WHAT ARE THE THREE 'CORE/KEY SKILLS'?

Download Report

Transcript WHAT ARE THE THREE 'CORE/KEY SKILLS'?

Electronic Commerce
Richard Henson
University of Worcester
April 2008
Week 9: On-line Payment
Systems and Secure Networks

Objectives:
 explain how an on-line buyer can be authenticated
 describe how the buyer can be reassured during
the fulfilment process
 explain the acronym VPN and how part of the
Internet can become a VPN
 apply principles of “after sales service” to on-line
trading
 exercise greater control over web page data
extracted from databases
Authenticating the Buyer

E-commerce systems provide a range of
options for rapid on-line payment:
 by credit card
 by debit card
 by agreed credit terms with the vendor

The following methods are also included, but
are non-digital and slow the process down
 by cheque
 by bankers draft
Authenticating the Buyer

Whichever of the rapid payment
methods is used…
buyer needs to be authenticated by the ecommerce site

This requires on-line communication
with a financial institution
» must be via Internet
» fixed IP address needed

site must be secure
– therefore must use a secure protocol
Authenticating the Buyer

Financial institutions only tend to
communicate via Internet with trusted
sites
vendor would need to go through rigorous
procedures to become such a site
easier to outsource and hire a Merchant
Services Company to act as the trusted
site
» e.g. WorldPay, Netbanx, PayPal
Authenticating the Buyer

The merchant service does the following:
 connects the e-commerce site via secure link to
their secure server
 captures buyer details on their secure server
 connects via secure link to an on-line financial
institution
 passes buyer details to on-line financial institution

It is then up to the financial institution to deal
with the prospective sale…
Authenticating the Buyer
The financial system uses the personal
details supplied to authenticate the
buyer and authorise payment
 Three outcomes are possible:

authenticated and authorised
authenticated but not authorised
» e.g. over credit limit
not authenticated
» buyer details incorrect i.e. not matching records
or inconsistent
Arranging for Payment

Once the buyer has been authenticated
and authorised
payment can be taken from the account
The merchant services company will be
charged for accessing the secure
financial network
 It therefore makes sense for
authentication and payment to both occur
during the same “session” on the secure
financial network

More about the International
Banking Network

Extremely secure servers
configured/maintained by experts

Connected using a Virtual Private
Network
data only sent along secure channels
sent using PPTP (point-to-point tunnelling
protocol)
sent encrypted (512-bit)

Only trusted users can use it
Virtual Private Networks

Can be completely private
a mesh of dedicated private lines

Can use the Internet...
obvious security implications…
Intranets and Extranets
Both use standard www protocols (i.e
http, http-s)
 An Intranet can be:

a single LAN
several interconnected LANs which over
a larger geographic area
» what Microsoft call an “Enterprise network”

Extranets extend the Intranet to cover
selected “trusted” remote sites
e.g. business partners
Creating an Extranet

Can use private leased lines to link sites
secure, but expensive
do not need to use http, etc.

Can also use the Internet:
security issues need resolving
very little cost
use client-server web applications across
different sites
Extranets and Virtual Private
Networks
An Extranet is not necessarily a secure
means of transmitting data
 Data should be secure on the servers (if
set up properly)
 Data sent using HTTP on top of TCP/IP
can easily be intercepted
 A VPN carries sensitive data, which must
not be intercepted...

VPNs on the Internet

Four techniques can be used to
enhance security:
use of secure channels, rather than packet
switching
secure encryption techniques
secure protocol such as http-s for
sending/receiving data
“tunnelling” protocol such as PPTP
» hides the data within other data
More about PPTP

Sponsored by MS and CISCO
Proposal for consideration by IETF

Extension of PPP
Allow organisations to extend their own
corporate network by using private
“tunnels” over public Internet
Secure connection over public networks
Effectively using WAN as a single large
LAN
Secure Data Transfer Standards

Four technologies that have been
developed especially to enable secure
transactions over the Internet:
 HTTP-S : secure http
 SSL : Secure Sockets Layer (most used :
Netscape)
 SET : Secure Electronic Transaction
(Mastercard/Visa)
 Digital signature technology
SSL
Secure Sockets Layer
 Developed by Netscape for browser
participation in Internet security
 Provides encryption of http packets on
TCP/IP routes between Internet hosts
 Not been accessed by hackers so far
 Most commonly used protocol for ecommerce transactions, despite the
emergence of SET (next slide…)

SET



Secure Electronic Transactions
Developed by credit card companies
Based on the idea of a digital certificate
 customer and the merchant identity both validated
or “certified”

A need for “trusted” agencies
 who decides who is trustworthy?
 banks & financial institutions?
Issues surrounding on-line
payment

Potential shoppers suspicious about
security
doubts heightened by reporting of the
media

In time...
Internet will become a more common place
to do business
Shoppers will gain experience of the
advantages of buying on-line
Current Best Practice
Take payments by credit card through a
secure server
 Creators of shop@ssistant recommend
the use of a secure transaction service

“major contribution to the potential viability
of any e-commerce site on the Internet”
Reassuring the Shopper

Use of a secure transaction service
makes sure that:
credit card details are being transmitted
securely
credit card details are not being held on
any computer system where they could be
compromised.
Reassuring the Shopper

When the shopper is transparently
transferred to the secure server
the secure server icon is displayed in his
browser
designed to promote a feeling of
confidence in the mind of the shopper
when using this service
Reassuring the Shopper

Shopper Dealing with a nationallyknown, branded supplier of credit card
services
authorised to carry the logos of the card
issuers on their site
active participation of the credit card
issuers ’and merchant services ’
organisations.
Reassuring the merchant!

The existence of a secure network for
credit card transactions helps the
merchant too:
card details are never passed to the
merchant ’s site
not involved at all in the secure data
transmission
has no possibility to take, see or store the
card details
effectively removed from the possibility of
collusion in any card malpractice
Reassuring the merchant!

Flexibility in taking payments is assured
since all of the world ’s major credit and
debit cards are accepted by the
transaction services
Reassuring the merchant!
the merchant will know whether the
shopper has good credit to cover the
value of the goods before completing
processing of the order
 When the merchant receives an e-mail
from the transaction service provider
confirming payment, the money is
almost as good as in the bank!

Fulfilment - getting the goods
to the customer

Includes:
customer service
communications (e.g. by email)
warehousing
shipping
storage
insurance
Payment and Fulfillment

Agreed convention of on-line trading that
payment is not taken until the goods
have been “picked”
taken out of the warehouse in preparation
for delivery
Whole process of authentication and
payment is therefore delayed until the
product is about to be picked
 Errors in customer details not
discovered until picking takes place!

Payment and Fulfillment

If an authentication error does occur
the potential buyer is emailed, explaining
the problem
the picking process is suspended

If authentication is successful
buyer is emailed
» informed that product has been picked
picked product goes to delivery stage
Issues concerning Fulfillment

If:
either goods do not arrive
or buyer is not satisfied with the goods
The buyer has a right to a refund
 Under recent EU law the refund must
occur before goods are returned

Issues concerning Fulfillment

Fraud could occur:
site itself could be fraudulent
» buyers should look out for a secure connection
window
» if no window, don’t supply card details
If fraud has occurred, and e-commerce site
is:
» not to blame…
» unable to pay
credit card company will usually pay the
refund
Issues concerning Fulfillment
Fulfillment also includes after-sales
service
 Example: if a computer has been
purchased, and the buyer has a
problem, there need to be good
communication channels available:

telephone - call centre if high call volumes
can reasonably be expected
email - quick response required!
Product Pages –
a final word…



As you only have a small number of products,
a product summary for each can be included
on a single page
However, that summary page should also
include a link to a unique page for each
product
Thanks to parameter passing between pages,
this can be achieved with just a single
“master” page, and a single “detail” page
Dreamweaver and passing
parameters – 1



The master page must include a column for
each record with a hyperlink to the detail
page
The hyperlink must be appended by a get (?)
construct, which passes a field that has a
unique value for that record
The link then becomes long and potentially
“scary”, but this is essential for passing data
to another web page
Dreamweaver and passing
parameters - 2

When navigating from “master” to “detail”,
there is a need to make sure that…
 the correct fieldname is selected when the link is
created using “make link” option
 the correct parameter is chosen for passing the
appropriate value for that field to the detail page

This parameter needs to be picked up by the
detail page and an SQL statement used to
filter the data in the relevant product data
dataset
Passing Parameters
& “Scary Strings”

Dreamweaver shields the non-mathematician
from coding as much as possible…
 but sometimes the variables used for passing data
within or between pages just have to be “scary
strings”
 if you don’t want to engage with programming
logic that’s understandable
» Just remember when typing such strings that:


every “begin”({) has an “end” (})
every “start quotes” has an “end quotes”
» also, remember that Dreamweaver does colour coding
for its programming code, and this could be a useful way
to detect typing errors (we all make them!)
Dreamweaver and passing
parameters - 3

The detail page needs to know about the
parameter fieldname in order to correctly
make use of the parameter value passed from
the master page in its SQL query
 both can be achieved when the dataset wizard is
used to filter the data to be displayed
 just use the “advanced” option
» parameter section just needs a fieldname that
corresponds to the SQL query

a wizard will create the “scary string” so no worries
» main SQL statement needs “where fieldname=?” to put
the parameter value in the right place
Products: Control over asp.net
product pages


In a real e-commerce site, it is unlikely that all
on-line products can be displayed on a single
page
In such cases, a “category” field is included in
the products table, and product pages are
accessed via “category” pages
 category number can then be passed as a
parameter from a master page to select products
of a particular category for the “detail page”