Designing System for Internet Commerce 6. Functional Architecture Jinwon Lee.

Slides:



Advertisements
Similar presentations
1 Understanding Web Services Presented By: Woodas Lai.
Advertisements

Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
Chapter Two Information Technologies: Concepts and Management.
Understanding Networked Applications: A First Course Midterm one review by David G. Messerschmitt.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
Functional Architecture of E-Commerce Systems
Chapter 8 Web Security.
Thursday, February 10, Management of Information Systems: Mini-3 Spring 2000.
COMPUTER APPLICATIONS TO BUSINESS ||
Management Information system E-commerce E-business Supervised by: Miss : Rasha Ragheb Atallah Presentation provided by: Salah Imad AlQady Ramzy Shafeeq.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
Secure Electronic Transaction (SET)
Authentication and Payments 27 June 2000 Ann Terwilliger Product Director eCommerce Authentication Visa International.
To B2B or not to B2B Charting a course for buy-side e-commerce in the university environment.
MSS*: Chapter 3 Shopping carts & Payment gateways * McClure, Stuart, Saumil Shah, and Shreeraj Shah. Web Hacking: attacks and defense. Addison Wesley.
Jaeki Song ISQS6337 JAVA Lecture 16 Other Issues in Java.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Electronic Commerce Jeff Campbell, Piyanuch Chuasiripattana, Travis Flood, Matthew Janocko, Kent Woodburn Research on Electronic Commerce.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Business-to-Business Authors: Authors: Mladenka Jakovljevic, Prof. Dr. Veljko Milutinovic,
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Lecture 13 Business and the Internet SFDV Principles of Information Systems.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
E-Commerce Systems and Components Course No.: CMPE296Z Design and Implementation of E-Commerce Systems Instructor: Jerry Gao, Ph.D. Jerry.
WEB SERVER SOFTWARE FEATURE SETS
Chapter6: E-Commerce Web Sites HNDIT11062 – Web Development 1.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Electronic Commerce Semester 1 Term 1 Lecture 7. Introduction to the Web The Internet supports a variety of important tools, such as file transfer, electronic.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Ecommerce solutions in India Ecommerce Website Development is a new field in website development. It's not like other general website designs, as it gives.
Cryptography and Network Security
EMV® 3-D Secure - High Level Overview
Chapter 2: Introduction to Electronic Commerce
BY GAWARE S.R. DEPT.OF COMP.SCI
Cryptography and Network Security
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

Designing System for Internet Commerce 6. Functional Architecture Jinwon Lee

Contents What is Architecture? Core Architecture Ideas Roles Components Example of System Architecture Summary

1) What is Architecture? Architecture defines basic components and important concepts of system. E-Commerce evolution may go well beyond the original requirement, so Flexibility of the Architecture is critically important in making that growth possible.

2) Core Architecture Understanding of Roles Help us to make system effectively to accomplish the goal. Decomposition of Functions The specification of functional units and the interfaces between them defines the architecture of a system

2) Core Architecture Linking Content to Transaction How the user makes the transition How the information is verified How the information matches up → The answers help make design decision Trust Models (security) Specifying relationship between components

3) Roles Customer Roles Specifier, Approver, Buyer, Recipient Business Roles Business manager, Content designer, etc…. Roles and Reality Thinking about roles enables us to ensure that all of the work get done, and that we are not missing an important function as we design

4) Components Customer Components and Clients “ What browsers do the customer have, and what are their capability?” → E.g. wallets Seller Components and Servers The seller provides all of components of the commerce value chain, from content to customer service Transaction processing system, Payment processors, Fulfillment systems

5) Example of System Architecture Primary Components: Clients, Merchant, Transaction system, Payment gateway 5-1) Web Server with Order Form 5-2) Secure Electric Transaction(SET) 5-3) Open Market Commerce Architecture 5-4) Open Buying on Internet(OBI)

5-1) Web Server with Order Form Merchant server + Transaction server No explicit payment gateway → Simplicity

5-1) Web Server with Order Form Logical View

5-2) Secure Electric Transaction Payment gateway is added The key differences from 5-1) The way the order form is handled Payment-related communication is handled

5-3) Open Market Commerce Architecture Separate the management of content from the management of transaction through a technology called Secure Link Separate transaction server: Transaction out-sourcing possible Content servers can be separately scaled

5-3) Open Market Commerce Architecture SecureLink Secure Remote Procedure Call based on HTTP and HTML Works across trust boundaries MAC (message authentication code) E.g.) 98a6e9c8b9851a37:kid= &valid= &expire= …. Components provided Key management, digital offer compilation, digital ticket validation, software developer ’ s kit

5-4) Open Buying on the Internet Split the transaction server into sell-side and buy side parts A Standard proposal released by the OBI consortium group of buy-side orgs, sell-sideorgs, payment orgs, technology companies related to B-to-B Split the functionality of the commerce system between buy-side activities and sell-side activities → each organization manages those functions.

5-4) Open Buying on the Internet

Good when there are multiple buy-side companies and multiple sell-side companies Interoperability Requisitioner authentication Certification signed by buying organization Order handling OBI order request/order Standard format, encapsulated as an OBI object

6) Summary Internet commerce system can quickly be obsolete. By carefully creating an architecture, taking into account the business challenges to be addressed and possibilities for change over time → The System can evolve and adapt to growth, new challenges, and technology change