SlideShare a Scribd company logo
ABSTRAC
T
 With the onset of the Information Age, our nation is becoming
increasingly dependent upon network communications.
 Computer-based technology is significantly impacting our ability to
access, store, and distribute information. Among the most
important uses of this technology is electronic commerce:
performing financial transactions via electronic information
exchanged over telecommunications lines.
 The need for security is highlighted by the rise of the Internet,
which promises to be a leading medium for future electronic
commerce.
 Electronic payment systems come in many forms including digital
cheques, debit cards, credit cards, and stored value cards.
 The usual security features for such systems are privacy,
authenticity, and no repudiation .
INTRODUCTION
Paper cash has such features as being: easily carried, recognizable
hence readily acceptable, transferable, untraceable (no record of where
money is spent), anonymous (no record of who spent the money) and
has the ability to make "change."
The designers of electronic cash focused on preserving the features of
un traceability and anonymity.
Thus, electronic cash is defined to be an electronic payment system that
provides, in addition to the above security features, the properties of user
anonymity and payment un traceability.
This term is often applied to any electronic payment scheme that
superficially resembles cash to the user. However, electronic cash is
a specific kind of electronic payment scheme, defined by certain
cryptographic properties.
Properties
Electronic Payment
Conceptual
Framework
Electronic Payment
The term electronic commerce refers to any financial transaction
involving the electronic transmission of information.
The packets of information being transmitted are commonly called
electronic tokens.
the storage medium as a card since it commonly takes the form of a
wallet-sized card made of plastic or cardboard.
The electronic payment scenario assumes three kinds of players
 A payer or consumer, whom we will name Alice,
 A payee, such as a merchant. We will name the payee Bob.
 A financial network with whom both Alice and Bob have accounts. We will
informally refer to the financial network as the Bank.
Conceptual Framework
There are four major components in an electronic cash system:
Issuers
Customers
Merchants
Regulators.
Issuers can be banks, or non-bank institutions; customers are referred to
users who spend E-Cash; merchants are vendors who receive E-Cash,
and regulators are defined as related government agencies. For an E-
Cash transaction to occur, we need to go through at least three stages:
 Account Setup: Customers will need to obtain E-Cash accounts
through certain issuers. Merchants who would like to accept E-
Cash will also need to arrange accounts from various E-Cash
issuers. Issuers typically handle accounting for customers and
merchants.
 Purchase: Customers purchase certain goods or services, and
give the merchants tokens which represent equivalent E-Cash.
Purchase information is usually encrypted when transmitting in the
networks.
 Authentication: Merchants will need to contact E-Cash issuers
about the purchase and the amount of E-Cash involved. E-Cash
issuers will then authenticate the transaction and approve the
amount E-Cash involved.
On-line
Off-line
Key elements of a private e-cash system
 Secure
 Anonymous
 Portable (physical independence)
 Infinite duration (until destroyed)
 Two-way (unrestricted)
 Off-line capable
 Divisible (fungible)
 Wide acceptability (trust)
 User-friendly (simple)
 Unit-of-value freedom
2 Existing and Proposed Retail Payment Systems
Automated Teller Machines
Debit Cards
POS Systems
How does E-cash work?
Basically, it's an ordinary card, made by Shlumberger, but with a very
smart mind. Instead of a magnetic strip, you have an actual microchip
containing all the data about that particular account is built into the
card.
All you have to do is operate the card with a unique Personal
Identification Number (PIN) that gives you credit facilities as well as full
security against misuse as long as you keep it to yourself. The
customer has to pay an annual sum for the use of the card.
Electronic cash system must have a way to protect against multiple
spending.
Token forgery can be prevented in an electronic cash system as long as the
cryptography is sound and securely implemented, the secret keys used to sign
coins are not compromised, and integrity is maintained on the public keys
“”””BETTING IS INJURIOUS”””

More Related Content

What's hot

Digital cash
Digital cashDigital cash
Digital cash
Urwi Keche
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-payments
raviteja reddy
 
Chapter 8 / Electronic Payment
Chapter 8 / Electronic  PaymentChapter 8 / Electronic  Payment
Chapter 8 / Electronic Payment
Eyad Almasri
 
E wallet
E walletE wallet
E wallet
Ayushi Shah
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)rahul kundu
 
E cash payment system
E cash payment systemE cash payment system
E cash payment systemRKPD
 
M-Commerce
M-CommerceM-Commerce
M-Commerce
jagrat123
 
E payment
E paymentE payment
E payment
Vishal Sancheti
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
Electronic or digital cash
Electronic or digital cashElectronic or digital cash
Electronic or digital cash
Mukesh Lal Karn
 
Risks involved in E-payment
Risks involved in E-payment Risks involved in E-payment
Risks involved in E-payment
14_18
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 
E Payment Methods
E Payment MethodsE Payment Methods
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment SystemMohammad Waqas
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
Anuj Gupta
 
E wallet- final
E wallet- finalE wallet- final
E wallet- final
Anshuman Roy
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
Mannu Khani
 
Ecash and ewallet
Ecash and ewalletEcash and ewallet
Ecash and ewallet
Tirthankar Sutradhar
 
Electronic payments ystem
Electronic payments ystem Electronic payments ystem
Electronic payments ystem Aditya Kumar
 

What's hot (20)

Digital cash
Digital cashDigital cash
Digital cash
 
digital tokens based on E-payments
digital tokens based on E-paymentsdigital tokens based on E-payments
digital tokens based on E-payments
 
Chapter 8 / Electronic Payment
Chapter 8 / Electronic  PaymentChapter 8 / Electronic  Payment
Chapter 8 / Electronic Payment
 
E wallet
E walletE wallet
E wallet
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
E cash payment system
E cash payment systemE cash payment system
E cash payment system
 
M-Commerce
M-CommerceM-Commerce
M-Commerce
 
E payment
E paymentE payment
E payment
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Electronic or digital cash
Electronic or digital cashElectronic or digital cash
Electronic or digital cash
 
Risks involved in E-payment
Risks involved in E-payment Risks involved in E-payment
Risks involved in E-payment
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
E Payment Methods
E Payment MethodsE Payment Methods
E Payment Methods
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
 
E wallet- final
E wallet- finalE wallet- final
E wallet- final
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 
Ecash and ewallet
Ecash and ewalletEcash and ewallet
Ecash and ewallet
 
Electronic payments ystem
Electronic payments ystem Electronic payments ystem
Electronic payments ystem
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 

Viewers also liked

eCash
eCasheCash
eCash
MAJU
 
Online payment and e cash
Online payment and e cashOnline payment and e cash
Online payment and e cash
FCA - Future Chartered Accountants
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
Rajat Sharma
 
Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)
Sahan Walpitagamage
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message Integrity
Abdul Manaf Vellakodath
 
Online %26 offline marketing
Online %26 offline marketingOnline %26 offline marketing
Online %26 offline marketing
Achi Amarasinghe
 
Consumer behaviour and marketing
Consumer behaviour and marketingConsumer behaviour and marketing
Consumer behaviour and marketingSukanti Sahoo
 
Comparision between online & offline marketing
Comparision between online & offline marketingComparision between online & offline marketing
Comparision between online & offline marketing
Sunil Kumar
 
Types of web portals
Types of web portalsTypes of web portals
Types of web portals
sanjeevagarwal123
 
Moved to https://slidr.io/azzazzel/what-is-a-portal
Moved to https://slidr.io/azzazzel/what-is-a-portalMoved to https://slidr.io/azzazzel/what-is-a-portal
Moved to https://slidr.io/azzazzel/what-is-a-portal
Milen Dyankov
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
Gerhard Fasol
 
Consumer Attitudes and Beliefs
Consumer Attitudes and BeliefsConsumer Attitudes and Beliefs
Consumer Attitudes and Beliefs
Abhipsha Mishra
 
Consumer attitude
Consumer attitudeConsumer attitude
Consumer attitude
Balachandar Kaliappan
 
Facebook thrift
Facebook thriftFacebook thrift
Facebook thrift
Bhuvana Laksminarayanan
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
Ram Dutt Shukla
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
Marya Sholevar
 
Consumer Behaviour-Attitude
Consumer Behaviour-AttitudeConsumer Behaviour-Attitude
Consumer Behaviour-Attitudeprincesstong
 

Viewers also liked (19)

eCash
eCasheCash
eCash
 
Online payment and e cash
Online payment and e cashOnline payment and e cash
Online payment and e cash
 
Ecash ppt
Ecash pptEcash ppt
Ecash ppt
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 
E Payment
E PaymentE Payment
E Payment
 
Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message Integrity
 
Online %26 offline marketing
Online %26 offline marketingOnline %26 offline marketing
Online %26 offline marketing
 
Consumer behaviour and marketing
Consumer behaviour and marketingConsumer behaviour and marketing
Consumer behaviour and marketing
 
Comparision between online & offline marketing
Comparision between online & offline marketingComparision between online & offline marketing
Comparision between online & offline marketing
 
Types of web portals
Types of web portalsTypes of web portals
Types of web portals
 
Moved to https://slidr.io/azzazzel/what-is-a-portal
Moved to https://slidr.io/azzazzel/what-is-a-portalMoved to https://slidr.io/azzazzel/what-is-a-portal
Moved to https://slidr.io/azzazzel/what-is-a-portal
 
Mobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in JapanMobile payments, e-money and mobile credit in Japan
Mobile payments, e-money and mobile credit in Japan
 
Consumer Attitudes and Beliefs
Consumer Attitudes and BeliefsConsumer Attitudes and Beliefs
Consumer Attitudes and Beliefs
 
Consumer attitude
Consumer attitudeConsumer attitude
Consumer attitude
 
Facebook thrift
Facebook thriftFacebook thrift
Facebook thrift
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
 
Consumer Behaviour-Attitude
Consumer Behaviour-AttitudeConsumer Behaviour-Attitude
Consumer Behaviour-Attitude
 

Similar to E cash payment

electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdf
UjwalReddyPB
 
Online payment system
Online payment systemOnline payment system
Online payment system
myangel27
 
Ec2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systemsEc2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systems
Nuth Otanasap
 
Electronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.comElectronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.comLearnInUrdu.com & Ustaadjee.com
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
Mohd. Ahmad Siddiqi
 
E-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEE-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVE
Dr. Abzal Basha H S
 
E-payment Systems .pptx
E-payment Systems .pptxE-payment Systems .pptx
E-payment Systems .pptx
ssuser8afefa
 
Elecrtonic payment system
Elecrtonic payment systemElecrtonic payment system
Elecrtonic payment system
Mukesh Lal Karn
 
Electronic payment system for e-commerce
Electronic payment system for e-commerceElectronic payment system for e-commerce
Electronic payment system for e-commerceAkash Pallod
 
Epayments system in India and globally iit project
Epayments system in India and globally iit project Epayments system in India and globally iit project
Epayments system in India and globally iit project
abhiROCKS1103
 
E commerce
E commerceE commerce
E commerce
Himadri Shekhar
 
Ecommerce_CH-4.ppt
Ecommerce_CH-4.pptEcommerce_CH-4.ppt
Ecommerce_CH-4.ppt
AynetuTerefe2
 
Plastic money and digital cash sept 2012 abbl card info
Plastic money and digital cash sept 2012 abbl card infoPlastic money and digital cash sept 2012 abbl card info
Plastic money and digital cash sept 2012 abbl card info
Shihab Uddin Khan
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment System
Tushar B Kute
 
Secure E-payment Protocol
Secure E-payment ProtocolSecure E-payment Protocol
Secure E-payment Protocol
CSCJournals
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146IJRAT
 
Unit3 ch1
Unit3 ch1Unit3 ch1
Unit3 ch1
Shard Kumar
 
E banking Services
E banking ServicesE banking Services
E banking Services
Antony Kolanchery
 

Similar to E cash payment (20)

electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdf
 
Ch 2
Ch 2Ch 2
Ch 2
 
Online payment system
Online payment systemOnline payment system
Online payment system
 
Ec2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systemsEc2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systems
 
Electronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.comElectronic payment systems - Presentation by IrfanAnsari.com
Electronic payment systems - Presentation by IrfanAnsari.com
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
E-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEE-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVE
 
Siddharth gaur
Siddharth gaurSiddharth gaur
Siddharth gaur
 
E-payment Systems .pptx
E-payment Systems .pptxE-payment Systems .pptx
E-payment Systems .pptx
 
Elecrtonic payment system
Elecrtonic payment systemElecrtonic payment system
Elecrtonic payment system
 
Electronic payment system for e-commerce
Electronic payment system for e-commerceElectronic payment system for e-commerce
Electronic payment system for e-commerce
 
Epayments system in India and globally iit project
Epayments system in India and globally iit project Epayments system in India and globally iit project
Epayments system in India and globally iit project
 
E commerce
E commerceE commerce
E commerce
 
Ecommerce_CH-4.ppt
Ecommerce_CH-4.pptEcommerce_CH-4.ppt
Ecommerce_CH-4.ppt
 
Plastic money and digital cash sept 2012 abbl card info
Plastic money and digital cash sept 2012 abbl card infoPlastic money and digital cash sept 2012 abbl card info
Plastic money and digital cash sept 2012 abbl card info
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment System
 
Secure E-payment Protocol
Secure E-payment ProtocolSecure E-payment Protocol
Secure E-payment Protocol
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146
 
Unit3 ch1
Unit3 ch1Unit3 ch1
Unit3 ch1
 
E banking Services
E banking ServicesE banking Services
E banking Services
 

More from Murlidhar Sarda

TRP
TRPTRP
Search engines
Search enginesSearch engines
Search engines
Murlidhar Sarda
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing Technology
Murlidhar Sarda
 
Lifi
LifiLifi
Human Imaginations
Human ImaginationsHuman Imaginations
Human Imaginations
Murlidhar Sarda
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
Murlidhar Sarda
 
Goal Line Technology
Goal Line TechnologyGoal Line Technology
Goal Line Technology
Murlidhar Sarda
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
Murlidhar Sarda
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Murlidhar Sarda
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Murlidhar Sarda
 
3 d password
3 d password3 d password
3 d password
Murlidhar Sarda
 
Silent Sound
Silent SoundSilent Sound
Silent Sound
Murlidhar Sarda
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
Murlidhar Sarda
 

More from Murlidhar Sarda (13)

TRP
TRPTRP
TRP
 
Search engines
Search enginesSearch engines
Search engines
 
Motion Capturing Technology
Motion Capturing TechnologyMotion Capturing Technology
Motion Capturing Technology
 
Lifi
LifiLifi
Lifi
 
Human Imaginations
Human ImaginationsHuman Imaginations
Human Imaginations
 
Human Cloning
Human CloningHuman Cloning
Human Cloning
 
Goal Line Technology
Goal Line TechnologyGoal Line Technology
Goal Line Technology
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
3 d password
3 d password3 d password
3 d password
 
Silent Sound
Silent SoundSilent Sound
Silent Sound
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

E cash payment

  • 1.
  • 2.
  • 3.
  • 4. ABSTRAC T  With the onset of the Information Age, our nation is becoming increasingly dependent upon network communications.  Computer-based technology is significantly impacting our ability to access, store, and distribute information. Among the most important uses of this technology is electronic commerce: performing financial transactions via electronic information exchanged over telecommunications lines.  The need for security is highlighted by the rise of the Internet, which promises to be a leading medium for future electronic commerce.
  • 5.  Electronic payment systems come in many forms including digital cheques, debit cards, credit cards, and stored value cards.  The usual security features for such systems are privacy, authenticity, and no repudiation .
  • 6. INTRODUCTION Paper cash has such features as being: easily carried, recognizable hence readily acceptable, transferable, untraceable (no record of where money is spent), anonymous (no record of who spent the money) and has the ability to make "change." The designers of electronic cash focused on preserving the features of un traceability and anonymity. Thus, electronic cash is defined to be an electronic payment system that provides, in addition to the above security features, the properties of user anonymity and payment un traceability.
  • 7. This term is often applied to any electronic payment scheme that superficially resembles cash to the user. However, electronic cash is a specific kind of electronic payment scheme, defined by certain cryptographic properties.
  • 8.
  • 10. Electronic Payment The term electronic commerce refers to any financial transaction involving the electronic transmission of information. The packets of information being transmitted are commonly called electronic tokens. the storage medium as a card since it commonly takes the form of a wallet-sized card made of plastic or cardboard.
  • 11. The electronic payment scenario assumes three kinds of players  A payer or consumer, whom we will name Alice,  A payee, such as a merchant. We will name the payee Bob.  A financial network with whom both Alice and Bob have accounts. We will informally refer to the financial network as the Bank.
  • 12. Conceptual Framework There are four major components in an electronic cash system: Issuers Customers Merchants Regulators. Issuers can be banks, or non-bank institutions; customers are referred to users who spend E-Cash; merchants are vendors who receive E-Cash, and regulators are defined as related government agencies. For an E- Cash transaction to occur, we need to go through at least three stages:
  • 13.
  • 14.  Account Setup: Customers will need to obtain E-Cash accounts through certain issuers. Merchants who would like to accept E- Cash will also need to arrange accounts from various E-Cash issuers. Issuers typically handle accounting for customers and merchants.  Purchase: Customers purchase certain goods or services, and give the merchants tokens which represent equivalent E-Cash. Purchase information is usually encrypted when transmitting in the networks.  Authentication: Merchants will need to contact E-Cash issuers about the purchase and the amount of E-Cash involved. E-Cash issuers will then authenticate the transaction and approve the amount E-Cash involved.
  • 16. Key elements of a private e-cash system  Secure  Anonymous  Portable (physical independence)  Infinite duration (until destroyed)  Two-way (unrestricted)  Off-line capable  Divisible (fungible)  Wide acceptability (trust)  User-friendly (simple)  Unit-of-value freedom
  • 17. 2 Existing and Proposed Retail Payment Systems Automated Teller Machines Debit Cards POS Systems
  • 18.
  • 19. How does E-cash work? Basically, it's an ordinary card, made by Shlumberger, but with a very smart mind. Instead of a magnetic strip, you have an actual microchip containing all the data about that particular account is built into the card. All you have to do is operate the card with a unique Personal Identification Number (PIN) that gives you credit facilities as well as full security against misuse as long as you keep it to yourself. The customer has to pay an annual sum for the use of the card.
  • 20. Electronic cash system must have a way to protect against multiple spending. Token forgery can be prevented in an electronic cash system as long as the cryptography is sound and securely implemented, the secret keys used to sign coins are not compromised, and integrity is maintained on the public keys