html5-img
1 / 13

E-Commerce: Fundamentals and Applications

E-Commerce: Fundamentals and Applications. Chapter 10 : Internet Payment Systems. Outline. Features of payment methods 4 C’s payment methods Credit card payment E-cash E-check Micropayments Smart card payment. Cash. Credit card. Check. Credit/debit. Anonymity. Yes, in general. No.

kellsie
Download Presentation

E-Commerce: Fundamentals and Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-Commerce: Fundamentals and Applications Chapter 10 : Internet Payment Systems

  2. Outline • Features of payment methods • 4 C’s payment methods • Credit card payment • E-cash • E-check • Micropayments • Smart card payment

  3. Cash Credit card Check Credit/debit Anonymity Yes, in general No No No Overhead cost Lowest, in general Higher than cash and credit/debit because of the paper work involved Highest, in general Low Divisibility Not completely divisible Yes Yes Yes Acceptability Yes, in general Yes, in general No, in general it can only be used locally No, in general it can only be used locally Security Good Good Good Good Transferability Yes No No No Comparison of the 4C’s Payment Methods

  4. Credit card payment • Most popular payment method • Especially for B2C e-commerce • 1st generation: No protection, only provide credit card number for processing • 2nd generation: SSL for protecting the transfer of credit card information • 3rd generation: SET for secure credit card authorization • 4th generation: Portable smart cards?

  5. SET: Seven business requirements (according to SET Book 1) • Provide confidentiality of payment information • Ensure the integrity of all transmitted data • Provide cardholder’s authentication • Provide merchant’s authentication • Ensure the use of the best security practices and system design techniques • Create a protocol that is independent on the transport layer protocol • Facilitate interoperability • (Please read Book 1: Business Description at http://www.setco.org/download.html/#spec)

  6. Payment/Inquiry Cardholder Authorization and Capture Existing financial network Authorization and Capture Merchant Payment gateway/ Acquirer Issuer Internet Certificate authority Network Architecture of SET System

  7. E-check • Let’s say the content of a check is C which includes the payment amount and other information. • The check is signed by finding the message digest of C and then encrypting it with the payer’s private key. • The check together with the digital signature is forwarded to the payee. • The payee sends the check to the bank for check clearing through the existing procedures. • The bank verifies the digital signature of the check using payer’s public key. • Find out more from www.echeck.org • In particular, please read http://www.echeck.org/library/wp/ArchitectualOverview.pdf

  8. Payer’s bank Payer’s bank Payer’s bank Payee’s bank Payee’s bank Payee’s bank Payer Payer Payer Payee Payee Payee        Send check  Sendstatement  Depositcheck  Send report  Clear check  Send check  Transfer funds  Cash check  Send report  Notify result  Sendstatement Deposit-and-clear Cash-and-transfer Payer’s bank Payee’s bank Payer Payee              Send check  Send report  Clear check  Sendstatement  Send check  Send report  Transfer funds  Sendstatement Lockbox Funds transfer  Four Different Scenarios of the FSTC E-check System

  9. Overview of E-cash • What are the two distinctive characteristics for cash? • Anonymity and transferability • Ecash was developed by DigiCash and is now provided by ecashtechnologies (http://www.ecashtechnologies.com) • Its founder David Chaum is a well known expert in the area of digital cash. • Ecash allows anonymous and secure electronic cash payment over the Internet. • Since 1995, Mark Twain bank (USA) has been providing Ecash services. • Ecash is based on an innovative blind signature method.

  10. Bank Customer VBS (Merchant) Send the blinded coins to the bank Debit the account and sign the blinded coins Generate the blinded coins Return the signed blinded coins Unblind the coins Pay by the coins Check the validity of the coins and whether they have been spent and credit the account accordingly Deposit the coins Confirm the deposit Ship goods or perform the service Basic Operation of E-cash system

  11. Micropayment methods • Traditional payment methods are called macropayment methods. • A new type of payment method known as micropayment method is emerging to cater for very low value transactions. • Example: • Millicent (pre-payment/credit based) • Paywords (post-payment)

  12. A Smart Card RAM I/O CPU ROM EPROM Microchip with mechanical contacts Schematic overview of a smart card

  13. Example: Mondex • Direct transfer of electronic money between two cards • Transfer of electronic money over the Internet or telephone networks etc. • Keep transaction records • Password protection and “lock card” functions • Portable balance finder to check balance • Support multiple currencies

More Related