SECURE APPLICATION UPDATES ON POINT OF SALE DEVICES
|
|
|
- Chester Newman
- 10 years ago
- Views:
Transcription
1 SECURE APPLICATION UPDATES ON POINT OF SALE DEVICES Manuel Mendonça Faculdade de Ciências da Universidade de Lisboa Bloco C6, Campo Grande, Lisboa - Portugal [email protected] Nuno Ferreira Neves Faculdade de Ciências da Universidade de Lisboa Bloco C6, Campo Grande, Lisboa - Portugal [email protected] Keywords: Abstract: Electronic payment systems, point of sale devices, secure application downloads Currently, a large number of electronic transactions are performed with credit or debit cards at terminals located in merchant stores, such as Point of Sale Devices. The success of this form of payment, however, has an associated cost due to the management and maintenance of the many equipments from different generations and manufacturers. In particular, there is an important cost related to the deployment of new software upgrades for the devices, since in most cases human intervention is required. In this paper we describe a secure solution for this problem, where Point of Sale Devices are able to automatically discover and upload new software updates. 1 INTRODUCTION Even though several electronic payment protocols have been developed for the Internet in the past years (Bellare et al., 2000; Manasse, 1995; Schoenmakers, 1998; MasterCard and Visa Corporations, 1997), currently most of the electronic transactions continue to go through closed banking networks. Several reasons explain the success of these networks, but among them, two are specially important it is relatively easy to obtain a debit or credit card from a financial institution, and there is a large number of terminals, such as Point of Sale (POS) devices or Automated Teller Machines (ATM), where these cards are accepted. At the beginning, when these devices started to be available, they were relatively expensive and had limited capabilities. Basically, they allowed operations like purchase or cash withdraw. However, as the specifications of the equipments employed in a transaction went through a standardization process, many companies began to offer competing terminals at cheaper prices, which resulted in the current situation where most stores have a POS, and ATMs have been widely deployed. Moreover, the type of services provided by these devices has evolved, allowing for instance the payment of electrical or insurance bills, purchase of train or music concert tickets, deposits of checks, or money transfers between accounts. The success of these networks has a cost associated with the management and maintenance of the considerable number of equipments from different generations and manufacturers. In particular, an important cost arises from keeping the software being run in the devices updated. Contrarily to the hardware that once deployed it stays stable for a long period, the Electronic Funds Transfer (EFT) applications can suffer several changes during the lifetime of the devices. Various causes justify the need for software changes, for example, the creation of new services, the year two thousand (potential) bug, or recent events such as the introduction of the euro. Besides these causes for modification, there are always the usual factors related to the maintenance of any software: undetected bugs during the testing phase or security problems. Nowadays, in most countries, software updates continue to be performed manually. Once a new EFT application has been certified by the entity responsible for the network, the Payment Network Operator (PNO), the new version is given to a maintenance company that will be in charge of the rest of the process. This will require a technician to go to the location where the equipment is placed, and then the equipment has to be dismantled so that the chip where the application is stored can be substituted by another. In some occasions, just to save time, it is more cost effective to simply exchange the terminal with a new one.
2 This procedure has many efficiency problems, some of them related to cost and others to time. For example, in Portugal, the POS network contains around devices. If each software update has a fee of 50 euros and takes 20 minutes, then a complete substitution of the network would cost 7 million euros and would take more than 46 thousand person hours. Moreover, from a security point of view, the current procedure is far from the ideal because it requires complete trust on the parties that will do the actual software update and the PNO only controls the operation in a limited way. The specifications related to the Europay, Master Card & Visa (EMV) (Europay, MasterCard and Visa Corporations, 2000) suggest that a POS should have the capability of uploading new versions of the software. However, these specifications do not provide any concrete solution to the problem. Furthermore, currently available solutions are proprietary. During our research, we found two POS manufacturers claiming to support remote software updates. However, when contacted by us, they did not provide any information about their protocols. In this paper we propose a solution for the secure update of EFT applications in POS devices. Since we wanted to build a solution that could be used in a real banking environment, we decided to base our work on the Portuguese banking network, that is called Multibanco. However, since the architecture and protocols are relatively generic, we feel that our ideas can be applied to other networks (possibly with small changes). 2 BACKGROUND: MULTIBANCO PAYMENT NETWORK The Multibanco payment network carries most of the electronic transactions made through POS and ATM in Portugal (European Central Bank, 2001). The architecture of the network is based on a client-server configuration, where on one side resides the POS (or ATM) and on the other a server maintained by the PNO. Currently, more than devices are linked using different network technologies, ranging from public telephone connections with.25 to wireless networks like GSM. The EFT protocol is organized as a requestresponse transaction. The POS always has the initiative of starting the communication by contacting the PNO server, called the Payment System Server (PSS). The message contains several fields, and among them there is the identifier of the selected service. Once the message arrives, the PSS executes the service and then returns a response indicating the success or failure of the operation. A Message Authentication Code (MAC) secures both the request and response against integrity and authenticity attacks. Each POS shares with the PSS a number of symmetric keys that are used to secure the communications. These keys are stored in a secure module of the POS to ensure that they are physically protected from tampering. If the PSS wants to make the POS perform some action, it has first to wait for the contact of the POS. Then, in the response, it can include the code of a transaction that should be executed next. As an example, lets look at a payment transaction with a debit card in a store. The merchant gets the card from the client, and uses the POS reader to input the data saved in the magnetic stripe of the card. This data includes information about the account number and bank of the client. The vendor types the cash amount using the POS keyboard and lets the user insert her Personal Identification Number (PIN). Next, the EFT application executing in the POS constructs a message containing the information related to the transaction: the service code, a sequence number, the device unique identifier, date, amount, client account data, and the PIN encrypted with a key stored in the POS. When a message arrives, the PSS performs several tests to verify the correctness of the received information. For instance, it validates the PIN that was input to make sure that the client is the owner of the card. If the PIN is wrong, the user gets two other tries before the card becomes permanently blocked. On every occasion a test fails, a response is returned to the EFT application indicating the problem. Next, the PSS contacts the client and merchant banks to process the payment. If the client bank authorizes the debit, then the PSS can inform the merchant bank to credit the requested amount on the vendor s account. The banking information about the merchant is known to the PSS because it is associated with the POS unique identifier, which is stored in a PNO database. If all steps are concluded with success, then the PSS can send an OK message to the EFT application. Otherwise, an ERROR message is returned. 3 SECURE APPLICATION UPDATES IN POS The update of an EFT application requires the execution of two main tasks. First, a new version of the software needs to be produced by some manufacturer and certified by the organization supervising the network (the PNO). The certification procedure is an important step because it not only needs to guarantee that the upgrade satisfies the specification, but also has to ensure that all bugs and/or security problems have been removed (at least as many as possible). As we mentioned in the Introduction, several reasons might contribute for the necessity of a new
3 version of the application. The second task comprises all activities related to the upload of the application to the POS. Ideally, the PNO should control this process since, in the end, it is responsible for the good performance of the network. Moreover, the whole procedure should be as automatic as possible because this allows rapid deployment of new services, and potentially reduces costs due to human intervention. Since electronic payment transactions will be executed in the POS, the security of the process is also very important. The proposed update procedure, besides guaranteing the just mentioned objectives, also has some other interesting characteristics such as: it maintains accurate information about the POS and EFT applications currently deployed, which is an attractive feature if one wants to use the system to support managing decisions. 3.1 System Architecture The architecture of the payment system is displayed in Figure 1. It includes both the POS in the merchant store and the PSS located in the PNO. In order to support automatic updates of the EFT applications, the PNO has to offer two interfaces to the outside: one to the Software Manufacturers (SM) and another to the POS. The interface to the SM is provided by a new server, called the Certification System Server (CSS). CSS is in charge of all exchanges with the SM, and in particular coordinates the certification process. Whenever a new application is developed, it should be submitted through the CSS for validation. Then, a number of tests are performed to ensure the quality of the software, and a report is returned. Ideally, the analysis would be done by machines in a controlled testing environment, however, for the time being, one would expect (and accept) some human intervention. The communication between the CSS and the SM needs to be secured to prevent attacks that could try, for instance, to change the software upgrade. At first, one might feel tempted to re-use the PSS as the interface to the POS for the application updates. In practice, this solution has some problems because it takes a reasonable interval of time to download an application (see Section 4), which could degrade significantly the performance of the PSS (do not forget that the main task of the PSS is to accept payment transactions). Therefore, we introduce a new server, called the Application Distribution Server (ADS), that will store the code sent by the CSS and transfer the updates to the POS. The EMV specification for cards with a chip uses asymmetric cryptography to secure the electronic payment transactions (Europay, MasterCard and Visa Corporations, 2000). Therefore, since it is expectable in the near future the replacement of magnetic stripe cards with chip cards, we decided also to use asymmetric cryptography to protect the transactions of the update protocol. The Certification Authority (CA) plays an important role in the security of the whole system because it manages the certificates with the public keys of the various components. The CA has to perform several functions: it needs to reliably authenticate the entities that require the creation of new certificates (as defined by the security policy); it generates the certificate revocation lists (CRL) whenever a certificate needs to be cancelled (e.g., the private key was compromised); and it also carries out other management functions, such as the archival of all generated data. 3.2 Update Protocol The update procedure of the EFT applications is implemented by a set of sub-protocols, each one responsible for a specific task (see Figure 1). Due to space limitations it is not possible to provide all details about the various fields of the messages and their validation process. However, since most messages are protected using the same mechanism, we will give here a generic description (the only exception are the EFT protocol messages that are secured using the standard MAC scheme, as mentioned in Section 2). Whenever a component A sends a message data to a component B, it constructs a message with < data, E(KrA, Hash(data)), CERT KuA >, where E(KrA,Hash(data)) is a signature and means enciphering an hash of the data (Hash(data)) with the private key KrA of A. The message also includes all certificates with the public keys necessary to the validation of the signature, which in this case is CERT KuA. Once a message arrives, the receiver makes the following verifications: CERT KuA is validated using the public key of the CA that is stored in CERT KuCA; the signature is verified by deciphering E(KrA,Hash(data)) with KuA, and comparing the result with the hash of the received data. If they are equal then the message is correct. Certificate Distribution Protocol This protocol distributes the cryptographic keys and certificates produced by the CA. These keys and certificates are used to ensure the authentication and non-repudiation of the information exchanged among the components of the architecture. The CSS, ADS and SM should execute the following actions: Obtain a copy of the certificate with the public key of the CA (CERT KuCA). Generate a pair of asymmetric keys, public and private key, and store them securely ((Ku, Kr) where is either CSS, ADS, or SM).
4 Ask the CA for the creation of a certificate containing the public key (CERT Ku where is either CSS, ADS, or SM). The certificate with the public key of the CA has to be securely distributed through the components of the architecture because all signature validations will depend on the correctness of this key. The creation of a certificate will typically require human intervention due to some authentication/authorization steps. The security policy might impose, for instance, the need for an explicit authorization from the PNO before a request for the creation of a certificate can be made. This type of requirement is interesting because if applied to the SM, it would limit who can produce correctly signed software. POS Set-up Protocol The manufacturer of the POS needs to execute some set-up operations before sending the device to a store. These operations include the installation of the basic run-time software, the bootstrap code and the application loader, and the secure storage of the following keys: A pair of asymmetric keys of the POS (KuPOS, Kr- POS). A copy of the certificate with the public key of the POS (CERT KuPOS). This certificate can be signed with the private key of the SM (instead of the CA). A copy of the certificate with the public key of the manufacturer (CERT KuSM). A copy of the certificate with the public key of the CA (CERT KuCA). Each device has a distinct pair of keys which ensures that a POS compromise will not affect the rest of the network. To reduce the risk of key disclosure, the local copies of the POS private keys should be destroyed by the SM after their storage in the security module. The SM is responsible for the generation of the certificate with the public of the POS. This option is interesting from an economic and efficiency point of view because it is simpler to produce a certificate locally (without the intervention of the CA) with a more relaxed the security policy. However, the validation of a POS signature will require the possession of both certificates of the SM and CA (CERT KuCA verifies CERT KuSM, and CERT KuSM verifies CERT KuPOS). The inclusion of the certificate of the manufacturer is used to restrict who can create new versions of the software a POS will only accept upgrades signed by the same manufacturer. At first, this might look like an unnecessary limitation of the protocol. However, it has important security implications because it prevents certain types of attacks. For example, a bad CSS is unable to substitute a new update with a malicious one, signed by a friendly (and also malicious) SM. Application Transfer Protocol This protocol defines how new versions of the EFT applications and certification reports are exchanged between the SMs and the CSS. Whenever a new upgrade is produced, the SM sends a signed copy of the code to the CSS for approval. Then, the code goes through a testing phase to guarantee that it works as expected. Next, the CSS returns a signed report to the SM stating if the new version of the software was accepted or not by the certification tests (in the last case it also includes a list with a description of the failed tests). From a security perspective, the certification procedure is particularly important because it can constrain the type of attacks that can be executed by an adversary SM. Basically, with an exhaustive set of tests, one can prevent bad software from being inserted in some POS of the network. If the CSS is controlled by an adversary, even if momentarily, she (or he) will not be able to produce correctly signed applications, at most she could try to substitute the upgrade with a previous one (do not forget that a POS only accepts updates from the its own manufacturer). However, since we associate an increasing version number to each upgrade, it is possible to prevent this attack with a simple rule enforced at the POS it only accepts updates with a larger version number. Internal Management Protocol This protocol comprises all actions internal to the PNO, necessary to support the software updates. Basically two tasks have to be accomplished: Code transfer to the ADS: the CSS sends to each ADS a signed message with a copy of the code and a list of POS models that should be updated. After storing the code, the ADS is ready to receive requests from the POS. Notify the PSS about the upgrade: The CSS sends a signed message to the PSS containing the list of POS models that should updated, the version number of the code, and a signature of the code done by the SM (i.e, based on the KrSM). This information is then stored in the database of the PSS. During normal operation, a POS only communicates with the PSS. Therefore, it must be the PSS who will inform the terminal that it must upload a new version of the EFT application. EFT Protocol In the standard EFT protocol, only the POS can initiate the communication by sending a
5 request to the PSS. In the response, the PSS can demand the execution of an operation by indicating that a given transaction should be carried out following the current one. Therefore, we had to introduce four new EFT transactions to inform the POS about new updates and for some management activities. The new EFT transactions are: Begin Update Transaction (BUT): indicates that a new upgrade is available and provides the following information: configuration data about the ADS that should be contacted (e.g., communication ports), version number of the code, and the signature of the code made by the SM. End Update Transaction (EUT): serves to maintain audit information at the PSS database about which software upgrades were made in the past. After completing the download and the application restart, the POS contacts the PSS to indicate that the update was a success (or that there was an error). Key Version Transaction (KVT): POS sends the versions of the keys (and certificates) that are stored in its security module. Update Keys Transaction (UKT): the PSS can update the keys saved in the POS. This transaction has to be performed with some caution because a bad PSS could use it to compromise the whole network. There are basically these types of updates: new POS keys: to avoid tampering, the SM should first encrypt the keys with the previous public key of the POS, and then sign them. If the cause for the keys exchange was the compromise of the POS, then a different mechanism would have to be used. An attack as severe as this one would probably require the manual substitution of the POS since it could no longer be trusted. renewal of CERT KuPOS: typically, certificates are only valid during an interval of time. Therefore, periodically a new version of the certificate with the current POS public key must be produced and distributed by the SM (or CA). renewal of CERT KuSM: for the same reason, a new version of the SM certificate has to be periodically distributed. The new certificate could contain a different public key, however, it should have the same SM identification and should be correctly signed by the CA. renewal of CERT KuCA: due to the same reason as before. If the new version of the certificate has a different public key, then it should be accompanied with some proof demonstrating the knowledge of the previous CA s private key. This scheme allows the substitution of the CA s keys and at the same time prevents attacks where, for instance, the CA s public key is replaced by a malicious PSS. These new transactions will be included on the standard EFT protocol. Therefore, they will share the regular security infrastructure where messages are protected with a MAC based scheme. Table 1: Fields of the ATS transaction. Message Fields Request Response POS ADS ADS POS Message Type Identifier (MTI) System Trace Audit Number Error Indicator Source POS ident ADS ident Destination ADS ident POS ident Signature with KrPOS Signature with KrADS Next MTI Data Length Transport Data data block Current Data Block Number Next Data Block Number Download Protocol This protocol downloads the software from an ADS to the POS. An example of an application transfer can be observed in Figure 2 (the message format follows the standard ISO 8583 (International Standard Organization, 2003)). To accomplish this task three different types of transactions are executed between the POS and the ADS: Begin Transmission Session (BTS): POS sends a message to the assigned ADS providing information about the wanted version of the code and its communication requirements, such as maximum acceptable block size (MBS) and list of supported compression algorithms. The response returned by the ADS includes the total size of the application, and the total number of MBS that will be sent (the application might have to be fragmented if its size is larger than the acceptable MBS). Application Transfer Session (ATS): in each exchange pair, the POS requests a specific block of the application and the ADS transmits that block. In case of failure, the POS can always restart the transfer process from the last correctly received block. As an example, we provide in Table 1 a more detailed description of the various fields that must be included in each of the transaction s messages.
6 End Transmission Session (ETS): after the arrival of the whole application, the POS confirms the correctness of the upgrade using the signature created by the SM (that was provided by the PSS). Then, it uses this transaction to inform the ADS about the success (or failure) of the transfer. Next, it executes the new software. There are several causes for the interruption of an application transfer session. For instance, there might be an abnormal delay in the communications that results in a timeout either at the POS or the ADS; or the session might be cancelled because a more recent upgrade is received. In any case, depending on the reason, the POS should be informed with different error codes if it can continue the transfer or it should start from the beginning. 3.3 POS Software Architecture This section discusses various options for the software architecture of the POS. In general terms an application can be compiled into one of the following forms: executable object code or interpreted code. The first solution usually leads to better performance because it takes into consideration the particularities of the system for which it was built. But exactly because this dependency, it is not portable. Moreover, the source code must be compiled for each specific system prior to its deployment. Using an interpreted code approach, the source code of the application is translated into byte codes of a virtual machine. A virtual machine is a theoretical microprocessor with standard characteristics that defines such things as addressing mode, registers, and address space. Once translated, the code can be interpreted by the virtual machine implemented specifically for a particular system (Morrison, 2001). Therefore, in both solutions, at some level, there is always a system dependency, either the compiled machine code or the virtual machine implementation. Another important aspect that has to be taken into consideration is the loading operation (Hall, 1990). Prior to a program execution the machine code must be loaded into memory. There are two types of machine code: relocatable and non-relocatable machine code (Intel, 1998). In the first case, every CPU instruction is associated with an offset address instead of an absolute address. When the machine code is loaded into memory a fixed base memory address is given by the operating system (OS). Consequently, it is possible to load the code in (almost) every memory location and to support the concurrent execution of several programs (loaded at different offsets). One disadvantage of this approach is that it typically needs an operating system to load and manage programs and memory. The non-relocatable code solution can be used without an operating system but the program will permanently be located at the same base address. Taking the above in mind, a correct organization of the POS software is essential to minimize the associated difficulties related to the application management, load and execution, and to take over the full potential of software upgrades minimizing, where possible, the download time (Europay, MasterCard and Visa Corporations, 2000). Several scenarios are possible for the software organization depending on the physical characteristics of the terminal. Let s take a look at two extreme examples: a PC based architecture running a well known OS and an embedded system designed from scratch. On a PC based architecture, programs can be compiled into executable object code or interpreted code. There are many software manufacturers and several languages that can be used to program the application. The resulting machine code (either from the program itself or from the virtual machine) is typically relocatable and the OS can be programmatically interfaced by APIs to make the memory management. In this scenario the POS software architecture can be very easily organized into the following modules/programs: Module that implements the Set-up Protocol; Module that implements the Application Transfer Protocol; Module that implements the EFT Protocol; Common Subroutines. Upgrades can be done separately and updating each one of the above is almost a matter of receiving, creating, checking, substituting and deleting files. On the other hand, embedded systems are designed for particular solutions requiring specific software implementations. In this kind of systems the number of software manufactures is very restricted, there are few available development languages and usually no virtual machine or OS is available. Therefore, the easiest solution for a software upgrade is to generate nonrelocatable machine code programs and to substitute every line of machine code by the downloaded ones. The following tasks will have to be performed: Store the downloaded application into non-volatile memory without erasing the running one; Check the correctness of the downloaded application; Copy the downloaded application into the address space of the previous application or point to the entry point address of the downloaded application; Free unnecessary memory space for future software download.
7 This solution leads to longer transfer times because the application is not divided into independent modules and must be transferred as a whole. A better (but more expensive) solution is to build an OS for the embedded system, divide the POS application into the previous proposed organization and use relocatable machine code programs. As the modules can be independently upgraded this solution leads to shorter upgrade times. 4 PROTOCOL EVALUATION The update protocol was implemented and evaluated on a network of PCs. The POS was simulated on a machine with a 1.4 GHz AMD Duron processor, and both the PSS and ADS were simulated on a PC with a 700 MHz Pentium Celeron processor. Each PC had 128 MBytes of RAM and was running Windows P. The network was a 10 MBits/s Ethernet. In our experimental setting, several types of networks can be simulated, in particular a modem over a telephone line or a wireless GSM connection, by artificially delaying the rate of packet transmission to the operating system. In all measurements, the maximum acceptable block size of the POS was set to 2048 Bytes. The cryptographic algorithms used in the implementation were the SHA hash function and the RSA encryption algorithm (for the digital signatures) with 1024 Bit keys. Our measurements focus on the transactions directly related to the application download. They include all transactions that need to be executed from the moment a POS finds out that there is an update until the conclusion of the whole process (transactions in dark boxes in Figure 2). The observed elapsed times for application downloads with different sizes, ranging from 100 KBytes to 2 MBytes, are displayed in Figure 3. This figure shows the performance of the protocol for three types of networks. Currently, the most common way to connect POS devices is through a telephone line at 9,6 Kbits/s, therefore, the other two curves provide some indication about protocol s future behavior as faster networks start to be utilized. 5 CONCLUSIONS that interact with the POS during the upload. A protocol was also provided to manage the various steps of a software upgrade, from the moment it is produced until it is installed in the POS. The solution was implemented and evaluated on a network of PCs. 6 ACKNOWLEDGEMENTS This work was partially supported by the FCT, through the Large-Scale Informatic Systems Laboratory (LASIGE) and project POSI/CHS/39815/2001 (COPE). REFERENCES Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreveghen, E. V., and Waidner, M. (2000). Design, implementation, and deployment of the ikp secure electronic payment system. IEEE Journal on Selected Areas in Communications, 18(4). Europay, MasterCard and Visa Corporations (2000). EMV2000 Integrated Circuit Card Specification for Payment Systems. European Central Bank (2001). Payment and Securities Settlement Systems in the European Union (Blue Book). Hall, D. V. (1990). Microprocessors and Interfacing - Programming and Hardware. McGraw-Hill. Intel (1998). P6 Family of Processors. Hardware Developer s Manual. International Standard Organization (2003). ISO Financial Transaction Card Originated Messages: Interchange Message Specifications: Part 3. Manasse, M. (1995). The Millicent Protocols for Electronic Commerce. In Proceedings of the 1st USENI Workshop on Electronic Commerce. MasterCard and Visa Corporations (1997). Secure Electronic Transaction (SET) Specification Book 1: Business Description Version 1.0. Morrison, M. (2001). Java 1.1 Unleashed. SAMS Net. Schoenmakers, B. (1998). Security Aspects of the Ecash Payment System. In State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, volume 1528 of Lecture Notes in Computer Science. Springer-Verlag. The paper describes a solution for the secure and automatic upgrade of EFT applications in POS devices. This solution requires the introduction of a few new components on the current architecture of the payment system, in particular a certification server where software manufactures can send and validate the upgrades, and a set of application storage servers
8 PROTOCOLS: 1 Certificate Distribution Protocol 4 Internal Management Protocol 2 POS Set-up Protocol 5 EFT Protocol 3 Application Transfer Protocol 6 Download Protocol Payment Network Operator (PNO) Certification System Server (CSS) Merchant Store 5 6 Payment System Server (PSS) Point of Sale Device (POS) Application Distribution Server (ADS) 1 1 Software Manufacturer (SM) 2 Point of Sale Device (POS) 1 Certification Authority (CA) Figure 1: Architecture of the payment system. PSS POS ADS Returns ADS configuration There is an update, data, CERT_KuADS, version therefore, requests the of the code, execution of a BUT and code signature in the response Some Transaction OK/NOK Request BUT BUT Initiates a BUT OK/NOK data Sends communication requirements, and version of the code Request a specific block of application Block update. BTS ATS ETS Returns total number of application blocks Verifies the authenticity and integrity of the application and terminates Saves audit information EUT OK/NOK Informs the outcome of the update Figure 2: The update of an application. Elaps ed Time [s ] Application Size [KBytes] 9,6 Kbit/s 19,2 Kbit/s 10 Mbit/s Figure 3: Elapsed time for the update of an application.
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
CardControl. Credit Card Processing 101. Overview. Contents
CardControl Credit Card Processing 101 Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new and old
A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
Credit Card Processing Overview
CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
White Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Using EMV Cards to Protect E-commerce Transactions
Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,
Redwood Merchant Services. Merchant Processing Terminology
ACH - Automated Clearing House for member banks to process electronic payments or withdrawals. (Credits or debits to a bank account) through the Federal Reserve Bank. Acquiring Bank - Licensed Visa/MasterCard
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
PkBox Technical Overview. Ver. 1.0.7
PkBox Technical Overview Ver. 1.0.7 14 September 2015 All the information in this document is and can t be used entirely or in part without a written permission from Intesi Group S.p.A. Le informazioni
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
EMV : Frequently Asked Questions for Merchants
EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited
EMV Frequently Asked Questions for Merchants May, 2014
EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Network support for tele-education
Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,
EMV Acquiring at the ATM: Early Planning for Credit Unions
EMV Acquiring at the ATM: Early Planning for Credit Unions EMV Adoption Recent data breaches and planned Network Liability shifts have increased the interest in EMV at the ATM and have affected the planned
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
How To Protect A Smart Card From Being Hacked
Chip Terms Explained A Guide to Smart Card Terminology Contents 1 AAC Application Authentication Cryptogram AID Application Identifier Applet ARQC Authorization Request Cryptogram ARPC Authorization Response
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
ETSI TR 102 071 V1.2.1 (2002-10)
TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,
EMV in Hotels Observations and Considerations
EMV in Hotels Observations and Considerations Just in: EMV in the Mail Customer Education: Credit Card companies have already started customer training for the new smart cards. 1 Questions to be Answered
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
Payment Card Industry (PCI) Policy Manual. Network and Computer Services
Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology
Description of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
Smart Cards for Payment Systems
White Paper Smart Cards for Payment Systems An Introductory Paper describing how Thales e-security can help banks migrate to Smart Card Technology Background In this paper: Background 1 The Solution 2
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
TELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Enforcing PCI Data Security Standard Compliance
Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Relay attacks on card payment: vulnerabilities and defences
Relay attacks on card payment: vulnerabilities and defences Saar Drimer, Steven J. Murdoch http://www.cl.cam.ac.uk/users/{sd410, sjm217} Computer Laboratory www.torproject.org 24C3, 29 December 2007, Berlin,
Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices
This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
2015-11-02. Electronic Payments Part 1
Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
A Guide to EMV Version 1.0 May 2011
Table of Contents TABLE OF CONTENTS... 2 LIST OF FIGURES... 4 1 INTRODUCTION... 5 1.1 Purpose... 5 1.2 References... 5 2 BACKGROUND... 6 2.1 What is EMV... 6 2.2 Why EMV... 7 3 THE HISTORY OF EMV... 8
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic
Computer Performance. Topic 3. Contents. Prerequisite knowledge Before studying this topic you should be able to:
55 Topic 3 Computer Performance Contents 3.1 Introduction...................................... 56 3.2 Measuring performance............................... 56 3.2.1 Clock Speed.................................
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015
PCI compliance: v3.1 Key Considerations Corbin Del Carlo Director, National Leader PCI Services October 5, 2015 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014
Are You Ready For PCI v 3.0 Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice 847.413.6319
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Quick Merchant Operator Guide IPP350
Quick Merchant Operator Guide IPP350 IPP350 Terminal Features USB PORT Location INTEGRATED CONTACTLESS reader MAGNETIC STRIP reader Yellow OPTION buttons ALPHANUMERIC keys MENU button Red CANCEL button
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.
DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: [email protected] Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com
Handling of card data in conformance with PCI DSS
Handling of card data in conformance with PCI DSS Version 2 June 2010 Objective MasterCard, Visa, American Express, Diners and JCB have together created the framework PCI DSS (Payment Card Industry Data
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
DPS POS Integration Certification Request and Test Scripts
DPS POS Integration Certification Request and Test Scripts 1 DOCUMENT HISTORY Version Author Date 3.0.0 David Merry 01/2012 3.0.1 Grant Shannon 01/2012 3.0.2 David Merry 01/2012 3.0.3 James Rees 06/2013
Extending EMV payment smart cards with biometric on-card verification
Extending EMV payment smart cards with biometric on-card verification Olaf Henniger 1 and Dimitar Nikolov 2 1 Fraunhofer Institute for Computer Graphics Research IGD Fraunhoferstr. 5, D-64283 Darmstadt,
PayWithIt for Android Devices User Guide Version 1.0.0
PayWithIt for Android Devices User Guide Table of Contents About PayWithIt... 1 Installing PayWithIt... 1 Logging on to PayWithIt... 2 Logging Off from PayWithIt... 2 Configuring PayWithIt Settings...
ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments
A TO Z JARGON BUSTER A ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments ATM Automated Teller Machine. Unattended,
