Title: E- Commerce transactions And Shopping Cart
1E- Commerce transactions And Shopping Cart
- ERDEM OZDEN
- INBS 510 ANNA STORY
- APRIL 16, 2002
2Online Credit Card Fraud Stats
- Global online purchases will reach 310 billion
in 2005. - Online credit card fraud will cost 9 billion in
2001. - Widespread use of anti-fraud technology will
reduce online payment fraud to 5.7 billion by
2005, from a potential 15.5 billion. - Fraud was 19 times higher online, than with brick
and mortar stores in 2001. - Source Meridien Research
3How Consumers View Authentication
- 47 are now comfortable with registering on web
sites by providing personal information. - 80 said they would be open to additional
authentication measures to make online purchases
more secure. - 50 said they would be open to using a personal
identification number (PIN). - 32 said they would be willing to type in a
portable password created by a credit card
company. - 42 said they are annoyed at having to
remember different passwords for different sites. - Source Jupiter Media Metrix
4SHOPPING CYCLE
- Online Store The merchant sets up an online
store. - Bank Account The merchant registers with a bank
to authorize transactions. - Product Selection Customers browse products by
product category, or by text search. - Shopping Cart Customers view and change the
contents of their shopping cart. - Customer Registration Registration is needed
when customers make a purchase. - Check Out The customer may verify or change
items, and then proceed with their purchase. - Credit Card Authorization The customer submits
credit card information for authorization. - Order Processing After credit card
authorization, the merchant sends the product.
5Online Credit Card Transaction
Shopping Cart
1. Customer Proceeds to Check out.
Calculate Totals
2. Shipping, tax added for total amount.
Get User Info
3. Customers address, telephone information.
5. If the CC is Declined Get New CC.
Enter Credit Card Information
4. Customers credit card information.
No
Enough Funds
Card Refused
5. If the CC is Authorized Process Order.
Yes
Failed
Card Authorized
E-mail Customer
E-mail Customer
6SHOPPING SERVICES
- One-click Buy CC data is stored in database,
and used for instant purchases. - Personalization Some merchants offer
personalized services like special offers, and
- recommendations, for registered
customers. - Order Tracking The customers monitor order
status by using the order ID. - Save your cart Customers save their cart and
complete the transaction at a later date. - E-mail Verification The customers receive
emails about news, special events, - recommendations, and the recent order.
7SHOPPING CARTS
- Keep the process simple.
- Include tax and shipping costs to display the
exact charges. - Tell customers how many steps are involved.
- Add gift option before the checkout.
- Put policy information in pop-up windows.
- Dont force registration. Customers lose patience
fast. - Offer multiple shipping options.
- Limit the checkout process with five to six
steps.
8Personalization
Homepage
Yes
No
User Selects New Or Returning User
Retrieve Preferences
Cookie?
User Selects New User
User Selects Returning User
Database
User Enters ID Password
User Enters User Information
Cookie Set Return Homepage
Create Personal Page
Database
No
User Exists?
Register
Yes
Cookie Set Return Homepage
9CHARGE-BACK
CARDHOLDER
1. Cardholder calls Issuer Bank for fraud.
4. Issuer Bank gives cardholders credit.
ISSUER BANK
2. Issuer Bank calls Acquirer Bank.
3. Acquirer Bank debits merchant account.
Additional penalty, or cancels agreement.
ACQUIRER BANK
Merchant Account
10FRAUD
- Lower consumer confidence.
- Higher cost of transactions and loss of revenue
for merchants. - Higher costs of services for financial
institutions. - Image damage to the credit card companies and
issuers. - Charge-back fraud has slowed the growth of
e-commerceNothing is going to happen until
credit card companies can positively authenticate
every consumer buying from a website. -
- Theodore Lacobuizo, Senior Analyst,
TowerGroup
11SECURITY THREAT
- Employee Theft Employee steals data. This is
the largest threat. - Trojan Horse Can be used for snooping.
Frequently used in a virus attack. - Hacking Breaking into a system. Trojan horses
used for returning to server. - Social Engineering Hackers act like a network
engineer. - Buffer Overflow Cause an overflow condition. May
grant root access. - Cracking Breaking into system to steal things.
- Password Fishing Trying to log in with common
passwords. - Snooping Use of a software program to intercept
data. - Application Attack Force application to
fall-over, and root access to system.
12Secure Electronic Transaction (SET)
- Development of Visa and MasterCard.
- Certificate-based system.
- Digital signatures to replace the handwritten
signatures. - Cardholder software is required.
- Digital certificates are installed on consumers
PC. - Expensive.
- Complex structure.
- Because of its complexity, and cost, SET usage
was limited.
13Secure Sockets Layer (SSL)
- Created by Netscape.
- Simple to implement.
- Implemented in Transport Layer (TLS).
- Supports most of the browsers and Web servers.
- Widely used in Web transactions.
- Uses digital certificates.
14Secure Sockets Layer (SSL)
BROWSER
SERVER
1. Browser sends SSL request massage.
2. Server responds by sending its certificate.
3. Browser verifies that the certificate is valid.
4. Browser sends one time session key.
5. Server decrypts the massage with its private
key.
6. Source exchanges with symmetric encryption.
15Web Server Certificates
- The certificate, which contains the Web servers
public key, will be used by the browser to - Authenticate the identity of a Web site.
- Contain the Web servers public key.
- Encrypt information for the server using SSL.
- Certification Authority (CA) Certificates
- CA Certificates are issued by a trusted third
party called a Certification Authority (CA). - CA validates the certificate holders identity.
16Visa Payer Authentication Service (VPAS)
- New payer authentication service from VISA.
- Based on a protocol known as 3-D Secure.
- Announced in 2001.
- 3-D refers to the three domains
- Issuers
- Acquirers
- Transaction Communication
17How VPAS Works
1. Cardholder selects buy.
2. Merchant queries Visa for account data.
Cardholder
Merchant
3. Visa checks CAD for customer data.
Card Association Directory
Merchant Requests Authorization
Issuer Access Control Server
4. Issuer ACS validates password, digitally
signs response, transmits copy to Authentication
History Server
5. Merchant verifies signature, and sends
authorization request.
18MasterCard Secure Payment Application (SPA)
- MasterCards security solution.
- It requires participation by the card issuer and
the merchant. - Cardholder has to download a wallet application
from the issuer. - Deployment of SPA will be through server-based
electronic wallets. - Wallet will automatically fill out payment
information on the online order form. - Includes a unique cardholder authentication value
for each transaction. - Scheduled to the second quarter of 2002.
19Address Verification Service (AVS)
- Designed for mail-order and telephone order
environments. - Checks first 4 numeric digits of address and zip
code. - Merchant receives response codes, detailing
degree of match. - AVS does not guarantee charge-back protection.
- Data used is not always current.
- Only used in U.S., U.K., Germany, Austria and
Switzerland. - May result in false rejection of valid orders.