SlideShare a Scribd company logo
1 of 55
1
7
Chapter 7
Electronic Payment Systems
Electronic Commerce
2
7
Objectives
 Four methods for collecting customer
payments
 Credit and debit card processing
 SET protocol protections
 How software wallets work
 History and future of electronic cash
systems, how they work and are
implemented
 Smart cards
 Which payment systems are most popular
and which are likely to gain acceptance
3
7
Introduction to Electronic
Payment Systems
Three methods of payment currently
 Check, credit card, or cash
Four methods of electronic payment
 Electronic cash, software wallets, smart
cards, and credit/debit cards
 Scrip is digital cash minted by third-party
organizations
4
7
Electronic Cash
Primary advantage is with purchase of
items less than $10
 Credit card transaction fees make small
purchases unprofitable
 Micropayments
 Payments for items costing less than $1
5
7
Electronic Cash Issues
E-cash must allow spending only once
Must be anonymous, just like regular
currency
 Safeguards must be in place to prevent
counterfeiting
 Must be independent and freely
transferable regardless of nationality or
storage mechanism
Divisibility and Convenience
6
7
Beenz Home Page
Figure 7-1
7
7
Electronic Cash Storage
Two methods
 On-line
 Individual does not have possession
personally of electronic cash
 Trusted third party, e.g. online bank, holds
customers’ cash accounts
 Off-line
 Customer holds cash on smart card or
software wallet
 Fraud and double spending require tamper-
proof encryption
8
7
CyberCash -- A Pioneer in Electronic Cash
Figure 7-2
9
7
Advantages and Disadvantages of
Electronic Cash
 Advantages
 More efficient, eventually meaning lower prices
 Lower transaction costs
 Anybody can use it, unlike credit cards, and does
not require special authorization
 Disadvantages
 Tax trail non-existent, like regular cash
 Money laundering
 Susceptible to forgery
10
7
How Electronic Cash Works
 Customer opens account with bank in person
and establishes identity
 Thereafter, digital certificate serves as proof of
identity
 Once identified, bank issues e-currency and
deducts amount from customer’s account
(minus service fee)
 Customer spends e-cash with merchant who
validates it to prevent forgery or fraud
 Merchant presents e-cash to issuing bank for
deposit once goods or services are received
11
7
Electronic Cash Security
Complex cryptographic algorithms
prevent double spending
 Anonymity is preserved unless double
spending is attempted
Serial numbers can allow tracing to
prevent money laundering
 Does not prevent double spending, since
the merchant or consumer could be at
fault
12
7
Detecting Double Spending
Figure 7-3
13
7
Past and Present
E-cash Systems
E-cash not popular in U.S., but
successful in Europe and Japan
 Reasons for lack of U.S. success not clear
 Manner of implementation too complicated
 Lack of standards and interoperable software
that will run easily on a variety of hardware and
software systems
14
7
Past and Present
E-cash Systems
Checkfree
 Allows payment with online electronic
checks
Clickshare
 Designed for magazine and newspaper
publishers
 Miscast as a micropayment only system;
only one of its features
 Purchases are billed to a user’s ISP, who
in turn bill the customer
15
7
Using Checkfree To Pay A Bill Online
Figure 7-4
16
7
Clickshare’s Home Page
Figure 7-5
17
7
Past and Present
E-cash Systems
CyberCash
 Combines features from cash and checks
 Offers credit card, micropayment, and
check payment services
 Connects merchants directly with credit
card processors to provide authorizations
for transactions in real time
 No delays in processing prevent insufficient e-
cash to pay for the transaction
18
7
Past and Present
E-cash Systems
CyberCoins
 Stored in CyberCash wallet, a software
storage mechanism located on customer’s
computer
 Used to make purchases between .25c
and $10
 PayNow -- payments made directly from
checking accounts
19
7
CyberCash’s CashRegister Service
Figure 7-6
20
7
Past and Present
E-cash Systems
DigiCash
 Trailblazer in e-cash
 Allowed customers to purchase goods and
services using anonymous electronic cash
 Recently entered Chapter 11
reorganization
21
7
Past and Present
E-cash Systems
Coin.Net
 Electronic tokens stored on a customer’s
computer is used to make purchases
 Works by installing special plug-in to a
customer’s web browser
 Merchants do not need special software to
accept eCoins.
 eCoin server prevents double-spending
and traces transactions, but consumer is
anonymous to merchant
22
7
eCoin.net Home Page
Figure 7-7
23
7
Past and Present
E-cash Systems
MilliCent
 Developed by Digital, now part of Compaq
 Electronic scrip system
 Participating merchant creates and sells
own scrip to broker at a discount
 Consumers register with broker and buy bulk
generic scrip, usually with credit card
 Customers buy by converting broker scrip to
vendor-specific scrip, i.e. scrip that a particular
merchant will accept
24
7
Past and Present
E-cash Systems
MilliCent cont’d
 Customers can purchase items of very low
value
 Brokers required for two reasons:
 Small payments require aggregation to insure
profitability
 System is easier to use -- customer need only
deal with one broker for all their scrip needs
25
7
MilliCent Demonstration Page
Figure 7-8
26
7
Electronic Wallets
Stores credit card, electronic cash,
owner identification and address
 Makes shopping easier and more efficient
 Eliminates need to repeatedly enter identifying
information into forms to purchase
 Works in many different stores to speed
checkout
 Amazon.com one of the first online
merchants to eliminate repeat form-filling
for purchases
27
7
An Electronic Checkout Counter Form
Figure 7-9
28
7
Electronic Wallets
Agile Wallet
 Developed by CyberCash
 Allows customers to enter credit card and
identifying information once, stored on a
central server
 Information pops up in supported
merchants’ payment pages, allowing one-
click payment
 Does not support smart cards or
CyberCash, but company expects to soon
29
7
Electronic Wallets
eWallet
 Developed by Launchpad Technologies
 Free wallet software that stores credit card
and personal information on users’
computer, not on a central server; info is
dragged into payment form from eWallet
 Information is encrypted and password
protected
 Works with Netscape and Internet
Explorer
30
7
Electronic Wallets
Microsoft Wallet
 Comes pre-installed in Internet Explorer
4.0, but not in Netscape
 All information is encrypted and password
protected
 Microsoft Wallet Merchant directory shows
merchants setup to accept Microsoft
Wallet
31
7
Entering Information Into Microsoft Wallet
Figure 7-10
32
7
W3C Proposed Standard for
Electronic Wallets
World Wide Web Consortium (W3C) is
attempting to create an extensible and
interoperable method of embedding
micropayment information on a web
page
 Extensible systems allow improvement of
the system without eliminating previous
work
33
7
W3C Proposed Standard for
Electronic Wallets
 Merchants must accept several payment
options to insure the widest possible Internet
audience
 Merchants must embed in their Web page
payment information specific to each payment
system
 This redundancy spurred W3C to develop
common standards for Web page markup for all
payment systems
 Must move quickly to prevent current methods
from becoming entrenched
34
7
W3C Electronic Commerce Interest Group
(ECIG) Draft Standard Architecture
Client (consumer’s web browser)
initiates micropayment activity
 Client browser includes Per Fee Link
Handler module and one or more
electronic wallets
 New HTML tags will carry micropayment
information
35
7
W3C Proposed Micropayment HTML Tags
Figure 7-11
36
7
The ECML Standard
Electronic Commerce Modeling
Language (ECML) proposed standards
for electronic wallets
 Companies forming the consortium are
America Online, IBM, Microsoft, Visa, and
MasterCard
 Ultimate goal is for all commerce sites to
accept ECML
 Unclear how this standard will incorporate
privacy standards W3C set forth
37
7
Smart Cards
Plastic card containing an embedded
microchip
 Can contain cash
 Over 100 times more information storage
than a magnetic-striped plastic card
 Information is encrypted, unlike credit
cards which have account number on its
face, making credit theft practically
impossible
38
7
Smart Cards
 Available for over 10 years
 So far not successful in U.S., but popular in
Europe, Australia, and Japan
 Unsuccessful in U.S. partly because few card
readers available
 Smart cards gradually reappearing in U.S.;
success depends on:
 Critical mass of smart cards that support
applications
 Compatibility between smart cards, card-reader
devices, and applications
39
7
Mondex Smart Card
Holds and dispenses electronic cash
Developed by MasterCard International
Requires specific card reader for
merchant or customer to use card over
Internet
Supports micropayments as small as
3c and works both online and off-line at
stores or over the telephone
40
7
Mondex Smart Card
Disadvantages
 Card carries real cash in electronic form,
creating the possibility of theft
 No deferred payment as with credit cards -
cash is dispensed immediately
41
7
Mondex Smart Card Processing
Figure 7-12
42
7
Credit and Charge Cards
Credit card
 Used for the majority of Internet purchases
 Has a preset spending limit
Charge card
 No spending limit
 Entire amount charged due at end of
billing period
Merchants must set up merchant
accounts to accept payment cards
43
7
Payment Acceptance
and Processing
Law prohibits charging payment card
until merchandise is shipped
Payment card transaction requires:
 Merchant to authenticate payment card
 Merchant must check with card issuer to
ensure funds are available and to put hold
on funds needed to make current charge
 Settlement occurs in a few days when
funds travel through banking system into
merchant’s account
44
7
Open and Closed
Loop Systems
Closed loop systems
 Banks and other financial institutions serve
as brokers between card users and
merchants -- no other institution is involved
 American Express and Discover are
examples
Open loop systems
 Transaction is processed by third party
 Visa and MasterCard are examples
45
7
Setting Up Merchant Account
Merchant bank
 Also called acquiring bank
 Does business with merchants that want
to accept payment cards
 Merchant receives account where they
deposit card sales totals
 Value of sales slips is credited to
merchant’s account
46
7
Processing Payment
Cards Online
Can be done automatically by software
packaged with electronic commerce
software
Can contract with third party to handle
payment card processing
 Can also pick, pack, and ship products to
the customer
 Allows merchant to focus on web
presence and supply availability
47
7
Payment Processing Services
Internetsecure
 Provides secure credit card payment
services
 Supports payments with Visa and
MasterCard
 Provides risk management and fraud
detection, and ensures all proper security
for credit card transactions is maintained
 Ensures all transactions are properly
credited to merchant’s account
48
7
Payment Processing Services
 Tellan
 Provides PCAuthorize for smaller commerce sites
and WebAuthorize for larger enterprise-class
merchant sites
 Both systems capture credit card information from
the merchant’s form and connect directly to the
bank network using dial-up or private, leased
lines
 Bank network receives credit information,
performs credit authorization, and deposits the
money in the merchant’s bank account
 The merchant’s web site receives confirmation or
rejection of the transaction, which is
communicated to the customer
49
7
Processing a Payment Card Order
Figure 7-13
50
7
Payment Processing Services
 IC Verify
 Provides electronic transaction processing for
merchants for all major credit and debit cards
 Also allows check guarantees and verification
transactions
 A CyberCash company
 Authorize.Net
 Online, real time service that links merchants with
issuing banks by simply inserting a small block of
HTML code into their transaction page
51
7
Secure Electronic Transaction (SET)
Protocol
Jointly designed by MasterCard and
Visa with backing of Microsoft,
Netscape, IBM, GTE, SAIC, and others
Designed to provide security for card
payments as they travel on the Internet
 Contrasted with Secure Socket Layers
(SSL) protocol, SET validates consumers
and merchants in addition to providing
secure transmission
52
7
Secure Electronic Transaction (SET)
Protocol
 Goal is single method of conducting payment
transactions on the Internet
 Acceptance of standard has been slow
 SET specification
 Uses public key cryptography and digital
certificates for validating both consumers and
merchants
 Provides privacy, data integrity, user and
merchant authentication, and consumer
nonrepudiation
53
7
SETCo’s Home Page
Figure 7-14
54
7
SET Payment Transactions
 SET-protected payments work like this:
 Consumer makes purchase by sending encrypted
financial information along with digital certificate
 Merchant’s website transfers the information to a
payment card processing center while a
Certification Authority certifies digital certificate
belongs to sender
 Payment card-processing center routes
transaction to credit card issuer for approval
 Merchant receives approval and credit card is
charged
 Merchant ships merchandise and adds
transaction amount for deposit into merchant’s
account
55
7
SET Protocol
So far has received lukewarm reception
80 percent of SET activities are in
Europe and Asian countries
Problems with SET
 Not easy to implement
 Not as inexpensive as expected
 Clumsy
 Not tried and tested, and often not needed

More Related Content

Similar to ch7.ppt

Online payment system
Online payment systemOnline payment system
Online payment systemmyangel27
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerceMarya Sholevar
 
Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY Syeda Tabia
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment systempankhadi
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...Nuzhat Memon
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemTushar B Kute
 
Electronic Payment Method
Electronic Payment MethodElectronic Payment Method
Electronic Payment MethodMehul Boghra
 
electronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdfelectronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdfVamshi963187
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment SystemMohammad Waqas
 
E commerce payment systems
E commerce payment systems E commerce payment systems
E commerce payment systems Nishant Pahad
 
Web technology and commerce unit 4
Web technology and commerce unit 4Web technology and commerce unit 4
Web technology and commerce unit 4arun0501
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Danail Yotov
 
E-payment Systems .pptx
E-payment Systems .pptxE-payment Systems .pptx
E-payment Systems .pptxssuser8afefa
 

Similar to ch7.ppt (20)

E commerce
E commerceE commerce
E commerce
 
E Payment
E PaymentE Payment
E Payment
 
Online payment system
Online payment systemOnline payment system
Online payment system
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
 
Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY
 
E payment
E paymentE payment
E payment
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
 
E payment
E paymentE payment
E payment
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment System
 
Electronic Payment Method
Electronic Payment MethodElectronic Payment Method
Electronic Payment Method
 
electronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdfelectronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdf
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 
Week10
Week10Week10
Week10
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
ELECTRONIC PAYMENT SYSTEMS
ELECTRONIC PAYMENT SYSTEMS ELECTRONIC PAYMENT SYSTEMS
ELECTRONIC PAYMENT SYSTEMS
 
E commerce payment systems
E commerce payment systems E commerce payment systems
E commerce payment systems
 
Web technology and commerce unit 4
Web technology and commerce unit 4Web technology and commerce unit 4
Web technology and commerce unit 4
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
E-payment Systems .pptx
E-payment Systems .pptxE-payment Systems .pptx
E-payment Systems .pptx
 

More from Anonymous9etQKwW

os distributed system theoretical foundation
os distributed system theoretical foundationos distributed system theoretical foundation
os distributed system theoretical foundationAnonymous9etQKwW
 
osi model computer networks complete detail
osi model computer networks complete detailosi model computer networks complete detail
osi model computer networks complete detailAnonymous9etQKwW
 
IntroductoryPPT_CSE242.pptx
IntroductoryPPT_CSE242.pptxIntroductoryPPT_CSE242.pptx
IntroductoryPPT_CSE242.pptxAnonymous9etQKwW
 
Big Data & Analytics (CSE6005) L6.pptx
Big Data & Analytics (CSE6005) L6.pptxBig Data & Analytics (CSE6005) L6.pptx
Big Data & Analytics (CSE6005) L6.pptxAnonymous9etQKwW
 
Artificial Neural Networks_Bioinsspired_Algorithms_Nov 20.ppt
Artificial Neural Networks_Bioinsspired_Algorithms_Nov 20.pptArtificial Neural Networks_Bioinsspired_Algorithms_Nov 20.ppt
Artificial Neural Networks_Bioinsspired_Algorithms_Nov 20.pptAnonymous9etQKwW
 

More from Anonymous9etQKwW (11)

os distributed system theoretical foundation
os distributed system theoretical foundationos distributed system theoretical foundation
os distributed system theoretical foundation
 
osi model computer networks complete detail
osi model computer networks complete detailosi model computer networks complete detail
osi model computer networks complete detail
 
CODch3Slides.ppt
CODch3Slides.pptCODch3Slides.ppt
CODch3Slides.ppt
 
IntroductoryPPT_CSE242.pptx
IntroductoryPPT_CSE242.pptxIntroductoryPPT_CSE242.pptx
IntroductoryPPT_CSE242.pptx
 
Intro.ppt
Intro.pptIntro.ppt
Intro.ppt
 
Big Data & Analytics (CSE6005) L6.pptx
Big Data & Analytics (CSE6005) L6.pptxBig Data & Analytics (CSE6005) L6.pptx
Big Data & Analytics (CSE6005) L6.pptx
 
Lecture 2 Hadoop.pptx
Lecture 2 Hadoop.pptxLecture 2 Hadoop.pptx
Lecture 2 Hadoop.pptx
 
mapreduceApril24.ppt
mapreduceApril24.pptmapreduceApril24.ppt
mapreduceApril24.ppt
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
Chap 4.ppt
Chap 4.pptChap 4.ppt
Chap 4.ppt
 
Artificial Neural Networks_Bioinsspired_Algorithms_Nov 20.ppt
Artificial Neural Networks_Bioinsspired_Algorithms_Nov 20.pptArtificial Neural Networks_Bioinsspired_Algorithms_Nov 20.ppt
Artificial Neural Networks_Bioinsspired_Algorithms_Nov 20.ppt
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

ch7.ppt

  • 1. 1 7 Chapter 7 Electronic Payment Systems Electronic Commerce
  • 2. 2 7 Objectives  Four methods for collecting customer payments  Credit and debit card processing  SET protocol protections  How software wallets work  History and future of electronic cash systems, how they work and are implemented  Smart cards  Which payment systems are most popular and which are likely to gain acceptance
  • 3. 3 7 Introduction to Electronic Payment Systems Three methods of payment currently  Check, credit card, or cash Four methods of electronic payment  Electronic cash, software wallets, smart cards, and credit/debit cards  Scrip is digital cash minted by third-party organizations
  • 4. 4 7 Electronic Cash Primary advantage is with purchase of items less than $10  Credit card transaction fees make small purchases unprofitable  Micropayments  Payments for items costing less than $1
  • 5. 5 7 Electronic Cash Issues E-cash must allow spending only once Must be anonymous, just like regular currency  Safeguards must be in place to prevent counterfeiting  Must be independent and freely transferable regardless of nationality or storage mechanism Divisibility and Convenience
  • 7. 7 7 Electronic Cash Storage Two methods  On-line  Individual does not have possession personally of electronic cash  Trusted third party, e.g. online bank, holds customers’ cash accounts  Off-line  Customer holds cash on smart card or software wallet  Fraud and double spending require tamper- proof encryption
  • 8. 8 7 CyberCash -- A Pioneer in Electronic Cash Figure 7-2
  • 9. 9 7 Advantages and Disadvantages of Electronic Cash  Advantages  More efficient, eventually meaning lower prices  Lower transaction costs  Anybody can use it, unlike credit cards, and does not require special authorization  Disadvantages  Tax trail non-existent, like regular cash  Money laundering  Susceptible to forgery
  • 10. 10 7 How Electronic Cash Works  Customer opens account with bank in person and establishes identity  Thereafter, digital certificate serves as proof of identity  Once identified, bank issues e-currency and deducts amount from customer’s account (minus service fee)  Customer spends e-cash with merchant who validates it to prevent forgery or fraud  Merchant presents e-cash to issuing bank for deposit once goods or services are received
  • 11. 11 7 Electronic Cash Security Complex cryptographic algorithms prevent double spending  Anonymity is preserved unless double spending is attempted Serial numbers can allow tracing to prevent money laundering  Does not prevent double spending, since the merchant or consumer could be at fault
  • 13. 13 7 Past and Present E-cash Systems E-cash not popular in U.S., but successful in Europe and Japan  Reasons for lack of U.S. success not clear  Manner of implementation too complicated  Lack of standards and interoperable software that will run easily on a variety of hardware and software systems
  • 14. 14 7 Past and Present E-cash Systems Checkfree  Allows payment with online electronic checks Clickshare  Designed for magazine and newspaper publishers  Miscast as a micropayment only system; only one of its features  Purchases are billed to a user’s ISP, who in turn bill the customer
  • 15. 15 7 Using Checkfree To Pay A Bill Online Figure 7-4
  • 17. 17 7 Past and Present E-cash Systems CyberCash  Combines features from cash and checks  Offers credit card, micropayment, and check payment services  Connects merchants directly with credit card processors to provide authorizations for transactions in real time  No delays in processing prevent insufficient e- cash to pay for the transaction
  • 18. 18 7 Past and Present E-cash Systems CyberCoins  Stored in CyberCash wallet, a software storage mechanism located on customer’s computer  Used to make purchases between .25c and $10  PayNow -- payments made directly from checking accounts
  • 20. 20 7 Past and Present E-cash Systems DigiCash  Trailblazer in e-cash  Allowed customers to purchase goods and services using anonymous electronic cash  Recently entered Chapter 11 reorganization
  • 21. 21 7 Past and Present E-cash Systems Coin.Net  Electronic tokens stored on a customer’s computer is used to make purchases  Works by installing special plug-in to a customer’s web browser  Merchants do not need special software to accept eCoins.  eCoin server prevents double-spending and traces transactions, but consumer is anonymous to merchant
  • 23. 23 7 Past and Present E-cash Systems MilliCent  Developed by Digital, now part of Compaq  Electronic scrip system  Participating merchant creates and sells own scrip to broker at a discount  Consumers register with broker and buy bulk generic scrip, usually with credit card  Customers buy by converting broker scrip to vendor-specific scrip, i.e. scrip that a particular merchant will accept
  • 24. 24 7 Past and Present E-cash Systems MilliCent cont’d  Customers can purchase items of very low value  Brokers required for two reasons:  Small payments require aggregation to insure profitability  System is easier to use -- customer need only deal with one broker for all their scrip needs
  • 26. 26 7 Electronic Wallets Stores credit card, electronic cash, owner identification and address  Makes shopping easier and more efficient  Eliminates need to repeatedly enter identifying information into forms to purchase  Works in many different stores to speed checkout  Amazon.com one of the first online merchants to eliminate repeat form-filling for purchases
  • 27. 27 7 An Electronic Checkout Counter Form Figure 7-9
  • 28. 28 7 Electronic Wallets Agile Wallet  Developed by CyberCash  Allows customers to enter credit card and identifying information once, stored on a central server  Information pops up in supported merchants’ payment pages, allowing one- click payment  Does not support smart cards or CyberCash, but company expects to soon
  • 29. 29 7 Electronic Wallets eWallet  Developed by Launchpad Technologies  Free wallet software that stores credit card and personal information on users’ computer, not on a central server; info is dragged into payment form from eWallet  Information is encrypted and password protected  Works with Netscape and Internet Explorer
  • 30. 30 7 Electronic Wallets Microsoft Wallet  Comes pre-installed in Internet Explorer 4.0, but not in Netscape  All information is encrypted and password protected  Microsoft Wallet Merchant directory shows merchants setup to accept Microsoft Wallet
  • 31. 31 7 Entering Information Into Microsoft Wallet Figure 7-10
  • 32. 32 7 W3C Proposed Standard for Electronic Wallets World Wide Web Consortium (W3C) is attempting to create an extensible and interoperable method of embedding micropayment information on a web page  Extensible systems allow improvement of the system without eliminating previous work
  • 33. 33 7 W3C Proposed Standard for Electronic Wallets  Merchants must accept several payment options to insure the widest possible Internet audience  Merchants must embed in their Web page payment information specific to each payment system  This redundancy spurred W3C to develop common standards for Web page markup for all payment systems  Must move quickly to prevent current methods from becoming entrenched
  • 34. 34 7 W3C Electronic Commerce Interest Group (ECIG) Draft Standard Architecture Client (consumer’s web browser) initiates micropayment activity  Client browser includes Per Fee Link Handler module and one or more electronic wallets  New HTML tags will carry micropayment information
  • 35. 35 7 W3C Proposed Micropayment HTML Tags Figure 7-11
  • 36. 36 7 The ECML Standard Electronic Commerce Modeling Language (ECML) proposed standards for electronic wallets  Companies forming the consortium are America Online, IBM, Microsoft, Visa, and MasterCard  Ultimate goal is for all commerce sites to accept ECML  Unclear how this standard will incorporate privacy standards W3C set forth
  • 37. 37 7 Smart Cards Plastic card containing an embedded microchip  Can contain cash  Over 100 times more information storage than a magnetic-striped plastic card  Information is encrypted, unlike credit cards which have account number on its face, making credit theft practically impossible
  • 38. 38 7 Smart Cards  Available for over 10 years  So far not successful in U.S., but popular in Europe, Australia, and Japan  Unsuccessful in U.S. partly because few card readers available  Smart cards gradually reappearing in U.S.; success depends on:  Critical mass of smart cards that support applications  Compatibility between smart cards, card-reader devices, and applications
  • 39. 39 7 Mondex Smart Card Holds and dispenses electronic cash Developed by MasterCard International Requires specific card reader for merchant or customer to use card over Internet Supports micropayments as small as 3c and works both online and off-line at stores or over the telephone
  • 40. 40 7 Mondex Smart Card Disadvantages  Card carries real cash in electronic form, creating the possibility of theft  No deferred payment as with credit cards - cash is dispensed immediately
  • 41. 41 7 Mondex Smart Card Processing Figure 7-12
  • 42. 42 7 Credit and Charge Cards Credit card  Used for the majority of Internet purchases  Has a preset spending limit Charge card  No spending limit  Entire amount charged due at end of billing period Merchants must set up merchant accounts to accept payment cards
  • 43. 43 7 Payment Acceptance and Processing Law prohibits charging payment card until merchandise is shipped Payment card transaction requires:  Merchant to authenticate payment card  Merchant must check with card issuer to ensure funds are available and to put hold on funds needed to make current charge  Settlement occurs in a few days when funds travel through banking system into merchant’s account
  • 44. 44 7 Open and Closed Loop Systems Closed loop systems  Banks and other financial institutions serve as brokers between card users and merchants -- no other institution is involved  American Express and Discover are examples Open loop systems  Transaction is processed by third party  Visa and MasterCard are examples
  • 45. 45 7 Setting Up Merchant Account Merchant bank  Also called acquiring bank  Does business with merchants that want to accept payment cards  Merchant receives account where they deposit card sales totals  Value of sales slips is credited to merchant’s account
  • 46. 46 7 Processing Payment Cards Online Can be done automatically by software packaged with electronic commerce software Can contract with third party to handle payment card processing  Can also pick, pack, and ship products to the customer  Allows merchant to focus on web presence and supply availability
  • 47. 47 7 Payment Processing Services Internetsecure  Provides secure credit card payment services  Supports payments with Visa and MasterCard  Provides risk management and fraud detection, and ensures all proper security for credit card transactions is maintained  Ensures all transactions are properly credited to merchant’s account
  • 48. 48 7 Payment Processing Services  Tellan  Provides PCAuthorize for smaller commerce sites and WebAuthorize for larger enterprise-class merchant sites  Both systems capture credit card information from the merchant’s form and connect directly to the bank network using dial-up or private, leased lines  Bank network receives credit information, performs credit authorization, and deposits the money in the merchant’s bank account  The merchant’s web site receives confirmation or rejection of the transaction, which is communicated to the customer
  • 49. 49 7 Processing a Payment Card Order Figure 7-13
  • 50. 50 7 Payment Processing Services  IC Verify  Provides electronic transaction processing for merchants for all major credit and debit cards  Also allows check guarantees and verification transactions  A CyberCash company  Authorize.Net  Online, real time service that links merchants with issuing banks by simply inserting a small block of HTML code into their transaction page
  • 51. 51 7 Secure Electronic Transaction (SET) Protocol Jointly designed by MasterCard and Visa with backing of Microsoft, Netscape, IBM, GTE, SAIC, and others Designed to provide security for card payments as they travel on the Internet  Contrasted with Secure Socket Layers (SSL) protocol, SET validates consumers and merchants in addition to providing secure transmission
  • 52. 52 7 Secure Electronic Transaction (SET) Protocol  Goal is single method of conducting payment transactions on the Internet  Acceptance of standard has been slow  SET specification  Uses public key cryptography and digital certificates for validating both consumers and merchants  Provides privacy, data integrity, user and merchant authentication, and consumer nonrepudiation
  • 54. 54 7 SET Payment Transactions  SET-protected payments work like this:  Consumer makes purchase by sending encrypted financial information along with digital certificate  Merchant’s website transfers the information to a payment card processing center while a Certification Authority certifies digital certificate belongs to sender  Payment card-processing center routes transaction to credit card issuer for approval  Merchant receives approval and credit card is charged  Merchant ships merchandise and adds transaction amount for deposit into merchant’s account
  • 55. 55 7 SET Protocol So far has received lukewarm reception 80 percent of SET activities are in Europe and Asian countries Problems with SET  Not easy to implement  Not as inexpensive as expected  Clumsy  Not tried and tested, and often not needed