Flylib.com
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Table of Contents
BackCover
Implementing Electronic Card Payment Systems
Chapter 1: Introduction
Part I: Magnetic stripe debit and credit cards
Part II: Chip migration with EMV(TM)
Part III: Remote debit and credit with EMV(TM)
Part I: Magnetic Stripe Debit and Credit Cards
Chapter 2: Payment Card Processing
2.2 Roles involved in payment card processing
2.3 Payment card brands
2.4 Credit and debit payment cards
2.5 Focusing on the magnetic stripe card
2.6 Threats and security protections
2.7 Processing at the point of service
2.8 Payment network and interchange messages
2.9 On-line authorization
2.10 Clearing and settlement
References
Part II: Chip Migration with EMV(TM)
Chapter 3: Chip Migration
3.1 A business case for chip migration
3.2 An overview of the chip card technology
3.3 Proprietary payment application
3.4 Interoperable payment application
References
Chapter 4: EMV(TM) Compliant Data Organization
4.1 Organization of the EMV(TM) specifications
4.2 EMV(TM) data elements
4.3 EMV(TM) file system
4.4 EMV(TM) application selection
References
Chapter 5: EMV(TM) Certificates
5.1 Certification mechanism and algorithm
5.2 Public key certificate for RSA scheme
5.3 Entities and certifiers
5.4 Entity public key remainder
5.5 EMV(TM) certification chains
5.6 Issuing EMV(TM) public key certificates
5.7 Verifying EMV(TM) public key certificates
5.8 Issuing signed static application data
5.9 Verifying the Signed Static Application Data
References
Chapter 6: Debit and Credit with EMV(TM)
6.2 Initiate application processing
6.3 Read application data
6.4 Off-line data authentication
6.5 Processing restrictions
6.6 Cardholder verification
6.7 Terminal risk management
6.8 Terminal action analysis
6.9 On-line processing and issuer authentication
6.10 Issuer scripts
References
Chapter 7: EMV(TM) Chip Migration Issues
7.1 EMV(TM) regulatory framework
7.2 Deriving ICC specifications by issuers
7.3 Selection criteria of the ICC architecture
7.4 Multiapplication ICC
7.5 Issuer s business case
7.6 Adaptive initiate application processing
7.7 Design criteria for CAM selection
7.8 Design criteria for CVM
7.9 Processing restrictions
7.10 Card risk management
References
Part III: Remote Debit and Credit with EMV(TM)
Chapter 8: Remote Card Payments and EMV(TM)
8.1 A model for remote card payments
8.2 Security aspects of remote card payments
8.3 Remote payment method based on TLS
8.4 SET-based solutions
8.5 TLS versus SET or wallet servers and EMV(TM) cards
8.6 Transaction processing for chip e-commerce
References
Appendix A: Security Framework
Reference
Appendix B: Generic Security Threats
Appendix C: Security Services
C.2 Realization of security services
References
Appendix D: Security Mechanisms
D.2 Cryptographic hash functions
D.3 Digital signature schemes
D.4 Public key certificates
D.5 Cardholder verification mechanisms
D.6 SDA mechanisms
D.7 DDA mechanisms
References
Appendix E: Block Ciphers
E.2 Modes of operation
E.3 DES, Triple-DES, and AES
E.4 MAC using a 64 bit-length block cipher
E.5 Key derivation
References
Appendix F: RSA Encryption and Signature Scheme
F.2 Public and secret RSA operations
F.3 Digital signature giving message recovery
F.4 Digital signature and encryption with PKCS1
References
Appendix G: E-Commerce and M-Commerce Related Technologies
G.2 SIM, STK, SMS, and WAP
G.3 Access devices for remote card payments
G.4 WAP protocol suite compared to Internet
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P-Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W-Z
List of Figures
List of Tables
List of Examples
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Access Control
Legal, Regulations, Compliance, and Investigations
Appendix E The Information System Security Management Professional (ISSMP) Certification
Appendix G Control Baselines
C++ How to Program (5th Edition)
Defining a Member Function with a Parameter
Searching Arrays with Linear Search
Self-Review Exercises
G.4. Class Keypad
M.6. Wrap-Up
Competency-Based Human Resource Management
An Overview of Competency-Based HR Management Practices
Competency-Based Employee Recruitment and Selection
Competency-Based Employee Rewards
Competency-Based Employee Development
Appendix B Further Suggestions on Employee Development
Information Dashboard Design: The Effective Visual Communication of Data
Arranging the Data Poorly
Designing an Unattractive Visual Display
Maintain Consistency for Quick and Accurate Interpretation
Putting It All Together
A Final Word
Junos Cookbook (Cookbooks (OReilly))
Turning On Logging
Improving IS-IS Convergence Times
Installing LSPs into the Unicast Routing Table
Using Auto-RP to Dynamically Map RPs
Tracing PIM Packets
Java Concurrency in Practice
Benefits of Threads
Safe Publication
Summary
Example: Comparing Map Performance
Reducing Context Switch Overhead
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies