Upload
yesi-diah-rosita
View
218
Download
0
Tags:
Embed Size (px)
DESCRIPTION
E-Commerce, UNIM-Mojokerto
Citation preview
Information Technology, Engineering Faculty
UNIM
E-Payment
Academic Year: 2014-2015
UNIM
(5th Week)
2Outline
Online Payment Basics
Type of E-Payment
Secure EPS Infrastructure
3Online Payment
What is Paying Online?
Paying for something over the Internet
Process
4Benefits
The main benefits:
Convenient Any Place & Any Time
Fast and Easy Prompt Access To CareMate Service
5Payment System
Type of Payment System
1. E-Cash
2. E-Check
3. E-Wallets
4. Micropayment
6E-Cash
Similar to regular cash, e-cash enables transactions between
customers without the need for banks or other third parties.
When used, e-cash is transferred directly and immediately to t
he participating merchants and vending machines.
Electronic cash is a secure and convenient alternative to bills
and coins.
7E-Check
E-check is the result of cooperation among several banks, go
vernment entities, technology companies, and e-commerce
organizations.
The key advantages of e-checks are as follows:
1. Secure and quick settlement of financial obligations
2. Fast check processing
3. Very low transaction cost
8E-Wallet
Electronic wallets being very useful for frequent online shop
pers.
They offer a secure, convenient, and portable tool for onlin
e shopping.
They store personal and financial information such as credit
cards, passwords, PINs, and much more.
9Micropayment
Merchants must pay a fee for each credit-card transaction
that they process; this can become costly when customers
purchase inexpensive items.
Using micro-payment one will be able to pay for one article
from a professional journal, a chapter from a scientific book,
or one song from a CD on the Web.
10
Secure EPS Infrastructure
Some or all of the following security measures and technologies
directly related to EPSs:
Authentication
Public Key Cryptography
Digital Signatures
Certificate authorities,
SSL
S-HTTP
Secure Electronic Transmission (SET)
11
Authentication
This is the process of verification of the authenticity of a pers
on and/or a transaction.
There are many tools available to confirm the authenticity o
f a user.
For instance, passwords and ID numbers are used to allow a
user to log onto a particular site.
12
Public Key Cryptography
Public key cryptography uses two keys , one public and one
private , to encrypt and decrypt data, respectively.
Cryptography is the process of protecting the integrity and
accuracy of information by encrypting data into an unread
able format, called cipher text.
13
Digital Signature
Rather than a written signature that can be used by an indi
vidual to authenticate the identity of the sender of a messa
ge or of the signer of a document; a digital signature is an e
lectronic one.
14
Certificate
A drivers license is accepted by numerous organizations bo
th public and private as a form of identification due to the l
egitimacy of the issuer, which is a government agency.
Certificate authorities are similar to a notary public, a comm
only trusted third party.
15
Secure Sockets Layer (SSL)
Secure Sockets Layer transmits private documents via the Int
ernet .
SSL uses a cryptographic system that uses two keys to encry
pt data - a public key known to everyone and a private or s
ecret key known only to the recipient of the message.
It operates between the transport and the
application layers in the network stack
and uses both public and private key
cryptography.
16
Secure Hypertext Transfer Protocol
SHTTP is designed to transmit individual messages securely.
SSL and S-HTTP, therefore, can be seen as complementary ra
ther than competing technologies.
17
Secure Electronic Transmission (SET)
The Secure Electronic Transmission protocol imitates the curr
ent structure of the credit card processing system.
SET replaces every phone call or transaction slip of paper wit
h an electronic version.
The SET protocol offers packets of data for all these transacti
ons, and each transaction is signed with a digital signature.
18
Task
Diskusikan!
1. Persamaan dan Perbedaan E-Cash, E-Wallet, E-Check, ter
masuk contohnya, sajikan juga gambar proses pembayara
nnya (E-cash, E-Check, E-Wallet)
2. Amati dan simpulkan mengenai layanan payment online p
ada bank BCA, BNI, BRI (Nama Produk, Deskripsi produk me
kanisme, secure EPS yang disediakan)
Finish