... L2 implementation.· Protocols T=0 T=1Supports a variety of data authentication, configuration, CVM methods and other special features within the ... Only.· Acquirer Interfaces: Authorization Request, Financial Transaction Request, Batch Data Capture, Online Data Capture.· Cardholder Verification Methods: Offline Plaintext PIN, Offline Enciphered PIN, Signature ...