SlideShare a Scribd company logo
PAYMENT CARD
SECURITY
AGENDA’S
• Introduction
• Security Issues
• Payment Card Industry
• Digital Certificate
• Protocols
• Advantages
• Disadvantage
• Conclusion
• References
INTRODUCTION
• In the past year, the number of users reachable
through Internet has increased dramatically
• Potential to establish a new kind of open
marketplace for goods and services
• Online shops in Internet
• Bookshop (Amazon.com)
• Flight Reservation and Hotel Reservation shopping
place, etc.
• An effective payment mechanism is needed
SECURITY ISSUES
• Internet is not a secure place
• Authorization, Access Control:
• protect intranet from hordes: Firewalls
• Confidentiality, Data Integrity:
• protect contents against snoopers: Encryption
• Authentication:
• both parties prove identity before starting transaction: Digital certificates
• Non-repudiation:
• proof that the document originated by you & you only: Digital signature
PAYMENT CARD INDUSTRY
PCI = Payment Card Industry
• PCI Data Security Standards compliance
• Validate our Data
• Validation method dependent on our “Merchant
Level”, which is a reflection of the number of
transactions per year
CONT.
• “Payment Card Industry” encompasses all the
organizations that store, process and transmit
cardholder data
• PCI Security Standards Council (PCI SSC)
• Card brands (VISA, MasterCard, etc.)
• Banks (Bank of America, Chase, etc.)
• Service Providers (manage the transactions for the
banks, like PayPal, First Data, VeriSign)
• Merchants (like K-State – the entity that takes the
credit card info from the customer)
Protect Cardholder Data
• Do not store sensitive authentication data after
authorization (even if encrypted)…
• … card verification value (3-digit code on back of
the card), PIN, or mag stripe content
• Render PAN [Primary Account Number] unreadable
anywhere it is stored…
• … examine a sample of removable media (for
example, back-up tapes) to confirm that the PAN is
rendered unreadable
DIGITAL CERTIFICATE
• A digital identity document binding a public-private
key pair to a specific person or organization
• Verifying a digital signature only proves that the
signer had the private key corresponding to the public
key used to decrypt the signature
• Does not prove that the public-private key pair
belonged to the claimed individual
• We need an independent third party to verify the
person’s identity (through non-electronic means) and
issue a digital certificate
DIGITAL CERTIFICATE CONTENTS
• Name of holder
• Public key of holder
• Name of trusted third party (certificate authority)
• DIGITAL SIGNATURE OF CERTIFICATE
AUTHORITY
• Data on which hash and public-key algorithms
have been used
• Other business or personal information
CERTIFICATION AUTHORITY
PROTOCOLS
• Credit card based
• Secure Electronic Transaction (SET)
• Secure Socket Layer (SSL)
• Electronic coins
• DigiCash
• Net Cash
CREDIT CARD BASED
• Parties involved: cardholder, merchant, issuer,
acquirer and payment gateway
• Transfer user's credit-card number to merchant via
insecure network
• A trusted third party to authenticate the public key
SET Encryption
Request is Sent to
E-commerce Server
E-Commerce Server
Verifies Transaction
Purchase
is Requested
Merchant
Sends Record
to Bank
Transaction
is Approved
Bank Credits
Merchant’s Account
SECURE ELECTRONIC
TRANSMISSION (SET)
SET
• Developed by VISA and MasterCard
• To facilitate secure payment card transactions over
the Internet
• Digital Certificates create a trust chain throughout the
transaction, verifying cardholder and merchant
validity
• It is the most secure payment protocol
CONT..
• The SET specification uses public key cryptography
and digital certificates for validating both consumers
and merchants.
• The SET protocol provides confidentiality, data
integrity, user and merchant authentication, and
consumer non-repudiation.
PAYMENT PROCESS
• The messages needed to perform a complete
purchase transaction usually include:
• Initialization (PInitReq/PInitRes)
• Purchase order (PReq/PRes)
• Authorization (AuthReq/AuthRes)
• Capture of payment (CapReq/CapRes)
INITIALIZATION
Cardholder Merchant
PInitReq: {BrandID, Chall_C}
PInitRes: {TransID, Date, Chall_C, Chall_M}SigM
PURCHASE ORDER
Cardholder Merchant
PReq: {OI, PI}
Pres: {TransID, [Results], Chall_C}SigM
AUTHORIZATION
Merchant Acquirer Issuer
{{AuthReq}SigM}PKA
{{AuthRes}SigA}PKM
Existing
Financial
Network
CAPTURE OF PAYMENT
Merchant Acquirer Issuer
{{CapRes}SigA}PKM
Existing
Financial
Network
Clearing
CapReq
CapToken
CapToken
ADVANTAGES
• It is secure enough to protect user's credit-card
numbers and personal information from attacks
• hardware independent
• world-wide usage
DISADVANTAGES
• User must have credit card
• No transfer of funds between users
• It is not cost-effective when the payment is small
• None of anonymity and it is traceable
SECURE SOCKET LAYER
• Created by Netscape for secure message
transmission.
• Uses public-key encryption
• Browser is the client
ELECTRONIC CASH/COINS
• Parties involved: client, merchant and bank
• Client must have an account in the bank
• Less security and encryption
• Suitable for small payment, but not for large payment
• E.g.. Net cash
Electronic Cash Payment Protocol: NetCash
Currency
Server 1
Currency
Server 2
5. Verify
coins
Buyer Merchant
7. Receipt
3. CS1’s
certificate
4. Validate
coins
2. New
coins
1. E-
Check
6. New
coins/E
-Check
Making a purchase with
NetCash
NET-CASH
A Net Cash coin has the following form:
- CS_name: - name of the currency server.
- CS add: - network address of the currency
server.
- Expiry: - the date on which the coin
becomes invalid..
CONT.
CONT..
- Serial #: - a unique identifier of the coin to the currency
server.
- Value: - the amount of the coin
Each coin is encrypted with currency server’s secret key
(SKcs), which becomes a digital signature to show that the
coin is authentic.
DIGICASH (E-CASH)
• A fully anonymous electronic cash system
• Using blind signature technique
• Parties involved: bank, buyer and merchant
• Using RSA public-key cryptography
• Special client and merchant software are needed
WITHDRAWING E-CASH/COINS
• User's cyber wallet software calculates how many
digital coins are needed to withdraw the requested
amount
• software then generates random serial numbers for
those coins
• the serial numbers are blinded by multiplying it by a
random factor
WITHDRAWING E-CASH COINS
• Blinded coins are packaged into a message, digitally
signed with user's private key, encrypted with the
bank's public key, then sent to the bank
• When the bank receives the message, it checks the
signature
• After signing the blind coins, the bank returns them to
the user
ADVANTAGES
• Cost-effective for small payment
• User can transfer his electronic coins to other user
• No need to apply credit card
• Anonymous feature
• Hardware independent
DISADVANTAGES
• It is not suitable for large payment because of lower
security
• Client must use wallet software in order to store the
withdrawn coins from the bank
• A large database to store used serial numbers to
prevent double spending
33
CONCLUSIONS
• An effective, secure and reliable Internet payment
system is needed
• Depending on the payment amount, different level of
security is used
• SET protocol is an outstanding payment protocol for
secure electronic commerce
34
REFERENCE'S
• http://sce.uhcl.edu/yang/teaching/csci5931webSe
curitySpr04/SecureSocketLayer.ppt
• http://www.it.iitb.ac.in/~sri/talks/secnet.ppt
• http://vfu.bg/en/e-Learning/E-Business--
Internet_payment_systems.ppt
• https://www.k-
state.edu/its/security/training/roundtables/presenta
tions/SIRT_roundtable_Jan11-credit_card_info.ppt
Thank u..

More Related Content

What's hot

secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
Harsh Mehta
 
E transaction
E transactionE transaction
E transaction
Zeeshan Ahmed
 
Cyber cash
Cyber cashCyber cash
E cash payment system
E cash payment systemE cash payment system
E cash payment systemRKPD
 
Ec ch5 e payment system
Ec ch5 e payment systemEc ch5 e payment system
Ec ch5 e payment system
Ahmad sohail Kakar
 
Unit 5
Unit 5Unit 5
The Future of Payments
The Future of PaymentsThe Future of Payments
The Future of Payments
Netcetera
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
electronic payment system
electronic payment systemelectronic payment system
electronic payment systemNikesh Patra
 
E payment_system1_257091537
 E payment_system1_257091537 E payment_system1_257091537
E payment_system1_257091537
Indore Management Institute & Research Centre
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Ashraf Bashir
 
Digital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by NetceteraDigital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by Netcetera
Netcetera
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
Narudom Roongsiriwong, CISSP
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
Rajat Sharma
 
E payment system
E payment systemE payment system
E payment system
Sanaya_36890
 
Online Payment System - Debit Cards, Direct Debit and Electronic Cash
Online Payment System - Debit Cards, Direct Debit and Electronic CashOnline Payment System - Debit Cards, Direct Debit and Electronic Cash
Online Payment System - Debit Cards, Direct Debit and Electronic CashJewel George Thomas
 
Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...
Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...
Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...
Blackbaud Pacific
 
Chp8 electronic payment system
Chp8 electronic payment systemChp8 electronic payment system
Chp8 electronic payment system
Engr Razaque
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 

What's hot (20)

secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
E transaction
E transactionE transaction
E transaction
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
E cash payment system
E cash payment systemE cash payment system
E cash payment system
 
Ec ch5 e payment system
Ec ch5 e payment systemEc ch5 e payment system
Ec ch5 e payment system
 
Unit 5
Unit 5Unit 5
Unit 5
 
The Future of Payments
The Future of PaymentsThe Future of Payments
The Future of Payments
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
electronic payment system
electronic payment systemelectronic payment system
electronic payment system
 
E payment_system1_257091537
 E payment_system1_257091537 E payment_system1_257091537
E payment_system1_257091537
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Digital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by NetceteraDigital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by Netcetera
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 
E payment system
E payment systemE payment system
E payment system
 
Online Payment System - Debit Cards, Direct Debit and Electronic Cash
Online Payment System - Debit Cards, Direct Debit and Electronic CashOnline Payment System - Debit Cards, Direct Debit and Electronic Cash
Online Payment System - Debit Cards, Direct Debit and Electronic Cash
 
Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...
Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...
Manage a Recurring Gift Process and Implement PCI Compliance with The Raiser’...
 
Chp8 electronic payment system
Chp8 electronic payment systemChp8 electronic payment system
Chp8 electronic payment system
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
Tisc99keynote
Tisc99keynoteTisc99keynote
Tisc99keynote
 

Similar to Payment card security By Hitesh Asnani SVIT

Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
Kartik Kalpande Patil
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
ShujaShah
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
chandrakaren21
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
حمد الشلوي
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Goutama Bachtiar
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
Mercury Processing Services International
 
ELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEMELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEM
60ml
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
60ml
 
E-Business security
E-Business security E-Business security
E-Business security
Surendhranatha Reddy
 
E commerce
E commerceE commerce
E commerce
Himadri Shekhar
 
SET.ppt
SET.pptSET.ppt
SET.ppt
SET.pptSET.ppt
SET.ppt
witscollege
 
SET.ppt
SET.pptSET.ppt
SET.ppt
aldi219529
 
Securing Online Card Transactions
Securing Online Card TransactionsSecuring Online Card Transactions
Securing Online Card Transactions
Shaillender (Bob) Mittal, CPSP
 
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techSerious_SamSoul
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
vishy230892
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
BangNgoVanCong
 

Similar to Payment card security By Hitesh Asnani SVIT (20)

Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
SET (1).ppt
SET (1).pptSET (1).ppt
SET (1).ppt
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
Secnet
SecnetSecnet
Secnet
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
 
ELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEMELECTRONIC PAYMENT SYSTEM
ELECTRONIC PAYMENT SYSTEM
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
E-Business security
E-Business security E-Business security
E-Business security
 
E commerce
E commerceE commerce
E commerce
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
SET.ppt
SET.pptSET.ppt
SET.ppt
 
Securing Online Card Transactions
Securing Online Card TransactionsSecuring Online Card Transactions
Securing Online Card Transactions
 
Class 11
Class 11Class 11
Class 11
 
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
 
secnet.ppt
secnet.pptsecnet.ppt
secnet.ppt
 
Secure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying TechnologiesSecure Web Transactions Electronic Commerce Underlying Technologies
Secure Web Transactions Electronic Commerce Underlying Technologies
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Payment card security By Hitesh Asnani SVIT

  • 2. AGENDA’S • Introduction • Security Issues • Payment Card Industry • Digital Certificate • Protocols • Advantages • Disadvantage • Conclusion • References
  • 3. INTRODUCTION • In the past year, the number of users reachable through Internet has increased dramatically • Potential to establish a new kind of open marketplace for goods and services • Online shops in Internet • Bookshop (Amazon.com) • Flight Reservation and Hotel Reservation shopping place, etc. • An effective payment mechanism is needed
  • 4. SECURITY ISSUES • Internet is not a secure place • Authorization, Access Control: • protect intranet from hordes: Firewalls • Confidentiality, Data Integrity: • protect contents against snoopers: Encryption • Authentication: • both parties prove identity before starting transaction: Digital certificates • Non-repudiation: • proof that the document originated by you & you only: Digital signature
  • 5. PAYMENT CARD INDUSTRY PCI = Payment Card Industry • PCI Data Security Standards compliance • Validate our Data • Validation method dependent on our “Merchant Level”, which is a reflection of the number of transactions per year
  • 6. CONT. • “Payment Card Industry” encompasses all the organizations that store, process and transmit cardholder data • PCI Security Standards Council (PCI SSC) • Card brands (VISA, MasterCard, etc.) • Banks (Bank of America, Chase, etc.) • Service Providers (manage the transactions for the banks, like PayPal, First Data, VeriSign) • Merchants (like K-State – the entity that takes the credit card info from the customer)
  • 7. Protect Cardholder Data • Do not store sensitive authentication data after authorization (even if encrypted)… • … card verification value (3-digit code on back of the card), PIN, or mag stripe content • Render PAN [Primary Account Number] unreadable anywhere it is stored… • … examine a sample of removable media (for example, back-up tapes) to confirm that the PAN is rendered unreadable
  • 8. DIGITAL CERTIFICATE • A digital identity document binding a public-private key pair to a specific person or organization • Verifying a digital signature only proves that the signer had the private key corresponding to the public key used to decrypt the signature • Does not prove that the public-private key pair belonged to the claimed individual • We need an independent third party to verify the person’s identity (through non-electronic means) and issue a digital certificate
  • 9. DIGITAL CERTIFICATE CONTENTS • Name of holder • Public key of holder • Name of trusted third party (certificate authority) • DIGITAL SIGNATURE OF CERTIFICATE AUTHORITY • Data on which hash and public-key algorithms have been used • Other business or personal information
  • 11. PROTOCOLS • Credit card based • Secure Electronic Transaction (SET) • Secure Socket Layer (SSL) • Electronic coins • DigiCash • Net Cash
  • 12. CREDIT CARD BASED • Parties involved: cardholder, merchant, issuer, acquirer and payment gateway • Transfer user's credit-card number to merchant via insecure network • A trusted third party to authenticate the public key
  • 13. SET Encryption Request is Sent to E-commerce Server E-Commerce Server Verifies Transaction Purchase is Requested Merchant Sends Record to Bank Transaction is Approved Bank Credits Merchant’s Account SECURE ELECTRONIC TRANSMISSION (SET)
  • 14. SET • Developed by VISA and MasterCard • To facilitate secure payment card transactions over the Internet • Digital Certificates create a trust chain throughout the transaction, verifying cardholder and merchant validity • It is the most secure payment protocol
  • 15. CONT.. • The SET specification uses public key cryptography and digital certificates for validating both consumers and merchants. • The SET protocol provides confidentiality, data integrity, user and merchant authentication, and consumer non-repudiation.
  • 16. PAYMENT PROCESS • The messages needed to perform a complete purchase transaction usually include: • Initialization (PInitReq/PInitRes) • Purchase order (PReq/PRes) • Authorization (AuthReq/AuthRes) • Capture of payment (CapReq/CapRes)
  • 17. INITIALIZATION Cardholder Merchant PInitReq: {BrandID, Chall_C} PInitRes: {TransID, Date, Chall_C, Chall_M}SigM
  • 18. PURCHASE ORDER Cardholder Merchant PReq: {OI, PI} Pres: {TransID, [Results], Chall_C}SigM
  • 20. CAPTURE OF PAYMENT Merchant Acquirer Issuer {{CapRes}SigA}PKM Existing Financial Network Clearing CapReq CapToken CapToken
  • 21. ADVANTAGES • It is secure enough to protect user's credit-card numbers and personal information from attacks • hardware independent • world-wide usage
  • 22. DISADVANTAGES • User must have credit card • No transfer of funds between users • It is not cost-effective when the payment is small • None of anonymity and it is traceable
  • 24. • Created by Netscape for secure message transmission. • Uses public-key encryption • Browser is the client
  • 25. ELECTRONIC CASH/COINS • Parties involved: client, merchant and bank • Client must have an account in the bank • Less security and encryption • Suitable for small payment, but not for large payment • E.g.. Net cash
  • 26. Electronic Cash Payment Protocol: NetCash Currency Server 1 Currency Server 2 5. Verify coins Buyer Merchant 7. Receipt 3. CS1’s certificate 4. Validate coins 2. New coins 1. E- Check 6. New coins/E -Check Making a purchase with NetCash NET-CASH
  • 27. A Net Cash coin has the following form: - CS_name: - name of the currency server. - CS add: - network address of the currency server. - Expiry: - the date on which the coin becomes invalid.. CONT.
  • 28. CONT.. - Serial #: - a unique identifier of the coin to the currency server. - Value: - the amount of the coin Each coin is encrypted with currency server’s secret key (SKcs), which becomes a digital signature to show that the coin is authentic.
  • 29. DIGICASH (E-CASH) • A fully anonymous electronic cash system • Using blind signature technique • Parties involved: bank, buyer and merchant • Using RSA public-key cryptography • Special client and merchant software are needed
  • 30. WITHDRAWING E-CASH/COINS • User's cyber wallet software calculates how many digital coins are needed to withdraw the requested amount • software then generates random serial numbers for those coins • the serial numbers are blinded by multiplying it by a random factor
  • 31. WITHDRAWING E-CASH COINS • Blinded coins are packaged into a message, digitally signed with user's private key, encrypted with the bank's public key, then sent to the bank • When the bank receives the message, it checks the signature • After signing the blind coins, the bank returns them to the user
  • 32. ADVANTAGES • Cost-effective for small payment • User can transfer his electronic coins to other user • No need to apply credit card • Anonymous feature • Hardware independent
  • 33. DISADVANTAGES • It is not suitable for large payment because of lower security • Client must use wallet software in order to store the withdrawn coins from the bank • A large database to store used serial numbers to prevent double spending 33
  • 34. CONCLUSIONS • An effective, secure and reliable Internet payment system is needed • Depending on the payment amount, different level of security is used • SET protocol is an outstanding payment protocol for secure electronic commerce 34
  • 35. REFERENCE'S • http://sce.uhcl.edu/yang/teaching/csci5931webSe curitySpr04/SecureSocketLayer.ppt • http://www.it.iitb.ac.in/~sri/talks/secnet.ppt • http://vfu.bg/en/e-Learning/E-Business-- Internet_payment_systems.ppt • https://www.k- state.edu/its/security/training/roundtables/presenta tions/SIRT_roundtable_Jan11-credit_card_info.ppt