19
Information Technology, Engineering Faculty UNIM E-Payment Academic Year: 2014-2015 UNIM (5 th Week)

6th Week - E-Payment

Embed Size (px)

DESCRIPTION

E-Commerce, UNIM-Mojokerto

Citation preview

  • Information Technology, Engineering Faculty

    UNIM

    E-Payment

    Academic Year: 2014-2015

    UNIM

    (5th Week)

  • 2Outline

    Online Payment Basics

    Type of E-Payment

    Secure EPS Infrastructure

  • 3Online Payment

    What is Paying Online?

    Paying for something over the Internet

    Process

  • 4Benefits

    The main benefits:

    Convenient Any Place & Any Time

    Fast and Easy Prompt Access To CareMate Service

  • 5Payment System

    Type of Payment System

    1. E-Cash

    2. E-Check

    3. E-Wallets

    4. Micropayment

  • 6E-Cash

    Similar to regular cash, e-cash enables transactions between

    customers without the need for banks or other third parties.

    When used, e-cash is transferred directly and immediately to t

    he participating merchants and vending machines.

    Electronic cash is a secure and convenient alternative to bills

    and coins.

  • 7E-Check

    E-check is the result of cooperation among several banks, go

    vernment entities, technology companies, and e-commerce

    organizations.

    The key advantages of e-checks are as follows:

    1. Secure and quick settlement of financial obligations

    2. Fast check processing

    3. Very low transaction cost

  • 8E-Wallet

    Electronic wallets being very useful for frequent online shop

    pers.

    They offer a secure, convenient, and portable tool for onlin

    e shopping.

    They store personal and financial information such as credit

    cards, passwords, PINs, and much more.

  • 9Micropayment

    Merchants must pay a fee for each credit-card transaction

    that they process; this can become costly when customers

    purchase inexpensive items.

    Using micro-payment one will be able to pay for one article

    from a professional journal, a chapter from a scientific book,

    or one song from a CD on the Web.

  • 10

    Secure EPS Infrastructure

    Some or all of the following security measures and technologies

    directly related to EPSs:

    Authentication

    Public Key Cryptography

    Digital Signatures

    Certificate authorities,

    SSL

    S-HTTP

    Secure Electronic Transmission (SET)

  • 11

    Authentication

    This is the process of verification of the authenticity of a pers

    on and/or a transaction.

    There are many tools available to confirm the authenticity o

    f a user.

    For instance, passwords and ID numbers are used to allow a

    user to log onto a particular site.

  • 12

    Public Key Cryptography

    Public key cryptography uses two keys , one public and one

    private , to encrypt and decrypt data, respectively.

    Cryptography is the process of protecting the integrity and

    accuracy of information by encrypting data into an unread

    able format, called cipher text.

  • 13

    Digital Signature

    Rather than a written signature that can be used by an indi

    vidual to authenticate the identity of the sender of a messa

    ge or of the signer of a document; a digital signature is an e

    lectronic one.

  • 14

    Certificate

    A drivers license is accepted by numerous organizations bo

    th public and private as a form of identification due to the l

    egitimacy of the issuer, which is a government agency.

    Certificate authorities are similar to a notary public, a comm

    only trusted third party.

  • 15

    Secure Sockets Layer (SSL)

    Secure Sockets Layer transmits private documents via the Int

    ernet .

    SSL uses a cryptographic system that uses two keys to encry

    pt data - a public key known to everyone and a private or s

    ecret key known only to the recipient of the message.

    It operates between the transport and the

    application layers in the network stack

    and uses both public and private key

    cryptography.

  • 16

    Secure Hypertext Transfer Protocol

    SHTTP is designed to transmit individual messages securely.

    SSL and S-HTTP, therefore, can be seen as complementary ra

    ther than competing technologies.

  • 17

    Secure Electronic Transmission (SET)

    The Secure Electronic Transmission protocol imitates the curr

    ent structure of the credit card processing system.

    SET replaces every phone call or transaction slip of paper wit

    h an electronic version.

    The SET protocol offers packets of data for all these transacti

    ons, and each transaction is signed with a digital signature.

  • 18

    Task

    Diskusikan!

    1. Persamaan dan Perbedaan E-Cash, E-Wallet, E-Check, ter

    masuk contohnya, sajikan juga gambar proses pembayara

    nnya (E-cash, E-Check, E-Wallet)

    2. Amati dan simpulkan mengenai layanan payment online p

    ada bank BCA, BNI, BRI (Nama Produk, Deskripsi produk me

    kanisme, secure EPS yang disediakan)

  • Finish