<br />

occurred as listed in Exhibit 4.9-3.<br />

Exhibit 4.9-3<br />

LocationDataGroup<br />

CountryID<br />

RegionID<br />

AgencyID<br />

LocationID<br />

LocationIDDestination (Optional)<br />

LocationIDSubArea (Optional)<br />

Exhibit 4.9 -4 lists the data elements <strong>of</strong> the “Vehicle Data Group”<br />

which provides the<br />

details <strong>of</strong> the transit vehicle where the transaction took place.<br />

Exhibit 4.9-4<br />

VehicleDataGroup<br />

VehicleID (Optional)<br />

RouteID (Optional)<br />

ZoneID (Optional)<br />

ZoneIDDestination (Optional)<br />

RunID (Optional)<br />

Direction-code (Optional)<br />

“ Equipment Data Group”, shown in Exhibit 4.9-5, contains the data elements that<br />

describe<br />

the device that performed the transaction.<br />

Page 69


Exhibit 4.9-5<br />

EquipmentDataGroup<br />

DeviceID<br />

DeviceTransactionSeq (Optional)<br />

CIDID<br />

CIDTransactionSeq<br />

“PICCDataGroup” contains the data elements that describe the characteristic <strong>of</strong> the<br />

card used in the transaction, Exhibit 4.9-6.<br />

Exhibit 4.9-6<br />

PICCDataGroup<br />

PICCSerialNumber<br />

PICCDataStatusAsRead<br />

PICCDataStatusAsWritten<br />

PICCKeySetID<br />

PICCTransactionSeq<br />

PICCTransitApplicationStatus (Optional)<br />

PICCPurseSVUse (Optional)<br />

The<br />

“ EmployeeDataGroup”<br />

<strong>com</strong>prises the data elements displayed in Exhibit<br />

4.9-7, and<br />

identifies<br />

the employee who is logged on to the device at the time<br />

<strong>of</strong> the transaction.<br />

Exhibit 4.9-7<br />

EmployeeDataGroup<br />

EmployeeID<br />

EmployeeType<br />

EmployeePICCID (Optional)<br />

The “ActionEventDataGroup” group contains the data elements that are used to<br />

document the current<br />

state <strong>of</strong> action event directives as listed in Exhibit<br />

4.9-8<br />

Exhibit 4.9-8<br />

ActionEventDataGroup<br />

ActionEventIDAsRead<br />

ActionEventIDAsWritten<br />

ActionEventMapAsRead<br />

ActionEventMapAsWritten<br />

Page 70


4.9.4.2 PICC Scheme Control Messages<br />

The RIS Part 4 defines<br />

a central control body that is responsible for the administration<br />

and the governance <strong>of</strong> the fare collection scheme. The following are the message<br />

categories that are issued by the “control body” in order to distribute the<br />

implementation<br />

specific application parameters:<br />

• Action List<br />

• Negative List<br />

• Fare Policy Framework<br />

• Key Management<br />

4.9.4.3 Interface to Transit Benefits Processors<br />

The<br />

messages in this category are used by Third Party Transit Benefits Administrators<br />

to <strong>com</strong>municate benefit load instructions<br />

and action confirmations to the party who<br />

manages the action list administration. The Action List Administration facility returns<br />

confirmations when the Action List directives are fulfilled. For example, a C101 benefit<br />

load request message originating from the Transit Benefits Processor, is responded with<br />

a C10 2 Benefit load Confirmation<br />

message from the Regional Clearing House or Action<br />

List Administrator<br />

4.9.4.4 Interface to Other Clearing houses (RCH-to-RCH)<br />

This category <strong>of</strong> messages are used between<br />

clearing houses, when a card from a certain<br />

region is used in another region belonging to a different RCH, to notify each other <strong>of</strong><br />

the activity associated with that card. The messages exchanged<br />

are a subset <strong>of</strong> those<br />

defined<br />

for a single RCH, and listed in Appendix D.<br />

4.9.4.5 ISO 8583 Interchange message specifications<br />

The RIS Part 4 supports the ISO/IEC 8583 messages for all credit/debit card processing<br />

related transactions between the RCH and the third party financial transaction<br />

acquirers.<br />

4.9.4.6 ACH – Automated Clearing house messages<br />

The<br />

specification supports the ACH messages as defined by the Electronic Payments<br />

Associatio n (NACHA) for message exchanges between the RCH and the third party<br />

Automated Clearing Houses (ACH).<br />

Page 71


4.9.5.1 Transaction Data<br />

The Exhibits 4.9-10 and 4.9-11 provide the RIS Part 4 defined CID Transaction messages<br />

that are <strong>com</strong>parable to “Farecard Usage Transaction Messages” and “Add Value<br />

Transaction<br />

Data “ as proposed by the WP4 functional document.<br />

Message<br />

Identifier<br />

4.9-10 Farecard Usage Transaction Messages<br />

Description<br />

A401 Use <strong>of</strong> Regional T-Purse<br />

A402 Use <strong>of</strong> Regional Pass Product with or without a step-up fare<br />

A403 Use <strong>of</strong> Agency Specific Product product with or without a step-up fare<br />

A405 Use <strong>of</strong> Agency Stored Value Product<br />

A406 Use <strong>of</strong> Special Limited Use Value PICC<br />

A407 Use <strong>of</strong> Special Limited Use Product PICC<br />

A408 Transfer on Special Limited Use Product PICC<br />

A409 Transfer with or without a step-up fare<br />

A411 Product Activation (First use <strong>of</strong> rolling product)<br />

A412 Use <strong>of</strong> Account Linked Product<br />

A414 Use <strong>of</strong> Regional T-purse on an Out <strong>of</strong> Region PICC<br />

A415 Use/travel on an Autovalue Product<br />

A419 Use <strong>of</strong> Stored Value from Multiple SV Sources<br />

4.9-11 Add Value Transaction Data<br />

Message Description<br />

Identifier<br />

A201 Load <strong>of</strong> Regional T-Purse<br />

A202 Load <strong>of</strong> Regional Pass Product<br />

A203 Load <strong>of</strong> Agency Pass Product<br />

A204 Load <strong>of</strong> Agency Stored Value Product<br />

A205 Load <strong>of</strong> Account Linked Product<br />

A206 Load <strong>of</strong> Value to a Special Limited Use PICC<br />

A207 Load <strong>of</strong> Product to a Special Limited Use PICC<br />

A208 Load Product and Value to a Special Limited Use PICC<br />

A209 Load <strong>of</strong> Out <strong>of</strong> Region T-Purse<br />

RIS Part 4 does not <strong>of</strong>fer any messages that are equivalent <strong>of</strong> “Financial Audit Data”<br />

4.8.5.2 Card Management Data<br />

The following RIS Part 4 messages have direct equivalents in the Card Management<br />

Message<br />

category <strong>of</strong> the WP4 proposed message types.<br />

• Initialization<br />

• Issuing<br />

Page 72


• Registration<br />

• Negative List<br />

• Action List<br />

• Card Parameter Update<br />

• Key Change<br />

The actionlist messages supported by RIS Part 4 are as follows:<br />

• Set-up and withdrawal (cancellation) <strong>of</strong> card autoload events<br />

• Set-up and withdrawal (cancellation) <strong>of</strong> card autovalue events,<br />

• Unloading <strong>of</strong> products and e-purses<br />

• Block and unblock <strong>of</strong> the card and the individual products<br />

RIS Part 4 also supports the following key management messages:<br />

• Load PICC Access Key-Set • Load<br />

MAC Key-Set<br />

• Load DAC Key-Set<br />

• Control Key-Set<br />

4.8.5.3 System and Device Data<br />

RIS Part 4 does not support any System and Device data messages<br />

4.8.5.4 Event Data<br />

RIS Part 4 does not support any Event data messages<br />

4.8.5.5<br />

Peer-to-Peer Clearing and Settlement<br />

Although the standard is designed to support a central/regional clearing and<br />

settlement scheme, some <strong>of</strong> the messages can be applied to a peer-to-peer clearing and<br />

settlement model. The “End <strong>of</strong> Day Position” and the “End <strong>of</strong> Day Transaction Receipt”<br />

messages provide summaries <strong>of</strong> previously forwarded transactions for the period<br />

specified in the message in order to perform a high level reconciliation <strong>of</strong> the financial<br />

data.<br />

RCH-to-RCH message set can also be adapted by a peer-to-peer system, each peer<br />

central system acting as a single RCH.<br />

4.8.5.6 Additional Messages Offered<br />

RIS Part 4 provides “Fare Policy Framework” messages to transmit transit scheme<br />

related parameters such as products Ids, Agency IDs and “rider pr<strong>of</strong>ile<br />

codes” to the<br />

scheme participant s.<br />

Page 73


The “Transit Benefi t Messages”, explained in section 4.8.4.3, are another<br />

set <strong>of</strong><br />

additional messages <strong>of</strong>fered by the standard.<br />

4.8.6 Data Elements<br />

RIS Part 4 supports all the objects and data elements defined in RIS Part 3. The objects<br />

are 16 bytes and contain data elements <strong>of</strong> varying lengths. RIS Part 4 utilizes these exact<br />

objects<br />

in their “as read” and “as written” status. “As read” refers to the state <strong>of</strong> the<br />

object when it is first read from the PICC at the start <strong>of</strong> a PICC/CID transaction.<br />

Subsequently,<br />

“as written” refers to the state <strong>of</strong> the object when it is written to the PICC<br />

as a result <strong>of</strong> the transaction sequence. The ‘as read’ and ‘as written’ status <strong>of</strong> the<br />

product objects are placed together with other data elements to form the message<br />

structure that is sent from the CID through the agency<br />

<strong>com</strong>puter systems to the RCH.<br />

4.8.7 Message Sequences<br />

Act ion list messages originating from the RCH are responded with confirmation<br />

messages with separate message identifiers by AFC devices when the action directive is<br />

successfully implemented. For example, when a RCH sends the message A715, “Block<br />

a Product”, devices respond with an A416 message, “Product Blocked”, when the action<br />

succeeded.<br />

The standard does not define any other message sequences.<br />

4.8.8 Security Requirements<br />

RIS Part 4 supports transmission level data integrity through the use <strong>of</strong> MACs<br />

appended to every message. The MAC provides the<br />

RCH with the ability to validate the<br />

authenticity<br />

<strong>of</strong> transaction messages after they have been forwarded from a CID. The<br />

authenticity c heck is achieved through the secret keys stored only in CIDs and the RCH.<br />

4.8.9 Timing and Routing<br />

RIS Part 4 does not define any timing requirements.<br />

4.8.9 Usability<br />

The information provided in RIS<br />

Part 4 is <strong>of</strong>fered free <strong>of</strong> charge and can be incorporated<br />

within<br />

UTFS WP4’s efforts in order to facilitate the standardization <strong>of</strong> the interface<br />

between PICC’s host device and a Regional Clearing House (RCH). The Port Authority<br />

prohibits the licensing or charging <strong>of</strong> fees for use and development<br />

<strong>of</strong> any portion <strong>of</strong><br />

this Regional Interoperability Standard for Electronic Transit Fare Payments.<br />

Page 74


5.0 FINDINGS<br />

This section presents the findings resulting from the analysis <strong>of</strong> the standards and<br />

specifications contained in this report effort. The five<br />

standards and specifications<br />

illustrated<br />

in Figure 5-1 were reviewed and analyzed in accordance with the<br />

methodology and the techn ical criteria presented in Sections 2.0 and 3.0. Moreover, five<br />

additional criteria, as illustrated in Exhibits 5-1 and 5-2, were used to evaluate these<br />

standards and specifications in terms<br />

<strong>of</strong> their general usability and relevance to the<br />

UTFS effort. Both the exhibits provide a qualitative measure <strong>of</strong> the analysis<br />

results.<br />

Exhibit<br />

5-1<br />

Standard/ Technical UTFS Adoption<br />

UTFS<br />

Adoption UTFS Effort<br />

Specification<br />

ISO/IEC 8583<br />

Compliance<br />

4<br />

Costs<br />

1<br />

Time<br />

1<br />

Required<br />

1<br />

ITSO 3 4<br />

4 3<br />

VEI 3 N/A<br />

N/A 2<br />

OFX 1 4 1 0<br />

CID Edge<br />

Interfaces<br />

1 4 4<br />

1<br />

TransLink® 4 N/A N/A 4<br />

ERG APTA-000 3 4 4 3<br />

RIS PART 4 3 4 4 3<br />

N/A – Cost and adoption time were not able to be obtained during phone interview<br />

Legend<br />

4 More Favorable 0 Less Favorable<br />

Each <strong>of</strong> the sponsoring organizations for the respective standard or specification was<br />

contacted to discuss the process for obtaining permission to use the documentation.<br />

The results <strong>of</strong> those conversations were factored into the findings in this section.<br />

•<br />

The following categories have been established as measuring criteria:<br />

Technical Compliance is measured in terms <strong>of</strong> how the standard or specification<br />

<strong>com</strong>plies with the detailed analysis criteria in Section 4.0. The following criteria has<br />

been established and measured in quantities relative to other<br />

standards/specifications analyzed:<br />

o Definition <strong>of</strong> message structure<br />

o Number <strong>of</strong> message types matching with that <strong>of</strong> WG 4<br />

Approximately >90% match – Very Favorable<br />

Approximately 75% match – Favorable<br />

Approximately 50% match – Somewhat favorable<br />

Page 75


Approximately 25% match – Less Favorable<br />

o Estimated number <strong>of</strong> data elements associated with each message<br />

o Definition <strong>of</strong> security level<br />

o Other characteristics (e.g. operation, timing and message routing<br />

parameters defined)<br />

• UTFS Adoption Cost reflects the additional cost that may be required by APTA to<br />

adopt the standard or specification, such as membership dues and application fees.<br />

This category does not represent the actual labor cost <strong>of</strong> implementation.<br />

o 0-$1000 – Very Favorable<br />

o $1001- $5,000 Favorable<br />

o $5,000 – $10,000 Somewhat Favorable<br />

o $10,000 and up – Less Favorable<br />

• UTFS Adoption Time represents an estimate <strong>of</strong><br />

the time required to implement the<br />

UTFS changes in the relevant standard or specification, or to derive a UTFS<br />

derivative <strong>of</strong> the standard. Therefore it reflects the time necessary to navigate the<br />

approval process. This does not include the time APTA spends developing the<br />

changes to the specification:<br />

o 0-3 Months – Very Favorable<br />

o 6-9 Months – Favorable<br />

o 9-12 Months – Somewhat Favorable<br />

o 13 Months and up – Less Favorable<br />

• UTFS Effort Required aims to represent an estimate <strong>of</strong> the time and effort WP4 will<br />

require to adopt the standard or specification:<br />

o Approximate number <strong>of</strong> additional messages or message types that WP 4<br />

needs to define and add to the standard<br />

o Estimated number <strong>of</strong> new data elements or fields that WP 4 needs to<br />

define and add to the standard<br />

o Approximate number <strong>of</strong> matching messages that needs to be further<br />

defined<br />

The following three additional weighting criteria were established to evaluate the<br />

standards and specifications:<br />

• Smart Card Based represents the degree the standards or the specifications can<br />

ac<strong>com</strong>modate smart card data types and structure<br />

• Widely Implemented shows the degree the standard or specification is in use<br />

• Relevance to Transit represents the level <strong>of</strong> relevancy <strong>of</strong> the standard or<br />

specification to the transit industry. (Determined by the number <strong>of</strong> transit industry<br />

related data elements and message types supported).<br />

Page 76


Exhibit 5-2 illustrates the relevance to the WP4 efforts and the viability <strong>of</strong> using the<br />

standard or specification for a transit application.<br />

Exhibit 5-2<br />

Standard/ Smart Card Widely Relevance to<br />

Specification<br />

ISO/IEC 8583<br />

Based<br />

2<br />

Implemented<br />

4<br />

Transit<br />

1<br />

ITSO<br />

5.1 SUMMARY<br />

4 0 4<br />

VEI 2 1 4<br />

OFX 0 4 1<br />

CID Edge<br />

Interfaces<br />

4 0 4<br />

TransLink® 4 1 4<br />

ERG APTA-000 4 3 4<br />

RIS PART 4 4 0 4<br />

Legend<br />

4 More Favorable 0 Less Favorable<br />

Based on the analysis, ITSO, RIS PART 4 and ERG APTA Specifications are more<br />

favorable to adopt and more relevant to WP4 than all the other standards or<br />

specifications evaluated. Therefore, these three specifications are the best candidates for<br />

further analysis.<br />

That said, the other standards and specifications have some applicability to the UTFS<br />

efforts in various areas. The remainder <strong>of</strong> this section highlights these areas. ISO/IEC<br />

8583 standard’s batch/file transfer mechanisms and the OFX’s general schema structure<br />

should also be considered for reference in APTA’s future standard or specification<br />

development. Although scored very favorable on both “Technical Compliance” and<br />

“UTFS Effort Required” categories, TransLink did not qualify for a ranking on the other<br />

two categories due to lack <strong>of</strong> response from ERG Transit Systems as yet.<br />

According to Figure 5-1, the ISO/IEC 8583 scored favorable only on the Technical<br />

Compliance category. This standard has been determined to be less favorable in terms<br />

<strong>of</strong> usability, based on the time, cost and effort required to adapt it to WP4 purposes.<br />

However, this standard could serve as an effective model for WP4, due specifically to<br />

its extended focus on the definition <strong>of</strong> batch and file transfer mechanisms.<br />

Although it has not been implemented, the ITSO specification is one <strong>of</strong> the<br />

specifications that scored as the most favorable in almost all categories per Exhibits 5-1<br />

Page 77


and 5-2. The lack <strong>of</strong> existing implementation<br />

was the only drawback for this<br />

specification, resulting in a less favorable rating<br />

in the “Widely Implemented” category.<br />

Overall, ITSO is highly applicable to the UTFS.<br />

Although VEI scored as favorably in the technical <strong>com</strong>pliance category, it did not<br />

receive any scoring on the UTFS Adoption Costs<br />

and Adoption Time. This is because<br />

there is no definitive fee structure,<br />

or change request schedule that could be identified<br />

by the Agent Systems point <strong>of</strong> contact.<br />

If APTA were interested in pursuing VEI,<br />

detailed<br />

discussions with Agent Systems<br />

to determine these elements would be<br />

necessary. This specification scored as somewhat favorable in the UTFS Effort Required<br />

category, for the following reasons:<br />

• The level <strong>of</strong> effort required further defining and<br />

mapping<br />

all t he matching VEI<br />

dialogues to<br />

WP4<br />

proposed<br />

exact<br />

message<br />

types<br />

• The<br />

estimated number<br />

<strong>of</strong> additional<br />

data<br />

elements<br />

that need to be defined for<br />

smart card related transaction processing<br />

Compared to Exhibit 5-1, the VEI scored better in terms <strong>of</strong> relevance per Exhibit 5-2.<br />

OFX did not score as favorably because it lacks relevance to the transit industry. This<br />

adversely affects its score in all the other categories as well, and therefore, is the least<br />

applicable to UTFS efforts. It is gaining rapid acceptance in other industries (e.g.<br />

Financial) and support from major vendors such as Micros<strong>of</strong>t. APTA should consider<br />

this specification as it matures and be<strong>com</strong>es more widely adopted.<br />

Although in<strong>com</strong>plete, the CID Edge Interfaces scored very favorably in terms <strong>of</strong><br />

Adoption Costs and Adoption Time. This specification is a viable candidate for a model<br />

for WP4 efforts, due to its reliance on Workpackage 1 smart card data formats, and the<br />

relatively low adoption cost to UTFS. Its low score on Technical Compliance reflected<br />

adversely on the Level <strong>of</strong> UTFS Effort Required<br />

in implementing this specification.<br />

CID<br />

Edge Interfaces<br />

also scored very favorable on two <strong>of</strong> the three categories in Exhibit 5-2.<br />

Despite its low scores on Technical Compliance<br />

and UTFS Effort Required, WP4 should<br />

consider<br />

using this draft specification.<br />

TransLink is the most favorable specification in terms <strong>of</strong> technical <strong>com</strong>pliance. It fulfills<br />

most <strong>of</strong> the criteria established in this category<br />

by<br />

providing a match for all the message<br />

types proposed by the WP4. Its <strong>com</strong>pliance with<br />

the technical criteria also reduces the<br />

time required for APTA to adopt this specification<br />

because <strong>of</strong> the relatively smaller<br />

number <strong>of</strong> changes that need to be undertaken.<br />

Due to its regional and smart card based<br />

focus, TransLink also scored the highest in Exhibit 5-2. If APTA will be allowed to<br />

adopt this specification, TransLink should certainly<br />

be considered for WP4 efforts.<br />

ERG APTA specifications scored very favorably in all categories<br />

<strong>of</strong> the criteria. Its<br />

support for relatively fewer number <strong>of</strong> WP4 proposed messages resulted in a<br />

“Favorable” ranking in both the Technical Complian ce and the Level <strong>of</strong> UTFS Effort<br />

Page 78


Required. This set <strong>of</strong> specifications provides<br />

one <strong>of</strong> the highest level <strong>of</strong> applicability in<br />

terms <strong>of</strong> both<br />

Exhibits 5-1 and 5-2.<br />

Together with ITSO and ERG APTA specifications,<br />

RIS Part 4 scored as one <strong>of</strong> the three<br />

highest standards<br />

analyzed<br />

in Exhibit 5-1. Due to its relatively short history it lacks<br />

industry acceptance and real life implementation as reflected in Exhibit 5-2. This<br />

standard is a strong candidate<br />

for WP4 to consider. However, it should be expanded to<br />

allow the flexibility to support<br />

non-WP1 defined card data structures as well.<br />

Due to their exclusive focus on the North American transit industry, RIS PART 4 and<br />

the ERG APTA specifications are preferred candidates for further analysis by WP4.<br />

Page 79


APPENDIX A RESEARCH CONTACTS<br />

Project/Specification/Standard Sponsoring<br />

Organization/POC<br />

Email Address<br />

Smart Card Project Implementation Contacts<br />

TransLink ® MTC – Russell Driver rdriver@mtc.ca.gov Russell Driver<br />

Metropolitan Transportation Commission<br />

Lake Merritt Plaza<br />

1999 HarrISO/IECn<br />

Street<br />

Oakland, CA 94612<br />

WMATA – SIRS v0.6<br />

WMATA – Douglas ddeckert@wmata.<strong>com</strong> Douglas D. Deckert<br />

Specifications<br />

Deckert<br />

WMATA<br />

600 Fifth St., N.W.<br />

Washington, D.C. 20001-2693<br />

OCTOPUS OCTOPUS octopusuk@btinternet.<strong>com</strong> Brian Chambers<br />

International Operations Director<br />

Octopus Cards Ltd<br />

P.O. Box 2993<br />

BA3 5JT Radstock<br />

Smart Card Standards/Specifications<br />

Calypso RATP – Michel<br />

Michel.Barjansky@ratp.fr Michel Barjansky<br />

Barjansky<br />

RATP/SIT/ISV<br />

Immeuble Central IV<br />

1, avenue Montaigne<br />

93160.Noisy le Grand<br />

France.<br />

ITSO ITSO- Jeremy Acklam Jeremy Acklam<br />

Deputy Chairman <strong>of</strong> the Integrated Transport<br />

Smartcard Organisation<br />

Virgin Trains<br />

Euston Station (West Wing)<br />

NWI 2 DS London<br />

VEI N/A vei@agentsystems.<strong>com</strong> Agent Systems<br />

RKF Stockholm Lokaltrafik bjorn.holmberg@sl.se Bjorn Holmberg<br />

AB Storstockholms Lokaltrafik<br />

S-120 80 Stockholm, Sweden<br />

Page 80


Project/Specification/Standard Sponsoring<br />

Organization/POC<br />

Email Address VDV VDV- Till Ackermann N/A Till Ackermann<br />

Fachbereichsleiter<br />

Volswirthschaft<br />

Verband<br />

Deutscher Verkehrsunternehmen (VDV)<br />

Kamekestrasse, 37-39<br />

50672 Koeln, Germany<br />

Intercode SNCF gilles.de-chanterac@sncf.fr Gilles de Chanterec<br />

President <strong>of</strong> the Commiss ion <strong>of</strong><br />

Normalization<br />

Information System Policies Manager<br />

SNCF Direction du transport public<br />

209/211, Rue de Bercy-Tour Paris-Lyon<br />

75585 Paris, France ATIP Transport<br />

Ticketing R ichard.Parker@doi .vic.gov .au Richard Parker<br />

Authority<br />

Transport Ticketing Authority General<br />

Mana ger,<br />

Operations Level 16,<br />

589 Collins<br />

Street Melbourne, 3000<br />

Smart Card System Vendor Specifications<br />

Back <strong>of</strong>fice message<br />

Scheidt & Bachmann lbucci@scheidt-bachmann-<br />

Lisa Bucci<br />

specifications<br />

usa.<strong>com</strong><br />

Scheidt & Bachmann, USA<br />

31 North Avenue<br />

Burlington, MA 01803<br />

Back <strong>of</strong>fice message<br />

ERG – Michael Nash mnash@erggroup.<strong>com</strong> Michael Nash<br />

specifications<br />

ERG Transit Systems USA, Inc.<br />

1800 Sutter Street, Suite 900<br />

Concord, CA 94520<br />

CID Edge Interfaces Cubic brian.monk@cubic.<strong>com</strong> Brian Monk<br />

Cubic Transportation<br />

Systems<br />

5650 Kearny<br />

Mesa<br />

Road<br />

San Diego, CA 92111<br />

ERG APTA Specification ERG mlaezza@erggroup.<strong>com</strong> Michael Laezza<br />

ERG Transit Systems<br />

905-890-2794 ext 224<br />

Back <strong>of</strong>fice message Thales geraud.najman@thales- Geraud Najman and Ian Woodro<strong>of</strong>e<br />

Page 81


Project/Specification/Standard Sponsoring<br />

Organization/POC<br />

Email Address<br />

specifications transportservices.<strong>com</strong><br />

ian.woodro<strong>of</strong>e@thales<br />

transportservices.<strong>com</strong><br />

Back Office Message<br />

ASCOM sanford.weinberg@as<strong>com</strong>.<strong>com</strong> Sanford Weinberg<br />

Specifications<br />

As<strong>com</strong> Transport<br />

Systems, Inc.<br />

68 Veronica<br />

Avenue<br />

Unit<br />

10<br />

Somer set, NJ 08873<br />

Page 82


APPENDIX B COMPLETED CRITERIA FORMS<br />

VENDING EQUIPMENT INTERFACE ( VEI) VERSION<br />

1.2<br />

Criteria<br />

Transaction Data<br />

Message Type Data Element(s)<br />

Farecard Usage Transaction Condition Dialog _CAA048<br />

Add Value Transaction Data Condition Dialog _CAA010<br />

Financial Audit Data<br />

Card Management Data<br />

Variable Access Dialog Acct.*<br />

Initialization Condition Dialog _CAA031<br />

_CAA032<br />

_CAA033<br />

Issuing Condition Dialog _CAA025<br />

_CAA031<br />

_CAA032<br />

_CAA033<br />

Registration Condition Dialog _CAA043<br />

_CAA045<br />

_CAA046<br />

_CAA068<br />

Personalization<br />

Condition Dialog _CAA043<br />

_CAA045<br />

_CAA046<br />

_CAA068<br />

Negative List Variable Access Dialog Sysconf.bl[]<br />

Action List NA<br />

Transit Application Updates File Management Dialog Transfer Request<br />

Card Parameter Update File Management Dialog Transfer Request<br />

Key Load File Management Dialog Transfer Request<br />

Key Change<br />

System and Device Data<br />

Variable Access Dialog sysconf.sa.sversion<br />

Device Status Request Conditional Dialog RecConditionAttributes<br />

Device Command Program Execution Dialog RecParamterList<br />

Device Data File Management Dialog Transfer Block<br />

Event Data Conditional Dialog RecConditionAttributes<br />

Equipment Status Data Conditional Dialog RecConditionAttributes<br />

Peer<br />

to Peer Clearing and<br />

Settlement<br />

NA<br />

Not on-us transactions NA<br />

Clearing and Settlement reporting Log File Dialog Upload Log<br />

Page 83


ITSO<br />

Criteria<br />

Transaction Data<br />

Message Type Data Element(s)<br />

Farecard Usage Transaction Stored Value Usage(0100 and 0110), Journey Record (0209)<br />

Add Value Transaction Data Stored Value Load(0100 through 010A), First Use <strong>of</strong> Stored Value<br />

(0106) , Create or Amend Ticket IPE (0207,208), Create/Ammend<br />

IPE,<br />

Initialize/Amend Auto-Renew (0304)<br />

Financial Audit Data<br />

Card Management Data<br />

NA<br />

Initialization Create ITSO Shell<br />

Issuing Activate ITSO Shell<br />

Registration Create or Amend ITSO ID<br />

Personalization Create or Amend ITSO ID<br />

Negative List POST Configuration (Hotlist)<br />

Action List POST Configuration (Actionlist)<br />

Transit Application Updates Interoperability<br />

List Transaction<br />

Card Parameter Update Interoperability<br />

List Transaction<br />

Key Load Not Disclosed<br />

Key Change<br />

System and Device Data<br />

Not Disclosed<br />

Device Status Request POST Configuration (Capability List 1 and 2)<br />

Device Command POST Configuration (Capability List 1 and 2)<br />

Device Data Interoperability List Transaction<br />

Event Data POST Configuration (Capability List 1 and 2)<br />

Equipment Status Data POST Configuration (Capability List 1 and 2)<br />

Peer to Peer Clearing and<br />

Settlement<br />

NA<br />

Not on-us transactions NA<br />

Clearing and Settlement reporting<br />

Additional Messages<br />

NA<br />

Stored value transaction cancellation (0107, 0117)<br />

Full/Partial Refund for a purchased ticket (0108, 0118, 010D)<br />

Add/Delete Loyalty Scheme (020B, 0202)<br />

Loyalty add points and redemption (0203, 0204)<br />

Transaction cancellation (0300)<br />

Deposit Received or Refunded (0302, 0303)<br />

Exception (0400, 0405)<br />

Page 84


ISO/IEC 8583<br />

Criteria<br />

Transaction Data<br />

Message Type Data Element(s)<br />

Farecard Usage Transaction Financial Presentment Notification Message 240<br />

Add Value Transaction Data Financial Presentment Notification Message 240<br />

Financial Audit Data<br />

Card Management Data<br />

Network Management Messages 804/814<br />

Initialization File Action Instruction/Notification Message 362/340<br />

Issuing File Action Instruction/Notification Message 362/340<br />

Registration File Action Instruction/Notification Message 362/340<br />

Personalization File Action Instruction/Notification Message 362/340<br />

Negative List File Action Instruction/Notification Message 362/340<br />

Action List File Action Instruction/Notification Message 362/340<br />

Transit Application Updates File Action Instruction/Notification Message 362/340<br />

Card Parameter Update File Action Instruction/Notification Message 362/340<br />

Key Load Network Management Messages 824/834<br />

Key Change<br />

System and Device Data<br />

Network Management Messages 824/834<br />

Device Status Request File Action Instruction/Notification Message 362/340<br />

Device Command File Action Instruction/Notification Message 362/340<br />

Device Data File Action Instruction/Notification Message 362/340<br />

Event Data File Action Instruction/Notification Message 362/340<br />

Equipment Status Data File Action Instruction/Notification Message 362/340<br />

Not on-us transactions Reconciliation Advice Message 520/530<br />

Clearing and Settlement reporting Reconciliation<br />

Notification Message 540/550<br />

Page 85


CID EDGE INTERFACES<br />

Criteria Message Type Data Element(s)<br />

Transaction Data<br />

Farecard Usage Transaction PiccUse<br />

Add Value Transaction Data PiccPurseLoad, PiccPassLoad<br />

Financial Audit Data NA<br />

Card Management Data<br />

Initialization PiccInitialize<br />

Issuing PiccInitialize<br />

Registration NA<br />

Personalization NA<br />

Negative List PiccNegativeList<br />

Action List PiccAutoLoadUnloadList<br />

Transit Application Updates NA<br />

Card Parameter Update NA<br />

Key Load NA<br />

Key Change<br />

System and Device Data<br />

NA<br />

Device Status Request NA<br />

Device Command NA<br />

Device Data NA<br />

Event Data NA<br />

Equipment Status Data NA<br />

Peer to Peer Clearing and<br />

Settlement<br />

NA<br />

Not on-us transactions NA<br />

Clearing and Settlement reporting NA<br />

Page 86


TRANSLINK ®<br />

Criteria<br />

Transaction Data<br />

Message Type Data Element(s)<br />

Farecard Usage Transaction UD Type=1, Sub Type=1,2,3,4,5 or 6<br />

Add Value Transaction Data UD Type=2, Sub type=1,2,3,4,5,6,7<br />

or 8<br />

Financial Audit Data<br />

Card Management Data<br />

UD Type=5, Sub Type=1,2 or 3<br />

Initialization UD Type=3, Sub Type=13<br />

Issuing UD Type=3, Sub Type=13<br />

Registration UD Type=3, Sub Type=14 or 15<br />

Personalization UD Type=3, Sub Type= 14 or 15<br />

Negative List UD Type=3, Sub Type=4 - Hotlist CD Payload<br />

Action List UD Type=3, Sub Type=10<br />

Transit Application Updates Service Parameters CD Payload<br />

Card Parameter Update UD Type=3, Sub Type=1,2,3,11,12,16,17,18,19,20<br />

Key Load Device Specific CD Payload<br />

Key Change<br />

System and Device Data<br />

Device Specific CD Payload<br />

Device Status Request System Parameters CD Payload<br />

Device Command System Parameters CD Payload<br />

Device Data UD Type=6, Sub Type=1, 5 or 16<br />

Event Data UD Type=6, Sub Type=1, 5 or 16<br />

Equipment Status Data UD Type=6,<br />

Sub Type=1, 5 or 16<br />

Peer to Peer Clearing and<br />

Settlement<br />

NA<br />

Not on-us transactions NA<br />

Clearing and Settlement reporting Undisclosed<br />

Page 87


ERG APTA<br />

Criteria<br />

Transaction Data<br />

Message Type Data Element(s)<br />

Farecard Usage Transaction UD Type=3,<br />

Sub Type=8,31,32,33,34,35,36,37,38,39,40,41<br />

Add Value Transaction Data UD Type=3, Sub Type=1,2,3,9,10,11<br />

Financial Audit Data<br />

Card Management Data<br />

NA<br />

Initialization UD Type=1, Sub Type=1<br />

Issuing UD Type=1, Sub Type=2<br />

Registration UD Type=1, Sub Type=3<br />

Personalization<br />

UD Type=1, Sub Type=3<br />

Negative List UD Type=1, Sub Type=5,6<br />

Action List UD Type=1, Sub Type=12,13,14<br />

Transit Application Updates NA<br />

Card Parameter Update NA<br />

Key Load UD Type=1, Sub Type= 7<br />

Key Change<br />

System and Device Data<br />

UD Type=1, Sub Type=7<br />

Device Status Request NA<br />

Device Command NA<br />

Device Data NA<br />

Event Data NA<br />

Equipment Status Data NA<br />

Peer to Peer Clearing and<br />

Settlement<br />

NA<br />

Not on-us transactions NA<br />

Clearing and Settlement reporting NA<br />

Page 88


RIS PART 4<br />

Criteria<br />

Transaction Data<br />

Message Type Data Element(s)<br />

Farecard Usage Transaction A401, A402, A403, A405,<br />

A406, A407, A408, A409, A412, A414,<br />

A415,<br />

A416, A417, A418, A419<br />

Add Value Transaction Data T-Purse Load (A201), Regional<br />

Pass Load (A202)<br />

Load <strong>of</strong> Account<br />

Linked Product (A205)<br />

Financial Audit Data<br />

Card Management Data<br />

NA<br />

Initialization PICC Initialization<br />

(A101, A105)<br />

Issuing PICC Issuance<br />

(A102)<br />

Registration PICC Registration (A103)<br />

Personalization PICC Registration (A103)<br />

Negative List Negative<br />

List B110<br />

Action List Stored<br />

Value Autoload (A210), Block Product (A715)<br />

Unblock Product (A716), Setup/Cancel<br />

Product (A718, A719, A720,<br />

A721, A722)<br />

Transit Application Updates NA<br />

Card Parameter Update Directed PICC Data Change (A717)<br />

Key Load Load PICC<br />

Access Key-Set (B130, B131, B132)<br />

Key Change<br />

System and Device Data<br />

Control Key-Set B133<br />

Device Status Request NA<br />

Device Command NA<br />

Device Data NA<br />

Event Data NA<br />

Equipment Status Data NA<br />

Peer to Peer Clearing and<br />

Settlement<br />

NA<br />

Not on-us transactions RCH-to-RCH Messages<br />

Clearing and Settlement reporting End <strong>of</strong> Day<br />

Position (A501), (A502)<br />

Page 89


APPENDIX C DATA ELEMENTS<br />

VENDING EQUIPMENT INTERFACE (VEI) VERSION<br />

1.2<br />

Data Element(s)/Action Description<br />

Conditional Dialog<br />

_CAA010 Item value transacted (added / subtracted)<br />

_CAA025 Original issuing machine number<br />

_CAA031 Number <strong>of</strong> items sold<br />

_CAA032 Item type<br />

_CAA033 Serial number <strong>of</strong> item<br />

_CAA043 Issuing agency ID<br />

_CAA045 Rider category ID<br />

_CAA046 Rider category<br />

name<br />

_CAA048 Usage record<br />

_CAA068 User name<br />

Variable Dialog<br />

acct.* All variables dealing with sales counts<br />

sysconf.bl[] Blacklist structure<br />

sysconf.sa.sversion S<strong>of</strong>tware version <strong>of</strong> I-th sub-assembly<br />

Log File Dialog<br />

Upload Log To retrieve a range <strong>of</strong> records<br />

from the log file<br />

File Management Dialog<br />

Transfer Request Request permission to begin sending or receiving a file<br />

Transfer Block To send a file to the receiver<br />

Data Types<br />

RecParamterList Count <strong>of</strong> items<br />

in list (N)<br />

Parameter<br />

RecConditionAttributes Date and Time<br />

Condition ID<br />

Condition Status<br />

Condition Priority<br />

Condition Severity<br />

Condition Enabled<br />

Condition Incident<br />

Date and Time<br />

last became active<br />

Date and Time last became active<br />

Overall device<br />

status is dependent on this Condition status<br />

Overall device<br />

status<br />

Additional Attributes<br />

List<br />

Page 90


ITSO DATA ELEMENTS<br />

Message Type Data Element(s)<br />

Standard Fields<br />

Record Format Revision<br />

SAMID<br />

ITSOCardReferenceNumber<br />

CardFormatVersion<br />

KeyStrategyVersion<br />

KeyVersion<br />

TransactionDate<br />

TransactionTime<br />

TransactionInformation<br />

IPEID<br />

IPEIssuerID<br />

StaffID<br />

Create and/or Activate ITSO Shell<br />

DepositAmount<br />

DepositAmountCurrencyCode<br />

MethodOfPayment<br />

VATSalesTax<br />

Delete ITSO Shell<br />

DepositRefundAmount<br />

DepsoitAmountCurrencyCodre<br />

Create or Amend IPE<br />

Expiry Date<br />

Remove Data<br />

Create or Amend ITSO ID<br />

Amount<br />

AmountCurrencyCode<br />

HolderTitle<br />

HolderName<br />

HolderAddres<br />

HolderPostalCode<br />

HolderPhoneDay<br />

HolderPhoneHome<br />

HolderEmail<br />

Expiry Date<br />

PassbackTime<br />

CustomerPr<strong>of</strong>ile<br />

IDFlags<br />

DateOfBirth<br />

PersonID<br />

Language<br />

SecondaryHolderID<br />

PhotoID<br />

EntitlementExpiryDate<br />

DepositAmount<br />

DepositCurrencyCode<br />

MethodOfPayment<br />

VATSalesTax<br />

UserDefined<br />

Page 91


ITSO DATA ELEMENTS<br />

Message Type Data Element(s)<br />

Stored Value or CTA usage<br />

Value<br />

IPEAmount<br />

ValueCurrencyCode<br />

POSTAmount<br />

PosTAmountCurrencyCode<br />

ActionSequenceNumber<br />

PurseIssuer<br />

ValueATPAFlags<br />

Stored Value<br />

Load<br />

Value<br />

IPEAmount<br />

ValueCurrencyCode<br />

POSTAmount<br />

PosTAmountCurrencyCode<br />

ActionSequenceNumber<br />

PurseIssuer<br />

ValueATPAFlags<br />

Initialize Auto<br />

Top-Up<br />

PurseIssuer<br />

CurrencyCode<br />

AutoTopUpAmount<br />

AutoTopUpThreshold<br />

BankName<br />

BankACNumber<br />

BankCardExpiryDate<br />

BankCardStartDate<br />

BankCardIssueNumber<br />

Initialize or Ammend Auto Renew<br />

Auto-RenewAmount<br />

Auto-RenewThreshold<br />

AutoRenewValue<br />

BankName<br />

BankACNumber<br />

Expiry Date<br />

StartDate<br />

IssueNumber<br />

First Use Of Stored Value<br />

PurseIssuer<br />

AutoTopUpThreshold<br />

TopUpAmount<br />

MaxValue<br />

ValueCurrencyCode<br />

StartDate<br />

EndDate<br />

DepositAmount<br />

DepositCurrencyCode<br />

Stored Value Transaction Cancellation<br />

Value<br />

Page 92


ITSO DATA ELEMENTS<br />

Message Type Data Element(s)<br />

IPEAmount<br />

ValueCurrencyCode<br />

POSTAmount<br />

POSTAmountCurrencyCode<br />

ActionSequenceNumber<br />

PurseIssuer<br />

Refund for a Purchased Ticket<br />

IPEValue<br />

IPEAmount<br />

IPECurrencyCode<br />

POSTAmount<br />

PosTAmountCurrencyCode<br />

ActionSequenceNumber<br />

Transaction Cancellation<br />

AmountPaid<br />

NormalPrice<br />

CurrencyCode<br />

StoredUsesRefunded<br />

StoredUses<br />

TicketNumber<br />

AmountPaid<br />

Create or Ammend Ticket<br />

IPE<br />

ISAMID<br />

ISAM S#<br />

AmountPaid<br />

NormalPrice<br />

CurrencyCode<br />

IPEFormatRevision<br />

ActionSequenceNumber<br />

RemoveDate<br />

TransactionFlags<br />

RecordSubType<br />

PassbackTime<br />

CountRidesJourneys<br />

Mode<br />

MaxTransfers<br />

TimeLimit<br />

Expiry Date<br />

IssuerID<br />

PassFlags<br />

TicketType<br />

TypeNumber<br />

IssueDate<br />

IssueTime<br />

Class<br />

ExpiryTime<br />

ValidityStartDate<br />

PromotionCode<br />

ValidOnDayTypeCode<br />

Page 93


ITSO DATA ELEMENTS<br />

Message Type Data Element(s)<br />

PartySizeAdult<br />

PartySizeChild<br />

PartySizeConcession<br />

FarePaid<br />

FarePaidCurrencyCode<br />

FarePaidMethodOfPayment<br />

FarePaidVATSalesTax<br />

UserDefined<br />

ValidFrom<br />

ValidTo<br />

NumberOfPasses<br />

TYP6Flags<br />

Journey Record<br />

AmountPaid<br />

NormalPrice<br />

CurrencyCode<br />

RemainingUses<br />

EntryExitType<br />

EntryExit<br />

Deposit Received or Refunded<br />

DepositAmount<br />

DepositAmountCurrency<br />

Exception<br />

ExceptionType<br />

POSTType<br />

Result<br />

Capability List 1<br />

CapabilityListIdentifier<br />

CapabilityListAction<br />

Location<br />

Security<br />

UnHotProtectionNumberOfDays<br />

Communication<br />

MessageSecurity<br />

PrintingCapability<br />

CardholderDisplay<br />

MaxPurseValue<br />

IPEPrioritySelection<br />

Hotlist<br />

HotlistIdentifier<br />

HotlistAction<br />

HotType<br />

Action<br />

CardDisposition<br />

CRNStart<br />

CRNEnd<br />

StartISAMIDOfIPECreator<br />

EndISAMIDOfIPECreator<br />

StartISAMSequenceNumberIPECreator<br />

Page 94


ITSO DATA ELEMENTS<br />

Message Type Data Element(s)<br />

EndISAMSequenceNumberIPECreator<br />

IPETYP<br />

IPEPTYP<br />

IIN<br />

IssuerID<br />

CardIssuerID<br />

Action List<br />

ActionListIdentifier<br />

ActionToTake<br />

CRN<br />

CreditCardNumber<br />

IPETYP<br />

IPEPTYP<br />

IINL<br />

IPEIssuerOID<br />

TicketNumber<br />

ActionSequenceNumber<br />

VariableData<br />

ISO/IEC 8583 DATA ELEMENTS<br />

Message Type Data Element(s)<br />

Financial Presentment Notification<br />

Message 240<br />

Primary Account Number<br />

Processing Code<br />

Amount Transaction<br />

Amount Reconciliation<br />

Date and Time Transmission<br />

Conversion Rate Reconcilation<br />

Conversion Rate Cardholder Billing<br />

System Trace Audit Number<br />

Date and Time Local Transaction<br />

Date Effective<br />

Date Expiration<br />

Date Conversion<br />

Date Capture<br />

Transaction Life Cycle Identification Data<br />

Point <strong>of</strong> Service Data Code<br />

Card Sequence Number<br />

Function Code<br />

Message Reason Code<br />

Merchant Category Code<br />

Date Reconciliation<br />

Reconciliation Indicator<br />

Amounts Original<br />

Acquiring Institution Identification Code<br />

Forwarding Institution Identification Code<br />

Track 2 Data<br />

Track 3 Data<br />

Page 95


Approval Code<br />

Action Code<br />

Service Code<br />

Card Acceptor Terminal Identification<br />

Card Acceptor Identification Code<br />

Card Acceptor Name/Location<br />

Track 1 Data<br />

Amounts Fees<br />

Authorizing Agent Institution Identification Code<br />

Batch/File Transfer Message Control<br />

Receiving Institution Identification Code<br />

Network Management Message<br />

Date and Time Transmission<br />

System Trace Audit Number<br />

Date and Time Local Transaction<br />

Function Code<br />

Message Reason Code<br />

Date Reconciliation<br />

Reconciliation Indicator<br />

Forwarding Institution Identification Code<br />

Batch/File Transfer Control Data<br />

File Transfer Description Data<br />

Transaction Destination Institution Identification Code<br />

Transaction Originator Institution Identification Code<br />

Receiving Institution Identification Code<br />

File Action Instruction/Notification<br />

Message<br />

System Trace Audit Number<br />

Date and Time Local Transaction<br />

Function Code<br />

Message Reason Code<br />

Forwarding Institution Identification Code<br />

Action Code<br />

Batch/File Transfer Message Control<br />

Batch/File Transfer Control Data<br />

File Transfer Description Data<br />

Data Record<br />

Transaction Destination Institution Identification Code<br />

Transaction Originator Institution Identification Code<br />

Receiving Institution Identification Code<br />

File Name<br />

Reconciliation Advice Message 520/530<br />

Primary Account Number<br />

Date and Time Transmission<br />

System Trace Audit Number<br />

Date and Time Local Transaction<br />

Transaction Life Cycle Identification Data<br />

Function Code<br />

Date Reconciliation<br />

Reconciliation Indicator<br />

Acquiring Institution Identification Code<br />

Forwarding Institution Identification Code<br />

Reconciliation Data Primary<br />

Page 96


Amount Net Reconciliation<br />

Receiving Institution Identification Code<br />

Reconciliation Fee Amounts Credit<br />

Reconciliation Fee Amounts Debit<br />

CID EDGE INTERFACES DATA ELEMENTS<br />

Message Type Data Element(s)<br />

PiccInitialize<br />

header [..]<br />

location-details [..]<br />

cid-details [..]<br />

device-details [..]<br />

employee-details[..]<br />

picc-replaced<br />

picc-details [..]<br />

ris-picc-pr<strong>of</strong>iles [..]<br />

ris-picc-product-index […]<br />

ris-picc-transaction-history [..]<br />

message-authenticate [..]<br />

PiccUse Message<br />

header [..]<br />

location-details [..]<br />

cid details [..]<br />

dev-details [..]<br />

employee-details[..]<br />

picc-details [..]<br />

ris-picc-pr<strong>of</strong>iles [..]<br />

ris-picc-product-index [..]<br />

ris-picc-transaction-history [..]<br />

ris-pass-product [..]<br />

ris-sv-purse-list[..]<br />

message-authenticate [..]<br />

PiccPurseLoad Message<br />

header [..]<br />

location-details [..]<br />

cid details [..]<br />

device-details [..]<br />

employee-details[..]<br />

picc-trade-in list[..]<br />

picc-details [..]<br />

ris-picc-pr<strong>of</strong>iles [..]<br />

ris-picc-product-index [..]<br />

ris-picc-transaction-history [..]<br />

ris-sv-purse [..]<br />

message-authenticate [..]<br />

PiccPassLoad Message<br />

header [..]<br />

location-details [..]<br />

cid details [..]<br />

dev-details [..]<br />

employee-details[..]<br />

Page 97


picc-trade-in-list[..]<br />

picc-details [..]<br />

ris-picc-pr<strong>of</strong>iles [..]<br />

ris-picc-product-index [..]<br />

ris-picc-transaction-history [..]<br />

ris-pass-product [..]<br />

ris-pass-product [..]<br />

ris-sv-purse-list[..]<br />

message-authenticate [..]<br />

PiccNegativeList Message<br />

id<br />

picc-issuer<br />

start-date<br />

expire-date<br />

hotlist-groups[..]<br />

first-picc-id<br />

last- picc-id<br />

list-action<br />

entries[…]<br />

message-authenticate [..]<br />

PiccAutolodUnloadList Message<br />

id<br />

picc-Issuer<br />

start-date<br />

expire-date<br />

autoload-list [..]<br />

picc-id<br />

picc-event-id<br />

load-unload-action<br />

agency-id<br />

picc-class<br />

prod-type<br />

loc-value-encoding<br />

loc-value<br />

prod-expiry-date<br />

autoload-threshold<br />

autoload-recurrence<br />

message-authenticate [..]<br />

Page 98


TRANSLINK<br />

Message Type Data Element(s)<br />

UD Record - Fare Transaction<br />

Card S/N<br />

Card Transaction Sequence Number<br />

Contrcat ID<br />

Contrcat S/N<br />

Transaction Qualifier<br />

Fare Category<br />

Fare Payment Method<br />

Transaction Amount<br />

Last Operator<br />

Transaction Location<br />

Destination Location<br />

Purse Balance<br />

Card Synchronization Number<br />

Contract Sequence Number<br />

Contract Synchronization Number<br />

Last Add Value Summary<br />

UD Authentication Code<br />

UD Record - Add Value Transaction<br />

Card Serial #<br />

Transaction Sequence #<br />

Contract ID<br />

Contract S/N<br />

Transaction Qualifier<br />

Card Syn. Number<br />

Value Added<br />

Transaction Amount<br />

Current Stored Value<br />

Device ID<br />

EFT System Trace Audit #<br />

EFT Response<br />

EFT Authorization ID<br />

Last Add Value Summary<br />

Block/unblock event data elements<br />

card SN<br />

Transaction Sequence #<br />

Card Syn. Number<br />

Card Status (ud type=3 sub-type 3 or 4 only)<br />

hotlist serial number<br />

Contract ID<br />

Contract S/N<br />

ontract Sequence number<br />

Contract SYNC number<br />

Contract Flags<br />

Contract status<br />

Contract expiry date<br />

Transaction qualifier<br />

Failed transaction event data elements<br />

card s/n<br />

Page 99


card status<br />

failure reason<br />

Business rule exception event<br />

card SN<br />

Contract ID<br />

Contract S/N (sub-type 9 only)<br />

failure reason<br />

Purse Balance (sub-type 7 only)<br />

fare category<br />

failure reason<br />

Autoload enable/disable<br />

card s/n<br />

Contract ID<br />

Contract Flags<br />

enabled autoload flags<br />

disabled autoload flags<br />

Card issue event<br />

card s/n<br />

card type<br />

Card Syn. Number<br />

card contracts limit<br />

issuer ID<br />

card expiry date<br />

fare category<br />

transaction amount<br />

deposit value<br />

Card registration event<br />

card s/n<br />

date <strong>of</strong> birth<br />

name<br />

address<br />

telephone number 1<br />

telephone number 2<br />

e-mail address<br />

Balance protection event<br />

card s/n<br />

amount <strong>of</strong> transaction<br />

card retention event<br />

card s/n<br />

receipt number<br />

retention reason<br />

CID Audit register snapshot data elements<br />

batch sequence number<br />

ud sequence number<br />

fares debit counter<br />

fares purse debit accumulator<br />

fares credit counter<br />

fares purse credit accumulator<br />

autoload purse counter<br />

autoload purse accumulator<br />

remote load purse counter<br />

remote load purse accumulator<br />

Page 100


Autoload non-purse counter<br />

remote load non-purse counter<br />

Distribution device Audit Register snapshot data elements<br />

batch sequence<br />

number<br />

ud sequence number<br />

Purse add value counter, cash payments<br />

Purse add value Value, cash payments<br />

Purse add value counter, EFT payments<br />

Purse add value<br />

Value, EFT payments<br />

Non-purse add value counter (own products cash payments)<br />

Non-purse add value value<br />

(own products cash payments)<br />

Non-purse add value counter (other products cash payments)<br />

Non-purse add value value (other products cash payments)<br />

Non-purse add value<br />

counter (own products EFT payments)<br />

Non-purse add value value (own products EFT payments)<br />

Non-purse add value counter (other products EFT payments)<br />

Non-purse add value value (other products EFT payments)<br />

Card issued<br />

counter, cash payments<br />

Card issued value, cash payments<br />

Card issued counter, EFT payments<br />

Card issued Value, cash payments<br />

Card issued<br />

counter, other means<br />

Card issued value, other means<br />

Balance protection<br />

counter, cash payments<br />

Balance protection value,<br />

cash payments<br />

Balance protection counter, EFT payments<br />

Balance protection value, EFT payments<br />

Other fare media counter, cash payments<br />

Other fare media<br />

value, cash payments<br />

Other fare media counter, EFT payments<br />

Other fare media value, EFT payments<br />

Page 101


ERG APTA<br />

Message Type Data Element(s)<br />

UD Record - Fare Transaction<br />

Card S/N<br />

Card Transaction Sequence Number<br />

Contrcat ID<br />

Contrcat S/N<br />

Transaction Qualifier<br />

Fare Category<br />

Fare Payment Method<br />

Transaction Amount<br />

Last Operator<br />

Transaction Location<br />

Destination Location<br />

Purse Balance<br />

Card Synchronization Number<br />

Contract Sequence Number<br />

Contract Synchronization Number<br />

Last Add Value Summary<br />

UD Authentication Code<br />

UD Record - Add Value Transaction<br />

Card Serial #<br />

Transaction Sequence #<br />

Contract ID<br />

Contract S/N<br />

Transaction Qualifier<br />

Card Syn. Number<br />

Value Added<br />

Transaction Amount<br />

Current Stored Value<br />

Device ID<br />

EFT System Trace Audit #<br />

EFT Response<br />

EFT Authorization ID<br />

Last Add Value Summary<br />

Block/unblock event data elements<br />

card SN<br />

Transaction Sequence #<br />

Card Syn. Number<br />

Card Status (ud type=3 sub-type 3 or 4 only)<br />

hotlist serial number<br />

Contract ID<br />

Contract S/N<br />

ontract Sequence number<br />

Contract SYNC number<br />

Contract Flags<br />

Contract status<br />

Contract expiry date<br />

Transaction qualifier<br />

Failed transaction event data elements<br />

card s/n<br />

Page 102


card status<br />

failure reason<br />

Business rule exception event<br />

card SN<br />

Contract ID<br />

Contract S/N (sub-type 9 only)<br />

failure reason<br />

Purse Balance (sub-type 7 only)<br />

fare category<br />

failure reason<br />

Autoload enable/disable<br />

card s/n<br />

Contract ID<br />

Contract Flags<br />

enabled autoload flags<br />

disabled autoload flags<br />

Card issue event<br />

card s/n<br />

card type<br />

Card Syn. Number<br />

card contracts limit<br />

issuer ID<br />

card expiry date<br />

fare category<br />

transaction amount<br />

deposit value<br />

Card registration event<br />

card s/n<br />

date <strong>of</strong> birth<br />

name<br />

address<br />

telephone number 1<br />

telephone number 2<br />

e-mail address<br />

Balance protection event<br />

card s/n<br />

amount <strong>of</strong> transaction<br />

card retention event<br />

card s/n<br />

receipt number<br />

retention reason<br />

CID Audit register snapshot data elements<br />

batch sequence number<br />

ud sequence number<br />

fares debit counter<br />

fares purse debit accumulator<br />

fares credit counter<br />

fares purse credit accumulator<br />

autoload purse counter<br />

autoload purse accumulator<br />

remote load purse counter<br />

remote load purse accumulator<br />

Page 103


Autoload non-purse counter<br />

remote load non-purse counter<br />

Distribution device Audit Register snapshot data elements<br />

batch sequence number<br />

ud sequence<br />

number<br />

Purse add value counter, cash payments<br />

Purse add value Value, cash payments<br />

Purse add value counter, EFT payments<br />

Purse add value Value, EFT payments<br />

Non-purse add value counter (own products cash payments)<br />

Non-purse add value value (own products cash payments)<br />

Non-purse add value counter (other products cash payment s)<br />

Non-purse add value value (other products cash payments)<br />

Non-purse add value counter (own products EFT payments)<br />

Non-purse add value value (own products EFT payments)<br />

Non-purse add value counter (other products EFT payment s)<br />

Non-purse add value value (other products EFT payments)<br />

Card issued counter, cash payments<br />

Card issued value, cash payments<br />

Card issued counter, EFT payments<br />

Card issued Value, cash payments<br />

Card issued counter, other means<br />

Card issued value, other means<br />

Balance protection counter, cash payments<br />

Balance protection value, cash payments<br />

Balance protection counter, EFT payments<br />

Balance protection value, EFT payments<br />

Other fare media counter, cash payments<br />

Other fare media value, cash payments<br />

Other fare media counter, EFT payments<br />

Other fare media value, EFT payments<br />

Page 104


RIS PART 4: FOR A LIST OF DATA OBJECTS AND ELEMENTS SEE THE RIS<br />

STANDARD DOCUMENTATION<br />

Page 105


Appendix D RIS PART 4 RCH-To-RCH Messages<br />

Message Required Optional<br />

A201 – Regional T-Purse Loaded X<br />

A209 - Out <strong>of</strong> Region T-Purse Loaded X<br />

A250 – Regional T-Purse Unloaded X<br />

A401 – Use <strong>of</strong> Regional T-purse X<br />

A410 – Attempted use <strong>of</strong> a Negative listed PICC X<br />

A412 - Use <strong>of</strong> Account Linked Product X<br />

A413 – Rejected Transaction X<br />

A414 – Use <strong>of</strong> Regional T-purse on an Out <strong>of</strong> Region PICC. X<br />

A501 – End <strong>of</strong> Day Position X<br />

A502 – End <strong>of</strong> Day Transaction Receipt X<br />

B110 – Negative List Header X<br />

B111 - Negative List Directive X<br />

B112 – Negative List Authentication X<br />

B120 – Fare Policy Framework – Header X<br />

B121 – Fare Policy Framework – Regional Pr<strong>of</strong>ile Codes X<br />

B122 – Fare Policy Framework – Regional Product IDs X<br />

B123 – Fare Policy Framework – Regional Agency IDs X<br />

B124 – Fare Policy Framework – Authentication Entry X<br />

Page 106

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!