<Previous Lesson

E-Commerce

Next Lesson>

Lesson#25

VIRTUAL PIN PAYMENT SYSTEM

A Virtual PIN can become compromised as a result of eavesdropping and bogus purchases are possible before it is blacklisted. Stolen credit card number can also be used to set up Virtual PIN associated with email addresses controlled by the attacker to carry out bogus transactions. After every 90 days buyer’s credit card account is billed for the charges that have accumulated and the merchant’s account is credited accordingly. FV does accounting for merchant and buyer; therefore, it takes a commission per transaction according to its policy.

Advantages and disadvantages

Simplicity and no encryption is the biggest advantage of this payment system, which means that no special software is needed at the frond end. This payment system is good for low-cost information items. Therefore, it is suitable for buying online articles/journals/music etc. where the cost of the items is not much. In that eventuality, only sales are lost rather than actual financial loss to the merchant if there is a fraud. In other words, only some extra copies of the information items are made in case of a fraud. On the other hand merchant is exposed to much greater financial loss if the purchase relates to the actual physical goods. One of the disadvantages of this payment model is that pre-registration of the buyer and the merchant with FV is mandatory in this set up. Moreover, maintaining a bank account (in case of merchant) and having a credit card (in case of a buyer) is also essential part of this system. One can say that the merchant side is less secured in the transaction because the goods are delivered by the merchant before the payment is actually received. The popularity of this payment system declined after 1998 mainly because of the introduction and development of encryption based payment mechanisms.

Centralized Account Payment Model

This is a popular payment system on the internet. In this both the payer (buyer) and the payee (merchant) hold accounts at the same centralized on-line financial institution. Over 20 payment systems use this approach e.g., PayPal, E-gold, Billpoint, Cybergold, Yahoo! Pay Direct, Amazon.com Payments etc. This model is shown in Fig. 1 below: Fig. 1 On-line opening/funding of one’s account is done in a centralized bank using credit/debit card or prepaid cards. To make payment an account holder is authenticated using an account identifier and a password, account identifier of the payee and the payment amount. All communication between the user and the bank is protected using

SSL (Secure Socket Layer)

, which is an encryption based protocol. The chosen account

113 identifier or the account ID is the one which is unique within the system against which the funds are lying in the online bank. Normally, the unique email addresses of the users are chosen as account identifiers. Payees are notified by email of the payment which they can confirm by viewing their account using SSL. A payee must open an account with the online centralized bank to receive the amount in case there is no such account already. In some payment systems which use this approach a question may be sent to the payee to verify his identity where the payer is not sure of that. For instance, Yahoo Paydirect allows a payer-specified question to be sent to the so called email of the payee. If the payer accepts the answer as proof of the correct identity of the payee the money is transferred otherwise the transaction is cancelled. The centralized bank (depending upon its policy) charges a transaction fees either from the payer, or payee or both on funding an account or withdrawing funds from an account or receiving payments by the payee/merchant. This payment model requires that all participants must have their account with the same central payment system/bank. Note that the payee can eventually withdraw the money received in his account in the centralized bank through Automated Clearing House (ACH).

Electronic Checks

Financial Services Technology Consortium (FSTC) is a group of U.S banks, research agencies and government organizations formed in 1993. It has introduced the concept of electronic checks. An electronic check contains an instruction to the payer’s bank to make a specified payment to a payee. Both, symmetric and asymmetric type of cryptography is used in this system. The payer and the payee are issued digital certificates in X. 509 standard format by their respective banks. These certificates are used to verify the digital signatures on the check. A bank may include account restrictions, maximum check value, or currencies allowed by the bank in the certificate. All individuals capable of issuing electronic checks will have an electronic check book device. An electronic check book device is a combination of secure hardware such as a smart card and appropriate software. A smart card is usually the size of a credit card having special software loaded on it. Information regarding secret/private key, certificate information and register of what checks have been signed/endorsed is normally stored in the smart card. Fig. 2 below shows the working of an electronic check in its typical format: Fig. 2 A payer uses the electronic check book device in his computer system to generate a blank electronic check after filling the information regarding amount, date etc., and the electronic check is digitally signed by the payer through his private key. A certificate issued by the payer bank authenticating public key of the payer is also attached with the electronic check. This information is then sent to the payee in a secure envelope through email. A secure envelop is created when a user encrypts any information with a symmetric key, and

114 then that symmetric key itself is encrypted with the public key of the receiver. Accordingly, the payee, in this case, decrypts the secure envelop by first retrieving the symmetric key (by applying his private key), and then using that symmetric key to decrypt the information contained in the electronic check. The payee endorses (counter-signs) the check using some secure hardware device such as a smart card and forwards the check to the payee’s bank in the form of a secure envelop. The bank clears the check with the help of traditional Automated Clearing House (ACH). Accordingly, the account of the payer is debited and the payee’s account is credited. The banks send email statement to the respective parties. Depending on the availability of processing infrastructure, there are four different scenarios for the processing of an electronic check.

<Previous Lesson

E-Commerce

Next Lesson>

Home

Lesson Plan

Topics

Go to Top

Next Lesson
Previous Lesson
Lesson Plan
Topics
Home
Go to Top