In this chapter we will continue our discussion on SET and explore the following; payment processing in SET: purchase request, payment authorization, payment capture. The learning objectives for this chapter include: You would be able to present an understanding of transaction that is carried out over the internet, you would be able demonstrate knowledge about different entities and their role in a SET and how the actual payment is processed in SET. | Network Security Lecture 27 Presented by: Dr. Munam Ali Shah Summary of the Previous Lecture We talked about SET (Secure Electronic Transaction) SET Participants Requirements Features Dual Signature Signature verification Summary of the Previous Lecture Summary of the Previous Lecture WHY Dual Signatures Suppose that customers send the merchant two messages: The signed order information (OI). The signed payment information (PI). In addition, the merchant passes the payment information (PI) to the bank. If the merchant can capture another order information (OI) from this customer, the merchant could claim this order goes with the payment information (PI) rather than the original. Outlines of today’s lecture We will continue our discussion on SET and explore the following Payment Processing in SET Purchase request Payment authorization Payment capture Objectives You would be able to present an understanding of transaction that is carried out over the Internet. You would be able . | Network Security Lecture 27 Presented by: Dr. Munam Ali Shah Summary of the Previous Lecture We talked about SET (Secure Electronic Transaction) SET Participants Requirements Features Dual Signature Signature verification Summary of the Previous Lecture Summary of the Previous Lecture WHY Dual Signatures Suppose that customers send the merchant two messages: The signed order information (OI). The signed payment information (PI). In addition, the merchant passes the payment information (PI) to the bank. If the merchant can capture another order information (OI) from this customer, the merchant could claim this order goes with the payment information (PI) rather than the original. Outlines of today’s lecture We will continue our discussion on SET and explore the following Payment Processing in SET Purchase request Payment authorization Payment capture Objectives You would be able to present an understanding of transaction that is carried out over the Internet. You would be able demonstrate knowledge about different entities and their role in a SET and how the actual payment is processed in SET SET Participants Interface b/w SET and bankcard payment network . a Bank Provides authorization to merchant that given card account is active and purchase does not exceed card limit Must have relationship with acquirer issue public-key certificates for cardholders, merchants, and payment gateways 7 SET Requirements Provide confidentiality Ensure the integrity Provides authentication that card holder is a legitimate user of a card and account: Ensure the best security practices SET Key features Confidentiality of information Integrity of data Card holder account authentication Merchant authentication Facilitate interoperability among software and hardware providers SET supported Transactions card holder registration merchant registration purchase request payment authorization payment capture certificate query purchase inquiry purchase notification sale transaction .