Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Radu Ch. — Implementing Electronic Card Payment Systems
Radu Ch. — Implementing Electronic Card Payment Systems



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Implementing Electronic Card Payment Systems

Àâòîð: Radu Ch.

Àííîòàöèÿ:

Radu, an electrical engineer who works as a consultant for payment systems and telecom operations in Belgium, has written a thorough description of EMV chip card technology. Following a description of chip migration with EMV and its use for debit and credit cards, Radu details the processing of such cards, including remote card payments, with attention to various formats. A lengthy section of appendices details the technology's security framework, threats, services, mechanisms, and risk management.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2003

Êîëè÷åñòâî ñòðàíèö: 464

Äîáàâëåíà â êàòàëîã: 20.08.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
Processing Options Data Object List (PDOL), tag-length identifier      265
Processing Options Data Object List (PDOL), terminal checking      255
Processing restrictions      174—178 271—273
Processing restrictions, Application Effective Date      178 272—273
Processing restrictions, Application Expiration Date      178 272—273
Processing restrictions, Application Usage Control      175—178 271—272
Processing restrictions, Application Version Number      174—175 272.
Proprietary payment application      69—80
Proprietary payment application, encoding elements with fixed format      71—72
Proprietary payment application, fixed file system organization      73
Proprietary payment application, information data elements      70
Proprietary payment application, overview      69—70
Proprietary payment application, post C-APDU processing      77
Proprietary payment application, preestablished command/response formats      73—75
Proprietary payment application, symmetric cryptographic technology      76—80
Proprietary payment application, transaction profile      74. See also ICCs
Proprietary-defined data objects      249—253
Public key certificates      125—140 384—387
Public key certificates for RSA scheme      126—127
Public key certificates, data items included in      132—135
Public key certificates, defined      125
Public key certificates, digital signature scheme      132
Public key certificates, Entity Public Key      129 130
Public key certificates, expiration date      385
Public key certificates, format      385
Public key certificates, generation      135—136 385—386
Public key certificates, ICC      248
Public key certificates, ICC requirement      128—129
Public key certificates, issuer requirement      127—128
Public key certificates, issuing      132—136
Public key certificates, public key authenticity      384
Public key certificates, serial number      385
Public key certificates, SET      312—313
Public key certificates, verification      136—140 386—387
Public key certificates, verifier      136 138.
Public keys, authenticity verification      168—170 384
Public keys, CA      129 131
Public keys, creation      407
Purchase initialization      346—347
Purchase processing      324—328
Purchase processing, defined      323
Purchase processing, PInitReq      324
Purchase processing, PInitRes      324—325
Purchase processing, PReq      325—327
Purchase processing, PRes      327—328. See also SET
Purchase request and response      350—353
Random transaction selection      196—199
Random transaction selection, biased      198—199
Random transaction selection, fine-tuned decision      197
Random-access memory (RAM)      57
Read application data      156—158
Read application data, AFL processing      156—158
Read application data, consistency rules      158—160
Read application data, defined      156
Read application data, illustrated      157. See also EMV$\texttrademark$ debit/credit
READ RECORD command      253
Read-only memory (ROM)      57 58
Remote card payment security      295—306
Remote card payment security for the Internet Protocol      305
Remote card payment security, application layer protocols      306
Remote card payment security, communication channel threats      296—299
Remote card payment security, services      300—304
Remote card payment security, services realization      304—306
Remote card payment security, threats      296—300
Remote card payment security, transport layer protocols      305—306
Remote card payments      291—356
Remote card payments for chip e-commerce      340—356
Remote card payments, access devices for      421—426
Remote card payments, browsing/ordering phase      294 423—425
Remote card payments, model      293—295
Remote card payments, payment phase      294—295
Remote card payments, processing      422
Remote card payments, SET      291—292 310—332
Remote card payments, TLS-based      291—292 306—310
Remote card payments, wallet servers in      337
Remote transactions, security services for      300—304
Remote transactions, SET payment overview      322—324
Response application protocol data unit (R-APDU)      66 67
RIPEMD algorithm      378
Roles in payment card processing      13—15
Roles, acquirer      15
Roles, card acceptor      14—15
Roles, card association      15
Roles, cardholder      14
Roles, defined      13
Roles, issuer      14
Roles, settlement institution      15
RSA, digital envelope for PIN      191—194
RSA, public key certificates      126—127
RSA, public key creation      407
RSA, public operations      409—410
RSA, secret operations      409—410
SDA, MAC-based      392
SDA, off-line      162—165
SDA, processing error      275
SDA, signature-based      393. See also Security mechanisms
Secret key wrapping      376
Secure Hash Algorithm      378
Secure messaging for confidentiality      367
Secure Socket Layer (SSL)      5 6 26
Security      24—34
Security application module (SAM)      76
Security application module (SAM) as issuer's remote agent      78
Security application module (SAM), dynamic authenticator verification      79
Security application module (SAM), support of      78
Security framework      359—361
Security framework, cryptographic primitives      360—361
Security framework, illustrated      359
Security framework, interface decomposition      359
Security framework, security mechanisms      360
Security framework, security services      360
Security framework, threat analysis      360
Security mechanisms      360 373—397
Security mechanisms, cardholder verification mechanisms      387—392
Security mechanisms, cryptographic hash functions      376—380
Security mechanisms, DDA mechanisms      394—397
Security mechanisms, digital signature schemes      380
Security mechanisms, encryption      373—376
Security mechanisms, MDC      377—379
Security mechanisms, public key certificates      384—387
Security mechanisms, SDA mechanisms      392—393. See also Security; Security framework
security policies      201—203
Security policies, acquirer      203
Security policies, issuer      202
Security politics      233—236
Security politics in policy determination      234. See also EMV$\texttrademark$ regulatory framework
Security politics, defined      233
Security Services      300—304 367—371
Security services in security framework      360
Security services with secure channel      370
Security services with secure communications over insecure channel      370—371
Security services, access control      369
Security services, anonymity      300—302
Security services, authenticode      302
Security services, cardholder non-repudiation      303—304 369
Security services, confidentiality      301 367
Security services, data authentication      301—302 369
Security services, entity authentication (ES)      302—303 367—368
Security services, realization      304—306 370—371
Security services, tamper resistance      369
Security services, timeliness      369. See also Remote card payment security
Security, application layer protocols      306
Security, CAM      263—267
Security, improved      254—255
Security, IP      305
Security, protection, in transaction profile      76
Security, remote card payment      295—306
Security, SET vs. TLS      332—333
Security, terminal cost and      80
Security, threats      296—300
Security, track 3 parameters      23—24
Security, transport layer (TLS)      26 305—306
Select command      104—106 119 120 121
Set      6
SET, acceptability      333—335
SET, authentic and/or confidential channel      317—319
SET, certification authority      313—315
SET, channel establishment      319
SET, competitiveness      336
SET, data authentication      320
SET, digital certificates      311
SET, dual signatures      321—322
SET, entity authentication      320
SET, functional components      335
SET, infrastructure      6
SET, installing, registering, running      334
SET, model      311
SET, model illustration      312
SET, non-repudiation      321
SET, payment authorization      323 328—331
SET, payment capture      323—324 331—332
SET, payment method      322—332
SET, payment scheme setup      311—315
SET, payments      291—292
SET, public key certificates      312—313
SET, purchase processing      323 324—328
SET, registration of participants      315—316
SET, remote transaction overview      322—324
SET, secure, channel      317—321
SET, security      332—333
SET, security comparison      333
SET, thin client architecture      338—340
SET, TLS vs.      336—340. See also Remote card payments
Settlement, defined      49
Settlement, institution      15
Settlement, organizations      49
SHA-1 algorithm      378
Sharable data objects      250—251
Sharable data objects, defined      250
Sharable data objects, mapping      251. See also Data objects
Short message service (SMS)      420 421
Signature generation with digital signature with recovery      411—412
Signature generation with PKCS#1      414—415
Signature verification with digital signature with recovery      412—413
Signature verification with PKCS#1      415
Signature-based SDA mechanism      393
Signed static application data      140—145
Signed static application data, AFL      141—142
Signed static application data, defined      125
Signed static application data, generating      143—144
Signed static application data, issuing      140—144
Signed static application data, static data creation      142—143
Signed static application data, verification      144—145. See also EMV$\texttrademark$ certificates
Signing procedure      381
Single message network      44
sniffing      296—297
Static authenticator      30—31
Static card authentication      368
Static data authentication      89
Subscriber Identity Module (SIM)      420
Subscriber Identity Module (SIM), Application Toolkit (STK)      420 421
Subscriber Identity Module (SIM), defined      420
Subsidiary account numbers (SANs)      22
Symmetric enciphered PIN verification      389
symmetric encryption      374—375
symmetric key cryptography      76—80
System trace audit number (STAN)      35
Tag-length-value (TLV)      See BER-TLV encoding
Tamper resistance      369
Terminal action analysis      201—217
Terminal action analysis, action codes      201—203
Terminal action analysis, Application Cryptogram computation      208—217
Terminal action analysis, default action in transaction      207—208
Terminal action analysis, off-line denial      204—206
Terminal action analysis, on-line transmission      206—207
Terminal action analysis, security policies      23
Terminal action analysis, terminal proposes/card disposes      203—204. See also EMV™ debit/credit
Terminal risk management      195—201
Terminal risk management, defined      195
Terminal risk management, random transaction selection      196—199
Terminal risk management, terminal floor limit      195—196
Terminal risk management, velocity checking      199—201. See also EMV$\texttrademark$ debit/credit
Terminal Type data object      265
Terminal Verification Results (TVR)      150
Terminal Verification Results (TVR), bytes      152
Terminal Verification Results (TVR), defined      152
Terminals at point of service      233
Terminals in EMV$\texttrademark$ debit/credit transaction      149—150 159
Terminals, "on-line only"      160
Terminals, action analysis      349—350
Terminals, action codes      203
Terminals, authentication      368
Terminals, CAD      66
Terminals, common processing performed by      184—186
Terminals, display      75
Terminals, floor limit      195—196
Terminals, ICC interaction      66—67
Terminals, indirect application selection service implementation      118
Terminals, list of supported applications in      117
Terminals, minimal requirements      231—232
Terminals, processing for EMV$\texttrademark$ transaction      196
Terminals, processing for static data      142—143
Terminals, tag-length identifiers (TL)      87
Thin client architecture      338—340
Thin client architecture, defined      338
Thin client architecture, elements      338
Thin client architecture, illustrated      339
Thin client architecture, password mechanism      340
Thin client architecture, traffic flow      339. See also SET
threats      24—34 363—366
Threats, analysis      360
Threats, card counterfeiting      31—33
Threats, cardholder access device      299—300
Threats, colluding attacks      33—34
Threats, communication channel      296—299
threats, data modification      297—298 365
Threats, denial-of-service attack      299 365
Threats, eavesdropping      25—27
Threats, generic      363—366
Threats, impersonation      27—29 298—299
Threats, interception      364
Threats, merchant access device      300
Threats, merchant attacks      33—34
Threats, physical penetration      365—366
Threats, remote card payment      296—300
Threats, sniffing      296—297
Threats, time coordinate      365
Threats, wiretapping      363—364. See also Security
timeliness      369
TLS-based method      291—292
TLS-based method, acceptability      333—335
TLS-based method, competitiveness      336
TLS-based method, confidential channel      310
TLS-based method, handshake protocol      307—308
TLS-based method, record protocol      309
TLS-based method, security comparison      332—333
TLS-based method, security limitations      309—310
TLS-based method, SET vs.      332—340
TLS-based method, uses      310. See also Remote card payments
Track 1      20—21
Track 2      22
Track 3      22—24
Track 3, counterfeiting protection      32
Track 3, defined      22
Track 3, dynamic field updating      24
Track 3, financial parameters      23
Track 3, PAN      22
Track 3, SANs      22
Track 3, security parameters      23—24. See also Magnetic stripes
Transaction Log      196
1 2 3 4 5
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå