Unit -4 –Internet payment systems

Embed Size (px)

Citation preview

  • 7/27/2019 Unit -4 Internet payment systems

    1/49

    Unit -4Internet payment

    systems

  • 7/27/2019 Unit -4 Internet payment systems

    2/49

    Features of payment methods

    Anonymity-Whether a third party can trance backthe transaction

    Security forged payment

    Overhead cost OH cost of processing payment Transferability Whether payment can be carried

    out without the involvement of a third party suchas a bank

    Divisibility Whether payment can be divided into arbitrary small payments

    Acceptability Supported globally

  • 7/27/2019 Unit -4 Internet payment systems

    3/49

    4C payment methods comparison

    Cash Credit card Check Credit/debit

    Security Good Good Good Good

    Overhead cost Lowest, in general Higher than cash

    and credit/debit

    because of the paper

    work involved

    Highest, in general Low

    Transferability Yes No No No

    Acceptability Yes, in general Yes, in general No, in general it can

    only be used locally

    No, in general it can

    only be used locally

    Anonymity Yes, in general No No No

    Divisibility Not completely

    divisible

    Yes Yes Yes

  • 7/27/2019 Unit -4 Internet payment systems

    4/49

    Check Clearing process

  • 7/27/2019 Unit -4 Internet payment systems

    5/49

    Credit card

  • 7/27/2019 Unit -4 Internet payment systems

    6/49

    SET Protocol

    SET Secure Electronic Transaction

    Before SET, Credit card payment was done through SSL(Secure Socket Layer)

    SSL ensure secure transmission of credit card informationover the internet but not on line authorization of card

    SET is supported by Visa , Master card

    Caters 3 credit card payments

    Confidentiality

    messages are encrypted Integritymessages signed digitally to ensure in integrity

    Authentication Done through PKI

  • 7/27/2019 Unit -4 Internet payment systems

    7/49

    Need for SET

    Each software vendors were coming up withnew and conflicting standards.

    Microsoft mainly drove these on one hand,

    and IBM on the other. To avoid all sorts of future incompatibilities,

    MasterCard and Visa decided to come up with

    a standard, ignoring all their competitionissues, and in the process, involving all themajor software manufacturers.

  • 7/27/2019 Unit -4 Internet payment systems

    8/49

    SET Architecture framewrok

    Merchant

    Certificate

    authority

    Payment

    gateway/

    AcquirerInternet

    Authorization

    and Capture

    Existing financial

    network

    Authorization

    and Capture

    Issuer

    Cardholder

    Payment/Inquiry

  • 7/27/2019 Unit -4 Internet payment systems

    9/49

    Components

    Merchant --> seller

    Card holder Buyer

    Issuer

    Card issuing bank Acquirer Agent to link merchant to multiple

    issuers

    Payment gateway Connected to theacquirer

  • 7/27/2019 Unit -4 Internet payment systems

    10/49

    Digital Certificate system for SEF

    Root CA

    Brand CA

    (e.g Visa

    or Master)

    Geopolitical CA

    (e.g. Visa Asia)

    Merchant CA Cardholder CAPayment

    gateway CAUser level

    CA

  • 7/27/2019 Unit -4 Internet payment systems

    11/49

    Dual Signature

    SET works in a very interesting manner.

    The SET protocol makes use of the concept ofdualsignature. The idea is like this:1. The cardholder takes the Payment Information (PI), containing

    the cardholders credit card number, expiry date, etc andhashes (digests) it to produce Payment Information MessageDigest (PIMD).

    2. Similarly, the cardholder digests the Order Information (OI) toobtain Order Information Message Digest (OIMD)

    3. The cardholder combines PIMD and OIMD to produce

    Payment and Order Message Digest (POMD).4. The cardholder encrypts the POMD with its private key. The

    output of this process is the Dual Signature (DS). It is calleddual, because it has inputs coming from PI as well as OI.

  • 7/27/2019 Unit -4 Internet payment systems

    12/49

    Dual Signature

    The cardholder now sends:

    OI, PIMD, and DS to the merchant

    PI, OIMD, and DS to the payment gateway

  • 7/27/2019 Unit -4 Internet payment systems

    13/49

    Dual Signature

    Merchant does not get access to PI, and hence,cannot know the cardholders credit cardnumber.

    However, it has access to OI to process the order.

    To validate the card holders order, The merchant can decrypt DS using the cardholders

    public key to obtain the first POMD

    separately combine OIMD and PIMD to also compute

    the second POMD. If the two POMD values match, the merchant is happy

    that the order was indeed sent by the cardholder.

  • 7/27/2019 Unit -4 Internet payment systems

    14/49

    Dual Signature

  • 7/27/2019 Unit -4 Internet payment systems

    15/49

    Digital Envelope

    Digital

    Envelope

    DES

    Encryption

    RSA

    Encryption

    keyrandom

    M

    Encrypted by

    keyrandom

    Encrypted by

    keypublic_exchange,VBSkeyrandom

    keypublic_exchange,VBS

  • 7/27/2019 Unit -4 Internet payment systems

    16/49

    SET Information Flow

    (5) Authorization request

    (6) Authorization response

    (7) Capture request

    (2) Purchase initialization response

    (1) Purchase initialization request

    (3) Purchase request

    (4) Purchase response

    Inquiry request (optional)

    Inquiry response (optional)

    Acquirer(Payment

    Gateway)Merchant

    (8) Capture response

    Cardholder

  • 7/27/2019 Unit -4 Internet payment systems

    17/49

    Purchase Initiation

    Card holderPurchase request

    Message Contains Local Transaction Identity(ID)

    Token N1 for thwarting replay attack

    some cached certificates

    Merchant Response

    Unique transaction ID (generated based on localtransaction ID), serves as ID for further transactions

    Nounce N1 from cardholder

    and Nounce N2 generated by merchant

    Its certificates and payment gateway certificates

    Digitally signed by merchants private key

  • 7/27/2019 Unit -4 Internet payment systems

    18/49

    Replay Attack

  • 7/27/2019 Unit -4 Internet payment systems

    19/49

    Purchase Request

    Cardholder prepares OI and PI

    OI Unique transaction ID, N1 and N2 and otherdetails

    PI transaction details and payment amount andmessage digest of the order description

    Dual signature is generated with OI and PI

    Digital envelope PI is encrypted with random symmetric key A. Cardholder info is encrypted with public key-exchange

    key of payment gateway

  • 7/27/2019 Unit -4 Internet payment systems

    20/49

    Purchase request

    Following info sent to merchant OI + DS + H [PI]

    PI + DS + H [OI] (all encrypted using key A)

    Key A + cardholder in (encrypted with public key-exchange key of payment gateway)

    Cardholder certificates

    Purchase response Verifies the card holders certificates and dual

    signature Response to cardholder with certificates signed with

    merchants private key

  • 7/27/2019 Unit -4 Internet payment systems

    21/49

    Payment authorization

    Authorization request is encrypted with randomsymmetric key B

    Key B is then encrypted with public key-exchange keyof payment gateway to form digital envelope

    Only payment gateway can get Key B Following info sent to Payment Gateway

    Encrypted authorization request and encrypted key B

    PI + DS + H [OI] (all encrypted using key A)

    Key A + cardholder in (encrypted with frompublic key-exchange key of payment card holder

    gateway)

    Cardholer and merchants certificates

  • 7/27/2019 Unit -4 Internet payment systems

    22/49

    Payment Authorization

    Payment Gateway

    Obtains key B by decryption and use it to decrypt

    authorization request

    Verifies merchants certificates and digital signtureof authorization request

    Obtains key A and cardholder information by

    means of decryption Verifies DS accordingly

  • 7/27/2019 Unit -4 Internet payment systems

    23/49

    Authorization response

    On verification, Payment gateway forwards authorizationrequest to the issuer via current payment system

    After receiving the authorization from issuer, paymentgateway sends authorization response to the merchant

    Response message

    transaction ID, authorization code,amount authorized, and other info abt the transaction

    Authorization response Signed authorization response (encrypted with random

    symmetric key C)

    Key C (encrypted with public key-exchange key merchant) Capture token (encrypted with random symmetric key D )

    Key D + card holder information (encrypted with public key-exchange key of payment gateway)

  • 7/27/2019 Unit -4 Internet payment systems

    24/49

    Payment capture

    Capture request transaction ID, capture amount andother details

    Capture request from Merchant to Payment gateway

    Signed capture request (Encrypted using randomsymmetric key E)

    Key E (encrypted with payment gateways public key-exchange key)

    Signed capture token (encrypted using key D)

    Key D + card holder info (encrypted with paymentgateways public key-exchange key)

    Merchants digital certificates

  • 7/27/2019 Unit -4 Internet payment systems

    25/49

    Capture response

    Capture response transaction ID, capture

    amount, capture code (generated) and other info

    Payment gateway to merchant

    Signed capture response(Encrypted using random

    symmetric key F)

    Key F (encrypted with merchants public key-exchange

    key)

    Payment gateways digital certificates

    Capture response is stored in merchant system

  • 7/27/2019 Unit -4 Internet payment systems

    26/49

    E - Cash

    E- cash should have following properties:

    Inability of third parties to determine the payee,

    time or amount of payments made by an

    individual. Ability of individuals to provide proof of payment,

    or determine the identity of the payee under

    exceptional circumstances.

    Be able to stop use of the payment media if

    reported stolen.

  • 7/27/2019 Unit -4 Internet payment systems

    27/49

    Blind signature

    Blind signature schemes, first introduced by

    Chaum allow a person to get a message signed

    by another party without revealing any

    information about the message to the otherparty.

  • 7/27/2019 Unit -4 Internet payment systems

    28/49

    E-Cash Coin

    The electronic coins used within the Ecash system are unique in that they are partly minted by the client before being signed by the bank.

    Each coin has a serial number that is generated by the clients cyberwallet software.

    The serial numbers are chosen randomly and are large enough so that

    there is very little chance that anyone else will ever generate the same serial numb

    ers. For example, using a 100digit serial number can guarantee this. The serial number is blinded and sent to the bank to be signed. The bank is unabl

    e to see the serial number on the coin it is signing. The method can be considered similar to putting the coin and a piece of carbon paper into an envelope.

    The envelope is sent to the bank where it is signed and returned to the client, as shown in Figure below. The client opens the envelope and takes out the coin (unblinds it). The coin has now been signed. The carbon paper ensured that the banks si

    gnature went through the envelope. The signature on the unblinded coin appears the same as any other normal digital

    signature. There is no way to tell from it that the coin was signed using the blind signature protocol

  • 7/27/2019 Unit -4 Internet payment systems

    29/49

  • 7/27/2019 Unit -4 Internet payment systems

    30/49

  • 7/27/2019 Unit -4 Internet payment systems

    31/49

    Coin Keys

    Problem the bank cannot see what it is signinghow can a value be assig

    ned to the coin?

    The problem can be solved by the bank using a different signature key for

    each coin denomination.

    The client informs the bank of the value it wants the blinded coin to be worth.

    The bank then signs the coin with the signature key representing this deno

    mination and deducts that amount from the clients acount. For example,

    the bank might have a onecent signature, a 5cent signature, a 10cent sig

    nature, and so on.

  • 7/27/2019 Unit -4 Internet payment systems

    32/49

    E-Cash

    Pay by the coins

    Check the validity of thecoins and whether they have

    been spent and credit the

    account accordingly

    Debit the account and signthe blinded coins

    Send the blinded coins to thebank

    Return the signed blinded coins

    Deposit the coins

    Confirm the deposit

    Ship goods or perform the service

    Generate the blinded coins

    Unblind the coins

    Customer Bank VBS (Merchant)

  • 7/27/2019 Unit -4 Internet payment systems

    33/49

    Double Spending Prevention

    Ecash coins are just pieces of data that can be copied. To prevent copied coins from being spent repeatedly, this possible double spending must be prevented.

    To ensure that a serial number is not spent twice, the minting bank must record every coin that is deposited back to that bank. A very large database of all spent serial numberssoon develops. A valid unspent coin must Be signed, with any denominational signature, by the

    bank

    Have an expiry date associated with it that is later than the present date

    Not appear in the database of spent coins.

  • 7/27/2019 Unit -4 Internet payment systems

    34/49

    Double Spending

  • 7/27/2019 Unit -4 Internet payment systems

    35/49

    E-Check

    Electronic check will contain an instruction to

    the payers bank to make a payment of a

    specified amount to an identified payee.

    The fact that the check is in electronic form

    and is being conveyed across computer

    networks should allow more flexibility in the

    handling of the check

  • 7/27/2019 Unit -4 Internet payment systems

    36/49

    E-Check

  • 7/27/2019 Unit -4 Internet payment systems

    37/49

    Deposit and Clear

  • 7/27/2019 Unit -4 Internet payment systems

    38/49

    Cash and transfer

  • 7/27/2019 Unit -4 Internet payment systems

    39/49

    Lock Box

  • 7/27/2019 Unit -4 Internet payment systems

    40/49

  • 7/27/2019 Unit -4 Internet payment systems

    41/49

    Micro Payment

    Need for a payment system that can

    efficiently transfer very small amounts,

    perhaps less than a penny, in a single

    transaction

    Micropayments, however, have not been

    available in conventional commerce, and their

    introduction opens up many new areas of

    business

  • 7/27/2019 Unit -4 Internet payment systems

    42/49

    MilliCent

    Developed at Digital Equipment Corporation (

    now Compaq) which is designed to allow pay

    ments as low as onetenth of a cent ($0.001)

    to be made.

    A Millicent payment can be efficiently

    validated at a vendors site without the need

    to contact a third party

  • 7/27/2019 Unit -4 Internet payment systems

    43/49

    Purchasing with MilliCent

  • 7/27/2019 Unit -4 Internet payment systems

    44/49

    Scrip Scrip is a piece of data used to represent microcurrency

    within the Millicent system. Scrip has the following propertie

    A piece of scrip represents a prepaid value, much like prepaid phone c

    ards, fare cards, or coupons.

    Scrip can represent any denomination of currency. Expected values ran

    ge from onetenth of a cent up to about $5, although there are no defined upper or lowerbound limits.

    The security of scrip is based on the assumption that it is only used to

    represent small amounts of money.

    It is vendorspecific and thus has value at one vendor only.

    It can be spent only once. Double spending will be detected locally by the vendor at the time of purchase.

    It can be spent only by its owner. A shared secret is used to prevent sto

    len scrip being spent.

  • 7/27/2019 Unit -4 Internet payment systems

    45/49

    Scrip

    Scrip cannot be tampered with or its value changed.

    It is computationally expensive to counterfeit scrip. The cost of doing so outwe

    ighs the value of the scrip itself.

    Scrip makes no use ofpublickey cryptography. It can be efficiently produced, v

    alidated, and protected using a oneway hash function and limited symmetric

    cryptography. Scrip cannot provide full anonymity. It has visible serial numbers that could be

    recorded and traced.

  • 7/27/2019 Unit -4 Internet payment systems

    46/49

    Purchasing with MilliCent

  • 7/27/2019 Unit -4 Internet payment systems

    47/49

    Payword

    PayWord is a creditbased micropayment scheme designed by Ron Rivest(MIT Laboratory for Computer Science, Massachusetts) and Adi Shamir(Weizmann Institute of Science, Rehovot, Israel)

    PayWord uses chains of hash values to represent user credit within thesystem.

    Each hash value, called a PayWord, can be sent to a merchant payment.

    A PayWord chain is vendorspecific and the user digitally signs acommitment to honor payments for that chain.

    Brokers mediate between users and vendors and maintain accounts forboth.

    They vouch for users by issuing a PayWord certificate allowing that user togenerate PayWords. T

    They redeem spent PayWord chains from vendors, transferring theamount spent from the users account to the vendor.

  • 7/27/2019 Unit -4 Internet payment systems

    48/49

    Probability based micro payment

    In the previous micropayment schemes eachand every payment is processed by the vendorand later verified and redeemed at a broker

    or bank. To minimize the number of micropayment

    transactions that must be performed, theprobability theory can be applied so that there

    is a specified likelihood or chance that thepayment will be performed.

  • 7/27/2019 Unit -4 Internet payment systems

    49/49

    Probability based micro payment

    The value of the transaction is equal to the probabilityof making an actual payment multiplied by the value ofthat actual payment

    Transaction_value = Probability * Payment_amount

    For example, instead of making 1,000 micropaymentseach worth 1 cent, one might make a $10 paymentwith a 1/1,000 probability

    Probabilitybased micropayments eliminate the cost of

    making the actual micropayment for most transactions,but add the overhead of fairly predicting a random

    event with known probability