Site hosted by Angelfire.com: Build your free website today!

Complete Computer & Network Solutions Inc.

Security

Home ] Up ] Contents ] Feedback ] Legal Notice ] Our Policies ] Search ]

Home
Up
 

1- 416-276-3115   

 

 

Security Techniques

CCN COMPUTER resources have worked with multiple techniques for transaction security and fraud control. Some of these are:

  • Multiple security keys
  • Message authentication
  • Encryption key exchange process
  • Interface to security devices
  • DES key management
  • Message Authentication Codes (MAC)
  • Message Authentication
  • EMV upgrades to support VSDC and other products
  • Triple DES
  • SET gateway interface
  • PIN verification
  • SSL gateway interface
  • Pin Generation
 

Accesses to all GUI screens of system are password protected. Only users with suitable authentication and authorization can accesses system screens. All user-performed changes are fully logged for the purpose of establishing an audit trail. Along with the details of the changes performed by the user, the date, time and user-id are also recorded.

Our resources have also developed interfaces to physically secure devices. These devices are used for all system encryption and decryption tasks such as:

  • PIN verification
     

  • PIN block translation
     

  • PIN creation
     

  • Message authentication
     

  • Key exchange and generation
     

  • PIN mailer production

HSMs can be connected to the system using the TCP/IP communication protocol. Asynchronous protocol can be used with the HSM. Multiple HSMs can also be used to improve transaction throughput.

 

 

Copyright © 2004 Complete Computer & Network Solutions Inc.