Home Common Problem What is the most powerful secure electronic transaction protocol currently?

What is the most powerful secure electronic transaction protocol currently?

Nov 03, 2020 pm 03:02 PM
protocol

The current secure electronic transaction protocol with strong functions is: SET protocol. The SET protocol itself is relatively complex, has a strict design, and has high security. It can ensure the confidentiality, authenticity, integrity and non-repudiation of information transmission; the SET protocol ensures the security of online shopping using credit cards on an open network.

What is the most powerful secure electronic transaction protocol currently?

#The current secure electronic transaction protocol with strong functions is: SET protocol.

While e-commerce provides opportunities and convenience, it also faces one of the biggest challenges, namely transaction security. In an online shopping environment, cardholders hope to keep their account information confidential during transactions to prevent it from being misappropriated; merchants hope that customer orders cannot be repudiated, and during the transaction process, all parties to the transaction hope to verify The identity of other parties to prevent being deceived.

In response to this situation, the two major credit card organizations in the United States, Visa and MasterCard, and many international technology institutions have jointly formulated security standards for online transactions based on bank cards that are applied to the Internet. This is "Secure Electronic Transaction" (SET). It uses public key cryptography and the X.509 digital certificate standard, and is mainly used to ensure the security of online shopping information.

The SET protocol is designed based on the credit card payment model on B2C. It ensures the security of online shopping using credit cards on the open network. SET is mainly designed to solve credit card transactions between users, merchants, and banks. It has various advantages such as ensuring the integrity of transaction data and non-repudiation of transactions. Therefore, it has become the currently recognized international standard for online credit card transactions. standard.

Since SET provides authentication between consumers, merchants and banks, it ensures the security, complete reliability and non-repudiation of transaction data, especially ensuring that consumers’ bank card numbers are not exposed to Merchants and other advantages. Therefore, by 2012, it became the recognized international security standard for online credit/debit card transactions.

SET (Secure Electronic Transaction) secure electronic transaction protocol is mainly used to ensure the security of payment information in the B to C model. The SET protocol itself is relatively complex, has a strict design, and is highly secure. It can ensure the confidentiality, authenticity, integrity, and non-repudiation of information transmission. The SET protocol is a typical implementation under the PKI framework and is constantly being upgraded and improved. For example, SET 2.0 will support debit card electronic transactions.

The above is the detailed content of What is the most powerful secure electronic transaction protocol currently?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Which protocol does vivo fast charging belong to? Which protocol does vivo fast charging belong to? Sep 06, 2022 pm 02:43 PM

There are two main protocols for vivo fast charging: 1. "QC 2.0" fast charging protocol. "QC2.0" is "Quick Charge 2.0" technology. It is version 2.0 of fast charging technology released by Qualcomm. It can output 5V, 9V, and 12V. , 20V four voltage groups; 2. PD fast charging protocol is a fast charging specification formulated by the "USB-IF" organization. It is one of the current mainstream fast charging protocols and can make the current default maximum power "5V/2A" The "type-c" interface is increased to 100W.

What is the maximum watt of PD3.0 fast charging protocol? What is the maximum watt of PD3.0 fast charging protocol? Nov 08, 2022 pm 04:04 PM

The PD3.0 fast charging protocol supports up to “100W”. In November 2015, USB PD fast charging ushered in a major version update, entering the USB PD3.0 fast charging era; the PD3.0 protocol supports 5V3A, 9V3A, 12V3A, 15V3A, 20V5A output, and the maximum power can reach 100W. Not only can It can be used to charge mobile phones, and can also be used to power laptops or monitors.

What are the 5 industrial communication protocols? What are the 5 industrial communication protocols? Sep 28, 2022 am 11:52 AM

5 types of industrial communication protocols: 1. Modbus protocol, which is a universal language used in electronic controllers; 2. RS-232 protocol, which is a serial physical interface standard; 3. RS-485 protocol, which is based on RS232 Developed on the basis of; 4. HART protocol is a communication protocol used between on-site intelligent instruments and control room equipment; 5. MPI protocol is a cross-language communication protocol used to write parallel computers.

SOAP Protocol Guide in PHP SOAP Protocol Guide in PHP May 20, 2023 pm 07:10 PM

With the continuous development of Internet technology, more and more enterprise-level applications need to provide interfaces to other applications to realize the interaction of data and business. In this case, we need a reliable protocol to transmit data and ensure data integrity and security. SOAP (Simple Object Access Protocol) is an XML-based protocol that can be used to implement communication between applications in a Web environment. As a popular web programming language, PHP

What is the qc4+ fast charging protocol? What is the qc4+ fast charging protocol? Aug 18, 2022 pm 03:49 PM

The QC4+ fast charging protocol is a combination of the USB PD PPS protocol and the QC3.0/2.0 fast charging protocol. It is a multi-functional, multi-protocol fast charging technology. The QC4+ charging protocol is compatible with USB PD3.0 (PPS) and is downwardly compatible with USB PD2.0, QC3.0, QC2.0, BC1.2 and other protocols. The first prerequisite for supporting USB PD and QC4+ is the support of USB-C interfaces at both ends and the power negotiation message based on the CC (configuration channel) in the USB-C interface.

Windows will retire TLS 1.0 and TLS 1.1 in the near future Windows will retire TLS 1.0 and TLS 1.1 in the near future Aug 12, 2023 am 11:37 AM

Microsoft plans to disable Transport Layer Security (TLS) protocol versions 1.0 and 1.1 in Windows. The company announced the news on its technology community website on March 1, 2023. These two protocols date back to 1999 (TLS1.0) and 2006 (TLS1.1) and have since been surpassed by newer versions TLS1.2 and TLS1.3. Microsoft noted that security issues were discovered in older protocol versions, and "Internet standards and regulators have deprecated or disallowed TLS versions 1.0 and 1.1 in response. Over the years, usage of TLS 1.0 and 1.1 has declined significantly. , Microsoft believes the time has come to disable both protocols. Mic

What technology does the x.25 protocol use? What technology does the x.25 protocol use? Jul 18, 2022 pm 04:05 PM

The "x.25" protocol uses packet switching technology; the "x.25" protocol is a computer-oriented data communication network, consisting of basic equipment such as transmission lines, packet switches, remote concentrators and packet terminals, and adopts a layered architecture , negotiation, control and information transmission of information exchange are carried out between the peer layers of the interface through the communication protocol between the peer layers.

Concise and easy to understand: in-depth analysis of the meaning of pip protocol Concise and easy to understand: in-depth analysis of the meaning of pip protocol Feb 02, 2024 pm 01:10 PM

To deeply analyze the meaning of the pip protocol, specific code examples are required. Introduction: In the Python world, pip (i.e. pipinstall) is our preferred way to install and manage third-party libraries. It is a Python package management tool. It is widely used in the development process because of its simplicity, efficiency, ease of use and convenience. This article will deeply analyze the meaning of the pip protocol, demonstrate the important role and usage of pip through specific code examples, and help readers better understand and use pip. 1. pip protocol