Current location - Quotes Website - Personality signature - Workflow of secure electronic transaction protocol
Workflow of secure electronic transaction protocol

1) Consumers use their PCs to select the items they want to purchase through the Internet, and enter the order form on the computer. The order form must include the online store, the name and quantity of the purchased items, and the delivery time. and location information.

2) Contact the relevant online store through the e-commerce server, and the online store will respond and tell the consumer whether the unit price of the goods, the amount payable, the delivery method and other information in the order form are accurate or whether there have been changes. .

3) The consumer selects the payment method, confirms the order and issues payment instructions. At this point SET begins to intervene.

4) In SET, consumers must digitally sign orders and payment instructions, and double signature technology is used to ensure that merchants cannot see the consumer's account information.

5) After the online store accepts the order, it requests payment approval from the consumer’s bank. The information passes through the payment gateway to the acquiring bank and then to the electronic money issuing company for confirmation. After approving the transaction, a confirmation message is returned to the online store.

6) The online store sends order confirmation information to consumers. The consumer-side software can record transaction logs for future inquiries.

7) The online store sends goods or provides services and notifies the acquiring bank to transfer money from the consumer's account to the store account, or notifies the issuing bank to request payment. There is usually a time interval between the authentication operation and the payment operation, for example, requesting the bank to settle the account for the day before getting off work every day.

The first two steps have nothing to do with SET. From the third step, SET takes effect until the sixth step. During the processing, SET has clear communication protocols, request information formats, data type definitions, etc. regulations. At every step of the operation, consumers, online stores, and payment gateways verify the identity of the communicating subject through the CA (Certification Center) to ensure that the communicating party is not an imposter. Therefore, it can also be simply considered that the SET specification gives full play to authentication The role of the center to maintain the authenticity and confidentiality of information provided by e-commerce participants on any open network.