Beruflich Dokumente
Kultur Dokumente
Standards
Part-2
Internet Security
A successful e-commerce environment is built on
trust in the integrity of the communication network
that links the buyer and the merchants.
With open exchange of information on internet, more
security is needed to minimize the vulnerability.
Internet Security
Measures for security over Internet are:
Web Application:
SSL Secure Socket Layer
S-HTTP Secure Hypertext Transfer Protocol
Digital Wallet
It is an online shopping device that seals personal
information in a free plug-in that can be invoked
when making a Purchase.
This eliminates having to retype credit card
information in future transaction.
Customer can select payment method and shipping
address to accomplish with the purchase.
Steps
You made a purchase.
Software has done the certificates exchange.
You receive
e-merchants public key,
payment processors key and
a unique transaction identifier issued by the merchant.
Then create Order Information (OI) and payment Instruction
(PI) including the e-merchants assigned transaction identifier.
Now execute hashing function to make digest of the OI and PI.
You get a dual signature by encrypting with private key
(ensures that OI and PI are related together).
Steps
When finished with the steps you get a message
containing:
OI, including merchants transaction identifier.
A digest of OI
PI, including merchants transaction identifier, encrypted
with a random symmetric key.
A digest of PI
A dual signature digest (OI Digest + PI Digest) encrypted
with your private key.
Your account number plus the random symmetric key
encrypted with the payment processors public key.
UNIT-II
UNIT-II