Preface |
|
xv | |
Section I: Payment Cards And Protocols |
|
1 | (72) |
|
1 Overview of Card Payments Industry |
|
|
3 | (10) |
|
|
3 | (3) |
|
|
6 | (3) |
|
1.3 Three-party and Four-party Schemes |
|
|
9 | (1) |
|
1.4 Payment Online and at the Store |
|
|
10 | (3) |
|
2 Payment Flow and Basics of Technology |
|
|
13 | (36) |
|
|
14 | (1) |
|
|
15 | (2) |
|
2.3 Card Types and Products |
|
|
17 | (2) |
|
|
19 | (6) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
2.5 Card Verification Values |
|
|
25 | (5) |
|
2.5.1 CVV Calculation Algorithm |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
2.6 Overview of Card-Present Technology |
|
|
30 | (1) |
|
2.7 Cardholder Verification Methods |
|
|
31 | (3) |
|
2.7.1 Strong Customer Authentication |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
2.8.2 Storing Encrypted PIN |
|
|
35 | (1) |
|
2.8.3 Relying on PIN Verification Value (PVV) |
|
|
35 | (1) |
|
|
35 | (4) |
|
2.9.1 Retail Transactions |
|
|
36 | (2) |
|
2.9.2 Cash Withdrawals and Deposits |
|
|
38 | (1) |
|
2.9.3 Payment Transactions |
|
|
38 | (1) |
|
2.10 Point-of-Sale Types, Conditions and Entry Modes |
|
|
39 | (7) |
|
2.10.1 Data Transfer Methods |
|
|
40 | (1) |
|
|
40 | (5) |
|
2.10.2.1 Terminal Capabilities and Conditions |
|
|
41 | (4) |
|
2.10.3 Terminal Certification Process |
|
|
45 | (1) |
|
2.11 Card-Not-Present Point-of-Sale Types, Conditions and Entry Modes |
|
|
46 | (3) |
|
3 Payment Services and Protocols |
|
|
49 | (24) |
|
|
49 | (2) |
|
3.2 Authorization Service Messages |
|
|
51 | (1) |
|
3.3 ISO 8583 Message Structure |
|
|
51 | (19) |
|
|
52 | (1) |
|
3.3.2 Message Type Indicator |
|
|
52 | (3) |
|
|
55 | (1) |
|
|
56 | (14) |
|
3.4 Other Card Scheme Services |
|
|
70 | (3) |
Section II: Card-Not-Present Environment |
|
73 | (22) |
|
4 Card-Not-Present Environment |
|
|
75 | (20) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (4) |
|
|
77 | (1) |
|
4.3.2 Participation Check |
|
|
78 | (1) |
|
4.3.3 Payer Authentication |
|
|
79 | (1) |
|
4.3.4 Payer Authentication |
|
|
79 | (1) |
|
4.3.5 3D Secure Adoption and Challenges |
|
|
80 | (1) |
|
4.4 3D Secure 2.0 (EMV 3D Secure) |
|
|
80 | (7) |
|
4.4.1 Major Changes in 3D Secure 2.0 |
|
|
81 | (1) |
|
4.4.2 3D Secure 2.0 Actors and Messages |
|
|
81 | (2) |
|
|
83 | (2) |
|
|
85 | (1) |
|
4.4.5 Merchant-initiated Transaction (3RI) |
|
|
86 | (1) |
|
4.4.6 EMV 3-D Secure Security |
|
|
87 | (1) |
|
4.5 Address Verification Service (AVS) |
|
|
87 | (1) |
|
|
88 | (9) |
|
4.6.1 Processor Tokenization |
|
|
89 | (3) |
|
4.6.2 Revocation of Authorization and Account Updater Services |
|
|
92 | (1) |
|
4.6.3 Payment Network Tokenization (EMV Tokenization) |
|
|
92 | (1) |
|
4.6.4 Payment Network Tokenization in Mobile Payments |
|
|
93 | (2) |
Section III: Card-Present Environment |
|
95 | (74) |
|
5 Contact Chip Transactions |
|
|
97 | (54) |
|
|
99 | (4) |
|
|
99 | (1) |
|
5.1.2 "ICC" vs. "EMV card" |
|
|
99 | (1) |
|
5.1.3 ICC Architecture Overview |
|
|
100 | (1) |
|
5.1.4 Card-Terminal Interaction |
|
|
101 | (2) |
|
5.2 ICC Architecture Details |
|
|
103 | (4) |
|
5.2.1 Chip and Antenna Hardware |
|
|
103 | (1) |
|
|
104 | (3) |
|
5.2.2.1 Dedicated Files and AID |
|
|
104 | (2) |
|
|
106 | (1) |
|
5.3 Flow of a Chip Transaction |
|
|
107 | (44) |
|
|
107 | (1) |
|
|
108 | (4) |
|
|
108 | (1) |
|
5.3.2.2 Command and Response |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (2) |
|
5.3.4 Terminal Verification Results (TVR) and Transaction Status Information (TSI) |
|
|
114 | (1) |
|
5.3.5 Application Selection |
|
|
115 | (3) |
|
5.3.5.1 Indirect Application Selection |
|
|
116 | (1) |
|
5.3.5.2 Direct Application Selection |
|
|
116 | (1) |
|
|
117 | (1) |
|
5.3.5.4 File Control Information (FCI) |
|
|
117 | (1) |
|
5.3.6 Initiate Processing |
|
|
118 | (2) |
|
5.3.6.1 Application Interchange Profile |
|
|
118 | (1) |
|
5.3.6.2 Application File Locator |
|
|
118 | (2) |
|
5.3.7 Read Application Data |
|
|
120 | (1) |
|
5.3.8 Offline Card Authentication |
|
|
120 | (10) |
|
5.3.8.1 Common Steps of Offline Authentication |
|
|
121 | (1) |
|
5.3.8.2 Key Chain of Trust |
|
|
122 | (2) |
|
5.3.8.3 Public Key Recovery |
|
|
124 | (2) |
|
5.3.8.4 Signed Data Validation |
|
|
126 | (1) |
|
5.3.8.5 Static Data Authentication (SDA) |
|
|
127 | (1) |
|
5.3.8.6 Dynamic Data Authentication (DDA) |
|
|
127 | (2) |
|
5.3.8.7 Combined Data Authentication (CDA) |
|
|
129 | (1) |
|
5.3.9 Processing Restrictions |
|
|
130 | (1) |
|
5.3.9.1 Application Version Number |
|
|
130 | (1) |
|
5.3.9.2 Application Usage Control |
|
|
130 | (1) |
|
5.3.9.3 Application Effective and Expiration Date |
|
|
130 | (1) |
|
5.3.10 Cardholder Verification |
|
|
131 | (7) |
|
|
131 | (1) |
|
5.3.10.2 Cardholder Verification Rules |
|
|
131 | (2) |
|
|
133 | (1) |
|
5.3.10.4 Example of a CVM List |
|
|
133 | (2) |
|
5.3.10.5 Offline PIN Verification |
|
|
135 | (3) |
|
5.3.10.6 Online PIN Verification |
|
|
138 | (1) |
|
5.3.11 Terminal Risk Management |
|
|
138 | (3) |
|
5.3.11.1 Offline Authorization and Terminal Risk Management |
|
|
138 | (1) |
|
|
139 | (1) |
|
5.3.11.3 Random Transaction Selection |
|
|
139 | (1) |
|
5.3.11.4 Velocity Checking |
|
|
140 | (1) |
|
5.3.12 Terminal Action Analysis |
|
|
141 | (1) |
|
5.3.13 Generation of Cryptograms and Issuer Authentication |
|
|
142 | (6) |
|
5.3.13.1 Card Action Analysis |
|
|
143 | (1) |
|
5.3.13.2 Generate AC (GAC) Command |
|
|
144 | (4) |
|
|
148 | (1) |
|
5.3.15 Transaction Completion |
|
|
149 | (2) |
|
6 EMV Contactless Transactions |
|
|
151 | (18) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
155 | (1) |
|
6.3.2 Protocol Activation |
|
|
155 | (1) |
|
6.3.3 Combination Selection |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (3) |
|
6.5 Contactless Magstripe |
|
|
159 | (1) |
|
6.6 Cardholder Verification Methods |
|
|
159 | (1) |
|
6.7 Understanding Kernels |
|
|
160 | (11) |
|
|
161 | (1) |
|
6.7.2 Kernel 2-MasterCard |
|
|
161 | (2) |
|
|
163 | (1) |
|
6.7.4 Kernel 4-American Express |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (2) |
Section IV: Other Processes And Standards |
|
169 | (40) |
|
7 Disputes, Arbitration and Compliance |
|
|
171 | (8) |
|
7.1 Dispute Management and Arbitration |
|
|
172 | (5) |
|
7.1.1 Overview of Generic Dispute Lifecycle |
|
|
172 | (1) |
|
7.1.2 Retrieval Requests and Fulfillments |
|
|
173 | (1) |
|
7.1.3 Chargebacks and Representments |
|
|
173 | (2) |
|
|
175 | (1) |
|
7.1.5 Allocation vs. Collaboration |
|
|
175 | (1) |
|
7.1.6 Pre-arbitration and Arbitration |
|
|
175 | (1) |
|
|
176 | (1) |
|
7.1.8 Streamlined Lifecycle |
|
|
176 | (1) |
|
|
177 | (2) |
|
8 Data Security Standards in the Payment Card Industry |
|
|
179 | (26) |
|
8.1 PCI Data Security Standard (PCI DSS) |
|
|
180 | (6) |
|
|
180 | (1) |
|
8.1.2 Levels of Compliance and Assessment Process |
|
|
181 | (1) |
|
8.1.3 Self-Assessment Questionnaires |
|
|
182 | (1) |
|
|
183 | (3) |
|
8.2 PCI Payment Applications Data Security Standard (PCI PA DSS) |
|
|
186 | (4) |
|
8.2.1 PCI PA DSS Requirements |
|
|
186 | (4) |
|
8.3 Key Management with Hardware Security Modules (HSMs) |
|
|
190 | (15) |
|
8.3.1 Hardware Security Modules (HSMs) |
|
|
190 | (1) |
|
8.3.2 HSM Keys and Algorithms |
|
|
191 | (1) |
|
8.3.3 Variants and Key Blocks |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
8.3.6 PIN Security Requirements |
|
|
195 | (6) |
|
8.3.6.1 General Principles |
|
|
195 | (1) |
|
8.3.6.2 PCI PIN Security Requirements and Testing Procedures v3.0 |
|
|
196 | (5) |
|
8.3.7 Key Custodians and Key Ceremony |
|
|
201 | (19) |
|
|
201 | (4) |
|
|
205 | (4) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
Section V: Algorithms And Encodings |
|
209 | (24) |
|
|
211 | (4) |
|
|
211 | (1) |
|
10.2 Longitudinal Redundancy Check (LRC) |
|
|
212 | (1) |
|
10.3 Key Check Value (KCV) |
|
|
213 | (2) |
|
|
215 | (8) |
|
11.1 ANSI/ISO ALPHA Data Format |
|
|
215 | (1) |
|
11.2 ANSI/ISO BCD Data Format |
|
|
215 | (1) |
|
11.3 ASCII Character Encoding Table |
|
|
216 | (1) |
|
11.4 EBCDIC Character Encoding Table |
|
|
217 | (1) |
|
|
218 | (2) |
|
|
220 | (3) |
|
11.6.1 Tag or Type Identifier |
|
|
220 | (1) |
|
|
221 | (2) |
|
|
223 | (6) |
|
|
223 | (2) |
|
12.2 DES and 3-DES Encryption |
|
|
225 | (1) |
|
|
226 | (1) |
|
12.4 Message Authentication Code |
|
|
226 | (1) |
|
12.5 Asymmetric Encryption |
|
|
227 | (2) |
|
13 PIN Block Formats and Algorithms |
|
|
229 | (4) |
|
13.1 EPB (Encrypted PIN Block) Formats |
|
|
229 | (4) |
Index |
|
233 | |