Issuer Authentication in EMV L3 Certification

Issuer Authentication in EMV L3 Certification

Issuer Authentication forms one of the most critical pillars of EMV transaction security because it verifies that the host (issuer) authorizing the transaction is legitimate, unaltered, and trusted, thereby eliminating the possibility of fraud through host impersonation, unauthorized approvals, or data tampering during online authorization. In EMV L3 Certification, this phase undergoes strict validation because the terminal must not only correctly handle the cryptographic data exchanged between card and issuer but must also follow all procedural steps defined by EMVCo to ensure end-to-end trust in the payment ecosystem.

Issuer authentication happens primarily during the post-authorization stage, when the issuer returns an Authorization Response Cryptogram (ARPC) or scripts (Tags 71, 72) that update card risk profiles, modify card parameters, or even block a card. L3 testing ensures that the card reader  POS terminal, ATM, SoftPOS platform, or Soundbox-based acceptance device — interprets issuer messages correctly and performs all required actions in strict compliance with EMV specifications.

EazyPayTech, as a global provider of EMV L2 kernels, POS applications, terminal software, NCMC/RuPay solutions, SoftPOS platforms, and EMV L3 certification support, ensures that OEMs and payment providers decode issuer authentication processes without ambiguity. The company offers consultation, testing, debugging, and certification navigation so that terminal manufacturers can complete L3 with confidence, reducing time to market and enhancing reliability across geographies.

Why Issuer Authentication Is Critical in EMV L3 Certification

Issuer Authentication is the most delicate phase of EMV transaction processing because, unlike offline authentication or cardholder verification, it happens after the transaction request leaves the terminal and before completing the final approval process. Any mistake in interpreting issuer cryptograms, issuer scripts, or host responses can lead to:

  • Incorrect approvals of fraudulent transactions
  • Incorrect declines leading to merchant frustration
  • Card blocking or card corruption
  • Inconsistent cryptogram generation
  • Failures in contact and contactless flows
  • Certification rejections during EMV L3 test cycles

EMV L3 Certification validates the end-to-end correctness of terminal behaviour when interacting with the issuer host (or simulator). Therefore, issuer authentication plays a decisive role in determining whether a payment device is ready for commercial deployment.

The Role of Online Authorization and ARQC/ARPC Exchange

During online transactions, the terminal sends a card-generated ARQC (Authorization Request Cryptogram) to the issuer host. The issuer validates this request, checks card risk parameters, and returns an ARPC, indicating whether the transaction is approved or declined. This process is essential for preventing fraud and ensuring only legitimate cardholders are allowed to complete high-value or risk-sensitive payments.

ARQC (Authorization Request Cryptogram)

The terminal sends an online authorization message to the issuer containing:

  • ARQC (Tag 9F26) generated by the card
  • Card data elements like 9F02 (Amount Authorized), 9A (Transaction Date), 5A (PAN), 9F36 (ATC), 9F37 (UN)
  • Cryptographic version and capabilities from 9F27, 9F10, 9F1A, 9F34, etc.
  • Terminal data elements including 9F35 (Terminal Type), 9F33 (Terminal Capabilities), 9F1E (IFD Serial), 9F40 (Additional Terminal Capabilities)
  • Issuer application data (IAD – Tag 9F10) that dictates issuer risk rules

ARPC (Authorization Response Cryptogram)

The issuer returns an ARPC (Tag 91) inside the Authorization Response message.
The ARPC instructs the card whether the transaction is approved, whether the card should update internal parameters, or whether issuer scripts follow.

Issuer Authentication Process: The Full Technical Lifecycle

Below is an expanded, fully descriptive flow of how issuer authentication occurs during an EMV transaction:

Step-by-step Lifecycle

  1. Terminal Initiates Online Authorization
    The terminal bundles ARQC, card data, and terminal data into the authorization request message and sends it to the issuer host.
  2. Issuer Host Performs Cryptographic Validation
    The issuer server checks if the ARQC is valid using card profile, keys, and transaction counters.
  3. Issuer Makes the Authorization Decision
    The issuer evaluates transaction risk, card status, card counters, account balance, and velocity parameters to determine whether the user should be approved, declined, or approved with conditions.
  4. Issuer Generates ARPC
    The Authorization Response Cryptogram (Tag 91) is created using card keys, ensuring the card can validate it securely.
  5. Issuer Optionally Sends Issuer Scripts                                               Script Template 1 (Tag 71)Script Template 2 (Tag 72)
    Scripts may update CVR, block the card, update offline limits, or force PIN change.
  6. Terminal Receives ARPC and Issuer Scripts
    The terminal must forward the issuer data exactly as received to the card during the second Generate AC step.
  7. Card Validates ARPC
    If ARPC matches what the card expects, the issuer authentication succeeds.
  8. Card Executes Issuer Scripts
    Successful script execution ensures issuer risk rules are applied fully.
  9. Card Returns TC or AAC
  10. TC (Transaction Certificate) for approved transactions
  11. AAC (Application Authentication Cryptogram) for issuer-initiated decline
  12. Terminal Finalizes and Sends Completion Message
    The terminal sends a completion message to the issuer host (in systems where applicable).

EMV L3 Issuer Authentication Requirements

L3 certification checks whether the terminal performs issuer authentication perfectly and handles all cryptogram types, issuer scripts, and failure scenarios.

Mandatory Areas of Validation

  • Correct formation of ARQC data
  • Correct transmission of ICC data to issuer simulator
  • Correct interpretation of ARPC (Tag 91)
  • Proper handling of response codes (Tag 8A)
  • Proper handling of AAC and TC
  • Accurate issuer script transmission to card
  • Handling of script failure conditions
  • Handling of host unavailable or malformed response
  • Contact and contactless consistency
  • Timing considerations for script processing
  • Terminal action codes (TAC) and issuer action codes (IAC) compatibility

Data Elements Involved in Issuer Authentication

Below is a highly descriptive breakdown of critical EMV data elements checked during L3:

Key Data Elements

  • 9F10 – Issuer Application Data (IAD)
    Contains issuer rules for CVR bits, risk parameters, and authentication policies.
  • 9F26 – ARQC
    The cryptogram generated by the card for online authorization.
  • 9F36 – ATC (Application Transaction Counter)
    Ensures uniqueness of ARQC.
  • 9F37 – Unpredictable Number
    Ensures the cryptogram cannot be predicted.
  • 91 – Authorization Response Cryptogram (ARPC)
    Issuer-generated cryptogram used for issuer authentication.
  • 71 – Issuer Script Template 1
    Scripts processed before second Generate AC.
  • 72 – Issuer Script Template 2
    Scripts processed after second Generate AC
  • 8A – Authorization Response Code
    Indicates approval, decline, referral, etc.

Deep Technical Breakdown

Below are extended, highly detailed bullet points written in long descriptive sentences that clarify critical issuer authentication responsibilities of a terminal during EMV L3 certification.

Terminal Responsibilities During Issuer Authentication

The terminal must correctly relay the full ARQC (Tag 9F26), along with other mandatory data elements like 9F02, 9F03, 9C, 9F35, 9F1E, 9F33, 9F38, and 5F2A, ensuring no truncation, corruption, or rearrangement of data occurs, since any variation can cause issuer cryptographic validation failures that will be detected during L3 certification.

The terminal should handle communication timeouts gracefully by retrying host communications within defined limits and must return appropriate error conditions without corrupting transaction flow.

The terminal must parse the authorization response message precisely according to EMV specifications, interpreting Tag 91, Tag 8A, and optional scripts accurately without assuming field lengths or ignoring unexpected structures, since L3 test cases include malformed data scenarios.

Upon receiving issuer scripts (Tags 71 and 72), the terminal must forward them exactly as received, without modification, ensuring timing, formatting, and execution order complies with EMV rules.

The terminal must generate detailed logs containing cryptographic elements, host messages, and issuer responses to allow certification tools and auditors to verify compliance during L3 testing.

The terminal must distinguish between conditional approvals and unconditional approvals, ensuring that issuer authentication failure can override an issuer-approved decision and decline the transaction if ARPC validation fails.

The terminal should support both ARC-based approval and ARPC-based approval, maintaining priority rules defined by EMV to ensure that card output always drives the final decision.

For offline-approved transactions where issuer authentication is unexpectedly received, the terminal must reject such inconsistencies to avoid unpredictable transaction flow or security violations.

During contactless EMV L3 testing, the terminal must adhere to strict timing rules, ensuring scripts are executed during the correct phase of the contactless lifecycle, as delays beyond EMV limits can cause unpredictable outcomes and certification failures.

 

Testing Issuer Authentication Across Device Types

Issuer authentication behaviour differs subtly across device categories, and EMV L3 certification checks each variation thoroughly.

POS Terminals

  • Must support stable network communication
  • Must handle issuer scripts efficiently
  • Must ensure consistent ARPC handling across fallback, swipe, chip, and contactless

ATM Machines

  • Must support card issuer script execution that may include card-blocking commands
  • Must align with online-only EMV flows
  • Must ensure ARQC/ARPC flow integrates with ATM host processors

SoftPOS (Tap on Phone)

  • Must process issuer messages under Android-level timing constraints
  • Must ensure secure cryptogram processing inside TEE/SE
  • Must handle issuer scripts even if NFC routing or TAP latency occurs

QR Soundbox Card-Acceptance

EazyPay Tech offers Soundbox solutions including EMV contact and contactless card acceptance, where:

  • Issuer authentication must work even with intermittent connectivity
  • The Soundbox must interpret ARPC and scripts in low-power mode
  • Memory constraints must not affect cryptogram validation

Issuer Authentication Failures and L3 Negative Test Cases

EMV L3 includes negative testing to ensure terminals behave correctly under adverse conditions.

Negative Cases Include:

  • ARPC mismatch
  • Missing Tag 91
  • Missing Tag 8A
  • Malformed issuer script
  • Script execution failure
  • ARPC containing incorrect length
  • Card returning AAC unexpectedly
  • Host timeout or malformed message
  • IAD/CVR mismatch scenarios

Issuer Script Processing – Deep Technical Examples

Script Template 1 (Tag 71)

Executed before the second Generate AC.

Example:
Card CVR update, offline counter resets, velocity control updates.

Script Template 2 (Tag 72)

Executed after second Generate AC.

Example:
Card blocking commands (e.g., “Card Status Update”), PIN retry limit reset, offline spending limit update.

EazyPay Tech Support for Issuer Authentication in EMV L3

EazyPay Tech EMV Certification team provides end-to-end assistance with:

  • ARQC/ARPC debugging
  • Script execution support
  • Automated log analysis
  • Terminal application tuning
  • EMVCo test tool integration
  • Pre-certification test cycles
  • Custom kernel enhancements

Issuer Authentication stands as one of the most complex and security-sensitive components of EMV L3 Certification because it validates whether terminals can correctly trust the issuer, apply issuer rules, execute issuer scripts, and complete a transaction securely. Any failure in ARPC handling, script execution, or response interpretation can lead to immediate L3 rejection and long development delays.

EazyPay Tech ensures that OEMs, terminal manufacturers, payment gateway providers, SoftPOS developers, ATM vendors, and Soundbox payment device companies meet EMV L3 standards through expertly guided certification support, robust kernel implementation (contact + contactless), and hands-on debugging with issuer simulators and EMVCo test tools.

Categories

Related Article

Stay up to date

Sign up our newsletter to get update information, promotion and insight.

Related Article

Scroll to Top