SlideShare a Scribd company logo
1 of 6
ELECTRONI PAYMENT SYSTEMS
E-commerce sites use electronic payment, where electronic payment refers to paperless monetary
transactions. Electronic payment has revolutionized the business processing by reducing the
paperwork, transaction costs, and labor cost. Being user friendly and less time-consuming than
manual processing, it helps business organization to expand its market reach/expansion. Listed
below are some of the modes of electronic payments −
Credit Card
Debit Card
Smart Card
E-Money
Electronic Fund Transfer (EFT)
Credit Card
Payment using credit card is one of most common mode of electronic payment. Credit card is small
plastic card with a unique number attached with an account. It has also a magnetic strip embedded
in it which is used to read credit card via card readers. When a customer purchases a product via
credit card, credit card issuer bank pays on behalf of the customer and customer has a certain time
period after which he/she can pay the credit card bill. It is usually credit card monthly payment
cycle. Following are the actors in the credit card system.
The card holder − Customer
The merchant − seller of product who can accept credit card payments.
The card issuer bank − card holder's bank
The acquirer bank − the merchant's bank
The card brand − for example, visa or Master card.
Credit Card Payment Process
Step Description
Step 1 Bank issues and activates a credit card to the customer on his/her request.
Step 2 The customer presents the credit card information to the merchant site or to the merchant
from whom he/she wants to purchase a product/service.
Step 3 Merchant validates the customer's identity by asking for approval from the card brand
company.
Step 4 Card brand company authenticates the credit card and pays the transaction by credit.
Merchant keeps the sales slip.
Step 5 Merchant submits the sales slip to acquirer banks and gets the service charges paid to
him/her.
Step 6 Acquirer bank requests the card brand company to clear the credit amount and gets the
payment.
Step 6 Now the card brand company asks to clear the amount from the issuer bank and the
amount gets transferred to the card brand company.
Debit Card
Debit card, like credit card, is a small plastic card with a unique number mapped with the bank
account number. It is required to have a bank account before getting a debit card from the bank. The
major difference between a debit card and a credit card is that in case of payment through debit card,
the amount gets deducted from the card's bank account immediately and there should be sufficient
balance in the bank account for the transaction to get completed; whereas in case of a credit card
transaction, there is no such compulsion.
Debit cards free the customer to carry cash and cheques. Even merchants accept a debit card readily.
Having a restriction on the amount that can be withdrawn in a day using a debit card helps the
customer to keep a check on his/her spending.
Smart Card
Smart card is again similar to a credit card or a debit card in appearance, but it has a small
microprocessor chip embedded in it. It has the capacity to store a customer’s work-related and/or
personal information. Smart cards are also used to store money and the amount gets deducted after
every transaction.
Smart cards can only be accessed using a PIN that every customer is assigned with. Smart cards are
secure, as they store information in encrypted format and are less expensive/provides faster
processing. Mondex and Visa Cash cards are examples of smart cards.
E-Money
E-Money transactions refer to situation where payment is done over the network and the amount
gets transferred from one financial body to another financial body without any involvement of a
middleman. E-money transactions are faster, convenient, and saves a lot of time.
Online payments done via credit cards, debit cards, or smart cards are examples of emoney
transactions. Another popular example is e-cash. In case of e-cash, both customer and merchant
have to sign up with the bank or company issuing e-cash.
Electronic Fund Transfer
It is a very popular electronic payment method to transfer money from one bank account to another
bank account. Accounts can be in the same bank or different banks. Fund transfer can be done using
ATM (Automated Teller Machine) or using a computer.
Nowadays, internet-based EFT is getting popular. In this case, a customer uses the website provided
by the bank, logs in to the bank's website and registers another bank account. He/she then places a
request to transfer certain amount to that account. Customer's bank transfers the amount to other
account if it is in the same bank, otherwise the transfer request is forwarded to an ACH (Automated
Clearing House) to transfer the amount to other account and the amount is deducted from the
customer's account. Once the amount is transferred to other account, the customer is notified of the
fund transfer by the bank.
E-Commerce - Security Systems
Ecommerce security is essential if you are to make it in this industry. Are you aware that cyber-
criminals target mostly ecommerce businesses? Online businesses experienced 32.4% of all
successful cyber-attacks in 2018. A serious business should, therefore, employ
Rock-solid ecommerce security protocols and measures. It will keep the business and customers free
from attacks.
What is ecommerce or electronic commerce security?
Ecommerce security is the guidelines that ensure safe transaction through the internet. It consists of
protocols that safeguard people who engage in online selling and buying of goods and services. You
need to gain your customers’ trust byputting in place ecommerce security basics. Such basics include:
Privacy Integrity Authentication Non-repudiation
Privacy
Privacy includes preventing any activity that will lead to the sharing of customers’ data with
unauthorized third parties. Apart from the online seller that a customer has chosen, no one else
should access their personal information and account details.
A breach of confidentiality occurs when sellers let others have access to such information. An online
business should put in place at least anecessary minimum of anti-virus, firewall, encryption, and other
data protection. It will go a long way in protecting credit card and bank details of clients.
Integrity
Integrity is another crucial concept of ecommerce Security. It means ensuring that any information
that customers have shared online remains unaltered. The principle states thatthe online business is
utilizing the customers’ information as given, without changing anything. Altering any part of the
data causes the buyer to lose confidence in the security and integrity of the online enterprise.
Authentication
The principle of authentication in ecommerce security requires that both the seller and thebuyer
should be real. They should be who they say they are. The business should prove that it is real, deals
with genuine items or services, and delivers what it promises. The clients should also give their
proof of identity to make the seller feel secure about the online transactions. It is possible to ensure
authentication and identification. If you are unable to do so, hiring an expert will help a lot. Among
the standard solutions include client logins information and credit card PINs.
Non-repudiation
Repudiation means denial. Therefore, Non-repudiation is a legal principle that instructs players not
to deny their actions in a transaction. The business and the buyer should follow through on the
transaction part that they initiated. Ecommerce can feel less safe since it occurs in cyberspace with
no live video. Non-repudiation gives ecommerce security another layer. It confirms that the
communication that occurred between the two players indeed reached the recipients. Therefore, a
party in that particular transaction cannot denya signature, email, or a purchase.
Measures to ensure Security
Major security measures are following –
Encryption − Encryption is a means of securing digital data using one or more mathematical
techniques, along with a password or "key" used to decrypt the information. The encryption process
translates information using an algorithm that makes the original information unreadable. The
process, for instance, can convert an original text, known as plaintext, into an alternative form
known as cipher text. When an authorized user needs to read the data, they may decrypt the data
using a binary key. This will convert cipher text back to plaintext so that the authorized user can
access the original information.
Encryption is an important way for individuals and companies to protect sensitive information from
hacking. For example, websites that transmit credit card and bank account numbers should always
encrypt this information to prevent identity theft and fraud. The mathematical study and
application of encryption is known as cryptography.
Digital Signature − Digital signature ensures the authenticity of the information. A digital signature
is an e-signature authenticated through encryption and password.
A digital signature is a mathematical technique used to validate the authenticity and integrity of a
message, software or digital document. It's the digital equivalent of a handwritten signature or
stamped seal, but it offers far more inherent security. A digital signature is intended to solve the
problem of tampering and impersonation in digital communications.
Digital signatures can provide evidence of origin, identity and status of electronic documents,
transactions or digital messages. Signers can also use them to acknowledge informed consent.
Security Certificates − Security certificate is a unique digital id used to verify the identity of an
individual website or user.
Security Protocols in Internet
We will discuss here some of the popular protocols used over the internet to ensure secured online
transactions.
Secure Socket Layer (SSL) provides security to the data that is transferred between web browser
and server. SSL encrypts the link between a web server and a browser which ensures that all data
passed between them remain private and free from attack.
Secure Socket Layer Protocols:
 SSL record protocol
 Handshake protocol
 Change-cipher spec protocol
 Alert protocol
SSL Protocol Stack:
SSL Record Protocol:
SSL Record provides two services to SSL connection.
 Confidentiality
 Message Integrity
In the SSL Record Protocol application data is divided into fragments. The fragment is compressed
and then encrypted MAC (Message Authentication Code) generated by algorithms like SHA
(Secure Hash Protocol) and MD5 (Message Digest) is appended. After that encryption of the data is
done and in last SSL header is appended to the data.
Handshake Protocol:
Handshake Protocol is used to establish sessions. This protocol allows the client and server to
authenticate each other by sending a series of messages to each other. Handshake protocol uses four
phases to complete its cycle.
 Phase-1: In Phase-1 both Client and Server send hello-packets to each other. In this IP session,
cipher suite and protocol version are exchanged for security purposes.
 Phase-2: Server sends his certificate and Server-key-exchange. The server end phase-2 by
sending the Server-hello-end packet.
 Phase-3: In this phase Client reply to the server by sending his certificate and Client-exchange-
key.
 Phase-4: In Phase-4 Change-cipher suite occurred and after this Handshake Protocol ends.
Change-cipher Protocol:
This protocol uses the SSL record protocol. Unless Handshake Protocol is completed, the SSL
record Output will be in a pending state. After handshake protocol, the Pending state is converted
into the current state.
Change-cipher protocol consists of a single message which is 1 byte in length and can have only
one value. This protocol’s purpose is to cause the pending state to be copied into the current state.
Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity. Each message in this
protocol contain 2 bytes.
The level is further classified into two parts:
 Warning:
This Alert has no impact on the connection between sender and receiver.
 Fatal Error:
This Alert breaks the connection between sender and receiver.
Silent Features of Secure Socket Layer:
 The advantage of this approach is that the service can be tailored to the specific needs of the
given application.
 Secure Socket Layer was originated by Netscape.
 SSL is designed to make use of TCP to provide reliable end-to-end secure service.
 This is a two-layered protocol.
Secure Hypertext Transfer Protocol (SHTTP)
SHTTP extends the HTTP internet protocol with public key encryption, authentication, and digital
signature over the internet. Secure HTTP supports multiple security mechanism, providing security
to the end-users. SHTTP works by negotiating encryption scheme types used between the client and
the server.
Secure Electronic Transaction
It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the
best security protocol. It has the following components −
Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure
purchases online via point and click interface.
Merchant Software − this software helps merchants to communicate with potential customers and
financial institutions in a secure manner.
Payment Gateway ServerSoftware − Payment gateway provides automatic and standard payment
process. ``It supports the process for merchant's certificate request.
Certificate Authority Software − this software is used by financial institutions to issue digital
certificates to card holders and merchants, and to enable them to register their account agreements
for secure electronic commerce.
ELECTRONIC PAYMENT SYSTEMS GUIDE

More Related Content

What's hot (20)

E commerce
E commerce E commerce
E commerce
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
e-commerce and internet banking
e-commerce and internet bankinge-commerce and internet banking
e-commerce and internet banking
 
E commerce in the current scenario
E  commerce in the current scenarioE  commerce in the current scenario
E commerce in the current scenario
 
Introduction To E Commerce
Introduction To E CommerceIntroduction To E Commerce
Introduction To E Commerce
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
E-marketplace
E-marketplaceE-marketplace
E-marketplace
 
E commerce
E commerceE commerce
E commerce
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 
ECommerce in one Presentation...
ECommerce in one Presentation...ECommerce in one Presentation...
ECommerce in one Presentation...
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
Ecommerce types and payment models
Ecommerce types and payment modelsEcommerce types and payment models
Ecommerce types and payment models
 
E commerce unit 3
E commerce unit 3E commerce unit 3
E commerce unit 3
 
E business
E businessE business
E business
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
Introduction to eCommerce
Introduction to eCommerceIntroduction to eCommerce
Introduction to eCommerce
 
E commerece intr rashid
E commerece intr rashidE commerece intr rashid
E commerece intr rashid
 
Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)
 
E-Commerce
 E-Commerce E-Commerce
E-Commerce
 
E commerce presentation
E commerce presentationE commerce presentation
E commerce presentation
 

Similar to ELECTRONIC PAYMENT SYSTEMS GUIDE

Electronic wallets and payment system
Electronic wallets and payment systemElectronic wallets and payment system
Electronic wallets and payment systemMaher Manan
 
The lecturer
The lecturerThe lecturer
The lecturerndifuna
 
electronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdfelectronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdfVamshi963187
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment SystemMohammad Waqas
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemTushar B Kute
 
Electronic Payment System (EPS) Presentation
Electronic Payment System (EPS) PresentationElectronic Payment System (EPS) Presentation
Electronic Payment System (EPS) PresentationDevansh Aggarwal
 
Credit card processing highrisk gateways
Credit card processing   highrisk gatewaysCredit card processing   highrisk gateways
Credit card processing highrisk gatewayshighrisk gateways
 
The Payments Glossary
The Payments GlossaryThe Payments Glossary
The Payments GlossaryPayfirma
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceVinay Chaithanya
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...
Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...
Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...itio Innovex Pvt Ltv
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptxAkash588342
 
These things you must know about online payment solutions.
These things you must know about online payment solutions.These things you must know about online payment solutions.
These things you must know about online payment solutions.Riya Sen
 

Similar to ELECTRONIC PAYMENT SYSTEMS GUIDE (20)

Ecommerce_CH-4.ppt
Ecommerce_CH-4.pptEcommerce_CH-4.ppt
Ecommerce_CH-4.ppt
 
Electronic wallets and payment system
Electronic wallets and payment systemElectronic wallets and payment system
Electronic wallets and payment system
 
Ecommerce_Ch5.ppt
Ecommerce_Ch5.pptEcommerce_Ch5.ppt
Ecommerce_Ch5.ppt
 
The lecturer
The lecturerThe lecturer
The lecturer
 
electronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdfelectronicpaymentppt-140601022736-phpapp02 (1).pdf
electronicpaymentppt-140601022736-phpapp02 (1).pdf
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment System
 
Electronic Payment System (EPS) Presentation
Electronic Payment System (EPS) PresentationElectronic Payment System (EPS) Presentation
Electronic Payment System (EPS) Presentation
 
Unit v
Unit vUnit v
Unit v
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
Credit card processing highrisk gateways
Credit card processing   highrisk gatewaysCredit card processing   highrisk gateways
Credit card processing highrisk gateways
 
The Payments Glossary
The Payments GlossaryThe Payments Glossary
The Payments Glossary
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Unit3 ch1
Unit3 ch1Unit3 ch1
Unit3 ch1
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...
Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...
Understanding B2B Payments- Explore Out the Payment Techniques and Their Key ...
 
E commerce
E  commerce E  commerce
E commerce
 
Ecommerce 27-1.pptx
Ecommerce 27-1.pptxEcommerce 27-1.pptx
Ecommerce 27-1.pptx
 
Digital banking
Digital bankingDigital banking
Digital banking
 
These things you must know about online payment solutions.
These things you must know about online payment solutions.These things you must know about online payment solutions.
These things you must know about online payment solutions.
 

Recently uploaded

Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
Attachment Of Assets......................
Attachment Of Assets......................Attachment Of Assets......................
Attachment Of Assets......................AmanBajaj36
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 

Recently uploaded (20)

Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Mulki Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Attachment Of Assets......................
Attachment Of Assets......................Attachment Of Assets......................
Attachment Of Assets......................
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 

ELECTRONIC PAYMENT SYSTEMS GUIDE

  • 1. ELECTRONI PAYMENT SYSTEMS E-commerce sites use electronic payment, where electronic payment refers to paperless monetary transactions. Electronic payment has revolutionized the business processing by reducing the paperwork, transaction costs, and labor cost. Being user friendly and less time-consuming than manual processing, it helps business organization to expand its market reach/expansion. Listed below are some of the modes of electronic payments − Credit Card Debit Card Smart Card E-Money Electronic Fund Transfer (EFT) Credit Card Payment using credit card is one of most common mode of electronic payment. Credit card is small plastic card with a unique number attached with an account. It has also a magnetic strip embedded in it which is used to read credit card via card readers. When a customer purchases a product via credit card, credit card issuer bank pays on behalf of the customer and customer has a certain time period after which he/she can pay the credit card bill. It is usually credit card monthly payment cycle. Following are the actors in the credit card system. The card holder − Customer The merchant − seller of product who can accept credit card payments. The card issuer bank − card holder's bank The acquirer bank − the merchant's bank The card brand − for example, visa or Master card. Credit Card Payment Process Step Description Step 1 Bank issues and activates a credit card to the customer on his/her request. Step 2 The customer presents the credit card information to the merchant site or to the merchant from whom he/she wants to purchase a product/service. Step 3 Merchant validates the customer's identity by asking for approval from the card brand company. Step 4 Card brand company authenticates the credit card and pays the transaction by credit. Merchant keeps the sales slip. Step 5 Merchant submits the sales slip to acquirer banks and gets the service charges paid to him/her. Step 6 Acquirer bank requests the card brand company to clear the credit amount and gets the payment. Step 6 Now the card brand company asks to clear the amount from the issuer bank and the amount gets transferred to the card brand company. Debit Card Debit card, like credit card, is a small plastic card with a unique number mapped with the bank account number. It is required to have a bank account before getting a debit card from the bank. The major difference between a debit card and a credit card is that in case of payment through debit card,
  • 2. the amount gets deducted from the card's bank account immediately and there should be sufficient balance in the bank account for the transaction to get completed; whereas in case of a credit card transaction, there is no such compulsion. Debit cards free the customer to carry cash and cheques. Even merchants accept a debit card readily. Having a restriction on the amount that can be withdrawn in a day using a debit card helps the customer to keep a check on his/her spending. Smart Card Smart card is again similar to a credit card or a debit card in appearance, but it has a small microprocessor chip embedded in it. It has the capacity to store a customer’s work-related and/or personal information. Smart cards are also used to store money and the amount gets deducted after every transaction. Smart cards can only be accessed using a PIN that every customer is assigned with. Smart cards are secure, as they store information in encrypted format and are less expensive/provides faster processing. Mondex and Visa Cash cards are examples of smart cards. E-Money E-Money transactions refer to situation where payment is done over the network and the amount gets transferred from one financial body to another financial body without any involvement of a middleman. E-money transactions are faster, convenient, and saves a lot of time. Online payments done via credit cards, debit cards, or smart cards are examples of emoney transactions. Another popular example is e-cash. In case of e-cash, both customer and merchant have to sign up with the bank or company issuing e-cash. Electronic Fund Transfer It is a very popular electronic payment method to transfer money from one bank account to another bank account. Accounts can be in the same bank or different banks. Fund transfer can be done using ATM (Automated Teller Machine) or using a computer. Nowadays, internet-based EFT is getting popular. In this case, a customer uses the website provided by the bank, logs in to the bank's website and registers another bank account. He/she then places a request to transfer certain amount to that account. Customer's bank transfers the amount to other account if it is in the same bank, otherwise the transfer request is forwarded to an ACH (Automated Clearing House) to transfer the amount to other account and the amount is deducted from the customer's account. Once the amount is transferred to other account, the customer is notified of the fund transfer by the bank. E-Commerce - Security Systems Ecommerce security is essential if you are to make it in this industry. Are you aware that cyber- criminals target mostly ecommerce businesses? Online businesses experienced 32.4% of all successful cyber-attacks in 2018. A serious business should, therefore, employ Rock-solid ecommerce security protocols and measures. It will keep the business and customers free from attacks. What is ecommerce or electronic commerce security? Ecommerce security is the guidelines that ensure safe transaction through the internet. It consists of protocols that safeguard people who engage in online selling and buying of goods and services. You need to gain your customers’ trust byputting in place ecommerce security basics. Such basics include: Privacy Integrity Authentication Non-repudiation Privacy Privacy includes preventing any activity that will lead to the sharing of customers’ data with unauthorized third parties. Apart from the online seller that a customer has chosen, no one else should access their personal information and account details. A breach of confidentiality occurs when sellers let others have access to such information. An online
  • 3. business should put in place at least anecessary minimum of anti-virus, firewall, encryption, and other data protection. It will go a long way in protecting credit card and bank details of clients. Integrity Integrity is another crucial concept of ecommerce Security. It means ensuring that any information that customers have shared online remains unaltered. The principle states thatthe online business is utilizing the customers’ information as given, without changing anything. Altering any part of the data causes the buyer to lose confidence in the security and integrity of the online enterprise. Authentication The principle of authentication in ecommerce security requires that both the seller and thebuyer should be real. They should be who they say they are. The business should prove that it is real, deals with genuine items or services, and delivers what it promises. The clients should also give their proof of identity to make the seller feel secure about the online transactions. It is possible to ensure authentication and identification. If you are unable to do so, hiring an expert will help a lot. Among the standard solutions include client logins information and credit card PINs. Non-repudiation Repudiation means denial. Therefore, Non-repudiation is a legal principle that instructs players not to deny their actions in a transaction. The business and the buyer should follow through on the transaction part that they initiated. Ecommerce can feel less safe since it occurs in cyberspace with no live video. Non-repudiation gives ecommerce security another layer. It confirms that the communication that occurred between the two players indeed reached the recipients. Therefore, a party in that particular transaction cannot denya signature, email, or a purchase. Measures to ensure Security Major security measures are following – Encryption − Encryption is a means of securing digital data using one or more mathematical techniques, along with a password or "key" used to decrypt the information. The encryption process translates information using an algorithm that makes the original information unreadable. The process, for instance, can convert an original text, known as plaintext, into an alternative form known as cipher text. When an authorized user needs to read the data, they may decrypt the data using a binary key. This will convert cipher text back to plaintext so that the authorized user can access the original information. Encryption is an important way for individuals and companies to protect sensitive information from hacking. For example, websites that transmit credit card and bank account numbers should always encrypt this information to prevent identity theft and fraud. The mathematical study and application of encryption is known as cryptography. Digital Signature − Digital signature ensures the authenticity of the information. A digital signature is an e-signature authenticated through encryption and password. A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. A digital signature is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages. Signers can also use them to acknowledge informed consent. Security Certificates − Security certificate is a unique digital id used to verify the identity of an individual website or user. Security Protocols in Internet We will discuss here some of the popular protocols used over the internet to ensure secured online transactions.
  • 4. Secure Socket Layer (SSL) provides security to the data that is transferred between web browser and server. SSL encrypts the link between a web server and a browser which ensures that all data passed between them remain private and free from attack. Secure Socket Layer Protocols:  SSL record protocol  Handshake protocol  Change-cipher spec protocol  Alert protocol SSL Protocol Stack: SSL Record Protocol: SSL Record provides two services to SSL connection.  Confidentiality  Message Integrity In the SSL Record Protocol application data is divided into fragments. The fragment is compressed and then encrypted MAC (Message Authentication Code) generated by algorithms like SHA (Secure Hash Protocol) and MD5 (Message Digest) is appended. After that encryption of the data is done and in last SSL header is appended to the data. Handshake Protocol: Handshake Protocol is used to establish sessions. This protocol allows the client and server to authenticate each other by sending a series of messages to each other. Handshake protocol uses four phases to complete its cycle.  Phase-1: In Phase-1 both Client and Server send hello-packets to each other. In this IP session, cipher suite and protocol version are exchanged for security purposes.  Phase-2: Server sends his certificate and Server-key-exchange. The server end phase-2 by sending the Server-hello-end packet.
  • 5.  Phase-3: In this phase Client reply to the server by sending his certificate and Client-exchange- key.  Phase-4: In Phase-4 Change-cipher suite occurred and after this Handshake Protocol ends. Change-cipher Protocol: This protocol uses the SSL record protocol. Unless Handshake Protocol is completed, the SSL record Output will be in a pending state. After handshake protocol, the Pending state is converted into the current state. Change-cipher protocol consists of a single message which is 1 byte in length and can have only one value. This protocol’s purpose is to cause the pending state to be copied into the current state. Alert Protocol: This protocol is used to convey SSL-related alerts to the peer entity. Each message in this protocol contain 2 bytes. The level is further classified into two parts:  Warning: This Alert has no impact on the connection between sender and receiver.  Fatal Error: This Alert breaks the connection between sender and receiver. Silent Features of Secure Socket Layer:  The advantage of this approach is that the service can be tailored to the specific needs of the given application.  Secure Socket Layer was originated by Netscape.  SSL is designed to make use of TCP to provide reliable end-to-end secure service.  This is a two-layered protocol. Secure Hypertext Transfer Protocol (SHTTP) SHTTP extends the HTTP internet protocol with public key encryption, authentication, and digital signature over the internet. Secure HTTP supports multiple security mechanism, providing security to the end-users. SHTTP works by negotiating encryption scheme types used between the client and the server. Secure Electronic Transaction It is a secure protocol developed by MasterCard and Visa in collaboration. Theoretically, it is the best security protocol. It has the following components − Card Holder's Digital Wallet Software − Digital Wallet allows the card holder to make secure purchases online via point and click interface. Merchant Software − this software helps merchants to communicate with potential customers and financial institutions in a secure manner. Payment Gateway ServerSoftware − Payment gateway provides automatic and standard payment process. ``It supports the process for merchant's certificate request. Certificate Authority Software − this software is used by financial institutions to issue digital certificates to card holders and merchants, and to enable them to register their account agreements for secure electronic commerce.