Credit Card-Based Secure Online Payment

  • Johnny W. Wong
  • Lev Mirlas
  • Weidong Kou
  • Xiaodong Lin

Abstract

The credit card is a popular payment method for the purchase of goods and services. Traditionally, credit cards are used by buyers to purchase merchandise from brick-and-mortar stores. Transactions are carried out face-to-face. Typically, the merchant first obtains authorization from the credit card company regarding the transaction. If the transaction is authorized, the buyer is asked to sign for the purchase, and a paper receipt stating the terms of the sale will be issued to the buyer. The merchant also verifies that the buyer’s signature matches the cardholder’s signature at the back of the card, and that the card has not expired.

Keywords

Shipping Assure Tocol Proval 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [11.1]
    ] A. O. Freier, P. Karlton, P. C. Kocher: SSL 3.0 protocol specification. http://home.netscape.com/eng/ss13/index.html.Google Scholar
  2. [11.2]
    ] MasterCard International Incorporated, Visa International. The SET specification. http://www.setco.org/set_specifications.html.Google Scholar
  3. [11.3]
    D. Eastlake, B. Boesch, S. Crocker, M. Yesil (1996) CyberCash credit card protocol version 0.8. Internet RFC 1898.Google Scholar
  4. [11.4]
    R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee (1999) Hypertext Transfer Protocol — HTTP/1.1. Internet RFC2616.Google Scholar
  5. [11.5]
    X. Lin, J. W. Wong, W. Kou (2000) Performance analysis of secure web server based on SSL. In: Proceedings of ISW2000, J. Pieprzyk, E. Okamoto, J. Seberry (eds.), LNCS 1975. Springer. Berlin Heidelberg New York, pp. 249–261.Google Scholar
  6. [11.6]
    A. O. Freier, P. Karlton, P. C. Kocher (1996) The SSL protocol version 3. 0. http://wp.netscape.com/eng/ssl3/ssl-toc.htmlGoogle Scholar
  7. [11.7]
    W. Ford, M. Baum (1997) Secure electronic commerce: building the infrastructure for digital signatures and encryption. Prentice-Hall, Englewood Cliffs New York.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Johnny W. Wong
    • 1
  • Lev Mirlas
    • 2
  • Weidong Kou
    • 3
  • Xiaodong Lin
    • 1
  1. 1.University of WaterlooWaterlooCanada
  2. 2.IBM Canada Ltd.MarkhamCanada
  3. 3.University of Hong KongHong KongChina

Personalised recommendations