Skip to main content

More about SET [Ecommerce Notes]

How SET works?
As we all know people today pay for online purchases by usually sending their credit card details to the merchant. There is protocol such as SSL or TLS available that keeps the sender’s credit card details safe from eavesdroppers however are not able to protect merchants from dishonest customers or vice-versa. SET has been developed keeping in mind the limitations of existing protocols. SET requires both cardholders as well as merchants to register before they engage themselves in any transactions. Any card holder can register by contacting a certificate authority. He needs to supply security details and the public half of his proposed signature key to the certificate authority. During the registration authorities verify the applicant. After verification and granting approval authority provides the applicant with a certificate that provides a confirmation that his signature key is valid. All orders and confirmations have a digital signature. This is used to provide authentication in case of any dispute between the parties.

Major participants in a SET system are:
  • Cardholder
  • Merchant
  • Issuer
  • Acquirer
  • Payment gateway
  • Certification authority
Understanding a SET Transaction Following are the sequence of events that are required for a transaction:
  1. Customer needs to obtains a credit card account with a bank which supports electronic payment and SET.
  2. The customer will receives an X.509v3 digital certificate which is duly signed by the bank.
  3. Merchants have their own certificates.
  4. The customer places an order with the Merchant.
  5. The merchant sends a copy of its certificate so that the customer can verify that the store is valid.
  6. The order and payment are sent between the two parties.
  7. The merchant then requests for payment authorization.
  8. The merchant has to confirms the order.
  9. The merchant needs to ship the goods or provide appropriate service to the customer.
  10. The merchant needs to requests payment

Key Role Players in a SET Transaction A SET purchase involves three parties:
  1. The cardholder (One who has to pay)
  2. The merchant
  3. Payment gateway (It is essentially a bank).
Card holder needs to share information as follows with the other two parties:
  • The cardholder needs to shares the order information with the merchant. He does not need to provide this information to the payment gateway.
  • The cardholder shares the payment information with the payment gateway and not with the merchant.
  • A set of dual signature is used to accomplish this partial sharing of information among the parties. It allows all parties to confirm that they are handling the same transaction. This is done as follows:

    • Each party receives the hash of the withheld information.
    • The cardholder needs to sign the hashes of order information as well as payment information.
    • Once the card holder signs both hashes each party needs to verify and confirm that the hashes they possess agree with the hash signed by the cardholder.
    • Further, the cardholder and merchant needs to compute equivalent hashes which payment gateway needs to compare. After comparing payment gateway needs to confirm their agreement on the details withheld from him.

Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will ...