Flylib.com
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Table of Contents
BackCover
Implementing Electronic Card Payment Systems
Chapter 1: Introduction
Part I: Magnetic stripe debit and credit cards
Part II: Chip migration with EMV(TM)
Part III: Remote debit and credit with EMV(TM)
Part I: Magnetic Stripe Debit and Credit Cards
Chapter 2: Payment Card Processing
2.2 Roles involved in payment card processing
2.3 Payment card brands
2.4 Credit and debit payment cards
2.5 Focusing on the magnetic stripe card
2.6 Threats and security protections
2.7 Processing at the point of service
2.8 Payment network and interchange messages
2.9 On-line authorization
2.10 Clearing and settlement
References
Part II: Chip Migration with EMV(TM)
Chapter 3: Chip Migration
3.1 A business case for chip migration
3.2 An overview of the chip card technology
3.3 Proprietary payment application
3.4 Interoperable payment application
References
Chapter 4: EMV(TM) Compliant Data Organization
4.1 Organization of the EMV(TM) specifications
4.2 EMV(TM) data elements
4.3 EMV(TM) file system
4.4 EMV(TM) application selection
References
Chapter 5: EMV(TM) Certificates
5.1 Certification mechanism and algorithm
5.2 Public key certificate for RSA scheme
5.3 Entities and certifiers
5.4 Entity public key remainder
5.5 EMV(TM) certification chains
5.6 Issuing EMV(TM) public key certificates
5.7 Verifying EMV(TM) public key certificates
5.8 Issuing signed static application data
5.9 Verifying the Signed Static Application Data
References
Chapter 6: Debit and Credit with EMV(TM)
6.2 Initiate application processing
6.3 Read application data
6.4 Off-line data authentication
6.5 Processing restrictions
6.6 Cardholder verification
6.7 Terminal risk management
6.8 Terminal action analysis
6.9 On-line processing and issuer authentication
6.10 Issuer scripts
References
Chapter 7: EMV(TM) Chip Migration Issues
7.1 EMV(TM) regulatory framework
7.2 Deriving ICC specifications by issuers
7.3 Selection criteria of the ICC architecture
7.4 Multiapplication ICC
7.5 Issuer s business case
7.6 Adaptive initiate application processing
7.7 Design criteria for CAM selection
7.8 Design criteria for CVM
7.9 Processing restrictions
7.10 Card risk management
References
Part III: Remote Debit and Credit with EMV(TM)
Chapter 8: Remote Card Payments and EMV(TM)
8.1 A model for remote card payments
8.2 Security aspects of remote card payments
8.3 Remote payment method based on TLS
8.4 SET-based solutions
8.5 TLS versus SET or wallet servers and EMV(TM) cards
8.6 Transaction processing for chip e-commerce
References
Appendix A: Security Framework
Reference
Appendix B: Generic Security Threats
Appendix C: Security Services
C.2 Realization of security services
References
Appendix D: Security Mechanisms
D.2 Cryptographic hash functions
D.3 Digital signature schemes
D.4 Public key certificates
D.5 Cardholder verification mechanisms
D.6 SDA mechanisms
D.7 DDA mechanisms
References
Appendix E: Block Ciphers
E.2 Modes of operation
E.3 DES, Triple-DES, and AES
E.4 MAC using a 64 bit-length block cipher
E.5 Key derivation
References
Appendix F: RSA Encryption and Signature Scheme
F.2 Public and secret RSA operations
F.3 Digital signature giving message recovery
F.4 Digital signature and encryption with PKCS1
References
Appendix G: E-Commerce and M-Commerce Related Technologies
G.2 SIM, STK, SMS, and WAP
G.3 Access devices for remote card payments
G.4 WAP protocol suite compared to Internet
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P-Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W-Z
List of Figures
List of Tables
List of Examples
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
IT Project+ Study Guide
Answers to Assessment Test
Schedule Planning
Cost Planning
Comprehensive Project Plan
MySQL Clustering
Before You Begin with MySQL Cluster
Troubleshooting Backups
Running MySQL in a Chrooted Environment
Benchmarking
MySQL Cluster Errors
The Complete Cisco VPN Configuration Guide
Traffic Issues
SSL Overview
Chassis Redundancy
Concentrator Tools
Summary
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 3. Map the Places Youve Visited
Hack 7. Will the Kids Barf?
Hack 10. Georeference Digital Photos
Hacks 22-34
Hack 70. Import Your GPS Waypoints and Tracklogs into GRASS
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Project Closing
Answers and Explanations
Professional Responsibility
Appendix A. CD Contents and Installation Instructions
802.11 Wireless Networks: The Definitive Guide, Second Edition
Frame Transmission and Association and Authentication States
Wired Equivalent Privacy (WEP)
Differential Phase Shift Keying (DPSK)
Windows Computer Authentication
11 on the Macintosh
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies