ECommerce Unit 2
ECommerce Unit 2
As business activity grows on the to take into account and to address, to the
stakeholders‟ satisfaction.security relates to three general areas.
Secure file/information transfer
Secure transaction
Secure enter price network, when used tosupport webcommerce
Overview:
The security issue must be addressed quickly in order for companies to start
investing in electronic commerce .
There are indications that merchants are taking a wait-and –see attitude in
electronic commerce on the internet until either there is a dominant standard
or there is universal software that will support a variety of encryption and
transaction schemes.
The market is looking for a comprehensive solution (in a software product)
that the merchants and banks can use to support all functions. Computer
security has several fundamental goals
Privacy: keep private document private, using encryption, passwords and
access control system.
Integrity: data and applications should be safe from modification with out
the owner‟s consent
Authentication: ensure that the people using the computer are the authorized
users of that system.
Availability: the end system (host) and data should be available when
needed by the authorize user.
SECURE TRANSACTION:
The protocols previously discussed support secure transaction. As well as
more advanced secure transport capabilities.
The secure transaction protocols discussed here are more narrowly focused.
For secure payment, internet hardware (software vendors have made a
variable of an noun cements in the past couple of years related to the
support for the most popular security payment protocols. Three methods
have evolved in the recent past.
Netscape Communications Corporation and Microsoft Corporation have
promoted their respective payment protocols and installed them in world
wide web browsers and servers.
SEPP have been championed by master card and Netscape and by other
supporters; the American national standards institute (ANSI) is fast –
tracking SEPP as a standards for the industry.
STT (http://www.visa.com/vista-stt/index.html) was developed jointly by
visa and Microsoft as methods to secure bankcard transaction over open net
network. STT user cryptography to secure confidential information transfer,
ensure payment integrity, and authenticate both merchants and cardholders
confidentiality of information is ensured by the use of digital signature;
cardholder account authentication is ensured and merchant credentials and
interoperability is ensured by the use of specific protocols and message
formats.
At this juncture ,it appears that SET will become the industry defected
standard SET has emerged recently as a convergence of the previous
standards and has a lot in common with SEPP.SET is expected to be rapidly
incorporated into industrial – strength “merchant ” already available from
net cape , Microsoft, IBM, and other software sellers.
SEPP Process:
SEPP assume that the card holder and merchant have been communicating
in order to negative terms of purchase and generate an order this process
may be conducted via a www browser ; alternative this operation may be
performed through the use of electronic mail, via user „s review of a paper
or CD-ROM catalogue or other mechanism.
SEPP is designed to support transmition activity exchanged in both
interactive (Online) and non-interactive (off) models.
The collection of element involved in electronic commerce
Cardholder: this is authorized holder of a bank card supported by on issue
and register to perform electronic commerce
Merchant : This is a merchant of goods services and or e-products who
accepts payment for them electronically and line may provide selling
service and are electronic delivery of items for sale (e.g., E-product)
Acquirer: This is a (master card member) financial institution that supports
merchant by providing service for processing credit card based transaction
Certificate management system: This is a agent of one or more bankcard
association‟s that provides for the creation and distribution of a electronic
certificates for merchants acquires and cardholder.
Fig. 3.1(113)
Bank net : this represented the existing network which interface acquires
issuer and the certificate management system.
19
Fig(3.2)115
The merchant send an authorization request to the acquirer .the acquirer
performs the following tasks;
Authenticates the merchant
Verifies the acquirer/merchant relationship
Decrypts the payment instruction from the buying cardholder.
Validate that the buying cardholder certificate matches the account number
used in the purchase
Validates consistency between merchant‟s authorization request and the
cardholder‟s payment instruction data
Formats a standard authorization request to the issues and receives the
response
Responds to the merchant with validates authorization request response.
20
SEPP architecture:
The SEPP buying cardholder is represented by a cardholder workstation
which, in the initial implementation, can be based on a World Wide Web
browser.
Off-line operations using e-mail or other non-interactive payment
transaction are also supported by the protocol.
To obtain a certificate the buying cardholder‟s PC software interface with
the certificate management system.
The SEPP acquirer consists of a traditional acquirer with the addition of an
acquirer gateway and a merchant registration authority .
It is also used in SEPP for cardholder certificate authorization between the
certificate request server and the issuers. Bank net provider interface based
on ISO formatted message.
The merchant ware that incorporates SET will be provide online vendors
with seamless, fraud-resistant way to handle activities ranging from
displaying goods on-line, to settling credit card transaction via back office
link to banks.
SET requires that an individual possess a digital certificate for each credit
card that he or she plans to use.
The requirement may cause some management concerns for those user with
more than one credit card.
Microsoft unveiled Merchant Server ,a SET complaint internet commerce
product designed for business to consumer business to business web sales.
RSA data security has introduced a developer kit that compiles with SET
.the kit helps developers build SET capable application without building
from scratch and in supported by vendors.
SET does not use full text encryption because it would require too much
processing time.
Master card allied with GTE to develop n initiative for electronic
certification services also under the SET standard.
SET goals is not expected until 1998 or beyond there are several reason for
this.
Time is required to build consensus among a critical mass of users for
credit card usage, as well as to build a consensus among a critical mass of
usage for business-to-business web commerce.
It may take several years for technical specifications and implementations to
be installed, tested, and debugged.
It may take several years to address how web commerce should be
integrated into internal workflow processes for businesses, for instance,
handling internal transfer payments between business units of a company,
handling payments individuals and businesses.
Two to three years are needed to build confidence among participants that
secure electronic commerce transactions can, in fact, be made via the
Internet.
To rectify the situation the message digest is encrypt using a private key of
the sender (customer).This encryption of a message digest is called a digital
signature.
27
Interoperability:
For electronic commerce to take place ,customer must be able to
communicate with any merchant.
Interoperability is then achieved by using a particular set of publicly
announced algorithm and process in support of electronic commerce.
4.2 Payment and purchase order process:
Overview:
For an electronic payment to occur over the internet the following
transaction/process must occur.
Account holder registration
Merchant registration
Account holder (customer) ordering
Payment authorization
Account holder registration :
Account holder must register with a third party (TP)that corresponds to a
particular account type before they can transact with any merchant.
In order to register ,the account holder must have a copy of the TP‟s public
key of the public/private key set.
To register the account holder will most likely be required to fill out a from
requesting information such as name, address, account number, and other
identifying personal information when the form is completed the account
holder software will do the following.
29
Fig4.5(152)
1.Create and attach the account holder‟s public key to the form
2.Generate a message digest from the information
3.Encrypt the information and message digest using a secret key
4.Transmit all times to the TP
When the TP receives the account holder‟s request, it does the following
Fig 4.6(152)
Fig4.7(154)
Fig(4.8)155
Payment authorization:
The processing of an order ,the merchant will need a authorize(clear) the
transaction with the TP responsible for that particular account.
The authorization assures the merchant that the necessary funds or credit
limit is available to cover the cost of the order.
The merchant has no access to the customer account information since it
was encrypted using the TP‟s public key thus it is required that this
information be sent to the TP so that the merchant can receive payment
authorization from the TP and that the proper customer account is debited
for the transaction.
TP the following information using encryption and digital signature process
previously described:
Merchant‟s CD
Specific order information such as amount to be authorized order , number,
date.
Customers ID
Customers account information
After verifying the merchant , customer, and account information the TP
would then analyze the amount to be authorized.
32
Fig.4.9(160)
E-cash Interoperability:
Consumer must be able to transact with any merchant or bank .Hence
process and security standard must exit for all hardware and software used
in e-cash transaction.
Interoperability can only be achieved by adherence to algorithm and process
in support e- cash-initiate commerce
Electronic payment scheme:
The leading commercial electronic payment schemes that have
been proposed in the past few years and the companies using them .
Netscape.Netscape secure courier electronic payment scheme which has been
selected by intuit for secure payment between users of its quicken home
banking program and bank use SEPP.
Microsoft: Microsoft STT is similar to SEEP/SET in that it provides digital
signature and user authentication for securing electronic payments. STT is
an embellished version of Netscape„s SSL security tool and is compatible
with SSL version 2.0.
Check free: check freecorporation provides online payment processing service
to major clients
34
Fig 162
VeriSign: VeriSign is offering its digital signature technology for
authenticating as a component separated from encryption which allows for
export of stronger authentication.IBM is building support for digital ID into
its web browser and internet connection secure server for AIX and OS/2.
DigiCash:DigiCash is a software company whose products allow users to
purchase goods over the internet without using accredit card. The threat of
privacy loss(where expenses can be easily traced ) gave rice to the idea of
anonymous e-cash ,an electronic store of cash replacement funds which can
be loaded into a smart card for electronic purchase.
First virtual holding:It‟s targeting individuals and small business that want to
buy and sell on the internet but cannot afford an extensive on-line
infrastructure. A first virtual e-mail account and first virtual hosting system
to track and record the transfer of information ,products , and payment for
accounting and billing purpose ,consumer and merchant can buy and sell
goods on the internet without sensitive information such as credit card
number moving across the network. All sensitive information is delivered
by telephone.
35
Fig 165
Commerce Net: In 1993 a group of silicon valley entrepreneurs envisioned the
internet as a whole new model of commerce one defined around global
access alarge number of buyers and seller many tomany interaction and a
significantly accelerated pace of procurement anddevelopment they called
this model Spontaneous commerce.
Netcash :Netcash is the internet answer to traveler‟s check. To use Netcash user
must enter their checking account or credit card numbers into an on screen
form and e-mail it to the Netcash.
Other approach: This section lists a few other approaches that have appeared
in the recent past.
Mondexis based on smart cardtechnology initially backed by the united
kingdom‟s West minster and midland Banks. The electronic purse is a
handled smart card it remembers previous transaction and use RSA
cryptography.
Openmarket handles credit card transaction via web servers but it was planning
to provide support for debit cards checking account and corporate purchase
order.
Global online use on-line challenge/response. It is based on a third party
originating agreements therefore the seller has a higher cost to enter the
market.
Fig4.13(167)
Wallet and such:Even in the absence of standards(e.g., SET) vendors have
been developing system to handle sales over the internet and companies
willing to accept that the products are not interoperable can support business
before standard become widely deployed.