Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Payment Card Processing
Figure 2.1: Payment card processing things one can see.
Figure 2.2: Network and back-office processing of payment card transactions.
Figure 2.3: Roles involved in payment card processing.
Figure 2.4: Payment network topology.
Figure 2.5: On-line transaction in a dual message network with on-line clearing.
Figure 2.6: On-line transaction in a dual message network with off-line clearing.
Figure 2.7: On-line transaction in a single message network.
Figure 2.8: Off-line transaction in a single message network with on-line clearing.
Figure 2.9: Off-line transaction in a dual message network with off-line clearing.
Chapter 3: Chip Migration
Figure 3.1: Hardware structure of the single-chip computer in the card.
Figure 3.2: Two software architectures for chip cards.
Figure 3.3: The organization of the card's file system.
Figure 3.4: Four types of elementary file data structures.
Figure 3.5: Command/ response pair (C-APDU/ R-APDU).
Figure 3.6: Terminal application and card application in a client server configuration.
Figure 3.7: Mapping of data objects into the card's file system.
Figure 3.8: Computation of the dynamic authenticator.
Figure 3.9: Verification of the dynamic authenticator.
Figure 3.10: EMV
mapping of data objects in elementary files.
Figure 3.11: File system in an EMV
card.
Figure 3.12: Variable command data input with DOL mechanism.
Chapter 4: EMV
Compliant Data Organization
Figure 4.1: The EMV
protocol stack and its mapping to
EMV 2000
.
Figure 4.2: Recursive representation of constructed data objects.
Figure 4.3: FCI of an ADF.
Figure 4.4: Example of a PDOL encoding.
Figure 4.5: Partial name selection mechanism.
Figure 4.6: Example of an AEF Data Template in a directory file.
Figure 4.7: FCI of a DDF.
Figure 4.8: Directory structure and indirect application selection service.
Figure 4.9: FCI of the PSE.
Chapter 5: EMV
Certificates
Figure 5.1: EMV
certification chain.
Chapter 6: Debit and Credit with EMV
Figure 6.1: Interchange between the ICC and the terminal for an EMV
debit/credit transaction.
Figure 6.2: Payment network processing of an EMV
debit/credit transaction.
Figure 6.3: Initiate application processing.
Figure 6.4: Read application data.
Figure 6.5: Overview of the off-line SDA.
Figure 6.6: Overview of the off-line DDA.
Figure 6.7: Overview of the enciphered PIN verification performed by ICC.
Figure 6.8: Biased selection function for on-line authorization.
Chapter 7: EMV
Chip Migration Issues
Figure 7.1: Definition of the issuer ICC specification.
Figure 7.2: Allocation tables for card applications.
Figure 7.3: Card layout with EMV
debit/credit and other functionality.
Figure 7.4: Card file structure corresponding to the proposed layout.
Figure 7.5: CRM system from the input/output perspective.
Chapter 8: Remote Card Payments and EMV
Figure 8.1: Payment card processing in remote transactions.
Figure 8.2: Internet protocol suite.
Figure 8.3: Overview of the TLS handshake protocol.
Figure 8.4: SET model for remote card payments.
Figure 8.5: SET certification hierarchy.
Figure 8.6: Establishment of a SET channel.
Figure 8.7: Remote transaction with SET payment method.
Figure 8.8: SET functional components .
Figure 8.9: Wallet server in remote payment card processing.
Figure 8.10: SET transaction flow in the thin client architecture.
Figure 8.11: Transaction flow of the chip electronic commerce.
Appendix A: Security Framework
Figure A.1: Definition of a security framework.
Appendix B: Generic Security Threats
Figure B.1: Communication channel wiretapping.
Appendix C: Security Services
Figure C.1: Generic communication protocol stack.
Appendix D: Security Mechanisms
Figure D.1: Unified model for symmetric and asymmetric encryption systems.
Figure D.2: Secret key wrapping.
Figure D.3: Data authentication using a MAC.
Figure D.4: Ordinary signing protocol.
Figure D.5: PIN encrypted with a public key cryptosystem.
Appendix G: E-Commerce and M-Commerce Related Technologies
Figure G.1: Payment card processing in remote transactions.
Figure G.2: Browsing/ ordering channel over the Internet.
Figure G.3: Browsing/ ordering WAP channel over the GSM network.
Previous page
Table of content
Next page
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Cristian Radu
BUY ON AMAZON
Qshell for iSeries
Running Qshell
Parameters and Variables, Defined
Grep
Writing Programs for Qshell
Appendix B Qshell versus DOS
The .NET Developers Guide to Directory Services Programming
Summary
Binary Data Conversion
Syntactic versus Semantic Conversion
Summary
Managing Passwords for ADAM Users
Oracle Developer Forms Techniques
Populating a PL/SQL Table from a Block
Summary
Preventing Validation of WHEN-VALIDATE-ITEM for Control Items During Query Time
Creating a Tree Item
Basing a Block on a Stored Procedure Involving Object Tables
Java for RPG Programmers, 2nd Edition
The World Of Java
Structured Operations And Statements
An Object Orientation
Threads
More Java
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Six Things Managers Must Do: How to Support Lean Six Sigma
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Forms
Modern Controls
Design-Time Support for Custom Controls
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies