استخدام آلية التواجد الجغرافي في التجارة الإلكترونية لمنع الاحتيال في بطاقات الائتمان.

Slides:



Advertisements
Similar presentations
Your Trade Exchange And
Advertisements

Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
1 IDX. 2 What you will learn: What IDX is Why its important How to use it Tips and tricks Introduction Q & A.
Credit Card Processing 101
Tomorrows Technology For Todays Business. McAfee.com Background Internets largest consumer ASP Online security, privacy and PC management services Largest.
Weighing the Risks and Benefits of Online Financial Transactions
The creation of "Yaolan.com" A Site for Pre-natal and Parenting Education in Chinese by James Caldwell DAE Interactive Marketing a Web Connection Company.
First Ecom Global E-Payment Processing
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
M.B.A. II SEMESTER Course No. 208 Paper No. – XVI E-Business Dr.N.C.Dhande Unit II e-business frameworks e-selling process, e-buying, e-procurement, e-payments:
Presented by Brad Jacobson The Publisher on the Web Exploiting the new online sales channels.
The Loyalty Card Program
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Risk Management Case Study. agenda Firm Overview Case Study – Risk Management Q&A.
1. e-Payment Challenges e-Government's Challenges Symposium April 2005 Inter-continental Hotel Mamoun Eregat Sales & Marketing Manager Afkar Information.
SystemCheck for TestNav. Agenda 2 SystemCheck for TestNav – Overview – iPads and Chromebooks – Accessing SystemCheck SystemCheck – Check Your System Proctor.
Centralized Returns.
E-ordering and e-invoicing through OB10 portal
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
Chapter 19 Network Layer: Logical Addressing Stephen Kim.
LECTURE 7 REF: CHAPTER 11 ELECTRONIC COMMERCE PAYMENT SYSTEMS PREPARED BY : L. Nouf Almujally Copyright © 2010 Pearson Education, Inc. 1.
©2008 TTW Where “Lean” principles are considered common sense and are implemented with a passion! Product Training Credit Cards.
Address Verification Service (AVS). Introduction Introduction o The internet Address Verification System (I-AVS) is a business service for resolving the.
Electronic Transaction Security (E-Commerce)
Process Management and Control and Physical Inventory SAP Implementation
SAP R/3 Materials Management Module
Credit Card And Prepaid Process Edward M. Kwang President.
E-Commerce Michael Andrianus – Vincentius
Web Payments via Christopher Woods Aaron Buma. Agenda  Introduction  About it  Why to use it  Services they Provide  Seller Protection  Ebay Aspect.
Welcome to Galileo Concierge Live! On the Map… “It’s all about Location!” Russ Holm Supplier Training Manager May 9, 2007.
XP Tutorial 14 New Perspectives on HTML, XHTML, and DHTML, Comprehensive 1 Working with Forms and Regular Expressions Validating a Web Form with JavaScript.
Tutorial 14 Working with Forms and Regular Expressions.
NetService Cardholder Tutorial GE Corporate Payment Services 4246 South Riverboat Road Salt Lake City, Utah Copyright Information.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
Address Verification Service (AVS). Introduction Introduction o The internet Address Verification System (I-AVS) is a business service for resolving the.
Digital Assessment Training Trainer: Name
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
Near East University Department of Computer Engineering E-COMMERCE FOR LAPTOPS SELLING COMPANY Abdul Halim Abu Kuwaik
System Development Lifecycle Verification and Validation.
1 Kyung Hee University Chapter 18 Domain Name System.
13-1 COBOL for the 21 st Century Nancy Stern Hofstra University Robert A. Stern Nassau Community College James P. Ley University of Wisconsin-Stout (Emeritus)
Sequential Files Chapter 13. Master Files Set of files used to store companies data in areas like payroll, inventory Set of files used to store companies.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
13-1 Sequential File Processing Chapter Chapter Contents Overview of Sequential File Processing Sequential File Updating - Creating a New Master.
Real-time Intelligence that Matters 1. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business 53% of consumers who experienced.
13- 1 Chapter 13.  Overview of Sequential File Processing  Sequential File Updating - Creating a New Master File  Validity Checking in Update Procedures.
Checking Account & Debit Card Understanding Checking Accounts and Debit Card Transactions.
XP Tutorial 7 New Perspectives on JavaScript, Comprehensive 1 Working with Forms and Regular Expressions Validating a Web Form with JavaScript.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
INTRODUCTION E-COMMERCE.
Regular Payments First and Subsequent Payments
Donation form optimisation Glyn Thomas
Express Checkout January 2013.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.
What is Commerce According to Dictionary.com
WorldWidePIN Corporation
Product Training Credit Cards
Electronic Commerce Payment Systems
Submitting a Marketplace application form
Presentation transcript:

استخدام آلية التواجد الجغرافي في التجارة الإلكترونية لمنع الاحتيال في بطاقات الائتمان

Preventing Credit Card Fraud in E-Commerce Using the Geo-location, Credit Card Number and Type Validations and Address Verification Service Techniques By Rania Abdulrahman Molla

A Thesis submitted to King Abdul Aziz University, in partial fulfillment of the requirements for the degree of Master of science in Computer Science.

Agenda 1. Introduction 2. Objectives 3. Geo-location Technique 4. Credit Card Number Validation 5. Credit Card Type Validation 6. Address Verification Service (AVS) 7. Implementation Model 8. Conclusion 9. Future Work 10. Acknowledgment

Introduction Since 1995, online credit card fraud has increased by 369%. Since 1995, online credit card fraud has increased by 369%. In 2001, 61.8$ billion were spent on online sales, 1.4% of it (about 700,000,000$) was lost to fraud. 1 In 2001, 61.8$ billion were spent on online sales, 1.4% of it (about 700,000,000$) was lost to fraud. 1 History of Online Fraud History of Online Fraud o Use of Famous Names o Credit Card Generators o Order Hijacking o 1998 – Dummy Websites o Consumer Accounts o 2000 – Online Gangs and Fraud Rings 1 Credit Card Fraud Prevention using.NET Framework in C# or VB.NET, by Ivy Tang January 16,2006

The True Cost of Fraud

Objectives Reduce online credit card fraud. Reduce online credit card fraud. 1 Investigate and identify the techniques used for preventing online credit card fraud 2 Design card fraud model 2.1 Locating site (Detecting) 2.1 Locating site (Detecting) 2.2 Validate card number 2.2 Validate card number 2.3 Validate card type 2.3 Validate card type 2.4 AVS 2.4 AVS 3 Implement card fraud model 3.1 Locating site (Detecting) 3.1 Locating site (Detecting) 3.2 Validate card number 3.2 Validate card number 3.3 Validate card type 3.3 Validate card type 3.4 AVS 3.4 AVS

Geo-location Technique

Introduction Introduction o According to Cyber Source, e-retail merchants have lost over 2.6$ billion dollars to online payment fraud, and this loss will increase by 37% in the year o Geo-location Service was found in January 2000 by Quova, Inc., which is a solution for online fraud.

Geo-location Technique What is Geo-location ? What is Geo-location ? A web geography technology that instantly determines an online customers geographic location- from country level down to city precision. Geo-location Benefits Geo-location Benefits 1- Effectiveness 2- Fraud Detection 3- Digital Rights Management 4- Regulatory Compliance

Geo-location Technique Applications that uses Geo-location Technique: Applications that uses Geo-location Technique: 1- Financial Services 2- E-Commerce 3- Government 4- Media Distribution a- Live Sports Web Casts b- Digital Movies c- Digital Music 5- Online Gaming

Geo-location Technique Geo-location Studies Geo-location Studies o The most recent study was done in 2004 by a leading provider of automated identity verification, called LexisNexis RiskWise. o LexisNexis RiskWise analyzed tens of thousands of online credit card purchase using the geo-location technology, and found that : o 75% of all fraudulent online orders originated outside the US. o 97.9% of all transactions originating in Africa were fraudulent. o 74.8% of all transactions originating in Asia (including Russia) were fraudulent. o 64.4% of all transactions routed via satellite were fraudulent.

Geo-location Technique Geo-location Studies – (continued) Geo-location Studies – (continued) o In over 85% of all fraudulent orders, the customers billing address did not match the state from which the order was actually placed, while only 28% of legitimate orders displayed a state-level mismatch. o Another study done by Experian have found that when the IP origination point of an online order is in a different state from the customers billing address, the transaction turns out to be fraudulent 68% of the time.

Geo-location Technique Geo-location technique Types: Geo-location technique Types: 1 Quova Technique. 2 IP2Location Technique. 3 Other..

Quova Technique Quovas Geo-location Architecture Overview Quovas Geo-location Architecture Overview 1- Global Data Collection Network (DCN). 1- Global Data Collection Network (DCN). 2- Geo-Point Data Delivery Server (DDS). 3- Closed Loop Methodolgy.

Quova Technique Global Data Collection Network (DCN) Global Data Collection Network (DCN) o Largest IP geo-location data collection network in the world. o Collects 1.4 billion active IP addresses. o There are 16 agents which are globally distributed around the world.

Quova Technique GeoPoint Data Delivery Server (DDS) GeoPoint Data Delivery Server (DDS) o Collected data are passed to the DDS, which allows integration of real-time geo-location information with any online web-based application. o Applications have access to the GeoPoint DDS geo-location information, to provide geo-location information about an IP address (Web visitor).

Quova Technique GeoPoint Data Delivery Server (DDS)- (Continued) GeoPoint Data Delivery Server (DDS)- (Continued) o Each GeoPoint DDS contains a local copy of the IP geo- location data, which is automatically updated on a regular basis from the data center. o GeoPoint DDS automatically sends the received geol- location information back to Quova in order to improve the quality of Quovas services and to enable additional research.

IP2Location Technique

Current Study in Geo-location

IP2Location Algorithm

IP2Location Technique Algorithm Steps: Algorithm Steps: 1 Detect IP Address. 2 Convert IP Address to IP Number. 3 Search by IP Number 4 Credit Card Number validation. 5 Credit Card Type Validation. 6 AVS

IP2Location Database Format COULMN NUMBERCOULMN DESCRIPTION 1Beginning IP number 2Ending IP number 3Country Code (ISO 3166) (2 characters) 4Full Country name 5Region 6City 7Latitude 8Longitude 9Zip Code 10ISP 11Domain Name

IP2Location Database Example COULMN NUMBER COULMN DESCRIPTIONCOLUMN VALUES 1Beginning IP number Ending IP number Country Code (ISO 3166) (2 characters)US 4Full Country nameUNITED STATES 5RegionSOUTH CAROLINA 6CityGEORGETOWN 7Latitude Longitude Zip Code ISPCITY OF GEORGETOWN 11Domain NameCITYOFGEORGETO WN.COM

IP2Location Database Specification FIELD #FIELD NAMEDATA TYPEFIELD DESCRIPTION 1IP_FROMNUMERICAL (DOUBLE) Beginning of IP address range. The data is represented in IP number format 2IP_TONUMERICAL (DOUBLE) Ending of IP address range. The data is represented in IP number format. 3COUNTRY_CODECHAR(2)Two-character country code based on ISO COUNTRY_NAMEVARCHAR(64)Country name based on ISO REGIONVARCHAR(128)Region name 6CITYVARCHAR(128)City name

FIELD #FIELD NAMEDATA TYPEFIELD DESCRIPTION 7LATITUDENUMERICAL (DOUBLE) City latitude. Default to capital city latitude if city is unknown. 8LONGITUDENUMERICAL (DOUBLE) City longitude. Default to capital city longitude if city is unknown. 9ZIPCODECHAR(5)Five-digit ZIP codes for US cities only. 10ISP_NAMEVARCHAR(256)Internet Service Provider registered under the IP address range. 11DOMAIN_NAMEVARCHAR(128)Domain name assigned to Internet network. IP2Location Database Specification

Method of Converting IP Address into IP Number IP Number = (256) 3 * W + (256) 2 * X * Y + Z Where: W: the first block of numbers in the IP address. X: the second block of numbers in the IP address. Y: the third block of numbers in the IP address. Z: the forth block of numbers in the IP address.

IP Address = IP Number = (256) 3 * 4 + (256) 2 * * = Example of Converting IP Address into IP Number

Credit Card Number Validation

Validation Algorithm Validation Algorithm o In order to validate and verify the credit card number, a special algorithm called (MOD 10 Check) or (LUHN Formula) is used. o The MOD 10 Check takes the provided credit card number from the customer and validates that the number is in the correct range and format to be a credit card number and it is the type of credit card the customer says it is.

Credit Card Number Validation o MOD 10 Check does not tell if the credit card number is active or not, just that it is in the correct format. o This test is used on websites to validate that the credit card submitted is a recognizable credit card number. o It helps preventing processing credit card authorizations on numbers that could not possibly be credit cards.

Credit Card Number Validation Credit Card Number Validation Algorithm Credit Card Number Validation Algorithm Step 1. Double the value of alternating digits, starting from the second to last digit of the credit card number. Step 2. Add the separate digits of the product from the previous step. Step 3. Add the uneffected digits of the credit card number. Step 4. Add the results from step2 and step3 and divide the total by 10, if the remainder was zero, then its a valid number

Credit Card Number Validation o Example Step1: Starting with the second to last digit and moving left, Double the value of all alternating digits. For example: if we have a credit card with the following number we will do the following: x 2 = 14 5 x 2 = 10 3 x 2 = 6 1 x 2 = 2 7 x 2 = 14 5 x 2 = 10 3 x 2 = 6 1 x 2 = 2

Credit Card Number Validation Step2: Add the separate digits of the products from step1. (1+4) + (1+0) + (6) + (2) + (1+4) + (1+0) + (6) + (2) = 28 Step3: Add all the unaffected digits (the digits that we did not double) = 32 Step4: Add the results from step 2 and step3, and divide by = 60 If the result is divisible by 10, then the credit card number is valid.

Credit Card Number Validation Sequence Diagram Sequence Diagram

Credit Card Type Validation

o It verifies whether that the customer has provided the correct credit card type o All Credit Cards have specific number length and numerical prefix. Card TypePrefixNumber Length Master Card VISA413 or 16 American Express34 or 3715 Diners Club/Carte Blanche , 36, 3814 enRoute2014, Discover JCB316 JCB2131,

Credit Card Type Validation Credit Card Type Validation Algorithm Credit Card Type Validation Algorithm

Credit Card Type Validation Sequence Diagram Sequence Diagram

Credit Card Type and Number Validations Model Activity Diagram Model Activity Diagram