欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ETSI TR 102 071-2002 Mobile Commerce (M-COMM) Requirements for Payment Methods for Mobile Commerce (V1 2 1)《移动商务(M-COMM) 移动商务的支付方法要求(版本1 1 1)》.pdf

    • 资源ID:735665       资源大小:778.96KB        全文页数:16页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ETSI TR 102 071-2002 Mobile Commerce (M-COMM) Requirements for Payment Methods for Mobile Commerce (V1 2 1)《移动商务(M-COMM) 移动商务的支付方法要求(版本1 1 1)》.pdf

    1、ETSI TR 102 071 1.2.1 (2002-10) Technical Repor Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 ETSI TR 102 071 VI .2.1 (2002-1 O) Reference RTR/M-COMM-007 Keywords commerce, mobile, payment ETSI 650 Route des Lucioles F-O6921 Sophia Antipolis Cedex - FRANCE Tel.: +3

    2、3 4 92 94 42 O0 Fax: +33 4 93 65 47 16 Siret No 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-prfecture de Grasse (06) No 7803/88 Important notice Individual copies of the present document can be downloaded from: http:lwmv.etsi .arq The present document may be made av

    3、ailable in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on

    4、 a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at ha p:/pa rta I. etsi I a rgltbistat uslstatus .as p If

    5、 you find errors in the present document, send your comment to: Cori vriaht Notifica tion No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O European Telecommunications Standards Institute 2002. All

    6、 rights reserved. DECTTM, PLUGTESTSTMand UMTSTMare Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members a

    7、nd of the 3GPP Organizational Partners. ETSI 3 ETSI TR 102 071 VI .2.1 (2002-1 O) Contents Intellectual Property Rights . .4 Foreword . 4 1 Scope 5 2 References . .5 3 Definitions and abbreviations. . .5 Definitions 5 3.1 3.2 Abbreviations . 6 4 Payment systems in a mobile commerce environment. 6 4.

    8、1 4.1.1 4.1.2 4.1.3 4.2 4.2.1 4.2.1.1 4.2.1.2 4.2.2 4.2.2.1 4.2.2.2 4.2.3 4.2.3.1 4.2.3.2 4.2.4 4.2.4.1 4.2.4.2 4.2.5 4.2.5.1 4.2.5.2 4.2.6 4.2.6.1 4.2.6.2 5 5.1 5.1.1 5.1.2 5.2 5.2.1 5.2.2 5.3 Generic model . . . . . . Definition Authentication . Definition Requirements Requirements Requirements No

    9、n repudiation Requirements Definition 9 Requirements 9 10 Definition 10 Requirement 10 Definition Definition Secure mode indication . Scenarios for a mobile payment system . 10 Dual SIM/dual slot . Confidentiality in a system . Authentication in a dual SIM system in a singleSIM system Small payment/

    10、electronic wallet (proxy payment). . Authentication in a single SIM system . Annex A: A.l A.2 Annex B: Bibliography 15 Examples of possible mobile payment scenarios 12 Example of an m-payment using 3D model . 12 Example of an M-Payment via payment provider 13 History . .16 ETSI 4 ETSI TR 102 071 VI

    11、.2.1 (2002-1 O) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR O00 314: “Intel

    12、lectual Property Rights (7PRs); Essential, orpotentially Essential, IPRs notlJied to ETSI in respect ofETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (5). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, ha

    13、s been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR O00 3 14 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Pro

    14、ject M-Commerce (M-COMM). ETSI 5 ETSI TR 102 071 VI .2.1 (2002-1 O) 1 Scope The present document specifies the requirements which are necessary to be fulfilled by a telecommunications system in order to support a payment system in a mobile commerce environment. 2 Re fe re nces For the purposes of th

    15、is Technical Report (TR), the following references apply: il ECBS ORG.9003: “ECBS Terminology“. 21 IS0 7498-2: “Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture“. 3 3.1 Definitions and abbreviations De fi nit ions For the purposes

    16、of the present document, the following terms and definitions apply: customer trusted environment: architecture consisting of a network and a set of hardware and software used by a customer to perform a transaction JAVA: object oriented programming language developed by Sun Microsystems designed to b

    17、e platform independent mobile payment: payment as part of a commercial transaction between the customer and the service/goods provider or other customer NOTE: The payment is effected through a mobile device. M-payments may be bank card-based or non-card-based, in both the real and virtual worlds. mo

    18、bile banking: range of traditional banking services, including push payments, where a customer gives an order to a bank to execute a transfer of funds, conducted via a mobile device Mobile Commerce: electronic commerce using a mobile device as a customer device e.g. a mobile phone mobile device: per

    19、sonal communication device (e.g. PDA, mobile phone etc) capable of communicating either locally (e.g. Bluetooth) or through a network (e.g. GSM) payment enabler: provides infrastructure for generating an m-commerce transaction, but does not handle the transaction itself (e.g. a network operator or e

    20、lectronic wallet) payment provider: processor of m-commerce transactions NOTE: A payment provider can be a bank, credit card institution, or other third party payment provider. pull: schema where the client retrieves a document from a server by calling it (the destination of the information is the i

    21、nitiator of the communication) pull payment (debit payment): request to transfer funds initiated by the beneficiary push: schema where the client receives a document without having explicitly asked for it (the originator of the information is the initiator of the communication) push payment (credit

    22、payment): funds transfer requested by the customer (paying party) ETSI 6 ETSI TR 102 071 VI .2.1 (2002-1 O) 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: CLI EMV GSM os OTA PDA PED PIN SET SIM SMS SSL WAP WIM WTLS Calling Ring Identity Eurocard Master

    23、card Visa General System for Mobile communication Operating System Over The Air Personal Digital Assistant PIN Entry Device Personal Identification Number Secure Electronic Transaction Service Identity Module Short Message Service Secure Socket Layer Wireless Application Protocol WAP Identity Module

    24、 Wireless Transport Layer Security 4 Payment systems in a mobile commerce environment To fully understand how payments work in a mobile environment, this clause describes a generic model and identifies the different actors and the systems involved in m-payments. 4.1 Generic model The model in figure

    25、 4.1.1 illustrates the interactions between a customer, their mobile device, and a payment application. The merchant may be a physical merchant, trading on the high street, or a virtual merchant, trading via the Internet. The issue for the payment provider is how to assure their customers that they

    26、are engaging in “trusted“ payments over open networks. Clauses 4.1.1 to 4.1.3 describe the stages of a possible m-payment transaction: the pre-payment dialogue, the payment dialogue and the post-payment dialogue. These three stages are necessary to complete a full transaction. ETSI 7 ETSI TR 102 071

    27、 VI .2.1 (2002-1 O) Network or local link Merchant (Commerce) - Mobile Phone Customer Payment provider Payment enabler Device or Application Figure 4.1 .I : Generic model: dialogue before payment 4.1.1 Dialogue before payment The fiist step in a mobile payment transaction is when the customer commun

    28、icates using the mobile device. The customer connects with the expected party (e.g. a service or content provider, a merchant, a public or private institution, etc.). Here security services (e.g. privacy, integrity or authentication services) may be required. Customer registration for a specific ser

    29、vice might be required in order to veriSl personal data. 4.1.2 Payment dialogue In the second step, the customer selects the goods/contents/service to be purchased. The customer and the expected party (e.g. a service or content provider, a merchant, a public or private institution, etc.) may agree o

    30、n a contract related to the goods/contents/service to be purchased (mutual confirmation of goods to be purchased). Then the customer communicates via the mobile device to the payment enabler. The customer selects the means of payment (brand, type of payment, etc.) and communicates with the payment p

    31、rovider. At this stage, the payment provider and the customer need to be assured that they are communicating securely. The security needs to be appropriate to the transaction. The customer will need to have to an appropriate perception of security to be reassured to use the system. The payment is in

    32、itiated and the parties are informed whether the payment has been terminated (authorized or rejected), with identification if appropriate. 4.1.3 Processing after payment In the fiial stage, the payment provider processes the payment within the financial institutions (i.e. merchant acquirer) as it is

    33、 done today. ETSI 8 ETSI TR 102 071 VI .2.1 (2002-1 O) 4.2 Requirements of a payment system 4.2.1 Confidentiality 4.2.1 .I Def i n it ion Confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities or processes. See ECBS ORG.9003 i, IS0 7498

    34、-2 2. 4.2.1.2 Req u ire men ts The following information shall be confidential: Payment card identification. PINS. NOTE: Identity of user (and his contact information). This list is not exhaustive, and may include the content, the shopping experience, delivery information. In certain cases the confi

    35、dentially content may be required, for example: Content covered by copyright. 4.2.2 Aut hen t i ca t i o n 4.2.2.1 Def i n it ion The term is used in different contexts: authentication: process used between a sender and a receiver to provide data origin verification, see i. data origin authenticatio

    36、n: corroboration that the source of data received is as claimed, see i. NOTE 1 : The source of data may be the user or a device. NOTE 2: The cardholder authentication process can be made combining the information on the message originator (e.g. the CLI) and verification of a defiied quantity (e.g. a

    37、 PIN, the answer to a challenge, biometrics) known only by the cardholder himself. NOTE 3: In each transaction, the user is authenticated, and also his intention to initiate the transaction. 4.2.2.2 Req u ire men ts In each transaction, it shall be possible to authenticate the user and the transmitt

    38、ed data. The degree of accuracy shall be as good as non-mobile transactions. The system shall provide proof of authentication for each transaction to the payment provider. NOTE: Authentication at the beginning of a session (e.g. at power on) may be sufficient for some types of transactions. ETSI 9 E

    39、TSI TR 102 071 VI .2.1 (2002-1 O) 4.2.3 Integrity 4.2.3.1 Def i n it ion The property of ensuring that information is not altered in any way, either by accident or with fraudulent intent, see i. NOTE: Any alteration shall be detectable on the receiver side. 4.2.3.2 Req u ire men ts The transmission

    40、system shall provide a mechanism for data integrity, and shall be able to demonstrate the integrity of each transaction and of stored data. Integrity requirements apply both to the information provided to the payment provider and to the information provided to the user. EXAMPLE: The amount of a tran

    41、saction seen on a user screen needs to be the same as the amount contained in the transaction. 4.2.4 Non repudiation 4.2.4.1 Def i n it ion non-repudiation: a process that involves delivering data in such a way that the receiver can not deny receipt and the sender can not deny sending it, see i. non

    42、-repudiation of origin: the property that the originator of a message is not able to subsequently deny, with an accepted level of credibility (defined either in legislation or in a contract between the customer and the payment provider), having originated the message. non-repudiation of receipt: the

    43、 property that the receiver of a message is not able to subsequently deny, with an accepted level of credibility (defined in a contract between the customer and the service provider), having received the message. NOTE: This assumes the integrity of the original message. 4.2.4.2 Req u ire men ts A tr

    44、ansaction which has been properly authenticated, it shall be considered to be non-repudiable. The payment provider shall receive a report sufficient to demonstrate the non-repudiability of each transaction. EXAMPLE: A signature given by the payment device, indicating that the card was present and th

    45、e PIN was entered, to the merchant may fulfil this requirement. 4.2.5 PIN entry 4.2.5.1 Def i n it ion Personal Identification Number (PW: A code or password the customer possesses for verification of identity, see i. PIN Entry Device (PED): Any device into which the cardholder inputs the PIN. A PED

    46、 may also be called a PIN pad, see i. 4.2.5.2 Req u ire men ts It shall be possible for the user to modiSl his PIN. ETSI 10 ETSI TR 102 071 VI .2.1 (2002-1 O) 4.2.6 Secure mode indication 4.2.6.1 Def i n it ion An indication to the user that he is operating in a protected environment when entering s

    47、ensitive data (e.g. PIN). 4.2.6.2 Req u ire ment Payment applications shall provide an indication of security at the user interface. NOTE: Security requirement is that the mobile has to provide some form of secured access between payment application and display and keyboard, in order to prevent some

    48、 possibility of frauds like capture of the PIN through the network or display a different amount from what is sent to the payment provider. This secured access mode has to be shown to the user through some unambiguous indication on the mobile via for example display, led, etc. 5 Scenarios for a mobi

    49、le payment system 5.1 Dual SIM/dual slot In this scenario, the mobile device is provided with two physical SIM cards: one identiSling the customer to the telecommunications operator; the second as a payment card to the payment provider. 5.1 .I Confidentiality in a dual SIM system May be provided through the SIM/WIM chip (WTLS on the OTA link) and relevant SSL protocol between WAP Gateway and payment provider server or through a process at application level involving the payment cardchip. 5.1.2 Authentication in a dual SIM system Payment data signature is provi


    注意事项

    本文(ETSI TR 102 071-2002 Mobile Commerce (M-COMM) Requirements for Payment Methods for Mobile Commerce (V1 2 1)《移动商务(M-COMM) 移动商务的支付方法要求(版本1 1 1)》.pdf)为本站会员(boatfragile160)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开