Credit Card-Based Secure Online Payment
The credit card is a popular payment method for the purchase of goods and services. Traditionally, credit cards are used by buyers to purchase merchandise from brick-and-mortar stores. Transactions are carried out face-to-face. Typically, the merchant first obtains authorization from the credit card company regarding the transaction. If the transaction is authorized, the buyer is asked to sign for the purchase, and a paper receipt stating the terms of the sale will be issued to the buyer. The merchant also verifies that the buyer’s signature matches the cardholder’s signature at the back of the card, and that the card has not expired.
KeywordsCredit Card Trusted Third Party Payment Method Secure Socket Layer Payment Instrument
Unable to display preview. Download preview PDF.
- [11.1]] A. O. Freier, P. Karlton, P. C. Kocher: SSL 3.0 protocol specification. http://home.netscape.com/eng/ss13/index.html.Google Scholar
- [11.2]] MasterCard International Incorporated, Visa International. The SET specification. http://www.setco.org/set_specifications.html.Google Scholar
- [11.3]D. Eastlake, B. Boesch, S. Crocker, M. Yesil (1996) CyberCash credit card protocol version 0.8. Internet RFC 1898.Google Scholar
- [11.4]R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee (1999) Hypertext Transfer Protocol — HTTP/1.1. Internet RFC2616.Google Scholar
- [11.5]X. Lin, J. W. Wong, W. Kou (2000) Performance analysis of secure web server based on SSL. In: Proceedings of ISW2000, J. Pieprzyk, E. Okamoto, J. Seberry (eds.), LNCS 1975. Springer. Berlin Heidelberg New York, pp. 249–261.Google Scholar
- [11.6]A. O. Freier, P. Karlton, P. C. Kocher (1996) The SSL protocol version 3. 0. http://wp.netscape.com/eng/ssl3/ssl-toc.htmlGoogle Scholar
- [11.7]W. Ford, M. Baum (1997) Secure electronic commerce: building the infrastructure for digital signatures and encryption. Prentice-Hall, Englewood Cliffs New York.Google Scholar