Skip to main content

Explain Different Types of e-Payment Security Schemes in e-Commerce

Explain E-payment Security Schemes


Explain Different Types of e-Payment Security Schemes in e-Commerce

Following are the e-payment security schemes
1) Encryption 2) Certificates & Certificates Authority (CA) 3) Digital Signature
4) Digital Envelop 5) Message Digest 6) Transaction Certificates and Time Stamp

(1) Encryption

Encryption refers to changing a message into unreadable form. Later the encrypted message can be converted into readable form by Decryption.
There are two types of Encryption

(A) Secret Key Encryption/Private Key Encryption

In this scheme, same key called secret key is used by sender and receiver for Encryption (Making message unreadable) & Decryption (Getting original message).



Data Encryption Standards (DES) is the most widely used algorithm for secret key/private key encryption scheme.

(B) Public Key Cryptography




It is Also known as asymmetric Encryption. It uses two different keys (1) Private Key (2) Public Key. The receiver sends his public key to sender. The sender encrypts message with this public key. Then Message is sent to receiver. Now Receiver uses his private key to decrypt message.

2. Certificates & Certificates Authority (CA)

A certificate represents and identifying certificate issued by a trusted third party called Certificate of Authority. A certificate includes records such as series number name of Owner, Name of CA & Digital signature of CA.

Explain Different Types of e-Payment Security Schemes in e-Commerce

(VeriSign is a most popular pioneering CA. Established in 1999).

3. Digital Signature

Digital signature is a phrase (like Ahmed, Saeed Malik). It Is Encrypted by Sender’s private key. Digital signature is attached with the encrypted message and sent to receiver. Digital signature ensures that sender is verified. Receiver will use sender’s public key to decrypt message.

4. Digital Envelope

Is another encryption scheme. It is used to encrypt a secret key with the receiver’s public key. Now encrypted message & key is sent to receiver. Receiver will open the key first and then he will decrypt the message with this key.

5. Message Digest

It helps to verify that a message is not changed in its way from sender to receiver. Message digest is a bit string. It is unique for each message. A special formula is called hash function is used to calculate message digest of a message. The encrypted message with message digest is sent to receiver. Now if message is changed in the way then its message digest will not match.

6. Transaction Certificates and Time Stamp

A transaction certificate attests to some fact about the conduct of a transaction. It can be used to prevent repudiation (denial). Similarly a time stamp ensures that a document was present at a particular time.


Basics of eCommerce

  1. Definition and History of ECommerce
  2. Role of E-Commerce in Daily Life
  3. Classification of e-Commerce Applications
  4. Difference Between Electronic Market and IOS
  5. Types Of e-Commerce


Ecommerce Payment Systems/ ePayment

  1. Types of Popular e-Payment Systems
  2. Explain Credit Card Payment System
  3. Advantages Disadvantages of Credit Cards
  4. Difference Between Debit Card and Credit Card
  5. Types of E-payment Security Schemes
  6. Types of e-Payment Security Protocols

Comments

Andrea said…
Great ! I am grateful to you for sharing all the schemes that are used for security purpose in e payment systems. You have explained a short description of each of the type. After knowing all of them I would like to know which one is the most secured means.
digital signature Adobe Reader

Popular posts from this blog

Explain Main Difference Between System Software and Application Software

Topic: Explain Main Difference Between System Software and Application Software            Differentiate between system software and application software Before , explaining the main differences between application software and system software, let us know the definitions of Application software and System software with examples. What is System Software: System software is a set of programs to control all components of computer and to manage overall operations of computer system. Differences between System software and application software System software is used as a base to install and run all application software. Examples of system software include: Operating Systems, like Microsoft Windows, DOS, Unix and Linux Device Drivers like Device driver software of a Printer (found on CD normally provided with the printer) Utility Programs like AVAST anti virus, Disk Scanners and File Viewers etc. What is Applicat...

Explain Data Processing Cycle and Main Activities of Data Processing Cycle

After collecting data, it is processed to convert into information. The data is processed again and again until accurate result is achieved. This is called data processing cycle . Data processing cycle involves following three basic activities: Major Activities Involved in Data Processing Cycle Explain Data processing cycle 1. Input 2. Processing 3. Output 1. INPUT It is the process in which collected data is given to computer after converting into binary form. Input step can be further divided into following steps: i) Planning Here objectives of data processing are defined. For example, in examination system, objective is to process student examination data to get result cards. ii) Data Collecting Here data is collected. Data is the raw material for data processing. This must be accurate for getting accurate results. iii) Input Here data is entered into computer. iv) Verification Here collected data is verified to determine whether it is valid for ...

Explain Different Types of Data Processing and Advantages Disadvantages

Today we will discuss different types or levels of data processing in detail. Let us define Data processing first. DATA PROCESSING Data processing is the sequence of operations performed on data to convert it into useful information . These operations may be arithmetic, statistical or logical operations. We can arrange or classify data. We can send and receive data from one point to another. Explain different types of data processing TYPES OF DATA PROCESSING (OR) LEVELS OF DATA PROCESSING) There are three types of data processing . 1) Manual data processing 2) Mechanical data processing 3) Electronic data processing We may also use the term Levels of data processing. First level of data processing was manual data processing when there were no calculating devices (before the invention of calculators). Therefore all processing jobs were performed manually by hand with the help of pen , paper and mind. In second level of data processing, machines like calculat...