Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Payment Card Processing
Figure 2.1: Payment card processing things one can see.
Figure 2.2: Network and back-office processing of payment card transactions.
Figure 2.3: Roles involved in payment card processing.
Figure 2.4: Payment network topology.
Figure 2.5: On-line transaction in a dual message network with on-line clearing.
Figure 2.6: On-line transaction in a dual message network with off-line clearing.
Figure 2.7: On-line transaction in a single message network.
Figure 2.8: Off-line transaction in a single message network with on-line clearing.
Figure 2.9: Off-line transaction in a dual message network with off-line clearing.
Chapter 3: Chip Migration
Figure 3.1: Hardware structure of the single-chip computer in the card.
Figure 3.2: Two software architectures for chip cards.
Figure 3.3: The organization of the card's file system.
Figure 3.4: Four types of elementary file data structures.
Figure 3.5: Command/ response pair (C-APDU/ R-APDU).
Figure 3.6: Terminal application and card application in a client server configuration.
Figure 3.7: Mapping of data objects into the card's file system.
Figure 3.8: Computation of the dynamic authenticator.
Figure 3.9: Verification of the dynamic authenticator.
Figure 3.10: EMV
mapping of data objects in elementary files.
Figure 3.11: File system in an EMV
card.
Figure 3.12: Variable command data input with DOL mechanism.
Chapter 4: EMV
Compliant Data Organization
Figure 4.1: The EMV
protocol stack and its mapping to
EMV 2000
.
Figure 4.2: Recursive representation of constructed data objects.
Figure 4.3: FCI of an ADF.
Figure 4.4: Example of a PDOL encoding.
Figure 4.5: Partial name selection mechanism.
Figure 4.6: Example of an AEF Data Template in a directory file.
Figure 4.7: FCI of a DDF.
Figure 4.8: Directory structure and indirect application selection service.
Figure 4.9: FCI of the PSE.
Chapter 5: EMV
Certificates
Figure 5.1: EMV
certification chain.
Chapter 6: Debit and Credit with EMV
Figure 6.1: Interchange between the ICC and the terminal for an EMV
debit/credit transaction.
Figure 6.2: Payment network processing of an EMV
debit/credit transaction.
Figure 6.3: Initiate application processing.
Figure 6.4: Read application data.
Figure 6.5: Overview of the off-line SDA.
Figure 6.6: Overview of the off-line DDA.
Figure 6.7: Overview of the enciphered PIN verification performed by ICC.
Figure 6.8: Biased selection function for on-line authorization.
Chapter 7: EMV
Chip Migration Issues
Figure 7.1: Definition of the issuer ICC specification.
Figure 7.2: Allocation tables for card applications.
Figure 7.3: Card layout with EMV
debit/credit and other functionality.
Figure 7.4: Card file structure corresponding to the proposed layout.
Figure 7.5: CRM system from the input/output perspective.
Chapter 8: Remote Card Payments and EMV
Figure 8.1: Payment card processing in remote transactions.
Figure 8.2: Internet protocol suite.
Figure 8.3: Overview of the TLS handshake protocol.
Figure 8.4: SET model for remote card payments.
Figure 8.5: SET certification hierarchy.
Figure 8.6: Establishment of a SET channel.
Figure 8.7: Remote transaction with SET payment method.
Figure 8.8: SET functional components .
Figure 8.9: Wallet server in remote payment card processing.
Figure 8.10: SET transaction flow in the thin client architecture.
Figure 8.11: Transaction flow of the chip electronic commerce.
Appendix A: Security Framework
Figure A.1: Definition of a security framework.
Appendix B: Generic Security Threats
Figure B.1: Communication channel wiretapping.
Appendix C: Security Services
Figure C.1: Generic communication protocol stack.
Appendix D: Security Mechanisms
Figure D.1: Unified model for symmetric and asymmetric encryption systems.
Figure D.2: Secret key wrapping.
Figure D.3: Data authentication using a MAC.
Figure D.4: Ordinary signing protocol.
Figure D.5: PIN encrypted with a public key cryptosystem.
Appendix G: E-Commerce and M-Commerce Related Technologies
Figure G.1: Payment card processing in remote transactions.
Figure G.2: Browsing/ ordering channel over the Internet.
Figure G.3: Browsing/ ordering WAP channel over the GSM network.
Previous page
Table of content
Next page
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
The Evolution of IT Governance at NB Power
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Configuring User Features, Part 2
Working with Locally Significant Certificates
Cisco VT Advantage Overview
Bulk Trace Analysis
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Configuration Comments
ISDN Interfaces
Passive Interfaces
Snapshot DDR
Specialized Networking Topics
Java How to Program (6th Edition) (How to Program (Deitel))
Wrap-Up
Java Exception Hierarchy
Stack Class of Package java.util
Layout Managers: BoxLayout and GridBagLayout
Appendix H. (On CD) Creating Documentation with javadoc
Data Structures and Algorithms in Java
Summary
Projects
Summary
Projects
Problems
MPLS Configuration on Cisco IOS Software
VPN Categories
CSC Architecture Benefits
Introduction to Layer 2 VPNs
Configuration and Implementation of MPLS QoS in Uniform Mode and Short Pipe Mode Operation
Case Study 2: Implementing Multi-VRF CE, VRF Selection Using Source IP Address, VRF Selection Using Policy-Based Routing, NAT and HSRP Support in MPLS VPN, and Multicast VPN Support over Multi-VRF CE
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies