SlideShare une entreprise Scribd logo
1  sur  29
Electronic PaymentElectronic Payment
SystemsSystems
E-Com Unit – IIE-Com Unit – II
By:By:
Akhil KaushikAkhil Kaushik
Assistant Professor, T.I.T&S BhiwaniAssistant Professor, T.I.T&S Bhiwani
Electronic Payment
Systems
E-Com Unit – II
E- Transactions
• E-Transactions are any form of data transaction,
including financial and knowledge management.
This is a broad category that may include
applications, without limitation, for example: e-
billing, e-funds transfer, e-settlements, e-
payments, e-inventory management, e-enquiry and
response systems, e-identification management
and security services, e-monitoring and control
systems, and e-sourcing.
• A transactional unit of work is one in
which the following four fundamental
transactional properties are
satisfied: atomicity, consistency,
isolation, and durability (ACID).
These are discussed as below:
• Atomicity
• Consistency
• Isolation
• Durability
Transaction processing
• In computer science, transaction
processing is information processing that
is divided into individual, indivisible
operations, called transactions. Each
transaction must succeed or fail as a
complete unit; it cannot remain in an
intermediate state. Transaction
mandatorily requires acknowledgment to
get received as a necessary feedback for
accomplishment.
Basic principles of all
transaction-processing
systems
• Rollback Transaction
• Rollforward
• Deadlocks
• Compensating transaction
Transaction processing
has these benefits:
• It allows sharing of computer resources
among many users.
• It shifts the time of job processing to
when the computing resources are less
busy.
• It avoids idling the computing resources
without minute-by-minute human
interaction and supervision.
Updating Traditional
Transactions
• Cash
• Credit Card
• Personal Cheques (or Checks)
• Bank Checks
• Debit Cards
• Money Orders
• Traveler’s Cheques
• Tokens
Secure Online Transaction
Models
• This module looks the models that can be
employed for secure online transactions.
An organization may outsource or contract
with a third-party organizations like
electronic mail operators, Internet
Service Providers (ISP), etc to manage
servers, e-mail orders, website, etc; or
may use secure online transactions models
themselves
Secure Online Transaction
Models
• This module looks the models that can be
employed for secure online transactions.
An organization may outsource or contract
with a third-party organizations like
electronic mail operators, Internet
Service Providers (ISP), etc to manage
servers, e-mail orders, website, etc; or
may use secure online transactions models
themselves.
Steps needed for Secure
Online Transaction Models
• Secure Web Servers
• Secure Server Purchasing
• Secure Server Selling
• Required Hardware & Software
• Electronic Malls
Online Commercial
Environment
• The e-com organizations must provide
online commercial environment for its
clients. They must engineer and implement
a technique through which users can
browse through their products online,
purchase them and get delivered at the
same time in case of digital products.
The merchant’s website
should be able to collect
some information about the
customer like:
• Product delivery timings and address
• Transaction settlement
• Account activity reports
• Confirmations
• Order status reports
• Gathering of marketing information
for future needs
Digital Currencies &
Payment Systems
Digital currencies & payment systems are
intended to carry value in a protected
digital form over the internet. They are
actually a way of exchanging value for any
product or service.
There are basically 2 types
of approaches provided:
• One way is to link the customer payment method (credit
card, checking account, etc) to an online identity that is
managed by the service provider. It is the responsibility of
the third-party to validate the transactions by
authenticating the payee including his payment techniques
(checking credit card authenticity, amount in card, etc).
• Another way is to open an account with a financial
institution offering digital currency service. The client’s
software is used to withdraw money from the account,
check on balances; and maintain the ‘digital wallet’, which
holds the digital value for a customer. The cash is
exchanged by the use of encryption techniques and digital
signatures.
Electronic Finds Transfer
(EFT)
• Electronic Finds Transfer (EFT) is
defined as the “transfer of funds initiated
through an electronic terminal like
telephone, computer or magnetic tape so
as to order, instruct, or authorize a
financial institution to debit or credit
account”.
The transfer is information-
based & intangible. EFT can be
categorized into three:
• Banking & financial payments: Large scale
or wholesale payments (bank-to-bank
transfer), small scale payments like ATMS,
home banking like bill payments, etc.
• Retailing payments: Credit cards (Visa or
MasterCard), debit cards, charge cards
like American Express.
• Online e-com payments: Token based
payment systems (digicash, e-checks, etc).
Offline Secure Processing
Most of the e-com applications use online
payment processing and employ various
cryptographic techniques for securing data
transfer from one end to another.
Cryptography enables real-time transfer
of funds online. However, some developers
and entrepreneurs suggest that the
benefit of securing the data is actually
outweighed by the cost involved in
implementation.
The costs involved in encryption implementation
are as follows:
• License fees for patented certification
facilities.
• Creation & distribution of new internet
browsers & servers.
• Maintenance of public key certification
facilities.
• Increased computational overhead for
business transactions.
• Issues in using strong cryptography
outside U.S.A.
Private Data Networks
• Internet is an open network where
security is minimal; hence a lot of
bigger companies are afraid of using
internet for mission-critical business
operations. However, they still want
to be connected to the global world
to avoid distinction from world
economic map.
Requirment of Private Data Networks
A solution for these companies is the use of ‘Private
Data Networks’ to pass the data to & through
internet. Companies like CompuServe, Advantis,
AT&T, BBN Planet, etc have offered private data
networks for companies that are looking for a
large network but do want to build such a large
network. Hence, they just pay for the companies
to use private data network to get connected. The
distribution company will employ all the required
security parameters like firewalls, secure
browsers and e-com web servers for other
organizations and will charge monthly fees of
transaction fees from them
Security Protocols
• there are two main security
protocols, HTTPS and SSL for
secure transfer of funds online. I will
describe both one by one. However,
these days there is a new protocol
based on SSL known as Transport
Layer Security (TLS), also developed
by Netscape.
Secure Sockets Layer
(SSL):
• SSL comes in two options, simple and mutual. The
mutual version is more secure, but requires the user to
install a personal certificate in their browser in order
to authenticate them. Whatever strategy is used
(simple or mutual), the level of protection strongly
depends on the correctness of the implementation of
the web browser and the server software and the
actual cryptographic algorithms supported.
Transport Layer
Security (TLS)
• TLS is cryptographic protocols that provide
communication security over the Internet. TLS
and SSL encrypt the segments of network
connections above the Transport Layer, using
asymmetric cryptography for privacy and a keyed
message authentication code for message
reliability. Several versions of the protocols are
in widespread use in applications such as web
browsing, electronic mail, Internet faxing, instant
messaging and voice-over-IP (VoIP).
Applications of TLS
• In applications design, TLS is usually
implemented on top of any of the
Transport Layer protocols,
encapsulating the application-specific
protocols such as HTTP, FTP, SMTP,
NNTP and XMPP
Security :TLS has a variety
of security measures:
• Protection against a downgrade of the protocol to
a previous (less secure) version or a weaker cipher
suite.
• Numbering subsequent Application records with a
sequence number and using this sequence number
in the message authentication codes (MACs).
• Using a message digest enhanced with a key (so
only a key-holder can check the MAC).
• The message that ends the handshake
("Finished") sends a hash of all the exchanged
handshake messages seen by both parties.
Hypertext Transfer
Protocol Secure (HTTPS)
• HTTPS is a combination of the Hypertext
Transfer Protocol (HTTP) with SSL/TLS
protocol to provide encrypted
communication and secure identification of
a network web server. HTTPS connections
are often used for payment transactions
on the World Wide Web and for sensitive
transactions in corporate information
systems.
Main ideas of HTTPS
• The main idea of HTTPS is to create
a secure channel over an insecure
network. This ensures reasonable
protection from eavesdroppers and
man-in-the-middle attacks, provided
that adequate cipher suites are used
and that the server certificate is
verified and trusted.
T H A N K S

Contenu connexe

Tendances

I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructureRaj vardhan
 
Chapter 5 tech in e commerce
Chapter 5 tech in e commerceChapter 5 tech in e commerce
Chapter 5 tech in e commerceMarya Sholevar
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)rahul kundu
 
Advantages and disadvantages of e commerce
Advantages and disadvantages of e commerceAdvantages and disadvantages of e commerce
Advantages and disadvantages of e commerceShubha Sharma
 
Ecommerce and online publishing
Ecommerce and online publishingEcommerce and online publishing
Ecommerce and online publishingdeepshikharao1
 
overview of electronic payment system
overview of electronic payment system overview of electronic payment system
overview of electronic payment system Kavitha Ravi
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commercesajid ullah
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructureSovan Kundu
 
Unit 1 scope of ecommerce
Unit 1 scope of ecommerceUnit 1 scope of ecommerce
Unit 1 scope of ecommerceMonikaRivansh
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and ControlSyama Raveendran
 

Tendances (20)

I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Edi
EdiEdi
Edi
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Chapter 5 tech in e commerce
Chapter 5 tech in e commerceChapter 5 tech in e commerce
Chapter 5 tech in e commerce
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
E commerce unit 3
E commerce unit 3E commerce unit 3
E commerce unit 3
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
Advantages and disadvantages of e commerce
Advantages and disadvantages of e commerceAdvantages and disadvantages of e commerce
Advantages and disadvantages of e commerce
 
E commerce PPT
E commerce PPTE commerce PPT
E commerce PPT
 
E commerce (edi)
E commerce (edi)E commerce (edi)
E commerce (edi)
 
Ecommerce and online publishing
Ecommerce and online publishingEcommerce and online publishing
Ecommerce and online publishing
 
overview of electronic payment system
overview of electronic payment system overview of electronic payment system
overview of electronic payment system
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
E payment methodss
E payment methodssE payment methodss
E payment methodss
 
Unit 1 scope of ecommerce
Unit 1 scope of ecommerceUnit 1 scope of ecommerce
Unit 1 scope of ecommerce
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 

En vedette

Symfony 2 & e-commerce ecosystem - Now in english !
Symfony 2 & e-commerce ecosystem  - Now in english !Symfony 2 & e-commerce ecosystem  - Now in english !
Symfony 2 & e-commerce ecosystem - Now in english !Fabien Gasser
 
HTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTMLHTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTMLGrayzon Gonzales, LPT
 
Chapter one Overview of E-Commerce
Chapter one Overview of E-CommerceChapter one Overview of E-Commerce
Chapter one Overview of E-CommerceMarya Sholevar
 
Application of cloud computing based on e learning teaching tool
Application of cloud computing based on e learning teaching toolApplication of cloud computing based on e learning teaching tool
Application of cloud computing based on e learning teaching tooleSAT Journals
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
AI and Expert Systems
AI and Expert SystemsAI and Expert Systems
AI and Expert SystemsAkhil Kaushik
 
Intelligent Transportation Systems for a Smart City
Intelligent Transportation Systems for a Smart City Intelligent Transportation Systems for a Smart City
Intelligent Transportation Systems for a Smart City Charles Mok
 
Introduction to Genetic algorithms
Introduction to Genetic algorithmsIntroduction to Genetic algorithms
Introduction to Genetic algorithmsAkhil Kaushik
 
smart-city-application
smart-city-applicationsmart-city-application
smart-city-applicationNam Giang
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
HDLC & basic protocols
HDLC & basic protocolsHDLC & basic protocols
HDLC & basic protocolsAkhil Kaushik
 

En vedette (20)

Unit 4
Unit 4Unit 4
Unit 4
 
E commerce (2015-16) unit i
E commerce (2015-16) unit iE commerce (2015-16) unit i
E commerce (2015-16) unit i
 
E-Commerce 03
E-Commerce 03E-Commerce 03
E-Commerce 03
 
Ch02
Ch02Ch02
Ch02
 
Symfony 2 & e-commerce ecosystem - Now in english !
Symfony 2 & e-commerce ecosystem  - Now in english !Symfony 2 & e-commerce ecosystem  - Now in english !
Symfony 2 & e-commerce ecosystem - Now in english !
 
BASICS OF HTML
BASICS OF HTMLBASICS OF HTML
BASICS OF HTML
 
HTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTMLHTML Start Up - Introduction to HTML
HTML Start Up - Introduction to HTML
 
Chapter one Overview of E-Commerce
Chapter one Overview of E-CommerceChapter one Overview of E-Commerce
Chapter one Overview of E-Commerce
 
HTML basics
HTML basicsHTML basics
HTML basics
 
Application of cloud computing based on e learning teaching tool
Application of cloud computing based on e learning teaching toolApplication of cloud computing based on e learning teaching tool
Application of cloud computing based on e learning teaching tool
 
1 security goals
1   security goals1   security goals
1 security goals
 
AI and Expert Systems
AI and Expert SystemsAI and Expert Systems
AI and Expert Systems
 
Intelligent Transportation Systems for a Smart City
Intelligent Transportation Systems for a Smart City Intelligent Transportation Systems for a Smart City
Intelligent Transportation Systems for a Smart City
 
Effective googloing
Effective googloingEffective googloing
Effective googloing
 
Introduction to Genetic algorithms
Introduction to Genetic algorithmsIntroduction to Genetic algorithms
Introduction to Genetic algorithms
 
m-commerce-seminar-report
 m-commerce-seminar-report m-commerce-seminar-report
m-commerce-seminar-report
 
smart-city-application
smart-city-applicationsmart-city-application
smart-city-application
 
Unit 2
Unit 2Unit 2
Unit 2
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
HDLC & basic protocols
HDLC & basic protocolsHDLC & basic protocols
HDLC & basic protocols
 

Similaire à E commerce unit 2

Lecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptxLecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptxAmanyaLaban
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online bankingAbhilash Kallayil
 
E business system 2nd module.pdf
E business system 2nd module.pdfE business system 2nd module.pdf
E business system 2nd module.pdfAsiAsifMuhammad
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section imail4me
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Heather Vargas
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsNaveed Zahoor
 
Blockchain Technology.ppt
Blockchain Technology.pptBlockchain Technology.ppt
Blockchain Technology.pptssuserc17add
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyHikaru34
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - finalAlex Tan
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryGoutama Bachtiar
 
ELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptxELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptxAnupmaMunshi
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)華穗 徐
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
General requirements-for-e-commerce
General requirements-for-e-commerceGeneral requirements-for-e-commerce
General requirements-for-e-commercesumasicm
 

Similaire à E commerce unit 2 (20)

Lecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptxLecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptx
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 
E business system 2nd module.pdf
E business system 2nd module.pdfE business system 2nd module.pdf
E business system 2nd module.pdf
 
Chapter 9 section i
Chapter 9 section iChapter 9 section i
Chapter 9 section i
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
 
Blockchain Technology.ppt
Blockchain Technology.pptBlockchain Technology.ppt
Blockchain Technology.ppt
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
E commerce
E commerceE commerce
E commerce
 
ELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptxELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptx
 
E commerce
E commerceE commerce
E commerce
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
EDI,SWIFT,EFT etc
EDI,SWIFT,EFT etcEDI,SWIFT,EFT etc
EDI,SWIFT,EFT etc
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
General requirements-for-e-commerce
General requirements-for-e-commerceGeneral requirements-for-e-commerce
General requirements-for-e-commerce
 

Plus de Akhil Kaushik

Interactive teaching methodologies
Interactive teaching methodologiesInteractive teaching methodologies
Interactive teaching methodologiesAkhil Kaushik
 
Role of media in rural society
Role of media in rural societyRole of media in rural society
Role of media in rural societyAkhil Kaushik
 
E-com, E-payment & EDI
E-com, E-payment & EDIE-com, E-payment & EDI
E-com, E-payment & EDIAkhil Kaushik
 
Compiler Design Basics
Compiler Design BasicsCompiler Design Basics
Compiler Design BasicsAkhil Kaushik
 
Computer Networking basics
Computer Networking basicsComputer Networking basics
Computer Networking basicsAkhil Kaushik
 
An eye opener on female foeticide
An eye opener on female foeticideAn eye opener on female foeticide
An eye opener on female foeticideAkhil Kaushik
 

Plus de Akhil Kaushik (8)

Interactive teaching methodologies
Interactive teaching methodologiesInteractive teaching methodologies
Interactive teaching methodologies
 
Role of media in rural society
Role of media in rural societyRole of media in rural society
Role of media in rural society
 
Multimedia Basics
Multimedia BasicsMultimedia Basics
Multimedia Basics
 
E-com, E-payment & EDI
E-com, E-payment & EDIE-com, E-payment & EDI
E-com, E-payment & EDI
 
Compiler Design Basics
Compiler Design BasicsCompiler Design Basics
Compiler Design Basics
 
Computer Networking basics
Computer Networking basicsComputer Networking basics
Computer Networking basics
 
ARPANET
ARPANETARPANET
ARPANET
 
An eye opener on female foeticide
An eye opener on female foeticideAn eye opener on female foeticide
An eye opener on female foeticide
 

Dernier

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Dernier (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

E commerce unit 2

  • 1. Electronic PaymentElectronic Payment SystemsSystems E-Com Unit – IIE-Com Unit – II By:By: Akhil KaushikAkhil Kaushik Assistant Professor, T.I.T&S BhiwaniAssistant Professor, T.I.T&S Bhiwani
  • 3. E- Transactions • E-Transactions are any form of data transaction, including financial and knowledge management. This is a broad category that may include applications, without limitation, for example: e- billing, e-funds transfer, e-settlements, e- payments, e-inventory management, e-enquiry and response systems, e-identification management and security services, e-monitoring and control systems, and e-sourcing.
  • 4. • A transactional unit of work is one in which the following four fundamental transactional properties are satisfied: atomicity, consistency, isolation, and durability (ACID). These are discussed as below: • Atomicity • Consistency • Isolation • Durability
  • 5. Transaction processing • In computer science, transaction processing is information processing that is divided into individual, indivisible operations, called transactions. Each transaction must succeed or fail as a complete unit; it cannot remain in an intermediate state. Transaction mandatorily requires acknowledgment to get received as a necessary feedback for accomplishment.
  • 6. Basic principles of all transaction-processing systems • Rollback Transaction • Rollforward • Deadlocks • Compensating transaction
  • 7. Transaction processing has these benefits: • It allows sharing of computer resources among many users. • It shifts the time of job processing to when the computing resources are less busy. • It avoids idling the computing resources without minute-by-minute human interaction and supervision.
  • 8. Updating Traditional Transactions • Cash • Credit Card • Personal Cheques (or Checks) • Bank Checks • Debit Cards • Money Orders • Traveler’s Cheques • Tokens
  • 9. Secure Online Transaction Models • This module looks the models that can be employed for secure online transactions. An organization may outsource or contract with a third-party organizations like electronic mail operators, Internet Service Providers (ISP), etc to manage servers, e-mail orders, website, etc; or may use secure online transactions models themselves
  • 10. Secure Online Transaction Models • This module looks the models that can be employed for secure online transactions. An organization may outsource or contract with a third-party organizations like electronic mail operators, Internet Service Providers (ISP), etc to manage servers, e-mail orders, website, etc; or may use secure online transactions models themselves.
  • 11. Steps needed for Secure Online Transaction Models • Secure Web Servers • Secure Server Purchasing • Secure Server Selling • Required Hardware & Software • Electronic Malls
  • 12. Online Commercial Environment • The e-com organizations must provide online commercial environment for its clients. They must engineer and implement a technique through which users can browse through their products online, purchase them and get delivered at the same time in case of digital products.
  • 13. The merchant’s website should be able to collect some information about the customer like: • Product delivery timings and address • Transaction settlement • Account activity reports • Confirmations • Order status reports • Gathering of marketing information for future needs
  • 14. Digital Currencies & Payment Systems Digital currencies & payment systems are intended to carry value in a protected digital form over the internet. They are actually a way of exchanging value for any product or service.
  • 15. There are basically 2 types of approaches provided: • One way is to link the customer payment method (credit card, checking account, etc) to an online identity that is managed by the service provider. It is the responsibility of the third-party to validate the transactions by authenticating the payee including his payment techniques (checking credit card authenticity, amount in card, etc). • Another way is to open an account with a financial institution offering digital currency service. The client’s software is used to withdraw money from the account, check on balances; and maintain the ‘digital wallet’, which holds the digital value for a customer. The cash is exchanged by the use of encryption techniques and digital signatures.
  • 16. Electronic Finds Transfer (EFT) • Electronic Finds Transfer (EFT) is defined as the “transfer of funds initiated through an electronic terminal like telephone, computer or magnetic tape so as to order, instruct, or authorize a financial institution to debit or credit account”.
  • 17. The transfer is information- based & intangible. EFT can be categorized into three: • Banking & financial payments: Large scale or wholesale payments (bank-to-bank transfer), small scale payments like ATMS, home banking like bill payments, etc. • Retailing payments: Credit cards (Visa or MasterCard), debit cards, charge cards like American Express. • Online e-com payments: Token based payment systems (digicash, e-checks, etc).
  • 18. Offline Secure Processing Most of the e-com applications use online payment processing and employ various cryptographic techniques for securing data transfer from one end to another. Cryptography enables real-time transfer of funds online. However, some developers and entrepreneurs suggest that the benefit of securing the data is actually outweighed by the cost involved in implementation.
  • 19. The costs involved in encryption implementation are as follows: • License fees for patented certification facilities. • Creation & distribution of new internet browsers & servers. • Maintenance of public key certification facilities. • Increased computational overhead for business transactions. • Issues in using strong cryptography outside U.S.A.
  • 20. Private Data Networks • Internet is an open network where security is minimal; hence a lot of bigger companies are afraid of using internet for mission-critical business operations. However, they still want to be connected to the global world to avoid distinction from world economic map.
  • 21. Requirment of Private Data Networks A solution for these companies is the use of ‘Private Data Networks’ to pass the data to & through internet. Companies like CompuServe, Advantis, AT&T, BBN Planet, etc have offered private data networks for companies that are looking for a large network but do want to build such a large network. Hence, they just pay for the companies to use private data network to get connected. The distribution company will employ all the required security parameters like firewalls, secure browsers and e-com web servers for other organizations and will charge monthly fees of transaction fees from them
  • 22. Security Protocols • there are two main security protocols, HTTPS and SSL for secure transfer of funds online. I will describe both one by one. However, these days there is a new protocol based on SSL known as Transport Layer Security (TLS), also developed by Netscape.
  • 23. Secure Sockets Layer (SSL): • SSL comes in two options, simple and mutual. The mutual version is more secure, but requires the user to install a personal certificate in their browser in order to authenticate them. Whatever strategy is used (simple or mutual), the level of protection strongly depends on the correctness of the implementation of the web browser and the server software and the actual cryptographic algorithms supported.
  • 24. Transport Layer Security (TLS) • TLS is cryptographic protocols that provide communication security over the Internet. TLS and SSL encrypt the segments of network connections above the Transport Layer, using asymmetric cryptography for privacy and a keyed message authentication code for message reliability. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).
  • 25. Applications of TLS • In applications design, TLS is usually implemented on top of any of the Transport Layer protocols, encapsulating the application-specific protocols such as HTTP, FTP, SMTP, NNTP and XMPP
  • 26. Security :TLS has a variety of security measures: • Protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite. • Numbering subsequent Application records with a sequence number and using this sequence number in the message authentication codes (MACs). • Using a message digest enhanced with a key (so only a key-holder can check the MAC). • The message that ends the handshake ("Finished") sends a hash of all the exchanged handshake messages seen by both parties.
  • 27. Hypertext Transfer Protocol Secure (HTTPS) • HTTPS is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems.
  • 28. Main ideas of HTTPS • The main idea of HTTPS is to create a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.
  • 29. T H A N K S