Download presentation
Presentation is loading. Please wait.
Published byRosemary Allison Modified over 9 years ago
2
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly for financial market. –Areas of specializations –Platforms: Windows (95, NT, 2000,2003); –Technical expertise: MSSQL Server, Sybase, Oracle, C, C++, Visual C++/Basic/C#, MS Interdev, ASP, IIS, BC++, Delphi. Microsoft business partner (product integration partnership member) Compaq/HP business partner
3
System Security The most advanced security systems used nowadays : Public Key Infrastructure –SSL 3; –RSA public keys modulo 1024 bits; –Sha1 algorithm for thumbprint; –Digital Certificates (with time stamp); –Dynamic key exchange; –128 bits – Cipher Strength; –Client and Bank authentification … so we know with whom we talk and you also … Network protocol separation; SQL Protection steps
4
The Concept of Three - Tier Architecture Benefits –Common interface to heterogeneous data stores; –Software and hardware scalability without affecting system performance; –System reliability and maintainability; –Increased data security; –Business logic sharing. Application Server Data Logic Business Logic Web based forms Data Stores Used by our Internet Service
5
Internet Banking Architecture Browser Bank’s Database Web Servers BackOffice Application Customer databases SQL Servers BackOffice Database : Clients
6
Data flow One information unit named “electronic message”; –flexible structure with pairs; –easy and fast transfer; Two-phase data transfer; –Import of incoming messages from customer database; –Export of outgoing messages from bank’s database system; Flow control and monitoring done by BackOffice application.
7
Presentation layer Only an Internet browser is required; Enhanced security mechanism through Secured Socket Layer protocol; Dynamic Web pages through DHTML and ASP technology; Full customization. BrowserWeb Server request URL Web page Customer database SQL query Query results
8
Business layer Provides services to the presentation and data layers –Bi-directional transfer of electronic messages; –Deployment of basic banking information to customer database; –Customer registration and access control; Enforces customer business rules –Data checking and validation; –Signature mechanism for customer operations; Enforces bank business rules –Data checking and validation; –Acceptance mechanism for customer transactions; –Translate transaction data to and from specific formats. Bank SideBackOffice ApplicationCustomer side
9
Electronic Message Processing Logic Chain of states to control message evolution –Uncompleted : not successfully transferred; –Unprocessed : completely imported; –Refused by user : rejected by authorized bank personnel; –Accepted : accepted by authorized bank personnel; –Refused by app : not successfully processed; –Transferred : successfully processed; Special authorized mechanism to change manually message status ; Configurable mask of valid states for a message.
10
Internet Banking Conclusions Full access to bank services with minimum hardware and software configuration for customer; Total location independence for the customers; Maximum security through access control, encryption and authentication; Customizable application core; Customizable user interface through Web power.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.