Online Electronic Payment System Using PREDICT II Protocol Mid Term Project Presentation 6 th September, 2001 By Nishanth Menon 98m11, S 6 MCA.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

PKIX BASED CERTIFICATION INFRASTRUCTURE IMPLEMENTATION ADAPTED TO NON PERSONAL END ENTITIES Jacob E., Liberal F., Unzilla J. {jtpjatae, jtplimaf,
Security Controls and Systems in E-Commerce
Proprietary © ARRAY Development Slide 1 of 14 Contract*Admin GOL Client Departments PWGSC Systems Contract.
Enabling Secure Internet Access with ISA Server
Overview Environment for Internet database connectivity
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
CLINIC MANAGEMENT SYSTEM
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
CCNA – Network Fundamentals
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Make Secure Information Sharing (SIS) Easy and an Reality C. Edward Chow, PI Osama Khaleel Bill Kretschmer C. Edward Chow, PI Osama Khaleel Bill Kretschmer.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
1 Enabling Secure Internet Access with ISA Server.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
CSCI 6962: Server-side Design and Programming
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Real Security InterSwyft Technical information's.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Windows 2000 Web and Application Services CIS 485 Tsungfan Chou.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
OSIA Portal 2009 Mid-Term Presentation Nazim Öztahtaci Jiawei Chen Parvinder Gill Ye Tian Xin Guo Communication System Design 2009 Fall Mid-Term Workshop.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Resource Management and Accounting Working Group Working Group Scope and Components Progress made Current issues being worked Next steps Discussions involving.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
MACIASZEK, L.A. (2001): Requirements Analysis and System Design. Developing Information Systems with UML, Addison Wesley Chapter 6 - Tutorial Guided Tutorial.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Module 1: Configuring Windows Server Module Overview Describe Windows Server 2008 roles Describe Windows Server 2008 features Describe Windows Server.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Eduroam Monitoring Probes Scott Armitage. eduroam Monitor Probe Development Prototype Raspberry Pi ( £26 ) Dlink DWA160 ( £20 ) 4GB SD Card ( £7 )
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Linux Operations and Administration
WEB SERVER SOFTWARE FEATURE SETS
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
An Internet Voting System Manager Yonghua Li Kansas State University October 14, 2002 MSE Project - Phase 3.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
Electronic Payment Security Technologies
Presentation transcript:

Online Electronic Payment System Using PREDICT II Protocol Mid Term Project Presentation 6 th September, 2001 By Nishanth Menon 98m11, S 6 MCA

2 C ontents Problem statement Use case view Database design General package layout Test plan Deployment diagram Implementation so far Development platform

3 P roblem Statement The objective of this project is to create a scalable model of an online electronic payment system, allowing authorized users to access and utilize their wealth from anywhere in the Internet using the PRotocol Enhancement of DIgital Cash Transaction- II protocol.

4 P roblem Statement.Contd.. Inputs. User Information – name, Pass Phrase etc. Amount of Cash to be transacted. The IP of the Zone Server. The IP and optionally the port of the Server socket of the remote client software. The Key Generation information (including no: bits RSA Key, Hashing algorithm for the password storage and other configuration information). Outputs. Transaction Result–Whether completed or aborted etc. Passbook format Transaction information. Complete transaction information. Personal information of authorized client.

5 E ntire System Use Case Diagram

6 C lient Use Case Diagram

7 Z one Server Use Case Diagram

8 M aster Server Use Case

9 D atabase Design IdentifierInformation- Brahma DB Password – Kuberan DB PersonalInformation- Kuberan DB TransactionInformation – Kuberan DB

10 G eneral Package Layout

11 T est Plan Main operation (function) in every class - allows for separate testing of each class. Functional tests –shows I/P and O/P of each method for given set of values. Stress tests & boundary tests. Integration tests.

12 D eployment Diagram

13 I mplementation So Far Prototypes for the networking and database package have been tested. Encryption package (crypto) is fully implemented and tested. HTTPS server setup complete.

14 D evelopment Platforms Operating System – RH Linux 7.1 and Windows 2000 (JDK1.3 support) Language – JDK1.3.1, Perl (Server Side CGI) Database – Oracle 8i

G etting All the Keys

PR otocol E nhancement for DI gital C ash T ransaction- II Zone 1 SERVER MASTER SERVER Zone 2 SERVER Receiver Sender 1 Cash Transmit 6 Deposit Confirm 2 Cash Forward 3 Cash Deposit 4 Deposit Acknowledge 5 Deposit Acknowledge Forward 10 Confirm Acknowledge Or Reject Confirm 9 Confirm Request 7 Reject / Status Check 11 Transact Complete 11 Transact Complete 8 Status Confirm

K uberan handle Cash token