Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.

Slides:



Advertisements
Similar presentations
Internet payment systems
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Copyright © 1999, Financial Services Technology Consortium. All rights reserved. FSML and Echeck Milton M. Anderson Financial Services Technology Consortium.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Electronic Payment Systems Speaker: Jerry Gao Ph.D. San Jose State University URL: May,
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 11 Electronic Cash.
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
FIT3105 Smart card based authentication and identity management Lecture 4.
Micro-Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University URL:
Electronic Check Payment Protocols and Systems
Your Presenter Amer Sharaf Electronic Payments: Where do we go from here? ByMarkus Jakobsson David Mraihi Yiannis Tsiounis Moti Yung.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Summary of Reading Assignments: Credits and Debits on the Internet & New Payment Systems Hope To Cash In Dr. Deepak Khazanchi.
Module 8 – Anonymous Digital Cash Blind Signatures DigiCash coins.
“Electronic Payment System”
Electronic Payment Systems. Transaction reconciliation –Cash or check.
Digital Payment Systems
Financial Transactions on Internet Financial transactions require the cooperation of more than two parties. Transaction must be very low cost so that small.
Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 4 Data Authentication Part II.
Traditional and Electronic Payment Methods Chapter 3.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall E-money.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Supporting Technologies III: Security 11/16 Lecture Notes.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Electronic Payment Systems
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Chris Olston, cs294-7, Spring Atomicity in Electronic Commerce J. D. Tygar -- UCB presented by Chris Olston.
Secure Electronic Transaction (SET)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Traditional and Electronic Payment Methods Chapter 3.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Electronic Cash. Digicash: Ecash u “With ecash you can pay for access to a database, buy software ora newsletter by ,play a computer game over the.
2/16/001 E-commerce Systems Electronic Payment Systems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Electronic Cash R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Network Security Celia Li Computer Science and Engineering York University.
BZUPAGES.COM E-cash Payment System A company, DigiCash, has pioneered the use of electronic cash or e-cash. Anonymity of the buyer is the key feature of.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Electronic Banking & Security Electronic Banking & Security.
1 Buyer 2. Account ID Valid? 3. Account OK! 5. Transaction Details 1. Account ID 4. Information Goods 6. Satisfied? 7. Accept/Reject or Fraud Indication.
Uses Uses of cryptography Lab today on RSA
Presentation transcript:

Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of Electronic Payment Systems.

Outline Introduction to Project Electronic Cash Presentation Electronic Checks Presentation Credit Card Payments Presentation Conclusion Questions

Introduction Our Group has: –Created a web site on three types of electronic payment systems Electronic Cash Electronic Checks Credit Card Payments –Focused on Security Issues, Protocols, and Real World Implementations of each Method

eCash Currency & Micropayments

eCash What is eCash? –A class of technologies that provide an analog of cash represented in electronic form. –Replicates properties of real cash (anonymity, low transaction cost, etc). –Can be spent or given away. –Quick and easy on line transactions. –Implemented with smart cards or just software.

eCash Transaction Model eCash Model

eCash What are Micropayments? –Small valued transactions (.10 - $10) –Suitable for the sale of non-tangible goods over the Internet. –Imposes requirements on speed and cost of processing of the payments. –Delivery occurs nearly instantaneously on the Internet, and often in arbitrarily small pieces. –Need for security is reduced.

Micropayment Transaction Model Micropayment Model

eCash Security Public Key Cryptography Coins –2 pairs of integers (serial number, calculated value -> (a, f(a)) ) a -> serial number f -> one-way hash function –E.g Bank uses RSA algorithm and its private key to sign a.

eCash Blinding (ensures privacy) –r -> blinding factor –Person sends f(a)r to Bank –Bank signs and returns –Person divides it with r The Bank does not know r so it can’t trace identity of the coin when it is cashed later

eCash Example Systems: –DigiCash (software-based) –Mondex (card-based) –NetBill (micropayments)

eChecks Credit-Debit System

Electronic Checks (eChecks) Designed to perform the payment and other financial functions of paper checks by using cryptographic signatures and secure messaging over the Internet Based on the idea that electronic documents can be substituted for paper, and that public key cryptographic signatures can be substituted for handwritten signatures

eChecks (cont.)

Three aspects faced in order for eCheck transactions to take place: –Private key possession and control -- The signature verifier must believe that the signer has exclusive possession of his signing key The electronic checkbook, in the form of a PIN- activated tamper-resistant smart card or similar cryptographic hardware, performs a signing algorithm so that the private signing key is always kept inside the trusted hardware and is never read into the signer's networked personal computer or server

eChecks (cont.) The electronic checkbook is aware of echeck syntax and logs critical data from echecks to provide the signer with a trusted log of signing actions –Key pair generation -- The signature verifier must believe that the private/public key pair was generated such that the private key cannot be guessed by an attacker based on knowledge of the public key The electronic checkbook performs key generation within the tamper-resistant hardware using algorithms that have been properly tested and certified by the manufacturer

eChecks (cont.) Only the public key is exported from the hardware, and the private key is never revealed to anyone –Public key infrastructure -- The signature verifier must be able to trust that the public key provided for use in verifying the signature really belongs to the signer and is the other half of the signer's public key pair The public key exported from the card is included in a certificate signed by the bank's Certification Authority The bank echeck servers keep an independent database of the bank’s signers’ public keys so that they always know the most current relationships of keys to accounts and signers

eChecks (cont.) Areas of fraud and how eChecks prevent them: –Duplicate detection Each echeck is guaranteed to be unique by the operations of the electronic checkbook The payee and payee's bank detect and refuse duplicate submissions of echecks The payer's bank detects duplicates and pays only one instance of an echeck Prevents multiple payments due to innocent retransmissions of and prevents a payee from cashing and depositing an echeck in two different accounts

eChecks (cont.) –Payee identification Echecks can be made out to the payee's bank routing code and either an account or customer ID number Also can be made out to the payee's public key These parameters uniquely identify the payee and prevent an eavesdropper from exploiting the ambiguity of payee identification, which otherwise exists if only payee common names are used

eChecks (cont.) –Electronic account numbers The account number of the echeck is a randomly chosen number assigned by the bank for the purpose of writing and depositing The payer's and depositor's echeck account numbers are mapped to their paper check account numbers by their respective banks The banks will not accept paper checks or drafts written against the echeck account numbers This prevents an eavesdropper or corrupt payee from printing and passing paper checks or drafts against the account numbers

eChecks (cont.) –Cryptographically attached invoices Invoices can be sent to detail the purpose of the payment, and can be signed by the echeck signature binding them to the echeck and ensuring their authenticity and integrity This prevents an attacker from intercepting an echeck and purchase order, changing the delivery address in the order, and forwarding the echeck and altered order to the merchant

Credit Cards Secure Presentation

Electronic Credit Card Payments Secure Electronic Transaction (SET) Credit Card Transactions Check Sum Algorithm

Secure Electronic Transaction (SET) Protocol for sending financial information over the Internet. Provides secure transmission Allows for party authentication Provides integrity for the payment messages

Credit Card Transactions 1.The consumer supplies the credit card to the merchant. 2.The merchant seeks card authorization from the merchant's bank. 3.The merchant's bank then seeks authorization from the consumer's bank. 4.The consumer's bank responds to the merchant's bank. 5.The merchant's bank notifies the merchant that the transaction has been approved.

Credit Card Transactions (cont.) 1.The merchant finalizes the transaction. 2.The merchant sends a batch of charges to the merchant's bank. 3.The merchant's bank then sends each settlement request to the appropriate consumer bank 4.The consumer bank receives each settlement request and debits the consumer's account. 5.The merchant's bank credits the merchant's account and withdraws the credit amount from the consumer's bank.

Check Sum Algorithm Assumes the credit card number The number is 15 digits long and thus odd and therefore has a numerical weight of one Compute the check digit by: 3, 14, 2, 16, 0, 4, 4, 18, 13, 5, 0, 8, 10, 9 Subtract 9 from every value greater than nine: 3, 5, 2, 7, 0, 4, 4, 9, 0, 3, 5, 8, 0, 1, 9 Add these numbers: 60 The check should equal zero 60 mod 10 = 0

Conclusion Electronic money is a more viable means of making payments. These payment methods offer privacy, convenience, and security There are a wide variety of electronic payment systems available. The consumer must find the system that best suites their needs

Questions ???