J-Secure 2.0 Acquirer Implementation Guide - v1.2
J-Secure 2.0 Acquirer Implementation Guide - v1.2
0 Acquirer
Implementation Guide
Ver.1.2
J/Secure™ 2.0 Acquirer Implementation Guide
All rights relating to this document belong to JCB Co., Ltd. (hereinafter referred to as “JCB”).
This document contains JCB’s confidential and proprietary information, patents, copyrights,
trademark rights, trade secrets, know-how and other intellectual property or other rights. To
use any part of this document (whether formatted as text, images or in any other way) by
any method (including but not limited to browsing and downloading), you (“the reader”) must
agree to all of the items published herein.
The reader must not copy, distribute, assign, lend, post, publish, disclose or modify
(including translating) any part or all of this document to or for any third party, by any means
whatsoever, except as permitted in advance by JCB.
This document may contain third-party information, patents, copyrights, trademark rights,
trade secrets, know-how and other intellectual property or other rights. JCB does not
guarantee this document or any part thereof to be free of infringement of third-party
information, patent rights, copyrights, trademark rights, trade secrets, know-how, or any
other intellectual property or rights (either explicitly or implicitly). In using this document, it is
the reader’s responsibility to decide whether it is necessary to purchase or license such
rights from a third party. JCB shall not be held liable for infringements of a third party’s
intellectual property or other rights by the reader or any other party.
Although we strive to ensure that this document is accurate and up-to-date, JCB makes no
explicit or implicit warranty as to the accuracy or completeness of this document. Also, JCB
assumes no responsibility for any products or services developed or produced in
accordance with this document. JCB assumes no responsibility for errors or omissions in
this document.
To the extent permitted by law, JCB, its directors, employees, affiliates, business partners,
agents, and other representatives shall assume no responsibility for any direct or indirect
damages (including damages incurred by third parties) arising from the use or inability to
use this document, even if JCB has been notified of the possibility of such damages.
JCB Confidential
J/Secure™ 2.0 Acquirer Implementation Guide
JCB Confidential
J/Secure™ 2.0 Acquirer Implementation Guide
Table of Contents
1 Introduction ................................................................................................................... 1
1.1 Objective ..................................................................................................................1
1.2 Intended Readers ....................................................................................................1
1.3 Prerequisites of this Document.............................................................................1
1.4 Structure of this Document ...................................................................................1
1.5 Revisions of this Document ..................................................................................2
1.6 Related Documents ................................................................................................2
1.6.1 EMV 3DS Documents ...........................................................................................2
1.6.2 JCB Documents ....................................................................................................2
1.7 Definitions................................................................................................................2
2 J/Secure2.0 Overview ................................................................................................... 3
2.1 Overview ..................................................................................................................3
2.2 Objectives ................................................................................................................3
2.3 Participants and Responsibilities .........................................................................4
2.4 Structure ..................................................................................................................5
2.4.1 System Overview ..................................................................................................5
2-4-2 System Arrangement Diagram ...............................................................................6
2-5. Authentication Flow ...................................................................................................7
2-5-1 Authentication Flow (Frictionless Flow) ..................................................................7
2-5-2 Authentication Flow (Challenge Flow) ....................................................................8
3. Acquirer Implementation and Operation process ..................................................... 9
4. Consideration on Planning Phase............................................................................. 10
4.1 Decision of Implementation Method ........................................................................10
4.1.1 Implementation Options ............................................................................................10
4.1.2 3DS Server Selection ...............................................................................................10
4.1.3 Revision of Merchant Agreement .............................................................................10
5 Implementation Phase .................................................................................................11
5.1 Application to JCB ................................................................................................ 11
5.2 Initialization of 3DS Server .................................................................................. 11
5.2.1 Information required ............................................................................................ 11
5.2.2 Setting of 3DS Server Operator ID ..................................................................... 11
5.2.3 3DS Server Reference Number .......................................................................... 11
5.3 Initialization of 3DS SDK ...................................................................................... 11
5.4 Installation of Encryption Keys and Certificates...............................................12
5.4.1 Installation on the 3DS Server ............................................................................12
5.4.2 Installation to the 3DS SDK.................................................................................12
5.5 Authorization System Upgrade ...........................................................................13
5.5.1 Authorization Message Items ..............................................................................13
5.6 Merchant Implementation ....................................................................................13
5.6.1 Obtainment of Acquirer BIN and 3DS Server Operator ID .................................13
5.6.2 Registration of Information with DS ....................................................................13
5.6.3 Setting of Acquirer Merchant ID ..........................................................................13
5.6.4 Setting of 3DS Requestor ID ...............................................................................13
5.6.5 Display of JCB Logo ............................................................................................13
5.7 Transaction Processing Requirements ..................................................................... 14
5.7.1 Risk-based Authentication Results ...........................................................................14
5.7.2 Challenge Authentication Results .............................................................................15
JCB Confidential
J/Secure™ 2.0 Acquirer Implementation Guide
JCB Confidential
J/Secure™ 2.0 Acquirer Implementation Guide
1. Introduction
1 Introduction
This chapter describes the objectives, the intended readers, prerequisites, structure, revisions
and related materials of this document.
The term “JCB” used in this document refers to “JCB as the brand holder” unless otherwise
specified.
1.1 Objective
The purpose of this document is to convey the necessary requirements, operations and
guidelines involved when an Acquirer implements J/Secure2.0.
Chapter 1: Introduction
This chapter describes the objectives, the intended readers, prerequisites, structure,
revisions and related materials of this document.
JCB Confidential
1
J/Secure™ 2.0 Acquirer Implementation Guide
1. Introduction
This chapter describes items that the Acquirer shall consider before implementing its
ACS.
Chapter 6: Testing
This chapter describes each test for J/Secure2.0 implementation.
1.7 Definitions
Definitions of the terms “shall”, “should”, and “may” used in this document are following.
(1) “shall” indicates that fulfilling requirements is mandatory.
(2) “should” indicates that fulfilling requirements is strongly recommended.
(3) “may” indicates that fulfilling requirements is optional.
Unless otherwise defined in this document, the definitions of terms shall conform to the EMV
3DS.
JCB Confidential
2
J/Secure™ 2.0 Acquirer Implementation Guide
2. J/Secure2.0 Overview
2 J/Secure2.0 Overview
This chapter presents an overview of J/Secure2.0, its objectives, and the responsibilities of each
party involved.
2.1 Overview
J/Secure2.0 is JCB’s Cardholder authentication program compliant with the EMV 3DS technical
specification, which is the next generation of 3-D Secure specification. The features of
J/Secure2.0 are as follows:
➢ Frictionless Authentications
By performing risk-based authentication using information about the purchase and the
Merchant together with other details such as the device being used by the Cardholder, the
authentication of the majority of transactions is accomplished without the Cardholder having
to input information such as a password. This makes it possible to avoid situations such as
Cardholder withdrawing from transactions as a result of forgetting password.
2.2 Objectives
J/Secure2.0 serves four objectives, which are as follows:
JCB Confidential
3
J/Secure™ 2.0 Acquirer Implementation Guide
2. J/Secure2.0 Overview
JCB Confidential
4
J/Secure™ 2.0 Acquirer Implementation Guide
2. J/Secure2.0 Overview
2.4 Structure
2.4.1 System Overview
Table 2-2 shows an overview of the system necessary for implementing J/Secure2.0.
JCB Confidential
5
J/Secure™ 2.0 Acquirer Implementation Guide
2. J/Secure2.0 Overview
DS
Payment
J/Secure CA
Request
ACS
Commercial CA
JCB
Issuer Host (Authorization Acquirer Host
system)
JCB Confidential
6
J/Secure™ 2.0 Acquirer Implementation Guide
2. J/Secure2.0 Overview
(1) Cardholder follows the purchase procedure using the Merchant web site or app.
(2) The 3DS Server sends an AReq message to DS, and DS sends it to ACS.
(3) The ACS performs authentication based on the contents of the AReq message.
The ACS sends the authentication results as an ARes message to the DS, and DS sends
(4)
it to the 3DS Server.
The 3DS Requestor adds the authentication results to the authorization and sends it to
(5)
the Acquirer.
The Acquirer sends an authorization message, and the results of the authorization
(6)
processing by the Issuer are sent back to the 3DS Requestor via the Acquirer.
* Steps (5) and (6) may be omitted if the 3DS Requestor is not a merchant, or if the service
is used for non-payment purpose.
JCB Confidential
7
J/Secure™ 2.0 Acquirer Implementation Guide
2. J/Secure2.0 Overview
(1) The 3DS SDK or the web browser sends a CReq message to ACS.
For App: Information necessary for the screen display is sent as a CRes message from
(2)
the ACS to the 3DS SDK.
The 3DS SDK or the web browser displays a form where Cardholder can input
(3)
information necessary for authentication, and the Cardholder completes this form.
(4) The ACS performs authentication based on the information entered by the Cardholder.
The ACS sends the authentication results to DS as an RReq message, and the DS sends
(5)
it to the 3DS Server.
The 3DS Requestor adds the authentication results to the authorization and sends it to
(6)
the Acquirer.
The Acquirer sends an authorization message, and the results of the authorization
(7)
processing by the Issuer are sent back to the 3DS Requestor via the Acquirer.
(8) The 3DS Server sends the result received via RReq to DS as an RRes message.
JCB Confidential
8
J/Secure™ 2.0 Acquirer Implementation Guide
3. Acquirer Implementation and Operation process
Implemen
Planning Test Operation
tation
JCB Confidential
9
J/Secure™ 2.0 Acquirer Implementation Guide
4. Consideration on Planning Phase
The Acquirer develops its own 3DS server in-house and provides it to the
Merchant.
The Acquirer purchases 3DS server from a vendor, implements it in-house, and
provides it to the Merchant as a hosting service.
The Acquirer partners with a third party who provides 3DS server as a hosting
service and provides it to the Merchant.
The Merchant selects 3DS server at its discretion.
JCB Confidential
10
J/Secure™ 2.0 Acquirer Implementation Guide
5. Implementation Phase
5 Implementation Phase
This chapter describes items that the Acquirer shall execute at the implementation phase.
<<Where to submit>>
JCB International Co. Ltd.
Network Services Headquarters
Fax to: +81-3-5778-8377
After the form has been submitted, JCB will provide the information listed below to the
Acquirer
・Acquirer BIN
・3DS Server Operator ID
For the criteria of setting each parameter, refer to J/Secure2.0 3DS Server Functional
Requirements.
JCB Confidential
11
J/Secure™ 2.0 Acquirer Implementation Guide
5. Implementation Phase
JCB Confidential
12
J/Secure™ 2.0 Acquirer Implementation Guide
5. Implementation Phase
Table 5-4
Item Explanation
JCB Confidential
13
J/Secure™ 2.0 Acquirer Implementation Guide
5. Implementation Phase
known that the Merchant has adopted J/Secure2.0. (J/Secure2.0 logo, etc.)
The Acquirer can obtain the J/Secure2.0 logo data from JCB at the URL shown below.
JCB VI Design Manual
http://www.jcb.co.jp/bdmanual/en/serviceMark/jsecure/download.htm
JCB Confidential
14
J/Secure™ 2.0 Acquirer Implementation Guide
5. Implementation Phase
JCB Confidential
15
J/Secure™ 2.0 Acquirer Implementation Guide
5. Implementation Phase
Authentication Successful Y 05
Authentication Failed N 07 *1
Authentication
U 07
Could Not Be Performed
DS attempt A 06(07) *2
ACS attempt A 06(07) *2
Authentication
R Authorization not possible
Rejected
*1 Shall not send Authorization when Challenge not successful (Exceeding maximum challenge),
Challenge cancel by the Cardholder,
*2 Set the values in parentheses before starting to apply liability rules for Attempt transactions.
➢ Split shipment
➢ Change in transaction amount due to addition/cancellation of purchased
items
In such a case, the Merchant and Acquirer again set the same ECI and CAVV to the
Authorization Request message, which they have used to the original Authorization Request
message. A valid CAVV shall be set. If these values are not set in the Authorization Request
message, the Issuer can request a chargeback.
For more information on sales data inclusion requirements, refer to the JRP Batch
Interface Guide.
JCB Confidential
16
J/Secure™ 2.0 Acquirer Implementation Guide
6. Testing
6 Testing
This chapter describes each test for J/Secure2.0 implementation.
Table 6-1
Case Requirement
1) The Merchant has newly adopted a 3DS Server or 3DS SDK in their
own environment or there has been a major change in the 3DS Server Mandatory
implementation environment after service commencement.
2) A Merchant that has already implemented a 3DS Server newly
Mandatory
adopts a 3DS SDK.
3) A Merchant that is using a 3DS Server and 3DS SDK already
Optional
implemented with a hosting service, etc. uses a newly obtained 3DS
(recommended)
Server Operator ID.
4) A Merchant that is using a 3DS Server and 3DS SDK already
Optional
implemented with a hosting service, etc. uses a 3DS Server Operator
(recommended)
ID that is shared with a settlement agent.
JCB Confidential
17
J/Secure™ 2.0 Acquirer Implementation Guide
7. Operation Phase
7. Operation Phase
This chapter describes Chargeback rules for J/Secure2.0 transactions and the security
requirements.
JCB Confidential
18
J/Secure™ 2.0 Acquirer Implementation Guide
7. Operation Phase
Also, in the case where a Chargeback is received from the Issuer for a transaction without
performing Cardholder authentication prescribed in Section 5-7, the Acquirer shall be able to
present the record of Cardholder authentication and its relevance for the original transaction
7.2.2.1 Prerequisites
The Acquirer uses and manages the keys described in Section 5.4 but should not use these keys
for reasons other than the intended use described in this document.
Also, the Acquirer should consider the risks of these keys being compromised etc., and should
avoid using the same keys over a long period of time
➢ Split knowledge
Various supervisors distribute the keys and manage various components. A
complete key cannot be constructed with the information retained by one personnel
alone.
➢ Dual Control
Multiple personnel manage one key, rather than one personnel managing the key
alone.
JCB Confidential
19
J/Secure™ 2.0 Acquirer Implementation Guide
7. Operation Phase
Each type of key shall be used throughout its life cycle in a physically and logically safe device,
to avoid improper use. Also, regardless of the life cycle, the key shall not be revealed outside of
this safe device in plaintext format.
➢ In the case where each type of DES encryption key or RSA private key has been
exposed to risk, or there is such a possibility
➢ In the case where each type of DES encryption key or RSA public key pair has lost
its complete secrecy, or there is such a possibility
7.2.2.4 Back-up
In preparation for cases where the key being used is lost or damaged due to a system error for
example, the key should be backed up so that the key can be restored. Therefore it is desirable
for the system to be able to load the back-up key. The back-up key shall not be stored at a lower
security level than the key in current use.
JCB Confidential
20
J/Secure™ 2.0 Acquirer Implementation Guide
Appendix A Form
Appendix A Form
Acquirer Implementation Form for J/Secure 2.0
JCB Confidential
21
J/SecureTM2.0 Acquirer Implementation Guide
Appendix A Form
Address
Telephone
Fax
JCB Confidential
22
J/SecureTM2.0 Acquirer Implementation Guide
Appendix A Form
*Any email for the DS 2.0 registration which domain is not indicated will be rejected.
Title ________________________________
Acquirer BIN
Password
When Acquirer submits the DS registration files to JCBI, the file (zip format) shall be protected
by this Password.
Date: (YYYY,MM,DD) ___________________________
Title ________________________________
JCB Confidential
23
J/SecureTM2.0 Acquirer Implementation Guide
Appendix B ECI mapping
Seq Issuer Challenge ACS ①ACS ARes ②DS ARes ③ACS RReq ④DS RReq ⑤ Authorization Liability
Authentication result Scenario example
support availability behavior Trx Status ECI CAVV Trx Status ECI CAVV Trx Status ECI CAVV Trx Status ECI CAVV ECI CAVV
Not
a DS Attempt No account range A 07 *1 yes 07 - Acquirer
support
Transaction Status:
b DS Attempt RBA is performed but Challenge is not available U 07 - A 07 *1 yes 07 - Acquirer Y = Authentication Successful
N = Authentication fail or cancel
Challenge is
c ACS Attempt RBA is performed but Challenge is not available A 06 yes A 07 *1 value of ① 07 - Acquirer U = Authentication could not be
unavailable
performed due to technical issue
d RBA is successful Y 05 yes Y 05 value of ① 05 value of ARes Issuer C = Request Challenge
Authentication R = Authentication Reject
e RBA is successful Y 05 yes Y 05 value of ① 05 value of ARes Issuer
Successful A = Attempt
s Normal Other errors DS can not send ARes to 3DSS *2 Any Any Any not Connected / Error Message 07 - Acquirer
For NPA, use same value for transaction status and ECI and presence of CAVV is up to the issuer. Authorization is not applicable for NPA.
<NOTE>
*1 DS change ECI=06 to 07 for attempt transaction before the liability rule activation.
*2 If a message is in error or not connected or timed out, an error component send error message and ends processing. If a merchant decides to send authorization, the transaction is not eligible for the liability shift.
JCB Confidential
24
J/SecureTM2.0 Acquirer Implementation Guide
Appendix B ECI mapping
b DS Attempt RBA is performed but Challenge is not available U 07 - A 06 yes 06 value of ARes Issuer
Challenge is
c ACS Attempt RBA is performed but Challenge is not available A 06 yes A 06 value of ① 06 value of ARes Issuer Transaction Status:
unavailable
Y = Authentication Successful
d RBA is successful Y 05 yes Y 05 value of ① 05 value of ARes Issuer N = Authentication fail or cancel
U = Authentication could not be
Authentication
e RBA is successful Y 05 yes Y 05 value of ① 05 value of ARes Issuer performed due to technical issue
Successful
C = Request Challenge
f Challenge authentication is successful C - - C - - Y 05 yes Y 05 value of ③ 05 value of RReq Issuer R = Authentication Reject
Challenge is
available A = Attempt
Challenge not successful(Exceeding maximum
g Normal C - - C - - N - - N - - Shall not send
challenge), Challenge cancel
Authentication not
h Challenge not performed by the merchant C - - C - - N 07 - N 07 - 07 - Acquirer
successful
k Technical issues or Errors occurred in CReq/CRes C - - C - - Error Message Error Message 07 - Acquirer
Suppor other problems
t Technical issues or other problems during Challenge
l C - - C - - U 07 - U 07 - 07 - Acquirer
process and authentication is not completed.
ACS can not send RReq to DS, ACS send error message
p C - - C - - not Connected / Error Message 07 - Acquirer
to DS
s Normal Other errors DS can not send ARes to 3DSS *1 Any Any Any not connected 07 - Acquirer
For NPA, use same value for transaction status and ECI and presence of CAVV is up to the issuer. Authorization is not applicable for NPA.
<NOTE>
*1 If a message is in error or not connected or timed out, an error component send error message and ends processing. If a merchant decides to send authorization, the transaction is not eligible for the liability shift.
*2 The CAVV associated with a fully authenticated transaction or an attempted transaction, must be included in the authorization message.
*3 3DS Server shall send AReq message even though the issuer card range is not participated in J/Secure2.0 in order to generate the proof of an authentication attempt.
JCB Confidential
25
J/SecureTM2.0 Acquirer Implementation Guide
Appendix B ECI mapping
<NOTE>
*1 If a message is in error or not connected or timed out, an error component send error message and ends processing.
JCB Confidential
26
J/SecureTM2.0 Acquirer Implementation Guide
Ver.1.2