Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Payment Card Processing
Figure 2.1: Payment card processing things one can see.
Figure 2.2: Network and back-office processing of payment card transactions.
Figure 2.3: Roles involved in payment card processing.
Figure 2.4: Payment network topology.
Figure 2.5: On-line transaction in a dual message network with on-line clearing.
Figure 2.6: On-line transaction in a dual message network with off-line clearing.
Figure 2.7: On-line transaction in a single message network.
Figure 2.8: Off-line transaction in a single message network with on-line clearing.
Figure 2.9: Off-line transaction in a dual message network with off-line clearing.
Chapter 3: Chip Migration
Figure 3.1: Hardware structure of the single-chip computer in the card.
Figure 3.2: Two software architectures for chip cards.
Figure 3.3: The organization of the card's file system.
Figure 3.4: Four types of elementary file data structures.
Figure 3.5: Command/ response pair (C-APDU/ R-APDU).
Figure 3.6: Terminal application and card application in a client server configuration.
Figure 3.7: Mapping of data objects into the card's file system.
Figure 3.8: Computation of the dynamic authenticator.
Figure 3.9: Verification of the dynamic authenticator.
Figure 3.10: EMV
mapping of data objects in elementary files.
Figure 3.11: File system in an EMV
card.
Figure 3.12: Variable command data input with DOL mechanism.
Chapter 4: EMV
Compliant Data Organization
Figure 4.1: The EMV
protocol stack and its mapping to
EMV 2000
.
Figure 4.2: Recursive representation of constructed data objects.
Figure 4.3: FCI of an ADF.
Figure 4.4: Example of a PDOL encoding.
Figure 4.5: Partial name selection mechanism.
Figure 4.6: Example of an AEF Data Template in a directory file.
Figure 4.7: FCI of a DDF.
Figure 4.8: Directory structure and indirect application selection service.
Figure 4.9: FCI of the PSE.
Chapter 5: EMV
Certificates
Figure 5.1: EMV
certification chain.
Chapter 6: Debit and Credit with EMV
Figure 6.1: Interchange between the ICC and the terminal for an EMV
debit/credit transaction.
Figure 6.2: Payment network processing of an EMV
debit/credit transaction.
Figure 6.3: Initiate application processing.
Figure 6.4: Read application data.
Figure 6.5: Overview of the off-line SDA.
Figure 6.6: Overview of the off-line DDA.
Figure 6.7: Overview of the enciphered PIN verification performed by ICC.
Figure 6.8: Biased selection function for on-line authorization.
Chapter 7: EMV
Chip Migration Issues
Figure 7.1: Definition of the issuer ICC specification.
Figure 7.2: Allocation tables for card applications.
Figure 7.3: Card layout with EMV
debit/credit and other functionality.
Figure 7.4: Card file structure corresponding to the proposed layout.
Figure 7.5: CRM system from the input/output perspective.
Chapter 8: Remote Card Payments and EMV
Figure 8.1: Payment card processing in remote transactions.
Figure 8.2: Internet protocol suite.
Figure 8.3: Overview of the TLS handshake protocol.
Figure 8.4: SET model for remote card payments.
Figure 8.5: SET certification hierarchy.
Figure 8.6: Establishment of a SET channel.
Figure 8.7: Remote transaction with SET payment method.
Figure 8.8: SET functional components .
Figure 8.9: Wallet server in remote payment card processing.
Figure 8.10: SET transaction flow in the thin client architecture.
Figure 8.11: Transaction flow of the chip electronic commerce.
Appendix A: Security Framework
Figure A.1: Definition of a security framework.
Appendix B: Generic Security Threats
Figure B.1: Communication channel wiretapping.
Appendix C: Security Services
Figure C.1: Generic communication protocol stack.
Appendix D: Security Mechanisms
Figure D.1: Unified model for symmetric and asymmetric encryption systems.
Figure D.2: Secret key wrapping.
Figure D.3: Data authentication using a MAC.
Figure D.4: Ordinary signing protocol.
Figure D.5: PIN encrypted with a public key cryptosystem.
Appendix G: E-Commerce and M-Commerce Related Technologies
Figure G.1: Payment card processing in remote transactions.
Figure G.2: Browsing/ ordering channel over the Internet.
Figure G.3: Browsing/ ordering WAP channel over the GSM network.
Previous page
Table of content
Next page
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Agile Project Management
Champion Technical Excellence
Scope Evolution
Practice: Product, Project, and Team Review and Adaptive Action
The Commitment-Accountability Protocol
SQL Tips & Techniques (Miscellaneous)
Using Keys and Constraints to Maintain Database Integrity
Performing Multiple-table Queries and Creating SQL Data Views
Working with Functions, Parameters, and Data Types
Understanding SQL Subqueries
Working with SQL Database Data Across the Internet
VBScript Programmers Reference
Error Handling and Debugging
The Scripting Runtime Objects
HTML Applications
Appendix B Variable Naming Convention
Appendix H Regular Expressions
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
PSTN Trunk Failover
Considerations When Integrating Cisco CME in H.323 and SIP VoIP Networks
Call Transfer
TAPI and XML Application Architecture
Monitoring Cisco IPC Express
A Practitioners Guide to Software Test Design
Case Studies
Boundary Value Testing
Decision Table Testing
Domain Analysis Testing
Exploratory Testing
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Addressing
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Connections
Domain Name System (DNS)
Windows Internet Name Service (WINS)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies