ecommerce recommendations and related topics
smart card
A small electronic device about the size of a credit card that contains electronic memory, and possibly an embedded integrated circuit (IC). Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs).
Smart cards are used for a variety of purposes, including:
# Storing a patient's medical records
# Storing digital cash
# Generating network IDs (similar to a token)
To use a smart card, either to pull information from it or add data to it, you need a smart card reader, a small device into which you insert the smart card.
RSA encryption
An public-key encryption technology developed by RSA Data Security, Inc. The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique. The RSA algorithm is based on the fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time.
The RSA algorithm has become the de facto standard for industrial-strength encryption, especially for data sent over the Internet. It is built into many software products, including Netscape Navigator and Microsoft Internet Explorer. The technology is so powerful that the U.S. government has restricted exporting it to foreign countries.
A similar technology that is also used widely is offered by a company called Cylink.
Anatomy of a Credit Card Transaction: The Basics
For a bigger understanding of a credit card transaction, the consequent is a
step-by-step breakdown: from the customer making a purchase using ECmerchant to
the merchant receiving an authorization on the value request. This not only
shows who is involved in this path , however it will highlight some considerations
in choosing an Internet value supply and establishing a merchant credit card
account.
Once the merchant account is in settle with an acquiring financial school
the merchant will desire to understand how money will be moved from the customers'
accounts to the merchant account. The best path to appreciate how an Internet
merchant gets paid is to follow a typical credit card transaction path . Fully
automated from end-to-end, in most cases it takes just seconds to entire.
1. A customer visits a web site, using average web browser software,
and fills her ECmerchant shopping cart.
2. The customer and ECmerchant exchange details online regarding
addresses, delivery and final value.
3. ECmerchant then displays the 'BUY' button to the customer, and a
transaction is initiated.
4. The customer clicks the 'BUY' button, prompting ECmerchant
to mail and electronic invoice.
5. ECmerchant provides transaction details in a form or the shopper's
browser automatically opens her online wallet, allowing her to select a value
instrument.
6. An encrypted charge value message is sent to ECmerchant.
7. When the server software receives the value message, it adds
merchant identification data.
8. The value request is encrypted and forwarded to gateway server
hosted by an ECommerce value supply corporation.
9. The gateway server decrypts the message and authenticates customers'
data and merchant validation.
10. A message is sent over secure, private financial networks to the
merchant's bank or authorized processor requesting charge approval.
11. Once the request is processed, a positive or negative response is
sent back to ECmerchant and on to the customer.
12. If the transaction is authorized, a digital receipt is delivered,
and the transaction is entire and captured.