Payment in E-Commerce.

Payment in E-Commerce

In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce they are

•Credit card payments

•Electronic cheque payments

•Micro or small payments for internet based services such as music download.

•Electronic-cash payments

Each of these requires a different system of payment.

Review Of Manual Credit Card Payment

Four parties are invoked in credit card payments. They are:

• Customer having a credit card

• Merchant accepting credit cards (such as VISA, MASTER CARD etc)

• Bank which issues credit cards to customers and collects payments from customers

•Acquirer which is financial institution that establishes an account with a merchant, validates credit card information sent electronically by merchant and authorises sale based on customer’s credit status. Acquirer accepts credit cards of several card companies and guarantees payment to merchants. Acquirer gets reimbursed by bank issuing credit card.

Sequence Of Transactions In Manual Credit Card Payment

Step 1: Customer presents credit card after purchase. Merchant swipes it on his special phone and enters amount

Step 2: Data from merchant’s terminal goes to acquirer via a private telephone line

Step 3: Acquirer checks with the issuing bank validity of card and credit- available

Step 4: Acquirer authorizes sale if all OK and sends approval slip which is printed at merchant’s terminal.

Step 5: Merchant takes customer’s signature on the slip-verifies it with the signature on card and delivers the goods.

Step 6: The acquirer pays the money to merchant and collects it from the appropriate issuing bank. The bank sends monthly statement to customer and collects outstanding amount.

Block Diagram Of Steps In Credit Card Transaction

image

Credit Card In E-commerce

Main Problems

1. Main Problem is: if a merchant had only a web presence, a Customer needs to be reassured that the merchant is genuine.

2. Customers Signature cannot be physically verified. Customer needs electronic signature.

3. Secrecy of credit card number has to be ensured.

4.Dispute settlement mechanism must be worked out.

Secure Electronic Transaction Protocol

To use SET protocol it is assumed that

1. Each party involved in e-commerce transaction has a public and private key.A public key encryption is used.

2. All parties have their public keys certified.

3. A standard hashing algorithm is used to create message digest for signature verification.

Main Features

•Customers credit card number is not revealed to a merchant. It is revealed only to the acquirer who authorises payment.

•Purchase invoice details are not revealed to the acquirer.Only the credit card number and total amount are revealed to him

•Purchase invoice + credit card number is digitally signed by the customer.In case of a dispute an arbitrator can use this to settle the dispute.

(Computer protocol runs to 262 pages and may be found in www.ibm.com/redbook/SG244978)

DUAL SIGNATURE SCHEME

Dual signature scheme is an innovation in SET protocol

Steps followed in the protocol are:

1. Customer purchase information has 3 parts

(i) Purchase Order (PO)

(ii) Credit Card Number (CCN)

(iii) Amount to be paid

2. Merchant should know (PO + Amount)=POA

3. Acquirer should know (CCN+Amount)=CCA

4. Hash POA using standard Hash algorithm such as RSA’s MD5. Call it POD.

5. Hash CCA using MD5. Call it CCD

6. Concatenate POD and CCD. Call it (POD||CCD)

7. Hash (POD||CCD) giving PPD

8. PPD is encrypted using Private key of customer. This is customer’s digitally signed purchase order

DS = Encrypt (PPD) with CPRK

CPRK is Private key of customer. This is sent to merchant by customer. DS is called Dual Signature as a private key is used to sign two separate digests concatenated together.

9. POA separately encrypted by customer using merchant’s public key and sent to merchant

10. Merchant decrypts it using his private key. He thus gets Purchase order +Amount. He can hash it and get POD

11. CCD and DS also sent to merchant. From CCD merchant cannot find CCN.

12. Merchant can decrypt DS using customer’s public key and get PPD. Customer must have a certified public key for verification.

13. Merchant can compute H(POD||CCD)

If H(POD||CCD)=PPD,then customer’s signature is OK.

14. Merchant forwards to acquirer CCA,POD,DS each separately encrypted using acquirer’s public key.

15. Acquirer’s forwards to bank.

16. Bank finds CCN and Amount.Verifies balance amount.Bank also verifies customer’s digital signature using CCD,POD and DS.If all OK acquirer is informed.

17. Acquirer OK’s transaction to merchant

18. Merchant supplies item.Gets payment from acquirer.Bank collects from customer.

Dual Signature System

image

EM: Public key of Merchant
EB: Public key of bank
(POA) EM is encrypted value with merchant’s public key
POA: (Purchase Order + Amount)
POD: Purchase Order Digest
CCA: (Credit card + Amount)
CCD: (Credit card + Amount)Digest
|| : Concatenation operator which strings together POD and CCD
PPD : Purchase Payment Digest
CPRK: Private Key of Customer, CPK: Public Key of customer
- Step1 : [(POA)EM , (CCA)EB , CCD ,DS] to Merchant
- Step2 : Merchant sends [(CCA)EB , DS , POD] to Acquirer
- Step3 : Acquirer sends (CCA)EB + DS +POD to Bank.
- Bank finds (CC No. + amount) using its private key sees if OK
Computes H(CCD||POD)
Decrypts DS with customer’s public key
If (DS)CPK = H(CCD || POD) Signature verified
- Step4 : OK to acquirer if credit and signature OK
- Step5 : Ok to Merchant
Merchant finds H(H(POA) || CCD)=PPD
Decrypts DS with public key of customer. If it gives PPD signature verified.
- Step6 : Sends delivery details
- Step7 : Bill to customer

image

Step1: Customer fills Purchase order, amount and credit card number in his PC. A software in PC strips it into two parts Purchase Order + Amount (POA), Credit Card No. + Amount(CCA)

POA is encrypted using merchant’s public key and CCA with bank’s public key.These are sent with customer’s public key certificates, CCD and DS.

Merchant verifies DS.

Step2: Merchant forwards to acquirer DS and CCD (These are encrypted using acquirer’s public key)

Step3: Acquirer forwards to bank. Bank decrypts CCA with its private key.Checks validity of credit card and balance. If OK informs acquirer

Step4: Acquirer OK’s transaction to merchant and credits merchant's account.

Step5: Merchant accepts customer’s order and proceeds to dispatch items. Step6: At the end of the month bank sends bill to customer.

(All these done by clicks of mouse button)

Electronic Cheque Payment

Most cheque based transactions will be between businesses -thus a special hardware is attached to PC’s for signing payments. Signature is encrypted by hardware. All public keys of business partners authenticated by certifying agencies.

Steps in transaction

1. Purchaser sends purchase order and payment advice signed with his private key to vendor.He also sends his public key certificate encrypted with vendor's public key to vendor

2. Vendor decrypts with his private key, checks certificate and cheque, attaches deposit slip, encrypts with bank's public key and sends it to bank. he also sends his public key certificate

3. Bank checks signatures, credits and clears cheque. Credit advice goes to vendor, and consolidated debit advice sent to purchaser periodically

Clearing Cheque Payment Electronically

image

Payments Of Small Amounts On Internet

NETBILL'S PROPRIETARY SYSTEM

•Customer charged only when information delivered

•Vendor guaranteed payment when information delivered

•Netbill is the intermediary

MAJOR STEPS

•When customer accepts quote for information, vendor sends encrypted information without key to customer

•Payment order sent to vendor with checksum of information obtained. It is

signed by customer

•Vendor sends to NET BILL copy of purchase order and the key for decryption

•NET BILL checks credit of customer. If ok it sends key to customer. Credits vendor account and debits customer account. Key sent to customer to decrypt information

•Customer decrypts information

Paying for Small Internet Transactions

image

Electronic Cash

•Cash for small payments

•Cash preserves anonymity

•Cash should not be traceable

•Cheaper than credit card transaction

•DES normally used for these transaction as it is cheap and amount involved is small

Traceable cash payments STEPS

1. Customer withdraws coins in various denominations signed by bank STRUCTURE------> serial no, denomination, signature of bank

Bank stores issued coins copy

2. Customer pays vendor using signed coins

3.Bank checks whether it is current or spent

4. If current it authorises dispatch of goods and credits vendor account with electronic coins

image

REFERENCES

1. Most of the material in this chapter are taken from Chapter 16, Electronic Commerce of the book Analysis and Design of Information Systems (2nd edition) by V.Rajaraman, Prentice-Hall of India, New Delhi,2004

2. There are many books on E-Commerce, which describe E-Commerce in detail.

Among these are:

E.Awad, Electronic Commerce, Prentice-Hall of India, New Delhi 2002.This book takes managers perspective and not very strong on technology aspects of E-Commerce. All the examples have a strong American bias as the book is primarily intended for students in America. The language is clear but the book is verbose.

What can be said in 100 pages is said in 400 pages as it includes all kinds of gossip not relevant to students wanting the learn the subject.

3. D.Minoli and E.Minoli, Web Commerce Technology Handbook, Tata McGraw-Hill, New Delhi, 1999.This book is strong in technology and has wide coverage.

4. W. Stallings, Network Security Essentials, Pearson Education Asia, New Delhi,2001. Has good presentation on DES, Triple DES, RSA and SET protocol.

5. Most traditional Systems Analysis and Design book such as the one by Kendall and Kendall do not separately discuss E-Commerce, they have a cursory treatment at various places in the book.

Comments

Popular posts from this blog

WORKED EXAMPLES ON PROCESS SPECIFICATION.

Why do we need information systems, management structure, requirements of information at different levels of management.

The User Interface:Establishing User Interfaces