Secure Electronic Transaction (SET) is a system for
ensuring the security of financial transactions on the Internet. It was
supported initially by Mastercard, Visa, Microsoft, Netscape, and others. With
SET, a user is given an electronic wallet (digital certificate) and a
transaction is conducted and verified using a combination of digital
certificates and digital signatures among the purchaser, a merchant, and the
purchaser's bank in a way that ensures privacy and confidentiality. SET makes
use of Netscape's Secure Sockets Layer (SSL), Microsoft's Secure Transaction
Technology (STT), and Terisa System's Secure Hypertext Transfer Protocol
(S-HTTP). SET uses some but not all aspects of a public key infrastructure
(PKI).
Here's how SET works:
Assume that a customer has a SET-enabled browser
such as Netscape or Microsoft's Internet Explorer and that the transaction
provider (bank, store, etc.) has a SET-enabled server.
- The customer opens a MasterCard or Visa bank account. Any issuer of a credit card is some kind of bank.
- The customer receives a digital certificate. This electronic file functions as a credit card for online purchases or other transactions. It includes a public key with an expiration date. It has been through a digital switch to the bank to ensure its validity.
- Third-party merchants also receive certificates from the bank. These certificates include the merchant's public key and the bank's public key.
- The customer places an order over a Web page, by phone, or some other means.
- The customer's browser receives and confirms from the merchant's certificate that the merchant is valid.
- The browser sends the order information. This message is encrypted with the merchant's public key, the payment information, which is encrypted with the bank's public key (which can't be read by the merchant), and information that ensures the payment can only be used with this particular order.
- The merchant verifies the customer by checking the digital signature on the customer's certificate. This may be done by referring the certificate to the bank or to a third-party verifier.
- The merchant sends the order message along to the bank. This includes the bank's public key, the customer's payment information (which the merchant can't decode), and the merchant's certificate.
- The bank verifies the merchant and the message. The bank uses the digital signature on the certificate with the message and verifies the payment part of the message.
- The bank digitally signs and sends authorization to the merchant, who can then fill the order.
Requirements
provide
confidentiality of payment and ordering information: It is necessary to assure
cardholders that this information is safe and accessible only to the intended
recipient.
Confidentiality
also reduces the risk of fraud by either party to the transaction or by
malicious third parties.
SET uses encryption to provide confidentiality.
ensure
the integrity of all transmitted data: That is, ensure that no changes in
content occur during transmission of SET messages. Digital signatures are used
to provide integrity.
provide
authentication that a cardholder is a legitimate user of a credit card account:
A mechanism that links a cardholder
to a specific account number reduces the incidence of fraud and the overall
cost of payment processing. Digital signatures and certificates are used to
verify that a cardholder is a legitimate user of a valid account.
provide
authentication that a merchant can accept credit card transactions through its
relationship with a financial institution: This is the complement to the preceding requirement.
Cardholders need to be able to identify merchants with whom they can conduct
secure transactions. Again, digital signatures and certificates are used.
Ensure
the use of the best security practices and system design techniques to protect
all legitimate parties in an electronic commerce transaction: SET is a well-tested specification
based on highly secure cryptographic algorithms and protocols.
Create
a protocol that neither depends on transport security mechanisms nor prevents
their their use: SET
can securely operate over a ‘raw’ TCP/IP stack. However, SET does not interfere
with the use of other security mechanisms, such as IPSec and SSL/TLS.
Facilitate
and encourage interoperability among software and network providers: The SET protocols and formats are
independent of hardware platform, operating system, and web software
SET
Participants
Cardholder:
In the electronic environment,
consumers and corporate purchasers interact with merchants from personal
computers over the Internet. A cardholder is an authorized holder of a payment
card that has been issued by an issuer.
Merchant:
A merchant is a person or
organization that has goods and services to sell to the cardholder. Typically,
these goods and services are offered via a Web site or by electronic mail. A
merchant that accepts payment cards must have a relationship with an acquirer.
Issuer:
This is a financial institution,
such as a bank, that provides the cardholder with the payment card.
Acquirer:
This is a financial institution that
establishes an account with a merchant and processes payment card
authorizations and payments. Merchants will usually accept more that one credit
card brand but do not want to deal with multiple bankcard associations or with
multiple individual issuers. The acquirer provides authorization to the
merchant that a given card accounts is active and that the proposed purchase
does not exceed the credit limit. The acquirer also provides electronic
transfer of payments to the merchant’s account.
Certification Authority (CA):
This is an entity that is trusted to
issue X509v3 public-key certificates for cardholders, merchants, and payment
gateways. The success of SET will depend on the existence of a CA
infrastructure available for this purpose.
1 The customer opens an account. The customer obtains a credit card
account, such as MasterCard or Visa, with a bank that supports electronic
payment and SET.
2. The customer receives a certificate. After suitable verification of
identity, the customer receives an X.509v3 digital certificate, which is signed
by the bank. The certificate verifies the customer’s RSA public key and its
expiration date. It also establishes a relationship, guaranteed by the bank,
between the customer’s key pair and his or her credit card.
3. Merchants have their own certificates. A merchant who accepts a
certain brand of card must be in possession of two certificates for two public
keys owned by the merchant: one for signing messages, and one for key exchange.
The merchant also needs a copy of the payment gateway’s public-key certificate.
4. The customer places an order. This is a process that may involve
the customer first browsing through the merchant’s Web site to select items and
determine the price. The customer then sends a list of the items to be
purchased to the merchant, who returns an order from containing the list of
items, their price, a total price, and an order number.
5. The merchant is verified. In addition to the order form, the
merchant sends a copy of its certificate, so that the customer can verify that
he or she is dealing with a valid store.
6. The order and payment is verified. The customer sends both order
and payment information to the merchant, along with the customer’s certificate.
The order confirms the purchase of the items in the order form. The payment
contains credit card details. The payment information is encrypted in such a
way that it cannot be read by the merchant. The customer’s certificate enables
the merchant to verify the customer.
7. The merchant requests payment authorization. The merchant sends the
payment information to the payment gateway, requesting authorization that the
customer’s available credit is sufficient for this purchase.
8. The merchant confirm the order. The merchant sends confirmation of
the order to the customer.
9. The merchant provides the goods or service. The merchant ships the
goods or provides the service to the customer.
10. The merchant request payment. This request is sent to the payment
gateway, which handles all of the payment processing
No comments:
Post a Comment