Skip to main content

What are Different Types of e-Payment Security Protocols

What are different security protocols for e-payment security schemes?


What are Different Types of e-Payment Security Protocols

1. SSL Protocol (Secure Sockets Layer Protocol)

SSL (Secure Sockets Layer) is the standard security protocol for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is used by millions of websites in the protection of their online transactions with their customers.
SSL or Secure Sockets Layer is a security protocol created by Netscape that has become an international standard on the Internet for exchanging sensitive information between a website and the client computer. SSL technology is embedded in all popular browsers and engages automatically when the user connects to a web server that is SSL-enabled. It's easy to tell when a server is using SSL security because the address in the URL window of your browser will start with https. The "s" indicates a secure connection.

2. SET ( Secure Electronic Transaction Protocol)


SET was initially designed by Visa and Master Card in 1997. Secure Electronic Transaction (SET) is a standard protocol for securing credit card transactions over the Internet.
To meet the business requirements, SET incorporates the following features:

* Confidentiality of information

* Integrity of data

* Cardholder account authentication

* Merchant authentication

In SET protocol there are four entities: cardholder, merchant, CA (certificate authority)and payment gateway. A certificate authority or certification authority (CA) is an entity that issues digital certificates. The role of a payment gateway is to connect the internet and the proprietary networks of banks. Each participation entity needs its own certificate. Electronic Wallet or e-wallet or digital wallet is software used to store certificate consumer’s personal computer.


Basics of eCommerce

  1. Definition and History of ECommerce
  2. Role of E-Commerce in Daily Life
  3. Classification of e-Commerce Applications
  4. Difference Between Electronic Market and IOS
  5. Types Of e-Commerce


Ecommerce Payment Systems/ ePayment

  1. Types of Popular e-Payment Systems
  2. Explain Credit Card Payment System
  3. Advantages Disadvantages of Credit Cards
  4. Difference Between Debit Card and Credit Card
  5. Types of E-payment Security Schemes
  6. Types of e-Payment Security Protocols

Comments

Natalia said…
Very nice post. I am currently studying about how e payments are made secure, what is the mechanism that is followed behind it. With the help of this article I have learn so much about the protocols that offers the protection for online transactions.
electronic signature software

Popular posts from this blog

Explain Main Difference Between System Software and Application Software

Topic: Explain Main Difference Between System Software and Application Software            Differentiate between system software and application software Before , explaining the main differences between application software and system software, let us know the definitions of Application software and System software with examples. What is System Software: System software is a set of programs to control all components of computer and to manage overall operations of computer system. Differences between System software and application software System software is used as a base to install and run all application software. Examples of system software include: Operating Systems, like Microsoft Windows, DOS, Unix and Linux Device Drivers like Device driver software of a Printer (found on CD normally provided with the printer) Utility Programs like AVAST anti virus, Disk Scanners and File Viewers etc. What is Applicat...

Uses Of Computer in Medical Field

Today Computers are an essential part of an hospital . Doctors and administration staff uses computers to manage patient history and medicine stocks etc. Computers play a key role in the medical field .  Their uses include storing patient related data, housing knowledge bases, providing the logic and circuitry for medical equipment, scanning and imaging the body, and facilitating speedy communications. Computers can be used in medical field in the following ways: Uses of Computers in Medical Field Top Seven Uses of Computers in Medical Field    Hospital Administration These days, Computers are being used in hospitals extensively . We can computerize the accounting, payroll and stock system of the hospital. We can keep the record of different medicines.  Recording Medical History Of Patients Computer can be used to store the medical history of the patients . Medical history is very important for patients as well as doctors. Doctors may ...

Advantages and Disadvantages of Mesh Topology

Topic: Advantages and Disadvantages of Mesh Topology Mesh Topology In a mesh topology, every device on the network is physically connected to every other device on the network. Therefore, data can be sent on several possible paths from source computer to destination computer. Mesh topology is more reliable with better performance. Mesh Network Topology is mostly used in wide area networks where reliability is important. Advantages of Mesh Network Topology 1. Since, there are many links to transfer data, Mesh topology gets rid of the traffic problem . Data may be transferred through different links. 2. If one link becomes unusable, it does not disturb the whole system . Other links can be used for communication. 3. Since each node has physical connection with other nodes, therefore, one node can transfer data to many nodes at the same time. Disadvantages of Mesh Network Topology 1. It is very expensive due to implementation of multiple links for each no...