Presentation is loading. Please wait.

Presentation is loading. Please wait.

IKP Secure Electronic Payment System Presented by Jinping Li.

Similar presentations


Presentation on theme: "IKP Secure Electronic Payment System Presented by Jinping Li."— Presentation transcript:

1 iKP Secure Electronic Payment System Presented by Jinping Li

2 iKP Secure Electronic Payment System Introduction Introduction iKP Payment Model iKP Payment Model Security Requirement Security Requirement Framework of iKP Protocols Framework of iKP Protocols Conclusion Conclusion Questions Questions

3 Introduction Security for electronic payments is of the utmost importance Security for electronic payments is of the utmost importance “… Indeed, the appeal of electronic commerce without electronic payment is limited. Moreover, insecure electronic payment methods are more likely to impede, than to promote, electronic commerce… ” One scenario could be a shopper buying something from a Web site for the first time that buys an expensive item and has it shipped to an address that is different from the billing address B2B vs B2C Adversaries and threats Adversaries and threatsinterception

4 iKP Model 1. Parties in iKP Buyer,Seller,Acquirer 2.iKP protocols is a family i=1,2,3, which reflects number of parties with public key pairs 3. iKP protocols are based on the existing credit-card system Payment System Provider IssuerAcquirer BuyerSeller Clearing Payment Generic model of a payment system

5 iKP Model Root Key SubjectPKSignature of TTP Association Signature Issuer Signature Acquirer Signature Cardholder Signature Merchant Signature Cardholder Signature 4.iKP protocols are based on public key cryptography 5.Certification Authorities

6 Security Requirement Issuer/Acquirer Requirements Issuer/Acquirer Requirements  A1- Proof of Transaction Authorization by Buyer  A2- Proof of Transaction Authorization by Seller Seller Requirements Seller Requirements  S1- Proof of Transaction Authorization by Acquirer  S2- Proof of Transaction Authorization by Buyer Buyer Requirements Buyer Requirements  B1- Impossibility of Unauthorized Payment  B2- Proof of Transaction Authorization by Acquirer  B3- Certification and Authentication of Seller  B4- Receipt from Seller

7 Framework of iKP Protocols Buyer SellerAcquirer Initiate(SALT B, ID B ) Invoice(Clear, [2,3 Sig S ]) Payment(EncSlip,[3 Sig B ])Auth-Request(Clear, H k (SALT B, DESC), EncSlip,[2,3 Sig S,[3 Sig B ]]) Auth-Response(RESPCODE,Sig A ) Conform(RESPCODE,SigA,[2,3 V|VC]) Goods and Services (ST-INF B )(ST-INF S ) (ST-INF A )

8 Satisfaction of requirements

9 Conclusion The greater the number of partied that hold public-key pairs, the greater the level of security provided The greater the number of partied that hold public-key pairs, the greater the level of security provided Allows for gradual deployment of the system Allows for gradual deployment of the system SET is developed based on iKP protocols, which is supported by most signification organizations SET is developed based on iKP protocols, which is supported by most signification organizations Less privacy of order information and the amount of payment Less privacy of order information and the amount of payment Offers no anoymity form the payment system provider Offers no anoymity form the payment system provider

10 Question How does iKP satisfy A1?


Download ppt "IKP Secure Electronic Payment System Presented by Jinping Li."

Similar presentations


Ads by Google