| Preface | p. xiii |
| Motivation for electronic payment | p. 1 |
| References | p. 4 |
| Characteristics of current payment systems | p. 5 |
| Cash payments | p. 6 |
| Payment through banks | p. 7 |
| Payment by check | p. 7 |
| Payment by giro or credit transfer | p. 9 |
| Automated clearing house (ACH) payments | p. 9 |
| Wire transfer services | p. 11 |
| Using payment cards | p. 12 |
| Consumer preferences in payment systems | p. 14 |
| Regulatory framework | p. 15 |
| References | p. 17 |
| Cryptographic techniques | p. 19 |
| Encryption and decryption | p. 20 |
| Symmetric encryption | p. 21 |
| Data Encryption Standard (DES) | p. 22 |
| Triple DES | p. 26 |
| IDEA | p. 26 |
| Advanced Encryption Standard (AES) | p. 28 |
| RC2, RC4, and RC5 | p. 30 |
| Message digesting or hashing | p. 33 |
| MD5 | p. 34 |
| The Secure Hash Algorithm (SHA) | p. 34 |
| Kerberos | p. 35 |
| Overview of the Kerberos model | p. 35 |
| Obtaining a ticket | p. 37 |
| Service request | p. 38 |
| Asymmetric or public-key encryption | p. 38 |
| Properties of a public-key cryptosystem | p. 39 |
| Trapdoor one-way functions | p. 40 |
| Using public-key cryptosystems for authentication | p. 40 |
| Digital signatures and enveloping | p. 40 |
| RSA | p. 42 |
| Elliptic curve cryptography | p. 44 |
| Public-key infrastructure (PKI) | p. 45 |
| Certificates | p. 45 |
| Certification authorities | p. 46 |
| Attribute certificates | p. 47 |
| Transport of security information | p. 48 |
| Abstract syntax notation (ASN.1) | p. 49 |
| The X.509 directory authentication framework | p. 51 |
| PKCS cryptographic message syntax | p. 53 |
| Dual signatures | p. 54 |
| Nonces | p. 56 |
| Blind signatures | p. 57 |
| Chip cards/smart cards | p. 59 |
| Card types | p. 60 |
| Memory types and capacity | p. 61 |
| Physical specifications | p. 63 |
| Security | p. 63 |
| Public-key processing capabilities | p. 64 |
| Multiapplication cards | p. 65 |
| Java Card | p. 65 |
| Multos | p. 67 |
| Observers | p. 68 |
| References | p. 69 |
| Credit card-based systems | p. 73 |
| Mail order/telephone order (MOTO) transactions | p. 76 |
| Unsecured network payments | p. 76 |
| First Virtual | p. 77 |
| Once-off credit card numbers | p. 80 |
| The secure socket layer (SSL) | p. 82 |
| i-Key protocol (iKP) | p. 89 |
| Framework of iKP protocols | p. 90 |
| 1KP | p. 91 |
| 2KP | p. 96 |
| 3KP | p. 98 |
| Secure Electronic Transactions (SET) | p. 100 |
| The SET trust model | p. 102 |
| SET message structure | p. 105 |
| Payment initialization (PInitReq/PInitRes) | p. 106 |
| Purchase order (PReq/PRes) | p. 107 |
| Authorization (AuthReq/AuthRes) | p. 112 |
| Capture of payment (CapReq/CapRes) | p. 114 |
| Cardholder inquiry (InqReq/InqRes) | p. 115 |
| SET software components | p. 120 |
| SET market acceptance | p. 120 |
| Server-side wallets | p. 122 |
| Using SET with smart cards | p. 123 |
| Summary | p. 123 |
| References | p. 125 |
| Electronic checks and account transfers | p. 127 |
| Payment transfer between centralized accounts | p. 128 |
| Funding the account | p. 130 |
| Authenticated account transfer | p. 134 |
| Withdrawing funds from the system | p. 137 |
| Business models | p. 137 |
| FSTC payment initiatives | p. 138 |
| Electronic check concept | p. 139 |
| Financial Services Markup Language (FSML) | p. 141 |
| Electronic check functional flows | p. 144 |
| Check-handling infrastructure | p. 146 |
| Bank Internet Payment System (BIPS) | p. 148 |
| Financial Agent Secure Transaction (FAST) | p. 151 |
| NACHA Internet payments | p. 153 |
| Internet Secure ATM Payments (ISAP) | p. 153 |
| DirectPay | p. 155 |
| NetBill | p. 156 |
| Protocol overview | p. 157 |
| Authentication procedure | p. 159 |
| Transaction protocol | p. 160 |
| Price request phase | p. 161 |
| Goods delivery phase | p. 161 |
| Payment phase | p. 162 |
| NetBill characteristics | p. 163 |
| NetCheque | p. 164 |
| Summary | p. 167 |
| References | p. 167 |
| Electronic cash payment systems | p. 171 |
| Ecash | p. 172 |
| The Ecash model | p. 173 |
| Ecash coins | p. 174 |
| Coin keys | p. 174 |
| Double-spending prevention | p. 177 |
| Withdrawing coins | p. 178 |
| An Ecash purchase | p. 180 |
| Making the payment | p. 180 |
| Proving payment | p. 181 |
| Payment deposit | p. 182 |
| Integration with the Web | p. 182 |
| Ecash in the mail | p. 183 |
| Transferring Ecash | p. 183 |
| Lost coins | p. 184 |
| Ecash and crime | p. 184 |
| Magic Money | p. 186 |
| Remarks | p. 186 |
| Project CAFE | p. 186 |
| Goals of CAFE | p. 187 |
| Architecture | p. 188 |
| CAFE devices | p. 189 |
| Role of observers | p. 190 |
| Protocol overview | p. 190 |
| Off-line coins | p. 191 |
| The [alpha] protocol | p. 192 |
| The [Gamma] protocol | p. 195 |
| Additional features | p. 196 |
| Remarks | p. 196 |
| NetCash | p. 196 |
| Framework/model | p. 197 |
| NetCash coins | p. 198 |
| Double-spending prevention | p. 199 |
| Coin transfer | p. 200 |
| Certificate of insurance | p. 200 |
| Basic purchase | p. 201 |
| Obtaining coins | p. 201 |
| Paying a merchant | p. 203 |
| Verifying coins | p. 204 |
| Providing limited anonymity | p. 204 |
| Merchant anonymity | p. 205 |
| Preventing anonymity | p. 206 |
| Clearing | p. 206 |
| Extensions | p. 207 |
| Preventing merchant fraud | p. 207 |
| Off-line protocols | p. 209 |
| Remarks | p. 210 |
| Mondex | p. 210 |
| EMV cash cards and CEPS | p. 213 |
| EMV2000 | p. 214 |
| Common Electronic Purse Specification (CEPS) | p. 214 |
| Remarks | p. 220 |
| SmartAxis | p. 220 |
| Remarks | p. 222 |
| References | p. 223 |
| Micropayment systems | p. 227 |
| Millicent | p. 228 |
| The Millicent model | p. 229 |
| Purchasing with Millicent | p. 231 |
| Scrip | p. 233 |
| Scrip structure | p. 234 |
| Scrip certificate generation | p. 235 |
| Scrip validation | p. 235 |
| Preventing double spending | p. 237 |
| Computation costs | p. 237 |
| Sending scrip over a network: the Millicent protocols | p. 237 |
| Scrip in the clear | p. 237 |
| Encrypted network connection | p. 237 |
| Request signatures | p. 241 |
| Performance | p. 243 |
| Millicent with the Web | p. 243 |
| Extensions | p. 244 |
| Summary | p. 245 |
| SubScrip | p. 245 |
| Basic SubScrip | p. 246 |
| Establishing a temporary account | p. 246 |
| Providing anonymity | p. 247 |
| A SubScrip ticket | p. 247 |
| A SubScrip purchase | p. 248 |
| Security and privacy | p. 248 |
| Protected SubScrip | p. 249 |
| Refunding SubScrip | p. 250 |
| Lost tickets | p. 250 |
| PayWord | p. 250 |
| PayWord user certificates | p. 251 |
| Revoked certificates | p. 253 |
| PayWord chains | p. 253 |
| Commitment to a PayWord chain | p. 254 |
| Spending PayWords | p. 255 |
| Variable-size payments | p. 256 |
| Redeeming spent PayWords | p. 257 |
| Computational costs | p. 257 |
| Extensions | p. 258 |
| Remarks | p. 258 |
| iKP micropayment protocol | p. 259 |
| [mu]-3KP protocol | p. 260 |
| Repeated micropayments | p. 261 |
| Nonrepeated micropayments | p. 264 |
| Remarks | p. 266 |
| Hash chain trees | p. 266 |
| PayTree | p. 268 |
| Unbalanced One-way Binary Tree (UOBT) | p. 270 |
| MicroMint | p. 273 |
| The MicroMint model | p. 274 |
| MicroMint coins | p. 274 |
| Verifying a coin | p. 275 |
| Minting coins | p. 276 |
| Computational costs | p. 277 |
| Multiple coins per bin | p. 278 |
| Coin validity criterion | p. 278 |
| Preventing forgery | p. 279 |
| A MicroMint purchase | p. 280 |
| Double spending | p. 280 |
| Extensions | p. 281 |
| Probability-based micropayments | p. 283 |
| Bets using coin flips | p. 284 |
| Hash chain lottery tickets | p. 286 |
| Jalda | p. 288 |
| NewGenPay/IBM Micropayments | p. 292 |
| Banner advertising as a form of micropayment | p. 296 |
| Micropayments summary and analysis | p. 297 |
| References | p. 300 |
| Mobile commerce | p. 303 |
| Mobile Internet architectures | p. 305 |
| Carrying Internet data on cellular networks | p. 305 |
| The wireless application protocol (WAP) | p. 306 |
| Japan's iMode service | p. 307 |
| Industry consortia | p. 308 |
| Mobile network operator as banker | p. 308 |
| Third-party account-based mobile payment systems | p. 309 |
| Sonera MobilePay | p. 310 |
| Paybox | p. 311 |
| GiSMo | p. 313 |
| The Fundamo architecture | p. 315 |
| Credit card-based systems | p. 316 |
| Mobile SET | p. 317 |
| Remarks | p. 320 |
| Summary | p. 321 |
| References | p. 322 |
| Payment systems: prospects for the future | p. 325 |
| About the authors | p. 329 |
| Index | p. 331 |
| Table of Contents provided by Syndetics. All Rights Reserved. |