Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Payment Card Processing
Figure 2.1: Payment card processing things one can see.
Figure 2.2: Network and back-office processing of payment card transactions.
Figure 2.3: Roles involved in payment card processing.
Figure 2.4: Payment network topology.
Figure 2.5: On-line transaction in a dual message network with on-line clearing.
Figure 2.6: On-line transaction in a dual message network with off-line clearing.
Figure 2.7: On-line transaction in a single message network.
Figure 2.8: Off-line transaction in a single message network with on-line clearing.
Figure 2.9: Off-line transaction in a dual message network with off-line clearing.
Chapter 3: Chip Migration
Figure 3.1: Hardware structure of the single-chip computer in the card.
Figure 3.2: Two software architectures for chip cards.
Figure 3.3: The organization of the card's file system.
Figure 3.4: Four types of elementary file data structures.
Figure 3.5: Command/ response pair (C-APDU/ R-APDU).
Figure 3.6: Terminal application and card application in a client server configuration.
Figure 3.7: Mapping of data objects into the card's file system.
Figure 3.8: Computation of the dynamic authenticator.
Figure 3.9: Verification of the dynamic authenticator.
Figure 3.10: EMV
mapping of data objects in elementary files.
Figure 3.11: File system in an EMV
card.
Figure 3.12: Variable command data input with DOL mechanism.
Chapter 4: EMV
Compliant Data Organization
Figure 4.1: The EMV
protocol stack and its mapping to
EMV 2000
.
Figure 4.2: Recursive representation of constructed data objects.
Figure 4.3: FCI of an ADF.
Figure 4.4: Example of a PDOL encoding.
Figure 4.5: Partial name selection mechanism.
Figure 4.6: Example of an AEF Data Template in a directory file.
Figure 4.7: FCI of a DDF.
Figure 4.8: Directory structure and indirect application selection service.
Figure 4.9: FCI of the PSE.
Chapter 5: EMV
Certificates
Figure 5.1: EMV
certification chain.
Chapter 6: Debit and Credit with EMV
Figure 6.1: Interchange between the ICC and the terminal for an EMV
debit/credit transaction.
Figure 6.2: Payment network processing of an EMV
debit/credit transaction.
Figure 6.3: Initiate application processing.
Figure 6.4: Read application data.
Figure 6.5: Overview of the off-line SDA.
Figure 6.6: Overview of the off-line DDA.
Figure 6.7: Overview of the enciphered PIN verification performed by ICC.
Figure 6.8: Biased selection function for on-line authorization.
Chapter 7: EMV
Chip Migration Issues
Figure 7.1: Definition of the issuer ICC specification.
Figure 7.2: Allocation tables for card applications.
Figure 7.3: Card layout with EMV
debit/credit and other functionality.
Figure 7.4: Card file structure corresponding to the proposed layout.
Figure 7.5: CRM system from the input/output perspective.
Chapter 8: Remote Card Payments and EMV
Figure 8.1: Payment card processing in remote transactions.
Figure 8.2: Internet protocol suite.
Figure 8.3: Overview of the TLS handshake protocol.
Figure 8.4: SET model for remote card payments.
Figure 8.5: SET certification hierarchy.
Figure 8.6: Establishment of a SET channel.
Figure 8.7: Remote transaction with SET payment method.
Figure 8.8: SET functional components .
Figure 8.9: Wallet server in remote payment card processing.
Figure 8.10: SET transaction flow in the thin client architecture.
Figure 8.11: Transaction flow of the chip electronic commerce.
Appendix A: Security Framework
Figure A.1: Definition of a security framework.
Appendix B: Generic Security Threats
Figure B.1: Communication channel wiretapping.
Appendix C: Security Services
Figure C.1: Generic communication protocol stack.
Appendix D: Security Mechanisms
Figure D.1: Unified model for symmetric and asymmetric encryption systems.
Figure D.2: Secret key wrapping.
Figure D.3: Data authentication using a MAC.
Figure D.4: Ordinary signing protocol.
Figure D.5: PIN encrypted with a public key cryptosystem.
Appendix G: E-Commerce and M-Commerce Related Technologies
Figure G.1: Payment card processing in remote transactions.
Figure G.2: Browsing/ ordering channel over the Internet.
Figure G.3: Browsing/ ordering WAP channel over the GSM network.
Previous page
Table of content
Next page
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Named Instance of SQL Server or Microsoft Data Engine (MSDE)
Creating Custom Columns in a Windows Forms DataGrid
Binding a Windows DataGrid to Master-Detail Data
Canceling an Asynchronous Query
Reading and Writing Binary Data with Oracle
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
ERP System Acquisition: A Process Model and Results From an Austrian Survey
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Distributed Data Warehouse for Geo-spatial Services
Development of Interactive Web Sites to Enhance Police/Community Relations
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Assessing Business-IT Alignment Maturity
Managing IT Functions
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Metrics and Models in Software Quality Engineering (2nd Edition)
Reliability and Predictive Validity
Cyclomatic Complexity
The Preparation Phase
Establishing the Alignment Principle
Statistical Process Control in Software Development
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Wrapping Lines in a Text File
Overloading the Increment and Decrement Operators
Making Member Functions Exception-Safe
Transforming an XML Document with XSLT
Writing an Operator That Isnt a Member Function
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Initial Setup and System Maintenance
IP Multicast
Defining an Authentication Server
Monitoring and Troubleshooting the Security Contexts
Configuring Basic AIP-SSM Settings
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies