search for books and compare prices
Tables of Contents for Electronic Payment Systems
Chapter/Section Title
Page #
Page Count
Preface
xi
 
Chapter 1 Motivation for electronic payment
1
4
References
3
2
Chapter 2 Characteristics of current payment systems
5
14
2.1 Cash payments
6
1
2.2 Payment through banks
7
4
2.2.1 Payment by check
7
2
2.2.2 Payment by giro or credit transfer
9
1
2.2.3 Automated clearing house (ACH) payments
10
1
2.2.4 Wire transfer services
10
1
2.3 Using payment cards
11
2
2.4 Consumer preferences in payment systems
13
1
2.5 Regulatory framework
14
2
References
16
3
Chapter 3 Crytographic techniques
19
42
3.1 Encryption and decryption
20
1
3.2 Symmetric encryption
21
7
3.2.1 Data Encryption Standard (DES)
22
3
3.2.2 Triple DES
25
1
3.2.3 IDEA
25
2
3.2.4 RC2, RC4, and RC5
27
1
3.3 Message digesting or hashing
28
2
3.3.1 MD5
29
1
3.3.2 The Secure Hash Algorithm (SHA)
29
1
3.4 Kerberos
30
3
3.4.1 Overview of Kerberos model
30
2
3.4.2 Obtaining a ticket
32
1
3.4.3 Service request
32
1
3.5 Asymmetric or public-key encryption
33
2
3.5.1 Properties of a public-key cryptosystem
33
1
3.5.2 One-way functions
34
1
3.5.3 Using public-key cryptosystems for authentication
35
1
3.6 Digital signatures and enveloping
35
1
3.7 RSA
36
2
3.8 Public-key management
38
2
3.8.1 Certificates
38
1
3.8.2 Certification authorities
39
1
3.9 Transport of security information
40
7
3.9.1 Abstract syntax notation (ASN.1)
41
2
3.9.2 The X.509 directory authentication framework
43
2
3.9.3 PKCS cryptographic message syntax
45
2
3.10 Dual signatures
47
1
3.11 Nonces
48
1
3.12 Blind signatures
48
3
3.13 Chip cards/smart cards
51
6
3.13.1 Card types
51
2
3.13.2 Memory types and capacity
53
2
3.13.3 Physical specifications
55
1
3.13.4 Security
55
1
3.13.5 Public-key processing capabilities
56
1
3.13.6 Multiservice capability
56
1
3.13.7 Observers
56
1
References
57
4
Chapter 4 Credit card-based systems
61
64
4.1 Mail order/telephone order (MOTO) transactions
63
1
4.2 Unsecured network payments
64
1
4.3 First Virtual
65
2
4.4 Collect all relevant information (CARI)
67
4
4.4.1 Virtual credit cards
68
1
4.4.2 Setting up a virtual credit card
68
2
4.4.3 Independent CARI systems
70
1
4.4.4 A virtual credit card purchase
70
1
4.5 The secure socket layer (SSL)
71
6
4.6 CyberCash
77
5
4.6.1 CyberCash wallet
78
1
4.6.2 CyberCash persona
79
1
4.6.3 A CyberCash purchase
79
2
4.6.4 CyberCash messages
81
1
4.6.5 Binding credit cards
82
1
4.6.6 Software updates
82
1
4.7 i-Key protocol (iKP)
82
11
4.7.1 Framework of iKP protocols
84
1
4.7.2 IKP
85
5
4.7.3 2KP
90
2
4.7.4 3KP
92
1
4.8 Secure electronic payment protocol (SEPP)
93
8
4.8.1 System architecture
94
1
4.8.2 Certificate management system
95
1
4.8.3 SEPP keys used
96
1
4.8.4 Overview of payment process
96
1
4.8.5 Purchase order with inline authorization
97
1
4.8.6 Purchase order with delayed authorization
98
1
4.8.7 Offline purchase order
99
1
4.8.8 Capture
99
1
4.8.9 Security requirements
100
1
4.9 Secure Electronic Transactions (SET)
101
21
4.9.1 The SET trust model
103
3
4.9.2 SET message structure
106
1
4.9.3 Payment initialization (PInitReq/PInitRes)
107
1
4.9.4 Purchase order (PReq/PRes)
108
5
4.9.5 Authorization (AuthReq/AuthRes)
113
1
4.9.6 Capture of payment (CapReq/CapRes)
114
2
4.9.7 Cardholder inquiry (InqReq/InqRes)
116
4
4.9.8 Developing SET applications
120
1
4.9.9 Evolution of the SET standard
121
1
4.10 Summary
122
1
References
122
3
Chapter 5 Electronic checks
125
20
5.1 FSTC electronic check project
126
6
5.1.1 Electronic check concept
126
2
5.1.2 Electronic check functional flows
128
2
5.1.3 Check-handling infrastructure
130
2
5.2 NetBill
132
7
5.2.1 Protocol overview
133
2
5.2.2 Authentication procedure
135
1
5.2.3 Transaction protocol
136
1
5.2.4 Price request phase
136
1
5.2.5 Goods delivery phase
137
1
5.2.6 Payment phase
137
2
5.2.7 NetBill characteristics
139
1
5.3 NetCheque
139
3
5.4 Summary
142
1
References
142
3
Chapter 6 Electronic cash payment systems
145
46
6.1 Ecash (DigiCash)
146
12
6.1.1 The Ecash model
146
1
6.1.2 Ecash coins
147
1
6.1.3 Coin keys
148
1
6.1.4 Double-spending prevention
149
1
6.1.5 Withdrawing coins
150
2
6.1.6 An Ecash purchase
152
1
6.1.7 Making the payment
153
1
6.1.8 Proving payment
153
1
6.1.9 Payment deposit
154
1
6.1.10 Integration with the Web
154
1
6.1.11 Ecash in the mail
155
1
6.1.12 Transferring Ecash
155
1
6.1.13 Lost coins
156
1
6.1.14 Ecash and crime
157
1
6.1.15 Developing Ecash applications
157
1
6.1.16 Magic money
158
1
6.1.17 Remarks
158
1
6.2 Project CAFE
158
10
6.2.1 Goals of CAFE
159
1
6.2.2 Architecture
160
1
6.2.3 CAFE devices
160
1
6.2.4 Role of observers
161
1
6.2.5 Protocol overview
162
1
6.2.6 Offline coins
162
1
6.2.7 The XXX protocol
163
4
6.2.8 The XXX protocol
167
1
6.2.9 Additional features
167
1
6.2.10 Remarks
167
1
6.3 NetCash
168
13
6.3.1 Framework/model
168
1
6.3.2 NetCash coins
169
1
6.3.3 Double-spending prevention
170
1
6.3.4 Coin transfer
171
1
6.3.5 Certificate of insurance
171
1
6.3.6 Basic purchase
172
1
6.3.7 Obtaining coins
173
1
6.3.8 Paying a merchant
174
1
6.3.9 Verifying coins
175
1
6.3.10 Providing limited anonymity
175
1
6.3.11 Merchant anonymity
176
1
6.3.12 Preventing anonymity
177
1
6.3.13 Clearing
177
1
6.3.14 Extensions
178
1
6.3.15 Preventing merchant fraud
178
2
6.3.16 Offline protocols
180
1
6.3.17 Remarks
181
1
6.4 CyberCoin
181
2
6.5 Mondex
183
2
6.6 EMV cash cards
185
1
6.7 Remarks
186
1
References
187
4
Chapter 7 Micropayment systems
191
48
7.1 Millicent
192
16
7.1.1 The Millicent model
193
2
7.1.2 Purchasing with Millicent
195
2
7.1.3 Scrip
197
1
7.1.4 Scrip structure
197
1
7.1.5 Scrip certificate generation
198
1
7.1.6 Scrip validation
199
1
7.1.7 Preventing double spending
199
1
7.1.8 Computation costs
199
3
7.1.9 Sending scrip over a network: The Millicent protocols
202
1
7.1.10 Scrip in the clear
202
1
7.1.11 Encrypted network connection
202
2
7.1.12 Request signatures
204
2
7.1.13 Performance
206
1
7.1.14 Millicent with the Web
207
1
7.1.15 Extensions
207
1
7.1.16 Summary
208
1
7.2 SubScrip
208
5
7.2.1 Basic SubScrip
208
1
7.2.2 Establishing a temporary account
209
1
7.2.3 Providing anonymity
209
1
7.2.4 A SubScrip ticket
210
1
7.2.5 A SubScrip purchase
210
1
7.2.6 Security and privacy
211
1
7.2.7 Protected SubScrip
211
1
7.2.8 Refunding SubScrip
212
1
7.2.9 Lost tickets
212
1
7.3 PayWord
213
8
7.3.1 PayWord user certificates
214
1
7.3.2 Revoked certificates
215
1
7.3.3 PayWord chains
215
1
7.3.4 Commitment to a PayWord chain
216
1
7.3.5 Spending PayWords
217
1
7.3.6 Variable-size payments
218
1
7.3.7 Redeeming spent PayWords
219
1
7.3.8 Computational costs
219
1
7.3.9 Extensions
220
1
7.3.10 Remarks
220
1
7.4 iKP micropayment protocol
221
7
7.4.1 XXX-3KP protocol
221
2
7.4.2 Repeated micropayments
223
3
7.4.3 Nonrepeated micropayments
226
1
7.4.4 Remarks
227
1
7.5 MicroMint
228
8
7.5.1 The MicroMint model
228
1
7.5.2 MicroMint coins
229
1
7.5.3 Verifying a coin
230
1
7.5.4 Minting coins
230
1
7.5.5 Computational costs
231
1
7.5.6 Multiple coins per bin
232
1
7.5.7 Coin validity criterion
232
1
7.5.8 Preventing forgery
233
1
7.5.9 A MicroMint purchase
234
1
7.5.10 Double spending
235
1
7.5.11 Extensions
235
1
7.6 Micropayments summary and analysis
236
2
References
238
1
Chapter 8 Payment systems--Prospects for the future
239
4
References
241
2
About the Authors
243
2
Index
245