List of Figures


Chapter 2: Payment Card Processing

Figure 2.1: Payment card processing things one can see.
Figure 2.2: Network and back-office processing of payment card transactions.
Figure 2.3: Roles involved in payment card processing.
Figure 2.4: Payment network topology.
Figure 2.5: On-line transaction in a dual message network with on-line clearing.
Figure 2.6: On-line transaction in a dual message network with off-line clearing.
Figure 2.7: On-line transaction in a single message network.
Figure 2.8: Off-line transaction in a single message network with on-line clearing.
Figure 2.9: Off-line transaction in a dual message network with off-line clearing.

Chapter 3: Chip Migration

Figure 3.1: Hardware structure of the single-chip computer in the card.
Figure 3.2: Two software architectures for chip cards.
Figure 3.3: The organization of the card's file system.
Figure 3.4: Four types of elementary file data structures.
Figure 3.5: Command/ response pair (C-APDU/ R-APDU).
Figure 3.6: Terminal application and card application in a client server configuration.
Figure 3.7: Mapping of data objects into the card's file system.
Figure 3.8: Computation of the dynamic authenticator.
Figure 3.9: Verification of the dynamic authenticator.
Figure 3.10: EMV mapping of data objects in elementary files.
Figure 3.11: File system in an EMV card.
Figure 3.12: Variable command data input with DOL mechanism.

Chapter 4: EMV Compliant Data Organization

Figure 4.1: The EMV protocol stack and its mapping to EMV 2000 .
Figure 4.2: Recursive representation of constructed data objects.
Figure 4.3: FCI of an ADF.
Figure 4.4: Example of a PDOL encoding.
Figure 4.5: Partial name selection mechanism.
Figure 4.6: Example of an AEF Data Template in a directory file.
Figure 4.7: FCI of a DDF.
Figure 4.8: Directory structure and indirect application selection service.
Figure 4.9: FCI of the PSE.

Chapter 5: EMV Certificates

Figure 5.1: EMV certification chain.

Chapter 6: Debit and Credit with EMV

Figure 6.1: Interchange between the ICC and the terminal for an EMV debit/credit transaction.
Figure 6.2: Payment network processing of an EMV debit/credit transaction.
Figure 6.3: Initiate application processing.
Figure 6.4: Read application data.
Figure 6.5: Overview of the off-line SDA.
Figure 6.6: Overview of the off-line DDA.
Figure 6.7: Overview of the enciphered PIN verification performed by ICC.
Figure 6.8: Biased selection function for on-line authorization.

Chapter 7: EMV Chip Migration Issues

Figure 7.1: Definition of the issuer ICC specification.
Figure 7.2: Allocation tables for card applications.
Figure 7.3: Card layout with EMV debit/credit and other functionality.
Figure 7.4: Card file structure corresponding to the proposed layout.
Figure 7.5: CRM system from the input/output perspective.

Chapter 8: Remote Card Payments and EMV

Figure 8.1: Payment card processing in remote transactions.
Figure 8.2: Internet protocol suite.
Figure 8.3: Overview of the TLS handshake protocol.
Figure 8.4: SET model for remote card payments.
Figure 8.5: SET certification hierarchy.
Figure 8.6: Establishment of a SET channel.
Figure 8.7: Remote transaction with SET payment method.
Figure 8.8: SET functional components .
Figure 8.9: Wallet server in remote payment card processing.
Figure 8.10: SET transaction flow in the thin client architecture.
Figure 8.11: Transaction flow of the chip electronic commerce.

Appendix A: Security Framework

Figure A.1: Definition of a security framework.

Appendix B: Generic Security Threats

Figure B.1: Communication channel wiretapping.

Appendix C: Security Services

Figure C.1: Generic communication protocol stack.

Appendix D: Security Mechanisms

Figure D.1: Unified model for symmetric and asymmetric encryption systems.
Figure D.2: Secret key wrapping.
Figure D.3: Data authentication using a MAC.
Figure D.4: Ordinary signing protocol.
Figure D.5: PIN encrypted with a public key cryptosystem.

Appendix G: E-Commerce and M-Commerce Related Technologies

Figure G.1: Payment card processing in remote transactions.
Figure G.2: Browsing/ ordering channel over the Internet.
Figure G.3: Browsing/ ordering WAP channel over the GSM network.



Implementing Electronic Card Payment Systems
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors: Cristian Radu

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net