Skip to main content

SET (Secure Electronic transactions)



When it comes to e-commerce, first thing with pings someone mind is security!! Industry gurus have been putting heart n soul, in order to address this concern. SET was one of endeavor on same lines.

Secure Electronic Transaction (SET) is a standard protocol that is used for securing credit card transactions over insecure networks. With the increase in security concerns over Internet SET has emerged as popular protocol for addressing transactions over Internet. Please note clearly, SET itself is not a payment system. It is a a set of security protocols and formats that enables users to employ the existing credit card payment infrastructure on an open network in a secure fashion!

SET, developed by VISA and MasterCard (Credit card leaders) is based on X.509 certificates having several extensions. [Just FYI: X.509 is an ITU-T standard for a public key infrastructure (PKI. It specifies standard formats many things such as public key certificates, attribute certificates etc…]

SET features

SET has been developed with following features:

  • Maintains confidentiality of information: Information is provided only to the concerned
    recipent
  • SET takes care of Integrity of data
  • SET employs a particular subset of protocol for carrying out cardholder account authentication
  • SET employs a particular subset of protocol for carrying out Merchant authentication
Understanding SET Protocol SET itself is a family of protocols. The major ones are used for important tasks such as cardholder registration, merchant registration, purchase request, payment authorization, and payment capture. Apart from these major ones there are many minor protocols that are used for conducting tasks like error handling. SET is little complicated than its counterparts such as SSL. Because of this complexity this protocol is hardly used. However, it contains many features of interest such as :
  • The model is different from the others. In the registration protocols, the applicant do not need to possesses any digital proof for his identity. He just needs to authenticates himself by filing a simple registration form. Authentication is done outside this protocol when the cardholder’s bank examines the completed form.

  • An important innovation that has been introduced in SET is the dual signature. Like electronic signature dual signature is used to guarantee the authentication and integrity of data. Dual signature links two messages that are intended for two different recipients. A customer needs to send the order information (OI) to the concerned merchant and the payment information (PI) to the corrosponding bank. Through this dual signature the receipent only gets to know information he requires rather then getting any other information of the sender. E.g. The merchant does not need to get information about customer's credit card details where as bank does not need to know the details of the customer's order. However, a link is needed so that the customer can prove that the payment is intended for this order.

  • SET also uses several types of digital envelopes. It can be understood as an encrypted message that uses both secret key and public key cryptography methods. The secret key is used for encrypting and decrypting the message where as the public key method is meant for sending the secret key to the other party. A digital envelope includes two parts:

    1. One part is encrypted using a public key which contains a fresh symmetric key K and identifying information.
    2. Other part is encrypted using K which conveys the full message text.
    3. SET employs cryptographic techniques to provide security during a online transaction. Digital certificates and public key cryptography are commonly used to allow parties for authenticating each other and for exchanging information in a secure manner. You must be curious to know how SET works.
How it works!
As we all know people today pay for online purchases by usually sending their credit card details to the merchant. There is protocol such as SSL or TLS available that keeps the sender’s credit card details safe from eavesdroppers however are not able to protect merchants from dishonest customers or vice-versa. SET has been developed keeping in mind the limitations of existing protocols. SET requires both cardholders as well as merchants to register before they engage themselves in any transactions. Any card holder can register by contacting a certificate authority. He needs to supply security details and the public half of his proposed signature key to the certificate authority. During the registration authorities verify the applicant. After verification and granting approval authority provides the applicant with a certificate that provides a confirmation that his signature key is valid. All orders and confirmations have a digital signature. This is used to provide authentication in case of any dispute between the parties.

Major participants in a SET system are:

• Cardholder
• Merchant
• Issuer
• Acquirer
• Payment gateway
• Certification authority
Understanding a SET Transaction
Following are the sequence of events that are required for a transaction:
1. Customer needs to obtains a credit card account with a bank which supports electronic payment and SET.
2. The customer will receives an X.509v3 digital certificate which is duly signed by the bank.
3. Merchants have their own certificates.
4. The customer places an order with the Merchant.
5. The merchant sends a copy of its certificate so that the customer can verify that the store is valid
6. The order and payment are sent between the two parties.
7. The merchant then requests for payment authorization.
8. The merchant has to confirms the order.
9. The merchant needs to ship the goods or provide appropriate service to the customer.
10. The merchant needs to requests payment
Key Role Players in a SET Transaction
A SET purchase involves three parties:
1. The cardholder (One who has to pay)
2. The merchant
3. Payment gateway (It is essentially a bank).
Card holder needs to share information as follows with the other two parties:
• The cardholder needs to shares the order information with the merchant. He does not need to provide this information to the payment gateway.
• The cardholder shares the payment information with the payment gateway and not with the merchant.
A set of dual signature is used to accomplish this partial sharing of information among the parties. It allows all parties to confirm that they are handling the same transaction. This is done as follows:
• Each party receives the hash of the withheld information.
• The cardholder needs to sign the hashes of order information as well as payment information.
• Once the card holder signs both hashes each party needs to verify and confirm that the hashes they possess agree with the hash signed by the cardholder.
• Further, the cardholder and merchant needs to compute equivalent hashes which payment gateway needs to compare. After comparing payment gateway needs to confirm their agreement on the details withheld from him.

Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will ...