A98 Automated Host Interface
In addition to using a Host interface to send the new ATM key from the A98 to the Host, the A98 can use the existing or separate Host connection to share ATM and other customer based data.
Trusted Security has worked with its business partners enabling them to develop and provide this interface between A98 and their respective applications. Please contact them for details.
Trusted Security offers a "Host Proxy" module that runs on a PC network-connected to the A98. This application simulates an ATM host. It receives key updates from the A98 unit and displays these cryptograms for testing or for actual non-automated entry into the host application.
Host Connection Overview:
Trusted Security Solution's Host Partnerships
If you use proprietary software (as does a number of Trusted Security Solutions current clients) we welcome the chance to share the necessary technical knowledge you would need from us to directly interface with the A98.
The following is a detailed description of the BASE24™ interface.
BASE24™ Host Connectivity (Comvelope solution)
This section describes a software product provided by Trusted Security Solutions, Inc. (“TSS”) which enables an A98 system to communicate with Host Security Modules connected to a HP NonStop (i.e., Tandem) platform for the purpose of translating and storing ATM cryptographic information in a Base24 environment.
A new Tandem-based application, A98RIF, is installed on the Tandem. Connectivity between the A98 hardware/software system and the Tandem-based Agent is accomplished by XML over TCP/IP with the A98 serving as the client-side application and the Tandem providing the server-side functions.
Whenever the A98 system needs to store an ATM working key cryptogram within a Base24 system utilizing ACI's Transaction Security System (Base24/TSS) application, the A98 initiates a connection with the A98RIF.
The A98RIF subsystem obtains all information for its processing environment from the Agent configuration file specified at process start-up. This information includes the following:
As the A98RIF process (“The Agent”) initializes, it logs all copyright, version and initialization information to the designated EMS collector process in fully-tokenized event messages. The process then listens for connections on the specified IP address and port. When a connection is received, a new socket is created to connect to the incoming request, then the Agent returns to a listening state for other connections.
When a message is received by the Agent from the A98, the message will be authenticated, and then processed. The lexicon for communication between these two parties must include at least the following information:
When the Agent receives a valid request message, it will initiate the following steps:
If utilizing an Atalla HSM:
Configuring a Thales or other HSM would be similar to the Atalla model using the HSM specific command set.
If an error or timeout occurs at any stage, an appropriate error condition will be noted in the response message sent to the A98. All error conditions encountered by the Agent will cause the Agent to produce a diagnostic EMS event message. These messages will allow post-diagnosis of the problem should a customer report a problem.
The Agent will be a single-threaded process. It will fully-process each request received from beginning to end before it will attempt to receive another request from the A98. If a multi-thread environment is desired, the A98 may open multiple sockets with the Tandem platform, thus creating multiple paths for simultaneous processing. Once a single Agent thread completes a request and responds to the A98, it will again go into a “listen” mode looking for additional requests.
For more information about this or any other host interface, please contact us at: firstname.lastname@example.org.
Trusted Security Solutions, Inc. | 704.849.0036 | email@example.com
© Trusted Security Solutions, Inc. All Rights reserved in all media.