The card authentication process has a card inserted in a terminal. The card uses an asymmetrical encryption algorithm to generate a digital word cryptogram. There is an authentication procedure (e3) and an exchange step between the card and the terminal. The information allows a supplementary algorithm to verify a secret specification in the card without communicating outside the terminal area.
展开▼