380 likes | 408 Views
Electronic Commerce. Richard Henson University of Worcester April 2008. Week 9: On-line Payment Systems and Secure Networks. Objectives: explain how an on-line buyer can be authenticated describe how the buyer can be reassured during the fulfilment process
E N D
Electronic Commerce Richard Henson University of Worcester April2008
Week 9: On-line Payment Systems and Secure Networks • Objectives: • explain how an on-line buyer can be authenticated • describe how the buyer can be reassured during the fulfilment process • explain the acronym VPN and how part of the Internet can become a VPN • apply principles of “after sales service” to on-line trading • exercise greater control over web page data extracted from databases
Authenticating the Buyer • E-commerce systems provide a range of options for rapid on-line payment: • by credit card • by debit card • by agreed credit terms with the vendor • The following methods are also included, but are non-digital and slow the process down • by cheque • by bankers draft
Authenticating the Buyer • Whichever of the rapid payment methods is used… • buyer needs to be authenticated by the e-commerce site • This requires on-line communication with a financial institution • must be via Internet • fixed IP address needed • site must be secure • therefore must use a secure protocol
Authenticating the Buyer • Financial institutions only tend to communicate via Internet with trusted sites • vendor would need to go through rigorous procedures to become such a site • easier to outsource and hire a Merchant Services Company to act as the trusted site • e.g. WorldPay, Netbanx, PayPal
Authenticating the Buyer • The merchant service does the following: • connects the e-commerce site via secure link to their secure server • captures buyer details on their secure server • connects via secure link to an on-line financial institution • passes buyer details to on-line financial institution • It is then up to the financial institution to deal with the prospective sale…
Authenticating the Buyer • The financial system uses the personal details supplied to authenticate the buyer and authorise payment • Three outcomes are possible: • authenticated and authorised • authenticated but not authorised • e.g. over credit limit • not authenticated • buyer details incorrect i.e. not matching records or inconsistent
Arranging for Payment • Once the buyer has been authenticated and authorised • payment can be taken from the account • The merchant services company will be charged for accessing the secure financial network • It therefore makes sense for authentication and payment to both occur during the same “session” on the secure financial network
More about the International Banking Network • Extremely secure servers • configured/maintained by experts • Connected using a Virtual Private Network • data only sent along secure channels • sent using PPTP (point-to-point tunnelling protocol) • sent encrypted (512-bit) • Only trusted users can use it
Virtual Private Networks • Can be completely private • a mesh of dedicated private lines • Can use the Internet... • obvious security implications…
Intranets and Extranets • Both use standard www protocols (i.e http, http-s) • An Intranet can be: • a single LAN • several interconnected LANs which over a larger geographic area • what Microsoft call an “Enterprise network” • Extranets extend the Intranet to cover selected “trusted” remote sites • e.g. business partners
Creating an Extranet • Can use private leased lines to link sites • secure, but expensive • do not need to use http, etc. • Can also use the Internet: • security issues need resolving • very little cost • use client-server web applications across different sites
Extranets and Virtual Private Networks • An Extranet is not necessarily a secure means of transmitting data • Data should be secure on the servers (if set up properly) • Data sent using HTTP on top of TCP/IP can easily be intercepted • A VPN carries sensitive data, which must not be intercepted...
VPNs on the Internet • Four techniques can be used to enhance security: • use of secure channels, rather than packet switching • secure encryption techniques • secure protocol such as http-s for sending/receiving data • “tunnelling” protocol such as PPTP • hides the data within other data
More about PPTP • Sponsored by MS and CISCO • Proposal for consideration by IETF • Extension of PPP • Allow organisations to extend their own corporate network by using private “tunnels” over public Internet • Secure connection over public networks • Effectively using WAN as a single large LAN
Secure Data Transfer - Standards • Four technologies that have been developed especially to enable secure transactions over the Internet: • HTTP-S : secure http • SSL : Secure Sockets Layer (most used : Netscape) • SET : Secure Electronic Transaction (Mastercard/Visa) • Digital signature technology
SSL • Secure Sockets Layer • Developed by Netscape for browser participation in Internet security • Provides encryption of http packets on TCP/IP routes between Internet hosts • Not been accessed by hackers so far • Most commonly used protocol for e-commerce transactions, despite the emergence of SET (next slide…)
SET • Secure Electronic Transactions • Developed by credit card companies • Based on the idea of a digital certificate • customer and the merchant identity both validated or “certified” • A need for “trusted” agencies • who decides who is trustworthy? • banks & financial institutions?
Issues surrounding on-line payment • Potential shoppers suspicious about security • doubts heightened by reporting of the media • In time... • Internet will become a more common place to do business • Shoppers will gain experience of the advantages of buying on-line
Current Best Practice • Take payments by credit card through a secure server • Creators of shop@ssistant recommend the use of a secure transaction service • “major contribution to the potential viability of any e-commerce site on the Internet”
Reassuring the Shopper • Use of a secure transaction service makes sure that: • credit card details are being transmitted securely • credit card details are not being held on any computer system where they could be compromised.
Reassuring the Shopper • When the shopper is transparently transferred to the secure server • the secure server icon is displayed in his browser • designed to promote a feeling of confidence in the mind of the shopper when using this service
Reassuring the Shopper • Shopper Dealing with a nationally-known, branded supplier of credit card services • authorised to carry the logos of the card issuers on their site • active participation of the credit card issuers ’and merchant services ’ organisations.
Reassuring the merchant! • The existence of a secure network for credit card transactions helps the merchant too: • card details are never passed to the merchant ’s site • not involved at all in the secure data transmission • has no possibility to take, see or store the card details • effectively removed from the possibility of collusion in any card malpractice
Reassuring the merchant! • Flexibility in taking payments is assured since all of the world ’s major credit and debit cards are accepted by the transaction services
Reassuring the merchant! • the merchant will know whether the shopper has good credit to cover the value of the goods before completing processing of the order • When the merchant receives an e-mail from the transaction service provider confirming payment, the money is almost as good as in the bank!
Fulfilment - getting the goods to the customer • Includes: • customer service • communications (e.g. by email) • warehousing • shipping • storage • insurance
Payment and Fulfillment • Agreed convention of on-line trading that payment is not taken until the goods have been “picked” • taken out of the warehouse in preparation for delivery • Whole process of authentication and payment is therefore delayed until the product is about to be picked • Errors in customer details not discovered until picking takes place!
Payment and Fulfillment • If an authentication error does occur • the potential buyer is emailed, explaining the problem • the picking process is suspended • If authentication is successful • buyer is emailed • informed that product has been picked • picked product goes to delivery stage
Issues concerning Fulfillment • If: • either goods do not arrive • or buyer is not satisfied with the goods • The buyer has a right to a refund • Under recent EU law the refund must occur before goods are returned
Issues concerning Fulfillment • Fraud could occur: • site itself could be fraudulent • buyers should look out for a secure connection window • if no window, don’t supply card details • If fraud has occurred, and e-commerce site is: • not to blame… • unable to pay • credit card company will usually pay the refund
Issues concerning Fulfillment • Fulfillment also includes after-sales service • Example: if a computer has been purchased, and the buyer has a problem, there need to be good communication channels available: • telephone - call centre if high call volumes can reasonably be expected • email - quick response required!
Product Pages – a final word… • As you only have a small number of products, a product summary for each can be included on a single page • However, that summary page should also include a link to a unique page for each product • Thanks to parameter passing between pages, this can be achieved with just a single “master” page, and a single “detail” page
Dreamweaver and passing parameters – 1 • The master page must include a column for each record with a hyperlink to the detail page • The hyperlink must be appended by a get (?) construct, which passes a field that has a unique value for that record • The link then becomes long and potentially “scary”, but this is essential for passing data to another web page
Dreamweaver and passing parameters - 2 • When navigating from “master” to “detail”, there is a need to make sure that… • the correct fieldname is selected when the link is created using “make link” option • the correct parameter is chosen for passing the appropriate value for that field to the detail page • This parameter needs to be picked up by the detail page and an SQL statement used to filter the data in the relevant product data dataset
Passing Parameters & “Scary Strings” • Dreamweaver shields the non-mathematician from coding as much as possible… • but sometimes the variables used for passing data within or between pages just have to be “scary strings” • if you don’t want to engage with programming logic that’s understandable • Just remember when typing such strings that: • every “begin”({) has an “end” (}) • every “start quotes” has an “end quotes” • also, remember that Dreamweaver does colour coding for its programming code, and this could be a useful way to detect typing errors (we all make them!)
Dreamweaver and passing parameters - 3 • The detail page needs to know about the parameter fieldname in order to correctly make use of the parameter value passed from the master page in its SQL query • both can be achieved when the dataset wizard is used to filter the data to be displayed • just use the “advanced” option • parameter section just needs a fieldname that corresponds to the SQL query • a wizard will create the “scary string” so no worries • main SQL statement needs “where fieldname=?” to put the parameter value in the right place
Products: Control over asp.net product pages • In a real e-commerce site, it is unlikely that all on-line products can be displayed on a single page • In such cases, a “category” field is included in the products table, and product pages are accessed via “category” pages • category number can then be passed as a parameter from a master page to select products of a particular category for the “detail page”