Electronic Commerce. 4. Payment Schemes. V Rajaraman. In this part, we will describe payments using credit cards and cheques in e-commerce.
|
|
|
- Maryann McGee
- 9 years ago
- Views:
Transcription
1 Electronic Commerce 4. Payment Schemes V Rajaraman In this part, we will describe payments using credit cards and cheques in e-commerce. V Rajaraman is with the Jawaharlal Nehru Centre for Advanced Scientific Research and the Indian Institute of Science, Bangalore. Several generations of scientists and engineers in India have learnt computer science using his lucidly written textbooks on programming and computer fundamentals. Part 1. What is E-Commerce?, Resonance, Vol.5, No.10, 13-23, Part 2. E-Commerce System Architecture, Resonance, Vol.5, No.11, 26-36, Part 3. Secure messaging, Resonance, Vol.6, No.1, 8-17, Payment is an important component in e-commerce. In day-today commercial dealings there are many modes of payment, each with its own advantages and disadvantages. The most common payment, especially for low value purchases, is by cash. Credit cards are preferred by customers for higher value purchases (though not all merchants!). If a customer is a trusted party, merchants normally accept cheques. Payment for services such as telephone bills, electricity bills, etc. and settlement of bills between businesses is normally by cheque. In e-commerce also we need systems, which are equivalent to these three modes of payment. Of these three modes cash transaction is the one which is most difficult to mimic. Large electronic cash transactions are discouraged by most governments. It is thus still in a fluid state. In this article we will discuss payments made using credit cards or cheques. Payment Using Credit Cards We will first review how credit card payments are made in dayto-day shopping. There are four parties involved in these transactions. They are: the customer who owns a credit card, merchants who accept credit cards (typically a merchant would accept credit cards of several companies such as VISA, MASTERCARD, etc.), a bank which issues credit cards to customers, guarantees payments to merchants and collects payments from its customers and lastly an acquirer which is a financial institution that establishes an account with a merchant and validates card information presented by a merchant and authorizes sale based on customer s credit status. The acquirer 6 RESONANCE February 2001
2 accepts cards of several bankcard associations, takes the responsibility of electronically transferring payment to merchants account and is in turn reimbursed by the issuing bank. Credit card transactions are carried out as follows: 1. A customer presents a credit card to a merchant after purchasing goods. 2. The merchant reads information contained in the credit card s magnetic strip using a terminal and enters the transaction amount. 3. The information goes to the acquirer via a private telephone line. The acquirer s computer checks the validity of the card, credit available to the customer and sends an OK authorizing transaction, provided card and credit are OK. 4. The merchant takes the signature of the customer on the authorization slip, compares the signature with that in the card and delivers the goods. 5. The acquirer pays the merchant and collects the money from the appropriate issuing bank. 6. The bank sends a monthly statement to the customer and collects the outstanding amount. Observe that the card transaction is validated using the physical card and customer s signature on the card. In e- commerce there is no physical contact between the merchant and the customer making it impossible to verify a physical signature. Also it is necessary for the merchant to verify the genuineness of the customer and for the customer to be assured that he is not dealing with a fake merchant. Thus a customer would be reluctant to reveal his credit card number and details using the internet as the merchant may be a fake or the number may be stolen by eavesdroppers on the internet. Further, if the merchant is careless, a hacker may access the merchant s database and steal credit card numbers. There have been cases reported in the press of credit card numbers being stolen by hackers as well as by disgruntled employees of merchants. Thus a protocol is required in which the credit card number is not revealed to In e-commerce there is no physical contact between the merchant and the customer making it impossible to verify a physical signature. A customer would be reluctant to reveal his credit card number and details using the internet as the merchant may be a fake or the number may be stolen by eavesdroppers on the internet. RESONANCE February
3 A protocol called Secure Electronic Transaction (SET) protocol has been standardised for credit card payments by major credit card companies. a merchant but only to the acquirer who authorises sale based on the credit card validity and available credit. In addition to this, the acquirer and the bank need not know what was bought by a customer (to protect the privacy of customers). They need to know only how much is the bill amount. Secure Electronic Transaction (SET) protocol. A protocol called Secure Electronic Transaction (SET) protocol has been standardised for credit card payments by major credit card companies such as VISA and MASTERCARD in USA. To use the SET protocol for credit card transactions it is assumed that: 1. A public key encryption system (such as RSA) is used by both customers and merchants. (For details on RSA system please see [1]). Thus each of the parties involved in e-commerce transactions have a pair of keys a private and a public key. 2. All parties have their public keys certified by a certification authority and these certificates accompany requests for service sent by them. This is to assure both customers and merchants that they are dealing with genuine parties. 3. A standard hashing algorithm is used to create message digests for digitally signing purchase order. (See Part 3 of this series to understand digital signature). The main features of this protocol are: SET protocol ensures that a customer s credit card number is not revealed to a merchant. It is revealed only to the acquirer who authorizes payment. 1. It ensures that a customer s credit card number is not revealed to a merchant. It is revealed only to the acquirer who authorizes payment. 2. Purchase invoice details are not revealed to the acquirer. Only the credit card number and total amount is revealed to the acquirer. 3. Purchase invoice coupled with the credit card number is digitally signed by the customer so that an arbitrator can settle disputes, if any, on purchase invoice and cost. The complete protocol is given in detail (and runs to 262 pages!) 8 RESONANCE February 2001
4 in a formal SET protocol definition. We will present simplified essentials of the protocol in what follows. Readers interested in learning about the detailed protocol are referred to [2] and [4] Dual Signature Scheme SET protocol depends on an innovation called dual signature whose main purpose is to give to a merchant the purchase order and amount only (without revealing the credit card number) and give the credit card number and the amount to be paid (without revealing the purchase order details) to the acquirer. It will also ensure that the payment is for the actual purchase made. The essentials of the idea are explained here (see Figure 1). A customer s purchase information consists of a purchase order (PO) accompanied by credit card number (CCN) and amount to be paid. This is divided into two parts (PO + Amount) and (CCN + Amount). The two parts are separately hashed using a standard one-way hash algorithm (such as MD5 explained in Part 3 of this series). Let us call these POD and CCD, respectively. The two are concatenated (i.e. stringed Purchase invoice coupled with the credit card number is digitally signed by the customer so that an arbitrator can settle disputes, if any, on purchase invoice and cost. Figure 1. Dual signature system. To merchant C U S T O M E R P.O. + Amount C.C No. + Amount POA CCA Hash Hash POD Concatenate Hash CCD (POD CCD) PPD Encrypt Private Key of customer C PRK DS Dual signature To bank POA : (Purchase Order + Amount) POD: Purchase Order Digest CCA: (Credit Card No. + Amount) CCD: (Credit Card No. + Amount) Digest : Concatenation operator which PPD: Purchase Payment Digest strings together POD and CCD C PRK : Private Key of Customer RESONANCE February
5 together) and hashed again giving PPD (see Figure 1). PPD is encrypted using customer s private key C PRK. This is the customer s digitally signed copy of purchase order + credit card number. Let us call it DS. The formula to get DS is given as (1). DS = C PRK {H (POD CCD)}. (1) The purchase order and amount, namely POA is separately encrypted using the merchant s public key and sent to the merchant. He can decrypt it using his private key to obtain POA. CCD and DS are also sent to him separately. Remember that given CCD he cannot find CCA, as hashing is a one-way function. Thus credit card number is not available to the merchant. The merchant can compute H(H(POA) CCD) = H (POD CCD). (2) The signature DS received by the merchant can be decrypted by him using the public key of the customer to obtain C PUK (DS), (3) where C PUK is the certified public key of the customer, which is sent to the merchant by the customer along with his purchase order. If (2) equals (3), then the merchant has verified the customer s signature. If payment is authorized by the acquirer he can ship the order. As far as the bank is concerned it will receive CCA encrypted by the customer with bank s public key forwarded by the acquirer. It can decrypt it using its private key and obtain CCA. The bank will also receive POD and DS. Remember that POA cannot be found from POD as it is obtained by hashing POA with a oneway hash function. The bank will not thus know the purchase details. It can however compute H(POD H(CCA)) = H (POD CCD) (4) and C PUK (DS). If (4) equals C PUK (DS), the signature of the customer is verified by the bank. If the customer s balance in 10 RESONANCE February 2001
6 credit card account is sufficient the bank can authorise the merchant to honour the purchase order. Observe that the customer cannot repudiate his purchase order as it has been signed by him and deposited with the bank. The merchant also cannot substitute a customer s purchase order with some other purchase order as the signature contains a unique digest of the customer s purchase order deposited with the bank. The customer cannot repudiate his purchase order as it has been signed by him and deposited with the bank. We summarise the procedure below: Step 1: Customer fills purchase order, amount payable and credit card number in his PC. A software in the PC strips it into two parts; purchase order with amount and credit card number with amount. Let us call them POA and CCA. POA is encrypted using merchant s public key and CCA with the bank s public key. Both are sent to the merchant along with CCD and dual signature (DS). Merchant verifies signature and proceeds further if signature is OK. Step 2: Merchant forwards encrypted CCA, POD and DS to acquirer who forwards it to the customer s bank. Step 3: The bank decrypts CCA with its private key, checks the validity of the credit card and available balance in the credit card account. If it is OK and the customer s digital signature is OK, it authorises the acquirer to proceed with the transaction. Step 4: The acquirer in turn OKs transaction to the merchant and credits his account. Step 5: The merchant accepts the customer s purchase order and informs him about delivery details. Step 6: At the end of the month the bank issuing the credit card sends a consolidated bill to the customer. It should be remembered that all of the operations are carried out by software stored in the respective computers and effected by clicks of a mouse button! It should be remembered that all of the operations are carried out by software stored in the respective computers and effected by clicks of a mouse button. RESONANCE February
7 Electronic Cheque Payment We will now describe an electronic cheque clearance system developed by a company called Financial Services Technology Consortium Inc. (FSTC) which is supported by a number of American banks. Most of the cheque-based transactions will be between businesses and therefore this mode of payment is relevant in B2B e-commerce. It is assumed that businesses will be willing to invest in special hardware (normally an electronic circuit attached to a PC) to sign payments. Hardware encryption of signatures is secure as it will be difficult for hackers to steal keys stored by hardware. The system is shown in Figure 2. This system assumes that all organizations participating in the system will use public key encryption scheme such as RSA and have their public keys certified by certification agencies. It is also assumed that banks have trusted relationship among them and the clearing house which settles cheque payments (in India, Reserve Bank of India is the clearing house and all scheduled banks use RBI s services and a private secure network). The transaction proceeds as follows: Figure 2. Clearing cheque payment electronically. Step 1 Purchaser fills a purchase order form, attaches a payment advice (electronic cheque), signs it with his private key 12 RESONANCE February 2001
8 (using his signature hardware), attaches his public key certificate, encrypts it using the vendor s public key and sends it to the vendor. Step 2 The vendor decrypts the information using his private key, checks purchaser s certificates, signature and cheque, attaches his deposit slip, and endorses the deposit attaching his public key certificates. This is encrypted and sent to his bank. Step 3 The vendor s bank checks the signatures and certificates and sends the cheque for clearance. The banks and clearing house normally have a private secure data network. Step 4 When the cheque is cleared the amount is credited to the vendor s account and a credit advice is sent to him. The purchaser gets a consolidated debit advice periodi- Step 5 cally. We have not described the signing process in detail as it has been described already. In this part we have described credit card and cheque payments only. In the next part, we will describe how cash payments are made in e-commerce. Suggested Reading [1] Palash Sarkar, Resonance, Vol. 5, No. 9, p. 22, [2] William Stallings, Cryptography and Network Security Principles and Practices, Second Edition, Prentice Hall, NJ, USA, [3] D E Denning, Information Warfare and Security, Addison Wesley Longman, Reading, MA, USA, [4] gives details of SET protocol Address for Correspondence V Rajaraman IBM Professor of Information Technology JNCASR Bangalore , India. [email protected] O Diamond! Diamond! Thou little knowest the mischief done! Newton RESONANCE February
Electronic Payment Systems
Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce they are Credit card payments Electronic cheque
Chapter - 7. Electronic Payment Systems
Chapter - 7 Electronic Payment Systems The Basics Implementation of electronic payment systems is in its infancy and still evolving. The technical, cultural and legal components of electronic payment systems
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Electronic Commerce. 6. Electronic Data Interchange and XML. V Rajaraman
Electronic Commerce 6. Electronic Data Interchange and XML V Rajaraman B2B e-commerce requires participating businesses to exchange business forms such as purchase order and invoice electronically without
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
The basics of Electronic Commerce abbreviated as e-commerce. The advantages and disadvantages of e-commerce
System Analysis and Design Prof. V.Rajaraman System Analysis and Design/ Electronic Commerce Learning Objectives Learning Goals The basics of Electronic Commerce abbreviated as e-commerce The advantages
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/)
Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/) The following glossary represents definitions for commonly-used terms in online payment processing. Address
Chapter 10. e-payments
Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss
Account-Based Electronic Payment Systems
Account-Based Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry Sept., 2000 Topic: Account-Based Electronic
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas
Payment Systems for E-Commerce. Shengyu Jin 4/27/2005
Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.
An introduction to CashFlows and the provision of on-line card acceptance services we provide to Young Enterprise companies
An introduction to CashFlows and the provision of on-line card acceptance services we provide to Young Enterprise companies Q. What is CashFlows? A. CashFlows is a Financial Services company that provides
Overview A. What is the Visa Purchasing card?
Overview A. What is the Visa Purchasing card? The Purchasing Card is a Visa Card used by The University of Winnipeg employees to purchase materials and services up to $999.99 per item (excluding sales
Lectures for the course: Electronic Commerce Technology (IT 60104)
Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce
Using EMV Cards to Protect E-commerce Transactions
Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,
EFTPOS Merchant Facilities Quick Reference Guide
EFTPOS Merchant Facilities Quick Reference Guide How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly use your
The World of Emerging Payment Systems A Brief Introduction
The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management
Notification of changes to recorded details of an architect corporation or firm
Notification of changes to recorded details of an architect corporation or firm Form 08CF Architects Act 2003 s27 When to use this form You should complete this form if you wish to change any of the recorded
Credit Card Industry
Credit Card Industry 1 Credit Card Processing - A 10 Year History Meat Slicer or Knuckle Buster, Paper Records, Card Present Terminal Device, Paper Records, Card Present Software Only, Electronic Records,
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
Credit Card Overview & Processing Guide entrée Version 3
Credit Card Overview & Processing Guide entrée Version 3 2000-2016 NECS, Inc. All Rights Reserved. I entrée V3 Credit Card Processing Guide Table of Contents Chapter I V3 Credit Card Overview 1 1 Obtain...
QuickBooks Credit Card Merchant Service May 18, 2015 revised
May 18, 2015 revised Security Awareness link http://bblearn.missouri.edu Other resources: Signup for Swipe Reader Guidelines for Credit Card Swipe Reader What is the Merchant Service? The Merchant Service
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
An access number, dialed by a modem, that lets a computer communicate with an Internet Service Provider (ISP) or some other service provider.
TERM DEFINITION Access Number Account Number Acquirer Acquiring Bank Acquiring Processor Address Verification Service (AVS) Association Authorization Authorization Center Authorization Fee Automated Clearing
CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems
CHAPTER 6 E-commerce Payment Created by, David Zolzer, Northwestern State University Louisiana Copyright 2002 Pearson Education, Inc. Slide 6-1 Copyright 2002 Pearson Education, Inc. Slide 6-2 Learning
Pre requisites for Digital Signature
Pre requisites for Digital Signature Know about Digital Signature Certificate You should have a legally valid Class III digital certificate as per Indian IT Act from the licensed Certifying Authorities
2015-11-02. Electronic Payments Part 1
Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced
Virtual Payment Client Integration Reference. April 2009 Software version: 3.1.21.1
Virtual Payment Client Integration Reference April 2009 Software version: 3.1.21.1 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Analysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
3D Secure safe on-line shopping with your payment card
3D Secure safe on-line shopping with your payment card 3D Secure standard represents a modern method of securing your online shopping experience, when you decide to pay by debit or credit card. Paying
Online Payment Process. Name Kathleen Kaye Acosta Nr. 230431 Course E-Business Technologies SS2008 Professor Dr. Eduard Heindl
Online Payment Process Name Kathleen Kaye Acosta Nr. 230431 Course E-Business Technologies SS2008 Professor Dr. Eduard Heindl Declaration This is to certify that this term paper has been written by me.
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
First Data E-commerce Payments Gateway
First Data E-commerce Payments Gateway High performance payment processing solution designed specifically to meet the requirements of global Card-Not-Present PSP When you partner with First Data for your
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
ACH, EFT, SET, SSL, IOTP
Payment Processing Systems and Security for E-Commerce: A Literature Review Ms.Vaishnavi.J.Deshmukh 1 Sapna.S.Kaushik 2 Mr. Amit.M.Tayade 3 Lecture Computer Engg Department Lecturer Computer Engg Department
Handling of card data in conformance with PCI DSS
Handling of card data in conformance with PCI DSS Version 2 June 2010 Objective MasterCard, Visa, American Express, Diners and JCB have together created the framework PCI DSS (Payment Card Industry Data
FAQ on EMV Chip Debit Card and Online Usage
FAQ on EMV Chip Debit Card and Online Usage Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology? You can
CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb
CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb Topic Page Chart of Accounts 3 Creating a Batch Manually 8 Closing a Batch Manually 11 Cancellation Fees 17 Check Refunds 19
E-commerce refers to paperless exchange of business information using following ways.
E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Internet Usage (as of November 1, 2011)
ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
A Guide to EMV Version 1.0 May 2011
Table of Contents TABLE OF CONTENTS... 2 LIST OF FIGURES... 4 1 INTRODUCTION... 5 1.1 Purpose... 5 1.2 References... 5 2 BACKGROUND... 6 2.1 What is EMV... 6 2.2 Why EMV... 7 3 THE HISTORY OF EMV... 8
Order Processing. www.gtp-icommerce.com 1
Order Processing The Order Process Explained Accessing New Orders The Order Page Printing Orders Taking Payments from Credit Card Orders Credit Card Risks Taking Payments from Direct Deposit Taking Payments
Framework of e-commerce
Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed
Security enhancement on HSBC India Debit Card
Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology. In addition to this you can restrict usage of the
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
Electronic Payments. EITN40 - Advanced Web Security
Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin
The following information was prepared to assist you in understanding potential Electronic Value Transfer terminology.
ELECTRONIC VALUE TRANSFER CONTRACT (EVT) GLOSSARY OF TERMS The following information was prepared to assist you in understanding potential terminology. Term Description ACH Automated Clearing House is
Yahoo! Merchant Solutions. Order Processing Guide
Yahoo! Merchant Solutions Order Processing Guide Credit Card Processing How It Works The following charts provide an overview of how online credit card processing works. Credit Card processing for Yahoo!
Cash & Banking Procedures
Financial Policies and Procedures Cash & Banking Procedures 1 P a g e Contents 1. Banking Procedures 1.1 Receipt of cash and cheques within a department 1.2 Storage/security of cash and cheques within
The e-payment Systems
The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
ROAMpay powered by ROAM
ROAMpay powered by ROAM Table of Contents 1. Introduction 2. Setting up Service 3. Supporting ROAMpay Customers 4. Helpful Links and Contacts 5. ROAMpay User s Guide Welcome to ROAMpay powered by ROAM!
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
E-commerce Guide Payment Processing. Designing Your Online Store. By Neto E-commerce Solutions Pty Ltd. Page 1
E-commerce Guide Payment Processing By Neto E-commerce Solutions Pty Ltd Designing Your Online Store Copyright Neto E-commerce Solutions 2012 www.neto.com.au Page 1 Processing Payments If you are running
EFTPOS Merchant Facilities Quick Reference Guide (VX520/VX680)
EFTPOS Merchant Facilities Quick Reference Guide (VX520/VX680) How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
Secure Electronic Transaction (SET protocol) Yang Li & Yun Wang
Secure Electronic Transaction (SET protocol) Yang Li & Yun Wang 1 1. Introduction Electronic commerce, as exemplified by the popularity of the Internet, is going to have an enormous impact on the financial
Prepaid Card Terms and Conditions
Prepaid Card Terms and Conditions These terms and conditions apply to your Prepaid Card. You must read them carefully. In these terms and conditions "you" means the named Prepaid Cardholder and the authorised
Frequently asked questions - Visa paywave
Frequently asked questions - Visa paywave What is Visa paywave? Visa paywave is a new contactless method of payment - the latest evolution in Visa payments. It is a simple, secure and quick payment method
Electronic Commerce and E-wallet
International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: [email protected]
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions Alapan Arnab and Andrew Hutchison Data Network Architectures Group Department of Computer Science University of Cape Town {aarnab,
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business
A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business Nucharee Premchaiswadi*, James G. Williams** and Wichian Premchaiswadi*** *Faculty of Information Technology Dhurakij
EFTPOS Merchant Facilities Quick Reference Guide (T4220/M4230)
EFTPOS Merchant Facilities Quick Reference Guide (T4220/M4230) How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly
E-commerce. ICICI Bank offerings
E-commerce ICICI Bank offerings 2015 ICICI Bank Market leader Largest Private Sector Bank in India Wide reach 4,050+ branches and 12,665+ ATMs Presence in 19 countries Global footprint First Indian Bank
Payment Gateway Innovation in Multiple Payments
Payment Gateway Innovation in Multiple Payments R Nagasubramanian Research Scholar, Vels University, Plot 2A, Andavar Street, Ganapathy Puram, Chrompet, Chennai 600 034 S.P.Rajagopalan, PhD. GKM College
A SECURE ONLINE PAYMENT SYSTEM
University of Kentucky UKnowledge Theses and Dissertations--Computer Science Computer Science 2011 A SECURE ONLINE PAYMENT SYSTEM Shristi Pant University of Kentucky, [email protected] Recommended
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
TCS Payment Processing Interface 1.0
TCS Payment Processing Interface 1.0 Purpose: Integrate Shift 4 payment card processing into TCS Reservations. Setup: To configure TCS reservations for use with Shift 4 UTG. First install the Shift4 UTG
Financial Services Guide & Product Disclosure Statement
Financial Services Guide & Product Disclosure Statement v1.4 Effective as at 29 April 2015 About This Document This combined Financial Services Guide (FSG) is designed to help you decide whether to use
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
FEDERAL BANK CASH PASSPORT FREQUENTLY ASKED QUESTIONS (FAQS)
FEDERAL BANK CASH PASSPORT FREQUENTLY ASKED QUESTIONS (FAQS) 1. How does Cash Passport work? Federal Bank Cash Passport is a prepaid currency card, which can be used abroad, to withdraw local currency
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011
Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic
User Manual. For. Digitally Signing of your application
User Manual For Digitally Signing of your application How to Digital Signature In your Application Digital Signature: A digital signature is an electronic form of a signature that can be used to authenticate
DEBIT and CREDIT CARDS
1. What is a credit card and how it differs from a debit card? A payment card is a piece of plastic containing essential banking information about the holder authorizing him to pay for goods and services
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Oklahoma State University Policy and Procedures
Oklahoma State University Policy and Procedures COLLECTIONS, DEPOSIT AND CONTROL OF CASH OR CHECKS RECEIVED IN THE NAME OF OKLAHOMA STATE UNIVERSITY 3-0331 ADMINISTRATION & FINANCE May 2008 POLICY AND
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
