|
|
Àâòîðèçàöèÿ |
|
|
Ïîèñê ïî óêàçàòåëÿì |
|
|
|
|
|
|
|
|
|
|
Radu Ch. — Implementing Electronic Card Payment Systems |
|
|
Ïðåäìåòíûé óêàçàòåëü |
Processing Options Data Object List (PDOL), tag-length identifier 265
Processing Options Data Object List (PDOL), terminal checking 255
Processing restrictions 174—178 271—273
Processing restrictions, Application Effective Date 178 272—273
Processing restrictions, Application Expiration Date 178 272—273
Processing restrictions, Application Usage Control 175—178 271—272
Processing restrictions, Application Version Number 174—175 272.
Proprietary payment application 69—80
Proprietary payment application, encoding elements with fixed format 71—72
Proprietary payment application, fixed file system organization 73
Proprietary payment application, information data elements 70
Proprietary payment application, overview 69—70
Proprietary payment application, post C-APDU processing 77
Proprietary payment application, preestablished command/response formats 73—75
Proprietary payment application, symmetric cryptographic technology 76—80
Proprietary payment application, transaction profile 74. See also ICCs
Proprietary-defined data objects 249—253
Public key certificates 125—140 384—387
Public key certificates for RSA scheme 126—127
Public key certificates, data items included in 132—135
Public key certificates, defined 125
Public key certificates, digital signature scheme 132
Public key certificates, Entity Public Key 129 130
Public key certificates, expiration date 385
Public key certificates, format 385
Public key certificates, generation 135—136 385—386
Public key certificates, ICC 248
Public key certificates, ICC requirement 128—129
Public key certificates, issuer requirement 127—128
Public key certificates, issuing 132—136
Public key certificates, public key authenticity 384
Public key certificates, serial number 385
Public key certificates, SET 312—313
Public key certificates, verification 136—140 386—387
Public key certificates, verifier 136 138.
Public keys, authenticity verification 168—170 384
Public keys, CA 129 131
Public keys, creation 407
Purchase initialization 346—347
Purchase processing 324—328
Purchase processing, defined 323
Purchase processing, PInitReq 324
Purchase processing, PInitRes 324—325
Purchase processing, PReq 325—327
Purchase processing, PRes 327—328. See also SET
Purchase request and response 350—353
Random transaction selection 196—199
Random transaction selection, biased 198—199
Random transaction selection, fine-tuned decision 197
Random-access memory (RAM) 57
Read application data 156—158
Read application data, AFL processing 156—158
Read application data, consistency rules 158—160
Read application data, defined 156
Read application data, illustrated 157. See also EMV debit/credit
READ RECORD command 253
Read-only memory (ROM) 57 58
Remote card payment security 295—306
Remote card payment security for the Internet Protocol 305
Remote card payment security, application layer protocols 306
Remote card payment security, communication channel threats 296—299
Remote card payment security, services 300—304
Remote card payment security, services realization 304—306
Remote card payment security, threats 296—300
Remote card payment security, transport layer protocols 305—306
Remote card payments 291—356
Remote card payments for chip e-commerce 340—356
Remote card payments, access devices for 421—426
Remote card payments, browsing/ordering phase 294 423—425
Remote card payments, model 293—295
Remote card payments, payment phase 294—295
Remote card payments, processing 422
Remote card payments, SET 291—292 310—332
Remote card payments, TLS-based 291—292 306—310
Remote card payments, wallet servers in 337
Remote transactions, security services for 300—304
Remote transactions, SET payment overview 322—324
Response application protocol data unit (R-APDU) 66 67
RIPEMD algorithm 378
Roles in payment card processing 13—15
Roles, acquirer 15
Roles, card acceptor 14—15
Roles, card association 15
Roles, cardholder 14
Roles, defined 13
Roles, issuer 14
Roles, settlement institution 15
RSA, digital envelope for PIN 191—194
RSA, public key certificates 126—127
RSA, public key creation 407
RSA, public operations 409—410
RSA, secret operations 409—410
SDA, MAC-based 392
SDA, off-line 162—165
SDA, processing error 275
SDA, signature-based 393. See also Security mechanisms
Secret key wrapping 376
Secure Hash Algorithm 378
Secure messaging for confidentiality 367
Secure Socket Layer (SSL) 5 6 26
Security 24—34
Security application module (SAM) 76
Security application module (SAM) as issuer's remote agent 78
Security application module (SAM), dynamic authenticator verification 79
Security application module (SAM), support of 78
Security framework 359—361
Security framework, cryptographic primitives 360—361
Security framework, illustrated 359
Security framework, interface decomposition 359
Security framework, security mechanisms 360
Security framework, security services 360
Security framework, threat analysis 360
Security mechanisms 360 373—397
Security mechanisms, cardholder verification mechanisms 387—392
Security mechanisms, cryptographic hash functions 376—380
Security mechanisms, DDA mechanisms 394—397
Security mechanisms, digital signature schemes 380
Security mechanisms, encryption 373—376
Security mechanisms, MDC 377—379
Security mechanisms, public key certificates 384—387
Security mechanisms, SDA mechanisms 392—393. See also Security; Security framework
security policies 201—203
Security policies, acquirer 203
Security policies, issuer 202
Security politics 233—236
Security politics in policy determination 234. See also EMV regulatory framework
Security politics, defined 233
Security Services 300—304 367—371
Security services in security framework 360
Security services with secure channel 370
Security services with secure communications over insecure channel 370—371
Security services, access control 369
Security services, anonymity 300—302
Security services, authenticode 302
Security services, cardholder non-repudiation 303—304 369
Security services, confidentiality 301 367
Security services, data authentication 301—302 369
Security services, entity authentication (ES) 302—303 367—368
Security services, realization 304—306 370—371
Security services, tamper resistance 369
Security services, timeliness 369. See also Remote card payment security
Security, application layer protocols 306
Security, CAM 263—267
Security, improved 254—255
Security, IP 305
Security, protection, in transaction profile 76
Security, remote card payment 295—306
Security, SET vs. TLS 332—333
Security, terminal cost and 80
Security, threats 296—300
| Security, track 3 parameters 23—24
Security, transport layer (TLS) 26 305—306
Select command 104—106 119 120 121
Set 6
SET, acceptability 333—335
SET, authentic and/or confidential channel 317—319
SET, certification authority 313—315
SET, channel establishment 319
SET, competitiveness 336
SET, data authentication 320
SET, digital certificates 311
SET, dual signatures 321—322
SET, entity authentication 320
SET, functional components 335
SET, infrastructure 6
SET, installing, registering, running 334
SET, model 311
SET, model illustration 312
SET, non-repudiation 321
SET, payment authorization 323 328—331
SET, payment capture 323—324 331—332
SET, payment method 322—332
SET, payment scheme setup 311—315
SET, payments 291—292
SET, public key certificates 312—313
SET, purchase processing 323 324—328
SET, registration of participants 315—316
SET, remote transaction overview 322—324
SET, secure, channel 317—321
SET, security 332—333
SET, security comparison 333
SET, thin client architecture 338—340
SET, TLS vs. 336—340. See also Remote card payments
Settlement, defined 49
Settlement, institution 15
Settlement, organizations 49
SHA-1 algorithm 378
Sharable data objects 250—251
Sharable data objects, defined 250
Sharable data objects, mapping 251. See also Data objects
Short message service (SMS) 420 421
Signature generation with digital signature with recovery 411—412
Signature generation with PKCS#1 414—415
Signature verification with digital signature with recovery 412—413
Signature verification with PKCS#1 415
Signature-based SDA mechanism 393
Signed static application data 140—145
Signed static application data, AFL 141—142
Signed static application data, defined 125
Signed static application data, generating 143—144
Signed static application data, issuing 140—144
Signed static application data, static data creation 142—143
Signed static application data, verification 144—145. See also EMV certificates
Signing procedure 381
Single message network 44
sniffing 296—297
Static authenticator 30—31
Static card authentication 368
Static data authentication 89
Subscriber Identity Module (SIM) 420
Subscriber Identity Module (SIM), Application Toolkit (STK) 420 421
Subscriber Identity Module (SIM), defined 420
Subsidiary account numbers (SANs) 22
Symmetric enciphered PIN verification 389
symmetric encryption 374—375
symmetric key cryptography 76—80
System trace audit number (STAN) 35
Tag-length-value (TLV) See BER-TLV encoding
Tamper resistance 369
Terminal action analysis 201—217
Terminal action analysis, action codes 201—203
Terminal action analysis, Application Cryptogram computation 208—217
Terminal action analysis, default action in transaction 207—208
Terminal action analysis, off-line denial 204—206
Terminal action analysis, on-line transmission 206—207
Terminal action analysis, security policies 23
Terminal action analysis, terminal proposes/card disposes 203—204. See also EMV™ debit/credit
Terminal risk management 195—201
Terminal risk management, defined 195
Terminal risk management, random transaction selection 196—199
Terminal risk management, terminal floor limit 195—196
Terminal risk management, velocity checking 199—201. See also EMV debit/credit
Terminal Type data object 265
Terminal Verification Results (TVR) 150
Terminal Verification Results (TVR), bytes 152
Terminal Verification Results (TVR), defined 152
Terminals at point of service 233
Terminals in EMV debit/credit transaction 149—150 159
Terminals, "on-line only" 160
Terminals, action analysis 349—350
Terminals, action codes 203
Terminals, authentication 368
Terminals, CAD 66
Terminals, common processing performed by 184—186
Terminals, display 75
Terminals, floor limit 195—196
Terminals, ICC interaction 66—67
Terminals, indirect application selection service implementation 118
Terminals, list of supported applications in 117
Terminals, minimal requirements 231—232
Terminals, processing for EMV transaction 196
Terminals, processing for static data 142—143
Terminals, tag-length identifiers (TL) 87
Thin client architecture 338—340
Thin client architecture, defined 338
Thin client architecture, elements 338
Thin client architecture, illustrated 339
Thin client architecture, password mechanism 340
Thin client architecture, traffic flow 339. See also SET
threats 24—34 363—366
Threats, analysis 360
Threats, card counterfeiting 31—33
Threats, cardholder access device 299—300
Threats, colluding attacks 33—34
Threats, communication channel 296—299
threats, data modification 297—298 365
Threats, denial-of-service attack 299 365
Threats, eavesdropping 25—27
Threats, generic 363—366
Threats, impersonation 27—29 298—299
Threats, interception 364
Threats, merchant access device 300
Threats, merchant attacks 33—34
Threats, physical penetration 365—366
Threats, remote card payment 296—300
Threats, sniffing 296—297
Threats, time coordinate 365
Threats, wiretapping 363—364. See also Security
timeliness 369
TLS-based method 291—292
TLS-based method, acceptability 333—335
TLS-based method, competitiveness 336
TLS-based method, confidential channel 310
TLS-based method, handshake protocol 307—308
TLS-based method, record protocol 309
TLS-based method, security comparison 332—333
TLS-based method, security limitations 309—310
TLS-based method, SET vs. 332—340
TLS-based method, uses 310. See also Remote card payments
Track 1 20—21
Track 2 22
Track 3 22—24
Track 3, counterfeiting protection 32
Track 3, defined 22
Track 3, dynamic field updating 24
Track 3, financial parameters 23
Track 3, PAN 22
Track 3, SANs 22
Track 3, security parameters 23—24. See also Magnetic stripes
Transaction Log 196
|
|
|
Ðåêëàìà |
|
|
|