This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals.
Dedicated to card acquiring exclusively, the book covers:
- Payment cards and protocols
- EMV contact chip and contactless transactions
- Disputes, arbitration, and compliance
- Data security standards in the payment card industry
- Validation algorithms
- Code tables
- Basic cryptography
- Pin block formats and algorithms
When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction.
A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology
Table of Contents
SECTION I. PAYMENT CARDS AND PROTOCOLS
Chapter 1. Overview of Card Payments Industry
Chapter 2. Payment Flow and Basics of Technology
Chapter 3. Payment Services and Protocols
SECTION II. CARD-NOT-PRESENT ENVIRONMENT
Chapter 4. Card-Not-Present Environment
SECTION III. CARD-PRESENT ENVIRONMENT
Chapter 5. Contact Chip Transactions
Chapter 6. EMV Contactless Transactions
SECTION IV. OTHER PROCESSES AND STANDARDS
Chapter 7. Disputes, Arbitration and Compliance
Chapter 8. Data Security Standards in Payment Card Industry
Chapter 9. Other Payment Methods
SECTION V. ALGORITHMS AND ENCODINGS
Chapter 10. Validation Algorithms
Chapter 11. Code Tables
Chapter 12. Cryptography 101
Chapter 13. PIN Block Formats and Algorithms
Ilya Dubinsky has 20 years of experience in the software industry. He is the Head of the CTO Office in Credorax, a cross-border acquiring bank in the European Union. He defines the technological roadmap of the company, manages its IP portfolio, and guides participation in international standard bodies. He also leads in-house technology research, publishes whitepapers, and writes a blog for the Israeli economic newspaper, The Marker.
Dubinsky participates in global groups and bodies, including The Berlin Group Banking Industry Standards Initiative, the Payment Services User Group of Bank of Malta, and the Fintech Forum of Bank of Israel. Capitalizing on his years of experience in software development, product, and project management in telecom and finance industries, he teaches a fin-tech class at Holon Institute of Technology and oversees joint research projects with Tel Aviv University.