39
UNIT – 5 Servers and Commercial Environments An online commerce environment is differentiated from an e-payment system. Online commerce environment is an invention of the industry, offering a method of packaging all the products necessary to sell online. Although the WWW server is the central in an online commerce environment, it cannot stand alone. Payment Methods: Merchants have traditionally allowed their customers to use a variety of payment methods. Many online merchants offer customers a range of options for online and offline ordering. The advantage of secure server is that it serves the Internet consumer who has a new WWW browser and a credit card but has never set up to use any e-payment system. Server Market Orientation WWW server software comes in all shapes and sizes. II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 1

Unit 5 e Commerce

Embed Size (px)

Citation preview

Page 1: Unit 5 e Commerce

UNIT – 5

Servers and Commercial Environments

An online commerce environment is differentiated from an e-payment system.

Online commerce environment is an invention of the industry, offering a method of packaging all the products

necessary to sell online.

Although the WWW server is the central in an online commerce environment, it cannot stand alone.

Payment Methods:

Merchants have traditionally allowed their customers to use a variety of payment methods.

Many online merchants offer customers a range of options for online and offline ordering.

The advantage of secure server is that it serves the Internet consumer who has a new WWW browser and

a credit card but has never set up to use any e-payment system.

Server Market Orientation

WWW server software comes in all shapes and sizes.

Web browsers that support S-HTTP can be used with servers that support S-HTTP to produce a secure

channel.

Microsoft and Netscape have incorporated support for S-HTTP and SSL into their browsers.

Other WWW servers support secure commercial transactions by implementing PGP.

Netscape Commerce Servers

Netscape’s approach to developing its business as an Internet commerce environment provider has so far

proven successful.

Netscape guarantees that anyone can create a server that will be compatible with Netscape secure browsers.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 1

Page 2: Unit 5 e Commerce

Netscape has defined the protocols needed to do business with all the people who use the Netscape browser.

The most basic Web browser must be able to handle three protocols:

URL

HTTP

HTML

The Netscape 6 browser combines Netscape Communicator and Netscape Navigator with a suite of Internet

tools for high-performance Internet mail, Web page creation and instant messaging.

Securing Your Netscape Browser and Site for E-Commerce:

Web transactions lack the reassuring physical merchandise and face-to-face interaction with merchants.

In the anonymous Web world, customers and Web merchants must deal with the following faceless

threats:

Unauthorized access

Data alteration

Monitoring

Spoofing

Service denial

Repudiation

The Solution – Netscape’s Digital Certificate Authority Program:

Designed to make it easier for Netscape customers to get and use digital certificates.

Offers both client and server certificate services.

There are two types of digital certificates that are important when building secure E-commerce Web sites:

Server certificates – Allow visitors to the site to send personal information but which are free from threats.

Personal certificates – Allow the site to authenticate a visitor’s identity and restrict access to specified content

to particular visitors.

Several security standard protocols are being widely adopted for electronic communication that rely on digital

certificates:

SSL (Secure Socket Layer)

S/MIME (Secure Multipurpose Internet Mail Extensions)

SET (Secure Electronic Transactions)

IPSec (Internet Protocol Secure Standard)

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 2

Page 3: Unit 5 e Commerce

Microsoft Internet Servers

There is still a great deal of competition between Netscape and Microsoft in the battle for Internet market

share.

Like Netscape, Microsoft has developed both Internet browsers and servers.

Microsoft Internet Digital Commerce Payment System Strategy

Microsoft is currently delivering a server and tools digital commerce foundation based on Site Server,

Enterprise Edition.

Site Server, Enterprise Edition integrates with the Microsoft Internet Security Framework and Windows

NT Security.

Microsoft Wallet

A cross-server payment front-end solution.

Available as an ActiveX control for IE users and as a Netscape plug-in.

Site Server, Enterprise Edition integrates with and uses the Microsoft Wallet.

Consists of the Payment Selector control and the Address Selector control.

Site Server, Enterprise Edition

A comprehensive Web site environment for the enhancement, deployment and advanced management of

commerce-enabled Web sites.

Digital Commerce Server provides the Server components, site creation and management tools and Buy

Now.

Server components

Provide the run-time environment for the presentation and operation of online commerce Web sites.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 3

Page 4: Unit 5 e Commerce

Site creation and Management tools

Support remote creation and management for hosting service providers.

Including the StoreBuilder wizard.

Buy Now

A new online selling technology.

Microsoft Windows NT Server and Active Server (IIS, ASP and Microsoft Transaction Server)

Microsoft IIS is the only Web server integrated with the Microsoft Windows NT Server.

Microsoft ASP allows the combination of HTML, scripts and server components to create dynamic HTML

and to enable powerful Web-based business solutions.

Microsoft Transaction Server simplifies the development infrastructure needed to execute business

logic.

Microsoft Internet Security Framework and Windows NT Security

The framework is a comprehensive set pf cross-platform, interoperable security technologies that

support Internet security standards.

Microsoft Windows NT Server offers excellent security services for account management and enterprise-

wide network authentication.

Open Market Softgoods Transaction Model

Open Market Inc. uses a formal model for transacting business across the Internet.

Its most interesting contribution is its comprehensive approach to producing an overall “commercial

environment”.

It separates the content server from the transaction server.

The process begins with a customer browsing a content server.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 4

Page 5: Unit 5 e Commerce

Additional services include special gateways that may be available to link the transaction server to financial

networks.

Simply having a secure WWW server may not be sufficient to perform online commerce.

Open Market has enjoyed tremendous growth, much of which is due to the fostering of strategy relationships

with business partners.

E-Commerce in Banking

Retail and investment banking stand to profit most from E-commerce.

The role of E-commerce in banking is impacted by changes in technology, the emergence of new banking

institutions and basic economic restructuring.

Technology is enabling the development of new products and services.

Technology is changing the interaction between banks and consumers.

Four distinct factors contribute to the new competitive environment:

1. Changing consumer needs driven by online commerce

Customers want to be able to bank at their convenience.

Bankers want more stable and long term relationships with their customers.

E-banking enables the bank customer to be reached, served and sold products and services in their

homes and offices 24/7.

2. Optimization of branch networks in order to reduce costs

Online technology can deliver services far more economically than the existing methods.

If banks are going to compete with larger competitors, they have to address their traditional banking

overhead structures and their existing retail strategies.

3. Changing demographic trends and potential new consumer market

The reduced level of job security and the need to plan for the future has heightened concern over

personal debt, retirement planning, tax planning and saving for college.

4. The companies that take advantage of this opportunity by targeting the appropriate customers with

appropriate products and services will have a lasting competitive advantage.

5. New online financial products

Additional development of e-cash, such as smart cards could stimulate further banking consolidation.

E-banking offers an inexpensive alternative to branching to expand a bank’s customer’s base.

Smart cards and other forms of e-cash could be the key to consumer acceptance of home banking.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 5

Page 6: Unit 5 e Commerce

Internet Banking vs. Online Banking

Internet banking means:

Consumers do not have to purchase any software.

Consumers can conduct banking anywhere as long as they have an Internet connected computer.

Consumers can download account information into their own choice of programs.

Allows banks to break out of the control of software developers.

Internet Banking Architecture

Open vs. Closed Models

Two technology models of online banking:

Open systems

• Content changes can occur easily because of the use of standard technology and components.

Closed systems

• Content changes are difficult to since everything is proprietary.

Banks need to be familiar with both these models.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 6

Page 7: Unit 5 e Commerce

E- CASH

Overview of Electronic Cash Payment Protocols and Systems

What is cash payment?

- Cash payment is currently most popular form in conventional payment system in the world.

- Currently cash payment involves 75% - 95% of all transactions are paid in cash..

- Transactions are paid in a cash form (such as $ bill) from a buyer to a seller.

An electronic cash payment system usually is developed based on an electronic payment protocol which

supports a series of payment transactions using electronic tokens or coins issued by a third party.

There are three types of users:

- a payer or consumer

- a payee, such as a merchant

- a financial network with whom both payer and payee have accounts.

Overview of Electronic Cash Payment Protocols and Systems

The basic attributes of cash payment

1. Acceptability: Cash almost universally acceptable as a form of payment, regardless of the transaction amount.

2. Guaranteed payment: cash guarantees the payment after the transaction is over. There is no risk of it been rejected

or bounced.

3. No transaction charges: cash is handled from buyers to sellers with no transaction charges.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 7

Page 8: Unit 5 e Commerce

4. Anonymity: many other forms of payment involve a paper trail linking either or both parties with the transactions.

Cash allows transactions take place anonymously.

Actors Involved in Electronic Cash Payment Systems

1. Customers: Customers use the digital cash payment systems to make purchases.

2. Dealers: Dealers have to bear the costs of payment transactions.

3. Providers for digital payment systems:

Providers are intermediaries between dealers and financial institutions. They provide services and training.

4. Development vendors for digital payment systems:

5. Financial institutions:

Banking systems or organizations who use electronic payment systems.

6. Trust Centers:

They control digital signature keys, and help to secure customer confidence in certain payment

systems. They are responsible for the integrity of transmitted data and authenticity of contractors.

Basic Requirements for Electronic Cash Payment Systems

1. Digital money:

Payment systems must provide customers and private households with acceptable digital money.

2. Security:

Ensure the security of transactions and information privacy of users.

3. Scalability:

A large number of customers and concurrent transactions should be handled in a scalable manner.

4. Efficient and effective:

Payment systems must support efficient and effective payment processing and accounting services for small

payment transactions.

5. Simple and lost cost:

Payment systems must provide customers with simple and low cost transparent transactions.

Basic Requirements for Electronic Cash Payment Systems

1. Anonymous:

Usually, customers wish to stay anonymous for all involved transactions.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 8

Page 9: Unit 5 e Commerce

2. Double spending:

A digital coin consists of a number of bits. Payment systems must be able to recognize and/or prevent repeated

payments with the same digital coin.

3. Exchange:

Digital money should be convertible into “real” money whenever necessary.

4. Store:

Digital money must be stored locally on hard disks or other media.

5. Value:

Digital cash payment systems must provide a large number of digital coins for circulation and perform

authentication checking.

Advantages of Electronic Cash Payment Systems

1. Saved time:

- Reduce transaction process time

- Speed up transaction processes

2. Reduced costs:

- Reduce transaction costs

- Reduce cash distribution costs

3. Flexibility:

- Digital cash can take many forms, including prepaid cards

- Digital cash can be converted into different currencies

4. Reduce cash distribution risk:

- Reduce the regular cash distribution risk

5. Error free and efficient:

- Reduce transaction errors

Special Features of Electronic Payment Protocols

Features of electronic cashes:

- Portable, divisible, recognizable, untraceable, and independent from physical locations.

Important features of electronic cash payment protocols and systems:

1. Anonymity: This ensure that no detailed cash transactions for customer are traceable. Even sellers do

not know the identity of customers involved in the purchases.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 9

Page 10: Unit 5 e Commerce

2. Liquidity: Digital cash have to be accepted by all concerned economic agents as a payment method.

3. Prepaidcards:

Buyers can buy prepaid cards that are accepted by special sellers.

4. Electronic payment processing: all transactions are processed electronically.

Transactions Types in Electronic Cash Payment Systems

Three types of transactions:

Withdrawal: the payer transfers some of money from the bank account to his or her payment card.

Payment: the payer transfers the money from the card to the payee.

Deposit: the payee transfers the money received to the bank account.

Two types of implementations:

- On-line payment: --> the merchant calls the bank and verifies the validity of consumer’s token or electronic

coin before accepting the payment and delivering the merchandise.

- Off-line payment: --> the merchant submits consumer’s payment for verification and deposit sometime after

the payment transaction is completed.

Primary advantage is with purchase of items less than $10

– Credit card transaction fees make small purchases unprofitable

– Micropayments

o Payments for items costing less than $1

Electronic Cash Payment Protocol: ECash

What is Ecash?

Ecash was developed to allow fully anonymous secure electronic cash to be used on the Internet to support online

trading between buyers and sellers.

Overview of Ecash:

Ecash is a payment protocol for anonymous digital money on the Internet.

It is developed by DigiCash Co, of Amsterdam, The Netherlands.

It is currently implemented and offered by Mark Twain Bank,

St. Louis since 1995.

DeutscheBank Ag, Frankfurt (Main) offers Ecash as a pilot project to its

customers since October 1997.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 10

Page 11: Unit 5 e Commerce

Ecash model:

Three participants are involved in Ecash payment model:

clients, merchants and banks.

Client wallet software:

- clients have Ecash wallet software (cyberwllet) on their computers.

- they can use Ecoins in their wallet to make purchases from merchants.

- withdraw coins from their accounts in a Ecash bank.

- store and manage client’s coins, track all transactions.

Merchant software:

- accept and process payments

- interact with Ecash bank to perform validation and authentication

- sell items and generate receipts.

Banks: clients and merchants have accounts at an Ecash bank.

- manage and maintain accounts of clients and merchants

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 11

Page 12: Unit 5 e Commerce

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 12

Page 13: Unit 5 e Commerce

E-CASH CLIENT SOFTWARE IMPLEMENTATION

Ecash Coins:

- Ecash coins are pieces of data that can be copied.

- The value of Ecash coins cannot be included with the serial number in the fields of the coin.

- Use a different signature key for each coin denomination.

Example: $1 Coin = Serial#, keyversion, {Serial#} SK Bank’s $1 Key

- Security mechanisms:

- using RSA public-key cryptography.

- ‘blind signature’ is the foundation of Ecash privacy feature.

- Every user in the system has their own public/private key pair.

- Double-spending prevention:

- To ensure that a serial number is not spent twice, the minting bank must record every coin that is

deposited back to that bank.

A) be signed, with any denominational signature, by the bank.

B) Have an expiry date associated with it that is later than the present date.

C) Not appear in the DB of spent coins.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 13

Page 14: Unit 5 e Commerce

Electronic Cash Payment Protocol: NetCash

What is NetCash?

- Netcash is an online electronic cash system, for open networks.

- It was developed at Information Sciences Institute of the University of Southern California.

Electronic Cash Payment Protocol: NetCash

NetCash model:

Three participants are involved in NetCash payment model:

tbuyers (or clients), merchants, and currency servers.

Four services are provided:

- Verifying coins, to prevent double spending.

- Issuing coins in return for payment by electronic check.

-

Buying back coins, giving an electronic check in return.

- Exchanging valid coins for new ones with some anonymity.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 14

Page 15: Unit 5 e Commerce

NetCheque is proposed to provide the electronic check infrastructure required to bring monetary value into and out of

the NetCash system.

Clients can buy and sell NetCash coins in exchange for electronic checks.

NetCash servers can use electronic checks to settle debts between themselves,

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 15

Page 16: Unit 5 e Commerce

Electronic Cash Payment Protocol: NetCash

A NetCash coin has the following form:

- CS_name: - name of the minting currency server.

- CS addr: - network address of the minting currency server.

- Expiry: - the date on which the coin becomes invalid..

- Serial #: - a unique identifier of the coin to the minting currency server.

- Value: - the amount of the coin is worth

Each coin is encrypted with currency server’s secret key (SKcs), which becomes a digital signature to show that the coin

is authentic.

Overview of NetCash:

- Users can make and accept payments using NetCash.

- Both asymmetric and symmetric cryptography are used to provide the network security of the system to limit

fraud.

- The system use multiple currency servers that mint and issue electronic coins to the users of the system, accepting

electronic checks in payment for them.

Electronic Cash Issues

• E-cash must allow spending only once

• Must be anonymous, just like regular currency

– Safeguards must be in place to prevent counterfeiting

– Must be independent and freely transferable regardless of nationality or storage mechanism

• Divisibility and Convenience

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 16

Page 17: Unit 5 e Commerce

• Complex transaction (checking with Bank)

– Atomicity problem

Two storage methods

• On-line

– Individual does not have possession personally of electronic cash

– Trusted third party, e.g. online bank, holds customers’ cash accounts

• Off-line

– Customer holds cash on smart card or software wallet

– Fraud and double spending require tamper-proof encryption

Advantages and Disadvantages of Electronic Cash

• Advantages

– More efficient, eventually meaning lower prices

– Lower transaction costs

– Anybody can use it, unlike credit cards, and does not require special authorization

• Disadvantages

– Tax trail non-existent, like regular cash

– Money laundering

– Susceptible to forgery

Electronic Cash Security

• Complex cryptographic algorithms prevent double spending

– Anonymity is preserved unless double spending is attempted

• Serial numbers can allow tracing to prevent money laundering

– Does not prevent double spending, since the merchant or consumer could be at fault

• E-cash not popular in U.S., but successful in Europe and Japan

• Reasons for lack of U.S. success not clear

• Manner of implementation too complicated

• Lack of standards and interoperable software that will run easily on a variety of hardware and software systems

• Past and Present E-cash Systems

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 17

Page 18: Unit 5 e Commerce

DIGI CASH

DigiCash is a stored-value cryptographic coin system that facilitates Internet-based commerce using software that runs

on personal computers.

The value of DigiCash is represented by cryptographic tokens that can be withdrawn from bank accounts, deposited in

bank accounts, or transferred to another people

Unique Property

DigiCash is unique in its implementation of electronic cash because it has attempted to preserve the anonymity and

un-traceability associated with cash transactions

DigiCash uses “Blind Signatures” for untraceable payments.

Advantages:

1. It allows realization of untraceable payments system which offers increased personal privacy.

Disadvantages:

1. Traceability of transactions may be lowered, resulting in a higher potential for undetected fraud.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 18

Page 19: Unit 5 e Commerce

Digi-cash Payment protocol

The DigiCash payment protocol and blinding can be illustrated by pictures:

WORKING OF DIGI-CASH

DIGICASH CONCEPT

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 19

Page 20: Unit 5 e Commerce

DIGITAL CURRENCY (REFER TO UNIT-3)

Digital currency is an encrypted serial number representing real money and is convertible to real money (e.g. US dollar)

if desired.

Digital money is created against existing money. In the long run, digital money may be created on its own if users

accept it on its face value, which will be determined by how dependable its issuers are. All monies are only as good as

their issuers.

Very flexible: Can be made to behave like e-checks or anonymous cash as situation warrants.

SMART CARDS

An electronic device about the size of a credit card that contains an embedded integrated circuit (program and

memory)

A smart card is a credit-card sized plastic card embedded with an integrated circuit chip that makes it "smart". This

marriage between a convenient plastic card and a microprocessor allows an immense amount of information to be

stored, accessed and processed either online or offline. The information or application stored in the IC chip is

transferred through an electronic module that interconnects with a terminal or a card reader.

Depending on the type of the embedded chip, smart cards can be either memory cards or processor cards.

• Memory Cards: Any plastic card is made "smart" by including an IC chip. But the chip may simply be a memory

storage device. Memory cards can hold information thousands times greater than a magnetic stripe card.

• Processor Cards: Smart cards with a full-fledged microprocessor on board can function as a processor device

that offers multiple functions such as encryption, advanced security mechanism, local data processing, complex

calculation and other interactive processes.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 20

Page 21: Unit 5 e Commerce

Some of the key features and characteristics of smart cards are:

• Cost• Reliability• Storage Capacity• Ease of use• Security• Power Source• Support Equipment Required• Susceptibility

Divided into two card type

1. memory cards & microprocessor cards

2. contact cards & contactless cards

Uses:

Storing digital cash

Storing information; giving hospitals or doctors personal data without filling out a form

Generating network IDs by storing X.509 certificates, private keys and RSA crypto-engines; establishing

your identity when logging on to an Internet access provider or to an online bank

Specialized Applications such as SIM (Subscriber Information Modules) in GSM wireless telephones -- a

SIM contains all the generic information required to access the telephone network

Smart cards gradually reappearing in U.S.; success depends on:

– Critical mass of smart cards that support applications

– Compatibility between smart cards, card-reader devices, and applications \

Smart Card Applications

1. Ticketless travel– Seoul bus system: 4M cards, 1B transactions since 1996– Planned the SF Bay Area system

2. Authentication, ID3. Medical records4. Ecash 5. Store loyalty programs6. Personal profiles7. Government

– Licenses8. Mall parking

Etc

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 21

Page 22: Unit 5 e Commerce

Smart (Card) AttacksOne of the security features provided by most of the smart card operating systems, is the cryptographic facilities. They

provide,

• Encryption and decryption of data for the card.

• Some of them can even be used to generate cryptographic keys.

The secret of the cryptographic algorithm, the keys stored, and the access control inside the smart card become the

targets of attackers.

These attackers perform logical non-invasive attacks, some of them attack the card physically while others just prove

their success by mathematical theorems.

Logical Attacks:

As all the key material of a smart card is stored in the electrically erasable programmable read only memory (EEPROM),

the attacks can be caused mainly on the EEPROM by,

• Raising the supply voltage above its design limit.

• Cutting the supply voltage below its design limit.

• Resetting random memory locations using ultraviolet light until the read protect bit is found.

• Exploiting misfeatures in the hardware, including the manufacturer supplied ROM code.

• Exploiting misfeatures in the customer written EEPROM code.

• Some combination of the above.

Thus to prevent this, some of the processors implement sensors which cause an alarm when there is any environmental

changes.

Physical Attacks:

• The circuit chip is first removed.

• The epoxy resin now visible is then dissolved using a few drops of fuming nitric acid.

• The chip is then exposed and vulnerable to direct attacks.

• A technique called reverse engineering of the circuit chips has been developed wherein the layout and

function of the chip can be identified. Using this, the secrets held by the chip can be revealed.

• Erasing the security lock bit by focusing UV light on the EPROM.

• Using laser cutter microscopes to explore the chip.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 22

Page 23: Unit 5 e Commerce

A Smart Card (a term suggested by John Meckley) is similar to a credit card with a magnetic strip, but contains more

information and can be programmed for different applications, and can be updated to add new applications after they

are issued.

An electronic device about the size of a credit card that contains an embedded integrated circuit (program and

memory)

A Smart Card is similar to a credit card with a magnetic strip, but contains more information and can be programmed

for different applications, and can be updated to add new applications after they are issued.

Smart cards come either with just memory chip, which are just storage devices and can not process information, or

with processing abilities.

Smart cards can be typically classified into broad categories based on how they communicate with another device:

1. Contact - Direct Communication - the card must be inserted into a smart card reader which connects to

a conductive module on the card

2. Connectionless - antenna or other electromagnetic interface is imbedded in the card

3. Hybrid cards are dual chip cards with each chip containing its respective contact or connectionless

interface; the chips are not connected to each other in the card

4. Combo cards have a single ship with both contact and connectionless interfaces.

Power for the smart card may be supplied either by an embedded battery or by a microwave frequency -- the

card needs to be within 2 to 3 inches of the card reader.

• Magnetic stripe

– 140 bytes, cost $0.20-0.75

• Memory cards

– 1-4 KB memory, no processor, cost $1.00-2.50

• Optical memory cards

– 4 megabytes read-only (CD-like), cost $7.00-12.00

• Microprocessor cards

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 23

Page 24: Unit 5 e Commerce

– Embedded microprocessor

o (OLD) 8-bit processor, 16 KB ROM, 512 bytes RAM

o Equivalent power to IBM XT PC, cost $7.00-15.00

o 32-bit processors now available

SMART CARD FUTURE

• At this time, over a billion smart cards are in use, primarily in Europe. Because the current infrastructure in the

US is designed for credit cards with magnetic strips, there has been a slower rate of adoption of smart cards in

the US. The use of Smart Cards in Europe received its initial boost from the French government in 1985 when it

purchased 16 million cards for use by its then state-owned bank.

• There are two industry standard groups dealing with issues related to Smart Cards:

• Personal Computer / Smart Card (http://www.smartcardsys.com/)- interface between programming and PC

hardware in a smart card, representing Microsoft, IBM, Bull, Schlumberger, and other interested companies.

Smart Card Industry Association (http://www.scia.org/)

• OpenCard - a smart card operating systems: JavaCard and MultiOS

Smart Card Standards

OpenCard Framework is supported by Sun Microsystems, IBM, Oracle, Netscape. It is a standard for NCs, emphasizes

portability and personalization, and adopts Java.

Personal Computer Smart Card (PCSC) Workgroup Standard is proposed by Microsoft and supported by Schlumberger

Electronic Technologies.

Sun’s Java Card API, endorsed by Citibank, Visa, First Union National Bank, VeriFone.

Motorola formed a Smart Card Systems Business unit for contactless cards using radio.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 24

Page 25: Unit 5 e Commerce

ADVANTAGES AND DISADVANTAGES OF SMART CARDS

• Advantages:

1. Atomic, debt-free transactions2. Feasible for very small transactions (information commerce)3. (Potentially) anonymous4. Security of physical storage5. (Potentially) currency-neutral

• Disadvantages:

1. Low maximum transaction limit (not suitable for B2B or most B2C)2. High Infrastructure costs (not suitable for C2C)3. Single physical point of failure (the card)4. Not (yet) widely used

THE CHIP

Construction of Smart Cards

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 25

Page 26: Unit 5 e Commerce

ELECTRONIC DATA INTERCHANGE

EDI stands for Electronic Data Interchange. EDI has been developed by the United Nations/ECE Working Party in the 60s

as a standard to simplify and standardize external trade documents.1)

It became more important with the internet boom in the mid- and late-nineties. However, EDI is not depending on any

special technologies.2)

The three essential elements of EDI are

an electronic transmission medium (e.g. a peer-to-peer network or the internet)

an agreed standard for structuring and formatting messages

a fast delivery of electronic documents from sender to receiver.

Definition:-

EDI is a concept to transform specific content of e.g. invoices, delivery notes, purchase ordes and other trade

documents into standardized content and back into specific content. It is regularly used to interchange data between

two or more information systems without any human intervention.3)

Based on the concept of EDI EDIFACT is the only international and interdisciplinary standard.4)

Different Workgroups are creating EDIFACT-subsets for use in different branches.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 26

Page 27: Unit 5 e Commerce

How does EDI work?

– Supplier’s proposal sent electronically to purchasing organization.

– Electronic contract approved over network.

– Supplier manufactures and packages goods, attaching shipping data recorded on a bar code.

– Quantities shipped and prices entered in system and flowed to invoicing program; invoices transmitted

to purchasing organization

– Manufacturer ships order.

– Shipment notice EDI transaction sent (not shown)

– Purchasing organization receives packages, scans bar code, and compares data to invoices actual items

received.

– Payment approval transferred electronically.

– Bank transfers funds from purchaser to supplier’s account using electronic fund transfer (EFT).

EDI Software

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 27

Page 28: Unit 5 e Commerce

Example

The concept of EDI is comparable to the concept of Esperanto (the international language). Two speakers from different

countries (with different languages) translate their native language into the standardized Esperanto language. Both

parties are able to retranslate the Esperanto into their native language without knowledge of the foreign language. EDI

does the same. Regardless of the native information system of the one company (e.g. SAP) and the information system

of the partner (e.g. MS Dynamics) it is possible to interchange data between these systems by translating the native

code of SAP into EDI-based code and then into native code of MS Dynamics.

Advantages

Quick access to Information.

Better customer service.

Reduced paper work.

Better communication.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 28

Page 29: Unit 5 e Commerce

Increased productivity.

Cost efficiency.

Accurate and improved billing.

Faster order placement.

Reduction in error.

Disadvantages of EDI/ Barriers

Firms have to incur extra cost for hiring and training staff.

Needs highly structured protocols.

Added security cost to safe guard confidential information from unauthorized access.

It does not allows consumers to communicate or transact with vendors in an easy way.

EDI the invoice is faster than the goods on their “analog” transportation routes. That will increase the overhead e.g. in

case of reclamation.

Conclusion

EDI is a concept to electronically interchange of trade documents. EDI can save a lot of money if an effective number of

partners is identified. If this number is too small EDI can although be inefficient. The investment will be “money thrown

down the drain”.

INTERNET STRATEGIES

The Internet is a network of networks, and by its nature is the result of a cooperative effort of all participants. This

statement can be applied to at least two different levels of meaning:

· At a very basic technical level, any inter network depends on every connected network cooperating with every other

network.

· At a content level, from the start there has been a feeling that people who use the Internet, particularly for gathering

information, should also give back something by sharing information when they have something of interest to others.\

INTERNET TECHNIQUES

Shopping Techniques

· buying commodities online

· buying specialty items online

Online shopping seems to be breaking down into two categories:

commodities and specialty items.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 29

Page 30: Unit 5 e Commerce

Commodities were mostly raw materials which were available with minimal differentiation from any number of

different sources. Specialty items include anything that cannot be bought elsewhere.

Specialties could simply be a piece of information or software not sold anywhere else, or practically anything else sold

only in one place.

Online selling techniques

· Make your store easy to reach

· Make your site easy to use

· Make your products easy to buy

INTERNET TOOLS

A good World Wide Web browser, electronic mail client, file transfer software and the underlying networking software

necessary to make it all run are requirements to get at the information available online. With these tools, we will be

able to locate information about practically any other Internet tool or technique, including HTML tagging and

translation software, secure transaction software, consulting services, world wide web server and browser tools and

packages, industry organizations, consultants and vendors of services.

Choosing a Browser

If we can choose only one Internet application, a World Wide Web browser is probably the most logical choice. It is

easiest Internet interface to use; it can support other Internet applications, including Telnet, FTP, Gopher and e-mail; it

is widely implemented on different platforms. Browser market is dominated by Microsoft Internet Explorer and

Netscape Navigator.

Other Internet client software

Electronic mail has been an essential application for decades. An electronic mail client should be able to save messages

sent and received, should allow file attachments, preferably using the MIME standard, and should be almost

completely intuitive to use. Organizations may prefer to continue using their existing e-mail client by implementing an

Internet gateway to their existing e-mail server. Individuals may wish to purchase a package like Eudora or others. FTP

or File Transfer Protocol, defines procedures for transfer of files between Internet hosts. This protocol is often invoked

when transferring files from World Wide Web sites, but can also be used on its own. While FTP-only sites used to be

fairly common, they are becoming less common as more sites move their published data to web sites, or at least to

web interfaces. FTP may be implemented very much like a windows file manager program, including drag-and-drop file

copying. Telnet, a remote terminal session application, is less frequently used. It is included with complete TCP/IP

packages.

II MCA//Unit – 5 //E-Commerce// Kalaignar Karunanidhi Institute of Technology Page 30