_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University URL: May,
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Payment Methods Prepared By William Cheung COMP3610 (Fall 2001) CS, HKBU.
Cryptography and Network Security Chapter 17
Micro-Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University URL:
Electronic Check Payment Protocols and Systems
1 Pertemuan 6 Transaksi Dokumen dan pembayaran Elektronik Matakuliah: H0292 / E-Business Tahun: 2005 Versi: v0 / Revisi 1.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 3 Virtual Money.
Chapter 8 Web Security.
“Electronic Payment System”
Digital Payment Systems
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Traditional and Electronic Payment Methods Chapter 3.
Supporting Technologies III: Security 11/16 Lecture Notes.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Electronic Payment Systems
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Electronic Payment Systems
Secure Electronic Transaction (SET)
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Traditional and Electronic Payment Methods Chapter 3.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Lecture 8 e-money. Today Secure Electronic Transaction (SET) CyberCash On line payment system using e-money ECash NetCash MilliCent CyberCoin.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Figure 15.1 Conventional Cryptography
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Module 9 Micropayment systems. Properties of micropayment systems Micropayments do not have a real-world cash equivalent – cash cannot be divided into.
CIS-325: Data Communications1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Chapter 8 Electronic Payment Systems and Security 1.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Fall 2000C.Watters1 World Wide Web and E-Commerce Internet Payment Schemes.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Henric Johnson1 Secure Electronic Transactions An open encryption and security specification. Protect credit card transaction on the Internet. Companies.
Chapter 7 - Secure Socket Layer (SSL)
Cryptography and Network Security
Cryptography and Network Security
Secure Electronic Transaction (SET) University of Windsor
Cryptography and Network Security
Presentation transcript:

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1  Wiley and the book authors, 2001 E-Commerce: Fundamentals and Applications Chapter 10 : Internet Payment Systems

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications2  Wiley and the book authors, 2001 Outline Features of payment methods 4 C’s payment methods Credit card payment E-cash E-check Micropayment: Millicent and Paywords Smart card payment

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications3  Wiley and the book authors, 2001 Comparison of the 4C’s Payment Methods CashCredit cardCheckCredit/debit AnonymityYes, in generalNo Overhead costLowest, in generalHigher than cash and credit/debit because of the paper work involved Highest, in general Low DivisibilityNot completely divisible Yes AcceptabilityYes, in general No, in general it can only be used locally SecurityGood TransferabilityYesNo

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications4  Wiley and the book authors, 2001 Credit card payment Most popular payment method Especially for B2C e-commerce 1st generation: No protection, only provide credit card number for processing 2nd generation: SSL for protecting the transfer of credit card information 3rd generation: SET for secure credit card authorization 4th generation: Portable smart cards?

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications5  Wiley and the book authors, 2001 SET: Seven business requirements (according to SET Book 1) Provide confidentiality of payment information Ensure the integrity of all transmitted data Provide cardholder’s authentication Provide merchant’s authentication Ensure the use of the best security practices and system design techniques Create a protocol that is independent on the transport layer protocol Facilitate interoperability (Please read Book 1: Business Description at

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications6  Wiley and the book authors, 2001 Network Architecture of SET System Merchant Certificate authority Payment gateway/ Acquirer Internet Authorization and Capture Existing financial network Authorization and Capture Issuer Cardholder Payment/Inquiry

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications7  Wiley and the book authors, 2001 Digital Certificate System for SET Root CA Brand CA (e.g Visa or Master) Geopolitical CA (e.g. Visa Asia) Merchant CA Cardholder CA Payment gateway CA User level CA

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications8  Wiley and the book authors, 2001 Steps in Generation of a Dual Signature Step 1: Find the message digest of OI and PI Step 2:Concatenate H[OI] and H[PI] and find the message digest Step 3:Encrypt HPIOI with cardholder’s private signature key (using RSA encryption) OIPI H[OI]H[PI] HPIOI = H[H[PI] || H[OI]] Dual Signature Cardholder’s private signature key Reference: W. Stallings, Cryptography and Network Security, Prentice Hall, 1999.

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications9  Wiley and the book authors, 2001 Generation of a Digital Envelope Digital Envelope DES Encryption RSA Encryption key random     M Encrypted by key random Encrypted by key public_exchange,VBS key random key public_exchange,VBS M

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications10  Wiley and the book authors, 2001 General SET Information Flow (5) Authorization request (6) Authorization response (7) Capture request (2) Purchase initialization response (1) Purchase initialization request (3) Purchase request (4) Purchase response Inquiry request (optional) Inquiry response (optional) Merchant (8) Capture response Cardholder Acquirer (Payment Gateway) Acquirer (Payment Gateway) Acquirer (Payment Gateway)

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications11  Wiley and the book authors, 2001 E-check Let’s say the content of a check is C which includes the payment amount and other information. The check is signed by finding the message digest of C and then encrypting it with the payer’s private key. The check together with the digital signature is forwarded to the payee. The payee sends the check to the bank for check clearing through the existing procedures. The bank verifies the digital signature of the check using payer’s public key. Find out more from In particular, please read

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications12  Wiley and the book authors, 2001 Four Different Scenarios of the FSTC E-check System Cash-and-transfer       Funds transfer     Deposit-and-clear PayerPayee Payer’s bank Payee’s bank       Send check  Send statement  Deposit check  Send report  Clear check Lockbox     PayerPayee Payer’s bank Payee’s bank  Send check  Transfer funds  Cash check  Send report  Notify result  Send statement PayerPayee Payer’s bank Payee’s bank  Send check  Send report  Clear check  Send statement Payer Payee Payer’s bank Payee’s bank  Send check  Send report  Transfer funds  Send statement

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications13  Wiley and the book authors, 2001 Overview of E-cash What are the two distinctive characteristics for cash?  Anonymity and transferability Ecash was developed by DigiCash and is now provided by ecashtechnologies ( Its founder David Chaum is a well known expert in the area of digital cash. Ecash allows anonymous and secure electronic cash payment over the Internet. Since 1995, Mark Twain bank (USA) has been providing Ecash services. Ecash is based on an innovative blind signature method.

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications14  Wiley and the book authors, 2001 Basic Operation of E-cash system  Pay by the coins  Check the validity of the coins and whether they have been spent and credit the account accordingly  Debit the account and sign the blinded coins  Send the blinded coins to the bank  Return the signed blinded coins  Deposit the coins  Confirm the deposit Ship goods or perform the service  Generate the blinded coins  Unblind the coins Customer Bank VBS (Merchant)

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications15  Wiley and the book authors, 2001 Micropayment methods Traditional payment methods are called macropayment methods. A new type of payment method known as micropayment method is emerging to cater for very low value transactions. Example:  Millicent (pre-payment/credit based)  Paywords (post-payment)

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications16  Wiley and the book authors, 2001 Basic Operation of Millicent Protocol  Buy the scrips of different vendors  Send the aggregated scrips  Pay by the scrips  Confirm the payment Customer Broker Merchant  Check for the validity of the scrips and whether they have been spent from the database

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications17  Wiley and the book authors, 2001 Basic Operation of Payword Protocol by sending i+j and PW i+j Send the commitment message (PW 0 ) Customer VBS (Merchant) Pay 1 cent by sending PW 1 Pay 1 cent by sending PW 2 Send PW i Pay j more cents Redeem by sending the commitment message (PW 0 ) and PW h to the broker :::: : Check H[PW 1 ] = PW 0 Check H[PW 2 ] = PW 1 Check PW i+1 – PW i+j recursively

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications18  Wiley and the book authors, 2001 Schematic overview of a smart card A Smart Card RAMI/O CPU ROMEPROM Microchip with mechanical contacts

_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications19  Wiley and the book authors, 2001 Example: Mondex Direct transfer of electronic money between two cards Transfer of electronic money over the Internet or telephone networks etc. Keep transaction records Password protection and “lock card” functions Portable balance finder to check balance Support multiple currencies