E-Payment System
E-Payment System
E-Payment System
TYPES
Drawback of E-cash:
1. One drawback of e-cash is its inability to be easily divided into smaller amounts.
2. One of the business issues while using Electronic Cash is that it can’t take tangible form.
3. The enormous currency fluctuations in international finance pose another problem in business
while using e-cash
4. Operational risk associated with e-cash can be mitigated by imposing constraints, such as limits
on
(1) The time over which a given electronic money is valid,
(2) How much can be stored on and transferred by electronic money
(3) The number of exchanges that can take place before a money needs to be redeposit with a
bank or financial institution, and
(4) The number of such transactions that can be made during a given period of time.
5. The use of e-cash can cause threat to the government’s revenue flow.
Electronic Checks
Debit Checks
Bank Accounting
Server
An account holder will issue an electronic document that contains the name of the payer, the name of the
financial institution, the payer’s account number, the name of the payee and amount of the check. Most of
the information is in uncoded form. Like a paper check, an e-check will bear the digital equivalent of a
signature: a computed number that authenticates the check as coming from the owner of the account. And,
again like a paper check, an e-check will need to be endorsed by the payee, using another electronic
signature, before the check can be paid. Properly signed and endorsed checks can be electronically
exchanged between financial institutions through electronic clearinghouses, with the institutions using
these endorsed checks as tender to settle accounts.
The specifics of the technology work in the following manner:
On receiving the check, the seller presents it to the accounting server for verification and payment. The
accounting server verifies the digital signature on the check using any authentication scheme. A user’s
digital “signature” is used to create one ticket-a check-which the seller’s digital “endorsement” transforms
into another-an order to a bank computer for fund transfer. Subsequent endorsers add successive layers of
information onto the tickets, precisely as a large number of banks may wind up stamping the back of a
check along its journey through the system.
Electronic purses, which replace money, are also known as debit cards and electronic money.
Relationship-Based Smart Cards
Financial institutions worldwide are developing new methods to maintain and expand their services to
meet the needs of increasingly sophisticated and technically smart customers, as well as to meet the
emerging payment needs of electronic commerce. Traditional credit cards are fast evolving into smart
cards as consumers demand payment and financial services products that are user-friendly, convenient,
and reliable.
A relationship-based smart card is an enhancement of existing card ser-vices and/or the addition of new
services that a financial institution delivers to its customers via a chip-based card or other device. These
new services may include access to multiple financial accounts, value-added marketing programs, or
other information cardholders may want to store on their card. The chip-based card is but one tool that
will help alter mass marketing techniques to address each individual’s specific financial and personal
requirements. Enhanced credit cards store cardholder information including name, birth date, personal
shopping preferences, and actual purchase records.
This information will enable merchants to accurately track consumer behavior and develop promotional
programs designed to increase shopper loyalty. Relationship-based products are expected to offer
consumers far greater options, including the following:
1. Access to multiple accounts, such as debit, credit, investments or stored value for e-cash, on one
card or an electronic device
2. A variety of functions, such as cash access, bill payment, balance inquiry, or funds transfer for
selected accounts
3. Multiple access options at multiple locations using multiple device types, such as an automated
teller machine, a screen phone, a personal computer, a personal digital assistant (PDA), or
interactive TVs Companies are trying to incorporate these services into a personalized banking
relationship for each customer. They can package financial and non financial services with value-
added programs to enhance convenience, build loyalty and retention, and attract new customers.
The electronic purse works in the following manner. After the purse is loaded with money, at an
ATM or through the use of an inexpensive special telephone, it can be used to pay for, say, candy in a
vending machine equipped with a card reader. The vending machine need only verify that a card is
authentic and there is enough money available for a chocolate bar. In one second, the value of the
purchase is deducted from the balance on the card and added to an e-cash box in the vending machine.
The remaining balance on the card is displayed by the vending machine or can be checked at an ATM or
with a balance-reading device. Electronic purses would virtually eliminate fumbling for change or small
bills in a busy store or rush-hour toll booth, and waiting for a credit card purchase to be approved. This
allows customers to pay for rides and calls with a prepaid card that “remembers” each transaction. And
when the balance on an electronic purse is depleted, the purse can be recharged with more money. As for
the vendor, the receipts can be collected periodically in person—or, more likely, by telephone and
transferred to a bank account.
We can break credit card payment on on-line networks into three basic categories:
1. Payments using plain credit card details. The easiest method of payment is the exchange of
unencrypted credit cards over a public network such as telephone lines or the Internet. The low level of
security inherent in the design of the Internet makes this method problematic (any snooper can read a
credit card number, and programs can be created to scan the Internet traffic for credit card numbers and
send the numbers to its master). Authentication is also a significant problem, and the vendor is usually
responsible to ensure that the person using the credit card is its owner. Without encryption there is no
way to do this.
2. Payments using encrypted credit card details. It would make sense to encrypt your credit card details
before sending them out, but even then there are certain factors to consider. One would be the cost of a
credit card transaction itself. Such cost would prohibit low-value payments (micro payments) by adding
costs to the transactions.
3. Payments using third-party verification. One solution to security and verification problems is the
introduction of a third party: a company that collects and approves payments from one client to another.
After a certain period of time, one credit card transaction for the total accumulated amount is completed.
Entities involved in Credit card Transaction
1. Consumer (Buyer or Card holder)
2. Merchant (Seller)
3. Card Issuer (Consumers’ Bank)
4. Acquirer or Principal (Merchant’s Bank)
5. Card Association (Visa, Master Card etc)
6. Third party processor
How an Online Credit Transaction Works
4.8 Encryption and Credit Cards
Encryption is instantiated when credit card information is entered into a browser or other
electronic commerce device and sent securely over the net-work from buyer to seller as an
encrypted message. This practice, however, does not meet important requirements for an
adequate financial system, such as non refutability, speed, safety, privacy, and security.
Customer Send Encrypted Merchant’s Server
Credit Card No.
Send Information
Monthly
Purchase Check for Credit
& Sufficient Funds Card authenticity
Statement
Verify
Authorize
Customer’s Bank
Online Credit Card Processor
To make a credit card transaction truly secure and non refutable, the following sequence of
steps must occur before actual goods, services, or funds flow:
1. A customer presents his or her credit card information (along with an authenticity signature
or other information such as mother’s maiden name) securely to the merchant.
2. The merchant validates the customer’s identity as the owner of the credit card account.
3. The merchant relays the credit card charge information and signature to its bank or on-line
credit card processors.
4. The bank or processing party relays the information tot the customer’s; bank for
authorization approval.
5. The customer’s bank returns the credit card data, charge authentication, and authorization to
the merchant.
In this scheme, each consumer and each vendor generates a public key and a secret key. The
public key is sent to the credit card company and put on its public key server. The secret key is
reencrypted with a password, and the unencrypted version is erased.
REQUEST
CLIENT MERCHANT’s
BROWSER SERVER
Verification Authorization
PAYMENT
1. The consumer acquires an OTPP account number by filling out a registration form. This
will give the OTPP a customer information profile that is backed by a traditional
financial instrument such as a credit card.
2. To purchase an article, software, or other information online, the consumer requests the
item from the merchant by quoting her OTPP account number. The purchase can take
place in one of two ways: The consumer can automatically authorize the “merchant” via
browser settings to access her OTPP account and bill her, or she can type in the account
information.
3. The merchant contacts the OTPP payment server with the customer’s account number.
4. The OTPP payment server verifies the customer’s account number of; the vendor and
checks for sufficient funds.
5. The OTPP payment server sends an electronic message to the buyer. This message could
be an automatic WWW form that is sent by the OTPP server or could be a simple e-
mail. The buyer responds to the form or e-mail in one of three ways: Yes, I agree to pay;
No, I will not pay; or Fraud, I never asked for this.
6. If the OTPP payment server gets a Yes from the customer, the merchant is informed and
the customer is allowed to download the material immediately.
7. The OTPP will not debit the buyer’s account until it receives confirmation of purchase
completion. Abuse by buyers who receive information or a product and decline to pay
can result in account suspension.
To use this system, both customers and merchant must be registered with the OTPP. An on-
line environment suitable for micro transactions will require that many of the preceding
steps be automated.
Third-party processing for credit cards entails a number of pros as well as cons these
companies are chartered to give credit accounts to individuals and act as bill collection agencies
for businesses. Consumers use credit cards by presenting them for payment and then paying
an aggregate bill once a month. Consumers pay either by flat fee or individual transaction
charges for this service. Merchants get paid for the credit card drafts that they submit to the
credit card company. Businesses get charged a transaction charge ranging from 1 percent to 3
percent for each draft submitted.
Credit cards have advantages over checks in that the credit card company assumes a larger
share of financial risk for both buyer and seller in a transaction. Buyers can sometimes dispute
a charge retroactively and have the credit card company act on their behalf. Sellers are ensured
that they will be paid for all their sales—they needn’t worry about fraud. This translates into a
convenience for the buyer, in that credit card transactions are usually quicker and easier than
check (and sometimes even cash) transactions.
One disadvantage to credit cards is that their transactions are not anonymous, and credit card
companies do in fact compile valuable data about spending habits.