Skip to main content

What are Different Types of e-Payment Security Protocols

What are different security protocols for e-payment security schemes?


What are Different Types of e-Payment Security Protocols

1. SSL Protocol (Secure Sockets Layer Protocol)

SSL (Secure Sockets Layer) is the standard security protocol for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is used by millions of websites in the protection of their online transactions with their customers.
SSL or Secure Sockets Layer is a security protocol created by Netscape that has become an international standard on the Internet for exchanging sensitive information between a website and the client computer. SSL technology is embedded in all popular browsers and engages automatically when the user connects to a web server that is SSL-enabled. It's easy to tell when a server is using SSL security because the address in the URL window of your browser will start with https. The "s" indicates a secure connection.

2. SET ( Secure Electronic Transaction Protocol)


SET was initially designed by Visa and Master Card in 1997. Secure Electronic Transaction (SET) is a standard protocol for securing credit card transactions over the Internet.
To meet the business requirements, SET incorporates the following features:

* Confidentiality of information

* Integrity of data

* Cardholder account authentication

* Merchant authentication

In SET protocol there are four entities: cardholder, merchant, CA (certificate authority)and payment gateway. A certificate authority or certification authority (CA) is an entity that issues digital certificates. The role of a payment gateway is to connect the internet and the proprietary networks of banks. Each participation entity needs its own certificate. Electronic Wallet or e-wallet or digital wallet is software used to store certificate consumer’s personal computer.


Basics of eCommerce

  1. Definition and History of ECommerce
  2. Role of E-Commerce in Daily Life
  3. Classification of e-Commerce Applications
  4. Difference Between Electronic Market and IOS
  5. Types Of e-Commerce


Ecommerce Payment Systems/ ePayment

  1. Types of Popular e-Payment Systems
  2. Explain Credit Card Payment System
  3. Advantages Disadvantages of Credit Cards
  4. Difference Between Debit Card and Credit Card
  5. Types of E-payment Security Schemes
  6. Types of e-Payment Security Protocols

Comments

Natalia said…
Very nice post. I am currently studying about how e payments are made secure, what is the mechanism that is followed behind it. With the help of this article I have learn so much about the protocols that offers the protection for online transactions.
electronic signature software

Popular posts from this blog

Introduction to Algorithms and Algorithmic Notation With Examples

Topic: Introduction to Algorithm and Algorithmic Notation With Examples What is an Algorithm? The step by step procedure to solve a particular problem is called an Algorithm .  A Good Programmer always writes algorithms before developing programs. Algorithmic Notation with example algorithms  Advantages of  writing an Algorithm The process of solving a problem becomes simpler and easier with the help of  algorithm. There are less chance of errors in the program, if we design algorithms before writing our programs in any programming language. We can convert an algorithm into a program of any programming language. It is not dependent on any programming language. Therefore it is easy to understand for anyone even without programming knowledge. What is the Relationship between an Algorithm and a Program Sponsored Links An algorithm is the sequenc of steps to perform a task, whereas a program is the set of statements to perfor...

Define Data and Information With Examples

DATA Data is the collection of raw facts and figures. Actually data is unprocessed, that is why data is called collection of raw facts and figures. Define Data and Information with Examples We collect data from different resources. After collection, data is entered into computer for processing. Data may be collection of words, numbers, pictures,  or sounds etc. Examples of Data 1) Student Data on Admission Forms When students get admission in a college. They fill admission form. This form  contains raw facts (data of student) like name, father’s name, address of student, obtained marks, photo graph etc. 2)    Data of Citizens During census, data of all citizens is collected. The staff will go house to house and collect data about citizens like number of persons living in a home, either they are literate or illiterate, number of children, data of each child, cast, religion, Computerized national Identity Card number, address, how many rooms and...

What are Dual Devices or Both Input/ Output Devices

The devices that can be used to perform both functions -input and output- are called Dual Devices. These devices are also called Dual Purpose Devices or Both Input/Output Devices. With the help of a dual purpose device, we can enter data into computer as well as we can output data from the computer to outside world.  For example, Dual devices include:  Touch Screen Monitor, Modem, Network Interface Card, Sound card, Hard disk drive, Floppy disk Drive, Magnetic Tape Drive CD-Writer and DVD-Writer etc. These are also called Input/output devices, because they perform both functions. Touch Screen Monitor Dual Devices or Both Input / Output Devices - Touch screens Touch Screen Monitor is an input/output device. It uses a special touch sensitive screen. The User can enter data by touching icons or menus on the screen. As soon as the user selects a command from menu, output is displayed on screen. Commonly touch screen monitors use sensors to detect touch of finger. ...