E- a secure trend. SET is used
E- commerce Assignment(15SE322E)On SET & EDISubmitted To: Submitted By:Mrs S Aruna Mam Shubham Tyagi RA1511002010694SETSET stands for Secure Electronic Transaction and can be explained as a communications protocol standard which basically used to secure our credit card transactions over networks like the Internet. SET is not only a payment system, but also it is known as a set of security protocols and formats that enable users to employ the existing credit card payment infrastructure on an open network in a secure trend. SET is used to ensure the security of financial transactions on the Internet. Some key features of the SET are:Information must be cofidentialData IntergratityAuthentication of account of cardholder.Authentication of the merchant.
Pocedure:Cardholders and merchants both must have to register with CA (certificate authority) first, before they buy or sell on the Internet. Once registration is done, the former can start to do transactions.It consists of 9 basic steps in this protocol.Customer search on the website and take the decision to purchaseCustomer sends payment and order based information, that has two parts in 1 message:Purchase Order – for merchantCard Information – for merchant’s bank .Merchant sends the card information to their bankMerchant’s bank crosschecks with Issuer for payment authorization.
Issuer transfer authorization to Merchant’s bank.Merchant’s bank send authorization to merchant.Merchant when completes the order , sends confirmation to the customer.Merchant grabs the transaction from their bank.Issuer prints credit card bill to customer.
SET transactions:(1.) The customer opens an account with a card issuer.It can be Visa ,MasterCard etc.(2.
) The customer receives a X.509 V3 certificate which signed by a bank.(3.) A merchant who accepts a certain brand of card must possess 2 X.509 V3 certificates.
-One for signing & one for key exchange.(4.) The customer places an order for a product or service through a merchant.)For verification, the merchant sends a certificate.) The customer sends order and payment information to the merchant.
) The merchant requests payment authorization from the payment gateway prior to shipment.) The merchant confirms order to the customer.) The merchant provide the goods and service to the customer.
(10.) The merchant then requests payment through the payment gateway. Technological aspects of SET:) DES) Integrity of data) Cardholder account authentication) Merchant authentication(5.) PrivacyDual Signatures: An essential technique presented in SET is the double signature. The fundamental target of the double signature is to interface 2 messages that are planned for two distinct beneficiaries. For that, the client needs to send the request data to the dealer and the installment data to the bank.
The operation for dual signature :(a.) Take the hash (SHA-1) of the payment and order information.(b.) These 2 hash values are concatenated and then we get the hashed result .(c.) Customer encrypts the final hash with a private key that creats the dual signature.EDIEDI remains for Electronic Data Interchange.
It is known as the electronic trade of business data utilizing a standard configuration. It is a procedure which makes one organization to send data to another organization by methods for electronic. By utilizing EDI, numerous business archives can be traded. The two most normal are the buy requests and solicitations. It replaces the mail planning and taking care of related with customary business correspondence. Clearly, the benefit of EDI is that it institutionalizes the data imparted in business records, which makes conceivable a paperless trade.EDI semantic layer :(a.
) Elaborates the business application(b.) Procurement exampleEDI layout:EDI in Action Information flow without EDI:Information flow – EDI:EDI applications in business:1. International or cross-border trade2. Electronic funds transfer(EFT).3. Health care EDI for insurance claims processing4.
Manufacturing & retail procurementPLAGIARISM :