|
|
Àâòîðèçàöèÿ |
|
|
Ïîèñê ïî óêàçàòåëÿì |
|
|
|
|
|
|
|
|
|
|
Radu Ch. — Implementing Electronic Card Payment Systems |
|
|
Ïðåäìåòíûé óêàçàòåëü |
ICC hardware resources, cost 240. See also ICC architecture
ICC software platform 241—242
ICC software platform, cost 241 242
ICC software platform, Java cards 242. See also ICC architecture
ICCs 9
ICCs, card application 67—68
ICCs, command and response format 65—66
ICCs, computer elements 57—58
ICCs, contacts 58
ICCs, defined 57
ICCs, EEPROM space 261—262
ICCs, EMV 86 99
ICCs, EMV debit/credit transaction 149 150
ICCs, enciphered PIN verification 192
ICCs, file system 60—64
ICCs, functional requirements 238
ICCs, hardware structure 57
ICCs, interoperable payment application 80—90
ICCs, life cycle 61
ICCs, minimal requirements 231
ICCs, multiapplication 242—253
ICCs, operating rules 55
ICCs, PIN encipherment private key 248
ICCs, PIN encipherment public key certificate 135 249
ICCs, proprietary payment application 69—80
ICCs, public key certificate 135 248
ICCs, public key certificate requirement 128—129
ICCs, public key certificate verification 138—140
ICCs, signature generation by 170—172
ICCs, software architectures 59
ICCs, specifications by issuers 236—239
ICCs, technology 56—69
ICCs, terminal application 68
Impersonation 27—29 298—299
Impersonation, cardholder 364
Impersonation, defined 364
Impersonation, issuer 364. See also Communications channel Threats; Threats
Indirect application selection service 110—112
Indirect application selection service, defined 110
Indirect application selection service, directory structure and 110—112
Indirect application selection service, illustrated 113
Indirect application selection service, implementation 118
Interface decomposition 359
INTERNAL AUTHENTICATE command 263
Interoperable payment application 80—90
Interoperable payment application, asymmetric cryptographic support 87—90
Interoperable payment application, BER-TLV encoding 82—84
Interoperable payment application, command/response formats 87
Interoperable payment application, customized file system organization 84—86
Interoperable payment application, overview 80—82
Interoperable payment application, self-determined encoding 82—84
Interoperable payment application, solution 82. See also ICCs
ISO/IEC 7816 standard 54 56
Issuer business case 253—255
Issuer business case, financial service availability 253—254
Issuer business case, operational cost reduction 255
Issuer business case, security improvement 254—255
Issuer in counterfeit transactions 235
Issuer in fraudulent transactions 235—236
Issuer in message flows 41—45
Issuer in signed static application data 140—141
Issuer scripts 222—225
Issuer scripts, post-issuance commands 225
Issuer scripts, templates processing 222—224. See also EMV debit/credit
Issuer, action codes 201—202
Issuer, authentication 221—222 368
Issuer, authentication error 276 283—284
Issuer, business contexts 257—258
Issuer, CVM List criteria 270
Issuer, defined 14
Issuer, fallback requirements 232
Issuer, host (IH) 37
Issuer, ICC specifications 236—239
Issuer, impersonation 364
Issuer, multiapplication ICC restrictions 246
Issuer, node (IN) 37
Issuer, public key 131
Issuer, public key certificate 135
Issuer, public key certificate requirement 127—128
Issuer, public key certificate verification 136—138
Issuer, script processing error 277
Issuer, security policy 202—203
Java cards 242
Java virtual machine (JVM) 59
Key generation 408—409
Lower Consecutive Off-line Limit 199
M-commerce related technologies 419—427
MAC 379—380
MAC with 64 bit-length block cipher 404—405
MAC, data authentication with 379
MAC, DDA 394—395
MAC, defined 379
MAC, primitives 380
MAC, SDA mechanisms 392. See also Cryptographic hash functions; Security mechanisms
Magnetic stripe cards 9 17—24
Magnetic stripe cards, defined 10
Magnetic stripe cards, financial data 20—24
Magnetic stripe cards, processing 11. See also Payment cards
Magnetic stripes 20—24
Magnetic stripes, track 1 20—21
Magnetic stripes, track 2 22
Magnetic stripes, track 3 22—24
Magnetic stripes, tracks 20—24
Manual signature 387
Master file (MF) 60
MD4 378
MD5 378
Memory Management Unit (MMU) 57
Merchants, access device threats 300
Merchants, applications supported by 344
Merchants, attacks 33—34
Merchants, registration 316
Message(s), authorization 13
Message(s), authorization request response 47
Message(s), financial 42
Message(s), flows 41—45
Message(s), format 39
Message(s), payment 12
Message(s), structure 38—41
Message(s), type identifier 39—41
Message(s), verification 46
Mobility payment instruments 6
Multiapplication ICCs 242—253
Multiapplication ICCs, application set definition 243—246
Multiapplication ICCs, card layout definition 246—253
Multiapplication ICCs, implementation 243
MULTOS operating system 59—60
non-repudiation 303—304
Non-repudiation of delivery 369
Non-repudiation of origin 369
Non-repudiation, security service 369
Non-repudiation, SET 321
Off-line card authentication 368
Off-line clearing 42—43
Off-line clearing, off-line transaction 45
Off-line clearing, on-line transaction 43
Off-line data authentication 160—174
Off-line data authentication, DDA 165—174
Off-line data authentication, performance of 161—162
Off-line data authentication, SDA 162—165
Off-line data authentication, selection 160—162
Off-line data authentication, types of 160. See also EMV debit/credit
Off-line DDA 148
Off-line DDA, authenticity verification 168—170
Off-line DDA, conditions for performing 161
Off-line DDA, defined 165
Off-line DDA, illustrated 167
Off-line DDA, overview 166—168
Off-line DDA, personalization stage 166
Off-line DDA, signature generation 170—172
| Off-line DDA, signed dynamic authentication data verification 173—174
Off-line DDA, utilization stage 167—168. See also Dynamic data authentication (DDA); Off-line data authentication
Off-line dynamic CAM 262—263
Off-line dynamic CAM as appropriate security level 266
Off-line dynamic CAM, defined 259
Off-line dynamic CAM, ICC resource requirement and 262
Off-line dynamic CAM, off-line static CAM vs. 266—267. See also Card authentication method (CAM)
Off-line PIN processing 186—191
Off-line PIN processing, support 186—187
Off-line PIN processing, terminal not supporting 187. See also Cardholder verification
Off-line PIN verification 227
Off-line SDA 162—165
Off-line SDA, conditions for performing 162
Off-line SDA, overview illustration 163
Off-line SDA, personalization stage 162
Off-line SDA, stage 1 163—164
Off-line SDA, stage 2 164
Off-line SDA, stage 3 164
Off-line SDA, stage 4 165
Off-line SDA, utilization stage 162. See also Off-line data authentication
Off-line static CAM 261—262
Off-line static CAM with SDA mechanism 264. See also Card authentication method (CAM)
Off-line static CAM, defined 259
Off-line static CAM, EMV platforms supporting 262
Off-line static CAM, mandatory implementation 264
Off-line static CAM, off-line dynamic CAM vs. 266—267
On-line authorization 45—47
On-line authorization, biased selection function 198
On-line authorization, defined 45
On-line authorization, message verification 46
On-line authorization, risk control 45
On-line authorization, transaction types 46
On-line card authentication 368
On-line clearing 42
On-line clearing, defined 42
On-line clearing, off-line transaction 44
On-line clearing, on-line transaction 42
On-line dynamic CAM 260—261
On-line dynamic CAM for ATM services 261
On-line dynamic CAM for EMV debit/credit application 263
On-line dynamic CAM, defined 259—260
On-line dynamic CAM, implementation 260
On-line dynamic CAM, necessary condition for 261. See also Card authentication method (CAM)
On-line PIN processing 194—195
On-line PIN processing, PIN pad malfunctioning 194
On-line PIN processing, terminal 194—195. See also Cardholder verification
one-time passwords 396—397
Operational costs, reduced 255
Organization, this book 3—6
Output feedback chaining mode (OFB) 401
PANData template 351 352
Partial name selection 103—106
Partial name selection, mechanism 105
Partial name selection, optional support of 103
Passwords, one-time 396—397
Payment authorization 328—331
Payment authorization, AuthReq 328—329
Payment authorization, AuthRes 329—331
Payment authorization, defined 323. See also SET
Payment capture 331—332
Payment capture, CapReq 331
Payment capture, CapRes 332
Payment capture, defined 323—324
Payment capture, merchant initiation 331. See also SET
Payment card processing 9—50
Payment card processing, authorization message 13
Payment card processing, network and back-office view 12
Payment card processing, overview 10—13
Payment card processing, payment message 12
Payment card processing, roles 13—15
Payment card processing, user view 11
Payment cards, brands 15—16
Payment cards, counterfeiting 31—33
Payment cards, credit 16—17
Payment cards, data storage types 17—18
Payment cards, debit 16—17
Payment cards, defined 15
Payment cards, embossed financial data 18—20
Payment cards, magnetic stripe 20—24
Payment instruments, credit 3
Payment instruments, debit 3
Payment instruments, implementation dependence 1
Payment instruments, mobility 6
Payment instruments, prepaid 2
Payment message 12
Payment system environment (PSE) 112—115
Payment system environment (PSE), building candidate list from 118—119
Payment system environment (PSE), content 112
Payment system environment (PSE), data elements 113—114
Payment system environment (PSE), defined 112
Payment system environment (PSE), directory structure 114 115
Payment system environment (PSE), mapped onto DF 112
Payment, A2C 1
Payment, B2C 1
Payment, C2C 1
Payment, interoperable application 80—90
Payment, P2P 1
Payment, proprietary application 69—80
Payment, remote 2 291—356
Payment, SET 291—292
Payment, TLS-based 291—292
Person-to-person (P2P) payment 1
Personalization stage in enciphered PIN verification 192
Personalization stage, off-line DDA 166
Personalization stage, off-line SDA 162
Physical layer protocol (layer 1) 65
PIN, asymmetric enciphered, verification 390
PIN, control parameters field (PINPARAM) 30
PIN, eavesdropping of 26
PIN, encrypted 36
PIN, entry, bypassing 187
PIN, image stored value 28 29 36 47
PIN, image verification 36
PIN, off-line processing 186—191
PIN, off-line verification 227
PIN, on-line processing 194—195
PIN, pad malfunctioning 187 194
PIN, plaintext, verification 388—389
PIN, RSA digital envelope for 191—194
PIN, symmetric enciphered, verification 389
PIN, try limit exceeded 276
PIN, verification 28 29
PInitReq 324 346—347
PInitRes 324—325 346—347
PKCS#1 414—416
PKCS#1, data formatting 414
PKCS#1, decryption-key unwrapping 416
PKCS#1, encryption-key wrapping 415—416
PKCS#1, signature generation 414—415
PKCS#1, signature verification 415
Plaintext PIN verification 268 388—389
Point of sale (POS) terminals 2
Point of service with acquirer network connection 36
Point of service, data elements featuring 35
Point of service, processing at 34—37
Point of service, risk management 35 37
Point of service, terminal 66
Point of service, verifications 34
Post-issuance commands 225
PReq 325—327 350 351
pres 327—328
Primary account number (PAN) 14
Primary account number (PAN) on track 1 20
Primary account number (PAN) on track 3 22
Private keys, ICC 248
Processing Options Data Object List (PDOL) 102
Processing Options Data Object List (PDOL), EMV debit/credit 153—154
Processing Options Data Object List (PDOL), included in FCI 256
Processing Options Data Object List (PDOL), not included in FCI 256
Processing Options Data Object List (PDOL), processing error 275
|
|
|
Ðåêëàìà |
|
|
|