SlideShare a Scribd company logo
1 of 20
Exploring Payment Platforms: ISO
20022 and 8583
Orlando Olumide Odejide
Olumide Odejide
Director
Orlando Olumide Odejide is PECB certified trainer. He is an experienced Enterprise Archited and
Programme Director working on various technology solutions. His expertise spans to various ISO
standard such as ISO 27001, ISO 20000 and ISO 22301,COBIT, CMMI, TOGAF, PRINCE2, ITIL
234-8037154520
orlando@g4vonline.com www.trainingheights.net/
linkedin.com/orlando-olumide-odejide-a7b79927
Summary
• What does ISO 20022 have to
offer?
• What does ISO 8583 have to
offer?
• How does an organization align
or choose between ISO 20022
and 8583?
• ISO 20022 is an ISO standard for electronic data interchange between
financial institutions. It describes a metadata repository containing
descriptions of messages and business processes, and a maintenance
process for the repository content.
• The repository contains a huge amount of financial services metadata
that has been shared and standardized across the industry. The
metadata is stored in UML models with a special ISO 20022 UML
Profile. Underlying all of this is the ISO 20022 metamodel - a model of
the models. The UML profile is the metamodel transformed into UML.
The metadata is transformed into the syntax of messages used in
financial networks. The first syntax supported for messages was XML
Schema.
• ISO 20022 is widely used in financial services. Organizations
participating in ISO 20022 include: FIX Protocol Limited (Financial
Information eXchange), ISDA (FpML), ISITC, Omgeo, SWIFT, and Visa.
• ISO 20022 is the successor to ISO 15022; originally ISO 20022 was
called ISO 15022 2nd Edition. ISO 15022 was the successor of ISO
7775.
• ISO 20022 Financial Services - universal financial industry message
scheme.
– Part 1: Overall Methodology and Format Specifications for Inputs
and Outputs to/from the ISO 20022 Repository (has the status of
International Standard), numbered as ISO 20022-1:2004
– Part 2: Roles and responsibilities of the registration bodies (has the
status of International Standard), numbered as ISO 20022-2:2007
– Part 3: ISO 20022 Modeling guidelines (has the status of Technical
Specification), numbered as ISO/TS 20022-3:2004
– Part 4: ISO 20022 XML design rules (has the status of Technical
Specification), numbered as ISO/TS 20022-4:2004
– Part 5: ISO 20022 Reverse engineering (has the status of Technical
Specification), numbered as ISO/TS 20022-5:2004
– Part 6: ISO 20022 Message Transport Characteristics (has the
status of International Standard), numbered as ISO 20022-6:2009
• Almost all of us would have swiped a card or two at an ATM or
a PoS terminal (or a Square dongle ;)). At the very least, the
card serves as an identity factor. Among other things , the
magnetic stripe on each card stores something called the
PAN (Primary Account Number). For most credit cards, it is
the same as the credit card number printed on the front
surface/ plastic.
The act of swiping a card on a card reader essentially
involves passing this 'identity' of the card to the electronic
sub-system and represents a Card Present type of
transaction. Alternatively, one could have typed in this
information (card number) on a screen of an online shopping
interface but then this would effectively become a Card Not
Present transaction.
• Anyways, we now have the identity of the card in the
electronic form. One of the most popular uses of this
information is to let the system know which account to
debit. (In case you get confused by 'debit' and 'credit':
Debit = Deduct from your card/ account. Credit = Create
money in your card/ account.
• So what is ISO 8583? It is one of the many standards
describing how to pack certain data fields such that it could
reliably be unpacked as well and is mostly relevant for the
financial transaction processing world.
• So this standard helps the electronic system which reads the
card number, the transaction amount and other relevant data
fields to pack it all up so that it could be transmitted
electronically to a transaction processing system where it
could then be unpacked back into individual data components
and then processed.
• It also helps the transaction processing system pack and send
the response back to the initiating device where it could again
be unpacked and the customer be intimated of the transaction
response.
• There exist numerous methods for packing and unpacking data. It
could be as simple as comma separated fields. Eg: I could choose
to send the transaction information as simple comma separated
values as:
"1234123412341234,1000,INR,987" (Card Number, Amount,
Currency, Merchant ID).
The issue with such a simplistic model of data packing is that it lacks
meta information. That is, the message itself does not contain any
information on what exactly is being packed in it. Not that it could not
have been overcome even with a comma separated version- just
that it could get cumbersome. Also, I guess at that point in time, it
was important to consider that the packing and unpacking could be
coded easily into mainframes, not sure about this one.
• ISO 8583 Financial transaction card originated
messages — Interchange message specifications is the
International Organization for Standardization standard
for systems that exchange electronic transactions made
by cardholders using payment cards.
• It has three parts:
– Part 1: Messages, data elements and code values[1]
– Part 2: Application and registration procedures for
Institution Identification Codes (IIC)[2]
– Part 3: Maintenance procedures for messages, data
elements and code values[3]
• A card-based transaction typically travels from a transaction acquiring device,
such as a point-of-sale terminal or an automated teller machine (ATM), through
a series of networks, to a card issuing system for authorization against the card
holder's account. The transaction data contains information derived from the
card (e.g., the account number), the terminal (e.g., the merchant number), the
transaction (e.g., the amount), together with other data which may be generated
dynamically or added by intervening systems. The card issuing system will
either authorize or decline the transaction and generate a response message
which must be delivered back to the terminal within a predefined time period.
• ISO 8583 defines a message format and a communication flow so that different
systems can exchange these transaction requests and responses. The vast
majority of transactions made at ATMs use ISO 8583 at some point in the
communication chain, as do transactions made when a customer uses a card to
make a payment in a store (EFTPOS). In particular, both the MasterCard and
Visa networks base their authorization communications on the ISO 8583
standard, as do many other institutions and networks. ISO 8583 has no routing
information, so is sometimes used with a TPDU header.
• Cardholder-originated transactions include purchase, withdrawal,
deposit, refund, reversal, balance inquiry, payments and inter-
account transfers. ISO 8583 also defines system-to-system
messages for secure key exchanges, reconciliation of totals, and
other administrative purposes.
• Although ISO 8583 defines a common standard, it is not typically
used directly by systems or networks. It defines many standard
fields (data elements) which remain the same in all systems or
networks, and leaves a few additional fields for passing network
specific details. These fields are used by each network to adapt the
standard for its own use with custom fields and custom usages.
• The placements of fields in different versions of the standard varies;
for example, the currency elements of the 1987 and 1993 versions
are no longer used in the 2003 version, which holds currency as a
sub-element of any financial amount element. As of writing, ISO
8583:2003 has yet to achieve wide acceptance.
• An ISO 8583 message is made of the following parts:
• Message type indicator (MTI)
• One or more bitmaps, indicating which data elements
are present
• Data elements, the fields of the message
• T he IS O 8583 message consists of a Message Type Identifier, Bitmaps, and
Data elements.
A Message T ype Identifier is a four digit numeric field that describes each message
class and function. Some common Message Type Identifiers are as below.
First 2 digits of the Message Type Identifier Description
02XX Financial Transaction Messages
04XX Reversal Messages
08XX Network Management Messages
Normal Transaction Message Flow
• Financial transaction messages are messages with the
identifier of 02XX. In a normal situation, it starts with
0200 from the requester and the responder will send a
message with a header of 021 0 stating that it is a
response from the request earlier.
System A
Send 0200XXXXX
Request Message
System A
Receive Response
Transaction Finished
System B
Process Request
Message
System B
Send 021 0XXXXX
Response Message
Normal Reversal Message Flow
• Financial transaction message can be either monetary or non-
monetary. Non-monetary message are messages that does inquiries
to the remote system and other non-monetary transactions.
Monetary transactions messages are messages that request the
remote system to credit or debit a certain amount into an account.
System A
Send 0200XXXXX
Request Message
System A
Receive Response
Transaction Finished
System B
Process Request
Message
System B
Send 021 0XXXXX
Response Message
• A reversal message is identified by the header of 04XX. For
interactive reversal transaction, the identifier is 0400 message and
the remote host will response the requester with a 041 0 message.
However for non-interactive reversal transaction, the identifier would
be 0420 message and would be responded with a 0430 message.
•
• An example when a reversal message is being sent out is when a
previous successful financial transaction (02XX) is being voided at
credit card terminals. Reversal messages are also being sent out
automatically when the requester does not receive a response in a
certain time frame (time out situation). T his kind of reversal
message is being termed as auto-reversal messages. W hen a
reversal message does not receive a response in time (transaction
timed out), the requester will repeat sending the previous reversal
message, and this is called repeat reversal messages. Repeat
reversal messages have an identifier of 0401 for interactive
transactions and 0421 for non-interactive transactions.
• Bit map(s) follows the Message T ype Identifier. A single bit
map consists of sixty-four (64) bits or sixteen (1 6)
hexadecimal characters positioned from left to right. Each bit
denotes the presence or absence of the corresponding data
element.
• Two bit maps can exist on an IS O 8583 message. However
the primary bit map must always be present. T he primary bit
map signifies the presence of data elements 1 to 64 and the
secondary bit map indicates the presence of data elements 65
to 1 28. Each data element represents a certain usage in the
standard IS O 8583 message. Most commonly used data
elements are usually represented in the primary bit map.
Thank You and Questions
orlando@trainingheights.net
N.B: Content and Diagrams from CMMI Institute and
ISO 25000 Series
?
QUESTIONS
THANK YOU
234-8037154520
orlando@g4vonline.com www.trainingheights.net/
linkedin.com/orlando-olumide-odejide-a7b79927

More Related Content

What's hot

What’s all the Fuss with ISO 20022?
What’s all the Fuss with ISO 20022?What’s all the Fuss with ISO 20022?
What’s all the Fuss with ISO 20022?Nasreen Quibria
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Danail Yotov
 
EMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow WorksEMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow WorksAnnMargaret Tutu (AMT)
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)Suraj Dhalwar
 
Payment gateway
Payment gatewayPayment gateway
Payment gatewayPiyush Dua
 
Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewAkshay Kaul
 
iso8583 presentation.pdf
iso8583 presentation.pdfiso8583 presentation.pdf
iso8583 presentation.pdfssuserfa55aa
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment systemMandar Thakur
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transactionHarsh Mehta
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondMichael Novak
 

What's hot (20)

SWIFT & IntelliMATCH
SWIFT & IntelliMATCHSWIFT & IntelliMATCH
SWIFT & IntelliMATCH
 
Mobile Wallet functions
Mobile Wallet functionsMobile Wallet functions
Mobile Wallet functions
 
Atm switch
Atm switchAtm switch
Atm switch
 
Fund transfer process
Fund transfer processFund transfer process
Fund transfer process
 
What’s all the Fuss with ISO 20022?
What’s all the Fuss with ISO 20022?What’s all the Fuss with ISO 20022?
What’s all the Fuss with ISO 20022?
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
EMV Overview
EMV OverviewEMV Overview
EMV Overview
 
EMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow WorksEMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow Works
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
 
Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian Overview
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Introducing SWIFT
Introducing SWIFTIntroducing SWIFT
Introducing SWIFT
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
 
Iso 20022-programme
Iso 20022-programmeIso 20022-programme
Iso 20022-programme
 
iso8583 presentation.pdf
iso8583 presentation.pdfiso8583 presentation.pdf
iso8583 presentation.pdf
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
 

Viewers also liked

STUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKS
STUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKSSTUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKS
STUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKSMd Swawibe Ul Alam
 
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsReport on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsDarshana Senavirathna
 
ISO8583 MySQL UDF Manual
ISO8583 MySQL UDF ManualISO8583 MySQL UDF Manual
ISO8583 MySQL UDF Manualsybond
 
SWIFT Standards developer kit tutorial December 2012
SWIFT Standards developer kit tutorial December 2012SWIFT Standards developer kit tutorial December 2012
SWIFT Standards developer kit tutorial December 2012Ed Dodds
 
2015 NACHA Presentation - ACH Network Roadmap for ISO 20022
2015 NACHA Presentation - ACH Network Roadmap for ISO 200222015 NACHA Presentation - ACH Network Roadmap for ISO 20022
2015 NACHA Presentation - ACH Network Roadmap for ISO 20022Nasreen Quibria
 
Duties within iHeart
Duties within iHeartDuties within iHeart
Duties within iHeartEmani Sewell
 
DESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia Molloy
DESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia MolloyDESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia Molloy
DESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia MolloyTricia Molloy
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsNarudom Roongsiriwong, CISSP
 
EMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security ApproachEMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security ApproachIngenico Group
 

Viewers also liked (13)

STUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKS
STUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKSSTUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKS
STUDY ON ATM-POS SWITCHING SOFTWARE FOR BANKS
 
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsReport on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
 
ISO8583 MySQL UDF Manual
ISO8583 MySQL UDF ManualISO8583 MySQL UDF Manual
ISO8583 MySQL UDF Manual
 
SWIFT Standards developer kit tutorial December 2012
SWIFT Standards developer kit tutorial December 2012SWIFT Standards developer kit tutorial December 2012
SWIFT Standards developer kit tutorial December 2012
 
2015 NACHA Presentation - ACH Network Roadmap for ISO 20022
2015 NACHA Presentation - ACH Network Roadmap for ISO 200222015 NACHA Presentation - ACH Network Roadmap for ISO 20022
2015 NACHA Presentation - ACH Network Roadmap for ISO 20022
 
Duties within iHeart
Duties within iHeartDuties within iHeart
Duties within iHeart
 
DESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia Molloy
DESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia MolloyDESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia Molloy
DESIGN Your Ideal Life! by Corporate Leadership Speaker and Author Tricia Molloy
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Top 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security ProblemsTop 10 Bad Coding Practices Lead to Security Problems
Top 10 Bad Coding Practices Lead to Security Problems
 
Freeport hsc42
Freeport hsc42Freeport hsc42
Freeport hsc42
 
EMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security ApproachEMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security Approach
 
v 1.0
v 1.0v 1.0
v 1.0
 
Emv chip card buyers guide
Emv chip card buyers guideEmv chip card buyers guide
Emv chip card buyers guide
 

Similar to ISO 20022 vs 8583: Exploring Payment Platform Standards

Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
ISO 20022: It’s Coming…Are You Ready?
ISO 20022: It’s Coming…Are You Ready? ISO 20022: It’s Coming…Are You Ready?
ISO 20022: It’s Coming…Are You Ready? GXS
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationControlCase
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementationmadaxx
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementationmadaxx
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationKimberly Simon MBA
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe RegionIRJET Journal
 
Basics of ecommerce part2
Basics of ecommerce part2Basics of ecommerce part2
Basics of ecommerce part2Madhav Suratkar
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Iso20022 Straight through Processing
Iso20022 Straight through ProcessingIso20022 Straight through Processing
Iso20022 Straight through ProcessingThe Benche
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryGoutama Bachtiar
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET Journal
 
Idocs tcodes and others , sap idoc
Idocs tcodes and others , sap idoc Idocs tcodes and others , sap idoc
Idocs tcodes and others , sap idoc chiku_jpb
 
The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...
The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...
The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...Nasreen Quibria
 
XMLdation seminar Milan 21st may 2014
XMLdation seminar Milan 21st may 2014XMLdation seminar Milan 21st may 2014
XMLdation seminar Milan 21st may 2014XMLdation Ltd
 
Transfer pricing documentation for tax purposes of IT services for an interna...
Transfer pricing documentation for tax purposes of IT services for an interna...Transfer pricing documentation for tax purposes of IT services for an interna...
Transfer pricing documentation for tax purposes of IT services for an interna...Ole Kristian Gravrok
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - finalAlex Tan
 

Similar to ISO 20022 vs 8583: Exploring Payment Platform Standards (20)

Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
ISO 20022: It’s Coming…Are You Ready?
ISO 20022: It’s Coming…Are You Ready? ISO 20022: It’s Coming…Are You Ready?
ISO 20022: It’s Coming…Are You Ready?
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
 
All about idoc definition architecture, implementation
All about idoc definition architecture, implementationAll about idoc definition architecture, implementation
All about idoc definition architecture, implementation
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
SoftwareAG webMethods EDI Introduction
SoftwareAG webMethods EDI IntroductionSoftwareAG webMethods EDI Introduction
SoftwareAG webMethods EDI Introduction
 
Basics of ecommerce part2
Basics of ecommerce part2Basics of ecommerce part2
Basics of ecommerce part2
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Iso20022 Straight through Processing
Iso20022 Straight through ProcessingIso20022 Straight through Processing
Iso20022 Straight through Processing
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
IRJET- Decentralized Kyc System
IRJET- Decentralized Kyc SystemIRJET- Decentralized Kyc System
IRJET- Decentralized Kyc System
 
Idocs tcodes and others , sap idoc
Idocs tcodes and others , sap idoc Idocs tcodes and others , sap idoc
Idocs tcodes and others , sap idoc
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 
The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...
The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...
The Drive to Electronic Remittance Exchange in Business-to-Business Payment A...
 
XMLdation seminar Milan 21st may 2014
XMLdation seminar Milan 21st may 2014XMLdation seminar Milan 21st may 2014
XMLdation seminar Milan 21st may 2014
 
Transfer pricing documentation for tax purposes of IT services for an interna...
Transfer pricing documentation for tax purposes of IT services for an interna...Transfer pricing documentation for tax purposes of IT services for an interna...
Transfer pricing documentation for tax purposes of IT services for an interna...
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

ISO 20022 vs 8583: Exploring Payment Platform Standards

  • 1. Exploring Payment Platforms: ISO 20022 and 8583 Orlando Olumide Odejide
  • 2. Olumide Odejide Director Orlando Olumide Odejide is PECB certified trainer. He is an experienced Enterprise Archited and Programme Director working on various technology solutions. His expertise spans to various ISO standard such as ISO 27001, ISO 20000 and ISO 22301,COBIT, CMMI, TOGAF, PRINCE2, ITIL 234-8037154520 orlando@g4vonline.com www.trainingheights.net/ linkedin.com/orlando-olumide-odejide-a7b79927
  • 3. Summary • What does ISO 20022 have to offer? • What does ISO 8583 have to offer? • How does an organization align or choose between ISO 20022 and 8583?
  • 4. • ISO 20022 is an ISO standard for electronic data interchange between financial institutions. It describes a metadata repository containing descriptions of messages and business processes, and a maintenance process for the repository content. • The repository contains a huge amount of financial services metadata that has been shared and standardized across the industry. The metadata is stored in UML models with a special ISO 20022 UML Profile. Underlying all of this is the ISO 20022 metamodel - a model of the models. The UML profile is the metamodel transformed into UML. The metadata is transformed into the syntax of messages used in financial networks. The first syntax supported for messages was XML Schema. • ISO 20022 is widely used in financial services. Organizations participating in ISO 20022 include: FIX Protocol Limited (Financial Information eXchange), ISDA (FpML), ISITC, Omgeo, SWIFT, and Visa. • ISO 20022 is the successor to ISO 15022; originally ISO 20022 was called ISO 15022 2nd Edition. ISO 15022 was the successor of ISO 7775.
  • 5. • ISO 20022 Financial Services - universal financial industry message scheme. – Part 1: Overall Methodology and Format Specifications for Inputs and Outputs to/from the ISO 20022 Repository (has the status of International Standard), numbered as ISO 20022-1:2004 – Part 2: Roles and responsibilities of the registration bodies (has the status of International Standard), numbered as ISO 20022-2:2007 – Part 3: ISO 20022 Modeling guidelines (has the status of Technical Specification), numbered as ISO/TS 20022-3:2004 – Part 4: ISO 20022 XML design rules (has the status of Technical Specification), numbered as ISO/TS 20022-4:2004 – Part 5: ISO 20022 Reverse engineering (has the status of Technical Specification), numbered as ISO/TS 20022-5:2004 – Part 6: ISO 20022 Message Transport Characteristics (has the status of International Standard), numbered as ISO 20022-6:2009
  • 6. • Almost all of us would have swiped a card or two at an ATM or a PoS terminal (or a Square dongle ;)). At the very least, the card serves as an identity factor. Among other things , the magnetic stripe on each card stores something called the PAN (Primary Account Number). For most credit cards, it is the same as the credit card number printed on the front surface/ plastic. The act of swiping a card on a card reader essentially involves passing this 'identity' of the card to the electronic sub-system and represents a Card Present type of transaction. Alternatively, one could have typed in this information (card number) on a screen of an online shopping interface but then this would effectively become a Card Not Present transaction.
  • 7. • Anyways, we now have the identity of the card in the electronic form. One of the most popular uses of this information is to let the system know which account to debit. (In case you get confused by 'debit' and 'credit': Debit = Deduct from your card/ account. Credit = Create money in your card/ account.
  • 8. • So what is ISO 8583? It is one of the many standards describing how to pack certain data fields such that it could reliably be unpacked as well and is mostly relevant for the financial transaction processing world. • So this standard helps the electronic system which reads the card number, the transaction amount and other relevant data fields to pack it all up so that it could be transmitted electronically to a transaction processing system where it could then be unpacked back into individual data components and then processed. • It also helps the transaction processing system pack and send the response back to the initiating device where it could again be unpacked and the customer be intimated of the transaction response.
  • 9. • There exist numerous methods for packing and unpacking data. It could be as simple as comma separated fields. Eg: I could choose to send the transaction information as simple comma separated values as: "1234123412341234,1000,INR,987" (Card Number, Amount, Currency, Merchant ID). The issue with such a simplistic model of data packing is that it lacks meta information. That is, the message itself does not contain any information on what exactly is being packed in it. Not that it could not have been overcome even with a comma separated version- just that it could get cumbersome. Also, I guess at that point in time, it was important to consider that the packing and unpacking could be coded easily into mainframes, not sure about this one.
  • 10. • ISO 8583 Financial transaction card originated messages — Interchange message specifications is the International Organization for Standardization standard for systems that exchange electronic transactions made by cardholders using payment cards. • It has three parts: – Part 1: Messages, data elements and code values[1] – Part 2: Application and registration procedures for Institution Identification Codes (IIC)[2] – Part 3: Maintenance procedures for messages, data elements and code values[3]
  • 11. • A card-based transaction typically travels from a transaction acquiring device, such as a point-of-sale terminal or an automated teller machine (ATM), through a series of networks, to a card issuing system for authorization against the card holder's account. The transaction data contains information derived from the card (e.g., the account number), the terminal (e.g., the merchant number), the transaction (e.g., the amount), together with other data which may be generated dynamically or added by intervening systems. The card issuing system will either authorize or decline the transaction and generate a response message which must be delivered back to the terminal within a predefined time period. • ISO 8583 defines a message format and a communication flow so that different systems can exchange these transaction requests and responses. The vast majority of transactions made at ATMs use ISO 8583 at some point in the communication chain, as do transactions made when a customer uses a card to make a payment in a store (EFTPOS). In particular, both the MasterCard and Visa networks base their authorization communications on the ISO 8583 standard, as do many other institutions and networks. ISO 8583 has no routing information, so is sometimes used with a TPDU header.
  • 12. • Cardholder-originated transactions include purchase, withdrawal, deposit, refund, reversal, balance inquiry, payments and inter- account transfers. ISO 8583 also defines system-to-system messages for secure key exchanges, reconciliation of totals, and other administrative purposes. • Although ISO 8583 defines a common standard, it is not typically used directly by systems or networks. It defines many standard fields (data elements) which remain the same in all systems or networks, and leaves a few additional fields for passing network specific details. These fields are used by each network to adapt the standard for its own use with custom fields and custom usages. • The placements of fields in different versions of the standard varies; for example, the currency elements of the 1987 and 1993 versions are no longer used in the 2003 version, which holds currency as a sub-element of any financial amount element. As of writing, ISO 8583:2003 has yet to achieve wide acceptance.
  • 13. • An ISO 8583 message is made of the following parts: • Message type indicator (MTI) • One or more bitmaps, indicating which data elements are present • Data elements, the fields of the message
  • 14. • T he IS O 8583 message consists of a Message Type Identifier, Bitmaps, and Data elements. A Message T ype Identifier is a four digit numeric field that describes each message class and function. Some common Message Type Identifiers are as below. First 2 digits of the Message Type Identifier Description 02XX Financial Transaction Messages 04XX Reversal Messages 08XX Network Management Messages
  • 15. Normal Transaction Message Flow • Financial transaction messages are messages with the identifier of 02XX. In a normal situation, it starts with 0200 from the requester and the responder will send a message with a header of 021 0 stating that it is a response from the request earlier. System A Send 0200XXXXX Request Message System A Receive Response Transaction Finished System B Process Request Message System B Send 021 0XXXXX Response Message
  • 16. Normal Reversal Message Flow • Financial transaction message can be either monetary or non- monetary. Non-monetary message are messages that does inquiries to the remote system and other non-monetary transactions. Monetary transactions messages are messages that request the remote system to credit or debit a certain amount into an account. System A Send 0200XXXXX Request Message System A Receive Response Transaction Finished System B Process Request Message System B Send 021 0XXXXX Response Message
  • 17. • A reversal message is identified by the header of 04XX. For interactive reversal transaction, the identifier is 0400 message and the remote host will response the requester with a 041 0 message. However for non-interactive reversal transaction, the identifier would be 0420 message and would be responded with a 0430 message. • • An example when a reversal message is being sent out is when a previous successful financial transaction (02XX) is being voided at credit card terminals. Reversal messages are also being sent out automatically when the requester does not receive a response in a certain time frame (time out situation). T his kind of reversal message is being termed as auto-reversal messages. W hen a reversal message does not receive a response in time (transaction timed out), the requester will repeat sending the previous reversal message, and this is called repeat reversal messages. Repeat reversal messages have an identifier of 0401 for interactive transactions and 0421 for non-interactive transactions.
  • 18. • Bit map(s) follows the Message T ype Identifier. A single bit map consists of sixty-four (64) bits or sixteen (1 6) hexadecimal characters positioned from left to right. Each bit denotes the presence or absence of the corresponding data element. • Two bit maps can exist on an IS O 8583 message. However the primary bit map must always be present. T he primary bit map signifies the presence of data elements 1 to 64 and the secondary bit map indicates the presence of data elements 65 to 1 28. Each data element represents a certain usage in the standard IS O 8583 message. Most commonly used data elements are usually represented in the primary bit map.
  • 19. Thank You and Questions orlando@trainingheights.net N.B: Content and Diagrams from CMMI Institute and ISO 25000 Series