Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Radu Ch. — Implementing Electronic Card Payment Systems
Radu Ch. — Implementing Electronic Card Payment Systems



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Implementing Electronic Card Payment Systems

Àâòîð: Radu Ch.

Àííîòàöèÿ:

Radu, an electrical engineer who works as a consultant for payment systems and telecom operations in Belgium, has written a thorough description of EMV chip card technology. Following a description of chip migration with EMV and its use for debit and credit cards, Radu details the processing of such cards, including remote card payments, with attention to various formats. A lengthy section of appendices details the technology's security framework, threats, services, mechanisms, and risk management.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2003

Êîëè÷åñòâî ñòðàíèö: 464

Äîáàâëåíà â êàòàëîã: 20.08.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
ICC hardware resources, cost      240. See also ICC architecture
ICC software platform      241—242
ICC software platform, cost      241 242
ICC software platform, Java cards      242. See also ICC architecture
ICCs      9
ICCs, card application      67—68
ICCs, command and response format      65—66
ICCs, computer elements      57—58
ICCs, contacts      58
ICCs, defined      57
ICCs, EEPROM space      261—262
ICCs, EMV$\texttrademark$      86 99
ICCs, EMV$^{EM}$ debit/credit transaction      149 150
ICCs, enciphered PIN verification      192
ICCs, file system      60—64
ICCs, functional requirements      238
ICCs, hardware structure      57
ICCs, interoperable payment application      80—90
ICCs, life cycle      61
ICCs, minimal requirements      231
ICCs, multiapplication      242—253
ICCs, operating rules      55
ICCs, PIN encipherment private key      248
ICCs, PIN encipherment public key certificate      135 249
ICCs, proprietary payment application      69—80
ICCs, public key certificate      135 248
ICCs, public key certificate requirement      128—129
ICCs, public key certificate verification      138—140
ICCs, signature generation by      170—172
ICCs, software architectures      59
ICCs, specifications by issuers      236—239
ICCs, technology      56—69
ICCs, terminal application      68
Impersonation      27—29 298—299
Impersonation, cardholder      364
Impersonation, defined      364
Impersonation, issuer      364. See also Communications channel Threats; Threats
Indirect application selection service      110—112
Indirect application selection service, defined      110
Indirect application selection service, directory structure and      110—112
Indirect application selection service, illustrated      113
Indirect application selection service, implementation      118
Interface decomposition      359
INTERNAL AUTHENTICATE command      263
Interoperable payment application      80—90
Interoperable payment application, asymmetric cryptographic support      87—90
Interoperable payment application, BER-TLV encoding      82—84
Interoperable payment application, command/response formats      87
Interoperable payment application, customized file system organization      84—86
Interoperable payment application, overview      80—82
Interoperable payment application, self-determined encoding      82—84
Interoperable payment application, solution      82. See also ICCs
ISO/IEC 7816 standard      54 56
Issuer business case      253—255
Issuer business case, financial service availability      253—254
Issuer business case, operational cost reduction      255
Issuer business case, security improvement      254—255
Issuer in counterfeit transactions      235
Issuer in fraudulent transactions      235—236
Issuer in message flows      41—45
Issuer in signed static application data      140—141
Issuer scripts      222—225
Issuer scripts, post-issuance commands      225
Issuer scripts, templates processing      222—224. See also EMV$\texttrademark$ debit/credit
Issuer, action codes      201—202
Issuer, authentication      221—222 368
Issuer, authentication error      276 283—284
Issuer, business contexts      257—258
Issuer, CVM List criteria      270
Issuer, defined      14
Issuer, fallback requirements      232
Issuer, host (IH)      37
Issuer, ICC specifications      236—239
Issuer, impersonation      364
Issuer, multiapplication ICC restrictions      246
Issuer, node (IN)      37
Issuer, public key      131
Issuer, public key certificate      135
Issuer, public key certificate requirement      127—128
Issuer, public key certificate verification      136—138
Issuer, script processing error      277
Issuer, security policy      202—203
Java cards      242
Java virtual machine (JVM)      59
Key generation      408—409
Lower Consecutive Off-line Limit      199
M-commerce related technologies      419—427
MAC      379—380
MAC with 64 bit-length block cipher      404—405
MAC, data authentication with      379
MAC, DDA      394—395
MAC, defined      379
MAC, primitives      380
MAC, SDA mechanisms      392. See also Cryptographic hash functions; Security mechanisms
Magnetic stripe cards      9 17—24
Magnetic stripe cards, defined      10
Magnetic stripe cards, financial data      20—24
Magnetic stripe cards, processing      11. See also Payment cards
Magnetic stripes      20—24
Magnetic stripes, track 1      20—21
Magnetic stripes, track 2      22
Magnetic stripes, track 3      22—24
Magnetic stripes, tracks      20—24
Manual signature      387
Master file (MF)      60
MD4      378
MD5      378
Memory Management Unit (MMU)      57
Merchants, access device threats      300
Merchants, applications supported by      344
Merchants, attacks      33—34
Merchants, registration      316
Message(s), authorization      13
Message(s), authorization request response      47
Message(s), financial      42
Message(s), flows      41—45
Message(s), format      39
Message(s), payment      12
Message(s), structure      38—41
Message(s), type identifier      39—41
Message(s), verification      46
Mobility payment instruments      6
Multiapplication ICCs      242—253
Multiapplication ICCs, application set definition      243—246
Multiapplication ICCs, card layout definition      246—253
Multiapplication ICCs, implementation      243
MULTOS operating system      59—60
non-repudiation      303—304
Non-repudiation of delivery      369
Non-repudiation of origin      369
Non-repudiation, security service      369
Non-repudiation, SET      321
Off-line card authentication      368
Off-line clearing      42—43
Off-line clearing, off-line transaction      45
Off-line clearing, on-line transaction      43
Off-line data authentication      160—174
Off-line data authentication, DDA      165—174
Off-line data authentication, performance of      161—162
Off-line data authentication, SDA      162—165
Off-line data authentication, selection      160—162
Off-line data authentication, types of      160. See also EMV$\texttrademark$ debit/credit
Off-line DDA      148
Off-line DDA, authenticity verification      168—170
Off-line DDA, conditions for performing      161
Off-line DDA, defined      165
Off-line DDA, illustrated      167
Off-line DDA, overview      166—168
Off-line DDA, personalization stage      166
Off-line DDA, signature generation      170—172
Off-line DDA, signed dynamic authentication data verification      173—174
Off-line DDA, utilization stage      167—168. See also Dynamic data authentication (DDA); Off-line data authentication
Off-line dynamic CAM      262—263
Off-line dynamic CAM as appropriate security level      266
Off-line dynamic CAM, defined      259
Off-line dynamic CAM, ICC resource requirement and      262
Off-line dynamic CAM, off-line static CAM vs.      266—267. See also Card authentication method (CAM)
Off-line PIN processing      186—191
Off-line PIN processing, support      186—187
Off-line PIN processing, terminal not supporting      187. See also Cardholder verification
Off-line PIN verification      227
Off-line SDA      162—165
Off-line SDA, conditions for performing      162
Off-line SDA, overview illustration      163
Off-line SDA, personalization stage      162
Off-line SDA, stage 1      163—164
Off-line SDA, stage 2      164
Off-line SDA, stage 3      164
Off-line SDA, stage 4      165
Off-line SDA, utilization stage      162. See also Off-line data authentication
Off-line static CAM      261—262
Off-line static CAM with SDA mechanism      264. See also Card authentication method (CAM)
Off-line static CAM, defined      259
Off-line static CAM, EMV$\texttrademark$ platforms supporting      262
Off-line static CAM, mandatory implementation      264
Off-line static CAM, off-line dynamic CAM vs.      266—267
On-line authorization      45—47
On-line authorization, biased selection function      198
On-line authorization, defined      45
On-line authorization, message verification      46
On-line authorization, risk control      45
On-line authorization, transaction types      46
On-line card authentication      368
On-line clearing      42
On-line clearing, defined      42
On-line clearing, off-line transaction      44
On-line clearing, on-line transaction      42
On-line dynamic CAM      260—261
On-line dynamic CAM for ATM services      261
On-line dynamic CAM for EMV$\texttrademark$ debit/credit application      263
On-line dynamic CAM, defined      259—260
On-line dynamic CAM, implementation      260
On-line dynamic CAM, necessary condition for      261. See also Card authentication method (CAM)
On-line PIN processing      194—195
On-line PIN processing, PIN pad malfunctioning      194
On-line PIN processing, terminal      194—195. See also Cardholder verification
one-time passwords      396—397
Operational costs, reduced      255
Organization, this book      3—6
Output feedback chaining mode (OFB)      401
PANData template      351 352
Partial name selection      103—106
Partial name selection, mechanism      105
Partial name selection, optional support of      103
Passwords, one-time      396—397
Payment authorization      328—331
Payment authorization, AuthReq      328—329
Payment authorization, AuthRes      329—331
Payment authorization, defined      323. See also SET
Payment capture      331—332
Payment capture, CapReq      331
Payment capture, CapRes      332
Payment capture, defined      323—324
Payment capture, merchant initiation      331. See also SET
Payment card processing      9—50
Payment card processing, authorization message      13
Payment card processing, network and back-office view      12
Payment card processing, overview      10—13
Payment card processing, payment message      12
Payment card processing, roles      13—15
Payment card processing, user view      11
Payment cards, brands      15—16
Payment cards, counterfeiting      31—33
Payment cards, credit      16—17
Payment cards, data storage types      17—18
Payment cards, debit      16—17
Payment cards, defined      15
Payment cards, embossed financial data      18—20
Payment cards, magnetic stripe      20—24
Payment instruments, credit      3
Payment instruments, debit      3
Payment instruments, implementation dependence      1
Payment instruments, mobility      6
Payment instruments, prepaid      2
Payment message      12
Payment system environment (PSE)      112—115
Payment system environment (PSE), building candidate list from      118—119
Payment system environment (PSE), content      112
Payment system environment (PSE), data elements      113—114
Payment system environment (PSE), defined      112
Payment system environment (PSE), directory structure      114 115
Payment system environment (PSE), mapped onto DF      112
Payment, A2C      1
Payment, B2C      1
Payment, C2C      1
Payment, interoperable application      80—90
Payment, P2P      1
Payment, proprietary application      69—80
Payment, remote      2 291—356
Payment, SET      291—292
Payment, TLS-based      291—292
Person-to-person (P2P) payment      1
Personalization stage in enciphered PIN verification      192
Personalization stage, off-line DDA      166
Personalization stage, off-line SDA      162
Physical layer protocol (layer 1)      65
PIN, asymmetric enciphered, verification      390
PIN, control parameters field (PINPARAM)      30
PIN, eavesdropping of      26
PIN, encrypted      36
PIN, entry, bypassing      187
PIN, image stored value      28 29 36 47
PIN, image verification      36
PIN, off-line processing      186—191
PIN, off-line verification      227
PIN, on-line processing      194—195
PIN, pad malfunctioning      187 194
PIN, plaintext, verification      388—389
PIN, RSA digital envelope for      191—194
PIN, symmetric enciphered, verification      389
PIN, try limit exceeded      276
PIN, verification      28 29
PInitReq      324 346—347
PInitRes      324—325 346—347
PKCS#1      414—416
PKCS#1, data formatting      414
PKCS#1, decryption-key unwrapping      416
PKCS#1, encryption-key wrapping      415—416
PKCS#1, signature generation      414—415
PKCS#1, signature verification      415
Plaintext PIN verification      268 388—389
Point of sale (POS) terminals      2
Point of service with acquirer network connection      36
Point of service, data elements featuring      35
Point of service, processing at      34—37
Point of service, risk management      35 37
Point of service, terminal      66
Point of service, verifications      34
Post-issuance commands      225
PReq      325—327 350 351
pres      327—328
Primary account number (PAN)      14
Primary account number (PAN) on track 1      20
Primary account number (PAN) on track 3      22
Private keys, ICC      248
Processing Options Data Object List (PDOL)      102
Processing Options Data Object List (PDOL), EMV$\texttrademark$ debit/credit      153—154
Processing Options Data Object List (PDOL), included in FCI      256
Processing Options Data Object List (PDOL), not included in FCI      256
Processing Options Data Object List (PDOL), processing error      275
1 2 3 4 5
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå