SlideShare a Scribd company logo
1 of 8
Secure Electronic
Transaction
Ms. Shweta Chanchlani
Information Technology Department
Shivajirao S. Jondhle
Polytechnic,Asangaon
1
Secure Electronic Transaction
(SET)
• Developed by Visa and MasterCard
• Designed to protect credit card
transactions
• Confidentiality: all messages encrypted
• Trust: all parties must have digital
certificates
• Privacy: information made available only
when and where necessary
2
Participants in the SET System
3
SET Business Requirements
• Provide confidentiality of payment and
ordering information
• Ensure the integrity of all transmitted
data
• Provide authentication that a
cardholder is a legitimate user.
• Provide authentication that a merchant
can accept credit card transactions
4
SET Transactions
5
SET Transactions
• The customer opens an account with a card
issuer.
• MasterCard, Visa, etc.
• The customer receives a X.509 V3 certificate
signed by a bank.
• X.509 V3
• The customer places an order for a product
or service with a merchant.
• The merchant sends a copy of its certificate
for verification.
6
Key Technologies of SET
• Confidentiality of information: DES
• Integrity of data: RSA digital signatures.
• Cardholder account authentication:
X.509v3 digital certificates .
• Merchant authentication: X.509v3 digital
certificates .
• Privacy: separation of order and payment
information using dual signatures
7
THANK YOU
8

More Related Content

Similar to Fdp week 1 presentation

Electronic transaction final
Electronic transaction finalElectronic transaction final
Electronic transaction final
ShikhaLohchab1
 
Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY
Syeda Tabia
 

Similar to Fdp week 1 presentation (20)

Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
E-Business security
E-Business security E-Business security
E-Business security
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)
 
Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET)
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
E commerce
E commerceE commerce
E commerce
 
E Payment
E PaymentE Payment
E Payment
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
Electronic transaction final
Electronic transaction finalElectronic transaction final
Electronic transaction final
 
Electronic-payment-system-1.pptx
Electronic-payment-system-1.pptxElectronic-payment-system-1.pptx
Electronic-payment-system-1.pptx
 
Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY Chapter 15: GETTING THE MONEY
Chapter 15: GETTING THE MONEY
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Fdp week 1 presentation

  • 1. Secure Electronic Transaction Ms. Shweta Chanchlani Information Technology Department Shivajirao S. Jondhle Polytechnic,Asangaon 1
  • 2. Secure Electronic Transaction (SET) • Developed by Visa and MasterCard • Designed to protect credit card transactions • Confidentiality: all messages encrypted • Trust: all parties must have digital certificates • Privacy: information made available only when and where necessary 2
  • 3. Participants in the SET System 3
  • 4. SET Business Requirements • Provide confidentiality of payment and ordering information • Ensure the integrity of all transmitted data • Provide authentication that a cardholder is a legitimate user. • Provide authentication that a merchant can accept credit card transactions 4
  • 6. SET Transactions • The customer opens an account with a card issuer. • MasterCard, Visa, etc. • The customer receives a X.509 V3 certificate signed by a bank. • X.509 V3 • The customer places an order for a product or service with a merchant. • The merchant sends a copy of its certificate for verification. 6
  • 7. Key Technologies of SET • Confidentiality of information: DES • Integrity of data: RSA digital signatures. • Cardholder account authentication: X.509v3 digital certificates . • Merchant authentication: X.509v3 digital certificates . • Privacy: separation of order and payment information using dual signatures 7