Property of the EMV Migration Forum © 2013 ATM Working Group AID “What-Ifs” Sub-Group.

Slides:



Advertisements
Similar presentations
Architecture and institutional issues for AeroMACS.
Advertisements

ATM “What If” Session Assumption Validation EMF San Diego – May 20, 2014 Updated May 29,
Test practice Multiplication. Multiplication 9x2.
CONFIDENTIAL AND PROPRIETARY ©2014 DISCOVER FINANCIAL SERVICES 2014 Discover ® Dealer Incentive Program & EMV Update.
1 U.S. EMV Migration Update and Best Practices Hap Huynh, Senior Director Risk Products April 2015.
Talking Technology and Transportation (T3)
Partnering For Success Diners Club Nordic. © 2009 Diners Club International Ltd. - Confidential and Proprietary In July 2008, Diners Club International.
> >
Geneva, Switzerland, 4 December 2014 Evolving Payments into The Digital World Richard Smith, Vice President, MasterCard Customer Fraud Management
A Day in the Life of an Application Performance Engineer Keith Lyon - Shunra Software
Chapter 3 Data Models.
Developing Enterprise Architecture
1 Systems Analysis and Design in a Changing World, Fourth Edition.
Convenience Fees Solving the Puzzle Angela Gross Fifth Third Processing Solutions Executive Consultant – Government Specialist October 19, 2010.
Decision Support Systems Management Information Systems BUS 391 Barry Floyd.
Interac Association Chip readiness program Global Platform August 21, 2002 Global Platform August 21, 2002.
ALTERNATIVE TO IMPOSING OMNIBUS SERVICE SERVITUDES PDA MUNICIPAL FORUM 18 FEBRUARY 2011.
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
2014 Asia-Pacific Financial Forum Seattle, Washington July 7, 2014 Electronic Payments: Expanding Financial Access for Consumers and Businesses of Every.
Business objectives. What are business objectives? On your own write down how a business comes up with objectives and what these would typically be about
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
Real-Time Intelligence That Matters. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business The Last G-20 Country To Embrace The.
Networking And their components. What is Networking? In it’s simplest term, networking is when two or more things are able to communicate and understand.
Technical Reading Report Virtual Power: Coordinated Power Management in Virtualized Enterprise Environment Paper by: Ripal Nathuji & Karsten Schwan from.
When you run a scenario, the Vusers on each host machine use the host’s IP address. You can define multiple IP addresses on a host machine to emulate a.
Professional Ethics and Responsibilities
Payments Conference & Networking Dinner Berlin, February 15, 2016.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
Summary of Changes. General These are changes that have come up in many EMV migrations that I have assessed and been involved in. The changes are broken.
Energy Trust’s Emerging Technology Crystal Ball March 2, 2016.
Presented by David Cole Background to Chip. PAYMENT SYSTEMS HISTORY A POTTED HISTORY DINERS LAUNCH 1950 AMEX LAUNCH 1958 BANK AMERICARD 1959 MASTERCHARGE.
Presented by David Cole CVM Methods.  CVM Methods in the End-to-End Process  What is a CVM List?  Risk protection tool  Types of PIN processing 
ATM Industry Issues and Updates
Terminal Risk Management
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
CONFERENCE OF WESTERN ATTORNEYS GENERAL
IT Architecture Technical blueprint for evolving a corporate infrastructure resource that can be shared by many users and services processing systems hardware.
Multiplication table. x
Problems – Technical Requirements
8.1 Multiplication Properties of Exponents
Data Formats: Avoiding proprietary formats
EMV® 3-D Secure - High Level Overview
CS 31006: Computer Networks – The Routers
Multiplication Tables
Unit I Flash Cards Start.
Introduction to Databases Transparencies
المدخل إلى تكنولوجيا التعليم في ضوء الاتجاهات الحديثة
Communication & Education Working Committee July 2013
Dots 5 × TABLES MULTIPLICATION.
Dots 5 × TABLES MULTIPLICATION.
Dots 2 × TABLES MULTIPLICATION.
5 × 7 = × 7 = 70 9 × 7 = CONNECTIONS IN 7 × TABLE
5 × 8 = 40 4 × 8 = 32 9 × 8 = CONNECTIONS IN 8 × TABLE
Dots 3 × TABLES MULTIPLICATION.
Operational Rules Model – step-by-step instructions and template
Dots 6 × TABLES MULTIPLICATION.
4 × 6 = 24 8 × 6 = 48 7 × 6 = CONNECTIONS IN 6 × TABLE
5 × 6 = 30 2 × 6 = 12 7 × 6 = CONNECTIONS IN 6 × TABLE
1: multiple representations
Dots 2 × TABLES MULTIPLICATION.
Dots 4 × TABLES MULTIPLICATION.
10 × 8 = 80 5 × 8 = 40 6 × 8 = CONNECTIONS IN 8 × TABLE MULTIPLICATION.
3 × 12 = 36 6 × 12 = 72 7 × 12 = CONNECTIONS IN 12 × TABLE
Writing an Argumentative Essay
5 × 12 = × 12 = × 12 = CONNECTIONS IN 12 × TABLE MULTIPLICATION.
I have… I have… Who has 3:40? Who has 12:20? I have… I have…
5 × 9 = 45 6 × 9 = 54 7 × 9 = CONNECTIONS IN 9 × TABLE
3 × 7 = 21 6 × 7 = 42 7 × 7 = CONNECTIONS IN 7 × TABLE
Dots 3 × TABLES MULTIPLICATION.
Multiplication Facts 3 x Table.
Presentation transcript:

Property of the EMV Migration Forum © 2013 ATM Working Group AID “What-Ifs” Sub-Group

Property of the EMV Migration Forum © 2012 AID “What-Ifs” Sub-group Objective for consideration – Maintain existing US ATM routing infrastructure  ATM Acquirers, utilizing network BIN tables and proprietary routing logic, decide where to route transactions acquired at their ATMs Taking into consideration their obligations to the network operating rules for networks they choose to accept at their ATMs  Some ATM Acquirers choose to “blackhole” all acquired ATM activity to their processor or network, for subsequent routing to other networks, at the acquirers instructions  On-Us ATM transactions are typically not routed through shared networks, but maintained within the acquirers own systems for routing and authorization Some acquirers may elect to route a portion of their on-us activity through a shared network for specific business reasons

Property of the EMV Migration Forum © 2012 AID “What-Ifs” Sub-group We should look at each of the following potential scenarios to understand the implications for all stakeholders and educate the relevant working groups of those implications  Scenario 1 – EMV card – US issued, one EMV application, one AID  Scenario 2 – EMV card – US issued, one EMV application, multiple AIDs  Scenario 3 – EMV card – US issued, two EMV applications, one or more AIDs under each application  Scenario 4 – EMV card – Non-US issued, one EMV application, multiple AIDs