Flylib.com
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Table of Contents
BackCover
Implementing Electronic Card Payment Systems
Chapter 1: Introduction
Part I: Magnetic stripe debit and credit cards
Part II: Chip migration with EMV(TM)
Part III: Remote debit and credit with EMV(TM)
Part I: Magnetic Stripe Debit and Credit Cards
Chapter 2: Payment Card Processing
2.2 Roles involved in payment card processing
2.3 Payment card brands
2.4 Credit and debit payment cards
2.5 Focusing on the magnetic stripe card
2.6 Threats and security protections
2.7 Processing at the point of service
2.8 Payment network and interchange messages
2.9 On-line authorization
2.10 Clearing and settlement
References
Part II: Chip Migration with EMV(TM)
Chapter 3: Chip Migration
3.1 A business case for chip migration
3.2 An overview of the chip card technology
3.3 Proprietary payment application
3.4 Interoperable payment application
References
Chapter 4: EMV(TM) Compliant Data Organization
4.1 Organization of the EMV(TM) specifications
4.2 EMV(TM) data elements
4.3 EMV(TM) file system
4.4 EMV(TM) application selection
References
Chapter 5: EMV(TM) Certificates
5.1 Certification mechanism and algorithm
5.2 Public key certificate for RSA scheme
5.3 Entities and certifiers
5.4 Entity public key remainder
5.5 EMV(TM) certification chains
5.6 Issuing EMV(TM) public key certificates
5.7 Verifying EMV(TM) public key certificates
5.8 Issuing signed static application data
5.9 Verifying the Signed Static Application Data
References
Chapter 6: Debit and Credit with EMV(TM)
6.2 Initiate application processing
6.3 Read application data
6.4 Off-line data authentication
6.5 Processing restrictions
6.6 Cardholder verification
6.7 Terminal risk management
6.8 Terminal action analysis
6.9 On-line processing and issuer authentication
6.10 Issuer scripts
References
Chapter 7: EMV(TM) Chip Migration Issues
7.1 EMV(TM) regulatory framework
7.2 Deriving ICC specifications by issuers
7.3 Selection criteria of the ICC architecture
7.4 Multiapplication ICC
7.5 Issuer s business case
7.6 Adaptive initiate application processing
7.7 Design criteria for CAM selection
7.8 Design criteria for CVM
7.9 Processing restrictions
7.10 Card risk management
References
Part III: Remote Debit and Credit with EMV(TM)
Chapter 8: Remote Card Payments and EMV(TM)
8.1 A model for remote card payments
8.2 Security aspects of remote card payments
8.3 Remote payment method based on TLS
8.4 SET-based solutions
8.5 TLS versus SET or wallet servers and EMV(TM) cards
8.6 Transaction processing for chip e-commerce
References
Appendix A: Security Framework
Reference
Appendix B: Generic Security Threats
Appendix C: Security Services
C.2 Realization of security services
References
Appendix D: Security Mechanisms
D.2 Cryptographic hash functions
D.3 Digital signature schemes
D.4 Public key certificates
D.5 Cardholder verification mechanisms
D.6 SDA mechanisms
D.7 DDA mechanisms
References
Appendix E: Block Ciphers
E.2 Modes of operation
E.3 DES, Triple-DES, and AES
E.4 MAC using a 64 bit-length block cipher
E.5 Key derivation
References
Appendix F: RSA Encryption and Signature Scheme
F.2 Public and secret RSA operations
F.3 Digital signature giving message recovery
F.4 Digital signature and encryption with PKCS1
References
Appendix G: E-Commerce and M-Commerce Related Technologies
G.2 SIM, STK, SMS, and WAP
G.3 Access devices for remote card payments
G.4 WAP protocol suite compared to Internet
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P-Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W-Z
List of Figures
List of Tables
List of Examples
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Object Types, Predicates, and Basic Constraints
ORM Constraints
Reverse Engineering and Importing to ORM
Other Features and Best Practices
Managing Enterprise Systems with the Windows Script Host
Introduction
Logon Scripts and Scheduling
Networking Resources
Internet Information Server
Security
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Mergers and acquisitions
Cultural change
IT-based process change
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 215 Feeders
Article 384 Strut-Type Channel Raceway
Notes for Tables 11(A) and 11(B)
Example No. D1(a) One-Family Dwelling
Example No. D5(b) Optional Calculation for Multifamily Dwelling Served at 208Y/120 Volts, Three Phase
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Credibility and Computers
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Cross-Century Worldviews
The China Phenomenon
Epilogue After September 11
Appendix C National Traits
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies