1 / 24

EC Technologies and the Internet

Explore the benefits, considerations, and challenges of Web EDI, XML, and Internet EDI in this informative article. Learn about low-cost entry, security, audits, controls, and more.

fupton
Download Presentation

EC Technologies and the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EC Technologies and the Internet Steve McVey Director of Web Commerce Sterling Commerce, Inc. steve_mcvey@stercomm.com 614-791-6408 Federation of Tax Administrators December 21, 2019

  2. EC Technologies and the Internet • Web EDI • XML • Internet EDI

  3. Web EDI • Extend Trading Communities • Low Cost of Entry • Browser and Forms-Based • Back-End is EDI or flat file Traditional EDI (15%) File transfers (25%) Forms-based (60%)

  4. Web EDI Important Considerations: • Security • Audits and Controls • Recovery • Performance

  5. Web Forms Example

  6. XML • XML - eXtensible Markup Language • A markup language for documents containing structured information • Contains both content and context • Compelling Reasons for Use • Relatively easy to implement • Suitable for business process integration and visual rendering • Rapid acceptance by the market

  7. Complex Powerful and extensible Used for formatting of complex technical documents SGML Standard Generalized Markup Language XML eXtensible Markup Language Easy to use Extensible Separates content from presentation Used for web integration Easy to use Defines data presentation, not the content Does not facilitate application integration Used for presentation of simple information HTML HyperText Markup Language XML

  8. XML XML Document DTD DTD DTD XSL Browser View App Systems KEY DTD - Document Type Definition XSL - eXtensible Style Language

  9. XML XML and EDI • Similar goals: inter-enterprise business process integration • EDI • Well-established, mature • Limited audience • Highly structured • Semantics agreed upon • XML • Emerging • Easy to understand • Largely unstructured • Semantics under development

  10. XML -- Sample XML Purchase Order <order> <order-no>654321</order-no> <order-date>19980322</order-date> <ship-to> <DUNS=”5551122222"> <address> <address:name>Dave Wilkinson</address:name> <address:address1>123 W Main St </address:address1> <address:city>Columbus</address:city> <address:state>OH</address:state> </address> </ship-to> <bill-to> <DUNS="8580828442"> <address> <address:name>Sterling Commerce</address:name> <address:address1>4600 Lakehurst Ct. </address:address1> <address:city>Columbus</address:city> <address:state>OH</address:state> <address:zipcode>43019</address:zipcode> </address> </bill-to> <item> <item:identifier> <item:SKU>123456789</item:SKU> <item:UPC>987654321</item:UPC> <item:name>A Real Big Fast Computer</item:name> </item:identifier> <item:quantity>1</item:quantity> <item:unit>EA</item:unit> <item:price>3299.99</item:price> </item> </order>

  11. XML -- Sample EDI Purchase Order BEG*00*NE*654321**19980322~ N1*ST*DAVE WILKINSON*1*5551122222~ N3*123 W MAIN ST~ N4*DUBLIN*OH*43228~ N1*BT*STERLING COMMERCE*1*8580828442~ N3*4600 LAKEHURST CT~ N4*DUBLIN*OH*43019~ PO1**1*EA*3299.99**UP*987654321*VC*123456789~ PID***A REAL BIG FAST COMPUTER~ CTT*1~

  12. XML • XML Challenges • Multiple implementations • Vendor - Ariba (cXML), Commerce One (CBL) • Industry - RosettaNet • Enterprise • Hybrid world • Not everyone will adopt XML at the same pace • Evolving technology • More information: • Sterling Commerce White Paper: “XML and Electronic Commerce” • www.xmledi.org • www.xml.com

  13. Internet EDI — EDIINT • Electronic Data Interchange - Interoperability (EDIINT) • Working Group of the Internet Engineering Task force (IETF) to provide for multi-vendor, inter-operable exchange of business documents among organizations over the Internet • EDIINT AS1 - SMTP • CommerceNet certified interoperability testing • http://www.ietf.org/internet-drafts/draft-ietf-ediint-as1-09.txt • EDIINT AS2 - HTTP • Slated for completion in 10/99 • http://www.ietf.org/internet-drafts/draft-ietf-ediint-as2-04.txt

  14. Background • EDIINT Standard addresses: • Privacy • Authentication • Integrity • Non-Repudiation • CommerceNet certified interoperability testing • www.commerce.net

  15. Internet EDI — EDIINT Convergence of Standards • UCC • Using AS1 (SMTP) • Pilot Project Complete October 1998 • Automotive/ANX • Adopting AS2 (HTTP) • Includes “E5” Standard • Gas/Energy • Adopting AS2 (HTTP) • Includes GISB Standard

  16. SENDER RECEIVER Security Overview Symmetric Key Encryption Key Key Encryption Decryption Plaintext Plaintext Ciphertext

  17. SENDER RECEIVER Security Overview Asymmetric Key Encryption Public Key Private Key Encryption Decryption Plaintext Plaintext Ciphertext

  18. Symmetric Keys Advantages Fast Simple Disadvantages Multiple parties have keys Smaller key lengths Public-Private Keys Advantages Less vulnerable to compromise Longer key lengths Disadvantages More difficult to manage Slower Comparison of Encryption Techniques

  19. Encryption Algorithms

  20. One-time Symmetric Key Sender’s Private Key Encryption Security Overview SENDER Cyphertext Plaintext Encrypted File Encrypted DigitalSignature Create Hash

  21. One-time Symmetric Key Sender’s Private Key Encryption Receiver’sPublic Key Security Overview SENDER Digital Envelope Cyphertext Plaintext Encrypted File Encrypted DigitalSignature Create Hash Encrypted One-time key

  22. One-time Symmetric Key One-time Symmetric Key Sender’s Private Key Encryption Decryption Receiver’sPublic Key Receiver’s Private Key Security Overview SENDER RECEIVER Digital Envelope Cyphertext Plaintext Plaintext Encrypted File Encrypted DigitalSignature Create Hash Encrypted One-time key

  23. One-time Symmetric Key One-time Symmetric Key Sender’s Private Key Sender’s Public Key Encryption Decryption Receiver’sPublic Key Receiver’s Private Key Security Overview SENDER RECEIVER Digital Envelope Cyphertext Plaintext Plaintext Encrypted File Encrypted DigitalSignature CreateRehash Create Hash Sender’sHash Receiver’sHash Encrypted One-time key CompareHash

  24. One-time Symmetric Key One-time Symmetric Key Sender’s Private Key Sender’s Public Key Encryption Decryption Receiver’sPublic Key Receiver’s Private Key Security Overview SENDER RECEIVER Digital Envelope Cyphertext Plaintext Plaintext Encrypted File Encrypted DigitalSignature CreateRehash Create Hash CompareHash Sender’sHash Receiver’sHash Encrypted One-time key CompareHash Signed Receipt (MDN)

More Related