The World of Emerging Payment Systems A Brief Introduction
|
|
|
- Lynette Robbins
- 10 years ago
- Views:
Transcription
1 The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management Advisory Council March 26, 2015
2 Disclaimer The contents of this PowerPoint presentation and the oral remarks made incident thereto reflect the personal views of Joseph M. Vincent and do not necessarily reflect either the positions or policy of the Washington State Department of Financial Institutions ( DFI ) or of Joseph M. Vincent, acting in his official capacity for DFI. 2
3 The World of Emerging Payment Systems ESSENTIALS OF ANY PAYMENT SYSTEM 3
4 The Most Important Factor in Any Payment System 4
5 Non-Repudiation The maker of a communication will not be able to successfully challenge the external validity of the communication. 5
6 Non-Repudiation Authenticity People Policies Processes Non- Repudiation Integrity 6
7 Non-Repudiation in the Digital Age Authenticity Security Non- Repudiation Integrity People Policies Processes 7
8 The World of Emerging Payment Systems SHORT HISTORY OF LEGACY PAYMENT SYSTEMS 8
9 Barter Exchange Barter is a system of exchange by which goods or services are directly exchanged for other goods or services without using a medium of exchange, such as money. 9
10 Immediate Use of Medium of Exchange An immediate use of a medium of exchange is where one party hands the other money or its equivalent in exchange for the goods or service. 10
11 Long-Distance Exchange Eventually people started using a medium of exchange to buy goods from a long distance, sending the money by highway and having the goods shipped back by highway. In either direction, there was the danger of robbery. 11
12 Early Commercial Paper As Medieval trade routes became more widely used, merchant banking arose. People of means stored value (their money) with merchant bankers. In turn, merchant bankers issued redeemable notes and letters of credit. 12
13 Earliest Stock and Bond Market The Dutch merchant guilds were the first to establish and widely use central registries for the recording of exchange transactions, issuing certificates and redeemable instruments. 13
14 The Checking Account The check as we know it was invented in 1870 to avoid double taxation on state banks. A check is a payment order drawn on a demand deposit account of a bank. It may negotiated by endorsement. 14
15 The Early Credit Card Diners Club, followed shortly by American Express, were the first credit cards. They were dependent on restaurant, hotel, and merchant membership. 15
16 The Proprietary Bank Credit Card Then came the proprietary bank credit card. Banks using this payment system were dependent upon restaurant, hotel, and merchant membership. This was limited to the largest banks. 16
17 Visa and MasterCard Systems Then came Visa and MasterCard, which relied on membership by issuing banks. This greatly expanded the participation of most banks and credit unions in the issuance of credit cards, either as issuers or as resellers. 17
18 The Bank Debit Card Then we saw the advent of the bank debit card. With the help of Visa and MasterCard, the bank debit card has become ubiquitous, eclipsing the check and cash as the most common form of payment. 18
19 The Prepaid Debit Card As a substitute for cash often for those consumers lacking or not wanting to use a bank account the pre-paid debit card (stored value card), issued by banks and backed by the Visa and MasterCard networks, is becoming a significant percentage of the payments market. 19
20 Check Negotiability and Clearance PAYOR BANK (Drawee) OPEN ACCOUNT COLLECT CHECK DRAWER/ISSUER (Purchaser) PAYEE (Seller) ISSUE CHECK 20
21 Debit Card ACH CONSUMER 1 Consumer Initiates Purchase MERCHANT AUTOMATED CLEARING HOUSE Federal Reserve 2 Merchant Processes Transaction 4 Federal Reserve Sends ACH File to Consumer Bank CONSUMER BANK 5 Consumer Bank Sends Funds to Merchant Underwriting Bank. Funds Are Then Sent to Merchant s Bank & Consumer Notified of Payment 3 Merchant Payment Processor Transmits File to ACH on Behalf of Merchant Underwriting Bank MERCHANT UNDERWRITING BANK 21
22 Online Bill Pay Authorization Usually this involves giving your bank authorization to draw on your account to pay bills using the ACH process. Or it may involve going online and paying your credit card balance through your card issuer s pre-authorized access to your bank account. 22
23 Summary of Legacy Payment Systems Each of the legacy payment systems is dependent on non-repudiation as a basis of trust. Decentralized legacy systems rely on negotiability (endorsement) as a trust model. Other legacy systems rely on a combination of a central clearinghouse and decentralized processing. 23
24 The World of Emerging Payment Systems FIRST GEN E-COMMERCE PAYMENT SYSTEMS 24
25 What Is Money Transmission? Federal Registration as Money Transmitter: 31 U.S.C Unlawful Money Transmission: 18 U.S.C Uniform Money Services Act: RCW & WAC Money transmission" means receiving money or its equivalent value to transmit, deliver, or instruct to be delivered the money or its equivalent value to another location, inside or outside the United States, by any means including, but not limited to, by wire, facsimile, or electronic transfer. Money transmission does not include the provision solely of connection services to the internet, telecommunications services, or network access. Money transmission includes selling, issuing, or acting as an intermediary for open-loop stored value devices and payment instruments, but not closed-loop stored value devices. 25
26 Starbucks App 26
27 Merchant App 27
28 Operational Model 28
29 1-Click & Mobile Wallet 29
30 30
31 Wallet 31
32 32
33 The World of Emerging Payment Systems NEXT GEN E-COMMERCE: REDEFINING PAYMENT & MONEY 33
34 Multi-Factor Authentication Something you know. Something you have. Who you are. Where you are. FFIEC Guidance Authentication in an Internet Banking Environment FIL October 12,
35 Symmetric v. Asymmetric Encryption Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. This does not of itself prevent interception, but denies the message content to a would-be hacker. Plaintext is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in AES employs symmetric-key algorithms, which uses the same keys for both encryption of plaintext and decryption of ciphertext. The keys represent a shared secret between two or more parties that can be used to maintain a private link. The requirement that both parties have access to the same secret key is one of the main drawbacks of symmetric key encryption, in comparison to public-key cryptography. Public-key cryptography, also known as asymmetric-key cryptography, requires two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other. 35
36 Certification Authority A certificate authority issues a digital signature certificate containing a public key and a private key. CA 36
37 Paired Key Encryption ALICE BOB 52ED87970 F71D92X3J KEY MAKING FUNCTION 31CA49425 ST7B65M1 KEY MAKING FUNCTION Big Random Number 1 Big Random Number 2 Alice s Public Key Alice s Private Key Bob s Public Key Bob s Private Key 37
38 Registration Authority id RA A registration authority verifies the identity of users at the request of a certification authority. 38
39 Public Key Repository A verification authority or public key repository a secure location in which to store and index keys and which a recipient of a digital signature can verify and rely upon the identity of the sender. PKR 39
40 Digital Signature Certificate A digital signature certificate, which authorizes use of a private key and often contains a policy which sets forth what the user and recipient of a digital signature may rely upon. 40
41 Storing the Certificate The information about the digital signature certificate containing the public key is then transmitted to the public key repository for safekeeping and for access by recipients of digital signatures. 41
42 Model of a Public Key Infrastructure OK Bob s Certificate & Public Key Bob s Certificate & Private Key Bob s Certificate & Private Key ALICE S STORE OK PLACE ORDER 42
43 Bitcoin Bitcoin was supposedly invented by Satoshi Nakamoto, who published his invention in 2008 and released it as open-source software in The system is peer-to-peer. The theory is that users can transact directly without needing an intermediary to establish trust and nonrepudiation. 43
44 Wallets & Addresses Bob and Alice both have Bitcoin wallets on their computer or smartphone. Wallets are files that provide access to multiple Bitcoin addresses. An address is a string of letters and numbers. Each address has its own balance of Bitcoins. BOB ALICE 1HULMwZEPkJEPvCh43BefKJLybLCWrfDphi B 44
45 How Does a Bitcoin Transaction Work? WALLETS & DEVICES Bob and Alice both have Bitcoin wallets on their computers or devices. CREATING A NEW ADDRESS Alice creates a new Bitcoin address for Bob to send his payment to. SUBMITTING A PAYMENT Bob tells his Bitcoin client that he would like to transfer the purchase amount to Alice s address. Bitcoin Miners PRIVATE KEY PUBLIC KEY HUEY LOUIE DOOEY VERIFYING THE TRANSACTION Their computers bundle the past 10 minutes into a new transaction block. 1HULMwZEPkJEP vch43befkjlyblc WrfDphi Their computers are set up to calculate cryptographic hash functions. 45
46 How Does a Bitcoin Transaction Work? VERIFYING THE TRANSACTION The end is near. 1HULMwZEPkJEPv.... Cryptographic hash functions transform a collection of data into an alphanumeric string with a fixed length called hash value. Even tiny changes in the original data drastically change the resulting hash value. And it is essentially impossible to predict which initial data set will create a specific hash value. The end is near. The end is near. AFT12tkRxk985Aht... 4dnW05gSVk71dU... Nonces: To create different hash values from the same data, Bitcoin uses nonces. A nonce is just a random number that is added to data prior to hashing. Changing the nonce results in a wildly different hash value. The end is near????? Hash Value* The mining computers calculate new hash values based on a combination the previous hash value, the new transaction block, and a nonce New Hash Value Creating hashes is computationally trivial, but the Bitcoin ecosystem requires that the new hash value have a particular form specifically, it must start with a certain number of zeros. *Each new hash value creates information about all previous Bitcoin transactions New Hash Value New Hash Value 46
47 How Does a Bitcoin Transaction Work? VERIFYING THE TRANSACTION NEEDLE IN A HAYSTACK The miners Huey, Louie, and Dooey have no way to predict which nonce will produce a hash value with the required number of leading zeros. So they are forced to generate many hashes with different nonces until they happen upon one that works. TRANSACTION VERIFIED Each block includes a As time goes on, Bob s transfer coinbase to Alice gets buried beneath transaction that other, more recent pays out Bitcoins transactions. For anyone to to the winning modify the details, s/he would miner. A new have to modify Louie s work address is because any changes require a created in Louie s completely different winning wallet with a LOUIE nonce and then redo the balance of newly WINS!! work of all the subsequent minted Bitcoins. miners. Such a feat is nearly impossible. 47
48 The World of Emerging Payment Systems WHAT LIES AHEAD 48
49 What Will Be the New Paradigm? 49
50 to Adopt Blockchain CAD CHF AUD USD OPEN LEDGER TECHNOLOGY CHY EUR JPY GBP IBM creating digital cash/payments system with Bitcoin technology Bitcoin without the Bitcoin. Transfer cash or make payments instantaneously without a bank or clearing party. Unlike bitcoin, this digital currency system would be controlled by central banks. Linked to regular bank account using wallet software. 50
51 We Are at an Inflection Point! 51
52 Timing of Adoption? 52
53 Contact Information Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions (360)
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Framework of e-commerce
Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Page 3. only exchange cash against money orders that it has used to conduct lending transactions or disburse benefits.
Ruling FIN-2008-R010 Issued: December 11, 2008 Subject: Whether a Company that Engages in Certain Operations as an Authorized Agent for Collection of Social Security and Veteran Benefits is a Money Services
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
Office of the State Bank Commissioner Guidance Document MT 2014-01
Office of the State Bank Commissioner Guidance Document MT 2014-01 Date: June 6, 2014 Regulatory Treatment of Virtual Currencies Under the Kansas Money Transmitter Act Purpose The purpose of this guidance
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Electronic Payments. EITN40 - Advanced Web Security
Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
How to Create E-Commerce Web Site
How to Create E-Commerce Web Site By A. Sittikorn Direksoonthorn BIS 3687: E-Banking and Payment System Assumption University 1/2004 Be on the Web, or Be out of Business Quick Win Agenda Encryption in
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Chapter 10. e-payments
Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss
bi on Solution white paper
bi on Solution white paper Billon Solution Overview Despite concerted efforts for years, cash has not yet been eliminated. Mostly because not everyone has a bank account and debit card - an estimated 2.5
Distributed Public Key Infrastructure via the Blockchain. Sean Pearl [email protected] April 28, 2015
Distributed Public Key Infrastructure via the Blockchain Sean Pearl [email protected] April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Public Key Encryption and Digital Signature: How do they work?
White Paper Public Key Encryption and Digital Signature: How do they work? Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved. Reproduction of
Dear Superintendent Lawsky:
Benjamin M. Lawsky Superintendent of Financial Services New York Department of Financial Services One State Street New York, NY 10004 October 20, 2014 Dear Superintendent Lawsky: BitPay, Inc. (BitPay)
Outline. Digital signature. Symmetric-key Cryptography. Caesar cipher. Cryptography basics Digital signature
Outline Digital signature Cryptography basics Digital signature Dr. László Daragó, Ph.D. Associate professor Cryptography Cryptography encryption decryption Symmetric-key Cryptography Encryption with a
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
BACK OFFICE MANUAL. Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany
BACK OFFICE MANUAL Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany Contents Introduction... 3 Overview of cxadmin... 4 Dashboard... 4 Customer overview... 5 Markets...
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
State-Sponsored Cryptocurrency: Adapting the best of Bitcoin s Innovation to the Payments Ecosystem
State-Sponsored Cryptocurrency: Adapting the best of Bitcoin s Innovation to the Payments Ecosystem The Bitcoin Buzz Bitcoin, the most popular virtual currency in the market today, continues to draw significant
Payment Systems for E-Commerce. Shengyu Jin 4/27/2005
Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.
COLUMBIA CREDIT UNION ELECTRONIC FUNDS TRANSFERS AGREEMENT AND DISCLOSURE Business Accounts
COLUMBIA CREDIT UNION ELECTRONIC FUNDS TRANSFERS AGREEMENT AND DISCLOSURE Business Accounts This Agreement is the contract that covers your and our rights and responsibilities concerning Electronic Fund
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
Google Payments Terms of Service Buyer (US)
Google Payments Terms of Service Buyer (US) September 10, 2015 These Terms of Service are a legal agreement, between you and Google Payment Corp. ("GPC" or "we"), a wholly owned subsidiary of Google Inc.,
Electronic and Digital Signatures
Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001
Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001 D. Richard Kuhn Vincent C. Hu W. Timothy Polk Shu-Jen Chang National Institute of Standards and Technology, 2001.
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
Electronic Commerce. 4. Payment Schemes. V Rajaraman. In this part, we will describe payments using credit cards and cheques in e-commerce.
Electronic Commerce 4. Payment Schemes V Rajaraman In this part, we will describe payments using credit cards and cheques in e-commerce. V Rajaraman is with the Jawaharlal Nehru Centre for Advanced Scientific
Electronic Cash Payment Protocols and Systems
Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview
MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM
MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM This Addendum ( Addendum ) to the Citizens State Bank of Paola Online Banking Agreement between you and Citizens State Bank of
The Concept of Trust in Network Security
En White Paper Date: August 2000 Version: 1.2 En is a registered trademark of En, Inc. in the United States and certain other countries. En is a registered trademark of En Limited in Canada. All other
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Merchant Account Basics. A compilation of Braintree blog posts
Merchant Account Basics A compilation of Braintree blog posts Table of Contents I. A Brief History of the Credit Card Processing Industry... 3 II. Industry Overview... 4 The necessity of merchant accounts...
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Payment authorization Payment capture Table 1.3 SET Transaction Types
Table 1.3 lists the transaction types supported by SET. In what follows we look in some detail at the following transactions: Purchase request Payment authorization Payment capture Cardholder registration
NXP & Security Innovation Encryption for ARM MCUs
NXP & Security Innovation Encryption for ARM MCUs Presenters Gene Carter- International Product Manager, NXP Semiconductors Gene is responsible for marketing of the ARM7 and Cortex-M3 microcontrollers.
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
SFWR ENG 4C03 - Computer Networks & Computer Security
KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Review On Incremental Encrypted Backup For Cloud
Review On Incremental Encrypted Backup For Cloud Rohini Ghenand, Pooja Kute, Swapnil Shinde, Amit Shinde, Mahesh Pavaskar, Shitalkumar Jain Department of Computer Engineering MIT AOE [email protected]
How To Create A Digital Signature Certificate
Tool. For Signing & Verification Submitted To: Submitted By: Shri Patrick Kishore Chief Operating Officer Sujit Kumar Tiwari MCA, I Year University Of Hyderabad Certificate by Guide This is certifying
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
October 20, 2014. Subject: ETA s Comments on Proposed Virtual Currency Regulatory Framework
October 20, 2014 Dana V. Syracuse, Esquire Office of General Counsel Department of Financial Services One State Street New York, New York 10004 Subject: ETA s Comments on Proposed Virtual Currency Regulatory
Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015
Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
An access number, dialed by a modem, that lets a computer communicate with an Internet Service Provider (ISP) or some other service provider.
TERM DEFINITION Access Number Account Number Acquirer Acquiring Bank Acquiring Processor Address Verification Service (AVS) Association Authorization Authorization Center Authorization Fee Automated Clearing
CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb
CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb Topic Page Chart of Accounts 3 Creating a Batch Manually 8 Closing a Batch Manually 11 Cancellation Fees 17 Check Refunds 19
Can ecash & Virtual Currency Compete with Other Electronic Payments? Oz Shy. Consumer Payments Research Center Federal Reserve Bank of Boston
Can ecash & Virtual Currency Compete with Other Electronic Payments? Oz Shy Consumer Payments Research Center Federal Reserve Bank of Boston Presented at the Accredited Standards Committee (ASC) X9 All
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Account-Based Electronic Payment Systems
Account-Based Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry Sept., 2000 Topic: Account-Based Electronic
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
How to Send Stealth Text From Your Cell Phone
anonymous secure decentralized SMS stealthtext transactions WHITEPAPER STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext
How Online Payments Really Work
Insights for Businesses How Online Payments Really Work If you re thinking about setting up an online store, you re in good company. Shoppers are increasingly turning to online options, as their access
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
