Download presentation
Presentation is loading. Please wait.
Published bySusanna Davis Modified over 9 years ago
1
iKP Secure Electronic Payment System Presented by Jinping Li
2
iKP Secure Electronic Payment System Introduction Introduction iKP Payment Model iKP Payment Model Security Requirement Security Requirement Framework of iKP Protocols Framework of iKP Protocols Conclusion Conclusion Questions Questions
3
Introduction Security for electronic payments is of the utmost importance Security for electronic payments is of the utmost importance “… Indeed, the appeal of electronic commerce without electronic payment is limited. Moreover, insecure electronic payment methods are more likely to impede, than to promote, electronic commerce… ” One scenario could be a shopper buying something from a Web site for the first time that buys an expensive item and has it shipped to an address that is different from the billing address B2B vs B2C Adversaries and threats Adversaries and threatsinterception
4
iKP Model 1. Parties in iKP Buyer,Seller,Acquirer 2.iKP protocols is a family i=1,2,3, which reflects number of parties with public key pairs 3. iKP protocols are based on the existing credit-card system Payment System Provider IssuerAcquirer BuyerSeller Clearing Payment Generic model of a payment system
5
iKP Model Root Key SubjectPKSignature of TTP Association Signature Issuer Signature Acquirer Signature Cardholder Signature Merchant Signature Cardholder Signature 4.iKP protocols are based on public key cryptography 5.Certification Authorities
6
Security Requirement Issuer/Acquirer Requirements Issuer/Acquirer Requirements A1- Proof of Transaction Authorization by Buyer A2- Proof of Transaction Authorization by Seller Seller Requirements Seller Requirements S1- Proof of Transaction Authorization by Acquirer S2- Proof of Transaction Authorization by Buyer Buyer Requirements Buyer Requirements B1- Impossibility of Unauthorized Payment B2- Proof of Transaction Authorization by Acquirer B3- Certification and Authentication of Seller B4- Receipt from Seller
7
Framework of iKP Protocols Buyer SellerAcquirer Initiate(SALT B, ID B ) Invoice(Clear, [2,3 Sig S ]) Payment(EncSlip,[3 Sig B ])Auth-Request(Clear, H k (SALT B, DESC), EncSlip,[2,3 Sig S,[3 Sig B ]]) Auth-Response(RESPCODE,Sig A ) Conform(RESPCODE,SigA,[2,3 V|VC]) Goods and Services (ST-INF B )(ST-INF S ) (ST-INF A )
8
Satisfaction of requirements
9
Conclusion The greater the number of partied that hold public-key pairs, the greater the level of security provided The greater the number of partied that hold public-key pairs, the greater the level of security provided Allows for gradual deployment of the system Allows for gradual deployment of the system SET is developed based on iKP protocols, which is supported by most signification organizations SET is developed based on iKP protocols, which is supported by most signification organizations Less privacy of order information and the amount of payment Less privacy of order information and the amount of payment Offers no anoymity form the payment system provider Offers no anoymity form the payment system provider
10
Question How does iKP satisfy A1?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.