√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
blank
blank
 расота
blank
Radu Ch. Ч Implementing Electronic Card Payment Systems
Radu Ch. Ч Implementing Electronic Card Payment Systems

„итать книгу
бесплатно

—качать книгу с нашего сайта нельз€

ќбсудите книгу на научном форуме



Ќашли опечатку?
¬ыделите ее мышкой и нажмите Ctrl+Enter


Ќазвание: Implementing Electronic Card Payment Systems

јвтор: Radu Ch.

јннотаци€:

Radu, an electrical engineer who works as a consultant for payment systems and telecom operations in Belgium, has written a thorough description of EMV chip card technology. Following a description of chip migration with EMV and its use for debit and credit cards, Radu details the processing of such cards, including remote card payments, with attention to various formats. A lengthy section of appendices details the technology's security framework, threats, services, mechanisms, and risk management.


язык: en

–убрика: “ехнологи€/

—татус предметного указател€: √отов указатель с номерами страниц

ed2k: ed2k stats

√од издани€: 2003

 оличество страниц: 464

ƒобавлена в каталог: 20.08.2007

ќперации: ѕоложить на полку | —копировать ссылку дл€ форума | —копировать ID
blank
ѕредметный указатель
Access control      369
accumulators      281Ч283
Accumulators, application off-line      283
Accumulators, application period      282
Accumulators, card off-line      283
Accumulators, card period      282
Accumulators, limit parameters      282Ч283. See also Card risk management (CRM)
Acquirer in counterfeit transactions      234Ч235
Acquirer in fraudulent transactions      235
Acquirer in message flows      41Ч45
Acquirer, defined      15
Acquirer, fallback requirements      233
Acquirer, host (AH)      37
Acquirer, node (AN)      37
Acquirer, parameters      197Ч198
Acquirer, security policies      203
Action codes      201Ч203
Action codes, issuer      201Ч202
Action codes, terminal      203
Administration-to-consumer (A2C) payment      1
AES block cipher      402Ч404
AFL      141Ч142
AFL, AEF file entries      141Ч142
AFL, defined      141
AFL, EMV$\texttrademark$ debit/credit      154Ч156
AFL, EMV$\texttrademark$ debit/credit, processing      156Ч158. See also Signed static application data
Algorithmic state machines (ASM)      67
Amount authorized per cycle period parameter      23
Amount remaining this cycle parameter      23
Anonymity      300Ч302
Answer-to-reset (ATR)      93
Application Cryptogram (AC), case 1 computation      213Ч214
Application Cryptogram (AC), case 2 computation      214Ч215
Application Cryptogram (AC), computation      208Ч217
Application Cryptogram (AC), defined      204 212
Application Cryptogram (AC), generation      211
Application Cryptogram (AC), generation conditions      161
Application Cryptogram (AC), master key for      213
Application Cryptogram (AC), verification      215Ч217
Application definition files (ADFs)      84Ч86
Application definition files (ADFs) as application data container      85
Application definition files (ADFs) in EMV$\texttrademark$ file system      99Ч106
Application definition files (ADFs), Application Label (tag 50)      101
Application definition files (ADFs), Application Preferred Name (tag 9F12)      101
Application definition files (ADFs), Application Priority Indicator (tag 87)      101Ч102
Application definition files (ADFs), defined      99
Application definition files (ADFs), DF Name (tag 84)      100
Application definition files (ADFs), direct application selection service and      103
Application definition files (ADFs), directory entries      114
Application definition files (ADFs), elements      84Ч85
Application definition files (ADFs), FCI Issuer Discretionary Data (tag BF0C)      102Ч103
Application definition files (ADFs), FCI of      100
Application definition files (ADFs), Insert Code Table Index (tag 9F11)      101
Application definition files (ADFs), Language Preference (tag 5F2D)      101
Application definition files (ADFs), partial name selection      103Ч106
Application definition files (ADFs), Processing Options Data Object List (tag 9F38)      102
Application definition files (ADFs), referencing      84
Application definition files (ADFs), structure      99
Application Effective Date      178 272Ч273
Application elementary files (AEFs)      83
Application elementary files (AEFs) with SFI in range of 1 to 10      106Ч107
Application elementary files (AEFs) with SFI in range of 11 to 20      107Ч108
Application elementary files (AEFs) with SFI in range of 21 to 30      107Ч108
Application elementary files (AEFs), AFL      141Ч142
Application elementary files (AEFs), data template example      109
Application elementary files (AEFs), defined      106
Application elementary files (AEFs), EMV$\texttrademark$ debit/credit application      148
Application elementary files (AEFs), in EMV$\texttrademark$ file system      106Ч108
Application elementary files (AEFs), storing directory file      108
Application Expiration Date      178 272Ч273
Application Interchange Profile (AIP), defined      87
Application Interchange Profile (AIP), EMV$\texttrademark$ debit/credit      154Ч156
Application protocols (layer 7)      65
Application Transaction Counter (ATC)      74 154
Application Usage Control      175Ч178 271Ч272
Application Version Number      174Ч175 272
applications      See Card applications; E-commerce applications
Asymmetric cryptographic support      87Ч90
Asymmetric encryption      375Ч376
Asymmetric PIN verification      390Ч391
ATM terminal, payment message forwarding      12
ATM terminal, processing      10Ч11
ATM terminal, RAM      10
Authentication services (AS)      301Ч302
Authentication, cardholder account      303
Authentication, data      301Ч302 367
Authentication, data (SET)      320
Authentication, dynamic card      368
Authentication, dynamic data (DDA)      94 148 165Ч174
Authentication, entity      302Ч303
Authentication, entity (SET)      320
Authentication, issuer      221Ч222 368
Authentication, issuer, error      276 283Ч284
Authentication, off-line card      368
Authentication, on-line card      368
Authentication, signed dynamic data      173Ч174
Authentication, static card      368
Authentication, terminal      368
Authorization in EMVЩ debit/credit transaction      151
Authorization request cryptogram (ARQC)      204
Authorization Response Code (ARC)      220
Authorization, message      13
Authorization, on-line, not completed      276
Authorization, payment (SET)      323 328Ч331
Authorization, request response message      47
Authorization, request/response      218Ч221 353Ч354
AuthReq      328Ч329 353
AuthRes      329Ч331 354
BER-TLV encoding      82Ч84
BER-TLV encoding, defined      82
BER-TLV encoding, efficiency      84
BER-TLV encoding, illustrated      83
Biased selection function      198Ч199
Biometrics      391Ч392
Block ciphers      399Ч406
Block ciphers, AES      402Ч404
Block ciphers, block size      400
Block ciphers, cipher block chaining mode (CBC)      401
Block ciphers, cipher feedback chaining mode (CFB)      401
block ciphers, defined      399
Block ciphers, DES      402Ч404
Block ciphers, electronic codebook mode (ECB)      401
Block ciphers, key derivation      405Ч406
Block ciphers, key size      400
Block ciphers, MAC with 64 bit-length      404Ч405
Block ciphers, modes of operation      400Ч402
Block ciphers, output feedback chaining mode (OFB)      401
Block ciphers, parameters      399Ч400
Block ciphers, Triple-DES      402Ч404
Business contexts      257Ч258
Business environment data elements      35
Business-to-consumer (B2C) payment      1
C-APDU      65Ч66 67
C-APDU, EXTERNAL AUTHENTICATE command      221
C-APDU, GENERATE AC command      209
C-APDU, GET CHALLENGE command      189
C-APDU, GET DATA command      188
C-APDU, GET PROCESSING OPTIONS command      153 257 345
C-APDU, INTERNAL AUTHENTICATE command      170
C-APDU, READ RECORD command      107
C-APDU, SELECT command      104
C-APDU, VERIFY command      190
CA public keys, elements      129
CA public keys, terminal database of      131. See also Public key certificates
Candidate list      115Ч116
Candidate list, building process      115Ч116
Candidate list, building, directly      119Ч121
Candidate list, building, from PSE      118Ч119
CapReq      331
CapRes      332
Card acceptor      14Ч15
Card applications, allocation tables for      244
Card applications, example      244Ч245
Card applications, mapping to triples      243
Card applications, set selection      243Ч246
Card association in clearing process      48
Card association, card products      16
Card association, defined      15
Card association, types of      16
Card authentication      76
Card authentication method (CAM)      87
Card authentication method (CAM), design criteria      259Ч267
Card authentication method (CAM), off-line dynamic      259
Card authentication method (CAM), off-line static      259
Card authentication method (CAM), on-line dynamic      259Ч260
Card authentication method (CAM), security considerations      263Ч267
Card authentication method (CAM), support resource needs      260
Card authentication method (CAM), types of      259Ч260
Card file structure      252
Card products      16
Card risk management (CRM)      273Ч286
Card risk management (CRM), components      273Ч274
Card risk management (CRM), data      278Ч283
Card risk management (CRM), external data objects      278
Card risk management (CRM), financial accumulators and accumulator limit parameters      281Ч283
Card risk management (CRM), input/output perspective      274
Card risk management (CRM), internal data objects      278
Card risk management (CRM), processing counters and counter limit parameters      280Ч281
Card risk management (CRM), specification      273
Card risk management (CRM), transaction flow tags      279Ч280. See also CRM functions
Cardholder access devices      295
Cardholder access devices EMV$\texttrademark$ chip cards in      340Ч341
Cardholder access devices threats      299Ч300
Cardholder system, account selection request      352
Cardholder system, application list building      344
Cardholder system, application selection mechanism      344Ч345
Cardholder system, cardholder verification      347Ч349
Cardholder system, commonChip extension      352Ч353
Cardholder system, EMV$\texttrademark$ card application hosting      345
Cardholder system, EMV$\texttrademark$ chip card interaction      353
Cardholder system, GET PROCESSING OPTIONS command      345
Cardholder system, not receiving PRes message      355
Cardholder system, off-line PIN entry prompt      348
Cardholder system, on-line PIN entry prompt      348
Cardholder system, payment options      342
Cardholder system, PInitReq creation      346
Cardholder system, PInitRes reception      346
Cardholder system, PReq creation      350Ч351
Cardholder system, PRes message and      355
Cardholder system, read application data      345
Cardholder system, receiving PRes message      355
Cardholder system, terminal action analysis      349Ч350. See also Chip e-commerce
Cardholder Verification Method (CVM)      87
Cardholder Verification Method (CVM), Code (CVM code)      181Ч182 259
Cardholder Verification Method (CVM), Condition Code (CVM Condition Code)      182 258
Cardholder Verification Method (CVM), design criteria      267Ч270
Cardholder Verification Method (CVM), enciphered PIN verified on-line      267Ч268 387Ч388
Cardholder Verification Method (CVM), implementation requirements      269Ч270
Cardholder Verification Method (CVM), manual signature      387
Cardholder Verification Method (CVM), plaintext/enciphered PIN verification by ICC      268 388Ч389
Cardholder Verification Method (CVM), support resources      269
Cardholder Verification Method List (CVM List)      182Ч183 258
Cardholder Verification Method List (CVM List), definition policies      270
Cardholder Verification Method List (CVM List), guidelines      270
Cardholder verification with biometrics      391Ч392
Cardholder verification, chip e-commerce      347Ч349
Cardholder verification, common processing (terminal)      184Ч186
Cardholder verification, data objects in      181Ч183
Cardholder verification, defined      178Ч179
Cardholder verification, EMV$\texttrademark$ debit/credit      178Ч195
Cardholder verification, EMV$\texttrademark$ methods      179Ч181
Cardholder verification, impersonation vs.      27Ч29
Cardholder verification, mechanisms      387Ч392
Cardholder verification, off-line PIN processing      186Ч191
Cardholder verification, on-line PIN processing      194Ч195
Cardholder verification, RSA digital envelope      191Ч194
Cardholder verification, rules (CVRs)      181 258
Cardholder, accounts database      33
Cardholder, defined      14
Cardholder, impersonation      364
Cardholder, non-repudiation service      303Ч304
Cardholder, registration      316
CDOL1/CDOL2      209Ч211
Certification Authority      313Ч315
Certification authority, algorithm      315
Certification authority, illustrated      315
Certification authority, root      314. See also SET
Chip cards      See ICCs
Chip e-commerce, account/card selection      342
Chip e-commerce, application processing initiation      345Ч346
Chip e-commerce, application selection      344Ч345
Chip e-commerce, authorization request/response      353Ч354
Chip e-commerce, AuthReq      353Ч354
Chip e-commerce, AuthRes      354
Chip e-commerce, cardholder verification      347Ч349
Chip e-commerce, EMV$\texttrademark$ application context      342Ч346
Chip e-commerce, EMV$\texttrademark$ transaction profile      342Ч344
Chip e-commerce, PANData template      351 352
Chip e-commerce, PReq      350
Chip e-commerce, purchase initialization      346Ч347
Chip e-commerce, purchase request and response      350Ч353
Chip e-commerce, terminal action analysis      349Ч350
Chip e-commerce, transaction completion      355Ч356
Chip e-commerce, transaction flow      341
Chip e-commerce, transaction processing      340Ч356
Chip migration      3Ч4 53Ч90
Chip migration, business case for      54Ч56
Chip migration, cost of      55
Chip migration, revenue streams and      56
Cipher block chaining mode (CBC)      401
Cipher feedback chaining mode (CFB)      401
Clearing batch file      48
Clearing, card association and      48
Clearing, defined      47
Clearing, off-line      42Ч43
Clearing, on-line      42 44
Colluding attacks      33Ч34
Command application protocol data unit      See C-APDU
Command/response format      65Ч66
Command/response format, C-APDU      65Ч66
Command/response format, interoperable payment application      87
Command/response format, preestablished      73Ч75
Command/response format, proprietary payment application      73Ч75
Command/response format, R-APDU      66
Command/response format, variable      87. See also ICCs
Common Electronic Purse Specification (CEPS)      371
CommonChip extension      352Ч353
Communications channel threats      296Ч299
Communications channel threats, data modification      297Ч298 365
Communications channel threats, denial-of-service      299 365
Communications channel threats, impersonation      298Ч299
Communications channel threats, interception      364
Communications channel threats, physical penetration      365Ч366
Communications channel threats, sniffing      296Ч297
Communications channel threats, time coordinate      365
Communications channel threats, wiretapping      363Ч364. See also Remote card payment security; Threats
Confidentiality, data      367
Confidentiality, secure messaging for      367
Confidentiality, services (CS)      301
Consistency rules      158Ч160
Consumer-to-consumer (C2C) payment      1
Counterfeit transactions      233Ч234
Counterfeit transactions, acquirer in      234
Counterfeit transactions, issuer in      235
Counterfeit transactions, liability distribution      234
Counterfeiting      31Ч33 54
Counterfeiting, defined      31Ч32
Counterfeiting, embossed financial data      32
Counterfeiting, track 3 and      32. See also Threats
credit cards      16Ч17
1 2 3 4 5
blank
–еклама
blank
blank
HR
@Mail.ru
       © Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2018
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01! | Valid CSS! ќ проекте