Flylib.com
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Table of Contents
BackCover
Implementing Electronic Card Payment Systems
Chapter 1: Introduction
Part I: Magnetic stripe debit and credit cards
Part II: Chip migration with EMV(TM)
Part III: Remote debit and credit with EMV(TM)
Part I: Magnetic Stripe Debit and Credit Cards
Chapter 2: Payment Card Processing
2.2 Roles involved in payment card processing
2.3 Payment card brands
2.4 Credit and debit payment cards
2.5 Focusing on the magnetic stripe card
2.6 Threats and security protections
2.7 Processing at the point of service
2.8 Payment network and interchange messages
2.9 On-line authorization
2.10 Clearing and settlement
References
Part II: Chip Migration with EMV(TM)
Chapter 3: Chip Migration
3.1 A business case for chip migration
3.2 An overview of the chip card technology
3.3 Proprietary payment application
3.4 Interoperable payment application
References
Chapter 4: EMV(TM) Compliant Data Organization
4.1 Organization of the EMV(TM) specifications
4.2 EMV(TM) data elements
4.3 EMV(TM) file system
4.4 EMV(TM) application selection
References
Chapter 5: EMV(TM) Certificates
5.1 Certification mechanism and algorithm
5.2 Public key certificate for RSA scheme
5.3 Entities and certifiers
5.4 Entity public key remainder
5.5 EMV(TM) certification chains
5.6 Issuing EMV(TM) public key certificates
5.7 Verifying EMV(TM) public key certificates
5.8 Issuing signed static application data
5.9 Verifying the Signed Static Application Data
References
Chapter 6: Debit and Credit with EMV(TM)
6.2 Initiate application processing
6.3 Read application data
6.4 Off-line data authentication
6.5 Processing restrictions
6.6 Cardholder verification
6.7 Terminal risk management
6.8 Terminal action analysis
6.9 On-line processing and issuer authentication
6.10 Issuer scripts
References
Chapter 7: EMV(TM) Chip Migration Issues
7.1 EMV(TM) regulatory framework
7.2 Deriving ICC specifications by issuers
7.3 Selection criteria of the ICC architecture
7.4 Multiapplication ICC
7.5 Issuer s business case
7.6 Adaptive initiate application processing
7.7 Design criteria for CAM selection
7.8 Design criteria for CVM
7.9 Processing restrictions
7.10 Card risk management
References
Part III: Remote Debit and Credit with EMV(TM)
Chapter 8: Remote Card Payments and EMV(TM)
8.1 A model for remote card payments
8.2 Security aspects of remote card payments
8.3 Remote payment method based on TLS
8.4 SET-based solutions
8.5 TLS versus SET or wallet servers and EMV(TM) cards
8.6 Transaction processing for chip e-commerce
References
Appendix A: Security Framework
Reference
Appendix B: Generic Security Threats
Appendix C: Security Services
C.2 Realization of security services
References
Appendix D: Security Mechanisms
D.2 Cryptographic hash functions
D.3 Digital signature schemes
D.4 Public key certificates
D.5 Cardholder verification mechanisms
D.6 SDA mechanisms
D.7 DDA mechanisms
References
Appendix E: Block Ciphers
E.2 Modes of operation
E.3 DES, Triple-DES, and AES
E.4 MAC using a 64 bit-length block cipher
E.5 Key derivation
References
Appendix F: RSA Encryption and Signature Scheme
F.2 Public and secret RSA operations
F.3 Digital signature giving message recovery
F.4 Digital signature and encryption with PKCS1
References
Appendix G: E-Commerce and M-Commerce Related Technologies
G.2 SIM, STK, SMS, and WAP
G.3 Access devices for remote card payments
G.4 WAP protocol suite compared to Internet
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P-Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W-Z
List of Figures
List of Tables
List of Examples
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
An Emerging Strategy for E-Business IT Governance
Assessing Business-IT Alignment Maturity
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance Structures for IT in the Health Care Industry
MySQL Clustering
Restarting a Cluster
SQL Nodes
MySQL Cluster Performance
Indexes
Web Farm/MySQL Farm
Visual C# 2005 How to Program (2nd Edition)
Case Study: A Game of Chance (Introducing Enumerations)
Arrays
Terminology
Creating and Running a Simple Web-Form Example
K.2. Additional Diagram Types
Twisted Network Programming Essentials
Installing from Source Files
Adding Twisted Utilities to Your Path
Starting the Twisted Event Loop
Representing Users with Different Capabilities
Setting Limits on an Applications Permissions
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Types of Network Connections
The PSTN Infrastructure
The Next-Generation Network Infrastructure
End-to-End Optical Networking
The IP+Optical Control Plane
.NET-A Complete Development Cycle
Introducing Software Engineering
GDI+ Graphics Extensions
References for Further Reading
Analysis of the Advanced GDI+ Extensions Requirements
Database Access with ADO.NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies