Skip to:Content
|
Bottom
Cover image for Electronic payment systems for e-commerce
Title:
Electronic payment systems for e-commerce
Personal Author:
Series:
Artech House computer security series
Edition:
2nd ed.
Publication Information:
London : Artech House, c2001
ISBN:
9781580532686
General Note:
Rev. ed. of: Electronic payment systems, c1997.

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004826719 HG1710 O45 2001 Open Access Book Book
Searching...

On Order

Summary

Summary

Generally society has been moving towards electronic payment systems since the 1970s, but it is only the arrival of the Internet and its vertiginous growth, that has made possible the recent advances in this area.


Author Notes

Donal O’Mahony holds a Ph.D. in computer science from Trinity College.

Dr. O'Mahony is a lecturer in computer science at Trinity College in Dublin, Ireland, and the head of a research group specializing in networking, telecommunications, and data security. He also has consulted extensively for private industry and government.

050


Table of Contents

Prefacep. xiii
1 Motivation for electronic paymentp. 1
Referencesp. 4
2 Characteristics of current payment systemsp. 5
2.1 Cash paymentsp. 6
2.2 Payment through banksp. 7
2.2.1 Payment by checkp. 7
2.2.2 Payment by giro or credit transferp. 9
2.2.3 Automated clearing house (ACH) paymentsp. 9
2.2.4 Wire transfer servicesp. 11
2.3 Using payment cardsp. 12
2.4 Consumer preferences in payment systemsp. 14
2.5 Regulatory frameworkp. 15
Referencesp. 17
3 Cryptographic techniquesp. 19
3.1 Encryption and decryptionp. 20
3.2 Symmetric encryptionp. 21
3.2.1 Data Encryption Standard (DES)p. 22
3.2.2 Triple DESp. 26
3.2.3 IDEAp. 26
3.2.4 Advanced Encryption Standard (AES)p. 28
3.2.5 RC2, RC4, and RC5p. 30
3.3 Message digesting or hashingp. 33
3.3.1 MD5p. 34
3.3.2 The Secure Hash Algorithm (SHA)p. 34
3.4 Kerberosp. 35
3.4.1 Overview of the Kerberos modelp. 35
3.4.2 Obtaining a ticketp. 37
3.4.3 Service requestp. 38
3.5 Asymmetric or public-key encryptionp. 38
3.5.1 Properties of a public-key cryptosystemp. 39
3.5.2 Trapdoor one-way functionsp. 40
3.5.3 Using public-key cryptosystems for authenticationp. 40
3.6 Digital signatures and envelopingp. 40
3.7 RSAp. 42
3.8 Elliptic curve cryptographyp. 44
3.9 Public-key infrastructure (PKI)p. 45
3.9.1 Certificatesp. 45
3.9.2 Certification authoritiesp. 46
3.9.3 Attribute certificatesp. 47
3.10 Transport of security informationp. 48
3.10.1 Abstract syntax notation (ASN.1)p. 49
3.10.2 The X.509 directory authentication frameworkp. 51
3.10.3 PKCS cryptographic message syntaxp. 53
3.11 Dual signaturesp. 54
3.12 Noncesp. 56
3.13 Blind signaturesp. 57
3.14 Chip cards/smart cardsp. 59
3.14.1 Card typesp. 60
3.14.2 Memory types and capacityp. 61
3.14.3 Physical specificationsp. 63
3.14.4 Securityp. 63
3.14.5 Public-key processing capabilitiesp. 64
3.14.6 Multiapplication cardsp. 65
3.14.7 Java Cardp. 65
3.14.8 Multosp. 67
3.14.9 Observersp. 68
Referencesp. 69
4 Credit card-based systemsp. 73
4.1 Mail order/telephone order (MOTO) transactionsp. 76
4.2 Unsecured network paymentsp. 76
4.3 First Virtualp. 77
4.4 Once-off credit card numbersp. 80
4.5 The secure socket layer (SSL)p. 82
4.6 i-Key protocol (iKP)p. 89
4.6.1 Framework of iKP protocolsp. 90
4.6.2 1KPp. 91
4.6.3 2KPp. 96
4.6.4 3KPp. 98
4.7 Secure Electronic Transactions (SET)p. 100
4.7.1 The SET trust modelp. 102
4.7.2 SET message structurep. 105
4.7.3 Payment initialization (PInitReq/PInitRes)p. 106
4.7.4 Purchase order (PReq/PRes)p. 107
4.7.5 Authorization (AuthReq/AuthRes)p. 112
4.7.6 Capture of payment (CapReq/CapRes)p. 114
4.7.7 Cardholder inquiry (InqReq/InqRes)p. 115
4.7.8 SET software componentsp. 120
4.7.9 SET market acceptancep. 120
4.7.10 Server-side walletsp. 122
4.7.11 Using SET with smart cardsp. 123
4.8 Summaryp. 123
Referencesp. 125
5 Electronic checks and account transfersp. 127
5.1 Payment transfer between centralized accountsp. 128
5.1.1 Funding the accountp. 130
5.1.2 Authenticated account transferp. 134
5.1.3 Withdrawing funds from the systemp. 137
5.1.4 Business modelsp. 137
5.2 FSTC payment initiativesp. 138
5.2.1 Electronic check conceptp. 139
5.2.2 Financial Services Markup Language (FSML)p. 141
5.2.3 Electronic check functional flowsp. 144
5.2.4 Check-handling infrastructurep. 146
5.2.5 Bank Internet Payment System (BIPS)p. 148
5.2.6 Financial Agent Secure Transaction (FAST)p. 151
5.3 NACHA Internet paymentsp. 153
5.3.1 Internet Secure ATM Payments (ISAP)p. 153
5.3.2 DirectPayp. 155
5.4 NetBillp. 156
5.4.1 Protocol overviewp. 157
5.4.2 Authentication procedurep. 159
5.4.3 Transaction protocolp. 160
5.4.4 Price request phasep. 161
5.4.5 Goods delivery phasep. 161
5.4.6 Payment phasep. 162
5.4.7 NetBill characteristicsp. 163
5.5 NetChequep. 164
5.6 Summaryp. 167
Referencesp. 167
6 Electronic cash payment systemsp. 171
6.1 Ecashp. 172
6.1.1 The Ecash modelp. 173
6.1.2 Ecash coinsp. 174
6.1.3 Coin keysp. 174
6.1.4 Double-spending preventionp. 177
6.1.5 Withdrawing coinsp. 178
6.1.6 An Ecash purchasep. 180
6.1.7 Making the paymentp. 180
6.1.8 Proving paymentp. 181
6.1.9 Payment depositp. 182
6.1.10 Integration with the Webp. 182
6.1.11 Ecash in the mailp. 183
6.1.12 Transferring Ecashp. 183
6.1.13 Lost coinsp. 184
6.1.14 Ecash and crimep. 184
6.1.15 Magic Moneyp. 186
6.1.16 Remarksp. 186
6.2 Project CAFEp. 186
6.2.1 Goals of CAFEp. 187
6.2.2 Architecturep. 188
6.2.3 CAFE devicesp. 189
6.2.4 Role of observersp. 190
6.2.5 Protocol overviewp. 190
6.2.6 Off-line coinsp. 191
6.2.7 The [alpha] protocolp. 192
6.2.8 The [Gamma] protocolp. 195
6.2.9 Additional featuresp. 196
6.2.10 Remarksp. 196
6.3 NetCashp. 196
6.3.1 Framework/modelp. 197
6.3.2 NetCash coinsp. 198
6.3.3 Double-spending preventionp. 199
6.3.4 Coin transferp. 200
6.3.5 Certificate of insurancep. 200
6.3.6 Basic purchasep. 201
6.3.7 Obtaining coinsp. 201
6.3.8 Paying a merchantp. 203
6.3.9 Verifying coinsp. 204
6.3.10 Providing limited anonymityp. 204
6.3.11 Merchant anonymityp. 205
6.3.12 Preventing anonymityp. 206
6.3.13 Clearingp. 206
6.3.14 Extensionsp. 207
6.3.15 Preventing merchant fraudp. 207
6.3.16 Off-line protocolsp. 209
6.3.17 Remarksp. 210
6.4 Mondexp. 210
6.5 EMV cash cards and CEPSp. 213
6.5.1 EMV2000p. 214
6.5.2 Common Electronic Purse Specification (CEPS)p. 214
6.5.3 Remarksp. 220
6.6 SmartAxisp. 220
6.7 Remarksp. 222
Referencesp. 223
7 Micropayment systemsp. 227
7.1 Millicentp. 228
7.1.1 The Millicent modelp. 229
7.1.2 Purchasing with Millicentp. 231
7.1.3 Scripp. 233
7.1.4 Scrip structurep. 234
7.1.5 Scrip certificate generationp. 235
7.1.6 Scrip validationp. 235
7.1.7 Preventing double spendingp. 237
7.1.8 Computation costsp. 237
7.1.9 Sending scrip over a network: the Millicent protocolsp. 237
7.1.10 Scrip in the clearp. 237
7.1.11 Encrypted network connectionp. 237
7.1.12 Request signaturesp. 241
7.1.13 Performancep. 243
7.1.14 Millicent with the Webp. 243
7.1.15 Extensionsp. 244
7.1.16 Summaryp. 245
7.2 SubScripp. 245
7.2.1 Basic SubScripp. 246
7.2.2 Establishing a temporary accountp. 246
7.2.3 Providing anonymityp. 247
7.2.4 A SubScrip ticketp. 247
7.2.5 A SubScrip purchasep. 248
7.2.6 Security and privacyp. 248
7.2.7 Protected SubScripp. 249
7.2.8 Refunding SubScripp. 250
7.2.9 Lost ticketsp. 250
7.3 PayWordp. 250
7.3.1 PayWord user certificatesp. 251
7.3.2 Revoked certificatesp. 253
7.3.3 PayWord chainsp. 253
7.3.4 Commitment to a PayWord chainp. 254
7.3.5 Spending PayWordsp. 255
7.3.6 Variable-size paymentsp. 256
7.3.7 Redeeming spent PayWordsp. 257
7.3.8 Computational costsp. 257
7.3.9 Extensionsp. 258
7.3.10 Remarksp. 258
7.4 iKP micropayment protocolp. 259
7.4.1 [mu]-3KP protocolp. 260
7.4.2 Repeated micropaymentsp. 261
7.4.3 Nonrepeated micropaymentsp. 264
7.4.4 Remarksp. 266
7.5 Hash chain treesp. 266
7.5.1 PayTreep. 268
7.5.2 Unbalanced One-way Binary Tree (UOBT)p. 270
7.6 MicroMintp. 273
7.6.1 The MicroMint modelp. 274
7.6.2 MicroMint coinsp. 274
7.6.3 Verifying a coinp. 275
7.6.4 Minting coinsp. 276
7.6.5 Computational costsp. 277
7.6.6 Multiple coins per binp. 278
7.6.7 Coin validity criterionp. 278
7.6.8 Preventing forgeryp. 279
7.6.9 A MicroMint purchasep. 280
7.6.10 Double spendingp. 280
7.6.11 Extensionsp. 281
7.7 Probability-based micropaymentsp. 283
7.7.1 Bets using coin flipsp. 284
7.7.2 Hash chain lottery ticketsp. 286
7.8 Jaldap. 288
7.9 NewGenPay/IBM Micropaymentsp. 292
7.10 Banner advertising as a form of micropaymentp. 296
7.11 Micropayments summary and analysisp. 297
Referencesp. 300
8 Mobile commercep. 303
8.1 Mobile Internet architecturesp. 305
8.1.1 Carrying Internet data on cellular networksp. 305
8.1.2 The wireless application protocol (WAP)p. 306
8.1.3 Japan's iMode servicep. 307
8.2 Industry consortiap. 308
8.3 Mobile network operator as bankerp. 308
8.4 Third-party account-based mobile payment systemsp. 309
8.4.1 Sonera MobilePayp. 310
8.4.2 Payboxp. 311
8.4.3 GiSMop. 313
8.4.4 The Fundamo architecturep. 315
8.5 Credit card-based systemsp. 316
8.5.1 Mobile SETp. 317
8.5.2 Remarksp. 320
8.6 Summaryp. 321
Referencesp. 322
9 Payment systems: prospects for the futurep. 325
About the authorsp. 329
Indexp. 331
Go to:Top of Page